Castellano · Deutsch · Ελληνικά · English · Français · Italiano · Nederlands · Português brasileiro · Pусский
The CSRC provides a searchable database of resources on the topic of counter-surveillance, with a focus on targeted surveillance against people who have things to hide. We want to help anarchists and other rebels acquire a practical understanding of the surveillance threats they may face in their struggles and in their lives. We prefer resources written by friends and understandable without prior technical knowledge.
You have something to add? A resource needs to be updated? You want to translate the website? Something else?
Contact us at csrc@riseup.net (PGP)
Contact us at csrc@riseup.net (PGP)
Language
Topic
Digital surveillance
(63)
Mobile phones
(49)
Video surveillance
(35)
DNA
(29)
Security culture
(28)
Police files
(18)
Hidden devices
(14)
IMSI catchers
(13)
Fingerprints
(10)
Direct action
(10)
Clandestinity
(8)
Targeted malware
(5)
Borders
(5)
Type
Origin
Friends in jail
(4)
Type - Blog post (60)
"In November 2021, three anarchists from Hamburg were notified that they had been put under surveillance by the Hamburg State Security Services of the Regional Criminal Police Office for two different periods of time. [...] In what follows, we want to try to give access to the information we have. Not only because we believe that this information can be useful - but also to experiment with a collective way of dealing with the turmoil of such attacks and intrusions."
View online
Other languages
(de) Observationen gegen Anarchist*innen"Im November 2021 erhielten drei Hamburger Anarchist*innen die Benachrichtigung, in zwei verschiedenen Zeiträumen vom Hamburger Staatsschutz des LKAs observiert worden zu sein. [...] Wir wollen im Folgenden versuchen, einen Einblick in die uns vorliegenden Informationen zu geben. Nicht nur weil wir denken, dass die Informationen hilfreich sein können - sondern auch, um mit einem kollektiven Umgang mit der Betroffenheit von solchen An- und Eingriffen zu experimentieren."
View online
"En novembre 2021, trois anarchistes de Hambourg ont reçu la notification qu’ielles avaient été mis-e-s sous surveillance par les services hambourgeois de Sûreté de l’État de l’Office régional de la police criminelle pendant deux périodes de temps différentes. [...] Dans ce qui suit, nous voulons tenter de donner un accès aux informations dont nous disposons. Non seulement parce que nous pensons que ces informations peuvent être utiles - mais aussi pour expérimenter une manière collective d’aborder le trouble que suscitent de telles attaques et intrusions."
View online
Origin
Friends & other activists
Topics
Physical surveillance, Security culture
Type
Blog post
Date added
16 February 2022
"There are several ways to do this (which are far from being exhaustive, let's be creative): attacking the camera, opening the hatch, attacking cables."
Download
Other languages
(fr) Détruisons les caméras"Pour cela il existe plusieurs moyens (qui sont loin d’être exhaustifs, soyons créatifs) : s’attaquer à la camera, ouvrir la trappe, s'attaquer aux câbles."
Download
View online
Origin
Friends & other activists
Topics
Direct action, Video surveillance
Types
Blog post, Poster
Date added
16 February 2022
Advice from CSRC: if you're interested in this resource, you might also be interested in Never turn off the phone: A new approach to security culture.
"Scrivo dopo aver letto con grande interesse l’articolo "Non spegnere mai il telefono". [...] Ecco, non voglio necessariamente porre una critica allo scritto, ma anzi fornire così un ulteriore spunto di riflessione. Io direi che, piuttosto che non spegnere mai il telefono, forse converrebbe non averlo acceso mai..."
Download
View online
Origin
Friends & other activists
Topics
Mobile phones, Security culture
Type
Blog post
Date added
1 December 2021
"It all starts with a first meeting: they are offered a job, money or accommodation in exchange for information. They are told that they will be able to speed up their administrative procedures, and that they will be slowed down if they refuse. Under pressure, this person thus put his finger in the gears and agreed to go to regular meetings with plainclothes cops in a park near the police station."
Other languages
(de) Besançon (Doubs, Frankreich): Es gibt nicht nur ihre Techno-Überwachungswerkzeuge in unserem Leben, es gibt auch noch die Snitches"Alles beginnt mit einem ersten Treffen: man bietet ihm Arbeit an, Geld oder eine Wohnung im Austausch für Informationen. Man stellt ihm eine schnellere Bearbeitung seiner Anträge in Aussicht, und diese umgekehrt zu verzögern, sollte er sich weigern. Unter Druck gesetzt hat er zugestimmt sich zu regelmäßigen Treffen mit Zivis in einem Park in der Nähe des Kommissariats zu begeben."
(fr) Besançon (Doubs) : Y a pas que leurs outils de techno-surveillance dans nos vies, y a les poukaves aussi
"Tout commence par un premier rendez-vous : on lui propose un travail, de l’argent ou un logement en échange d’informations. On lui fait miroiter une accélération dans ses démarches administratives, et à l’inverse de les freiner en cas de refus. Mise sous pression, cette personne a ainsi mis le doigt dans l’engrenage et accepté de se rendre à des rendez-vous réguliers avec des flics en civil dans un parc, près du commissariat."
View online
Origin
Friends & other activists
Topic
Infiltrators and informants
Type
Blog post
Date added
17 September 2021
"An evaluation of the observation and surveillance of the three anarchists convicted in the so-called "Parkbank trial"."
Download
View online
Other languages
(de) Observationen und andere Ärgernisse"Eine Auswertung zu Observation und Überwachung gegen die drei im sogenanten „Parkbank-Verfahren“ veurteilten Anarchist_innen."
View online
"Une analyse de la mise sous observation et de la surveillance des trois anarchistes condamné-e-s dans le dit « Procès du banc-public »."
View online
"Un’analisi delle tecniche di indagine e di sorveglianza utilizzate contro i tre compagni anarchici condannati nel caso "Parkbank"."
Origin
Friends & other activists
Topics
Digital surveillance, Hidden devices, Physical surveillance, Video surveillance
Type
Blog post
Date added
3 September 2021
2002-?
by Datenschutzgruppe der Roten Hilfe Heidelberg
"Eine Sammlung von Essays über Computer, Repression und Datenschutz."
