Topic - Mobile phones (55)
"An irregular publication by the Counter-surveillance resource center, a database of resources about evading targeted surveillance."
Other languages
(de) CSRC Bulletin
"Eine unregelmäßig erscheinenden Publikation des Counter-surveillance resource center, eine Datenbank von Hilfsmitteln zur Umgehung zielgerichteter Überwachung."
(fr) CSRC Bulletin
"Une publication irrégulière du Centre de documentation sur la contre-surveillance, une base de données de ressources sur comment déjouer la surveillance ciblée."
(ru) CSRC Bulletin
"Публикуем первый выпуск нерегулярного бюллетеня ресурсного центра."
Origin
Friends & other activists
Topics
Digital surveillance, Hidden devices, Mobile phones, Security culture, Video surveillance
Type
Text
Last updated
24 March 2023
"Two people alleged to have damaged a water reservoir in Charente-Maritime are on trial this Thursday in La Rochelle. Phone bills, tailing and geolocation... To identify them, the investigators have deployed methods that are out of the ordinary."
View online
Download
Source
Other languages
(fr) Retour sur les enquêtes policières liées aux attaques en manif contre les mégabassines
"Deux personnes soupçonnées d’avoir dégradé une réserve d’eau en Charente-Maritime sont jugées ce jeudi à La Rochelle. Fadettes, filature et géolocalisation... Pour les identifier, les enquêteurs ont déployé des moyens hors norme."
View online
Download
Source
Origin
Independent researchers
Topics
Mobile phones, Physical surveillance, Police files, Video surveillance
Type
Text
Last updated
20 January 2023
"In June 2022, in France, Ivan was arrested in the early morning by the Anti-Terrorism Sub-Directorate (SDAT), accused of six vehicle fires. [...] The following information comes from an initial quick reading of the investigation file."
View online
Download
Source
Other languages
(fr) Quelques premiers éléments du dossier d’enquête contre Ivan
"En juin 2022, en France, Ivan se faisait arrêter au petit matin par la SDAT, accusé de six incendies de véhicules. [...] Les informations qui suivent sont issues d'une première lecture rapide du dossier d'enquête."
View online
Download
Source
Origin
Friends & other activists
Topics
Digital surveillance, Hidden devices, Mobile phones, Physical surveillance, Video surveillance
Type
Text
Last updated
27 December 2022
"An exhaustive anarchist overview and guide to various apps and tech that utilize peer-to-peer and encryption."
Source
Other languages
(fr) Le guide du pair-à-pair, du chiffrement et de Tor : infrastructures numériques de communication pour les anarchistes
"Un aperçu détaillé et un guide des diverses applications qui utilisent le pair-à-pair, le chiffrement et Tor."
Download
Source
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones
Type
Text
Last updated
13 October 2022
"On July 24 [2020], Mónica Caballero and Francisco Solar were arrested in Chile [...] on July 26th the detention hearing began, which lasted about 4 hours. [...] The prosecution explained in detail what the two are accused of."
Other languages
(de) Über Orwell und der Fall von Mónica und Francisco
"Am 24. Juli [2020] wurden Mónica Caballero und Francisco Solar in Chile verhaftet [...] am 26. Juli begann der Haftprüfungstermin, der gute 4 Stunden dauerte. [...] Die Staatsanwaltschaft erläuterte bis ins Detail was den beiden vorgeworfen wird."
(es) Sobre Orwell y el caso de Mónica y Francisco
"El 24 de julio [2020], Mónica Caballero y Francisco Solar fueron arrestados en Chile [...] el 26 de julio comenzó la prueba de detención, que duró unas 4 horas. [...] La fiscalía explicó en detaille de qué se les acusa a lxs dos."
Origin
Friends & other activists
Topics
DNA, Facial recognition, Mobile phones, Video surveillance
Type
Text
Last updated
25 September 2022
"This information was compiled from public arrest documents regarding incidents in the Seattle area [...]. We provide our observations of these cases to highlight the dangers of not following security practices, as well as to inform the community that one of the defendants has cooperated with the authorities."
View online
Download
Origin
Friends & other activists
Topics
Infiltrators and informants, Mobile phones, Physical surveillance, Video surveillance
Type
Text
Last updated
30 July 2022
Advice from CSRC: if you're interested in this resource, you might also be interested in Never turn off the phone: A new approach to security culture.
