Installing Fear: a Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Installing Fear: A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications By Cynthia Khoo, Kate Robertson, Ronald Deibert JUNE 2019 RESEARCH REPORT #120 INSTALLING FEAR A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications By Cynthia Khoo, Kate Robertson, and Ronald Deibert Research report #120 June 2019 This page is deliberately left blank Copyright © 2019 Citizen Lab, “Installing Fear: A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications,” by Cynthia Khoo, Kate Robertson, and Ronald Deibert. Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike Licence) Electronic version first published by Citizen Lab in 2019. This work can be accessed through https://citizenlab.ca. Citizen Lab engages in research that investigates the intersection of digital technologies, law, and human rights. Document Version: 1.0 The Creative Commons Attribution-ShareAlike 4.0 license under which this report is licensed lets you freely copy, distribute, remix, transform, and build on it, as long as you: · give appropriate credit; · indicate whether you made changes; and · use and link to the same CC BY-SA 4.0 licence. However, any rights in excerpts reproduced in this report remain with their respective authors; and any rights in brand and product names and associated logos remain with their respective owners. Uses of these that are protected by copyright or trademark rights require the rightsholder’s prior written agreement. iii Do you need help? If you are in immediate danger, call 9-1-1 or your local emergency police department. A Canada-wide directory of victim services, shelters, and other local organizations is available at the following web address: http://www.justice.gc.ca/eng/cj-jp/victims-victimes/vsd-rsv/sch-rch.aspx The Government of Canada maintains a list of information related to family violence, including a list of the specific resources available in provinces or territories, here: http://www.justice.gc.ca/eng/cj-jp/fv-vf/help-aide.html If you are concerned about your digital security or believe your device has been or is likely to become compromised, see the list of digital security guides and resources provided at the end of this report, in Appendix A. This report does not provide legal advice. The intended audience of this report includes legal professionals, educators, technologists, social workers, journalists, and advocates in Canada. It is provided for general information purposes only, and it is not legal advice or a substitute for legal advice. Information contained in this report is accurate and current to the best of our knowledge on the date that it was published, but readers should be aware that the laws, their application, and court processes can change frequently and sometimes without notice. Anyone dealing with the legal issues discussed in this report is strongly encouraged to meet with a lawyer to review their rights, options, and legal obligations. Any use made of the information contained in this report is not the responsibility of the authors and does not create a client relationship with either the authors or the Citizen Lab. iv About the Citizen Lab, Munk School of Global Affairs & Public Policy, University of Toronto The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs and Public Policy, University of Toronto, focusing on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security. We use a “mixed methods” approach to research that combines methods from political science, law, computer science, and area studies. Our research includes investigating digital espionage against civil society, documenting Internet filtering and other technologies and practices that impact freedom of expression online, analyzing privacy, security, and information controls of popular applications, and examining transparency and accountability mechanisms relevant to the relationship between corporations and state agencies regarding personal data and other surveillance activities. About the Authors Cynthia Khoo is a Research Fellow and former Google Policy Fellow at the Citizen Lab, in the Munk School of Global Affairs & Public Policy with the University of Toronto. She is a lawyer called to the Bar of Ontario, specializing in the intersection of technology and human rights. She is also completing an LL.M. (Concentration in Law and Technology) at the University of Ottawa, where she interned at the Canadian Internet Policy and Public Interest Clinic, and holds a J.D. from the University of Victoria Faculty of Law. Kate Roberson is is a Citizen Lab Research Fellow, and a criminal defence lawyer at Markson Law in Toronto. Her