View online
Origin
Friends & other activists
Topic
Digital surveillance
Type
Blog post
Date added
7 August 2021
"An einem Aktionsort wurde ein Rucksack gefunden, der von den Bullen durch den Inhalt der Aktion zugeordnet wurde. Wir wollen zeigen, welchen Aufwand die Bullen betrieben, um heraus zu bekommen wo dieser Rucksack gekauft wurde. Die Aktion war ein Feuer, mit großem Sachschaden. Der Ermittlungsdruck in diesem Fall war sehr hoch, daher auch der große Aufwand der Ermittlungen."
View online
Origin
Friends & other activists
Topic
Physical surveillance
Type
Blog post
Date added
5 August 2021
"Wir dokumentieren an dieser Stelle einen Rechercheartikel [...] zur Enttarnung eines V-Manns der Staatsschutzbehörden NRW, der in den 1990iger über Jahre in Wuppertal und Solingen in der linken Szene aktiv war. Die Wahrheit wird uns nicht davonlaufen!"
Origin
Friends & other activists
Topic
Infiltrators and informants
Type
Blog post
Date added
5 August 2021
"This text tries to come to terms with the events surrounding the repression case in Zurich, in which a former anarchist fellow directed suspicion towards other people in his environment in order to clear himself. It is about repression, betrayal and other abysses."
Other languages
(de) Zurück bleiben Trauer, Wut und Unverständnis"Dieser Text versucht die Geschehnisse rund um den Repressionsfall in Zürich aufzuarbeiten, bei dem ein ehemaliger anarchistischer Gefährte gegenüber der Staatsanwaltschaft den Verdacht auf andere Leute in seinem Umfeld gelenkt hat, um sich selbst zu entlasten. Es geht um Repression, Verrat und andere Abgründe."
View online
"Questo testo cerca di affrontare gli eventi inerenti il caso di repressione a Zurigo in cui un ex compagno anarchico ha diretto i sospetti su altre persone del suo ambiente per scagionare se stesso. Si tratta di repressione, infamia ed altri abissi."
Origin
Friends & other activists
Topic
Infiltrators and informants
Type
Blog post
Date added
5 August 2021
by Evade la vigilancia (evade.noblogs.org)
"OpenStreetMap (OSM) es un proyecto que surge el año 2004 como respuesta a las restricciones legales, económicas y técnicas que presentan los mapas privativos. El objetivo de OSM es crear y poner a disposición de las personas mapas gratuitos bajo licencias abiertas [...]. Las posibilidades que ofrece OSM son casi ilimitadas [...], pudiendo encontrar iniciativas tales como el mapeo de la ubicación de fuentes de agua potable, los arboles en las ciudades o incluso, y lo que nos importa en este caso, la vigilancia. En este sentido, es posible mapear la ubicación de cámaras de vigilancia [...], lectores automáticos de placas patentes y de casetas o guardias de seguridad."
Origin
Friends & other activists
Topic
Video surveillance
Type
Blog post
Date added
26 July 2021
by Evade la vigilancia (evade.noblogs.org)
"Hace algunas semanas se reportaba en la Provincia de Arauco el avistamiento de aviones militares sobrevolando constantemente el territorio, finalmente se pudo identificar el avión como un CASA C-295 Persuader. A esto se suma que desde el mes de mayo se registran vuelos del drone Hermes 900 de la Fuerza Aérea sobre la ciudad de Temuco, pero ya desde el año 2014 comunidades mapuche vienen denunciando el uso de aeronaves no tripuladas para vigilar el Wallmapu. Debido a esto decidimos escribir esta entrada que recopila diversos drones de categoría militar que poseen las distintas ramas de las fuerzas armadas junto a los drones civiles más utilizados para tareas de vigilancia."
Origin
Friends & other activists
Topic
Aerial surveillance
Type
Blog post
Date added
26 July 2021
"A few days ago in Italian prisons commenced the collection of samples destined to compose the National Archive for DNA, an institution run under the Minister of Internal Affairs who is busy compiling the genetic profile of all the individuals incarcerated, investigated, arrested or detained, along with the DNA found on crime scenes. [...] DNA as a piece of evidence, is presented as if it were definitive, irrefutable, synonym of absolute truth."
Download
Other languages
(fr) Le monde dans un crachat"Il y a quelques jours a commencé dans les prisons italiennes le prélèvement d’échantillons destinés à établir l’Archive Nationale de l’ADN, une institution soumise au contrôle du Ministère des Affaires Intérieures qui est occupé de rassembler le profil génétique de tous les individus sous investigation, inculpés, arrêtés ou en garde à vue, ainsi que l’ADN trouvé sur les scènes de crimes. [...] L’ADN en tant qu’élément de preuve est présenté comme si il était définitif, irréfutable, synonyme de vérité absolue."
View online
"Alcuni giorni fa nelle carceri italiane sono iniziati i prelievi destinati a costituire l'Archivio Nazionale dei Dna, istituto di competenza del Ministero degli Interni che raccoglierà i profili genetici di tutte le persone detenute, indagate, arrestate o fermate, assieme ai Dna ritrovati sui luoghi del delitto. [...] La prova del Dna viene presentata come se fosse definitiva, irrefutabile, sinonimo di verità assoluta."
View online
Origin
Friends & other activists
Topics
DNA, Police files
Types
Blog post, Zine
Date added
25 July 2021
2020
by CrimethInc (crimethinc.com)
"This step-by-step guide explains how to protect yourself from online stalkers, why it is important, and what to do if you are targeted for “doxxing”—the publishing of your private information. In a era of universal surveillance, when livestreamers broadcast every major demonstration while fascists, FBI agents, and police officers comb through social media posts to gather intelligence with which to harass activists, there has never been a better time to take steps to secure your privacy. Here’s how."
Download
Other languages
(it) Doxcare: Prevenzione e follow-up per chi viene preso di mira da doxxing e persecuzioni politiche"Questa guida dettagliata spiega come proteggersi dagli stalker online, perché è importante e cosa fare se si è presi di mira dal “doxxing,” ovvero la pubblicazione delle proprie informazioni riservate. In un’epoca di sorveglianza universale, quando i livestreamer trasmettono tutte le principali manifestazioni mentre fascisti, agenti dell’FBI e agenti di Polizia setacciano i post sui social per raccogliere informazioni con cui perseguitare gli attivisti, non c’è mai stato un momento migliore per prendere provvedimenti per proteggere la tua privacy. Ecco come fare."