"Scrivo dopo aver letto con grande interesse l’articolo "Non spegnere mai il telefono". [...] Ecco, non voglio necessariamente porre una critica allo scritto, ma anzi fornire così un ulteriore spunto di riflessione. Io direi che, piuttosto che non spegnere mai il telefono, forse converrebbe non averlo acceso mai..."
Origin
Friends & other activists
Topics
Mobile phones, Security culture
Type
Text
Last updated
1 December 2021
"Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices."
View online
Origin
Independent researchers
Topics
Digital surveillance, Mobile phones, Targeted malware
Type
Software
Last updated
22 July 2021
"Am 9. Mai 2007 durchsuchten Bundesanwaltschaft (BAW) und Bundeskriminalamt (BKA) zahlreiche Wohnungen und andere Räumlichkeiten in Berlin, Bremen, Hamburg und Land Brandenburg. Anlass war das Ermittlungsverfahren [...] der BAW gegen zuletzt 18 Personen wegen des Verdachts der Bildung einer terroristischen Vereinigung. Vorgeworfen werden dieser Vereinigung diverse v.a. Brandanschläge in den Regionen Hamburg und Berlin zwischen 2005 und 2007. Mitte Juni 2007 übermittelte die BAW im Rahmen der Akteneinsicht einen "Auszug" der Ermittlungsakten. Dies ist die Auswertung dieses "Auszugs"."
Download
Origin
Friends & other activists
Topics
Digital surveillance, Hidden devices, Mobile phones, Physical surveillance, Video surveillance
Type
Text
Last updated
21 July 2021
"There's a fair amount of skepticism, mixed messages, and general confusion in criminally-minded political scenes these days about what, exactly, constitutes good security in relation to technology. We want to try to clarify a few things, and help you to protect yourself against surveillance."
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones
Type
Text
Last updated
20 July 2021
Advice from CSRC: if you're interested in this resource, you might also be interested in How Law Enforcement Gets Around Your Smartphone's Encryption.
"La nouvelle a fait grand bruit : la police va se doter sous peu de boîtiers qui seraient capables de rentrer dans virtuellement n’importe quel smartphone, aussi protégé soit-il. Cet appareil nommé le « kiosk » [...] permettrait de brancher n’importe quel appareil et d’en extraire les informations en quelques minutes, sans compétence informatique particulière. [...] Dans les faits, les choses sont plus compliquées."
View online
Origin
Friends & other activists
Topic
Mobile phones
Type
Text
Last updated
11 July 2021
"Für eine Welt ohne Schlösser und Schranken und ein besseres Leben für alle!"
Download
Kapitel "Unsere eigene Sicherheit" in Prisma
Source
Origin
Friends & other activists
Topics
DNA, Fingerprints, Hidden devices, IMSI catchers, Mobile phones, Other physical traces, Video surveillance
Type
Text
Last updated
9 July 2021
"Advice on how to act prudently and with panache in the streets."
View online
Download
Source
Autonomes Blättchen #24
Other languages
(de) Tipps und Tricks für Riots and Stuff
"Hinweise zum umsichtigen und schwungvollen Agieren auf der Straße."
View online
Download
Source
Autonomes Blättchen #24
Origin
Friends & other activists
Topics
Mobile phones, Physical surveillance, Security culture
Type
Text
Last updated
9 July 2021
"Operational Security is a complex topic. A few years ago I did a seminar on the subject for a humanitarian organization that operated in a hostile environment. [...] I hope it inspires and helps others that have to do their jobs under the eyes of hostile actors."
Download
Origin
Independent researchers
Topics
Mobile phones, Physical surveillance, Security culture
Type
Text
Last updated
12 May 2021
"This booklet is an introduction to security for action and activists. It is hoped it will provide you with the necessary information for taking action and for effective campaigning in the face of state and corporate oppression."
Download
Origin
Friends & other activists
Topics
Infiltrators and informants, Mobile phones, Physical surveillance, Video surveillance
Type
Text
Last updated
7 May 2021
"This guide aims to be a concise overview on information security for anyone in emancipatory struggles against structures of power. It represents assembled knowledge and best practices from personal experience, conversations with hackers and fellow activists, hacker conferences, and university courses on computer security and cryptography."
