Surveillance Hardware And Software


 

| EJF Home | Finding Help | Places To Look For Help | Join the EJF | Comments? | Get EJF newsletter | Newsletters |

 

Issues of Public Interest — | Mens' and Women's Resources — By State | Sites in the United States | Countries Other Than the United States |

| Women's Issues | Children, Family, Marriage, and Elder Abuse | Veteran Issues And Resources | Mental Health | Gay and Lesbian Issues |

| Authors, Columnists, Institutes, And Newspapers | Law Research and Legal Help |

| State of Colorado | United States Government |


 
Note: The Equal Justice Foundation does not endorse, warrant, or support any of the surveillance hardware or software listed here. Nor are we affiliated in any way with any of the companies or suppliers. The information is provided solely for the purpose of defense against false allegations and to help prevent or deter stalking.

 

Index

Introduction

Hardware

Public directories

Remote computer access

Software


 

Introduction

Top

Surveillance technology is both improving and becoming more affordable. While we are well aware of the potential for abuse of surveillance, the level of threat many men, women, and their children face justifies virtually any defense they can mount.

Note that most of the hardware and software listed works only on a PC. Surveillance hardware and software is a fast-growing field so it may also be advisable to use a search engine to obtain a broader view of what is available. Digital recording devices are preferable to analog, or tape recording. Other methods and techniques have been described by the Wall Street Journal in The Surveillance Catalog.

The Equal Justice Foundation strongly recommends at least audio recording any and all contacts with government and court officials. Digital audio and video recorders are now available in many forms including fountain pens, cigarette lighters, flash drives, jewelry pins, cell phones, etc., that are easily concealed in a shirt pocket.

Even if told you cannot record the meeting it is in your best interest to make a recording anyway.

That is particularly true in dealing with child protective services or in court hearings. The EJF has received numerous complaints that court transcripts or tapes have been altered or are missing, CPS has said one thing in a meeting and their documents another, police reports don't reflect the incidents reported, and so on. And if you have questions about whether it is legal for you to record some answers can be found here. In most situations the answer is “Yes,” it is legal though authorities will fret and fuss about it. So it is advisable to be discrete about it.

And be sure to use transcription software to make a printed copy of the audio recording.

Get at least an audio recording. Video with sound is better but not always possible.

 

Hardware

Top

A picture is worth a thousand words.
007 Security Cameras
123CCTV — Security cameras and surveillance systems.
Aaron Gregory Spy Marketing — GPS vehicle tracking systems, hidden video cameras, phone recorders, etc.
ApexCCTV — Security cameras, CCTV cameras, and security DVRs superstore.
AR.Drone 2.0 — For aerial reconnaissance.
Big Daddy Spy Market
Camera Security Direct
CCTV Security Pros — CCTV cameras and security systems.
DashCam Pro — Keep your own records of what happened while you were driving.
Draganfly Innovations, Inc. — Saskatoon, Saskatchewan, Canada Telephone: (800) 979-9794
DVR Security Solutions — Digital surveillance
Electronic Surveillance Equipment (EBugging.com) — Also some debugging equipment.
DronesVision — Ground and aerial surveillance equipment and support.
Hammacher Schlemmer
Geeks.com — Various computer and electronic parts at generally reduced prices.
GoPro Cameras — Wearable recording cameras in nearly any environment or mount them on drones like the LA100 UAV.
Home Security — Alarms, security systems, and preventative measures.
Lily Camera — World's first throw-and-shoot camera. Waterproof, ultra-portable, and shoots HD pictures and videos. 
IWatchLife — Intelligent video security systems.
MP3 Players — Recording devices
NuSpectra — Pan, tilt, zoom (PTZ) Internet cameras.
PalmVid Hidden and miniature surveillance cameras. Wide variety of styles and options.
Proof Pronto — Tomorrow's security today.
RFID, Inc. — Radio frequency identification products for tracking vehicles or individual items.
Security Cameras.com — Security cameras for home and business.
Security Cameras Direct — Security cameras, closed circuit television (CCTV) systems, wireless and covert surveillance, time lapse recorders, etc.
Security Products Inc. — May be more expensive than elsewhere but complete packages may be useful for the less technically adept.
Sensefly — Low-level aerial remote sensing.
Speech Technology.com
Spy Gadgets
Spyville — Spy cameras and security equipment
Supercircuits — Direct source for security video cameras.
Techvege — Traveler in technology
The Protection Pros — Spy gear, surveillance cameras, telephone security, etc.
Virtual Surveillance — Surveillance hardware and installation. Also many useful articles on surveillance technology.
Wave Bubble — Design for a self-tuning portable RF jammer

 

Public directories

Top

You are always better off hiring a private investigator if you need information about an individual, particularly with current stalking laws. However, a great deal of information can be found in public directories at little or no cost. Some of these directories are listed below. The list is by no means exhaustive.