(pt) Doxcare: Prevenção e Redução de Danos para Pessoas que Foram Alvo de Doxxing e Assédio Político
"Esse guia passo-a-passo explica como se proteger de assediadores online, porque isso é importante e o que fazer se você for alvo de “doxxing” – a compilação e publicação de suas informações pessoais, muitas vezes seguidas de intimidações e ataques. Em uma era de vigilância universal, onde pessoas transmitem ao vivo toda manifestação minimamente grande enquanto fascistas, agentes de inteligência e da polícia passam um pente fino pelas postagens em redes sociais para juntar informações com a qual possam assediar ativistas, nunca houve momento melhor para tomar medidas para garantir sua privacidade. Aqui está como você pode fazer isso."
Origin
Friends & other activists
Topic
Digital surveillance
Type
Blog post
Date added
21 July 2021
by Zündlumpen (zuendlumpen.noblogs.org)
"Ein kleiner Überblick über Methoden der modernen Forensischen Linguistik zur Autorschaftsbestimmung. Der folgende Artikel versucht aus einer nicht fachlichen Perspektive einen Überblick über behördlich angewandte Methoden der Autorschaftsbestimmung bei Bekenner*innenschreiben und anderen Texten zu geben und eine entsprechende Einordnung vorzunehmen."
Origin
Friends & other activists
Topic
Digital surveillance
Type
Blog post
Date added
21 July 2021
by CrimethInc (crimethinc.com)
"The goal of the bloc as a tactic is to have everyone look as similar as possible, so that, ideally, no single individual can be identified within the anonymous mass. This helps to keep everybody safer."
Other languages
(id) Tips Berpakaian bagi Para Pemberani yang Keren"Blok sebagai taktik bertujuan untuk membuat setiap orang terlihat semirip mungkin, sehingga, idealnya, tidak ada satu individu pun yang dapat teridentifikasi dalam massa yang anonim. Ini membantu semua orang menjadi lebih aman."
(pt) Dicas de Moda Para Pessoas com Coragem
"O objetivo do bloco como uma tática é fazer com que todos pareçam o mais semelhante possível, de modo que, idealmente, nenhum indivíduo possa ser identificado dentro da massa anônima. Isso ajuda a manter todo mundo mais seguro."
Origin
Friends & other activists
Topics
Physical surveillance, Video surveillance
Type
Blog post
Date added
11 July 2021
Advice from CSRC: if you're interested in this resource, you might also be interested in How Law Enforcement Gets Around Your Smartphone's Encryption.
"La nouvelle a fait grand bruit : la police va se doter sous peu de boîtiers qui seraient capables de rentrer dans virtuellement n’importe quel smartphone, aussi protégé soit-il. Cet appareil nommé le « kiosk » [...] permettrait de brancher n’importe quel appareil et d’en extraire les informations en quelques minutes, sans compétence informatique particulière. [...] Dans les faits, les choses sont plus compliquées."
Origin
Friends & other activists
Topic
Mobile phones
Type
Blog post
Date added
11 July 2021
"Es gibt praktische keine „Umweltveränderung“ (Bürger*innen nennen es Straftat), die keine Spuren hinterlässt. Und die können inzwischen von Kriminaltechniker*innen bzw. Wissenschaftler*innen in der Regel zum „Sprechen“ gebracht werden. Am Ort des Geschehens wie auf dem Rückweg."
View online
Origin
Friends & other activists
Topic
Other physical traces
Type
Blog post
Date added
9 July 2021
"A guide to putting Toulouse’s cameras into early retirement. This guide only deals with methods of destroying camera cabling. To destroy the camera itself you have to knock down the mast or climb to the top to break the camera, this requires heavy and cumbersome equipment (disk cutter, ladder...) and is therefore another story."
Other languages
(fr) Moudenc nous surveille : crève lui les yeux"Un guide pour mettre les caméras toulousaines en retraite anticipée. Ce guide ne traite que de méthodes visant à détruire le cablage des caméras, pour détruire la caméra elle même il faut abattre le mat ou grimper en hauteur pour péter l'optique, ça nécessite du matériel lourd et encombrant (disqueuse, échelle...) et c'est donc une autre histoire."
Origin
Friends & other activists
Topics
Direct action, Video surveillance
Type
Blog post
Date added
8 July 2021
"La charla está dividida en tres fases: antes, durante y después de una manifestación. Aunque está bastante orientado a una manifestación ilegal o tensa de por si, sería importante incorporar todo eso de forma más o menos automática para ir a cualquier tipo de marcha (al menos las cuestiones más básicas) como forma de integrarlo en nuestro día a día y porque a veces una manifestación legalizada y pacífica se convierte en algo distinto."
Origin
Friends & other activists
Topic
Security culture
Type
Blog post
Date added
13 May 2021
"We need to stress the importance of choosing your "friends" wisely. As we have seen, even cell members can turn into informers when the heat is on and fear has taken over their reasoning. Here are a few words on how to better choose the people that you take action with."
Origin
Friends & other activists
Topics
Direct action, Security culture
Type
Blog post
Date added
12 May 2021
by RTMARK
"All methods described in this guide have been thoroughly tested in practice."
Origin
Friends & other activists
Topics
Direct action, Video surveillance
Type
Blog post
Date added
12 May 2021
Warning from CSRC: we consider this resource to be partly outdated, but we think it can still be useful. Please take it with caution.
by Michael Naimark
"If a camera's location is known, and can be seen, and is stationary, a tripod/rifle scope/gun sight laser system can successfully zap it, even at distances greater than 100 meters. If a camera is roving, a golf scope/gun sight laser can intermittently zap it by hand with little effort."
Origin
Independent researchers
Topic
Video surveillance
Type
Blog post
Date added
12 May 2021
Unknown date
"This article will show you the tricks that federal, state and local investigators use to encourage you to give up your right to remain silent. It is intended to prepare you for their underhanded ways while stressing the importance of not talking or trying to deceive them."
Origin
Friends & other activists
Topic
Security culture
Type
Blog post
Date added
12 May 2021
by Diego Rios
"As many now know, the police entered the home of my mother in the centre of Santiago where they found two bags with diverse materials for building explosives. Since that moment I have been searched for and pursued by the state and its repressive apparatus."
