Inspired by the USA Disappeared Tracker account on Bluesky, this dashboard visualizes people taken into ICE custody when the Trump regime demonstrated the undeniable political motive and animus to deny due process, even if charges (if they're ever filed) are eventually substantiated in a court of law.
This is a tracker of people that the US government has disappeared. Search by names, dates, states of residence, names of facilities, and transit lines.
The GISAID Data Science Initiative promotes the rapid sharing of data from priority pathogens including influenza, hCoV-19, respiratory syncytial virus (RSV), hMpxV as well as arboviruses including chikungunya, dengue and zika. This includes genetic sequence and related clinical and epidemiological data associated with human viruses, and geographical as well as species-specific data associated with avian and other animal viruses, to help researchers understand how viruses evolve and spread during epidemics and pandemics.
GISAID does so by overcoming disincentive hurdles and restrictions, which discourage or prevented sharing of virological data prior to formal publication.
The Initiative ensures that open access to data in GISAID is provided free-of-charge to all individuals that agreed to identify themselves and agreed to uphold the GISAID sharing mechanism governed through its Database Access Agreement.
All bonafide users with GISAID access credentials agreed to the basic premise of upholding a scientific etiquette, by acknowledging the Originating laboratories providing the specimens, and the Submitting laboratories generating sequence and other metadata, ensuring fair exploitation of results derived from the data, and that all users agree that no restrictions shall be attached to data submitted to GISAID, to promote collaboration among researchers on the basis of open sharing of data and respect for all rights and interests.
This tool is a replica of the National Risk Index (NRI) Future Risk tool, which was removed from the public by the US Government in February, 2025 because it analyzes regional risks due to anthrpogenic climate change. It references the following datasets which were downloaded before the tool was taken down:
(The datasets are the .xlsx spreadsheets in public/.)
SciOp is part of Safeguarding Research & Culture (SRC).
Using RSS feeds full of vetted torrents, we can ensure that our cultural, intellectual and scientific heritage exists in multiple copies, in multiple places, and that no single entity or group of entities can make it all disappear.
Has a page of datasets it's protecting and a large number of RSS feeds tracking the health of other data sets (i.e., have they disappeared or not).
Public data dumps from US National Archives and US Government Publishing Office (https://www.archives.gov/). Metadata is stored in each data.json file.
The datasets themselves are stored with git-lfs so be sure you have that installed before you clone that repo.
Every day, observations and orbit solutions for Near-Earth Asteroids (NEAs) are received from the Minor Planet Center (MPC) in Cambridge, Massachusetts. Once classified as an NEA, the asteroid is thereafter given automatic orbit updates within our Sentry system. A new orbit solution for an NEA is computed whenever new optical or radar observations for that object become available. Some high-priority objects are observed daily, while other objects go unobserved for days or weeks, even though they may still be bright enough to be seen. Optical observations cease when an object recedes from the Earth (becoming too faint to be seen even with moderate-size telescopes), or when the object moves into the daytime sky. Similarly, radar observations are possible only when the object is near enough to the Earth for the echo of a radar bounce to be detected. Once all the observations for an object have been collected, an orbit determination process is used to find the orbit that best fits all the observations.
It is important to understand that an object’s orbit is never known perfectly. Although the nominal orbit solution fits the observations best, slightly different orbits may still fit the observations to within their expected accuracies. There is in fact a whole set of orbits around the nominal that will fit the observations acceptably well: these all lie within what we call the uncertainty region about the nominal orbit. The ‘true’ orbit is expected to lie somewhere within this region. As new observations of the object are made, the uncertainty region becomes more tightly constrained and the range of possible values for the orbital elements narrows. As a result, objects that have been observed for decades will have highly constrained, well-known orbits, while newly discovered objects tracked for only a few days or weeks, will have relatively poorly constrained, uncertain orbits.
Once the nominal orbit and its associated uncertainty region have been determined, the object’s motion is numerically propagated forward in time for at least 100 years in order to determine its close approaches to the Earth. These nominal orbit close approach predictions are tabulated in our Earth Close Approach Tables along with other uncertainty-related information such as the minimum possible close approach distance, and the impact probability. The uncertainty-related parameters in the close approach tables are computed by propagating the uncertainty region from the epoch to the respective close approach times via so-called linearized techniques. Since these techniques lose accuracy when the uncertainties become large, we include only reasonably certain predictions in our Close Approach Tables. As a result, close approaches may be tabulated decades into the future for objects with well-known orbits, but only a few months or years into the future for objects with poorly known orbits. On the other hand, Sentry assesses the long-term possibilities of an Earth impact for all objects whose orbits can bring them close to the Earth, even those with poorly known orbits. To perform this risk analysis Sentry uses more sophisticated nonlinear methods.
I don't know if there's an API or feeds or what, I haven't looked that closely into it yet.
