Welcome to Insecam project, the world's biggest directory of online surveillance security cameras. Select a country to watch live street, traffic, parking, office, road, beach, earth online webcams. Now you can search live web cams around the world. You can find here Axis, Panasonic, Linksys, Sony, TPLink, Foscam and a lot of other network video cams available online without a password. Mozilla Firefox browser is recommended to watch network cameras. Only filtered cameras are available now. This way none of the cameras on Insecam invade anybody's private life.
No, they really don't use HTTPS. Sheesh.
Python 3 tooling to retrieve data from Axon Body Cams. This code should work for first and second generation non-online models.
The app periodically scans your surroundings for potential tracking devices, like AirTags or other Find My devices.
The AirTags and other Find My devices are simple, small and perfect to track Android users! Without tracking warnings, as integrated on iOS, anyone could try to track your behavior by placing an AirTag in your jacket, backpack or car.
With the app you can play a sound on AirTags and find it easily. Afterward, you can view at which locations the device has tracked you. For this we use background location access. All location data never leaves your device
If you no one is trying to track you, the app will never bother you.
The CSRC provides a searchable database of resources on the topic of counter-surveillance, with a focus on targeted surveillance against people who have things to hide. We want to help anarchists and other rebels acquire a practical understanding of the surveillance threats they may face in their struggles and in their lives. We prefer resources written by friends and understandable without prior technical knowledge.
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.
It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology and forensic evidences.
Warning: this tool has been released as a forensic tool for a technical audience. Using it requires some technical skills such as understanding basics of forensic analysis and using command line tools.
PyCameraServer is a Flask video / image / Youtube / IP Camera frames online web-editor with live streaming preview for objects recognition, extraction, segmentation, resolution upscaling, styling, colorization, interpolation, using OpenCV with neural network models: YOLO, Mask R-CNN, Caffe, DAIN, EDSR, LapSRN, FSRCNN, ESRGAN.
CUDA enabled.
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.
My Advisory Circular network of twitter bots post in real-time whenever they detect aircraft flying in circles over cities around the world, including Los Angeles, Baltimore, Portland, Minneapolis, and London. The bots often tweet about news and fire aircraft, and because they use an uncensored source of data they also tweet police, FBI, DHS, DEA, CBP, and military aircraft. They look for circles because it means an aircraft is doing something instead of going somewhere. If you've ever asked “what is that helicopter/plane?” there’s a good chance my bots can answer your question—even if it's an advanced military surveillance plane.
This program show you IMSI numbers of cellphones around you.
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.
Requires an API key for SHODAN.
With their small size and ubiquitous use, we’ve become quite accostomed to commercial home-monitoring camera systems — so much so that they tend to fade into their settings, even when prominently placed up front and center. It’s an extension of camera-equipped-everything maneuvering us to take the constant recording of our lives for granted.
How to create a portable GSM BTS which can be used either to create a private ( and vendor free! ) GSM network or for GSM active tapping/interception/hijacking … yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception.
A crowdsourced mapping project which aims to document the trunk lines underlying the Net, and where privacy violations and surveillance infrastructure can watch it. Has open source, cross-platform software for download that runs traceroutes to various places, correlates the data, and uploads it to the project (anonymously, by default) for analysis.
A page that talks about passive and active sonar sensors. Security uses, especially the seismics. Links to other books and DoD video footage. I think this would be useful for training as well as surveillance applications.
Blokada is an ad and surveillance blocker for Android. Sets up a virtual VPN connection (so it doesn't need root) and filters all outbound connection requests. Works at the OS level so you don't have to plug it into a bunch of your apps.
Github: https://github.com/blokadaorg/blokada
F-Droid: https://f-droid.org/packages/org.blokada.alarm/
EPIC's ongoing documentation of DHS fusion centers and surveillance.
A website where you can purchase copies of the US Bill of Rights on metal cards and luggage tags.
A wiki that documents vendors of surveillance, wiretapping, and interception technologies, what their products are capable of, and the countries that buy their gear and what they use it for. Also discusses some of the issues surrounding large-scale communications interception.
How matrix algebra can be used on a table of names and membership checkmarks to develop a detailed social connection network.