Download
Other languages
(es) Comunicado del compañero clandestino Diego Rios"Como ya muchos sabrán, hace unas semanas atrás, la policía allano un domicilio particular deshabitado en el centro de santiago, propiedad de mi madre, en el que se encontraban guardados dos bolsos con diversos materiales para fabricar explosivos. Desde aquel momento estoy siendo buscado y perseguido por el estado y sus aparatos represivos."
View online
"Comme beaucoup le savent déjà, il y a quelques semaines la police a perquisitionné dans le centre de Santiago une maison inoccupée appartenant à ma mère, dans laquelle se trouvaient deux sacs contenant divers matériels pour fabriquer des explosifs. Depuis lors, je suis recherché et poursuivi par l’État et ses appareils répressifs."
View online
Origin
Friends & other activists
Topic
Clandestinity
Types
Blog post, Zine
Date added
7 May 2021
"The keylogger was a proper bug, sent to my PC via internet through a virus, and it was capable of intercepting everything around my computer. It was sufficient for the computer to be connected to the internet and the miserable ones were able to hear all audio nearby (no video because the webcam has always been blocked out). So, because I have my PC in my bedroom they listened not only to radio off-line comments but even more... everything in fact!"
View online
A few clarifications concerning a Key-logger installed in my computer
More precisions about the keylogger found in Italy
Other languages
(fr) Quelques précisions au sujet du keylogger installé sur mon ordinateur"Ce keylogger était un vrai mouchard, envoyé via internet à mon ordinateur, sous forme d’un virus, et capable de capter tout ce qui se passait autour de l’ordi. Il suffisait que l’ordinateur soit connecté à internet et les misérables flics pouvaient écouter tout l’environnement sonore dans le lieu (mais pas d’images, car la webcam a toujours été bouchée). L’ordi étant dans la chambre, ils n’ont pas seulement écouté les commentaires hors antenne, mais aussi d’autres choses... tout !"
View online
Quelques précisions au sujet du keylogger installé sur mon ordinateur
Encore des précisions à propos du keylogger retrouvé en Italie
"Il keylogger era una vera e propria microspia, inviata tramite rete sotto forma di virus al mio PC, capace di rilevare tutto quello che si trovava nelle vicinanze del computer. Bastava che il PC fosse collegato alla rete internet e i miserabili ascoltavano tutto l’audio dell’ambiente (il video no, perché la webcam è sempre stata tappata). Quindi, avendo il PC in camera da letto non hanno ascoltato solo i commenti fuori onda della radio ma anche altro... anzi tutto!"
Origin
Friends & other activists
Topics
Digital surveillance, Targeted malware
Type
Blog post
Date added
7 May 2021
"Προσπαθήσαμε να εξηγήσουμε όσο πιο συνοπτικά και περιληπτικά γινόταν, τις μεθόδους που χρησιμοποιεί η αστυνομία για ένα forensic έλεγχο σε υπολογιστές καθώς και για τις μεθόδους υποκλοπών που χρησιμοποιεί για την κινητή τηλεφωνία. [...] Προσπαθήσαμε επίσης να προσφέρουμε κάποιες λύσεις που είτε θα καταστήσουν τις forensic μεθόδους άχρηστες, είτε θα τις καθυστερήσουν σε μεγάλο βαθμό."
View online
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones
Type
Blog post
Date added
7 May 2021
"Παρακολούθηση για τις αρχές και το παρακράτος σημαίνει να ελέγχονται συστηματικά αλλά και αποσπασματικά οι κινήσεις και οι ενέργειες προσώπων ή ομάδων, χωρίς αυτοί να το γνωρίζουν ή να έχουν ενημερωθεί σχετικά. Αντιπαρακολούθηση είναι κάθε τακτική που βοηθά στο να αποφεύγεται ή να γίνεται πολύ δύσκολος ο έλεγχος μέσω της παρακολούθησης."
View online
Origin
Friends & other activists
Topics
Mobile phones, Physical surveillance, Video surveillance
Type
Blog post
Date added
7 May 2021
by CrimethInc (crimethinc.com)
"I climbed up the fire escape onto the air conditioner and finally to the roof. I crept up behind the camera, grabbed it with both hands, twisted it from its bracket, and snipped the wire with my clippers. Having never done this before, I wasn’t sure if some silent alarm was going off or if somebody watching a screen somewhere had just had their creep-fest interrupted, so I hastily shoved the camera and clippers in my bag and retreated to my bike."
Other languages
(es) Cegando a los Cíclopes: Cazando Cámaras en la Metrópolis"Subí la escalera de incendios al acondicionador de aire y finalmente al techo. Me arrimé detrás de la cámara, la agarré con ambas manos, la retiré de su soporte y corté el cable con mis cortadores de alambre. Como nunca antes había hecho esto, no estaba seguro de si una alarma silenciosa estaba sonando o si alguien mirando una pantalla en algún lugar justo había experimentado una interrupción, así que metí la cámara y las tijeras en mi mochila y me retiré a mi bicicleta."
"Mi sono arrampicata sulla scala antincendio sul condizionatore d’aria e, infine, sul tetto. Sono scivolata alle spalle della telecamera, l’ho afferrata con entrambe le mani, l’ho girata sulla sua staffa e ho tagliato il filo con il mio tronchese. Non avendolo mai fatto prima, non ero sicura se qualche allarme silenzioso si sarebbe attivato o se qualcuno che guardasse uno schermo da qualche parte avesse appena dovuto interrompere il proprio festival-del-brivido, quindi ho sbattuto in fretta telecamera e forbici nella mia borsa e mi sono diretta verso la bici."
Origin
Friends & other activists
Topics
Direct action, Video surveillance
Type
Blog post
Date added
7 May 2021
by Elle Armageddon
"A burner phone is a single-use phone, unattached to your identity, which can theoretically be used to communicate anonymously in situations where communications may be monitored. Whether or not using a burner phone is itself a “best practice” is up for debate, but if you’ve made the choice to use one, there are several things you should keep in mind."
