CHAPTER 10: “SO, YOU ARE PAID BY THE AGA KHAN?”
Information Warfare Monitor, Tracking GhostNet: Investigating a Cyber Espionage Network, Munk School of Global Affairs, University of Toronto, March 29, 2009, https://citizenlab.ca/wp-content/uploads/2017/05/ghostnet.pdf (archive: perma.cc/6F7C-X9ZY); Information Warfare Monitor and Shadowserver Foundation, Shadows in the Cloud: Investigating Cyber Espi- onage 2.0, Munk School of Global Affairs, University of Toronto, April 6, 2010, https:/citizenlab.ca/wp-content/uploads/2017/05/shadows-in-the-cloud.pdf.
John Markoff and David Barboza, “Researchers Trace Data Theft to Intruders in China,” New York Times, April 5, 2010, https://www.nytimes.com/2010/04/06science/06cyber.html.
Thomas Vinciguerra, “The Revolution Will Be Colorized,” New York Times, March 13, 2005, https://www.nytimes.com/2005/03/13/weekinreview/the-revolution-willbe-colorized.html.
Tim Eaton, “Internet Activism and the Egyptian Uprisings: Transforming Online Dissent into the Offline World,” Westminster Papers in Communication and Culture 9, no. 2 (2013): 3–24, https://doi.org/10.16997/wpcc.163.
Larry Diamond, “Liberation Technology,” Journal of Democracy 21, no. 3 (July 2010):
69–83, https://doi.org/10.1353/jod.0.0190 (archive: perma.cc/BV2M-WNHS).
“Are They Allowed to Do That? A Breakdown of Selected Government Surveillance Programs,” Brennan Center for Justice, July 15, 2013, https://www.brennancenter.org/our-work/research-reports/are-they-allowed-do-breakdown-selectedgovernment-surveillance-programs.
“National Security Letters: FAQ,” Electronic Frontier Foundation, https://www.eff.org/issues/national-security-letters/faq.
T. C. Sottek and Janus Kopfstein, “Everything You Need to Know about PRISM,”erge, July 17, 2013, https://www.theverge.com/2013/7/17/4517480/nsa-spyingprism-surveillance-cheat-sheet (archive: perma.cc/FBB8-J87N).
Steven Loleski, “From Cold to Cyber Warriors: The Origins and Expansion of NSA’s Tailored Access Operations (TAO) to Shadow Brokers,” Intelligence and National Security 34, no. 1 (January 2, 2019): 112–28, https://doi.org/10.108002684527.2018.1532627.
Mark Klein, interview by Frontline, season 25, episode 8, “Spying on the Home- front,” aired May 15, 2007, on PBS, https://www.pbs.org/wgbh/pages/frontline/homefront/interviews/klein.html (archive: perma.cc/R7FF-SACQ).
Glenn Greenwald, Ewen MacAskill, and Laura Poitras, “Edward Snowden: The Whistleblower behind the NSA Surveillance Revelations,” Guardian, June 11, 2013, https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistle blower-surveillance; Barton Gellman, Dark Mirror: Edward Snowden and the Amer- ican Surveillance State (New York: Penguin Books, 2021).
Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel, Sarah McKune, Adam Senft, Diana Tseng, and Greg Wiseman, “Chat Program Censorship and Surveillance in China: Tracking TOM-Skype and Sina UC,” First Monday 18, no. 7 (2013): https://doi.org/10.5210/fm.v18i7.4628 (archive: perma.cc/FJ9C-LLGY); Nart Villeneuve, Breaching Trust: An Analysis of Surveillance and Security Practices on China’s TOM-Skype Platform, Information Warfare Monitor and Citizen Lab, Munk School of Global Affairs, University of Toronto, October 1, 2008, https://www.nartv.org/mirror/breachingtrust.pdf (archive: perma.cc/D9RW-VQQR).
See Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan L. Zittrain, eds., Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA: MIT Press, 2008), https://doi.org/10.7551/mitpress/7617.001.0001.
