The Counter-surveillance resource center is a searchable database of resources on evading targeted surveillance. We want to help anarchists and other rebels acquire a practical understanding of the surveillance threats they may face in their struggles and in their lives. We prefer resources that are easy to understand and written by friends.

Contact

You have something to add? A resource needs to be updated?
You want to translate the website? Something else?

Contact us at csrc@riseup.net (PGP)

Origin - Independent researchers (31)
by Bruce Nikkel
"Practical Linux Forensics dives into the details of analyzing postmortem images of Linux systems that were misused, abused, or attacked. You'll learn how to locate and interpret digital evidence on Linux desktops, servers, and IoT devices, and reconstruct a timeline of events after a crime or security incident."
Download
PDF
Origin
Independent researchers
Topics
Digital surveillance, Targeted malware
Type
Text
Date added
12 December 2021
by Amnesty International Security Lab (amnesty.org/en/tech)
"Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices."
View online
Origin
Independent researchers
Topics
Digital surveillance, Mobile phones, Targeted malware
Type
Software
Date added
22 July 2021
by Gen-ethisches Netzwerk (gen-ethisches-netzwerk.de)
"Neben einem Überblick über die juristische Situation in Deutschland zur DNA-Entnahme, sowie zur Einspeisung von DNA in die Datenbanken des BKA liefert diese Broschüre auch einige Erklärungen, sowie ein paar praktische Tipps zum Vermeiden von DNA-Spuren."
Download
PDF
Origin
Independent researchers
Topics
DNA, Police files
Type
Text
Date added
21 July 2021
by Andrea Freiin von Buddenbrock
"Dieses Buch möchte Hundeführern, Interessierten und allen, die Hunde zum Mantrailing einsetzen, einen Überblick darüber verschaffen, was Mantrailing ist und was die gut ausgebildete Hundenase zu leisten vermag."
Download
PDF
Origin
Independent researchers
Topic
Other physical traces
Type
Text
Date added
21 July 2021
"Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s."
Download
For reading
PDF
For printing
PDF
Origin
Independent researchers
Topic
Digital surveillance
Type
Text
Date added
12 July 2021
Warning from CSRC: we consider this resource to be partly outdated, but we think it can still be useful. Please take it with caution.
by Michael Naimark
"If a camera's location is known, and can be seen, and is stationary, a tripod/rifle scope/gun sight laser system can successfully zap it, even at distances greater than 100 meters. If a camera is roving, a golf scope/gun sight laser can intermittently zap it by hand with little effort."
View online
Origin
Independent researchers
Topic
Video surveillance
Type
Text
Date added
12 May 2021
by Jonathan 'smuggler' Logan
"Operational Security is a complex topic. A few years ago I did a seminar on the subject for a humanitarian organization that operated in a hostile environment. [...] I hope it inspires and helps others that have to do their jobs under the eyes of hostile actors."
Download
PDF
Origin
Independent researchers
Topics
Mobile phones, Physical surveillance, Security culture
Type
Text
Date added
12 May 2021
by Electronic Frontier Foundation (eff.org)
"Law enforcement surveillance isn’t always secret. These technologies can be discovered in news articles and government meeting agendas, in company press releases and social media posts. It just hasn’t been aggregated before. Through a combination of crowdsourcing and data journalism, we are creating the largest-ever repository of information on which law enforcement agencies are using what surveillance technologies."
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Other
Date added
7 May 2021
by Chris Jones for Statewatch (statewatch.org)
"This report examines, explains and critiques a number of large-scale EU information systems currently being planned or built that will significantly extend the collection and use of biometric and biographic data taken from visitors to the Schengen area. In particular, it examines new systems being introduced to track, analyse and assess the potential security, immigration or public health risks posed by non-EU citizens who have to apply for either a short-stay visa or a travel authorisation – primarily the Visa Information System (VIS), which is being upgraded, and the European Travel Information and Authorisation System (ETIAS), which is currently under construction."
Download
PDF
Origin
Independent researchers
Topics
Borders, Fingerprints, Police files
Type
Text
Date added
7 May 2021
by Amnesty International (amnesty.org)
"Activists in Belarus are subject to unchecked government surveillance with no independent oversight. The government uses telecoms companies to facilitate surveillance by demanding direct, remote-control access to customer communications and data. Against the background of an already restrictive legal environment, this creates a chilling effect that forces activists out of public life."