practice includes both trial and appellate work, focusing on a range of criminal law cases, including white collar crime, sexual offences, and computer-based investigations and crime. She previously acted as a provincial Crown prosecutor in Ontario, and as a Law Clerk at the Supreme Court of Canada. She holds a J.D from the University of Toronto’s Faculty of Law. Ronald Deibert is a Professor of Political Science, and Director of the Citizen Lab, in the Munk School of Global Affairs & Public Policy with the University of Toronto. He received his Master's from Queen’s University and his Ph.D from the University of British Columbia. In 2013 he was appointed to the Order of Ontario. v Acknowledgements The authors would like to extend their thanks and gratitude to a number of people who have provided support, feedback, and insights over the course of researching and writing this report. In particular, we are grateful to Christopher Parsons, Siena Anstis, Suzie Dunn, Maya Ganesh, Pam Hrick, Tamir Israel, Miles Kenyon, Jeffrey Knockel, Etienne Maynier, Adam Molnar, and Rhiannon Wong, for their invaluable insights as reviewers of this report. Our wholehearted thanks to Lex Gill for spearheading this project in its initial stages. We also extend our appreciation to Chelsey Legge, who supported this research in its initial stages as a clinical student through the International Human Rights Program at the University of Toronto. Thank you to Mari Zhou, who designed this document. We are indebted to our colleagues Jakub Dalek, Bennett Haselton, Miles Kenyon, Jeffrey Knockel, Adam Molnar, and Christopher Parsons for their findings detailed in an accompanying report published by the Citizen Lab, “The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry.” We are further grateful to the individuals and organizations which gave us the opportunity to share early versions of this work and provided input, including participants in the “Evaluating Stalkerware” workshop at the 2018 Citizen Lab Summer Institute. Finally, the authors would like to offer our sincere thanks to Open Society Foundations, John D. and Catherine T. MacArthur Foundation, Ford Foundation, the Sigrid Rausing Trust, and the Oak Foundation, as well as the Office of the Privacy Commissioner of Canada’s Contributions Program, whose generous funding made this report possible. vi Corrections And Questions Please send all questions and corrections to the authors directly at: [email protected] [email protected] Suggested Citation Cynthia Khoo, Kate Robertson, and Ronald Deibert. “Installing Fear: A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications,” Citizen Lab Research Report No. 120, University of Toronto, June 2019. vii Contents Information Boxes x Table of Acronyms xi Executive Summary 1 Introduction 4 A. Structure of this Report 9 B. What Is Stalkerware? 10 C. How Is Stalkerware Deployed? 13 D. Methodology 14 E. Stalkerware and Technology-Facilitated Gender-Based Abuse: Background and Literature Review 17 Part 1: Legal Analysis of Stalkerware Use 22 A. Use of Stalkerware Technology and the Criminal Law 22 i. Invasions of Privacy 24 ii. Fear-Based Offences 32 iii. Intimate Images: Invasions of Sexual Dignity and “Sexual Privacy” 36 B. Preventative Orders and Additional Remedies under Criminal and Family Law 40 i. Preventative Orders: Peace Bonds and Restraining Orders 40 ii. Admissibility of Illegally Obtained Evidence in Family Law Proceedings 41 C. Civil Law Claims 41 i. Invasion of Privacy 42 ii. Public Disclosure of Private Facts 44 iii. Breach of Confidence 45 iv. Intentional Infliction of Mental Suffering (IIMS) 45 v. Non-Intentional Torts, the Tort of Harassment, and Developing Adequate Legal Responses to Stalkerware Technology in the Civil Justice System 46 Part 2: Legal Analysis of Creating and Developing Stalkerware 51 A. Human Rights Obligations Apply to Spyware Companies 53 i. Canada’s Obligations Regarding Business and Human Rights 59 B. Professional Ethics and Industry Initiatives 60 C. Regulating Harmful Innovation 65 i. Criminal Law and Product Liability 65 ii. Intellectual Property Law 66 Part 3: Legal Analysis of Selling Stalkerware 70 A. Criminal Liability of Vendors under the Criminal Code 70 i. Sale of Intercept Devices 70 ii. Illegal Commercial Activity in Relation to Computer Programs Designed to Commit Offences of Mischief in Relation to Computer Data or Unauthorized Use of a Computer System 72 iii. Risk-Based Offences: Criminal Negligence, Common Nuisance, and Dangerous
Recommended publications
  • Submission of the Citizen Lab (Munk School of Global Affairs and Public Policy, University of Toronto) to the United Nations