Other languages
(el) Οι καλύτερες πρακτικές για την χρήση καρτοκινητών"Ένα καρτοκινητό είναι ένα κινητό μίας χρήσης όπου θεωρητικά χρησιμοποιείται ανώνυμα σε περιπτώσεις που οι επικοινωνίες μπορεί να παρακολουθούνται. Παρόλο που υπάρχουν αρκετές αμφιβολίες για το εάν η χρήση τους είναι σωστή ή όχι, εάν πήρες την απόφαση να χρησιμοποιήσεις ένα υπάρχουν κάποια πράγματα τα οποία ίσως χρειαστεί να σκεφτείς."
Download
"Un téléphone jetable (en anglais burner phone) est un téléphone à usage unique qui n’est pas relié à ton identité et peut théoriquement être utilisé pour communiquer de manière anonyme dans les situations où tes communications sont susceptibles d’être surveillées et interceptées. Leur utilisation même fait débat et n’est pas nécessairement une « bonne pratique », mais si tu fais le choix d’en utiliser un, il faut prêter attention à quelques points précis."
Origin
Friends & other activists
Topics
IMSI catchers, Mobile phones
Types
Blog post, Zine
Date added
7 May 2021
"В политически нестабильных странах очень часто прессуют журналистов, правозащитников и простых активистов. Порой приходят с обысками, изымают технику – и через определённое время, как правило, возвращают. Многие из-за паранойи вынуждены впоследствии её продавать и покупать новое железо, так как не исключают вживления в устройства аппаратных бекдоров. Особенно напрягает менять устройства, когда такая практика их изъятия – систематическая. Но к сожалению, это вынужденная и правильная мера. Хочу рассказать почему."
Origin
Friends & other activists
Topic
Digital surveillance
Type
Blog post
Date added
7 May 2021
2015-2016
by Lukáš Borl
"The phase of my public activities reached the top, now it ́s time for the phase of hiding. After long reasoning and considering the present context I decided to disappear from the eyes of the state control. At present I think it ́s the only possible way I know of to protect myself against the crushing hit of repressions. Now I will try to outline the context and reasons that led me to this decision."
Download
Other languages
(cz) Zmizení z dohledu státní moci: Lukáš Borl"Fáze veřejného působení u mě dosáhla vrcholu. Teď přichází fáze skrývaček. Po dlouhých úvahách a s ohledem na současný kontext jsem se rozhodl vytratit z dohledu státní moci. V současnosti v tom spatřuji jediný možný způsob jak ochránit sám sebe před zničujícím úderem represe. Pokusím se nyní nastínit souvislosti a důvody, proč jsem k tomu dospěl."
View online
Zmizení z dohledu státní moci
Potvrzeno: Lukáš Borl v hledáčku policie
Vyjádření k mému zatčení
Origin
Friends & other activists
Topic
Clandestinity
Types
Blog post, Zine
Date added
7 May 2021
"Dozens of Amazon Ring and Google Nest surveillance cameras were removed and destroyed this week from residential neighborhoods in Portland (United States) during nighttime walks. [...] Removing these cameras is an easy and direct way to attack the reach of corporate and state surveillance, helping to keep folks safe from steadily rising techno-authoritarianism."
Other languages
(fr) Des sonnettes-caméras de surveillance enlevées et détruites"Des dizaines de caméras de surveillance « Amazon Ring » et « Google Nest » ont été enlevées et détruites cette semaine, lors de promenades nocturnes dans les quartiers résidentiels de Portland (États-Unis). [...] Retirer ces caméras est un moyen facile et direct de s’en prendre à l’emprise de la surveillance des entreprises et de l’État, en contribuant à protéger les gens de la montée constante du techno-autoritarisme."
Origin
Friends & other activists
Topics
Direct action, Video surveillance
Type
Blog post
Date added
7 May 2021
by Lily Hay Newman for Wired (wired.com)
"Lawmakers and law enforcement agencies around the world, including in the United States, have increasingly called for backdoors in the encryption schemes that protect your data, arguing that national security is at stake. But new research indicates governments already have methods and tools that, for better or worse, let them access locked smartphones thanks to weaknesses in the security schemes of Android and iOS."
Download
Origin
Independent researchers
Topic
Mobile phones
Types
Blog post, Zine
Date added
7 May 2021
by Joseph Steinberg (josephsteinberg.com)
"Today, I am sharing some tips on how to prevent yourself from being recognized by facial recognition systems. I have personally utilized some of these techniques in test environments - and they worked. Others I have seen demonstrated."
Origin
Independent researchers
Topics
Facial recognition, Video surveillance
Types
Blog post, Zine
Date added
7 May 2021
"[A] shotgun is your best bet at taking down a drone. Preferably one loaded with the largest spread ammunition you can find. [...] Of course not all methods of taking out a drone need to involve literal firearms. [...] Paintballs are a no-go. [...] Airsoft guns and other plastic-pellet guns are worthless. [...] Slingshots will likely work - again, assuming you can hit. [...] Last but not least, you never want to underestimate the power of just throwing crap. A rock, a baseball, anything you can fling straight, accurate, and fast."
Origin
Independent researchers
Topic
Aerial surveillance
Types
Blog post, Zine
Date added
7 May 2021
"Chceš vědět jaké existují typy kamer, které nás šmírují a jak je vyřadit z provozu? Čti dále."
Other languages
(ru) Саботаж камер видеонаблюдения"Вы хотите знать, какие виды камер существуют, которые следят за нами, и как вывести их из строя? Давайте рассмотрим."
View online
Origin
Friends & other activists
Topics
Direct action, Video surveillance
Type
Blog post
Date added
7 May 2021
"Представьте себе такую ситуацию: аноним звонит с одноразового телефона и шантажирует или требует выкуп за похищенного им человека. Через несколько дней преступник звонит повторно. Жертва звонит в полицию, и уже через час сотрудники определяют не только реальный номер злоумышленника, но и всю историю его переменивший и входящих и исходящих звонков. И все это без сложной аппаратуры и техники, поддельных базовых станций и перехвата сигнала."
Origin
Friends & other activists
Topic
Mobile phones
Type
Blog post
Date added
7 May 2021
by Security Lab (securitylab.ru)
"Если, например, вы подозреваете соседа в подключении к вашей Wi-Fi сети и не можете удостовериться в своих догадках, приведенная техника может помочь в сборе доказательств."
