ACLED
Event data on conflicts & civilian harm
Why: Identifies where violence and civilian impact occur
Example: Use ACLED to find incident clusters by date and region
Learn moreEverything you need to monitor, investigate, and take action for peace, justice, and non-violent social change.
Tools and methods to track conflicts, misinformation, and escalation risk.
Event data on conflicts & civilian harm
Why: Identifies where violence and civilian impact occur
Example: Use ACLED to find incident clusters by date and region
Learn moreGlobal news & narrative tracking
Why: Detects shifts in media narratives that may precede escalation
Example: Use GDELT to spot narrative changes before an escalation
Learn moreGeolocation & verification workflows
Why: Provides techniques to verify imagery and media
Example: Follow Bellingcat workflows to geolocate a photo
Learn moreAutomated public footprint gatherer
Why: Uncovers public connections between domains, IPs, emails and social accounts
Example: Map corporate subdomains and publicly listed emails for a supplier
Learn moreModular reconnaissance framework
Why: Provides repeatable module-based OSINT searches
Example: Run Recon-ng modules to collect officers and corporate filings data
Learn moreCollects public emails, subdomains and hosts
Why: Helps map a company’s public internet footprint
Example: Enumerate hosts and public email addresses for a defense contractor
Learn moreReal-time dashboard: global conflicts, country instability, displacement & live intel feeds
Why: Aggregates ACLED, UNHCR, NASA FIRMS and live intelligence streams into one geopolitical interface
Example: Track live military escalation, humanitarian crises and regional risk scores across 180+ countries
Learn moreVisual relationship & network mapping
Why: Makes complex relationships between people and organizations easy to visualise
Example: Create a graph linking a lobbying firm, contractors and donors
Learn moreSearch for exposed devices and services
Why: Reveals exposed infrastructure and potential operational systems
Example: Check for exposed servers or services linked to supplier logistics
Learn moreExtracts metadata from public documents (PDF, DOC, etc.)
Why: Metadata can show authorship, server paths and software versions
Example: Find document author or internal paths that corroborate timelines
Learn moreGeolocation & public social-post mapping
Why: Verifies location claims by mapping content on public accounts
Example: Map field photos posted publicly to confirm date and place
Learn moreEnriches feeds and threat intel from public sources
Why: Aggregates and enriches lists for easier analysis
Example: Add sanctions or registry info to a supplier list for context
Learn moreEnumerates subdomains and public hostnames
Why: Finds previously unknown public services related to an organisation
Example: Discover hidden portals hosting procurement files
Learn moreSearch engine for hosts and TLS certificates
Why: Shows hosting relationships and infrastructure connections
Example: Identify shared hosting between agencies and contractors
Learn moreMetadata extraction for documents
Why: Reveals hidden items in attachments (authors, paths)
Example: Extract metadata from a tender PDF to trace origin
Learn moreCommunity datasets & tool collections for offline use
Why: Packages tools and datasets for privacy-respecting analysis
Example: Set up a local tool collection for training or workshops
Learn moreExtract text from scanned documents, images, and PDFs with open-source OCR engines. Essential for archival research, leaked document analysis, and historical record digitization.
Workflow Example: Download leaked PDFs → OCR with DeepSeek/PaddleOCR → Extract entities (names, amounts, dates) → Store in SQLite FTS5 → Search and cross-reference → Export findings as structured CSV/JSON.
Instead of relying on corporate data services, use free and open-source APIs to collect, analyze, and visualize data directly. These resources are maintained by communities and trusted organizations.
The problem: For over a decade, corporate digital services relied on a closed model: proprietary platforms, opaque pricing, licensing lock-in, and centralized control. This worked because there were no credible alternatives at scale.
That condition no longer exists. Large language models (LLMs) combined with mature open-source ecosystems are structurally undermining the value proposition of big tech products.
