ACLED
Dati sugli eventi di conflitto e impatto civile
Why: Mostra dove avvengono violenze e danni ai civili
Example: Usa ACLED per trovare cluster di incidenti per data e regione
Learn moreEverything you need to monitor, investigate, and take action for peace, justice, and non-violent social change.
Strumenti e metodi per tracciare conflitti, disinformazione e rischi di escalation.
Dati sugli eventi di conflitto e impatto civile
Why: Mostra dove avvengono violenze e danni ai civili
Example: Usa ACLED per trovare cluster di incidenti per data e regione
Learn moreTracciamento globale delle notizie e delle narrative
Why: Individua cambi di narrazione nei media che possono precedere una escalation
Example: Usa GDELT per individuare cambi di narrativa prima di un’escalation
Learn moreVerifica e geolocalizzazione
Why: Fornisce tecniche per verificare immagini e materiali multimediali
Example: Segui i flussi di lavoro di Bellingcat per geolocalizzare una foto
Learn moreRaccoglitore automatico di impronte pubbliche
Why: Scova connessioni pubbliche tra domini, IP, email e profili social
Example: Mappa sottodomini aziendali e email per un fornitore
Learn moreFramework modulare per la ricognizione web
Why: Permette ricerche ripetibili tramite moduli OSINT
Example: Esegui moduli di Recon-ng per raccogliere dati su dirigenti e documenti
Learn moreRaccoglie email pubbliche, sottodomini e host
Why: Aiuta a tracciare l’impronta web pubblica di un’azienda
Example: Enumerare host e email pubbliche associate a un appaltatore della difesa
Learn moreDashboard in tempo reale con conflitti, instabilità dei paesi, spostamenti e notizie globali
Why: Integra dati ACLED, UNHCR, NASA FIRMS e feed di intelligence live in una unica interfaccia geopolitica
Example: Monitora in diretta escalation militari, corridoi umanitari e segnali di crisi regionale
Learn moreVisualizzazione e mappatura delle relazioni
Why: Rende le relazioni tra persone e organizzazioni semplici da visualizzare
Example: Crea un grafo che colleghi un’azienda di lobbying a appaltatori e donatori
Learn moreRicerca dispositivi e servizi esposti su Internet
Why: Rivela infrastrutture esposte e servizi operativi pubblici
Example: Verifica server esposti collegati alla logistica di un fornitore
Learn moreEstrae metadata da documenti pubblici (PDF/DOC)
Why: I metadata possono rivelare autori, percorsi server e versioni software
Example: Trovare autore o percorsi interni in un contratto pubblicato
Learn moreGeolocalizzazione e mappatura di post social pubblici
Why: Aiuta a verificare affermazioni di localizzazione usando contenuti pubblici
Example: Mappa foto pubbliche per confermare data e luogo di un evento
Learn moreArricchisce feed e intelligenza da fonti pubbliche
Why: Aggrega ed arricchisce liste per facilitare l’analisi
Example: Aggiungi informazioni su sanzioni a una lista di fornitori per contestualizzare
Learn moreEnumera sottodomini e host pubblici
Why: Scova servizi pubblici precedentemente ignoti legati a un’organizzazione
Example: Scoprire portali interni che ospitano file di procurement
Learn moreMotore di ricerca per host e certificati TLS
Why: Mostra dove e come sono ospitati servizi e relazioni infrastrutturali
Example: Individua sovrapposizioni di hosting tra agenzie e appaltatori
Learn moreEstrazione metadata per documenti
Why: Rivela informazioni nascoste in allegati (autori, percorsi)
Example: Estrai metadata da un PDF di gara per tracciare l’origine
Learn moreRaccolte di dataset e tool per uso locale
Why: Pacchetta strumenti e dati per analisi rispettose della privacy
Example: Imposta una raccolta locale di strumenti per workshop e formazione
Learn moreExtract text from scanned documents, images, and PDFs with open-source OCR engines. Essential for archival research, leaked document analysis, and historical record digitization.
Workflow Example: Download leaked PDFs → OCR with DeepSeek/PaddleOCR → Extract entities (names, amounts, dates) → Store in SQLite FTS5 → Search and cross-reference → Export findings as structured CSV/JSON.
Instead of relying on corporate data services, use free and open-source APIs to collect, analyze, and visualize data directly. These resources are maintained by communities and trusted organizations.
The problem: For over a decade, corporate digital services relied on a closed model: proprietary platforms, opaque pricing, licensing lock-in, and centralized control. This worked because there were no credible alternatives at scale.