View online
Other languages
(de) Informationssicherheit für Aktivist*innen
"Dieses Anleitung zielt darauf ab, einen knappen Überblick zur Informationssicherheit für alle zu bieten, die sich in emanzipatorischen Kämpfen gegen Machtstukturen befinden. Sie umfasst eine Ansammlung von Wissen und Praktiken, die aus persönlichen Erfahrungen, Gesprächen mit Hackern und anderen Aktivist*innen, Hacker-Konferenzen und Universitätskursen zu Computersicherheit und Kryptographie entstanden sind."
View online
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones, Physical surveillance, Security culture
Type
Text
Last updated
7 May 2021
"Προσπαθήσαμε να εξηγήσουμε όσο πιο συνοπτικά και περιληπτικά γινόταν, τις μεθόδους που χρησιμοποιεί η αστυνομία για ένα forensic έλεγχο σε υπολογιστές καθώς και για τις μεθόδους υποκλοπών που χρησιμοποιεί για την κινητή τηλεφωνία. [...] Προσπαθήσαμε επίσης να προσφέρουμε κάποιες λύσεις που είτε θα καταστήσουν τις forensic μεθόδους άχρηστες, είτε θα τις καθυστερήσουν σε μεγάλο βαθμό."
View online
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones
Type
Text
Last updated
7 May 2021
"Law enforcement surveillance isn’t always secret. These technologies can be discovered in news articles and government meeting agendas, in company press releases and social media posts. It just hasn’t been aggregated before. Through a combination of crowdsourcing and data journalism, we are creating the largest-ever repository of information on which law enforcement agencies are using what surveillance technologies."
View online
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Other
Last updated
7 May 2021
"Παρακολούθηση για τις αρχές και το παρακράτος σημαίνει να ελέγχονται συστηματικά αλλά και αποσπασματικά οι κινήσεις και οι ενέργειες προσώπων ή ομάδων, χωρίς αυτοί να το γνωρίζουν ή να έχουν ενημερωθεί σχετικά. Αντιπαρακολούθηση είναι κάθε τακτική που βοηθά στο να αποφεύγεται ή να γίνεται πολύ δύσκολος ο έλεγχος μέσω της παρακολούθησης."
View online
Origin
Friends & other activists
Topics
Mobile phones, Physical surveillance, Video surveillance
Type
Text
Last updated
7 May 2021
"A burner phone is a single-use phone, unattached to your identity, which can theoretically be used to communicate anonymously in situations where communications may be monitored. Whether or not using a burner phone is itself a “best practice” is up for debate, but if you’ve made the choice to use one, there are several things you should keep in mind."
View online
Other languages
(el) Οι καλύτερες πρακτικές για την χρήση καρτοκινητών
(fr) Les bonnes pratiques pour utiliser un téléphone jetable
"Ένα καρτοκινητό είναι ένα κινητό μίας χρήσης όπου θεωρητικά χρησιμοποιείται ανώνυμα σε περιπτώσεις που οι επικοινωνίες μπορεί να παρακολουθούνται. Παρόλο που υπάρχουν αρκετές αμφιβολίες για το εάν η χρήση τους είναι σωστή ή όχι, εάν πήρες την απόφαση να χρησιμοποιήσεις ένα υπάρχουν κάποια πράγματα τα οποία ίσως χρειαστεί να σκεφτείς."
Download
"Un téléphone jetable (en anglais burner phone) est un téléphone à usage unique qui n’est pas relié à ton identité et peut théoriquement être utilisé pour communiquer de manière anonyme dans les situations où tes communications sont susceptibles d’être surveillées et interceptées. Leur utilisation même fait débat et n’est pas nécessairement une « bonne pratique », mais si tu fais le choix d’en utiliser un, il faut prêter attention à quelques points précis."
View online
Origin
Friends & other activists
Topics
IMSI catchers, Mobile phones
Type
Text
Last updated
7 May 2021
"O documento a seguir foi produzido pelas Brigadas Populares para incentivar e auxiliar na difusão de políticas mínimas de segurança entre a militância de esquerda [...]. Os conteúdos cobertos, de forma inicial, são cultura de segurança, análise de ameaças, controle das informações e compartimentalização, segurança digital, física, em manifestações e ameaças e acolhimento."
Download
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones, Security culture
Type
Text
Last updated
7 May 2021
"Activists in Belarus are subject to unchecked government surveillance with no independent oversight. The government uses telecoms companies to facilitate surveillance by demanding direct, remote-control access to customer communications and data. Against the background of an already restrictive legal environment, this creates a chilling effect that forces activists out of public life."