All Free Records — Help finding all public records in the United States.
AnyWho — Finding people or businesses.
Comparitech — Tech compared and reviewed.
Electronic Frontier Foundation

Defensive technology

Emergency and Disaster Information Service — Provides real-time information about international and national disasters.
Guerrilla Mail — Offers disposable email addresses that automatically expire after one hour and can no longer be accessed.
I dentity Theft
Instant Checkmate — Record check on individuals.
Intelius — Comprehensive information about you and most anyone else.
PeopleFinders.com
Privacy Rights Clearinghouse — Nonprofit consumer information and advocacy information.
Reporters Committee For Freedom Of The Press
SANS — The most trusted source for computer security training, certification and research.
SuperPages.com
Surveillance Self Defense — Electronic Frontier Foundation (EFF) site to educate public about law and technology of government surveillance, provide information and tools necessary to evaluate the threat, and take appropriate steps to defend against it.
Switchboard — The first online white and yellow pages we are aware of.
The Surveillance Catalog — Documents obtained by The Wall Street Journal a window into global market for the off-the-shelf surveillance technology.
United States Background Checks
US Search — People search and background checks

 

Remote computer access

Top

There is a very high probability that the first sign you'll have that Cupcake is unhappy with you is an ex parte restraining order. If you have surveillance hardware and software running, or even if you don't, you will probably want access to your computer even if forced out of your home. Fortunately there are a variety of methods to do that. But such methods probably won't do you much good if you don't have them installed and tested in advance of Cupcake's little surprise.

You should also take every reasonable precaution to prevent unauthorized access to your computer(s) and keep offsite backups at least once a month of critical files.

Here are but a few of the many ways you can remotely access your computer as well as protect it from intrusion:

Adeona — Open source system for tracking location of your lost or stolen laptop. Does not rely on a proprietary, central service.
GoToMyPC — Access your PC from any web browser or wireless device.
Macintosh Airport Extreme — Up to 500 foot wireless connection to late-model Macs or connect to the Internet through the base station.
Proxy Networks — Access your PC from anywhere you have an Internet connection.
SANS — The most trusted source for computer security training, certification and research.

 

Software

Top

The use of some of this software can easily be turned against you to claim you are stalking someone. Please be sure to ensure yourself against that claim and only use it for legal purposes.

It should also go without saying that you must have virus and spyware protection installed in every computer you use at work and at home. We have had bad luck with McAfee and Norton and currently use AVG on our PC and VirusBarrier on our Mac.

If you know of better software or some not listed here please let us know at comments@ejfi.org.

Adeona — Open source system for tracking location of your lost or stolen laptop. Does not rely on a proprietary central service.
AVG antivirus and antispyware for PCs — The Internet security suite is recommended. Versions for some other operating systems are available.
Dragon Speech Recognition Software — Convert speech to text. You should be recording and transcribing every hearing, telephone call, and meeting with any and all public officials.
e-Speaking — Free voice recognition software for PCs.
FlexiSpy — Spy phone, GPS tracker, location tracking, remote listening for mobile/cell phones.
Free Phone Tracer — Reverse lookup application for any phone number.
Gotcha! — Use in conjunction with one or more PalmVid hidden cameras. Motion detection video surveillance software that captures images only when triggered, providing time stamped video surveillance files of events as they occur. Features e-mail notification of events. You can also create a web video surveillance site and view your home remotely.
Greenhouse — A free browser extension for Chrome, Safari, and Firefox that exposes the role money plays in Congress and highlights key election races. Displays detailed campaign contribution data for every Senator and Representative, including total amount received and breakdown by industry and by size of donation. Puts vital data where it's most relevant so you can discover the real impact of money on our political system.
Intego.com — Virus and Internet security software for Macs
Next Tag — Voice recognition and transcription software.
No Trace — Clear your computer of all potentially incriminating photos, email, files, etc.
Nuance — Bought out rights to IBM's Via Voice in 2003
Privacy Track — Find out how you can be tracked across the Internet.
Remote Utilities — Remote control software and screen sharing for PCs.
ScanSoft — Imaging, speech and language software.
Software Protection Initiative — A DoD project for computer security. Encryption and other security software is publicly available.
SpectorSoftSpector and eBlaster software for monitoring and recording Internet activity. Capture keystrokes and screen images from a PC. E-mail them to a remote location.
WebCam Corp .

Top


 

| EJF Home | Finding Help | Places To Look For Help | Join the EJF | Comments? | Get EJF newsletter | Newsletters |

 

Issues of Public Interest — | Mens' and Women's Resources — By State | Sites in the United States | Countries Other Than the United States |

| Women's Issues | Children, Family, Marriage, and Elder Abuse | Veteran Issues And Resources | Mental Health | Gay and Lesbian Issues |

| Authors, Columnists, Institutes, And Newspapers | Law Research and Legal Help |

| State of Colorado | United States Government |


 

This site is supported and maintained by the Equal Justice Foundation.

Last modified 2/4/18