Peace & Non-Violent Action Tools

Oppose war and rearmament: smart non-violent tools to promote demilitarization and peace.

AI prompts & templates

Starter LLM prompts to generate briefings, emails, petitions and monitoring scripts; always verify outputs and cite sources

Quick 15-minute monitoring checklist

  1. Pick a single target (company/contract/asset) and note the contract number or identifier.
  2. Open monitoring-sample-en.txt and copy the template.
  3. Check news, LiveUAMap, and ACLED for new entries; save URLs and take screenshots.
  4. Update the monitoring log with date, source, and a one-sentence summary; share with the campaign group.

OSINT & Conflict Monitoring

Tools and methods to track conflicts, misinformation, and escalation risk.

ACLED

Event data on conflicts & civilian harm

Why: Identifies where violence and civilian impact occur

Example: Use ACLED to find incident clusters by date and region

Learn more

GDELT

Global news & narrative tracking

Why: Detects shifts in media narratives that may precede escalation

Example: Use GDELT to spot narrative changes before an escalation

Learn more

Bellingcat

Geolocation & verification workflows

Why: Provides techniques to verify imagery and media

Example: Follow Bellingcat workflows to geolocate a photo

Learn more

SpiderFoot

Automated public footprint gatherer

Why: Uncovers public connections between domains, IPs, emails and social accounts

Example: Map corporate subdomains and publicly listed emails for a supplier

Learn more

Recon-ng

Modular reconnaissance framework

Why: Provides repeatable module-based OSINT searches

Example: Run Recon-ng modules to collect officers and corporate filings data

Learn more

theHarvester

Collects public emails, subdomains and hosts

Why: Helps map a company’s public internet footprint

Example: Enumerate hosts and public email addresses for a defense contractor

Learn more

World Monitor

Real-time dashboard: global conflicts, country instability, displacement & live intel feeds

Why: Aggregates ACLED, UNHCR, NASA FIRMS and live intelligence streams into one geopolitical interface

Example: Track live military escalation, humanitarian crises and regional risk scores across 180+ countries

Learn more

Maltego CE

Visual relationship & network mapping

Why: Makes complex relationships between people and organizations easy to visualise

Example: Create a graph linking a lobbying firm, contractors and donors

Learn more

Shodan

Search for exposed devices and services

Why: Reveals exposed infrastructure and potential operational systems

Example: Check for exposed servers or services linked to supplier logistics

Learn more

Metagoofil

Extracts metadata from public documents (PDF, DOC, etc.)

Why: Metadata can show authorship, server paths and software versions

Example: Find document author or internal paths that corroborate timelines

Learn more

Creepy

Geolocation & public social-post mapping

Why: Verifies location claims by mapping content on public accounts

Example: Map field photos posted publicly to confirm date and place

Learn more

IntelOwl

Enriches feeds and threat intel from public sources

Why: Aggregates and enriches lists for easier analysis

Example: Add sanctions or registry info to a supplier list for context

Learn more

Sublist3r

Enumerates subdomains and public hostnames

Why: Finds previously unknown public services related to an organisation

Example: Discover hidden portals hosting procurement files

Learn more

Censys

Search engine for hosts and TLS certificates

Why: Shows hosting relationships and infrastructure connections

Example: Identify shared hosting between agencies and contractors

Learn more

FOCA

Metadata extraction for documents

Why: Reveals hidden items in attachments (authors, paths)

Example: Extract metadata from a tender PDF to trace origin

Learn more

OSINT-BOX

Community datasets & tool collections for offline use

Why: Packages tools and datasets for privacy-respecting analysis

Example: Set up a local tool collection for training or workshops

Learn more

Quickstart for non-experts

  1. Decide the question you want to answer (who, what, when, where)
  2. Collect two independent sources to verify a claim
  3. If evidence is concerning, pass it to trusted NGOs or journalists
  4. Scale using phased escalation and accountability metrics

📄 Document Processing & OCR Tools

Extract text from scanned documents, images, and PDFs with open-source OCR engines. Essential for archival research, leaked document analysis, and historical record digitization.

🔤 Open-Source OCR Engines

  • Tesseract 5 — Industry standard OCR; supports 100+ languages; command-line and library
  • PaddleOCR — Multilingual, fast, pre-trained models; easy Python integration
  • EasyOCR — High accuracy, 80+ languages, PyTorch-based, simple API
  • Dots OCR (RedNote HiLab) — Lightweight, efficient document processing, optimized for Chinese/multilingual text
  • DeepSeek-OCR-2 — Advanced vision language model for document analysis, structured data extraction, table recognition

🛠 Text Processing Pipeline

  • Rich — Format and display OCR output with syntax highlighting
  • Python Requests + PIL/Pillow — Batch download images/PDFs, resize, preprocess
  • OCRmyPDF — Embed OCR text layer into PDFs while preserving original layout
  • Kraken — High-accuracy OCR for historical documents and manuscripts

💾 Data Organization

  • SQLite FTS5 — Full-text search on extracted text; fast queries
  • Elasticsearch — Distributed search engine for large document collections
  • Weaviate — Vector database for semantic document search

Workflow Example: Download leaked PDFs → OCR with DeepSeek/PaddleOCR → Extract entities (names, amounts, dates) → Store in SQLite FTS5 → Search and cross-reference → Export findings as structured CSV/JSON.

Why Open-Source? The Corporate Digital Collapse

Corporate platforms are losing their value. Here's why your alternative matters.

The problem: For over a decade, corporate digital services relied on a closed model: proprietary platforms, opaque pricing, licensing lock-in, and centralized control. This worked because there were no credible alternatives at scale.

That condition no longer exists. Large language models (LLMs) combined with mature open-source ecosystems are structurally undermining the value proposition of big tech products.

→ How corporate digital services decay to zero (click to expand)
  • 1. Compression by LLMs: Search (replaced by ChatGPT), customer support (chatbots), analytics (self-service BI), content production, translation—features that cost $5K+/month now cost $20/month or $0.
  • 2. Open-source defeats proprietary: Every corporate tool has an open equivalent gaining adoption. Metabase eats Tableau. Mattermost replaces Slack. Jitsi destroys Zoom's premium moat. Users vote with their data.
  • 3. The asymptote to zero: As alternatives multiply, corporate pricing power collapses first. Then users leave (lock-in weakens). Then the product becomes maintenance liability—strategic importance reaches zero. Google Meet didn't kill Zoom through competition; Zoom killed itself with pricing and paywalls.
  • 4. Institutional distrust accelerates collapse: US Big Tech companies are weaponized by state and capital: surveillance (NSA/GCHQ partnerships), censorship (arbitrary bans), regulatory capture (lobbying dominance), geopolitical coercion (sanctions, data seizure), data exploitation (behavioral targeting, ad monopoly). Users no longer believe these platforms serve them. Trust erosion is not sentiment—it's structural. When alternatives exist, defection is inevitable.
  • 5. Community-driven wins on speed: Open-source teams move faster than corporations constrained by legal risk, internal politics, and shareholder expectations. Ollama (local LLMs) shipped in weeks. OpenAI spent years securing capital.

Example trajectory: Slack → adopted for chat → pricing increases → Mattermost/Rocketchat available → evaluation period → migration to open alternative → Slack becomes legacy software → zero strategic value. This happens at scale. Once it starts, it is irreversible.

What this means for you:

  • Evaluate alternatives: Before buying a corporate tool, check if an open-source or community-driven equivalent exists.
  • Build your own stack: Combine specialized open tools instead of relying on one corporate platform.
  • Support interoperable systems: Prefer tools that export data, use open standards, and don't lock you in.
  • Join communities, not platforms: Open-source projects are controlled by users, not shareholders.

Public APIs & Open Data Resources

Build Your Own Solutions

Instead of relying on corporate data services, use free and open-source APIs to collect, analyze, and visualize data directly. These resources are maintained by communities and trusted organizations.