Download
PDF
Other languages
(ru) Гражданское общество, секретность и слежка в Беларуси
"Правовая база, регулирующая порядок негласного наблюдения в Беларуси, характеризуется отсутствием соответствующих гарантий безопасности, и позволяет властям осуществлять широкомасштабную слежку практически без всякого обоснования. И хотя фактически любой человек может стать объектом слежки, почти невозможно узнать, ведётся ли за ним слежка сейчас, или она велась ранее. Подобная неопределённость оказывает сковывающий эффект на правозащитников, оппозиционных политиков, юристов и активистов, и ограничивает их возможности в реализации своих прав, в том числе права на неприкосновенность частной жизни, свободу объединений, свободу мирных собраний и свободу выражения мнений."
Download
PDF
Origin
Independent researchers
Topics
Digital surveillance, Hidden devices, Mobile phones, Physical surveillance
Type
Text
Date added
7 May 2021
by Electronic Frontier Foundation (eff.org)
"Crocodile Hunter is a tool to hunt fake eNodeBs, also known commonly as hailstorm, stingray, cell site simulators, or IMSI catchers. It works by listening for broadcast messages from all of the 4G stations in the area, inferring their location, and looking for unusual activity."
View online
Origin
Independent researchers
Topics
IMSI catchers, Mobile phones
Type
Software
Date added
7 May 2021
by Electronic Frontier Foundation (eff.org)
"Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it. Sounds like something from an episode of "Alias" right? Unfortunately the scenario isn't fictional. In a purported effort to identify counterfeiters the US government has succeeded in persuading some color laser printer manufacturers to encode each page with identifying information."
View online
Origin
Independent researchers
Topic
Hidden devices
Type
Text
Date added
7 May 2021
by South Lighthouse (southlighthouse.org)
"We are a project involved in detecting and understanding cell phone surveillance in risk contexts within Latin America."
Origin
Independent researchers
Topics
IMSI catchers, Mobile phones
Type
Other
Date added
7 May 2021
by Lily Hay Newman for Wired (wired.com)
"Lawmakers and law enforcement agencies around the world, including in the United States, have increasingly called for backdoors in the encryption schemes that protect your data, arguing that national security is at stake. But new research indicates governments already have methods and tools that, for better or worse, let them access locked smartphones thanks to weaknesses in the security schemes of Android and iOS."
View online
Download
Origin
Independent researchers
Topic
Mobile phones
Type
Text
Date added
7 May 2021
by Joseph Steinberg (josephsteinberg.com)
"Today, I am sharing some tips on how to prevent yourself from being recognized by facial recognition systems. I have personally utilized some of these techniques in test environments - and they worked. Others I have seen demonstrated."
View online
Download
Origin
Independent researchers
Topics
Facial recognition, Video surveillance
Type
Text
Date added
7 May 2021
"[A] shotgun is your best bet at taking down a drone. Preferably one loaded with the largest spread ammunition you can find. [...] Of course not all methods of taking out a drone need to involve literal firearms. [...] Paintballs are a no-go. [...] Airsoft guns and other plastic-pellet guns are worthless. [...] Slingshots will likely work - again, assuming you can hit. [...] Last but not least, you never want to underestimate the power of just throwing crap. A rock, a baseball, anything you can fling straight, accurate, and fast."
View online
Download
Origin
Independent researchers
Topic
Aerial surveillance
Type
Text
Date added
7 May 2021
"Un bouquin pour « informer les avocats, les professionnels du droit sur les techniques d’investigation déployées par les enquêteurs et les services de renseignements ». C’est écrit par un ex-flic mais c’est intéressant."
Download
Contact us at csrc@riseup.net (PGP)
Origin
Independent researchers
Topics
Digital surveillance, IMSI catchers, Mobile phones, Police files, Targeted malware
Type
Text
Date added
7 May 2021
by Security Lab (securitylab.ru)
"Если, например, вы подозреваете соседа в подключении к вашей Wi-Fi сети и не можете удостовериться в своих догадках, приведенная техника может помочь в сборе доказательств."
Origin
Independent researchers
Topic
Digital surveillance
Type
Text
Date added
7 May 2021
by La Quadrature du Net et Next INpact
"Deux articles publiés fin 2019 sur l’usage des fichiers de police pour utiliser la reconnaissance faciale : "La reconnaissance faciale des manifestant.e.s est déjà autorisée" et "Quand la France se lance dans la reconnaissance faciale"."
