Origin - Independent researchers (32)
"Translation of chapter 10, OPSEC for Informational Self-Determination. A few practical tips for avoiding DNA traces."
View online
Download
Other languages
(de) Der polizeiliche Zugriff auf DNA-Daten: Strategien der Gegenwehr
"Neben einem Überblick über die juristische Situation in Deutschland zur DNA-Entnahme, sowie zur Einspeisung von DNA in die Datenbanken des BKA liefert diese Broschüre auch einige Erklärungen, sowie ein paar praktische Tipps zum Vermeiden von DNA-Spuren."
Download
Origin
Independent researchers
Topics
DNA, Police files
Type
Text
Last updated
22 March 2023
"Two people alleged to have damaged a water reservoir in Charente-Maritime are on trial this Thursday in La Rochelle. Phone bills, tailing and geolocation... To identify them, the investigators have deployed methods that are out of the ordinary."
View online
Download
Source
Other languages
(fr) Retour sur les enquêtes policières liées aux attaques en manif contre les mégabassines
"Deux personnes soupçonnées d’avoir dégradé une réserve d’eau en Charente-Maritime sont jugées ce jeudi à La Rochelle. Fadettes, filature et géolocalisation... Pour les identifier, les enquêteurs ont déployé des moyens hors norme."
View online
Download
Source
Origin
Independent researchers
Topics
Mobile phones, Physical surveillance, Police files, Video surveillance
Type
Text
Last updated
20 January 2023
"Practical Linux Forensics dives into the details of analyzing postmortem images of Linux systems that were misused, abused, or attacked. You'll learn how to locate and interpret digital evidence on Linux desktops, servers, and IoT devices, and reconstruct a timeline of events after a crime or security incident."
Download
Origin
Independent researchers
Topics
Digital surveillance, Targeted malware
Type
Text
Last updated
12 December 2021
"Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices."
View online
Origin
Independent researchers
Topics
Digital surveillance, Mobile phones, Targeted malware
Type
Software
Last updated
22 July 2021
"Dieses Buch möchte Hundeführern, Interessierten und allen, die Hunde zum Mantrailing einsetzen, einen Überblick darüber verschaffen, was Mantrailing ist und was die gut ausgebildete Hundenase zu leisten vermag."
Download
Origin
Independent researchers
Topic
Other physical traces
Type
Text
Last updated
21 July 2021
"Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s."
Origin
Independent researchers
Topic
Digital surveillance
Type
Text
Last updated
12 July 2021
Warning from CSRC: we consider this resource to be partly outdated, but we think it can still be useful. Please take it with caution.
"If a camera's location is known, and can be seen, and is stationary, a tripod/rifle scope/gun sight laser system can successfully zap it, even at distances greater than 100 meters. If a camera is roving, a golf scope/gun sight laser can intermittently zap it by hand with little effort."
View online
Origin
Independent researchers
Topic
Video surveillance
Type
Text
Last updated
12 May 2021
"Operational Security is a complex topic. A few years ago I did a seminar on the subject for a humanitarian organization that operated in a hostile environment. [...] I hope it inspires and helps others that have to do their jobs under the eyes of hostile actors."
Download
Origin
Independent researchers
Topics
Mobile phones, Physical surveillance, Security culture
Type
Text
Last updated
12 May 2021
"Law enforcement surveillance isn’t always secret. These technologies can be discovered in news articles and government meeting agendas, in company press releases and social media posts. It just hasn’t been aggregated before. Through a combination of crowdsourcing and data journalism, we are creating the largest-ever repository of information on which law enforcement agencies are using what surveillance technologies."
View online
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Other
Last updated
7 May 2021
"This report examines, explains and critiques a number of large-scale EU information systems currently being planned or built that will significantly extend the collection and use of biometric and biographic data taken from visitors to the Schengen area. In particular, it examines new systems being introduced to track, analyse and assess the potential security, immigration or public health risks posed by non-EU citizens who have to apply for either a short-stay visa or a travel authorisation – primarily the Visa Information System (VIS), which is being upgraded, and the European Travel Information and Authorisation System (ETIAS), which is currently under construction."
Download
Origin
Independent researchers
Topics
Borders, Fingerprints, Police files
Type
Text
Last updated
7 May 2021
"Activists in Belarus are subject to unchecked government surveillance with no independent oversight. The government uses telecoms companies to facilitate surveillance by demanding direct, remote-control access to customer communications and data. Against the background of an already restrictive legal environment, this creates a chilling effect that forces activists out of public life."
