Tech For Activists Hub
Activist Tech Toolkit[edit | edit source]
A collaborative knowledge base on ethical and legal technology for activism.
CREATED WITH CHATGPT. Not read over in high detail, tech is all plausible but if you are actually going to make anything do more research, for now this is intended as a way for people to understand what is out there to inspire them to learn more.
π Project Overview[edit | edit source]
This wiki documents practical, responsible ways that activists can use technology to resist surveillance, communicate securely, and increase impact. It includes DIY electronics, community-based networks, AI tools, automation, open-source intelligence, and digital self-defense.
We aim to make this useful for both beginners and tech-savvy organizers. Each section will have step-by-step guides, legal notes, and real-world use cases.
ποΈ Structure & To-Do List[edit | edit source]
This list tracks the planned pages for the wiki. Pages marked as β Done are completed. Others are in progress or open for creation. Click a red link to start that page.
π§ DIY Electronics for Defense & Surveillance[edit | edit source]
- Microwave Drone Disruption Devices β DIY microwave weapons for disabling small drones.
- Laser Window Microphones β Use laser reflections on glass to eavesdrop from a distance.
- RF and Bug Detection Tools β Find hidden transmitters or surveillance devices.
- Wearable and Concealable Cameras β Hidden video gear for documenting abuse safely.
- Directional Mics and Long-Distance Audio Gear β Capture clear sound from afar.
- Faraday Enclosures and Signal Blockers β Block wireless signals to protect devices and meetings.
π Community-Based Communication Infrastructure[edit | edit source]
- Mesh Networks for Offline Connectivity β Decentralized local networks using Wi-Fi or LoRa.
- Offline Internet-in-a-Box (PirateBox, LibraryBox) β Local servers for offline file sharing and libraries.
- LoRa Messaging (Meshtastic, etc) β Long-range, low-power texting without cell service.
- Community Radio and Walkie Talkie Networks β Voice communication without relying on internet or phones.
- Bluetooth and Firechat-Style Protest Networks β Short-range, app-based mesh messaging for demonstrations.
π§ AI Tools for Activism[edit | edit source]
- Image and Video Enhancement (Upscaling, Denoising) β AI tools for improving blurry or low-quality visuals.
- Audio Cleanup and Transcription (Whisper, etc) β Clean up noisy recordings and transcribe audio automatically.
- AI Summarizers and Text Analysis β Use AI to summarize, tag, and analyze large volumes of text.
- AI Chatbots for Movement Support β Deploy automated responders for outreach, support, or education.
- Automated Social Media Bots (Ethical Use) β Schedule or automate content distribution and responses.
π£ Slacktivism Optimization & Digital Organizing[edit | edit source]
- Cross Platform Posting and Scheduling (IFTTT, Buffer) β Automate social media posts across platforms.
- Notification Aggregators and Dashboards β Centralize updates from many tools and channels.
- Automation Tools (Zapier, n8n, Make) β Link apps and automate workflows without code.
- Secure Volunteer Coordination Platforms (Crabgrass, Mattermost) β Organize securely with open-source platforms.
- Educational: Mass Review Campaigns And Automation Detection Concerns - Understand how websites detect bots and how those use the same tools as automation, any tools to help speed up processes on websites could probably advantage reading this page.
- How Websites Can Detect Bots and Automation
π OSINT & Public Data Extraction[edit | edit source]
- Web Scraping and Public Record Mining β Extract and analyze data from websites and government sources.
- Geospatial OSINT (Satellites, Maps, Photos) β Use satellite and map data to verify or investigate events.
- Social Media Monitoring and Crowdsourced Investigations β Track narratives and verify media collaboratively.
- Using SEC/Gov Databases for Corporate Research β Dig into company records, lobbying, and public contracts.
- Image and Video Metadata and Verification Tools β Extract and analyze metadata to validate media.
π Digital Self-Defense & Privacy Tools[edit | edit source]
- Encrypted Messaging Apps (Signal, Wire) β Secure apps for protected conversations.
- Secure Email and PGP Basics β Encrypt and verify emails using PGP and secure providers.
- Tor, VPNs and Private Browsing β Tools to anonymize internet activity and bypass censorship.
- Metadata Removal from Files and Images β Strip hidden data from files before sharing.
- RF and IMSI Catcher Detection (Rayhunter) β Detect rogue cell towers and surveillance gear.
- Operational Security (OpSec) Basics β Habits and strategies to protect people and plans.
- Adversarial Fashion and Anti-Surveillance Wearables β Use clothing to confuse facial recognition and surveillance AI.