Download
PDF
Source
La reconnaissance faciale des manifestant.e.s est déjà autorisée
Quand la France se lance dans la reconnaissance faciale
Origin
Independent researchers
Topics
Facial recognition, Police files, Video surveillance
Type
Text
Date added
7 May 2021
by BYPOL - бывшие сотрудники полиции (t.me/s/by_pol)
"В помощь беларусам по безопасному использованию мобильных телефонов, мессенджеров и сети Интернет BYPOL подготовил краткую инструкцию как сохранить свою конфиденциальность."
View online
Origin
Independent researchers
Topics
Digital surveillance, Mobile phones
Type
Text
Date added
7 May 2021
by Martin Shelton for Freedom of the Press Foundation (freedom.press)
"Concerned about the privacy and security of your communications? Follow our guide to locking down Signal."
Origin
Independent researchers
Topic
Mobile phones
Type
Text
Date added
7 May 2021
by Michele Gretes for the Civil Liberties Defense Center (cldc.org)
"Here, we take a look at easy-to-use ProtonMail - and why we the CLDC can’t recommend it (or its security model) for people opposing the powerful."
View online
Download
Origin
Independent researchers
Topic
Digital surveillance
Type
Text
Date added
7 May 2021
by Security Without Borders (securitywithoutborders.org)
"This is a somewhat comprehensive list of reports published by a number of organizations and individuals, that expose the use of targeted surveillance against members of civil society."
Origin
Independent researchers
Topics
Digital surveillance, Targeted malware
Type
Text
Date added
7 May 2021
by University of Washington
"SeaGlass is a system designed by security researchers at the University of Washington to measure IMSI-catcher use across a city."
Origin
Independent researchers
Topics
IMSI catchers, Mobile phones
Type
Other
Date added
7 May 2021
by Electronic Frontier Foundation (eff.org)
"EFF’s “Street-Level Surveillance” project shines light on the advanced surveillance technologies that law enforcement agencies routinely deploy in our communities. These resources are designed for members of the public, advocacy organizations, journalists, defense attorneys, and policymakers who often are not getting the straight story from police representatives or the vendors marketing this equipment."
View online
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Text
Date added
7 May 2021
by Electronic Frontier Foundation (eff.org)
"We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense : our expert guide to protecting you and your friends from online spying."
View online
Other languages
(am) ጥንቃቄ ለተሞላ የድር ግንኙነት ጠቃሚ ምክሮች፣ መሣሪያዎች እና አጠቃቀሞች
"እኛ ኤሌክትሮኒክ ፍሮንታየር ፋውንዴሽን ወደ ሰላሣ ለሚጠጉ ዓመታት የመስመር ላይ ግለኝነትን ለመጠበቅ ስንሰራ የኖርን፣ ገለልተኛ እና ለትርፍ ያልቋቋምን ድርጅት ነን፡፡ ይህ ሰርቪሊያንስ ሰልፍ ዲፌንስ፣ ራስዎን እና ወዳጅዎችዎን ከመስመር ላይ ስለላ የሚጠብቅ የባለሙያ መመሪያ ነው፡፡"
View online
(ar) الدفاع عن النفس ضد الرقابة: نصائح وأدوات وأدلة تفصيلية لاتصالات أكثر أماناً على الإنترنت
"نحن منظمة التخوم الإلكترونية وهي منظمة مستقلة غير ربحية تعمل على حماية الخصوصية على الإنترنت منذ ما يقارب الثلاثين عاماً. وهذا هو مشروع الدفاع عن النفس ضد الرقابة: دليلنا الاحترافي لمساعدتك على حماية نفسك وأصدقائك من التجسس عبر الإنترنت."
View online
(es) Autoprotección Digital Contra La Vigilancia: Consejos, Herramientas y Guías Para Tener Comunicaciones Más Seguras
"Somos la Electronic Frontier Foundation, una organización independiente sin fines de lucro que trabaja para proteger la privacidad en línea desde hace casi treinta años. Esto es Autoprotección Digital Contra La Vigilancia: nuestra guía avanzada para protegerte a ti y a tus amigos del espionaje en línea."
View online
(fr) Autodéfense Contre la Surveillance : Astuces, Outils et Guides Pratiques Pour Des Communications En Ligne Plus Sécurisées
"Nous sommes la Fondation Frontière Électronique, un organisme indépendant sans but lucratif qui oeuvre depuis près de 30 ans pour protéger votre vie privée en ligne. Voici Autodéfense contre la surveillance : notre guide spécialisé sur la protection contre l’espionnage en ligne, pour vous et vos amis."
