Origin - Independent researchers (29)
"The Theory of Covert Surveillance is a 2020 book on physical surveillance written by U.K. private investigator Peter Jenkins. It covers topics such as static and mobile surveillance, foot surveillance, and the composition and organization of a surveillance team, and briefly covers technical surveillance and equipment (such as cameras and tracking devices)."
Origin
Independent researchers
Topic
Physical surveillance
Type
Text
Last updated
September 23, 2024
Highlighted resource for topic Physical surveillance.
"Surveillance Countermeasures is a 2019 book on physical surveillance and the mitigations one can take to protect against it, written by former U.S. spy Aden C. Magee. It extensively covers topics such as the principles and tactics of physical surveillance operations, surveillance detection, and anti-surveillance."
Origin
Independent researchers
Topic
Physical surveillance
Type
Text
Last updated
May 20, 2024
"A few practical tips for avoiding DNA traces."
Chapter 10: No Trace Project
Other languages
(de) Der polizeiliche Zugriff auf DNA-Daten: Strategien der Gegenwehr
"Neben einem Überblick über die juristische Situation in Deutschland zur DNA-Entnahme, sowie zur Einspeisung von DNA in die Datenbanken des BKA liefert diese Broschüre auch einige Erklärungen, sowie ein paar praktische Tipps zum Vermeiden von DNA-Spuren."
(el) Στρατηγικές για την αντιμετώπιση της πρόσβασης της αστυνομίας σε δεδομένα DNA
"Μερικές συμβουλές για να μην αφήνεις ίχνη DNA εν ώρα δράσης."
Chapter 10: No Trace Project
Origin
Independent researchers
Topics
DNA, Police files
Type
Text
Last updated
March 22, 2023
"Two people alleged to have damaged a water reservoir in Charente-Maritime are on trial this Thursday in La Rochelle. Phone bills, tailing and geolocation… To identify them, the investigators have deployed methods that are out of the ordinary."
Other languages
(fr) Retour sur les enquêtes policières liées aux attaques en manif contre les mégabassines
"Deux personnes soupçonnées d'avoir dégradé une réserve d'eau en Charente-Maritime sont jugées ce jeudi à La Rochelle. Fadettes, filature et géolocalisation… Pour les identifier, les enquêteurs ont déployé des moyens hors norme."
Origin
Independent researchers
Topics
Mobile phones, Physical surveillance, Police files, Video surveillance
Type
Text
Last updated
January 20, 2023
"Practical Linux Forensics dives into the details of analyzing postmortem images of Linux systems that were misused, abused, or attacked. You'll learn how to locate and interpret digital evidence on Linux desktops, servers, and IoT devices, and reconstruct a timeline of events after a crime or security incident."
Origin
Independent researchers
Topics
Digital surveillance, Targeted malware
Type
Text
Last updated
December 12, 2021
"Dieses Buch möchte Hundeführern, Interessierten und allen, die Hunde zum Mantrailing einsetzen, einen Überblick darüber verschaffen, was Mantrailing ist und was die gut ausgebildete Hundenase zu leisten vermag."
Origin
Independent researchers
Topic
Other physical traces
Type
Text
Last updated
July 21, 2021
"Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material — from surveillance used against contemporary US protests to the African National Congress's use of partially manual encryption in fighting apartheid in South Africa in the 80s."
Origin
Independent researchers
Topic
Digital surveillance
Type
Text
Last updated
July 12, 2021
This resource is partly outdated, but can still be useful. Please read it with caution.
"If a camera's location is known, and can be seen, and is stationary, a tripod/rifle scope/gun sight laser system can successfully zap it, even at distances greater than 100 meters. If a camera is roving, a golf scope/gun sight laser can intermittently zap it by hand with little effort."
Origin
Independent researchers
Topic
Video surveillance
Type
Text
Last updated
May 12, 2021
"Operational Security is a complex topic. A few years ago I did a seminar on the subject for a humanitarian organization that operated in a hostile environment. […] I hope it inspires and helps others that have to do their jobs under the eyes of hostile actors."
Origin
Independent researchers
Topics
Mobile phones, Physical surveillance, Security culture
Type
Text
Last updated
May 12, 2021
"Law enforcement surveillance isn't always secret. These technologies can be discovered in news articles and government meeting agendas, in company press releases and social media posts. It just hasn't been aggregated before. Through a combination of crowdsourcing and data journalism, we are creating the largest-ever repository of information on which law enforcement agencies are using what surveillance technologies."
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Other
Last updated
May 7, 2021
"This report examines, explains and critiques a number of large-scale EU information systems currently being planned or built that will significantly extend the collection and use of biometric and biographic data taken from visitors to the Schengen area. In particular, it examines new systems being introduced to track, analyse and assess the potential security, immigration or public health risks posed by non-EU citizens who have to apply for either a short-stay visa or a travel authorisation – primarily the Visa Information System (VIS), which is being upgraded, and the European Travel Information and Authorisation System (ETIAS), which is currently under construction."
Origin
Independent researchers
Topics
Borders, Fingerprints, Police files
Type
Text
Last updated
May 7, 2021
"Activists in Belarus are subject to unchecked government surveillance with no independent oversight. The government uses telecoms companies to facilitate surveillance by demanding direct, remote-control access to customer communications and data. Against the background of an already restrictive legal environment, this creates a chilling effect that forces activists out of public life."
Other languages
(ru) Гражданское общество, секретность и слежка в Беларуси
"Правовая база, регулирующая порядок негласного наблюдения в Беларуси, характеризуется отсутствием соответствующих гарантий безопасности, и позволяет властям осуществлять широкомасштабную слежку практически без всякого обоснования. И хотя фактически любой человек может стать объектом слежки, почти невозможно узнать, ведётся ли за ним слежка сейчас, или она велась ранее. Подобная неопределённость оказывает сковывающий эффект на правозащитников, оппозиционных политиков, юристов и активистов, и ограничивает их возможности в реализации своих прав, в том числе права на неприкосновенность частной жизни, свободу объединений, свободу мирных собраний и свободу выражения мнений."
Origin
Independent researchers
Topics
Digital surveillance, Hidden devices, Mobile phones, Physical surveillance
Type
Text
Last updated
May 7, 2021
"We are a project involved in detecting and understanding cell phone surveillance in risk contexts within Latin America."
Origin
Independent researchers
Topics
IMSI catchers, Mobile phones
Type
Other
Last updated
May 7, 2021
"Lawmakers and law enforcement agencies around the world, including in the United States, have increasingly called for backdoors in the encryption schemes that protect your data, arguing that national security is at stake. But new research indicates governments already have methods and tools that, for better or worse, let them access locked smartphones thanks to weaknesses in the security schemes of Android and iOS."
Origin
Independent researchers
Topic
Mobile phones
Type
Text
Last updated
May 7, 2021
"Today, I am sharing some tips on how to prevent yourself from being recognized by facial recognition systems. I have personally utilized some of these techniques in test environments — and they worked. Others I have seen demonstrated."
Origin
Independent researchers
Topics
Facial recognition, Video surveillance
Type
Text
Last updated
May 7, 2021
"[A] shotgun is your best bet at taking down a drone. Preferably one loaded with the largest spread ammunition you can find. […] Of course not all methods of taking out a drone need to involve literal firearms. […] Paintballs are a no-go. […] Airsoft guns and other plastic-pellet guns are worthless. […] Slingshots will likely work — again, assuming you can hit. […] Last but not least, you never want to underestimate the power of just throwing crap. A rock, a baseball, anything you can fling straight, accurate, and fast."
Other languages
(fr) Comment abattre un drone
"[U]n fusil de chasse est le moyen le plus sûr d'abattre un drone. De préférence chargé avec des munitions à haute dispersion. […] Bien sûr on a pas forcément besoin d'une arme à feu pour abattre un drone. […] Les paintballs c'est non. […] [L]es répliques d'Airsoft et autres pistolets à billes ne valent rien. […] Les lance-pierres vont probablement fonctionner — encore une fois, si tu arrives à toucher. […] Enfin et surtout, il ne faut jamais sous-estimer l'efficacité de juste balancer des trucs. Un caillou, une balle de base-ball, n'importe quoi que tu es capable de lancer droit, précisément, et rapidement."
Origin
Independent researchers
Topic
Aerial surveillance
Type
Text
Last updated
May 7, 2021
"Un bouquin pour « informer les avocats, les professionnels du droit sur les techniques d'investigation déployées par les enquêteurs et les services de renseignements ». C'est écrit par un ex-flic mais c'est intéressant."
Surveillance Archive ?This is a link to the Surveillance Archive. Use Tor Browser to access it.
Origin
Independent researchers
Topics
Digital surveillance, IMSI catchers, Mobile phones, Police files, Targeted malware
Type
Text
Last updated
May 7, 2021
"Deux articles publiés fin 2019 sur l'usage des fichiers de police pour utiliser la reconnaissance faciale : « La reconnaissance faciale des manifestant.e.s est déjà autorisée » et « Quand la France se lance dans la reconnaissance faciale »."
Premier article: laquadrature.net
Deuxième article: nextinpact.com
Origin
Independent researchers
Topics
Facial recognition, Police files, Video surveillance
Type
Text
Last updated
May 7, 2021
"Concerned about the privacy and security of your communications? Follow our guide to locking down Signal."
Other languages
(es) Protección avanzada para Signal
"¿Preocupado por la privacidad y la seguridad de sus comunicaciones? Sigue nuestra guía."
Origin
Independent researchers
Topic
Mobile phones
Type
Text
Last updated
May 7, 2021
"Here, we take a look at easy-to-use ProtonMail — and why we the CLDC can't recommend it (or its security model) for people opposing the powerful."
Origin
Independent researchers
Topic
Digital surveillance
Type
Text
Last updated
May 7, 2021
"Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer — and potentially the person who used it. Sounds like something from an episode of “Alias” right? Unfortunately the scenario isn't fictional. In a purported effort to identify counterfeiters the US government has succeeded in persuading some color laser printer manufacturers to encode each page with identifying information."
Origin
Independent researchers
Topic
Other physical traces
Type
Text
Last updated
May 7, 2021
"This is a somewhat comprehensive list of reports published by a number of organizations and individuals, that expose the use of targeted surveillance against members of civil society."
Origin
Independent researchers
Topics
Digital surveillance, Targeted malware
Type
Text
Last updated
May 7, 2021
"EFF's “Street-Level Surveillance” project shines light on the advanced surveillance technologies that law enforcement agencies routinely deploy in our communities. These resources are designed for members of the public, advocacy organizations, journalists, defense attorneys, and policymakers who often are not getting the straight story from police representatives or the vendors marketing this equipment."
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Text
Last updated
May 7, 2021
"We're the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense : our expert guide to protecting you and your friends from online spying."
Other languages
(am) Surveillance Self-Defense (አማርኛ)
"እኛ ኤሌክትሮኒክ ፍሮንታየር ፋውንዴሽን ወደ ሰላሣ ለሚጠጉ ዓመታት የመስመር ላይ ግለኝነትን ለመጠበቅ ስንሰራ የኖርን፣ ገለልተኛ እና ለትርፍ ያልቋቋምን ድርጅት ነን፡፡ ይህ ሰርቪሊያንስ ሰልፍ ዲፌንስ፣ ራስዎን እና ወዳጅዎችዎን ከመስመር ላይ ስለላ የሚጠብቅ የባለሙያ መመሪያ ነው፡፡"
(ar) Surveillance Self-Defense (العربية)
"نحن منظمة التخوم الإلكترونية وهي منظمة مستقلة غير ربحية تعمل على حماية الخصوصية على الإنترنت منذ ما يقارب الثلاثين عاماً. وهذا هو مشروع الدفاع عن النفس ضد الرقابة: دليلنا الاحترافي لمساعدتك على حماية نفسك وأصدقائك من التجسس عبر الإنترنت."
(es) Surveillance Self-Defense (Español)
"Somos la Electronic Frontier Foundation, una organización independiente sin fines de lucro que trabaja para proteger la privacidad en línea desde hace casi treinta años. Esto es Autoprotección Digital Contra La Vigilancia: nuestra guía avanzada para protegerte a ti y a tus amigos del espionaje en línea."
(fr) Surveillance Self-Defense (Français)
"Nous sommes la Fondation Frontière Électronique, un organisme indépendant sans but lucratif qui oeuvre depuis près de 30 ans pour protéger votre vie privée en ligne. Voici Autodéfense contre la surveillance : notre guide spécialisé sur la protection contre l'espionnage en ligne, pour vous et vos amis."
(pt) Surveillance Self-Defense (Português)
"Nós somos a Electronic Frontier Foundation, uma organização sem fins lucrativos que há quase 30 anos trabalha para proteger a privacidade. O Guia de Autodefesa contra Vigilância é nossa ferramenta com dicas de especialistas para proteger você e amigos/as da espionagem virtual."
(ru) Surveillance Self-Defense (Pусский)
"Мы, сотрудники независимой некоммерческой организации Electronic Frontier Foundation, работаем на протяжении почти тридцати лет в области обеспечения конфиденциальности в сети Интернет. Пособие «Самозащита от слежки» поможет вам и вашим друзьям избежать слежки в сети."