Download
Source
Other languages
(ru) Гражданское общество, секретность и слежка в Беларуси
"Правовая база, регулирующая порядок негласного наблюдения в Беларуси, характеризуется отсутствием соответствующих гарантий безопасности, и позволяет властям осуществлять широкомасштабную слежку практически без всякого обоснования. И хотя фактически любой человек может стать объектом слежки, почти невозможно узнать, ведётся ли за ним слежка сейчас, или она велась ранее. Подобная неопределённость оказывает сковывающий эффект на правозащитников, оппозиционных политиков, юристов и активистов, и ограничивает их возможности в реализации своих прав, в том числе права на неприкосновенность частной жизни, свободу объединений, свободу мирных собраний и свободу выражения мнений."
Download
Source
Origin
Independent researchers
Topics
Digital surveillance, Hidden devices, Mobile phones, Physical surveillance
Type
Text
Last updated
7 May 2021
"Crocodile Hunter is a tool to hunt fake eNodeBs, also known commonly as hailstorm, stingray, cell site simulators, or IMSI catchers. It works by listening for broadcast messages from all of the 4G stations in the area, inferring their location, and looking for unusual activity."
View online
Origin
Independent researchers
Topics
IMSI catchers, Mobile phones
Type
Software
Last updated
7 May 2021
"We are a project involved in detecting and understanding cell phone surveillance in risk contexts within Latin America."
View online
Origin
Independent researchers
Topics
IMSI catchers, Mobile phones
Type
Other
Last updated
7 May 2021
"Lawmakers and law enforcement agencies around the world, including in the United States, have increasingly called for backdoors in the encryption schemes that protect your data, arguing that national security is at stake. But new research indicates governments already have methods and tools that, for better or worse, let them access locked smartphones thanks to weaknesses in the security schemes of Android and iOS."
Origin
Independent researchers
Topic
Mobile phones
Type
Text
Last updated
7 May 2021
"Today, I am sharing some tips on how to prevent yourself from being recognized by facial recognition systems. I have personally utilized some of these techniques in test environments - and they worked. Others I have seen demonstrated."
Origin
Independent researchers
Topics
Facial recognition, Video surveillance
Type
Text
Last updated
7 May 2021
"[A] shotgun is your best bet at taking down a drone. Preferably one loaded with the largest spread ammunition you can find. [...] Of course not all methods of taking out a drone need to involve literal firearms. [...] Paintballs are a no-go. [...] Airsoft guns and other plastic-pellet guns are worthless. [...] Slingshots will likely work - again, assuming you can hit. [...] Last but not least, you never want to underestimate the power of just throwing crap. A rock, a baseball, anything you can fling straight, accurate, and fast."
Origin
Independent researchers
Topic
Aerial surveillance
Type
Text
Last updated
7 May 2021
"Un bouquin pour « informer les avocats, les professionnels du droit sur les techniques d’investigation déployées par les enquêteurs et les services de renseignements ». C’est écrit par un ex-flic mais c’est intéressant."
Download
Contact: csrc@riseup.net (PGP)
Origin
Independent researchers
Topics
Digital surveillance, IMSI catchers, Mobile phones, Police files, Targeted malware
Type
Text
Last updated
7 May 2021
"Если, например, вы подозреваете соседа в подключении к вашей Wi-Fi сети и не можете удостовериться в своих догадках, приведенная техника может помочь в сборе доказательств."
View online
Origin
Independent researchers
Topic
Digital surveillance
Type
Text
Last updated
7 May 2021
"Deux articles publiés fin 2019 sur l’usage des fichiers de police pour utiliser la reconnaissance faciale : "La reconnaissance faciale des manifestant.e.s est déjà autorisée" et "Quand la France se lance dans la reconnaissance faciale"."
Download
Source
La reconnaissance faciale des manifestant.e.s est déjà autorisée
Quand la France se lance dans la reconnaissance faciale
Origin
Independent researchers
Topics
Facial recognition, Police files, Video surveillance
Type
Text
Last updated
7 May 2021
"В помощь беларусам по безопасному использованию мобильных телефонов, мессенджеров и сети Интернет BYPOL подготовил краткую инструкцию как сохранить свою конфиденциальность."
View online
Origin
Independent researchers
Topics
Digital surveillance, Mobile phones
Type
Text
Last updated
7 May 2021
"Concerned about the privacy and security of your communications? Follow our guide to locking down Signal."
View online
Origin
Independent researchers
Topic
Mobile phones
Type
Text
Last updated
7 May 2021
"Here, we take a look at easy-to-use ProtonMail - and why we the CLDC can’t recommend it (or its security model) for people opposing the powerful."
Origin
Independent researchers
Topic
Digital surveillance
Type
Text
Last updated
7 May 2021
"Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it. Sounds like something from an episode of "Alias" right? Unfortunately the scenario isn't fictional. In a purported effort to identify counterfeiters the US government has succeeded in persuading some color laser printer manufacturers to encode each page with identifying information."
View online
Origin
Independent researchers
Topic
Hidden devices
Type
Text
Last updated
7 May 2021
"This is a somewhat comprehensive list of reports published by a number of organizations and individuals, that expose the use of targeted surveillance against members of civil society."
View online
Origin
Independent researchers
Topics
Digital surveillance, Targeted malware
Type
Text
Last updated
7 May 2021
"SeaGlass is a system designed by security researchers at the University of Washington to measure IMSI-catcher use across a city."
View online
Origin
Independent researchers
Topics
IMSI catchers, Mobile phones
Type
Other
Last updated
7 May 2021
"EFF’s “Street-Level Surveillance” project shines light on the advanced surveillance technologies that law enforcement agencies routinely deploy in our communities. These resources are designed for members of the public, advocacy organizations, journalists, defense attorneys, and policymakers who often are not getting the straight story from police representatives or the vendors marketing this equipment."
View online
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Text
Last updated
7 May 2021
"We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense : our expert guide to protecting you and your friends from online spying."
View online
Other languages
(am) ጥንቃቄ ለተሞላ የድር ግንኙነት ጠቃሚ ምክሮች፣ መሣሪያዎች እና አጠቃቀሞች
(ar) الدفاع عن النفس ضد الرقابة: نصائح وأدوات وأدلة تفصيلية لاتصالات أكثر أماناً على الإنترنت
(es) Autoprotección Digital Contra La Vigilancia: Consejos, Herramientas y Guías Para Tener Comunicaciones Más Seguras
(fr) Autodéfense Contre la Surveillance : Astuces, Outils et Guides Pratiques Pour Des Communications En Ligne Plus Sécurisées
(pt) Autodefesa contra Vigilância: Dicas, ferramentas e tutoriais para uma maior segurança nas comunicações online
(ru) Советы, инструменты и руководства по обеспечению безопасности онлайновых коммуникаций
(tr) Daha Güvenli Çevrimiçi Haberleşmeler için İpuçları, Araçlar ve Çeşitli Rehberler
(vi) Lời khuyên, Công cụ và Làm-thế-nào cho Thông Tin Liên Lạc An Toàn trên Mạng
"እኛ ኤሌክትሮኒክ ፍሮንታየር ፋውንዴሽን ወደ ሰላሣ ለሚጠጉ ዓመታት የመስመር ላይ ግለኝነትን ለመጠበቅ ስንሰራ የኖርን፣ ገለልተኛ እና ለትርፍ ያልቋቋምን ድርጅት ነን፡፡ ይህ ሰርቪሊያንስ ሰልፍ ዲፌንስ፣ ራስዎን እና ወዳጅዎችዎን ከመስመር ላይ ስለላ የሚጠብቅ የባለሙያ መመሪያ ነው፡፡"
View online
"نحن منظمة التخوم الإلكترونية وهي منظمة مستقلة غير ربحية تعمل على حماية الخصوصية على الإنترنت منذ ما يقارب الثلاثين عاماً. وهذا هو مشروع الدفاع عن النفس ضد الرقابة: دليلنا الاحترافي لمساعدتك على حماية نفسك وأصدقائك من التجسس عبر الإنترنت."
View online
"Somos la Electronic Frontier Foundation, una organización independiente sin fines de lucro que trabaja para proteger la privacidad en línea desde hace casi treinta años. Esto es Autoprotección Digital Contra La Vigilancia: nuestra guía avanzada para protegerte a ti y a tus amigos del espionaje en línea."