Jonathon Penney, Sarah McKune, Lex Gill, and Ronald J. Deibert, “Advancing Human-Rights-by-Design in the Dual-Use Technology Industry,” Journal of Inter- national Affairs 71, no. 2 (2018): 103–10; Ronald Deibert, “What to Do about ‘Dual Use’ Digital Technologies?,” Ronald Deibert, November 29, 2016, https://deibert.citizenlab.ca/2016/11/dual-use/; Siena Anstis, Niamh Leonard, and Jonathon W. Penney, “Moving from Secrecy to Transparency in the Offensive Cyber Capabili- ties Sector: The Case of Dual-Use Technologies Exports,” Computer Law & Security Review 48 (April 2023): 105787, https://doi.org/10.1016/j.clsr.2022.105787 (archive: perma.cc/7YMN-R2HZ).
Greg Walton, China’s Golden Shield: Corporations and the Development of Surveillance Technology in the People’s Republic of China, Rights & Democracy, International Centre for Human Rights and Democratic Development, 2001, https://publications.gc.ca/collections/Collection/E84-7-2001E.pdf.
Jim Yardley, “Two Concerns for Olympics: Air and Access,” New York Times, July 9, 2008, https://www.nytimes.com/2008/07/09/sports/olympics/09beijing.html.
Ryan Singel, “Espionage against Pro-Tibet Groups, Others, Spurred Microsoft Patches,” Wired, April 10, 2008, https://www.wired.com/2008/04/espionage-against-pro-tibet-groups-others-spurred-microsoft-patches/ (archive: perma.cc/6RMT-9T9U); Maarten Van Horenbeeck, “Overview of Cyber Attacks against Tibetan Communities,” Internet Storm Center, SANS Technology Institute, March 24, 2008, https://isc.sans.edu/diaryOverview+of+cyber+attacks+against+Tibetan+communities/4177/.
John Markoff, “Tracking Cyberspies through the Web Wilderness,” New York Times, May 11, 2009, https://www.nytimes.com/2009/05/12/science/12cyber.html.
Omar El Akkad, “Meet the Canadians Who Busted GhostNet,” Globe and Mail, March 30, 2009, https://www.theglobeandmail.com/technology/meet-the-canadians-who-busted-ghostnet/article1214210/ (archive: perma.cc/J95N-9QCN).
Information Warfare Monitor and Shadowserver Foundation, Shadows in the Cloud.
Markoff and Barboza, “Researchers Trace Data Theft.”
“A New Approach to China,” Google Official Blog, January 12, 2010, https://googleblog.blogspot.com/2010/01/new-approach-to-china.html (archive: perma.cc/59NX-YQ7V).
Christopher Parsons, “CSE Summaries,” Technology, Thoughts & Trinkets (blog), updated January 17, 2023, https://christopher-parsons.com/resources/the-sigint-sum (archive: perma.cc/48GF-438F) maries/cse-summaries/.
Brigitte Bureau, “Stephen Harper Involved in Company Looking to Arrange Sale of Surveillance Tech to UAE,” CBC News, September 29, 2021, https://www.cbc.canews/politics/harper-united-arab-emirates-surveillance-technology-1.6192281.
TED Blog Video, “Shyam Sankar: Who Hacked the Dalai Lama’s Email? TED BLOG EXCLUSIVE,” September 6, 2012, video, 3:38, https://www.youtube.comwatch?v=zE6xvQeMqqE.
Ronen Bergman, “Weaving a Cyber Web,” Ynetnews, January 11, 2019, https://www.ynetnews.com/articles/0,7340,L-5444998,00.html (archive: perma.cc/3NGP-GDPQ).
Bergman, “Weaving a Cyber Web.”
Hagar Shezaf and Jonathan Jacobson, “Revealed: Israel’s Cyber-Spy Industry Helps World Dictators Hunt Dissidents and Gays,” Haaretz, October 20, 2018, https://www.haaretz.com/israel-news/2018-10-20/ty-article-magazine/.premium/israels-cyber-spy-industry-aids-dictators-hunt-dissidents-and-gays/0000017f-e9a9-dc91-a17f-fdadde240000 (archive: perma.cc/6X4X-7U4C).
Shezaf and Jacobson, “Revealed: Israel’s Cyber-Spy Industry.”