View online
Origin
Independent researchers
Topic
Digital surveillance
Type
Blog post
Date added
7 May 2021
"В сегодняшней статье я расскажу о способах обхода блокировок Tor. Но прежде чем перейдем к методам блокировки Tor, давайте немного о том, как блокируют Tor."
View online
Origin
Friends & other activists
Topic
Digital surveillance
Type
Blog post
Date added
7 May 2021
"Вы не поверите: по “ведущему” телефону - Вашему настоящему. Внимательно прочитав следующий абзац, Вы поймёте, как всё легко, просто и быстро. Итак, поехали, рассмотрим разные ситуации."
Origin
Friends & other activists
Topic
Mobile phones
Type
Blog post
Date added
7 May 2021
by La Quadrature du Net et Next INpact
"Deux articles publiés fin 2019 sur l’usage des fichiers de police pour utiliser la reconnaissance faciale : "La reconnaissance faciale des manifestant.e.s est déjà autorisée" et "Quand la France se lance dans la reconnaissance faciale"."
Download
View online
La reconnaissance faciale des manifestant.e.s est déjà autorisée
Quand la France se lance dans la reconnaissance faciale
Origin
Independent researchers
Topics
Facial recognition, Police files, Video surveillance
Type
Blog post
Date added
7 May 2021
"Desde hace unos cuantos años, con la introducción de los smartphones y la tecnología a unos niveles muy altos, nos hemos sumido en una dinámica casi incuestionable en cuanto al uso que le damos a estos aparatos, al motivo por el cual lo usamos en tales o cuales situaciones, la dependencia que puede generar, el efecto o sensación que transmite, la utilidad, la peligrosidad, etc. [...] A nosotros nos gustaría abordar [este debate] desde esta [...] visión: cómo el uso de los teléfonos móviles, las grabaciones, las cámaras y la posterior publicación de este material nos puede afectar o beneficiar para nuestra actividad política y en la calle."
Origin
Friends & other activists
Topic
Security culture
Type
Blog post
Date added
7 May 2021
by BYPOL - бывшие сотрудники полиции (t.me/s/by_pol)
"В помощь беларусам по безопасному использованию мобильных телефонов, мессенджеров и сети Интернет BYPOL подготовил краткую инструкцию как сохранить свою конфиденциальность."
View online
Origin
Independent researchers
Topics
Digital surveillance, Mobile phones
Type
Blog post
Date added
7 May 2021
by Martin Shelton for Freedom of the Press Foundation (freedom.press)
"Concerned about the privacy and security of your communications? Follow our guide to locking down Signal."
View online
Origin
Independent researchers
Topic
Mobile phones
Type
Blog post
Date added
7 May 2021
"To je smyslem Černorudé příručky - podpořit v nás sebevědomí, zmenšit náš strach a zároveň přiložit další kámen do pevnosti s názvem bezpečnostní kultura. Nejde přitom jen o jednotlivce, důsledný musí být každý jeden z nás. Pokud všichni budeme pevní a důslední, pak se výrazně sníží riziko, že budeme chyceni a nakonec rozbiti jako celek."
View online
Origin
Friends & other activists
Topics
DNA, Digital surveillance, Direct action, Fingerprints, Hidden devices, Infiltrators and informants, Mobile phones, Physical surveillance, Security culture
Types
Blog post, Website
Date added
7 May 2021
Advice from CSRC: if you're interested in this resource, you might also be interested in A proposito di meta-dati e telefoni spenti.
"In the 80s, an anarchist who wanted, for example, to burn some building, developed his/her plan and at the same time looked to see if there were no listening devices in his/her house. In the late 90s, the same anarchist turned off the phone and used encrypted traffic on the Internet. In the 2020s, we need to reconsider our strategy, intelligence gathering has improved and we must also take this into account."
Other languages
(es) No apagues tu teléfono. Una revisión de nuestras pautas de seguridad"En los años 80, un anarquista que quisiera realizar una acción directa ilegal, desarrollaba su plan y al mismo tiempo comprobaba que no hubiera dispositivos de escucha en su casa. En los 90, el mismo anarquista apagaba su teléfono y usaba criptografía para comunicarse por internet. En la década de 2020, tenemos que reconsiderar nuestra estrategia, los servicios de inteligencia han mejorado su capacidad de recolección de datos y debemos tenerlo en cuenta."
"Dans les années 80, un/e anarchiste qui voulait, par exemple, mettre le feu à un bâtiment, élaborait son plan et en même temps elle/il regardait s’il n’y avait pas de dispositifs d’écoute chez lui/elle. A la fin des années 90, le/la même anarchiste éteignait le téléphone et utilisait des messages cryptés sur internet. Dans les années 2020, il nous est nécessaire de repenser notre stratégie : la collecte d’informations s’est améliorée et nous devons tenir compte aussi de cela."
(it) Non spegnere mai il telefono: un nuovo approccio ai procedimenti preventivi
"Negli anni 80, un/a compagno/a che voleva per esempio, dare fuoco a una struttura, elaborava il suo piano e nello stesso momento faceva attenzione a qualsiasi apparecchio d’ascolto che ci potesse essere a casa sua. Alla fine degli anni 90, lo/la stesso/a compagno/a spegneva il telefono e utilizzava dei messaggi criptati su Internet. Negli anni 2020, è necessario ripensare la nostra strategia: la raccolta di informazioni si è evoluta e dobbiamo tenerne certamente conto."
Download
View online
"В 80е годы анархист, который хотел, к примеру, сжечь какое-нибудь здание, разрабатывал свой план и при этом смотрел, нет ли у него дома подслушивающих устройств. В конце 90х тот же самый анархист выключал телефон и пользовался шифрованием трафика в интернете. В 2020е нам надо снова пересмотреть свою стратегию, сбор разведданных усовершенствовался и мы также должны это учитывать."
Origin
Friends & other activists
Topics
Mobile phones, Security culture
Type
Blog post
Date added
7 May 2021
by Théorie du contexte (theorieducontexte.wordpress.com)
"Γεννιόμαστε με τα δακτυλικά μας αποτυπώματα και δεν μπορούμε ποτέ να απαλλαγούμε απ’ αυτά. Όποτε αγγίζουμε κάτι με τα ακροδάχτυλά μας, αφήνουμε πίσω τα "επισκεπτήρια" μας. Η αστυνομία δυσκολεύεται να "σηκώσει" τα αποτυπώματά μας, ανάλογα με την επιφάνεια στην οποία βρίσκονται."