📊 Data & Analytics

  • ACLED — Armed conflict events and patterns globally
  • GDELT — News narratives, geopolitical signals, escalation monitoring
  • UNOSAT — Satellite imagery for infrastructure and humanitarian impact
  • SIPRI — Military spending, arms transfers, military budgets

🔍 Investigation & OSINT

  • Bellingcat — Geolocation, image verification, open-source methods
  • Shodan — Internet device discovery and mapping
  • SpiderFoot — Automated reconnaissance and OSINT automation
  • theHarvester — Email, subdomain, and host discovery

🛠 Developer APIs

  • Public APIs directory — Thousands of free APIs for every purpose (see full guide below)
  • GitHub — Open-source repositories, collaborative development
  • OpenWeather, GeoNames — Free geolocation and environmental data

📋 Corporate & Lobbying Data

  • LobbyFacts — EU lobbying register with company and spending data
  • Transparency International — Corruption, government spending databases
  • SIPRI Arms Database — Weapons transfers by country, company

🌍 Environmental & Procurement

  • Copernicus (ESA) — Free satellite data for climate and environment
  • TradeHub / COMTRADE — UN trade statistics
  • National transparency portals — Public procurement in ES, IT, FR, DE

→ Download the complete Public APIs Guide (5,000+ free APIs):

Public APIs Full Guide (EN)

Quick Reference: Open-Source Alternatives to Corporate Products

Corporate Service Open-Source Alternative Benefits
Google Suite (Gmail, Docs) NextCloud, OnlyOffice, LibreOffice Self-hosted, no data extraction, portable
Zoom Jitsi Meet, Element (Matrix), BigBlueButton End-to-end encrypted, federated, community-run
Slack Mattermost, Rocketchat, Zulip Transparent, full data control, export anytime
Salesforce/HubSpot (CRM) Odoo, SuiteCRM, Pimcore Customizable, no vendor lock-in, lower cost
ChatGPT (Proprietary AI) Ollama, LLaMA, GPT4All (local models) Run locally, no data sent to servers, free
Tableau/PowerBI (Analytics) Metabase, Apache Superset, Grafana Dashboard control, SQL direct, community support
AWS (Cloud) OpenStack, Nextcloud, Ucloud Self-hosted or federated, no corporate dependency
Redis Enterprise (Caching/Database) Redis (open-source), MinIO (object storage cache) Exact same features, no licensing, community-maintained

Reclaim Your Digital Life: Legitimate Alternatives

Why reclaim digital infrastructure?

  • Corporate control = data weaponization: Google, Amazon, Meta, Apple track everything. Your location, communications, purchases, health data are sold or shared with state agencies (NSA, GCHQ, law enforcement).
  • Algorithmic manipulation: Corporate platforms optimize for engagement (addiction), polarization (conflict), and compliance. Your feed is a behavioral control tool, not information.
  • Arbitrary enforcement: Sudden bans, account suspensions, content removal without due process. No appeal. No transparency. You build on rented landfor nothing.
  • Planned obsolescence: Features you pay for disappear. Pricing increases. Quality declines. Alternatives are available and often superior.

🌐 Browser & Search — Reclaim Privacy

  • Chrome (Google tracking) → Brave (built-in ad-blocking, no tracking), Firefox (open-source), Ungoogled Chromium (privacy fork). Same speed, zero surveillance.
  • Google Search → DuckDuckGo (no IP logging), SearXNG (privacy metasearch), Stract (community index). Better results, no behavioral tracking.
  • YouTube (algorithm trap) → Invidious (YouTube without tracking/algorithm), or use Brave Browser for built-in ad-blocking on YouTube.

💬 Social Media & Communication — Escape Propaganda

  • Instagram, TikTok, Threads → Mastodon (federated, no algorithm), Pixelfed (photo sharing, no ads), Lemmy (community discussions). You own your data. Algorithm is transparent. No corporate intermediary.
  • Twitter/X → Mastodon (open, decentralized), Bluesky (protocol-based, not platform-locked), community forums, email newsletters. Escape the rage machine.
  • Facebook → Diaspora (federated social), encrypted messaging (Signal), email lists, local organizing. Real community, not data extraction.

🎬 Media Centers (Video, Music, Files)

  • Netflix, Disney+ paywalls → Jellyfin (self-hosted media library), Kodi (open media center), Plex (free streaming). Host your own media. Own it forever.
  • Spotify low-pay exploitation → Subsonic, Airsonic (self-hosted music), support artists directly on Bandcamp/Patreon. Artists earn 100%, not $0.003/track.

All of these are legal, production-ready, and often superior to corporate alternatives. Migration takes 1 hour. You keep your data. No account bans. No algorithm deciding what you see.

Power Networks: The Epstein Files Investigation

Why This Matters

In 2025, over 60,000 pages of Epstein-related documents were officially released by the U.S. House Oversight Committee and federal courts. These documents expose institutional failures, complicity networks, and power dynamics that enabled decades of abuse.

What You'll Find:

  • Institutional Corruption: How financial institutions, law enforcement, and legal systems failed to act despite warning signs.
  • Power Networks: Mapping relationships between wealthy individuals, politicians, celebrities, and business leaders—revealing how power protects power.
  • Financial Trails: Understanding money flows, shell companies, and the infrastructure that enabled exploitation.
  • Systemic Failure: Documentation of how bureaucracy, political pressure, and institutional loyalty preserve abuse.

This is not entertainment. This is accountability data. Understanding power networks—how they form, protect themselves, and evade oversight—is essential for systemic change.

📊 Complete Analysis Guide

Download the comprehensive guide: document acquisition workflow, full-text search database setup, entity extraction, co-occurrence analysis, and reproducible methodology for investigating power networks.

📥 Download Complete Guide (200 KB)

Includes: Official source links (House Oversight, federal courts, Bloomberg investigation), JMail.world email database (exposed communications from power networks), text extraction pipeline (Python + OCR), SQLite full-text search database, entity mapping (persons, organizations, locations, financial data), co-occurrence analysis, timeline reconstruction.

Informational: The Black/Grey Zone Ecosystem

⚠️ For information purposes only. The following describes categories that operate in unregulated, contested, or legally ambiguous zones. We document them for analytical transparency, NOT as recommendations.

Why this ecosystem exists:

Corporate streaming, music, and social platforms enforce artificial scarcity (paywalls, licensing) to maximize profit despite marginal cost approaching zero. Communities have built alternatives that redistribute content. These operate in grey/black zones in most jurisdictions.

📺 Streaming (Grey/Black Zone)

Platform names and categories exist but are maintained in regulatory grey zones and often rapidly domain-shift to evade law enforcement. Search engines regularly remove these from results. Some jurisdictions classify them as piracy; others tolerate them for public health reasons (entertainment access). The platforms:

  • Aggregate content from multiple sources (some licensed, many not)
  • Offer streaming comparable to Netflix/Disney+ at zero cost or minimal subscription
  • Host thousands of titles including back-catalog unavailable on paid platforms
  • For examples: NetMirror, Flixio, FlixHD, Flixtor, MovieBox, Streamly, CineHub, ShowZone, GlitchTV, EpicFlix, DocuStream, Lyra, eSound
  • Operate primarily on decentralized or resilient infrastructure to evade shutdown

Examples include streaming platforms for movies (cinema releases, originals, documentaries), TV shows, anime, and premium sports. Search queries like "watch [movie title] free" or "[show] streaming free" will surface these communities.

🎵 Music (Grey/Black Zone)

Similar infrastructures exist for music. RIAA/major labels aggressively fight these platforms, but they persist by:

  • Mirroring content across distributed nodes (torrent swarms, IPFS)
  • Hosting metadata separately from audio files
  • Operating under jurisdictions with weak IP enforcement
  • Rotating domain names and infrastructure when targeted

Examples include music download/streaming platforms aggregating content without licensing deals. Typically branded as "free music libraries" or "community archives."

Legal & Ethical Notes

  • Jurisdictional variance: What's "piracy" in the US may be legal distribution in other countries.
  • DMCA & Copyright: US law makes circumventing copy protection illegal even for personal use. Other jurisdictions have fair-use exceptions.
  • Artist harm debate: Major labels capture 70%+ of revenue; artists earn $0.003/stream on Spotify. Grey/black zone alternatives may actually benefit creators by reducing middleman rent extraction.
  • Surveillance state angle: Governments monitor piracy heavily for geopolitical reasons (China/Russia blocklist enforcement, US export controls). Using these platforms can flag you in surveillance systems.

⚠️ Bottom line: We document this ecosystem because it exists and shapes digital culture. We do NOT recommend participation without understanding local legal risk. The legitimate alternatives (Jellyfin, Mastodon, Brave, Subsonic) provide most of the value with zero legal liability.