Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jakub Dalek is active.

Publication


Featured researches published by Jakub Dalek.


ACM Transactions on The Web | 2015

Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data

Phillipa Gill; Masashi Crete-Nishihata; Jakub Dalek; Sharon Goldberg; Adam Senft; Greg Wiseman

In this study, we take another look at 5 years of web censorship data gathered by the OpenNet Initiative in 77 countries using user-based testing with locally relevant content. Prior to our work, this data had been analyzed with little automation, focusing on what content had been blocked, rather than how blocking was carried out. In this study, we use more rigorous automation to obtain a longitudinal, global view of the technical means used for web censorship. We also identify blocking that had been missed in prior analyses. Our results point to considerable variability in the technologies used for web censorship, across countries, time, and types of content, and even across ISPs in the same country. In addition to characterizing web censorship in countries that, thus far, have eluded technical analysis, we also discuss the implications of our observations on the design of future network measurement platforms and circumvention technologies.


internet measurement conference | 2013

A method for identifying and confirming the use of URL filtering products for censorship

Jakub Dalek; Bennett Haselton; Helmi Noman; Adam Senft; Masashi Crete-Nishihata; Phillipa Gill; Ronald J. Deibert

Products used for managing network traffic and restricting access to Web content represent a dual-use technology. While they were designed to improve performance and protect users from inappropriate content, these products are also used to censor the Web by authoritarian regimes around the globe. This dual use has not gone unnoticed, with Western governments placing restrictions on their export. Our contribution is to present methods for identifying installations of URL filtering products and confirming their use for censorship. We first present a methodology for identifying externally visible installations of URL filtering products in ISPs around the globe. Further, we leverage the fact that many of these products accept user-submitted sites for blocking to confirm that a specific URL filtering product is being used for censorship. Using this method, we are able to confirm the use of McAfee SmartFilter in Saudi Arabia and the United Arab Emirates (UAE) and Netsweeper in Qatar, the UAE, and Yemen. Our results show that these products are being used to block a range of content, including oppositional political speech, religious discussion and gay and lesbian material, speech generally protected by international human rights norms.


5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15) | 2015

An Analysis of China's "Great Cannon"

Bill Marczak; Nicholas Weaver; Jakub Dalek; Roya Ensafi; David Fifield; Sarah McKune; Arn Rey; John Scott-Railton; Ronald J. Deibert; Vern Paxson


Archive | 2013

Planet Blue Coat: Mapping Global Censorship and Surveillance Tools

Morgan Marquis-Boire; Jakub Dalek; Sarah McKune; Matthew Carrieri; Masashi Crete-Nishihata; Ronald J. Deibert; Saad Omar Khan; John Scott-Railton; Greg Wiseman


Archive | 2012

Routing Gone Wild: Documenting Upstream Filtering in Oman via India

Jakub Dalek; Ronald J. Deibert; Masashi Crete-Nishihata; Adam Senft; Helmi Noman; Greg Wiseman


Archive | 2013

Permission to Spy: An Analysis of Android Malware Targeting Tibetans

Seth Hardy; Byron Sonne; Masashi Crete-Nishihata; Jakub Dalek; Ronald J. Deibert; Adam Senft


Archive | 2012

Recent Observations in Tibet-Related Information Operations: Advanced Social Engineering for the Distribution of LURK Malware

Seth Hardy; Greg Wiseman; Masashi Crete-Nishihata; Jakub Dalek; Adam Senft


Archive | 2012

Information Operations and Tibetan Rights in the Wake of Self-Immolations

Masashi Crete-Nishihata; Seth Hardy; Jakub Dalek; Sarah McKune; Adam Senft; Ronald J. Deibert; Greg Wiseman


Archive | 2012

Spoofing the European Parliament: Analysis of the Repurposing of Legitimate Content in Targeted Malware Attacks

Seth Hardy; Sarah McKune; Masashi Crete-Nishihata; Ronald J. Deibert; Jakub Dalek; Adam Senft; Greg Wiseman


Archive | 2011

Behind Blue Coat: Commercial Filtering in Syria and Burma

Jakub Dalek; Adam Senft

Collaboration


Dive into the Jakub Dalek's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Arn Rey

University of Toronto

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge