ACLED
Event data on conflicts & civilian harm
Why: Identifies where violence and civilian impact occur
Example: Use ACLED to find incident clusters by date and region
Learn moreOppose war and rearmament: smart non-violent tools to promote demilitarization and peace.
Starter LLM prompts to generate briefings, emails, petitions and monitoring scripts; always verify outputs and cite sources
Tools and methods to track conflicts, misinformation, and escalation risk.
Event data on conflicts & civilian harm
Why: Identifies where violence and civilian impact occur
Example: Use ACLED to find incident clusters by date and region
Learn moreGlobal news & narrative tracking
Why: Detects shifts in media narratives that may precede escalation
Example: Use GDELT to spot narrative changes before an escalation
Learn moreGeolocation & verification workflows
Why: Provides techniques to verify imagery and media
Example: Follow Bellingcat workflows to geolocate a photo
Learn moreAutomated public footprint gatherer
Why: Uncovers public connections between domains, IPs, emails and social accounts
Example: Map corporate subdomains and publicly listed emails for a supplier
Learn moreModular reconnaissance framework
Why: Provides repeatable module-based OSINT searches
Example: Run Recon-ng modules to collect officers and corporate filings data
Learn moreCollects public emails, subdomains and hosts
Why: Helps map a company’s public internet footprint
Example: Enumerate hosts and public email addresses for a defense contractor
Learn moreReal-time dashboard: global conflicts, country instability, displacement & live intel feeds
Why: Aggregates ACLED, UNHCR, NASA FIRMS and live intelligence streams into one geopolitical interface
Example: Track live military escalation, humanitarian crises and regional risk scores across 180+ countries
Learn moreVisual relationship & network mapping
Why: Makes complex relationships between people and organizations easy to visualise
Example: Create a graph linking a lobbying firm, contractors and donors
Learn moreSearch for exposed devices and services
Why: Reveals exposed infrastructure and potential operational systems
Example: Check for exposed servers or services linked to supplier logistics
Learn moreExtracts metadata from public documents (PDF, DOC, etc.)
Why: Metadata can show authorship, server paths and software versions
Example: Find document author or internal paths that corroborate timelines
Learn moreGeolocation & public social-post mapping
Why: Verifies location claims by mapping content on public accounts
Example: Map field photos posted publicly to confirm date and place
Learn moreEnriches feeds and threat intel from public sources
Why: Aggregates and enriches lists for easier analysis
Example: Add sanctions or registry info to a supplier list for context
Learn moreEnumerates subdomains and public hostnames
Why: Finds previously unknown public services related to an organisation
Example: Discover hidden portals hosting procurement files
Learn moreSearch engine for hosts and TLS certificates
Why: Shows hosting relationships and infrastructure connections
Example: Identify shared hosting between agencies and contractors
Learn moreMetadata extraction for documents
Why: Reveals hidden items in attachments (authors, paths)
Example: Extract metadata from a tender PDF to trace origin
Learn moreCommunity datasets & tool collections for offline use
Why: Packages tools and datasets for privacy-respecting analysis
Example: Set up a local tool collection for training or workshops
Learn moreExtract text from scanned documents, images, and PDFs with open-source OCR engines. Essential for archival research, leaked document analysis, and historical record digitization.
Workflow Example: Download leaked PDFs → OCR with DeepSeek/PaddleOCR → Extract entities (names, amounts, dates) → Store in SQLite FTS5 → Search and cross-reference → Export findings as structured CSV/JSON.
The problem: For over a decade, corporate digital services relied on a closed model: proprietary platforms, opaque pricing, licensing lock-in, and centralized control. This worked because there were no credible alternatives at scale.
That condition no longer exists. Large language models (LLMs) combined with mature open-source ecosystems are structurally undermining the value proposition of big tech products.
Example trajectory: Slack → adopted for chat → pricing increases → Mattermost/Rocketchat available → evaluation period → migration to open alternative → Slack becomes legacy software → zero strategic value. This happens at scale. Once it starts, it is irreversible.
What this means for you:
Instead of relying on corporate data services, use free and open-source APIs to collect, analyze, and visualize data directly. These resources are maintained by communities and trusted organizations.