Download
Source
Other languages
(ru) Гражданское общество, секретность и слежка в Беларуси
"Правовая база, регулирующая порядок негласного наблюдения в Беларуси, характеризуется отсутствием соответствующих гарантий безопасности, и позволяет властям осуществлять широкомасштабную слежку практически без всякого обоснования. И хотя фактически любой человек может стать объектом слежки, почти невозможно узнать, ведётся ли за ним слежка сейчас, или она велась ранее. Подобная неопределённость оказывает сковывающий эффект на правозащитников, оппозиционных политиков, юристов и активистов, и ограничивает их возможности в реализации своих прав, в том числе права на неприкосновенность частной жизни, свободу объединений, свободу мирных собраний и свободу выражения мнений."
Download
Source
Origin
Independent researchers
Topics
Digital surveillance, Hidden devices, Mobile phones, Physical surveillance
Type
Text
Last updated
7 May 2021
"Estas fotocopias que tienes entre tus manos [...] nacen de la necesidad de poner en común unas pautas básicas sobre seguridad personal, seguridad en las manifestaciones y sobre cómo actuar en caso de detención. No son normas a seguir, son consejos que creemos que pueden ser valiosos."
Download
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones, Video surveillance
Type
Text
Last updated
7 May 2021
"Crocodile Hunter is a tool to hunt fake eNodeBs, also known commonly as hailstorm, stingray, cell site simulators, or IMSI catchers. It works by listening for broadcast messages from all of the 4G stations in the area, inferring their location, and looking for unusual activity."
View online
Origin
Independent researchers
Topics
IMSI catchers, Mobile phones
Type
Software
Last updated
7 May 2021
"We are a project involved in detecting and understanding cell phone surveillance in risk contexts within Latin America."
View online
Origin
Independent researchers
Topics
IMSI catchers, Mobile phones
Type
Other
Last updated
7 May 2021
"Este é um guia para qualquer pessoa e grupo que tenha interesse em saber por conta própria como se defender de ameaças do uso de dispositivos de comunicação na era da vigilância automática."
Download
Source
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones
Type
Text
Last updated
7 May 2021
"Teléfonos Móviles y más."
Download
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones
Type
Text
Last updated
7 May 2021
"Ce guide est destiné aux personnes utilisant quelques fois des outils numériques (téléphones, ordinateurs, etc.) dans leur militantisme. Il expose quelques menaces et présente des contre-mesures partielles pouvant aider à protéger contre ces menaces."
Download
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones
Type
Text
Last updated
7 May 2021
"Lawmakers and law enforcement agencies around the world, including in the United States, have increasingly called for backdoors in the encryption schemes that protect your data, arguing that national security is at stake. But new research indicates governments already have methods and tools that, for better or worse, let them access locked smartphones thanks to weaknesses in the security schemes of Android and iOS."
Origin
Independent researchers
Topic
Mobile phones
Type
Text
Last updated
7 May 2021
"Un bouquin pour « informer les avocats, les professionnels du droit sur les techniques d’investigation déployées par les enquêteurs et les services de renseignements ». C’est écrit par un ex-flic mais c’est intéressant."
Download
Contact: csrc@riseup.net (PGP)
Origin
Independent researchers
Topics
Digital surveillance, IMSI catchers, Mobile phones, Police files, Targeted malware
Type
Text
Last updated
7 May 2021
"Представьте себе такую ситуацию: аноним звонит с одноразового телефона и шантажирует или требует выкуп за похищенного им человека. Через несколько дней преступник звонит повторно. Жертва звонит в полицию, и уже через час сотрудники определяют не только реальный номер злоумышленника, но и всю историю его переменивший и входящих и исходящих звонков. И все это без сложной аппаратуры и техники, поддельных базовых станций и перехвата сигнала."
View online
Origin
Friends & other activists
Topic
Mobile phones
Type
Text
Last updated
7 May 2021
"Вы не поверите: по “ведущему” телефону - Вашему настоящему. Внимательно прочитав следующий абзац, Вы поймёте, как всё легко, просто и быстро. Итак, поехали, рассмотрим разные ситуации."
