O Centro de materiais sobre contra-vigilância fornece uma base de dados pesquisável com materiais sobre contra-vigilância, focados em vigilância direcionada contra pessoas que têm coisas a esconder. Nosso objetivo é ajudar anarquistas e outros rebeldes a compreenderem melhor as ameaças de vigilância que poderão enfrentar no curso de suas lutas e vidas. Demos preferência para materiais escritos por amizades e que sejam compreensíveis sem um conhecimento técnico prévio.

Contato

Quer adicionar alguma coisa? Tem um material que precisa de atualização?
Quer traduzir a página? Outra coisa?

Entre em contato em csrc@riseup.net (PGP)

Origem - Pesquisadoras independentes (31)
por Bruce Nikkel
"Practical Linux Forensics dives into the details of analyzing postmortem images of Linux systems that were misused, abused, or attacked. You'll learn how to locate and interpret digital evidence on Linux desktops, servers, and IoT devices, and reconstruct a timeline of events after a crime or security incident."
Origem
Pesquisadoras independentes
Tópicos
Malware direcionado, Vigilância digital
Tipo
Texto
Data de adição
12 Dezembro 2021
por Amnesty International Security Lab (amnesty.org/en/tech)
"Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices."
Origem
Pesquisadoras independentes
Tópicos
Malware direcionado, Telefones celulares, Vigilância digital
Tipo
Software
Data de adição
22 Julho 2021
por Gen-ethisches Netzwerk (gen-ethisches-netzwerk.de)
"Neben einem Überblick über die juristische Situation in Deutschland zur DNA-Entnahme, sowie zur Einspeisung von DNA in die Datenbanken des BKA liefert diese Broschüre auch einige Erklärungen, sowie ein paar praktische Tipps zum Vermeiden von DNA-Spuren."
Origem
Pesquisadoras independentes
Tópicos
Arquivos da polícia, DNA
Tipo
Texto
Data de adição
21 Julho 2021
por Andrea Freiin von Buddenbrock
"Dieses Buch möchte Hundeführern, Interessierten und allen, die Hunde zum Mantrailing einsetzen, einen Überblick darüber verschaffen, was Mantrailing ist und was die gut ausgebildete Hundenase zu leisten vermag."
Origem
Pesquisadoras independentes
Tópico
Outros rastros físicos
Tipo
Texto
Data de adição
21 Julho 2021
"Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s."
Origem
Pesquisadoras independentes
Tópico
Vigilância digital
Tipo
Texto
Data de adição
12 Julho 2021
Aviso do CSRC: consideramos que esse material está parcialmente desatualizado, mas acreditamos que ainda tem utilidade. Por favor, use-o com isso em mente.
por Michael Naimark
"If a camera's location is known, and can be seen, and is stationary, a tripod/rifle scope/gun sight laser system can successfully zap it, even at distances greater than 100 meters. If a camera is roving, a golf scope/gun sight laser can intermittently zap it by hand with little effort."
Ver online
Origem
Pesquisadoras independentes
Tópico
Vigilância por vídeo
Tipo
Texto
Data de adição
12 Maio 2021
por Jonathan 'smuggler' Logan
"Operational Security is a complex topic. A few years ago I did a seminar on the subject for a humanitarian organization that operated in a hostile environment. [...] I hope it inspires and helps others that have to do their jobs under the eyes of hostile actors."
Origem
Pesquisadoras independentes
Tópicos
Cultura de segurança, Telefones celulares, Vigilância física
Tipo
Texto
Data de adição
12 Maio 2021
por Electronic Frontier Foundation (eff.org)
"Law enforcement surveillance isn’t always secret. These technologies can be discovered in news articles and government meeting agendas, in company press releases and social media posts. It just hasn’t been aggregated before. Through a combination of crowdsourcing and data journalism, we are creating the largest-ever repository of information on which law enforcement agencies are using what surveillance technologies."
Origem
Pesquisadoras independentes
Tópicos
Antena de celular falsa, Leitores automáticos de placas de carro, Reconhecimento facial, Telefones celulares, Vigilância aérea, Vigilância por vídeo
Tipo
Outro
Data de adição
7 Maio 2021
por Chris Jones for Statewatch (statewatch.org)
"This report examines, explains and critiques a number of large-scale EU information systems currently being planned or built that will significantly extend the collection and use of biometric and biographic data taken from visitors to the Schengen area. In particular, it examines new systems being introduced to track, analyse and assess the potential security, immigration or public health risks posed by non-EU citizens who have to apply for either a short-stay visa or a travel authorisation – primarily the Visa Information System (VIS), which is being upgraded, and the European Travel Information and Authorisation System (ETIAS), which is currently under construction."
Origem
Pesquisadoras independentes
Tópicos
Arquivos da polícia, Fronteiras, Impressões digitais
Tipo
Texto
Data de adição
7 Maio 2021
por Amnesty International (amnesty.org)
"Activists in Belarus are subject to unchecked government surveillance with no independent oversight. The government uses telecoms companies to facilitate surveillance by demanding direct, remote-control access to customer communications and data. Against the background of an already restrictive legal environment, this creates a chilling effect that forces activists out of public life."
Outras línguas
(ru) Гражданское общество, секретность и слежка в Беларуси
"Правовая база, регулирующая порядок негласного наблюдения в Беларуси, характеризуется отсутствием соответствующих гарантий безопасности, и позволяет властям осуществлять широкомасштабную слежку практически без всякого обоснования. И хотя фактически любой человек может стать объектом слежки, почти невозможно узнать, ведётся ли за ним слежка сейчас, или она велась ранее. Подобная неопределённость оказывает сковывающий эффект на правозащитников, оппозиционных политиков, юристов и активистов, и ограничивает их возможности в реализации своих прав, в том числе права на неприкосновенность частной жизни, свободу объединений, свободу мирных собраний и свободу выражения мнений."
Origem
Pesquisadoras independentes
Tópicos
Dispositivos escondidos, Telefones celulares, Vigilância digital, Vigilância física
Tipo
Texto
Data de adição
7 Maio 2021
por Electronic Frontier Foundation (eff.org)
"Crocodile Hunter is a tool to hunt fake eNodeBs, also known commonly as hailstorm, stingray, cell site simulators, or IMSI catchers. It works by listening for broadcast messages from all of the 4G stations in the area, inferring their location, and looking for unusual activity."
Origem
Pesquisadoras independentes
Tópicos
Antena de celular falsa, Telefones celulares
Tipo
Software
Data de adição
7 Maio 2021
por Electronic Frontier Foundation (eff.org)
"Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it. Sounds like something from an episode of "Alias" right? Unfortunately the scenario isn't fictional. In a purported effort to identify counterfeiters the US government has succeeded in persuading some color laser printer manufacturers to encode each page with identifying information."
Ver online
Origem
Pesquisadoras independentes
Tópico
Dispositivos escondidos
Tipo
Texto
Data de adição
7 Maio 2021
por South Lighthouse (southlighthouse.org)
"We are a project involved in detecting and understanding cell phone surveillance in risk contexts within Latin America."
Origem
Pesquisadoras independentes
Tópicos
Antena de celular falsa, Telefones celulares
Tipo
Outro
Data de adição
7 Maio 2021
por Lily Hay Newman for Wired (wired.com)
"Lawmakers and law enforcement agencies around the world, including in the United States, have increasingly called for backdoors in the encryption schemes that protect your data, arguing that national security is at stake. But new research indicates governments already have methods and tools that, for better or worse, let them access locked smartphones thanks to weaknesses in the security schemes of Android and iOS."
Ver online
Download
Origem
Pesquisadoras independentes
Tópico
Telefones celulares
Tipo
Texto
Data de adição
7 Maio 2021
por Joseph Steinberg (josephsteinberg.com)
"Today, I am sharing some tips on how to prevent yourself from being recognized by facial recognition systems. I have personally utilized some of these techniques in test environments - and they worked. Others I have seen demonstrated."
