Surveillance Hardware And Software


 

| EJF Home | Finding Help | Places To Look For Help | Join the EJF | Comments? | Get EJF newsletter | Newsletters |

 

Issues of Public Interest — | Mens' and Women's Resources — By State | Sites in the United States | Countries Other Than the United States |

| Women's Issues | Children, Family, Marriage, and Elder Abuse | Veteran Issues And Resources | Mental Health | Gay and Lesbian Issues |

| Authors, Columnists, Institutes, And Newspapers | Law Research and Legal Help |

| State of Colorado | United States Government |


 
Note: The Equal Justice Foundation does not endorse, warrant, or support any of the surveillance hardware or software listed here. Nor are we affiliated in any way with any of the companies or suppliers. The information is provided solely for the purpose of defense against false allegations and to help prevent or deter stalking.

 

Index

Introduction

Hardware

Public directories

Remote computer access

Software


 

Introduction

Top

Surveillance technology is both improving and becoming more affordable. While we are well aware of the potential for abuse of surveillance, the level of threat many men, women, and their children face justifies virtually any defense they can mount.

Note that most of the hardware and software listed works only on a PC. Surveillance hardware and software is a fast-growing field so it may also be advisable to use a search engine to obtain a broader view of what is available. Digital recording devices are preferable to analog, or tape recording. Other methods and techniques have been described by the Wall Street Journal in The Surveillance Catalog.

The Equal Justice Foundation strongly recommends at least audio recording any and all contacts with government and court officials. Digital audio and video recorders are now available in many forms including fountain pens, cigarette lighters, flash drives, jewelry pins, cell phones, etc., that are easily concealed in a shirt pocket.

Even if told you cannot record the meeting it is in your best interest to make a recording anyway.

That is particularly true in dealing with child protective services or in court hearings. The EJF has received numerous complaints that court transcripts or tapes have been altered or are missing, CPS has said one thing in a meeting and their documents another, police reports don't reflect the incidents reported, and so on. And if you have questions about whether it is legal for you to record some answers can be found here. In most situations the answer is “Yes,” it is legal though authorities will fret and fuss about it. So it is advisable to be discrete about it.

And be sure to use transcription software to make a printed copy of the audio recording.

Get at least an audio recording. Video with sound is better but not always possible.

 

Hardware

Top

A picture is worth a thousand words.
123CCTV — Security cameras and surveillance systems.

410 Lawrence Bell Drive, Unit 11

Buffalo NY 14221

Telephone: (716) 304-0250

ApexCCTV — Security cameras, CCTV cameras, and security DVRs superstore.
AR.Drone 2.0 — For aerial reconnaissance.
Camera Security Direct

Analog security camera cheat sheet

Five reasons top business owners swear by security cameras

CCTV Security Pros — CCTV cameras and security systems.
Hammacher Schlemmer

Digital voice activated recorder

Driving activity recorder — Locations, speed, magnetic clip, software or use with Google Earth to see where the car has been.

Video and camera pen — Clips in breast pocket and records both sights and sounds.

Geeks.com — Various computer and electronic parts at generally reduced prices.
GoPro Cameras — Wearable recording cameras in nearly any environment or mount them on drones like the LA100 UAV.
Home Security — Alarms, security systems, and preventative measures.

Guns In America — How to buy, sell, and shoot in every state.

Lily Camera — World's first throw-and-shoot camera. Waterproof, ultra-portable, and shoots HD pictures and videos. 
IWatchLife — Intelligent video security systems.
MP3 Players — Recording devices

Stealth voice recording watch

NuSpectra — Pan, tilt, zoom (PTZ) Internet cameras.
PalmVid Hidden and miniature surveillance cameras. Wide variety of styles and options.

123 North Union Blvd.

Colorado Springs, Colorado 80908

Telephone: (719) 635-7880 or toll free (800) 618-7491

Fax: (719) 623-0081

Email: webstaff@palmvid.com

Proof Pronto — Tomorrow's security today.

Voice-activated digital recording pen

RFID, Inc. — Radio frequency identification products for tracking vehicles or individual items.
Sensefly — Low-level aerial remote sensing.

Swinglet camera — Easy to use flying camera using an unmanned aerial vehicle (UAV).

Spy Gadgets

Digital pen recorder

Spyville — Spy cameras and security equipment

Spy pen digital voice recorder

Supercircuits — Direct source for security video cameras.

Telephone: (800) 335-9777

Virtual Surveillance — Surveillance hardware and installation. Also many useful articles on surveillance technology.
Wave Bubble — Design for a self-tuning portable RF jammer

 

Public directories

Top

You are always better off hiring a private investigator if you need information about an individual, particularly with current stalking laws. However, a great deal of information can be found in public directories at little or no cost. Some of these directories are listed below. The list is by no means exhaustive.