View online
Origin
Friends & other activists
Topic
Mobile phones
Type
Text
Last updated
7 May 2021
"В помощь беларусам по безопасному использованию мобильных телефонов, мессенджеров и сети Интернет BYPOL подготовил краткую инструкцию как сохранить свою конфиденциальность."
View online
Origin
Independent researchers
Topics
Digital surveillance, Mobile phones
Type
Text
Last updated
7 May 2021
"Concerned about the privacy and security of your communications? Follow our guide to locking down Signal."
View online
Origin
Independent researchers
Topic
Mobile phones
Type
Text
Last updated
7 May 2021
"Observation und Gegenobservation: Dieser Text behandelt ihre Möglichkeiten, Risiken und Gegenmaßnahmen; er basiert auf Recherchen, Erfahrungsberichten und Insiderinformationen sowie einigen wenigen Veröffentlichungen zu diesem Thema."
Download
Origin
Friends & other activists
Topics
Automated license plate readers, Hidden devices, IMSI catchers, Mobile phones, Physical surveillance, Video surveillance
Type
Text
Last updated
7 May 2021
"Recueils de textes sur ce qui fut, en janvier 2008, la première affaire traitée par une juridiction antiterroriste concernant ce que policiers, juges et médias nomment « la mouvance anarcho-autonome », plus spécifiquement dans cette histoire « la mouvance anarcho-autonome francilienne »."
Origin
Friends & other activists
Topics
DNA, Digital surveillance, Mobile phones, Physical surveillance
Type
Text
Last updated
7 May 2021
"Η παρούσα μπροσούρα αποτελεί συλλογή-συγκέντρωση δημοσιευμένων κατά καιρούς κειμένων για την αυτοπροστασία απέναντι στις κατασταλτικές μεθόδους. Από τη γνώση για τις παρακολουθήσεις κινητών τηλεφώνων και ηλεκτρονικών συσκευών, μέχρι την πρόληψη για την όσο το δυνατόν καλύτερα «καλυμμένη» δράση μας και την αντιπαρακολούθηση, σημασία έχει από την πλευρά μας η κατάκτηση της συλλογικής εμπειρίας για το πώς θα αντιδράσουμε αν βρεθούμε στα χέρια τους, μα ακόμη καλύτερα πως θα δράσουμε για να μην βρεθούμε σε αυτά."
Download
Origin
Friends & other activists
Topics
DNA, Digital surveillance, Fingerprints, Mobile phones
Type
Text
Last updated
7 May 2021
"To je smyslem Černorudé příručky - podpořit v nás sebevědomí, zmenšit náš strach a zároveň přiložit další kámen do pevnosti s názvem bezpečnostní kultura. Nejde přitom jen o jednotlivce, důsledný musí být každý jeden z nás. Pokud všichni budeme pevní a důslední, pak se výrazně sníží riziko, že budeme chyceni a nakonec rozbiti jako celek."
View online
Origin
Friends & other activists
Topics
DNA, Digital surveillance, Direct action, Fingerprints, Hidden devices, Infiltrators and informants, Mobile phones, Physical surveillance, Security culture
Type
Text
Last updated
7 May 2021
Advice from CSRC: if you're interested in this resource, you might also be interested in A proposito di meta-dati e telefoni spenti.
"In the 80s, an anarchist who wanted, for example, to burn some building, developed his/her plan and at the same time looked to see if there were no listening devices in his/her house. In the late 90s, the same anarchist turned off the phone and used encrypted traffic on the Internet. In the 2020s, we need to reconsider our strategy, intelligence gathering has improved and we must also take this into account."
Other languages
(es) No apagues tu teléfono: Una revisión de nuestras pautas de seguridad
"En los años 80, un anarquista que quisiera realizar una acción directa ilegal, desarrollaba su plan y al mismo tiempo comprobaba que no hubiera dispositivos de escucha en su casa. En los 90, el mismo anarquista apagaba su teléfono y usaba criptografía para comunicarse por internet. En la década de 2020, tenemos que reconsiderar nuestra estrategia, los servicios de inteligencia han mejorado su capacidad de recolección de datos y debemos tenerlo en cuenta."