Download
Στις σελίδες 7-11 του πρώτου τεύχους του περιοδικού "Théorie du contexte"
View online
Origin
Friends & other activists
Topics
DNA, Digital surveillance, Fingerprints, Other physical traces, Video surveillance
Types
Blog post, Zine
Date added
7 May 2021
(de/en/es/fr/it) On the tightrope: Contributions and considerations from and for the anarchic combat
2020
by Francisco Solar
"This text aims to contribute to the development and deepening of the informal anarchic combat, taking into consideration the increasingly specialized technological advances of control and surveillance of the population in general and, specially, of those who venture to rebel against what is established."
Other languages
(de) Auf dem Drahtseil: Beiträge und Überlegungen aus und für den anarchistischen Kampf"Dieser Text versucht ein Beitrag zur Entwicklung und Vertiefung des anarchistischen informellen Kampfes zu sein, wobei die technologischen Fortschritte betrachtet werden, die sich immer mehr auf die Kontrolle und Überwachung der Bevölkerung allgemein und vor allem derer, die sich darauf einlassen gegen das Bestehende zu rebellieren, spezialisieren."
(es) En la cuerda floja: Aportes y consideraciones desde y para el combate anárquico
"Este texto pretende ser un aporte al desarrollo y a la profundización del combate anárquico informal tomando en consideración los avances tecnológicos cada vez más especializados en el control y la vigilancia, de la población en general y sobretodo hacia quienes se aventuren a rebelarse contra lo establecido."
(fr) Sur la corde raide : Contributions et considérations à partir du et pour le combat anarchiste
"Ce texte se veut une contribution au développement et à l’approfondissement du combat anarchiste informel en prenant en compte les avancées technologiques toujours plus spécialisées dans le contrôle et la surveillance, de la population en général et surtout envers celles et ceux qui s’aventurent à se rebeller contre l’ordre établi."
(it) En la cuerda floja: Spunti e considerazioni da e per lo scontro anarchico
"Questo testo vuole essere un apporto allo sviluppo e all’ approfondimento della lotta anarchica informale, prendendo in considerazione gli sviluppi tecnologici sempre più specializzati nel controllo e nella sorveglianza della popolazione in generale e sopratutto nei confronti di chi si avventura a ribellarsi contro l’ordine stabilito."
Origins
Friends & other activists, Friends in jail
Topics
Clandestinity, Direct action
Type
Blog post
Date added
7 May 2021
by Michele Gretes for the Civil Liberties Defense Center (cldc.org)
"Here, we take a look at easy-to-use ProtonMail - and why we the CLDC can’t recommend it (or its security model) for people opposing the powerful."
Download
Updated article with comments from the CSRC (2021) - PDF - 78.6 KB - 4 pages
View online
Original article (2017) - cldc.org/protonmail
Origin
Independent researchers
Topic
Digital surveillance
Types
Blog post, Zine
Date added
7 May 2021
"Μια πρώτη προσέγγιση της παρακολούθησης κινητών τηλεφώνων από τους χρήστες, τους κρατικούς και τους παρακρατικούς μηχανισμούς."
View online
Origin
Friends & other activists
Topic
Mobile phones
Type
Blog post
Date added
7 May 2021
"В беларуском обществе все больше обсуждается деятельность компании Synesis и проект Kipod. Kipod – это облачная платформа для умного города на основе технологий AI и Big Data, основанная на применении искусcтвенного интеллекта и предназначенная для обработки большого объема видеоданных в режиме реального времени. Один из сотрудников компании Synesis поделился информацией о данной системе."
Origin
Friends & other activists
Topics
Automated license plate readers, Facial recognition, Video surveillance
Type
Blog post
Date added
7 May 2021
"Introduction to electronic security for activists and dissidents. [...] This text is geared towards activists and dissidents who are already self-motivated and want to be fully prepared for serious repression from authoritarian regimes. Specifically it intends to address common usecases and threats radical activists and dissidents face and answer every question commonly asked at trainings for radical activists and dissidents."
Download
View online
Origin
Friends & other activists
Topics
Digital surveillance, IMSI catchers, Mobile phones, Security culture, Video surveillance
Type
Blog post
Date added
7 May 2021
2019
"Signal is an encrypted messaging service that has been around in different forms for about 10 years. Since then, I have seen the software widely adopted by anarchist networks across Canada and the United States. More and more, for better and for worse, our interpersonal and group conversations have moved onto the Signal platform, to the extent that it has become the dominant way anarchists communicate with each other on this continent, with very little public debate about the implications."
View online
Other languages
(pt) Quando o Signal não dá conta"O Signal é um serviço de mensagens criptografadas que existe em diferentes formas há cerca de 10 anos. Desde então, tenho visto o software ser amplamente adotado por redes anarquistas no Canadá e nos Estados Unidos. Cada vez mais, para melhor e pior, nossas conversas interpessoais e em grupo passaram para a plataforma do Signal, na medida em que se tornou a maneira dominante pela qual anarquistas se comunicam neste continente, com muito pouco debate público sobre as implicações."
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones
Type
Blog post
Date added
7 May 2021
"Телефоны и телефонная связь уже давно являются рядовыми вещами в нашей повседневной жизни. И как часто случается с рядовыми повседневными вещами — сейчас сотовые телефоны (использование стационарных телефонов в вашей революционной деятельности следует исключить полностью) встроены в плотную сеть контроля, окутывающую нас со всех сторон. Уже ни для кого не секрет, что телефон — это не только удобное средство срочной связи, но и прекрасная возможность для спецслужб следить за их владельцами. Об этом сказано уже много, и многие рядовые участники анархистского движения, очевидно, уже имеют свой набор правил использования телефонов для связи с товарищами и семьей. Тем не менее, за незнанием и неследованиям некоторым правилам их использования, телефоны продолжают быть немыми свидетелями нашей деятельности и врагами культуры безопасности."
Origin
Friends & other activists
Topics
Mobile phones, Security culture
Type
Blog post
Date added
7 May 2021
by Matthias Monroy for Statewatch (statewatch.org)
"German authorities use a number of databases that collect data on political activists, even if they hadn't been sentenced or tried. Names are stored if people have had their identity checked, or if they have registered a demonstration under their name. Many are recorded under false designations. Such entries have raised concerns around them being used for further repression [...]. Discriminatory and stigmatising labels have also been applied to people whose data is held by the police."