All Free Records — Help finding all public records in the United States.
AnyWho — Finding people or businesses.
BackgroundChecks.org — Public records, reverse phone lookup, etc.

U.S. Census Guide — How to get the most out of Census.gov

Comparitech — Tech compared and reviewed.

Biggest data breaches in history

Cyber security resources — List of tools and guides

Electronic Frontier Foundation

Surveillance Self Defense

Defensive technology

Emergency and Disaster Information Service — Provides real-time information about international and national disasters.
Guerrilla Mail — Offers disposable email addresses that automatically expire after one hour and can no longer be accessed.
Identity Theft
Instant Checkmate — Record check on individuals.
Intelius — Comprehensive information about you and most anyone else.
PeopleFinders.com
Privacy Rights Clearinghouse — Nonprofit consumer information and advocacy information.

Data breaches

Online Data Vendors: Opting out of directory assistance and non-public information

Reporters Committee For Freedom Of The Press

Can we tape? — Guide to taping phone calls and in-person conversations in the 50 states and D.C.

SANS — The most trusted source for computer security training, certification and research.

Top cyber security risks

SuperPages.com

People Pages

Yellow Pages

Surveillance Self Defense — Electronic Frontier Foundation (EFF) site to educate public about law and technology of government surveillance, provide information and tools necessary to evaluate the threat, and take appropriate steps to defend against it.
The Surveillance Catalog — Documents obtained by The Wall Street Journal a window into global market for the off-the-shelf surveillance technology.
TruthFinder — Public records search — Social Media, Photos, Police Records, Background Checks, Civil Judgments, Contact Information, Etc.
US Search — People search and background checks
Whitepages — The first online white pages we are aware of.

 

Remote computer access

Top

There is a very high probability that the first sign you'll have that Cupcake is unhappy with you is an ex parte restraining order. If you have surveillance hardware and software running, or even if you don't, you will probably want access to your computer even if forced out of your home. Fortunately there are a variety of methods to do that. But such methods probably won't do you much good if you don't have them installed and tested in advance of Cupcake's little surprise.

You should also take every reasonable precaution to prevent unauthorized access to your computer(s) and keep offsite backups at least once a month of critical files in a location where Cupcake can't get to them and destroy or take them.

Here are but a few of the many ways you can remotely access your computer as well as protect it from intrusion:

GoToMyPC — Access your PC from any web browser or wireless device.
Macintosh Airport Extreme — Up to 500 foot wireless connection to late-model Macs or connect to the Internet through the base station.
Proxy Networks — Access your PC from anywhere you have an Internet connection.
SANS — The most trusted source for computer security training, certification and research.

Top cyber security risks


 

Software

Top

The use of some of this software can easily be turned against you to claim you are stalking someone. Please be sure to ensure yourself against that claim and only use it for legal purposes.

It should also go without saying that you must have regularly-updated virus and spyware protection installed in every computer you use at work and at home.

If you know of better software or some not listed here please let us know at comments@ejfi.org.

AVG antivirus and antispyware for PCs — The Internet security suite is recommended. Versions for some other operating systems are available.
FlexiSpy — Spy phone, GPS tracker, location tracking, remote listening for mobile/cell phones.
Greenhouse — A free browser extension for Chrome, Safari, and Firefox that exposes the role money plays in Congress and highlights key election races. Displays detailed campaign contribution data for every Senator and Representative, including total amount received and breakdown by industry and by size of donation. Puts vital data where it's most relevant so you can discover the real impact of money on our political system.
Intego.com — Virus and Internet security software for Macs
Next Tag — Voice recognition and transcription software.
Nuance — Bought out rights to IBM's Via Voice in 2003

Dragon speech recognition software. — Available for PC, Mac, Linux, other operating systems.

Privacy.net — See how you are tracked.
Remote Utilities — Remote control software and screen sharing for PCs.
ScanSoft — Imaging, speech and language software.
Software Protection Initiative — A DoD project for computer security. Encryption and other security software is publicly available.
SpectorSoftSpector and eBlaster software for monitoring and recording Internet activity. Capture keystrokes and screen images from a PC. E-mail them to a remote location.
WebCamSoft .

WebCam Watchdog — Top-rated software.

Veriato — Find out how you can be tracked across the Internet.

Top


 

| EJF Home | Finding Help | Places To Look For Help | Join the EJF | Comments? | Get EJF newsletter | Newsletters |

 

Issues of Public Interest — | Mens' and Women's Resources — By State | Sites in the United States | Countries Other Than the United States |

| Women's Issues | Children, Family, Marriage, and Elder Abuse | Veteran Issues And Resources | Mental Health | Gay and Lesbian Issues |

| Authors, Columnists, Institutes, And Newspapers | Law Research and Legal Help |

| State of Colorado | United States Government |


 

This site is supported and maintained by the Equal Justice Foundation.

Last modified 1/22/19