(fr) Jamais éteindre son téléphone : une nouvelle approche à la culture de la sécurité
"Dans les années 80, un/e anarchiste qui voulait, par exemple, mettre le feu à un bâtiment, élaborait son plan et en même temps elle/il regardait s’il n’y avait pas de dispositifs d’écoute chez lui/elle. A la fin des années 90, le/la même anarchiste éteignait le téléphone et utilisait des messages cryptés sur internet. Dans les années 2020, il nous est nécessaire de repenser notre stratégie : la collecte d’informations s’est améliorée et nous devons tenir compte aussi de cela."
(it) Non spegnere mai il telefono: un nuovo approccio ai procedimenti preventivi
"Negli anni 80, un/a compagno/a che voleva per esempio, dare fuoco a una struttura, elaborava il suo piano e nello stesso momento faceva attenzione a qualsiasi apparecchio d’ascolto che ci potesse essere a casa sua. Alla fine degli anni 90, lo/la stesso/a compagno/a spegneva il telefono e utilizzava dei messaggi criptati su Internet. Negli anni 2020, è necessario ripensare la nostra strategia: la raccolta di informazioni si è evoluta e dobbiamo tenerne certamente conto."
(ru) Никогда не выключай телефон: новый подход к культуре безопасности
"В 80е годы анархист, который хотел, к примеру, сжечь какое-нибудь здание, разрабатывал свой план и при этом смотрел, нет ли у него дома подслушивающих устройств. В конце 90х тот же самый анархист выключал телефон и пользовался шифрованием трафика в интернете. В 2020е нам надо снова пересмотреть свою стратегию, сбор разведданных усовершенствовался и мы также должны это учитывать."
Origin
Friends & other activists
Topics
Mobile phones, Security culture
Type
Text
Last updated
7 May 2021
"Μια πρώτη προσέγγιση της παρακολούθησης κινητών τηλεφώνων από τους χρήστες, τους κρατικούς και τους παρακρατικούς μηχανισμούς."
View online
Origin
Friends & other activists
Topic
Mobile phones
Type
Text
Last updated
7 May 2021
Warning from CSRC: we consider this resource to be partly outdated, but we think it can still be useful. Please take it with caution.
"Parece que se ha olvidado que hace 10 años no teníamos móviles y que si no nos gustan podemos vivir sin ellos. Si no quieres dejarte asustar por el miedo, quieres seguir movilizándote contra la injusticia, si quieres desarrollar un pensamiento crítico, te invitamos a leer lo que viene a continuación. Bueno, la verdad es que nos encantaría que quemes tu móvil y te vamos a dar buenas razones por hacerlo o por lo menos para pensártelo..."
Download
Other languages
(eu) Erre zure mugikorra!
(it) Brucia il telefono
"Badirudi ahaztu dugula orain hamar urte mugikorrik ez geneukala, eta gustoko ez baditugu eurak gabe bizi gaitezkeela. Bai, bai. Egi-egia esan: Ikaragarri gustatuko litzaiguke zure mugikorra erreko bazenu, eta oso arrazoi onak emango dizkizugu hala egin dezazun edo, behintzat, zalantza egin dezazun."
Download
"L'idea di studiare le tematiche di questo opuscolo è nata in un momento femminista tra donne, lesbiche, froci e trans+ di scambio e condivisione sulla lotta contro le frontiere ed i dispositivi repressivi costruiti attorno ed a partire da esse. Nel cercare approfondimenti su cellulari e telefonia ci siamo imbattutx in questo lavoro che per i suoi anni era fatto molto bene. Qualche tempo dopo abbiamo deciso di tradurlo ed aggiornarlo, già che ci stavamo lavorando sopra abbiamo tolto le parti che non ci convincevano del testo. Quindi quanto leggerete non è la traduzione del testo, ma quello che ci sembrava interessante estrapolare con varie parti ampliate o eliminate."
Download
Origin
Friends & other activists
Topics
IMSI catchers, Mobile phones
Type
Text
Last updated
7 May 2021
Warning from CSRC: we consider this resource to be partly outdated, but we think it can still be useful. Please take it with caution.
"Introduction to electronic security for activists and dissidents. [...] This text is geared towards activists and dissidents who are already self-motivated and want to be fully prepared for serious repression from authoritarian regimes. Specifically it intends to address common usecases and threats radical activists and dissidents face and answer every question commonly asked at trainings for radical activists and dissidents."
