EFF’s Street-Level Surveillance project shines a light on the surveillance technologies that law enforcement agencies routinely deploy in our communities. These resources are designed for advocacy organizations, journalists, defense attorneys, policymakers, and members of the public who often are not getting the straight story from police representatives or the vendors marketing this equipment.
Whether it’s phone-based location tracking, ubiquitous video recording, biometric data collection, or police access to people’s smart devices, law enforcement agencies follow closely behind their counterparts in the military and intelligence services in acquiring privacy-invasive technologies and getting access to consumer data. Just as analog surveillance historically has been used as a tool for oppression, we must understand the threat posed by emerging technologies to successfully defend civil liberties and civil rights in the digital age.
OpenIPC is an open-source operating system targeting IP cameras with ARM and MIPS processors from several manufacturers in order to replace that closed, opaque, insecure, often abandoned and unsupported firmware pre-installed by a vendor.
OpenIPC Firmware comes as binary pre-compiled files for easy installation by end-user. Also, we provide full access to the source files for further development and improvement by any capable programmer willing to contribute to the project. OpenIPC source code is released under one of the most simple open source license agreements, MIT License, giving users express permission to reuse code for any purpose, even as part of a proprietary software. We only ask you politely to contribute your improvements back to us. We would be grateful for any feedback and suggestions.
Downloadable images: https://openipc.org/supported-hardware/featured
Welcome to Insecam project, the world's biggest directory of online surveillance security cameras. Select a country to watch live street, traffic, parking, office, road, beach, earth online webcams. Now you can search live web cams around the world. You can find here Axis, Panasonic, Linksys, Sony, TPLink, Foscam and a lot of other network video cams available online without a password. Mozilla Firefox browser is recommended to watch network cameras. Only filtered cameras are available now. This way none of the cameras on Insecam invade anybody's private life.
No, they really don't use HTTPS. Sheesh.
Python 3 tooling to retrieve data from Axon Body Cams. This code should work for first and second generation non-online models.
The app periodically scans your surroundings for potential tracking devices, like AirTags or other Find My devices.
The AirTags and other Find My devices are simple, small and perfect to track Android users! Without tracking warnings, as integrated on iOS, anyone could try to track your behavior by placing an AirTag in your jacket, backpack or car.
With the app you can play a sound on AirTags and find it easily. Afterward, you can view at which locations the device has tracked you. For this we use background location access. All location data never leaves your device
If you no one is trying to track you, the app will never bother you.
The CSRC provides a searchable database of resources on the topic of counter-surveillance, with a focus on targeted surveillance against people who have things to hide. We want to help anarchists and other rebels acquire a practical understanding of the surveillance threats they may face in their struggles and in their lives. We prefer resources written by friends and understandable without prior technical knowledge.
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.
It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology and forensic evidences.
Warning: this tool has been released as a forensic tool for a technical audience. Using it requires some technical skills such as understanding basics of forensic analysis and using command line tools.
PyCameraServer is a Flask video / image / Youtube / IP Camera frames online web-editor with live streaming preview for objects recognition, extraction, segmentation, resolution upscaling, styling, colorization, interpolation, using OpenCV with neural network models: YOLO, Mask R-CNN, Caffe, DAIN, EDSR, LapSRN, FSRCNN, ESRGAN.
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.
My Advisory Circular network of twitter bots post in real-time whenever they detect aircraft flying in circles over cities around the world, including Los Angeles, Baltimore, Portland, Minneapolis, and London. The bots often tweet about news and fire aircraft, and because they use an uncensored source of data they also tweet police, FBI, DHS, DEA, CBP, and military aircraft. They look for circles because it means an aircraft is doing something instead of going somewhere. If you've ever asked “what is that helicopter/plane?” there’s a good chance my bots can answer your question—even if it's an advanced military surveillance plane.
This program show you IMSI numbers of cellphones around you.
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.
Requires an API key for SHODAN.
With their small size and ubiquitous use, we’ve become quite accostomed to commercial home-monitoring camera systems — so much so that they tend to fade into their settings, even when prominently placed up front and center. It’s an extension of camera-equipped-everything maneuvering us to take the constant recording of our lives for granted.
How to create a portable GSM BTS which can be used either to create a private (and vendor free!) GSM network or for GSM active tapping/interception/hijacking … yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception.
A crowdsourced mapping project which aims to document the trunk lines underlying the Net, and where privacy violations and surveillance infrastructure can watch it. Has open source, cross-platform software for download that runs traceroutes to various places, correlates the data, and uploads it to the project (anonymously, by default) for analysis.
A page that talks about passive and active sonar sensors. Security uses, especially the seismics. Links to other books and DoD video footage. I think this would be useful for training as well as surveillance applications.
EPIC's ongoing documentation of DHS fusion centers and surveillance.
A website where you can purchase copies of the US Bill of Rights on metal cards and luggage tags.
5226 links, including 359 private