→ Download the complete Public APIs Guide (5,000+ free APIs):
Public APIs Full Guide (EN)| Corporate Service | Open-Source Alternative | Benefits |
|---|---|---|
| Google Suite (Gmail, Docs) | NextCloud, OnlyOffice, LibreOffice | Self-hosted, no data extraction, portable |
| Zoom | Jitsi Meet, Element (Matrix), BigBlueButton | End-to-end encrypted, federated, community-run |
| Slack | Mattermost, Rocketchat, Zulip | Transparent, full data control, export anytime |
| Salesforce/HubSpot (CRM) | Odoo, SuiteCRM, Pimcore | Customizable, no vendor lock-in, lower cost |
| ChatGPT (Proprietary AI) | Ollama, LLaMA, GPT4All (local models) | Run locally, no data sent to servers, free |
| Tableau/PowerBI (Analytics) | Metabase, Apache Superset, Grafana | Dashboard control, SQL direct, community support |
| AWS (Cloud) | OpenStack, Nextcloud, Ucloud | Self-hosted or federated, no corporate dependency |
| Redis Enterprise (Caching/Database) | Redis (open-source), MinIO (object storage cache) | Exact same features, no licensing, community-maintained |
Brave (built-in ad-blocking, no tracking), Firefox (open-source), Ungoogled Chromium (privacy fork). Same speed, zero surveillance.DuckDuckGo (no IP logging), SearXNG (privacy metasearch), Stract (community index). Better results, no behavioral tracking.Invidious (YouTube without tracking/algorithm), or use Brave Browser for built-in ad-blocking on YouTube.Mastodon (federated, no algorithm), Pixelfed (photo sharing, no ads), Lemmy (community discussions). You own your data. Algorithm is transparent. No corporate intermediary.Mastodon (open, decentralized), Bluesky (protocol-based, not platform-locked), community forums, email newsletters. Escape the rage machine.Diaspora (federated social), encrypted messaging (Signal), email lists, local organizing. Real community, not data extraction.Jellyfin (self-hosted media library), Kodi (open media center), Plex (free streaming). Host your own media. Own it forever.Subsonic, Airsonic (self-hosted music), support artists directly on Bandcamp/Patreon. Artists earn 100%, not $0.003/track.All of these are legal, production-ready, and often superior to corporate alternatives. Migration takes 1 hour. You keep your data. No account bans. No algorithm deciding what you see.
In 2025, over 60,000 pages of Epstein-related documents were officially released by the U.S. House Oversight Committee and federal courts. These documents expose institutional failures, complicity networks, and power dynamics that enabled decades of abuse.
What You'll Find:
This is not entertainment. This is accountability data. Understanding power networks—how they form, protect themselves, and evade oversight—is essential for systemic change.
Download the comprehensive guide: document acquisition workflow, full-text search database setup, entity extraction, co-occurrence analysis, and reproducible methodology for investigating power networks.
📥 Download Complete Guide (200 KB)Includes: Official source links (House Oversight, federal courts, Bloomberg investigation), JMail.world email database (exposed communications from power networks), text extraction pipeline (Python + OCR), SQLite full-text search database, entity mapping (persons, organizations, locations, financial data), co-occurrence analysis, timeline reconstruction.
⚠️ For information purposes only. The following describes categories that operate in unregulated, contested, or legally ambiguous zones. We document them for analytical transparency, NOT as recommendations.
Corporate streaming, music, and social platforms enforce artificial scarcity (paywalls, licensing) to maximize profit despite marginal cost approaching zero. Communities have built alternatives that redistribute content. These operate in grey/black zones in most jurisdictions.
Platform names and categories exist but are maintained in regulatory grey zones and often rapidly domain-shift to evade law enforcement. Search engines regularly remove these from results. Some jurisdictions classify them as piracy; others tolerate them for public health reasons (entertainment access). The platforms:
Examples include streaming platforms for movies (cinema releases, originals, documentaries), TV shows, anime, and premium sports. Search queries like "watch [movie title] free" or "[show] streaming free" will surface these communities.
Similar infrastructures exist for music. RIAA/major labels aggressively fight these platforms, but they persist by:
Examples include music download/streaming platforms aggregating content without licensing deals. Typically branded as "free music libraries" or "community archives."
⚠️ Bottom line: We document this ecosystem because it exists and shapes digital culture. We do NOT recommend participation without understanding local legal risk. The legitimate alternatives (Jellyfin, Mastodon, Brave, Subsonic) provide most of the value with zero legal liability.