    Submission of the Citizen Lab (Munk School of Global Affairs and Public Policy, University of Toronto) to the United Nations

    Submission of the Citizen Lab (Munk School of Global Affairs and Public Policy, University of Toronto) to the United Nations Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression on the surveillance industry and human rights February 15, 2019 For all inquiries related to this ​submission​, please contact: Dr. Ronald J. Deibert Director, the Citizen Lab, Munk School of Global Affairs and Public Policy Professor of Political Science, University of Toronto [email protected] Contributors to this report: Siena Anstis, Senior Legal Advisor, Citizen Lab Dr. Ronald J. Deibert, Professor of Political Science; Director, Citizen Lab Jon Penney, Research Fellow, Citizen Lab; Associate Professor and Director, Law & Technology Institute, Schulich School of Law Acknowledgments: We would also like to thank Miles Kenyon (Communications Specialist, Citizen Lab) and Adam Senft (Operations Manager, Citizen Lab) for their support in reviewing this submission. 1 Table of Contents Executive Summary 3 About the Citizen Lab 5 Citizen Lab Research on the Use of Private Surveillance Technology Against Human Rights Actors 6 1. NSO Group’s Pegasus 6 The case of Ahmed Mansoor in the United Arab Emirates 7 Targeting civil society, journalists, politicians, and others in Mexico 7 Mapping Pegasus infections and the case of Omar Abdulaziz in Canada 8 Additional cases of targeting 8 2. Cyberbit’s PC Surveillance System 9 3. FinFisher and FinSpy 9 4. Hacking Team’s Remote Control System 10 Common Trends among Private Companies in the Surveillance Industry 11 ​ 1. Sales to states with poor human rights records 11 ​ 2.
  • Cyber Violence Against Women and Girls

    Cyber Violence Against Women and Girls

    CYBER VIOLENCE AGAINST WOMEN AND GIRLS A WORLD-WIDE WAKE-UP CALL 2015 Photo credits:Shutterstock A REPORT BY THE UN BROADBAND COMMISSION FOR DIGITAL DEVELOPMENT WORKING GROUP ON BROADBAND AND GENDER CYBER VIOLENCE AGAINST WOMEN AND GIRLS: A WORLD-WIDE WAKE-UP CALL Acknowledgements This Report has been written collaboratively, drawing on insights and rich contributions from a range of Commissioners and Expert Members of the Working Group on Broadband and Gender. It has been researched and compiled by lead author Nidhi Tandon, assisted by Shannon Pritchard, with editorial inputs by teams from UN Women, UNDP and ITU. Design concepts were developed by Céline Desthomas of ITU. We wish to thank the following people for their contributions and kind review and comments (listed in alphabetical order of institution, followed by alphabetical order of surname): Dafne Sabanes Plou, Jac sm Kee and Chat Garcia Ramilo (APC); Dr Nancy Hafkin; Minerva Novero- Belec (UNDP); Corat Suniye Gulser (UNESCO); Jennifer Breslin and team (UN Women); Samia Melhem and team (World Bank). About the Commission The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to meet the Millennium Development Goals. Established in May 2010, the Commission unites top industry executives with government leaders, thought leaders and policy pioneers and international agencies and organizations concerned with development. The Broadband Commission embraces a range of different perspectives in a multi-stakeholder approach to promoting the roll-out of broadband, as well as providing a fresh approach to UN and business engagement.
  • Personal Data Protection

    Personal Data Protection

    Factsheet – Personal data protection May 2021 This factsheet does not bind the Court and is not exhaustive Personal data protection “The mere storing of data relating to the private life of an individual amounts to an interference within the meaning of Article 8 [of the European Convention on Human Rights, which guarantees the right to respect for private and family life, home and correspondence1] ... The subsequent use of the stored information has no bearing on that finding ... However, in determining whether the personal information retained by the authorities involves any ... private-life [aspect] ..., the Court will have due regard to the specific context in which the information at issue has been recorded and retained, the nature of the records, the way in which these records are used and processed and the results that may be obtained ...” (S. and Marper v. the United Kingdom, judgment (Grand Chamber) of 4 December 2008, § 67) Collection of personal data DNA information and fingerprints See below, under “Storage and use of personal data”, “In the context of police and criminal justice”. GPS data Uzun v. Germany 2 September 2010 The applicant, suspected of involvement in bomb attacks by a left-wing extremist movement, complained in particular that his surveillance via GPS and the use of the data obtained thereby in the criminal proceedings against him had violated his right to respect for private life. The Court held that there had been no violation of Article 8 of the Convention. The GPS surveillance and the processing and use of the data thereby obtained had admittedly interfered with the applicant’s right to respect for his private life.
  • Annotated Bibliography Digital Transnational Repression

