The CSRC provides a searchable database of resources on the topic of counter-surveillance, with a focus on targeted surveillance against people who have things to hide. We want to help anarchists and other rebels acquire a practical understanding of the surveillance threats they may face in their struggles and in their lives. We prefer resources written by friends and understandable without prior technical knowledge.
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.
It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology and forensic evidences.
Warning: this tool has been released as a forensic tool for a technical audience. Using it requires some technical skills such as understanding basics of forensic analysis and using command line tools.
PyCameraServer is a Flask video / image / Youtube / IP Camera frames online web-editor with live streaming preview for objects recognition, extraction, segmentation, resolution upscaling, styling, colorization, interpolation, using OpenCV with neural network models: YOLO, Mask R-CNN, Caffe, DAIN, EDSR, LapSRN, FSRCNN, ESRGAN.
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.
My Advisory Circular network of twitter bots post in real-time whenever they detect aircraft flying in circles over cities around the world, including Los Angeles, Baltimore, Portland, Minneapolis, and London. The bots often tweet about news and fire aircraft, and because they use an uncensored source of data they also tweet police, FBI, DHS, DEA, CBP, and military aircraft. They look for circles because it means an aircraft is doing something instead of going somewhere. If you've ever asked “what is that helicopter/plane?” there’s a good chance my bots can answer your question—even if it's an advanced military surveillance plane.
This program show you IMSI numbers of cellphones around you.
Build interactive map of securicams from Shodan. Based on your address or coordinates, script creates map of Shodan cameras in neighborhood. Requires an API key.
With their small size and ubiquitous use, we’ve become quite accostomed to commercial home-monitoring camera systems — so much so that they tend to fade into their settings, even when prominently placed up front and center. It’s an extension of camera-equipped-everything maneuvering us to take the constant recording of our lives for granted.
How to create a portable GSM BTS which can be used either to create a private ( and vendor free! ) GSM network or for GSM active tapping/interception/hijacking … yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception.
A crowdsourced mapping project which aims to document the trunk lines underlying the Net, and where privacy violations and surveillance infrastructure can watch it. Has open source, cross-platform software for download that runs traceroutes to various places, correlates the data, and uploads it to the project (anonymously, by default) for analysis.
A page that talks about passive and active sonar sensors. Security uses, especially the seismics. Links to other books and DoD video footage. I think this would be useful for training as well as surveillance applications.
EPIC's ongoing documentation of DHS fusion centers and surveillance.
A website where you can purchase copies of the US Bill of Rights on metal cards and luggage tags.
A wiki that documents vendors of surveillance, wiretapping, and interception technologies, what their products are capable of, and the countries that buy their gear and what they use it for. Also discusses some of the issues surrounding large-scale communications interception.
While it won't save you from the widespread network monitoring of the Net, the FSF has helpfully assembled a collection of open source software packages and privacy-aware services to help you get away from PRISM.
How matrix algebra can be used on a table of names and membership checkmarks to develop a detailed social connection network.
A utility written in Python that makes it easier to use an SDR to find bugs in a room.
Documentation for Discord's REST API.
3722 links, including 192 private