Resources

Below is a searchable database of resources on dealing with targeted surveillance, compiled by the Counter-Surveillance Resource Center. We want to help anarchists and other rebels acquire a practical understanding of the surveillance threats they may face in their struggles and in their lives. We prefer resources that are easy to understand and written by friends.

Contact

csrc@riseup.net (PGP)

Topic - Targeted malware (5)
by Bruce Nikkel
"Practical Linux Forensics dives into the details of analyzing postmortem images of Linux systems that were misused, abused, or attacked. You'll learn how to locate and interpret digital evidence on Linux desktops, servers, and IoT devices, and reconstruct a timeline of events after a crime or security incident."
Download
PDF
Origin
Independent researchers
Topics
Digital surveillance, Targeted malware
Type
Text
Last updated
12 December 2021
by Amnesty International Security Lab (amnesty.org/en/tech)
"Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices."
View online
Origin
Independent researchers
Topics
Digital surveillance, Mobile phones, Targeted malware
Type
Software
Last updated
22 July 2021
"The keylogger was a proper bug, sent to my PC via internet through a virus, and it was capable of intercepting everything around my computer. It was sufficient for the computer to be connected to the internet and the miserable ones were able to hear all audio nearby (no video because the webcam has always been blocked out). So, because I have my PC in my bedroom they listened not only to radio off-line comments but even more... everything in fact!"
View online
A few clarifications concerning a Key-logger installed in my computer
More precisions about the keylogger found in Italy
Other languages
(fr) Quelques précisions au sujet du keylogger installé sur mon ordinateur
"Ce keylogger était un vrai mouchard, envoyé via internet à mon ordinateur, sous forme d’un virus, et capable de capter tout ce qui se passait autour de l’ordi. Il suffisait que l’ordinateur soit connecté à internet et les misérables flics pouvaient écouter tout l’environnement sonore dans le lieu (mais pas d’images, car la webcam a toujours été bouchée). L’ordi étant dans la chambre, ils n’ont pas seulement écouté les commentaires hors antenne, mais aussi d’autres choses... tout !"
View online
Quelques précisions au sujet du keylogger installé sur mon ordinateur
Encore des précisions à propos du keylogger retrouvé en Italie
(it) Alcune precisazioni riguardo al Key-logger installato sul mio computer
"Il keylogger era una vera e propria microspia, inviata tramite rete sotto forma di virus al mio PC, capace di rilevare tutto quello che si trovava nelle vicinanze del computer. Bastava che il PC fosse collegato alla rete internet e i miserabili ascoltavano tutto l’audio dell’ambiente (il video no, perché la webcam è sempre stata tappata). Quindi, avendo il PC in camera da letto non hanno ascoltato solo i commenti fuori onda della radio ma anche altro... anzi tutto!"
Origin
Friends & other activists
Topics
Digital surveillance, Targeted malware
Type
Text
Last updated
7 May 2021
"Un bouquin pour « informer les avocats, les professionnels du droit sur les techniques d’investigation déployées par les enquêteurs et les services de renseignements ». C’est écrit par un ex-flic mais c’est intéressant."
Download
Contact: csrc@riseup.net (PGP)
Origin
Independent researchers
Topics
Digital surveillance, IMSI catchers, Mobile phones, Police files, Targeted malware
Type
Text
Last updated
7 May 2021
by Security Without Borders (securitywithoutborders.org)
"This is a somewhat comprehensive list of reports published by a number of organizations and individuals, that expose the use of targeted surveillance against members of civil society."
Origin
Independent researchers
Topics
Digital surveillance, Targeted malware
Type
Text
Last updated
7 May 2021