View online
(pt) Autodefesa contra Vigilância: Dicas, ferramentas e tutoriais para uma maior segurança nas comunicações online
"Nós somos a Electronic Frontier Foundation, uma organização sem fins lucrativos que há quase 30 anos trabalha para proteger a privacidade. O Guia de Autodefesa contra Vigilância é nossa ferramenta com dicas de especialistas para proteger você e amigos/as da espionagem virtual."
View online
(ru) Советы, инструменты и руководства по обеспечению безопасности онлайновых коммуникаций
"Мы, сотрудники независимой некоммерческой организации Electronic Frontier Foundation, работаем на протяжении почти тридцати лет в области обеспечения конфиденциальности в сети Интернет. Пособие «Самозащита от слежки» поможет вам и вашим друзьям избежать слежки в сети."
View online
(tr) Daha Güvenli Çevrimiçi Haberleşmeler için İpuçları, Araçlar ve Çeşitli Rehberler
"Electronic Frontier Foundation yaklaşık 30 senedir çevrimiçi gizliliği savunan bağımsız ve kâr amacı gütmeyen bir organizasyondur. Gözetim Meşru Müdafaa, çevrimiçi casusluğa karşı sizi ve yakınlarınızı korumak için düzenlenmiş uzman rehberimizdir."
View online
(vi) Lời khuyên, Công cụ và Làm-thế-nào cho Thông Tin Liên Lạc An Toàn trên Mạng
"Chúng tôi là Electronic Frontier Foundation, một tổ chức phi lợi nhuận, độc lập, hoạt động để bảo vệ quyền riêng tư & bảo mật trên mạng gần ba mươi năm nay. Tài liệu này là Tự Vệ Chống Theo Dõi: cẩm nang hướng dẫn bạn và người quen cách đề phòng bị theo dõi trên mạng."
View online
Origin
Independent researchers
Topic
Digital surveillance
Type
Text
Date added
7 May 2021
by Matthias Monroy for Statewatch (statewatch.org)
"German authorities use a number of databases that collect data on political activists, even if they hadn't been sentenced or tried. Names are stored if people have had their identity checked, or if they have registered a demonstration under their name. Many are recorded under false designations. Such entries have raised concerns around them being used for further repression [...]. Discriminatory and stigmatising labels have also been applied to people whose data is held by the police."
Origin
Independent researchers
Topic
Police files
Type
Text
Date added
7 May 2021
by Privacy International (privacyinternational.org)
"This report is about electronic surveillance technologies used to identify, track, and monitor individuals and their communications for intelligence gathering and law enforcement purposes."
Origin
Independent researchers
Topics
Digital surveillance, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Text
Date added
7 May 2021
by Border Violence Monitoring Network (borderviolence.eu)
"In this report, several cases of push-backs from Croatia are highlighted in order to present how authorities use technology within detection and apprehension of transit groups, both at borders and interiors."
Download
PDF
Origin
Independent researchers
Topics
Aerial surveillance, Borders, Video surveillance
Type
Text
Date added
7 May 2021
"Transparent Lives: Surveillance in Canada details nine key trends in the processing of personal information, trends that are evident throughout the world. They affect all Canadians, but few citizens are aware of how, when, for what purpose, or with what consequences their personal data are used by large organizations. Hence the title: Transparent Lives. This book demonstrates that our lives are open and visible to organizations as never before and that in every area of life—as citizens, consumers, workers, and travellers—this makes a difference."
Download
PDF
Other languages
(fr) Vivre à nu: La surveillance au Canada
"Vivre à nu : la surveillance au Canada expose neuf grandes tendances qui sont observées dans le traitement des renseignements personnels partout dans le monde. Ces tendances touchent tous les Canadiens, mais peu d’entre eux savent comment, quand et à quelles fins leurs données personnelles sont utilisées par les grandes organisations et quelles sont les conséquences de cette utilisation. Voilà pourquoi cet ouvrage est intitulé Vivre à nu ; il démontre que nos vies sont plus que jamais ouvertes et visibles pour les organismes et que cette visibilité a de réels effets sur chaque sphère de notre vie, que nous soyons citoyens, consommateurs, travailleurs ou voyageurs."
View online
Download
PDF
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, DNA, Digital surveillance, Facial recognition, Fingerprints, Mobile phones, Video surveillance
Type
Text
Date added
7 May 2021
by Chris Jones for Statewatch (statewatch.org)
"This briefing outlines the transnational police groups, networks and organisations that are known to exist for the purpose of coordinating undercover police operations across state borders, primarily in Europe."
Origin
Independent researchers
Topics
Borders, Infiltrators and informants
Type
Text
Date added
7 May 2021