Origin
Friends & other activists
Topics
Digital surveillance, IMSI catchers, Mobile phones, Security culture, Video surveillance
Type
Text
Last updated
7 May 2021
"Este manual no es una lista de herramientas, aplicaciones y las instrucciones para usarlas. Todo esto está entre estas páginas - no te preocupes - bien hecho y actualizado. Eso sí, no esperes encontrarte una receta fácil con instrucciones cerradas. Los autores, los miembros de Críptica, te tratarán como a un adulto: explicándote los pros y los contras de cada opción y dejándote la elección a ti, en función de tu situación y condiciones, del contexto - una palabra que se olvida de- masiado a menudo -."
Download
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones
Type
Text
Last updated
7 May 2021
"The R2K seeks to create a country and a world where we all have the right to know – that is to be free to access and to share information. This right is fundamental to any democracy that is open, accountable, participatory and responsive; able to deliver the social, economic, gender and environmental justice we need."
Download
Source
Origin
Friends & other activists
Topics
Digital surveillance, IMSI catchers, Mobile phones, Physical surveillance
Type
Text
Last updated
7 May 2021
"SeaGlass is a system designed by security researchers at the University of Washington to measure IMSI-catcher use across a city."
View online
Origin
Independent researchers
Topics
IMSI catchers, Mobile phones
Type
Other
Last updated
7 May 2021
"Security is vital to the success & survival of the resistance movement. This is because we have an enemy who actively works to undermine, neutralize, & ultimately destroy us. Failure to remain aware of security concerns can mean the difference between victory or defeat, freedom or imprisonment, life or death. Not only for yourself, but others around you."
Download
Other languages
(es) Seguridad y Contra-Vigilancia: Información contra el estado policial
(it) Sicurezza & Contro-Sorveglianza: Informazione contro lo Stato di Polizia
"La seguridad es vital para el triunfo y sobrevivencia del movimiento de resistencia. Esto es porque tenemos un enemigo que activamente trabaja en sabotearnos, neutralizarnos y finalmente destruirnos. Fallar en lo que a seguridad concierne puede ser la diferencia entre la victoria y la derrota, libertad o aprisionamiento, vida o muerte. No solo para ti mismo, sino también para los que te rodean."
Download
"La sicurezza è vitale per il successo e la sopravvivenza dei movimenti di resistenza. Ciò è per il semplice motivo che abbiamo un nemico che lavora attivamente per ostacolarci, neutralizzarci e infine distruggerci. Non prestare attenzione riguardo a tutto ciò che concerne la sicurezza può determinare l’esito tra la vittoria e la sconfitta, tra la libertà e l’imprigionamento, tra la vita e la morte. Non solo per te stesso, ma per tutte le persone attorno a te."
Download
Origin
Friends & other activists
Topics
Hidden devices, Infiltrators and informants, Mobile phones, Physical surveillance, Video surveillance
Type
Text
Last updated
7 May 2021
"Signal is an encrypted messaging service that has been around in different forms for about 10 years. Since then, I have seen the software widely adopted by anarchist networks across Canada and the United States. More and more, for better and for worse, our interpersonal and group conversations have moved onto the Signal platform, to the extent that it has become the dominant way anarchists communicate with each other on this continent, with very little public debate about the implications."
View online
Other languages
(fr) Signal Fails
(pt) Quando o Signal não dá conta
"Signal est une messagerie chiffrée existant sous différentes formes depuis environ 10 ans. Depuis, j'ai pu être témoin de son adoption dans les milieux anarchistes du Canada et des USA. De plus en plus, pour le meilleur et le pire, nos conversations personnelles ou de groupes ont lieu sur Signal, à tel point que c'est devenu le moyen de communication privilégié des anarchistes sur ce continent, avec très peu de discussions publiques sur ce que ça implique."
Download
Source
"O Signal é um serviço de mensagens criptografadas que existe em diferentes formas há cerca de 10 anos. Desde então, tenho visto o software ser amplamente adotado por redes anarquistas no Canadá e nos Estados Unidos. Cada vez mais, para melhor e pior, nossas conversas interpessoais e em grupo passaram para a plataforma do Signal, na medida em que se tornou a maneira dominante pela qual anarquistas se comunicam neste continente, com muito pouco debate público sobre as implicações."