Ver online
Download
Origem
Pesquisadoras independentes
Tópicos
Reconhecimento facial, Vigilância por vídeo
Tipo
Texto
Data de adição
7 Maio 2021
"[A] shotgun is your best bet at taking down a drone. Preferably one loaded with the largest spread ammunition you can find. [...] Of course not all methods of taking out a drone need to involve literal firearms. [...] Paintballs are a no-go. [...] Airsoft guns and other plastic-pellet guns are worthless. [...] Slingshots will likely work - again, assuming you can hit. [...] Last but not least, you never want to underestimate the power of just throwing crap. A rock, a baseball, anything you can fling straight, accurate, and fast."
Ver online
Download
Origem
Pesquisadoras independentes
Tópico
Vigilância aérea
Tipo
Texto
Data de adição
7 Maio 2021
"Un bouquin pour « informer les avocats, les professionnels du droit sur les techniques d’investigation déployées par les enquêteurs et les services de renseignements ». C’est écrit par un ex-flic mais c’est intéressant."
Download
Entre em contato em csrc@riseup.net (PGP)
Origem
Pesquisadoras independentes
Tópicos
Antena de celular falsa, Arquivos da polícia, Malware direcionado, Telefones celulares, Vigilância digital
Tipo
Texto
Data de adição
7 Maio 2021
por Security Lab (securitylab.ru)
"Если, например, вы подозреваете соседа в подключении к вашей Wi-Fi сети и не можете удостовериться в своих догадках, приведенная техника может помочь в сборе доказательств."
Origem
Pesquisadoras independentes
Tópico
Vigilância digital
Tipo
Texto
Data de adição
7 Maio 2021
por La Quadrature du Net et Next INpact
"Deux articles publiés fin 2019 sur l’usage des fichiers de police pour utiliser la reconnaissance faciale : "La reconnaissance faciale des manifestant.e.s est déjà autorisée" et "Quand la France se lance dans la reconnaissance faciale"."
Fonte
La reconnaissance faciale des manifestant.e.s est déjà autorisée
Quand la France se lance dans la reconnaissance faciale
Origem
Pesquisadoras independentes
Tópicos
Arquivos da polícia, Reconhecimento facial, Vigilância por vídeo
Tipo
Texto
Data de adição
7 Maio 2021
por BYPOL - бывшие сотрудники полиции (t.me/s/by_pol)
"В помощь беларусам по безопасному использованию мобильных телефонов, мессенджеров и сети Интернет BYPOL подготовил краткую инструкцию как сохранить свою конфиденциальность."
Origem
Pesquisadoras independentes
Tópicos
Telefones celulares, Vigilância digital
Tipo
Texto
Data de adição
7 Maio 2021
por Martin Shelton for Freedom of the Press Foundation (freedom.press)
"Concerned about the privacy and security of your communications? Follow our guide to locking down Signal."
Origem
Pesquisadoras independentes
Tópico
Telefones celulares
Tipo
Texto
Data de adição
7 Maio 2021
por Michele Gretes for the Civil Liberties Defense Center (cldc.org)
"Here, we take a look at easy-to-use ProtonMail - and why we the CLDC can’t recommend it (or its security model) for people opposing the powerful."
Ver online
Download
Origem
Pesquisadoras independentes
Tópico
Vigilância digital
Tipo
Texto
Data de adição
7 Maio 2021
por Security Without Borders (securitywithoutborders.org)
"This is a somewhat comprehensive list of reports published by a number of organizations and individuals, that expose the use of targeted surveillance against members of civil society."
Origem
Pesquisadoras independentes
Tópicos
Malware direcionado, Vigilância digital
Tipo
Texto
Data de adição
7 Maio 2021
por University of Washington
"SeaGlass is a system designed by security researchers at the University of Washington to measure IMSI-catcher use across a city."