What this means for you:
| Corporate Service | Open-Source Alternative | Benefits |
|---|---|---|
| Google Suite (Gmail, Docs) | NextCloud, OnlyOffice, LibreOffice | Self-hosted, no data extraction, portable |
| Zoom | Jitsi Meet, Element (Matrix), BigBlueButton | End-to-end encrypted, federated, community-run |
| Slack | Mattermost, Rocketchat, Zulip | Transparent, full data control, export anytime |
| Salesforce/HubSpot (CRM) | Odoo, SuiteCRM, Pimcore | Customizable, no vendor lock-in, lower cost |
| ChatGPT (Proprietary AI) | Ollama, LLaMA, GPT4All (local models) | Run locally, no data sent to servers, free |
| Tableau/PowerBI (Analytics) | Metabase, Apache Superset, Grafana | Dashboard control, SQL direct, community support |
In 2025, over 60,000 pages of Epstein-related documents were officially released by the U.S. House Oversight Committee and federal courts. These documents expose institutional failures, complicity networks, and power dynamics that enabled decades of abuse.
Download the comprehensive guide: document acquisition workflow, full-text search database setup, entity extraction, co-occurrence analysis, and reproducible methodology for investigating power networks.
📥 Download Complete Guide (200 KB)Includes: JMail.world email database, text extraction pipeline (Python + OCR), SQLite FTS5 database, entity mapping, co-occurrence analysis, timeline reconstruction.
Brave (built-in ad-blocking), Firefox (open-source), Ungoogled Chromium (privacy fork).DuckDuckGo (no IP logging), SearXNG (privacy metasearch).Invidious (YouTube without tracking/algorithm).Mastodon (federated, no algorithm), Pixelfed (photo sharing).Mastodon (open, decentralized).Diaspora (federated), Signal (encrypted messaging).Jellyfin (self-hosted media), Kodi (media center).Subsonic, Airsonic (self-hosted music).All of these are legal, production-ready, and often superior to corporate alternatives. You keep your data. No account bans. No algorithm.
Download petitions, MP email templates, briefing PDFs and media assets
Download ready-to-send petitions demanding diplomacy, ceasefires and humanitarian prioritization.
Download ENCopy-and-paste email templates to contact MPs and local representatives.
Download ENOne-page briefing templates for journalists and policymakers.
Download ENPersonalize messages and briefings with our safe AI prompt templates.
AI prompts (EN) Prompt AI (IT)Quick MP message example (copy-and-paste):
Dear [MP Name], I'm a constituent and I urge you to request an independent audit of contract [#] due to concerns about [brief impact]. Please ask the minister to pause any further disbursements until the review is complete.
See the briefing template for evidence structure. When in doubt, consult the OSINT safety resources before publishing.
Use AI and open-source tools to automate research, data cleaning, and coordination. Always verify AI outputs with human fact-checking.
Don't let AI do your thinking for you. Use it to save time on boring stuff so you can focus on what matters: understanding your issue, talking to people, organizing action.
📖 Read the full resources → AI for Campaigns: A Practical Resources for Activists
Real use cases:Use LLaMA Factory and easy-dataset to create datasets and fine-tune models on campaign-specific language, terminology, and evidence patterns.
Example: Train a model to recognize propaganda narratives in news feeds, detect fake claims in corporate statements, or summarize witness testimony consistently.
→ GitHub Repo & ResourcesRun on your own hardware. No cloud dependency. No API logging. Perfect for sensitive campaigns in countries with surveillance.
OpenRefine — Hands-on data cleaning without coding. Dolt — Version-controlled databases.
Track changes in contracts, spending, corporate records. See who changed what, when. Build an auditable trail.
Apache Airflow — Schedule and monitor data pipelines. Run reports automatically.
Example: Every morning, download latest arms export data, cross-check against your target list, flag new contracts.
Detect propaganda, escalation language, and disinformation in real time.
Use case: Monitor official statements and news feeds. When language shifts toward war rhetoric, alert your network. Get ahead of escalation.
Tools for teams to organize evidence securely and share findings responsibly.
Bellingcat methodology • Shared spreadsheets with access controls • Encrypted document stores.
Never trust AI alone. It's a tool. It makes mistakes. It can hallucinate. It can be biased.
Rules:See Privacy & Security resources for threat modeling and safe AI use in restricted contexts.