View online
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones
Type
Text
Last updated
7 May 2021
"Телефоны и телефонная связь уже давно являются рядовыми вещами в нашей повседневной жизни. И как часто случается с рядовыми повседневными вещами — сейчас сотовые телефоны (использование стационарных телефонов в вашей революционной деятельности следует исключить полностью) встроены в плотную сеть контроля, окутывающую нас со всех сторон. Уже ни для кого не секрет, что телефон — это не только удобное средство срочной связи, но и прекрасная возможность для спецслужб следить за их владельцами. Об этом сказано уже много, и многие рядовые участники анархистского движения, очевидно, уже имеют свой набор правил использования телефонов для связи с товарищами и семьей. Тем не менее, за незнанием и неследованиям некоторым правилам их использования, телефоны продолжают быть немыми свидетелями нашей деятельности и врагами культуры безопасности."
View online
Origin
Friends & other activists
Topics
Mobile phones, Security culture
Type
Text
Last updated
7 May 2021
"EFF’s “Street-Level Surveillance” project shines light on the advanced surveillance technologies that law enforcement agencies routinely deploy in our communities. These resources are designed for members of the public, advocacy organizations, journalists, defense attorneys, and policymakers who often are not getting the straight story from police representatives or the vendors marketing this equipment."
View online
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Text
Last updated
7 May 2021
Advice from CSRC: if you're interested in this resource, you might also be interested in Outrun the Bear: ProtonMail is Not for Activists.
"This article is one of a series of articles that intents on helping to establish a broader culture of security in the anarchist movement in Greece. It also intents on challenging certain behaviours that make the movement unsafe."
View online
Other languages
(el) Παιρνοντας τις εαυτους μας σοβαρα : μειωση ψηφιακων κινδυνων
"Αυτό το άρθρο είναι το πρώτο από μια σειρά άρθρων που σκοπεύουν να βοηθήσουν στη δημιουργία μιας ευρύτερης κουλτούρας ασφάλειας στον αναρχικό χώρο στην Ελλάδα. Σκοπεύει, επίσης, να αμφισβητήσει συγκεκριμένες συμπεριφορές που καθιστούν το χώρο μη ασφαλή."
View online
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones, Security culture
Type
Text
Last updated
7 May 2021
"Technopolice est une campagne visant à documenter et à lutter contre le déploiement de nouvelles technologies policières (drones, reconnaissance faciale, vidéosurveillance automatisée, police prédictive...). Nous avons pour cela créé et mis à disposition plusieurs outils (un forum, un site, une base documentaire...) pour permettre à chacune et chacun de se saisir de ces questions."
View online
Origin
Friends & other activists
Topics
Aerial surveillance, Automated license plate readers, Facial recognition, Mobile phones, Video surveillance
Type
Text
Last updated
7 May 2021
"This report is about electronic surveillance technologies used to identify, track, and monitor individuals and their communications for intelligence gathering and law enforcement purposes."
Download
Origin
Independent researchers
Topics
Digital surveillance, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Text
Last updated
7 May 2021
"Transparent Lives: Surveillance in Canada details nine key trends in the processing of personal information, trends that are evident throughout the world. They affect all Canadians, but few citizens are aware of how, when, for what purpose, or with what consequences their personal data are used by large organizations. Hence the title: Transparent Lives. This book demonstrates that our lives are open and visible to organizations as never before and that in every area of life—as citizens, consumers, workers, and travellers—this makes a difference."
Download
Source
Other languages
(fr) Vivre à nu: La surveillance au Canada
"Vivre à nu : la surveillance au Canada expose neuf grandes tendances qui sont observées dans le traitement des renseignements personnels partout dans le monde. Ces tendances touchent tous les Canadiens, mais peu d’entre eux savent comment, quand et à quelles fins leurs données personnelles sont utilisées par les grandes organisations et quelles sont les conséquences de cette utilisation. Voilà pourquoi cet ouvrage est intitulé Vivre à nu ; il démontre que nos vies sont plus que jamais ouvertes et visibles pour les organismes et que cette visibilité a de réels effets sur chaque sphère de notre vie, que nous soyons citoyens, consommateurs, travailleurs ou voyageurs."
View online
Download
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, DNA, Digital surveillance, Facial recognition, Fingerprints, Mobile phones, Video surveillance
Type
Text
Last updated
7 May 2021
"Consejos para crear una cultura de seguridad y mantenernos lejos de las manos del estado."
Download
Origin
Friends & other activists
Topics
Digital surveillance, Hidden devices, Mobile phones, Security culture
Type
Text
Last updated
7 May 2021