Never trust a computer that you do not own. The "cloud" is a network of computers you don't own:
So download everything. Buy hard drives and hoard as you go. Mirror that data once or twice. Store a copy powered off and unplugged. Burn the super important stuff to archival grade M-DISCs. Run AirSonic or something open source to permit remote access of your media. And if you have some terabytes to spare, download and seed some torrents of public government information that has since been scrubbed from official websites.
DataHoarding.org is an index of resources and archives related to data hoarding, web archival and self hosting. It was inspired by the recent purge of online information by govenment agencies, corporations and others, and aims to provide easier access to tools and information. The goal is not only to hoard data, but parse and index it as well.
Among the mirrors they have:
IPUMS provides census and survey data from around the world integrated across time and space. IPUMS integration and documentation makes it easy to study change, conduct comparative research, merge information across data types, and analyze individuals within family and community context. Data and services available free of charge.
This chart shows national and regional trends of wastewater viral activity levels of SARS-COV-2.
Datasets can be downloaded as CSV files.
The nationwide RadNet system monitors the nation's air to track radiation in the environment. Over time, RadNet sample testing and monitoring results show the fluctuations in normal background levels of environmental radiation. The RadNet system will also detect higher than normal radiation levels during a radiological incident.
I don't know if they have an API but there is a way to download parts of their data as CSV files.
Interactive query builder: https://radnet.epa.gov/radnet-public/query.do
Wastewater surveillance may complement other existing human surveillance systems to monitor influenza. Wastewater data cannot determine the source of influenza A viruses. Detections could come from a human or from an animal (like a bird) or an animal product (like milk from an infected cow).
No API but the data can be downloaded as a CSV file: https://www.cdc.gov/e0e53cec-a7e1-4357-a582-dd64f0cc3b1f
There is some data here that can be analyzed: https://www.cdc.gov/wcms/vizdata/NCEZID_DIDRI/FluA/H5N1Map.json
This has a tl;dr: https://www.cdc.gov/wcms/vizdata/NCEZID_DIDRI/FluA/H5N1Databites.json
An ethically sourced, opt-in only data collection project. Published information is obfuscated to protect transmitters and contributors. Updating existing data requires information only available in physical range of a beacon. Multiple mobile apps for feeding the system can be found on the F-Droid repository.
Git repo: https://codeberg.org/beacondb/beacondb
A dashboard tracking SARS-CoV-2 in California, based upon continual waste water analysis and monitoring. Other infectious viruses can be tracked from here as well, but it defaults to COVID.
This dashboard can probably be reverse engineered to extract the data for other purposes.
The cryptocurrency industry has been throwing money into politics unlike ever before, and that’s even after political donations from the industry skyrocketed in the 2022 election cycle. Despite the relatively small size of the industry, it has become one of the biggest spenders in the upcoming elections in the United States.
Cryptocurrency companies have raised hundreds of millions of dollars to put towards buying crypto-friendly politicians and ousting those who have spoken up for stricter regulations to protect consumers in an industry that is fraught with hacks, scams, and fraud. Although parts of the industry have tried to portray this as a grassroots effort, the reality is that a very small number of crypto companies, and the billionaire executives and venture capitalists behind them, are spending millions with a singular goal: to obtain favorable crypto policy, no matter the cost.
The AirNow Fire and Smoke Map provides information that you can use to help protect your health from wildfire smoke. Use this map to see:
The Map is a collaborative effort between the U.S. Forest Service (USFS)-led Interagency Wildland Fire Air Quality Response Program and the U.S. Environmental Protection Agency (EPA).
Doesn't seem to have an API but it can probably be reverse engineered to get at the data.
Natural Earth is a public domain map dataset available at 1:10m, 1:50m, and 1:110 million scales. Featuring tightly integrated vector and raster data, with Natural Earth you can make a variety of visually pleasing, well-crafted maps with cartography or GIS software.
Natural Earth was built through a collaboration of many volunteers and is supported by NACIS (North American Cartographic Information Society), and is free for use in any type of project (see our Terms of Use page for more information).
This repository is used for the development of the CVE JSON record format. Releases of the CVE JSON record format will also be published here. This repository is managed by the CVE Quality Working Group.
cve-schema specifies the CVE record format. This is the blueprint for a rich set of JSON data that can be submitted by CVE Numbering Authorities (CNAs) and Authorized Data Publishers (ADPs) to describe a CVE record. Some examples of CVE record data include CVE ID number, affected product(s), affected version(s), and public references. While those specific items are required when assigning a CVE, there are many other optional data in the schema that can be used to enrich CVE records for community benefit.
This repository is the official CVE List an is a catalog of all CVE Records identified by, or reported to, the CVE Program.
This repository hosts downloadable files of CVE Records in the CVE Record Format (the schema is in another repository). They are updated regularly (about every 7 minutes) using the official CVE Services API. You may search, download, and use the content hosted in this repository, per the CVE Program Terms of Use.