Origem
Pesquisadoras independentes
Tópicos
Antena de celular falsa, Telefones celulares
Tipo
Outro
Data de adição
7 Maio 2021
por Electronic Frontier Foundation (eff.org)
"EFF’s “Street-Level Surveillance” project shines light on the advanced surveillance technologies that law enforcement agencies routinely deploy in our communities. These resources are designed for members of the public, advocacy organizations, journalists, defense attorneys, and policymakers who often are not getting the straight story from police representatives or the vendors marketing this equipment."
Ver online
Origem
Pesquisadoras independentes
Tópicos
Antena de celular falsa, Leitores automáticos de placas de carro, Reconhecimento facial, Telefones celulares, Vigilância aérea, Vigilância por vídeo
Tipo
Texto
Data de adição
7 Maio 2021
por Electronic Frontier Foundation (eff.org)
"Nós somos a Electronic Frontier Foundation, uma organização sem fins lucrativos que há quase 30 anos trabalha para proteger a privacidade. O Guia de Autodefesa contra Vigilância é nossa ferramenta com dicas de especialistas para proteger você e amigos/as da espionagem virtual."
Outras línguas
(am) ጥንቃቄ ለተሞላ የድር ግንኙነት ጠቃሚ ምክሮች፣ መሣሪያዎች እና አጠቃቀሞች
"እኛ ኤሌክትሮኒክ ፍሮንታየር ፋውንዴሽን ወደ ሰላሣ ለሚጠጉ ዓመታት የመስመር ላይ ግለኝነትን ለመጠበቅ ስንሰራ የኖርን፣ ገለልተኛ እና ለትርፍ ያልቋቋምን ድርጅት ነን፡፡ ይህ ሰርቪሊያንስ ሰልፍ ዲፌንስ፣ ራስዎን እና ወዳጅዎችዎን ከመስመር ላይ ስለላ የሚጠብቅ የባለሙያ መመሪያ ነው፡፡"
(ar) الدفاع عن النفس ضد الرقابة: نصائح وأدوات وأدلة تفصيلية لاتصالات أكثر أماناً على الإنترنت
"نحن منظمة التخوم الإلكترونية وهي منظمة مستقلة غير ربحية تعمل على حماية الخصوصية على الإنترنت منذ ما يقارب الثلاثين عاماً. وهذا هو مشروع الدفاع عن النفس ضد الرقابة: دليلنا الاحترافي لمساعدتك على حماية نفسك وأصدقائك من التجسس عبر الإنترنت."
(en) Surveillance Self-Defense: Tips, Tools and How-tos for Safer Online Communications
"We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense : our expert guide to protecting you and your friends from online spying."
(es) Autoprotección Digital Contra La Vigilancia: Consejos, Herramientas y Guías Para Tener Comunicaciones Más Seguras
"Somos la Electronic Frontier Foundation, una organización independiente sin fines de lucro que trabaja para proteger la privacidad en línea desde hace casi treinta años. Esto es Autoprotección Digital Contra La Vigilancia: nuestra guía avanzada para protegerte a ti y a tus amigos del espionaje en línea."
(fr) Autodéfense Contre la Surveillance : Astuces, Outils et Guides Pratiques Pour Des Communications En Ligne Plus Sécurisées
"Nous sommes la Fondation Frontière Électronique, un organisme indépendant sans but lucratif qui oeuvre depuis près de 30 ans pour protéger votre vie privée en ligne. Voici Autodéfense contre la surveillance : notre guide spécialisé sur la protection contre l’espionnage en ligne, pour vous et vos amis."
(ru) Советы, инструменты и руководства по обеспечению безопасности онлайновых коммуникаций
"Мы, сотрудники независимой некоммерческой организации Electronic Frontier Foundation, работаем на протяжении почти тридцати лет в области обеспечения конфиденциальности в сети Интернет. Пособие «Самозащита от слежки» поможет вам и вашим друзьям избежать слежки в сети."
(tr) Daha Güvenli Çevrimiçi Haberleşmeler için İpuçları, Araçlar ve Çeşitli Rehberler
"Electronic Frontier Foundation yaklaşık 30 senedir çevrimiçi gizliliği savunan bağımsız ve kâr amacı gütmeyen bir organizasyondur. Gözetim Meşru Müdafaa, çevrimiçi casusluğa karşı sizi ve yakınlarınızı korumak için düzenlenmiş uzman rehberimizdir."