(th) Surveillance Self-Defense (ไทย)
"Electronic Frontier Foundation เป็นองค์กรอิสระไม่แสวงผลกำไรที่ทำงานเพื่อปกป้องความเป็นส่วนตัวออนไลน์มาเป็นเวลาเกือบ 30 ปี คู่มือจากผู้เชี่ยวชาญในการป้องกันตัวเองจากการสอดส่องของเราใช้เพื่อปกป้องตัวคุณและเพื่อน ๆ จากการสอดแนมออนไลน์"
(tr) Surveillance Self-Defense (Türkçe)
"Electronic Frontier Foundation yaklaşık 30 senedir çevrimiçi gizliliği savunan bağımsız ve kâr amacı gütmeyen bir organizasyondur. Gözetim Meşru Müdafaa, çevrimiçi casusluğa karşı sizi ve yakınlarınızı korumak için düzenlenmiş uzman rehberimizdir."
(ur) Surveillance Self-Defense (اُردو)
"ہم ہیں الیکٹرانک فرنٹیئر فاؤنڈیشن، منافع سے ماورا ایک خودمختار ادارہ، جو آن لائن مقامات کے تحفظ پر تقریباً تیس سال سے جدوجہد کر رہا ہے۔ یہ ہے سرویلنس سیلف ڈیفنس: ہماری ماہرانہ آرا جو آپ اور آپ کے دوستوں کا آن لائن جاسوسی سے تحفظ کرتی ہیں۔"
(vi) Surveillance Self-Defense (Tiếng Việt)
"Chúng tôi là Electronic Frontier Foundation, một tổ chức phi lợi nhuận, độc lập, hoạt động để bảo vệ quyền riêng tư & bảo mật trên mạng gần ba mươi năm nay. Tài liệu này là Tự Vệ Chống Theo Dõi: cẩm nang hướng dẫn bạn và người quen cách đề phòng bị theo dõi trên mạng."
Origin
Independent researchers
Topic
Digital surveillance
Type
Text
Last updated
May 7, 2021
"German authorities use a number of databases that collect data on political activists, even if they hadn't been sentenced or tried. Names are stored if people have had their identity checked, or if they have registered a demonstration under their name. Many are recorded under false designations. Such entries have raised concerns around them being used for further repression […]. Discriminatory and stigmatising labels have also been applied to people whose data is held by the police."
Origin
Independent researchers
Topic
Police files
Type
Text
Last updated
May 7, 2021
"This report is about electronic surveillance technologies used to identify, track, and monitor individuals and their communications for intelligence gathering and law enforcement purposes."
Origin
Independent researchers
Topics
Digital surveillance, Facial recognition, IMSI catchers, Mobile phones, Video surveillance
Type
Text
Last updated
May 7, 2021
"In this report, several cases of push-backs from Croatia are highlighted in order to present how authorities use technology within detection and apprehension of transit groups, both at borders and interiors."
Origin
Independent researchers
Topics
Aerial surveillance, Borders, Video surveillance
Type
Text
Last updated
May 7, 2021
"Transparent Lives: Surveillance in Canada details nine key trends in the processing of personal information, trends that are evident throughout the world. They affect all Canadians, but few citizens are aware of how, when, for what purpose, or with what consequences their personal data are used by large organizations. Hence the title: Transparent Lives. This book demonstrates that our lives are open and visible to organizations as never before and that in every area of life — as citizens, consumers, workers, and travellers — this makes a difference."
Other languages
(fr) Vivre à nu: La surveillance au Canada
"Vivre à nu : la surveillance au Canada expose neuf grandes tendances qui sont observées dans le traitement des renseignements personnels partout dans le monde. Ces tendances touchent tous les Canadiens, mais peu d'entre eux savent comment, quand et à quelles fins leurs données personnelles sont utilisées par les grandes organisations et quelles sont les conséquences de cette utilisation. Voilà pourquoi cet ouvrage est intitulé Vivre à nu ; il démontre que nos vies sont plus que jamais ouvertes et visibles pour les organismes et que cette visibilité a de réels effets sur chaque sphère de notre vie, que nous soyons citoyens, consommateurs, travailleurs ou voyageurs."
Origin
Independent researchers
Topics
Aerial surveillance, Automated license plate readers, DNA, Digital surveillance, Facial recognition, Fingerprints, Mobile phones, Video surveillance
Type
Text
Last updated
May 7, 2021
"This briefing outlines the transnational police groups, networks and organisations that are known to exist for the purpose of coordinating undercover police operations across state borders, primarily in Europe."
Origin
Independent researchers
Topics
Borders, Infiltrators and informants
Type
Text
Last updated
May 7, 2021