    Annotated Bibliography Digital Transnational Repression

    Annotated Bibliography Digital Transnational Repression By Noura Al-Jizawi, Siena Anstis, Sophie Barnett, Sharly Chan, Adam Sen, and Ronald J. Deibert Last Updated: May 2021 Copyright Copyright © 2021 Citizen Lab, “Digital transnational Repression,” by Noura Al-Jizawi, Siena Anstis, Sharly Chan, Adam Sen, and Ronald J. Deibert. Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike Licence) Electronic version first published in 2020 by the Citizen Lab. Citizen Lab engages in research that investigates the intersection of digital technologies, law, and human rights. Document Version: 2.0 New changes in this annual update include: ● Change of terminology from “transnational digital repression” to “digital transnational repression” to align with the discourse ● New summaries collected between October 2020 - May 2021 and added to the document The Creative Commons Attribution-ShareAlike 4.0 license under which this report is licensed lets you freely copy, distribute, remix, transform, and build on it, as long as you: ● give appropriate credit; ● indicate whether you made changes; and ● use and link to the same CC BY-SA 4.0 licence. However, any rights in excerpts reproduced in this report remain with their respective authors; and any rights in brand and product names and associated logos remain with their respective owners. Uses of these that are protected by copyright or trademark rights require the rightsholder’s prior written agreement. 2 Acknowledgements The design of this document is by Mari Zhou. About the Citizen Lab, Munk School of Global Aairs & Public Policy, University of Toronto The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs & Public Policy, University of Toronto, focusing on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security.
  • Security Analytics for Enterprise Threat Detection

    Security Analytics for Enterprise Threat Detection

    MADE: Security Analytics for Enterprise Threat Detection Alina Oprea Zhou Li Northeastern University University of California, Irvine [email protected] [email protected] Robin Norris Kevin Bowers EMC/Dell CIRC RSA [email protected] [email protected] ABSTRACT These concerns affect not only individuals, but enterprises as well. Enterprises are targeted by various malware activities at a staggering The enterprise perimeter is only as strong as its weakest link and rate. To counteract the increased sophistication of cyber attacks, that boundary is becoming increasingly fuzzy with the prevalence most enterprises deploy within their perimeter a number of secu- of remote workers using company-issued computers on networks rity technologies, including firewalls, anti-virus software, and web outside of the enterprise control. Enterprises attempt to combat cyber proxies, as well as specialized teams of security analysts forming attacks by deploying firewalls, anti-virus agents, web proxies and Security Operations Centers (SOCs). other security technologies, but these solutions cannot detect or In this paper we address the problem of detecting malicious ac- respond to all malware. Large organizations employ “hunters” or tivity in enterprise networks and prioritizing the detected activities tier 3 analysts (part of the enterprise Security Operations Center – according to their risk. We design a system called MADE using ma- SOC) [44] to search for malicious behavior that has evaded their chine learning applied to data extracted from security logs. MADE automated tools. Unfortunately, this solution is not scalable, both due leverages an extensive set of features for enterprise malicious com- to the lack of qualified people and the rate at which such malware is munication and uses supervised learning in a novel way for prior- invading the enterprise.
  • Operation Black Atlas

    Operation Black Atlas

    A TrendLabs Report Operation Black Atlas How Modular Botnets are Used in PoS Attacks TrendLabs Security Intelligence Blog Jay Yaneza and Erika Mendoza Trend Micro Cyber Safety Solutions Team December 2015 Trend Micro | Operation Black Atlas: How Modular Botnets are Used in Attacks Contents Introduction ............................................................................................................ 3 Technical Details ................................................................................................... 3 Probing and Penetrating the Environment ......................................................... 3 Point-of-Sale Threats ......................................................................................... 5 New Items in NewPosThings ............................................................................. 7 Use of Known PoS Malware Threats ............................................................... 10 Gorynych or Diamond Fox ............................................................................... 13 Spy Net RAT .................................................................................................... 20 Victimology .......................................................................................................... 21 Attribution ............................................................................................................ 23 Conclusion ........................................................................................................... 25 TREND MICRO LEGAL
  • Everyone's Guide to Bypassing Internet Censorship