(vi) Lời khuyên, Công cụ và Làm-thế-nào cho Thông Tin Liên Lạc An Toàn trên Mạng
"Chúng tôi là Electronic Frontier Foundation, một tổ chức phi lợi nhuận, độc lập, hoạt động để bảo vệ quyền riêng tư & bảo mật trên mạng gần ba mươi năm nay. Tài liệu này là Tự Vệ Chống Theo Dõi: cẩm nang hướng dẫn bạn và người quen cách đề phòng bị theo dõi trên mạng."
Origem
Pesquisadoras independentes
Tópico
Vigilância digital
Tipo
Texto
Data de adição
7 Maio 2021
por Matthias Monroy for Statewatch (statewatch.org)
"German authorities use a number of databases that collect data on political activists, even if they hadn't been sentenced or tried. Names are stored if people have had their identity checked, or if they have registered a demonstration under their name. Many are recorded under false designations. Such entries have raised concerns around them being used for further repression [...]. Discriminatory and stigmatising labels have also been applied to people whose data is held by the police."
Origem
Pesquisadoras independentes
Tópico
Arquivos da polícia
Tipo
Texto
Data de adição
7 Maio 2021
por Privacy International (privacyinternational.org)
"This report is about electronic surveillance technologies used to identify, track, and monitor individuals and their communications for intelligence gathering and law enforcement purposes."
Origem
Pesquisadoras independentes
Tópicos
Antena de celular falsa, Reconhecimento facial, Telefones celulares, Vigilância digital, Vigilância por vídeo
Tipo
Texto
Data de adição
7 Maio 2021
por Border Violence Monitoring Network (borderviolence.eu)
"In this report, several cases of push-backs from Croatia are highlighted in order to present how authorities use technology within detection and apprehension of transit groups, both at borders and interiors."
Origem
Pesquisadoras independentes
Tópicos
Fronteiras, Vigilância aérea, Vigilância por vídeo
Tipo
Texto
Data de adição
7 Maio 2021
"Transparent Lives: Surveillance in Canada details nine key trends in the processing of personal information, trends that are evident throughout the world. They affect all Canadians, but few citizens are aware of how, when, for what purpose, or with what consequences their personal data are used by large organizations. Hence the title: Transparent Lives. This book demonstrates that our lives are open and visible to organizations as never before and that in every area of life—as citizens, consumers, workers, and travellers—this makes a difference."
Outras línguas
(fr) Vivre à nu: La surveillance au Canada
"Vivre à nu : la surveillance au Canada expose neuf grandes tendances qui sont observées dans le traitement des renseignements personnels partout dans le monde. Ces tendances touchent tous les Canadiens, mais peu d’entre eux savent comment, quand et à quelles fins leurs données personnelles sont utilisées par les grandes organisations et quelles sont les conséquences de cette utilisation. Voilà pourquoi cet ouvrage est intitulé Vivre à nu ; il démontre que nos vies sont plus que jamais ouvertes et visibles pour les organismes et que cette visibilité a de réels effets sur chaque sphère de notre vie, que nous soyons citoyens, consommateurs, travailleurs ou voyageurs."
Origem
Pesquisadoras independentes
Tópicos
DNA, Impressões digitais, Leitores automáticos de placas de carro, Reconhecimento facial, Telefones celulares, Vigilância aérea, Vigilância digital, Vigilância por vídeo
Tipo
Texto
Data de adição
7 Maio 2021
por Chris Jones for Statewatch (statewatch.org)
"This briefing outlines the transnational police groups, networks and organisations that are known to exist for the purpose of coordinating undercover police operations across state borders, primarily in Europe."
Origem
Pesquisadoras independentes
Tópicos
Fronteiras, Infiltrados e informantes
Tipo
Texto
Data de adição
7 Maio 2021