That condition no longer exists. Large language models (LLMs) combined with mature open-source ecosystems are structurally undermining the value proposition of big tech products.
What this means for you:
| Corporate Service | Open-Source Alternative | Benefits |
|---|---|---|
| Google Suite (Gmail, Docs) | NextCloud, OnlyOffice, LibreOffice | Self-hosted, no data extraction, portable |
| Zoom | Jitsi Meet, Element (Matrix), BigBlueButton | End-to-end encrypted, federated, community-run |
| Slack | Mattermost, Rocketchat, Zulip | Transparent, full data control, export anytime |
| Salesforce/HubSpot (CRM) | Odoo, SuiteCRM, Pimcore | Customizable, no vendor lock-in, lower cost |
| ChatGPT (Proprietary AI) | Ollama, LLaMA, GPT4All (local models) | Run locally, no data sent to servers, free |
| Tableau/PowerBI (Analytics) | Metabase, Apache Superset, Grafana | Dashboard control, SQL direct, community support |
In 2025, over 60,000 pages of Epstein-related documents were officially released by the U.S. House Oversight Committee and federal courts. These documents expose institutional failures, complicity networks, and power dynamics that enabled decades of abuse.
Download the comprehensive guide: document acquisition workflow, full-text search database setup, entity extraction, co-occurrence analysis, and reproducible methodology for investigating power networks.
📥 Download Complete Guide (200 KB)Includes: JMail.world email database, text extraction pipeline (Python + OCR), SQLite FTS5 database, entity mapping, co-occurrence analysis, timeline reconstruction.
Brave (built-in ad-blocking), Firefox (open-source), Ungoogled Chromium (privacy fork).DuckDuckGo (no IP logging), SearXNG (privacy metasearch).Invidious (YouTube without tracking/algorithm).Mastodon (federated, no algorithm), Pixelfed (photo sharing).Mastodon (open, decentralized).Diaspora (federated), Signal (encrypted messaging).Jellyfin (self-hosted media), Kodi (media center).Subsonic, Airsonic (self-hosted music).All of these are legal, production-ready, and often superior to corporate alternatives. You keep your data. No account bans. No algorithm.
Template, briefing e strumenti scaricabili per campagne pacifiche
Download ready-to-send petitions demanding diplomacy, ceasefires and humanitarian prioritization.
Download ENCopy-and-paste email templates to contact MPs and local representatives.
Download ENOne-page briefing templates for journalists and policymakers.
Download ENPersonalize messages and briefings with our safe AI prompt templates.
AI prompts (EN) Prompt AI (IT)Quick MP message example (copy-and-paste):
Dear [MP Name], I'm a constituent and I urge you to request an independent audit of contract [#] due to concerns about [brief impact]. Please ask the minister to pause any further disbursements until the review is complete.
See the briefing template for evidence structure. When in doubt, consult the OSINT safety resources before publishing.
Use AI and open-source tools to automate research, data cleaning, and coordination. Always verify AI outputs with human fact-checking.
Don't let AI do your thinking for you. Use it to save time on boring stuff so you can focus on what matters: understanding your issue, talking to people, organizing action.
📖 Read the full resources → AI for Campaigns: A Practical Resources for Activists
Real use cases:Use LLaMA Factory and easy-dataset to create datasets and fine-tune models on campaign-specific language, terminology, and evidence patterns.
Example: Train a model to recognize propaganda narratives in news feeds, detect fake claims in corporate statements, or summarize witness testimony consistently.
→ GitHub Repo & ResourcesRun on your own hardware. No cloud dependency. No API logging. Perfect for sensitive campaigns in countries with surveillance.
OpenRefine — Hands-on data cleaning without coding. Dolt — Version-controlled databases.
Track changes in contracts, spending, corporate records. See who changed what, when. Build an auditable trail.
Apache Airflow — Schedule and monitor data pipelines. Run reports automatically.
Example: Every morning, download latest arms export data, cross-check against your target list, flag new contracts.
Detect propaganda, escalation language, and disinformation in real time.
Use case: Monitor official statements and news feeds. When language shifts toward war rhetoric, alert your network. Get ahead of escalation.
Tools for teams to organize evidence securely and share findings responsibly.
Bellingcat methodology • Shared spreadsheets with access controls • Encrypted document stores.
Never trust AI alone. It's a tool. It makes mistakes. It can hallucinate. It can be biased.
Rules:See Privacy & Security resources for threat modeling and safe AI use in restricted contexts.