View online
"Nous sommes la Fondation Frontière Électronique, un organisme indépendant sans but lucratif qui oeuvre depuis près de 30 ans pour protéger votre vie privée en ligne. Voici Autodéfense contre la surveillance : notre guide spécialisé sur la protection contre l’espionnage en ligne, pour vous et vos amis."
View online
"Nós somos a Electronic Frontier Foundation, uma organização sem fins lucrativos que há quase 30 anos trabalha para proteger a privacidade. O Guia de Autodefesa contra Vigilância é nossa ferramenta com dicas de especialistas para proteger você e amigos/as da espionagem virtual."
View online
"Мы, сотрудники независимой некоммерческой организации Electronic Frontier Foundation, работаем на протяжении почти тридцати лет в области обеспечения конфиденциальности в сети Интернет. Пособие «Самозащита от слежки» поможет вам и вашим друзьям избежать слежки в сети."
View online
"Electronic Frontier Foundation yaklaşık 30 senedir çevrimiçi gizliliği savunan bağımsız ve kâr amacı gütmeyen bir organizasyondur. Gözetim Meşru Müdafaa, çevrimiçi casusluğa karşı sizi ve yakınlarınızı korumak için düzenlenmiş uzman rehberimizdir."
View online
"Chúng tôi là Electronic Frontier Foundation, một tổ chức phi lợi nhuận, độc lập, hoạt động để bảo vệ quyền riêng tư & bảo mật trên mạng gần ba mươi năm nay. Tài liệu này là Tự Vệ Chống Theo Dõi: cẩm nang hướng dẫn bạn và người quen cách đề phòng bị theo dõi trên mạng."
View online
Origin
Independent researchers
Topic
Digital surveillance
Type
Text
Last updated
7 May 2021
"German authorities use a number of databases that collect data on political activists, even if they hadn't been sentenced or tried. Names are stored if people have had their identity checked, or if they have registered a demonstration under their name. Many are recorded under false designations. Such entries have raised concerns around them being used for further repression [...]. Discriminatory and stigmatising labels have also been applied to people whose data is held by the police."
View online
Origin
Independent researchers
Topic
Police files
Type
Text
Last updated
7 May 2021
"This report is about electronic surveillance technologies used to identify, track, and monitor individuals and their communications for intelligence gathering and law enforcement purposes."
Download
Origin
Independent researchers
Topics
Digital surveillance, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Text
Last updated
7 May 2021
"In this report, several cases of push-backs from Croatia are highlighted in order to present how authorities use technology within detection and apprehension of transit groups, both at borders and interiors."
Download
Origin
Independent researchers
Topics
Aerial surveillance, Borders, Video surveillance
Type
Text
Last updated
7 May 2021
"Transparent Lives: Surveillance in Canada details nine key trends in the processing of personal information, trends that are evident throughout the world. They affect all Canadians, but few citizens are aware of how, when, for what purpose, or with what consequences their personal data are used by large organizations. Hence the title: Transparent Lives. This book demonstrates that our lives are open and visible to organizations as never before and that in every area of life—as citizens, consumers, workers, and travellers—this makes a difference."
Download
Source
Other languages
(fr) Vivre à nu: La surveillance au Canada
"Vivre à nu : la surveillance au Canada expose neuf grandes tendances qui sont observées dans le traitement des renseignements personnels partout dans le monde. Ces tendances touchent tous les Canadiens, mais peu d’entre eux savent comment, quand et à quelles fins leurs données personnelles sont utilisées par les grandes organisations et quelles sont les conséquences de cette utilisation. Voilà pourquoi cet ouvrage est intitulé Vivre à nu ; il démontre que nos vies sont plus que jamais ouvertes et visibles pour les organismes et que cette visibilité a de réels effets sur chaque sphère de notre vie, que nous soyons citoyens, consommateurs, travailleurs ou voyageurs."
View online
Download
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, DNA, Digital surveillance, Facial recognition, Fingerprints, Mobile phones, Video surveillance
Type
Text
Last updated
7 May 2021
"This briefing outlines the transnational police groups, networks and organisations that are known to exist for the purpose of coordinating undercover police operations across state borders, primarily in Europe."
View online
Origin
Independent researchers
Topics
Borders, Infiltrators and informants
Type
Text
Last updated
7 May 2021