    Everyone's Guide to Bypassing Internet Censorship

    EVERYONE’S GUIDE TO BY-PASSING INTERNET CENSORSHIP FOR CITIZENS WORLDWIDE A CIVISEC PROJECT The Citizen Lab The University of Toronto September, 2007 cover illustration by Jane Gowan Glossary page 4 Introduction page 5 Choosing Circumvention page 8 User self-assessment Provider self-assessment Technology page 17 Web-based Circumvention Systems Tunneling Software Anonymous Communications Systems Tricks of the trade page 28 Things to remember page 29 Further reading page 29 Circumvention Technologies Circumvention technologies are any tools, software, or methods used to bypass Inter- net filtering. These can range from complex computer programs to relatively simple manual steps, such as accessing a banned website stored on a search engine’s cache, instead of trying to access it directly. Circumvention Providers Circumvention providers install software on a computer in a non-filtered location and make connections to this computer available to those who access the Internet from a censored location. Circumvention providers can range from large commercial organi- zations offering circumvention services for a fee to individuals providing circumven- tion services for free. Circumvention Users Circumvention users are individuals who use circumvention technologies to bypass Internet content filtering. 4 Internet censorship, or content filtering, has become a major global problem. Whereas once it was assumed that states could not control Internet communications, according to research by the OpenNet Initiative (http://opennet.net) more than 25 countries now engage in Internet censorship practices. Those with the most pervasive filtering policies have been found to routinely block access to human rights organi- zations, news, blogs, and web services that challenge the status quo or are deemed threatening or undesirable.
  • Risks and Rewards of the Anytime-Anywhere Internet Risks and Rewards of the Anytime-Anywhere Internet

    Risks and Rewards of the Anytime-Anywhere Internet Risks and Rewards of the Anytime-Anywhere Internet

    Research Collection Monograph ON/OFF: Risks and Rewards of the Anytime-Anywhere Internet Risks and Rewards of the Anytime-Anywhere Internet Author(s): Genner, Sarah Publication Date: 2017 Permanent Link: https://doi.org/10.3929/ethz-a-010805600 Originally published in: http://doi.org/10.3218/3800-2 Rights / License: Creative Commons Attribution-NonCommercial 3.0 Unported This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library ON | OFF Risks and Rewards of the Anytime-Anywhere Internet Sarah Genner This work was accepted as a PhD thesis by the Faculty of Arts and Social Sciences, University of Zurich in the spring semester 2016 on the recommendation of the Doctoral Committee: Prof. Dr. Daniel Sü ss (main supervisor, University of Zurich, Switzerland) and Prof. Dr. Urs Gasser (Harvard University, USA). Published with the support of the Swiss National Science Foundation. Bibliographic Information published by Die Deutsche Nationalbibliothek Die Deutsche Nationalbibliothek lists this publication in the Internet at http://dnb.d-nb.de. This work is licensed under Creative Commons license CC BY-NC-SA 3.0. Cover photo: fl ickr.com/photos/zuerichs-strassen © 2017, vdf Hochschulverlag AG an der ETH Zürich ISBN 978-3-7281-3799-9 (Print) ISBN 978-3-7281-3800-2 (Open Access) DOI 10.3218/3800-2 www.vdf.ethz.ch [email protected] Table of Contents Preface ...................................................................................................................................
  • Stalkerware-Holistic

    Stalkerware-Holistic

    The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry By Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ronald Deibert JUNE 2017 RESEARCH REPORT #119 A PREDATOR IN YOUR POCKET A Multidisciplinary Assessment of the Stalkerware Application Industry By Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, and Ronald Deibert Research report #119 June 2019 This page is deliberately left blank Copyright © 2019 Citizen Lab, “The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry,” by Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, and Ronald Deibert. Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike Licence) Electronic version first published by the Citizen Lab in 2019. This work can be accessed through https://citizenlab.ca. Citizen Lab engages in research that investigates the intersection of digital technologies, law, and human rights. Document Version: 1.0 The Creative Commons Attribution-ShareAlike 4.0 license under which this report is licensed lets you freely copy, distribute, remix, transform, and build on it, as long as you: • give appropriate credit; • indicate whether you made changes; and • use and link to the same CC BY-SA 4.0 licence. However, any rights in excerpts reproduced in this report remain with their respective authors; and any rights in brand and product names and associated logos remain with their respective owners. Uses of these that are protected by copyright or trademark rights require the rightsholder’s prior written agreement.
  • Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data

    Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data

    Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data Alina Oprea, Zhou Li Ting-Fang Yen Sang Chin Sumayah Alrwais RSA Laboratories E8 Security Draper Laboratory Indiana University Cambridge, MA, USA Palo Alto, CA, USA Cambridge, MA, USA Bloomington, IN, USA Recent years have seen the rise of sophisticated attacks sharing locality in either IP address space, time of access including advanced persistent threats which pose severe risks or set of hosts contacting them. These patterns of infections to organizations and governments. Additionally, new malware have been observed in targeted attacks (e.g., APT1 group [26], strains appear at a higher rate than ever before. Since many Shady RAT [20], Mirage [11]), as well as botnet infections of these malware evade existing security products, traditional (e.g., Zeus, Citadel [12] and ZeroAccess [23]). defenses deployed by enterprises today often fail at detecting infections at an early stage. In this work, we leverage these observations to detect early- stage malware infections in enterprise networks, in particular We address the problem of detecting early-stage enterprise suspicious communications to external destinations initiated infection by proposing a new framework based on belief by internal hosts. We propose a graph-theoretic framework propagation inspired from graph theory. We demonstrate that based on belief propagation [31] to identify small communities our techniques perform well on two large datasets. We achieve of related domains that are indicative of early-stage malware high accuracy on two months of DNS logs released by Los infections. We first restrict our attention to traffic destined Alamos National Lab (LANL), which include APT infection to rare destinations.
  • Understanding and Mitigating Attacks Targeting Web Browsers

    Understanding and Mitigating Attacks Targeting Web Browsers

    Understanding and Mitigating Attacks Targeting Web Browsers A Dissertation presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the field of Information Assurance by Ahmet Salih Buyukkayhan Northeastern University Khoury College of Computer Sciences Boston, Massachusetts April 2019 To my family, teachers and mentors. i Contents List of Figures v List of Tables vii Acknowledgments viii Abstract of the Dissertation ix 1 Introduction 1 1.1 Structure of the Thesis . .2 2 Background 4 2.1 Browser Extensions . .4 2.1.1 Firefox Extensions . .5 2.1.2 Extension Security . .7 2.2 Vulnerabilities in Web Applications . .9 2.2.1 Vulnerability Reward Programs and Platforms . .9 2.2.2 XSS Vulnerabilities . 10 2.2.3 XSS Defenses . 12 3 CrossFire: Firefox Extension-Reuse Vulnerabilities 14 3.1 Overview . 14 3.2 Threat Model . 15 3.3 Design . 16 3.3.1 Vulnerability Analysis . 17 3.3.2 Exploit Generation . 19 3.3.3 Example Vulnerabilities . 20 3.4 Implementation . 23 3.5 Evaluation . 23 3.5.1 Vulnerabilities in Top Extensions . 23 3.5.2 Random Sample Study of Extensions . 25 3.5.3 Performance & Manual Effort . 27 ii 3.5.4 Case Study: Submitting an Extension to Mozilla Add-ons Repository . 28 3.5.5 Jetpack Extensions. 30 3.5.6 Implications on Extension Vetting Procedures . 31 3.6 Summary . 31 4 SENTINEL: Securing Legacy Firefox Extensions 33 4.1 Overview . 33 4.2 Threat Model . 34 4.3 Design . 35 4.3.1 Intercepting XPCOM Operations . 36 4.3.2 Intercepting XUL Document Manipulations .
  • Annotated Bibliography Transnational Digital Repression

    Annotated Bibliography Transnational Digital Repression

    Annotated Bibliography Transnational Digital Repression By Noura Al-Jizawi, Siena Anstis, Sharly Chan, Adam Senft, and Ronald J. Deibert Last Updated: October 2020 Copyright Copyright © 2020 Citizen Lab, “Transnational Digital Repression,” by Noura Al-Jizawi, Siena Anstis, Sharly Chan, Adam Senft, and Ronald J. Deibert. Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike Licence) Electronic version first published in 2020 by the Citizen Lab. Citizen Lab engages in research that investigates the intersection of digital technologies, law, and human rights. Document Version: 1.0 The Creative Commons Attribution-ShareAlike 4.0 license under which this report is licensed lets you freely copy, distribute, remix, transform, and build on it, as long as you: ● give appropriate credit; ● indicate whether you made changes; and ● use and link to the same CC BY-SA 4.0 licence. However, any rights in excerpts reproduced in this report remain with their respective authors; and any rights in brand and product names and associated logos remain with their respective owners. Uses of these that are protected by copyright or trademark rights require the rightsholder’s prior written agreement. 2 Acknowledgements The design of this document is by Mari Zhou. About the Citizen Lab, Munk School of Global Affairs & Public Policy, University of Toronto The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs & Public Policy, University of Toronto, focusing on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security. We use a “mixed methods” approach to research that combines methods from political science, law, computer science, and area studies.