Origin
Independent researchers
Topic
Police files
Type
Blog post
Date added
7 May 2021
Advice from CSRC: if you're interested in this resource, you might also be interested in Outrun the Bear: ProtonMail is Not for Activists.
"This article is one of a series of articles that intents on helping to establish a broader culture of security in the anarchist movement in Greece. It also intents on challenging certain behaviours that make the movement unsafe."
Other languages
(el) Παιρνοντας τις εαυτους μας σοβαρα : μειωση ψηφιακων κινδυνων"Αυτό το άρθρο είναι το πρώτο από μια σειρά άρθρων που σκοπεύουν να βοηθήσουν στη δημιουργία μιας ευρύτερης κουλτούρας ασφάλειας στον αναρχικό χώρο στην Ελλάδα. Σκοπεύει, επίσης, να αμφισβητήσει συγκεκριμένες συμπεριφορές που καθιστούν το χώρο μη ασφαλή."
Origin
Friends & other activists
Topics
Digital surveillance, Mobile phones, Security culture
Type
Blog post
Date added
7 May 2021
"We think its appropriate to publicize some information surrounding our surveillance and our subsequent arrest by the anti-terrorist cops on 30.04.2013 in Nea Filadelphia."
Other languages
(el) Κείμενο των προφυλακισμένων της Νέας Φιλαδέλφειας"Θεωρούμε σκόπιμο να δημοσιοποιήσουμε κάποιες πληροφορίες γύρω από την παρακολούθηση και ακολούθως, τη σύλληψή μας απ’ τους αντιτρομοκατικάριους στις 30.04.2013 στη περιοχή της Ν. Φιλαδέλφειας."
View online
"Pensiamo sia necessario divulgare alcune informazioni riguardo alla nostra sorveglianza e al conseguente arresto fatto dagli agenti dell’antiterrorismo il 30/4/13 a Nea Filadelfia."
Origins
Friends & other activists, Friends in jail
Topics
Clandestinity, Physical surveillance
Type
Blog post
Date added
7 May 2021
by Tor Project
"People are starting to ask us about a recent tech report from Sambuddho's group about how an attacker with access to many routers around the Internet could gather the netflow logs from these routers and match up Tor flows. It's great to see more research on traffic correlation attacks, especially on attacks that don't need to see the whole flow on each side. But it's also important to realize that traffic correlation attacks are not a new area."
Origin
Friends & other activists
Topic
Digital surveillance
Type
Blog post
Date added
7 May 2021
by Chris Jones for Statewatch (statewatch.org)
"This briefing outlines the transnational police groups, networks and organisations that are known to exist for the purpose of coordinating undercover police operations across state borders, primarily in Europe."
Origin
Independent researchers
Topics
Borders, Infiltrators and informants
Type
Blog post
Date added
7 May 2021
by CrimethInc (crimethinc.com)
"A security culture is a set of customs shared by a community whose members may be targeted by the government, designed to minimize risk. Having a security culture in place saves everyone the trouble of having to work out safety measures over and over from scratch, and can help offset paranoia and panic in stressful situations - hell, it might keep you out of prison, too."
Download
Other languages
(de) Security Culture - Deutsche Übersetzung"Eine Sicherheitskultur ist eine Reihe von Angewohnheiten, die von einer Gruppe geteilt wird. Eine Sicherheitskultur ist so entworfen, dass sie für Menschen, die vom Staat verfolgt werden könnten, das Risiko senkt geschnappt zu werden. Eine Sicherheitskultur zu haben, spart den Aufwand immer wieder bei Null anzufangen um Sicherheitsmaßnahmen auszuarbeiten. Sie kann helfen Paranoia entgegenzuwirken und in stressigen Situationen Panik zu vermeiden und sie kann euch Zeit im Knast ersparen."
Download
"La cultura de seguridad es un conjunto de costumbres compartidas por una comunidad, los miembros de la cual pueden ser objetivo del gobierno, diseñadas para minimizar el riesgo. Tener una cultura de la seguridad ahorra a todo el grupo la molestia de tener que elaborar medidas de seguridad continuamente desde cero, y puede ayudar a deshacerse de la paranoia y el pánico en situaciones estresantes - joder, podría incluso mantenerte fuera de prisión."
(fr) Cultures de la sécurité
"Une culture de la sécurité est une série d’habitudes, de coutumes partagées par une communauté dont les membres peuvent être impliqué·e·s dans des activités illégales, et dont la pratique minimise les risques encourus. Avoir mis en place une telle culture peut éviter aux membres du groupe de réinventer à chaque fois la roue en la matière, et contribue à limiter les sentiments de paranoïa et de panique dans des situations stressantes - ça peut aussi vous éviter d’aller en tôle."
Download
"Budaya Keamanan (selanjutnya disebut Security Culture) adalah serangkaian tradisi yang dihidupi bersama oleh suatu komunitas yang anggotanya memiliki kemungkinan untuk dijadikan target oleh pemerintah dan kelompok fundamentalis, suatu tradisi yang didesain untuk meminimalisir resiko. Menerapkan security culture di dalam komunitas kita membuat kita dapat terhindar dari kerja-kerja menjenuhkan untuk menakar tingkat keamanan kita lagi dan lagi yang selalu saja dimulai dari awal. Budaya ini juga dapat membantu mengimbangi paranoia dan kepanikan di dalam situasi yang penuh tekanan - yoi men, budaya ini juga bisa jadi dapat membantumu terhindar dari lembabnya sel penjara."
(pt) O que é Cultura de Segurança?
"Uma cultura de segurança é um conjunto de hábitos compartilhados por uma comunidade cujos membros possam realizar atividades ilegais, cuja prática minimiza os riscos de tais atividades. Ter uma cultura de segurança poupa a todos o trabalho de ter que decidir medidas de segurança inúmeras vezes, desde o princípio, e pode ajudar a diminuir a paranoia e o pânico em situações de estresse — diabos, ela pode salvar você da prisão também."
Origin
Friends & other activists
Topic
Security culture
Type
Blog post
Date added
7 May 2021