π Other[edit | edit source]
Additional DIY and Tactical Electronics Ideas
- GPS spoofing and jamming β Learn how GPS signals can be faked or blocked to mislead tracking or drones. Highly regulated; included for awareness only. [Bellingcat (technical overview)]
- Infrared and thermal camouflage β Reduce heat visibility to avoid thermal imaging (e.g. drones or sniper tech) using mylar, survival blankets, or foliage. [Thermal Evasion Project]
- DIY night vision and thermal mods β Hack cheap cameras for night visibility using IR LEDs, or explore budget thermal sensors. [Night Vision Instructable]
- Ambient and through-wall audio tools β Build contact microphones or parabolic mics to listen through materials or at long range. For educational use only. [Hackaday Article]
Resilience, Power, and Infrastructure Topics
- Solar and off-grid power for camps β Build modular solar power kits to run comms gear, charge devices, or power lights without relying on the grid. [Low-Tech Magazine Solar Guide]
- Emergency satellite and amateur radio backups β Use systems like SatNOGs, Iridium GO, or Ham radio for messaging during blackouts or censorship. [SatNOGs Project] | [Amateur Radio Emergency Data Network]
- DIY environmental sensors β Deploy cheap sensors for air quality, water safety, or radiation using Arduino/Raspberry Pi kits. [Public Lab] | [sensors.AFRICA]
Psychological and Information Defense
- Spotting manipulation and narrative control β Learn how disinfo campaigns are structured and how to counter them. [Information Defense], [Tactical Tech: Data and Politics]
- Community morale tools β Use music, visuals, humor, and symbolism to keep spirits high during long campaigns or crackdowns.
- Creative propaganda for truth β Design ethical counter-messaging to challenge state/corporate narratives. Examples include zines, memes, street art, and community radio.
- Dangers of weaponized OSINT β Be aware that some OSINT efforts (like those by Bellingcat) have been linked to state-friendly influence campaigns. Always verify sources and avoid participating in targeting campaigns without full context. [Critical Read] [Kit Klarenberg β Investigative Journalist]
- Psychological resilience β Techniques for avoiding burnout, managing fear, and dealing with surveillance or harassment. [EFF: Stress and Resilience]
Secure Paper-Based Systems for Organizing
- Low-tech backups β Maintain critical info (contacts, meeting notes, maps) on paper in case of device loss, power cuts, or digital compromise.
- Cipher wheels and simple codes β Use analog encryption like substitution ciphers or one-time pads to protect sensitive data offline. [Classic Ciphers Overview β Bruce Schneier]
- Hand-drawn maps and field notes β Use waterproof notebooks and manual sketches for on-the-ground intelligence or directions.
- Paper forms and sign-in systems β Use physical forms for attendance, logistics, or supplies tracking during events or crisis setups.
- Redundancy for high-risk operations β Paper maps, contacts, or plans can act as backups when devices are seized or bricked. [Survivalist Forum β Offline Comms & Records]
Biohacking and Biometric Obfuscation
- Subdermal magnets and implants β Used by some activists and biohackers to sense electromagnetic fields or store data invisibly. [Dangerous Things β Biohacking Implants]
- Anti-fingerprint measures β Gloves with altered textures or specialized films to prevent fingerprint collection from surfaces.
- Gait and posture masking β Use lifts, weights, or decoy clothing to confuse gait recognition systems. [What is Gait Recognition? β CNET]
- Voiceprint interference β Disguise your vocal signature using pitch shifters, background noise, or text-to-speech when calling unknown parties. [ZDNet on Voice Recognition Risks]
- Ethical cautions β Biometric tools can help avoid tracking but may escalate suspicion. Always assess the risk-benefit ratio for your context.
Adversarial Tech, Art, and Surveillance Jam Tactics
- Laser and strobe camera interference β Use low-powered lasers or flashing LEDs to overwhelm camera sensors and facial recognition (legality varies by country). [Vice β Laser Tactics in Protests]
- Facial recognition camouflage β Use makeup, masks, or hair styles to confuse AI. Projects like CV Dazzle show creative ways to break facial symmetry. [CV Dazzle]
- License plate spoofing and adversarial clothing β Clothing printed with decoy license plates or adversarial patterns to poison surveillance data. [Adversarial Fashion]
- Infrared jamming hats and glasses β Use IR LEDs around headgear to obscure faces from night vision or IR cameras. [Hackaday IR Jammer Guide]
- Street projection activism β Use portable projectors to cast protest visuals on buildings, statues, or barriers, leaving no permanent trace.
Note: While many of these techniques are legal to research and build, their use against surveillance systems may violate local laws. Always know the risk before deploying them.
π‘ Notes[edit | edit source]
- Use Category:To Do to view unfinished pages.
- Add your signature and date when starting a page (e.g. -- ~~~~)
- For formatting and page template, see Page Template (Tool/Topic Format)
β Progress[edit | edit source]
Pages Complete: 0 / (count updates automatically later)\ Last Updated: ~~~~\ Maintainers: Add your name below!
---
This page will evolve as we create and refine content. Contributions are welcome β please be mindful of local laws, focus on ethical/responsible use, and cite your sources.