The EMF Radiation Detector – Magnetic Field Detector uses android phone’s sensor called magnetometer to detect Electromagnetic waves around you.
EMF measurements or measurements of radiation, electromagnetic fields that are performed using particular sensors or probes such as EMF Meters. It can be used to pick up evidence of electronic harassment or to locate hidden electronic devices.
I have tested this and others like it, against expensive meters and they are usually quite accurate, assuming the magnetometer is of recent make and properly calibrated. though, at this time, they cannot distinguish between electronic and magnetic radiation.
There are similar apps available for iOs and should “they” ever hinder its performance (and they likely will), many others like it available in the Playstore.
UltraSound Detector is an app that allows you to detect ultrasound (ultrasonic) acoustic signals above the user-defined frequency (above 18 KHz by default).
Perps notoriously use low-intensity, low-frequency ultrasound to deliver V2K and Silent Sound voices and sounds designed to send the unwitting victims into desired states of emotion (make you anxious, horny or afraid, for example) or consciousness (make you suddenly very sleepy). The signals for these sinister applications, usually fall between 17.5 and 23 khz and 10-80 db. If you are targeted, you will likely find that such a signal can be picked up 24/7 near your home and vehicles. Those with V2K hear voices that nobody else can, while those with Silent Sound have perpetual tinnitus (a ringing in one or both ears).
This app is feature-rich, allowing a user to log the activity, set up alarms, convert the sound to be within the audible range and view the signal with an oscilloscope. Don’t expect to hear voices – that conversion occurs at the skull – but you will be able to hear and see a pattern in the sounds and it will sound sort of like creepy music.
InfraSound Detector is the App that allows you to detect infrasound (infrasonic) acoustic signals below the user-defined frequency (up to 30 Hz by default).
I do not yet fully understand their applications for Infrasound, though I find that the when I Google any given frequency (unlike the ultrasound, I find a wide range and intensity), I often find research on the physiological or emotional effects it can elicit in humans. Infrasound can be used to influence your emotional state and potentially even cause physical harm, depending on the intensity of the sound. Infrasound can also be used to issue commands to your electronic devices. I discovered that it is their method of sending spurious commands to my Alexa, without logging in to my Amazon account, when I checked the recordings associated with my Amazon and found that those were either silence or faint clicks.
It has the same features as UltraSound Detector, though the oscilloscope is much more useful and visually appealing on this app. As with UltraSound Detector, the converted targeting signals, when listened to, have a distinctive, repetitive pattern and sound musical.
Audacity is an easy-to-use, multi-track audio editor and recorder for Windows, Mac OS X, GNU/Linux and other operating systems.
Developed by a group of volunteers as open source.
Audacity is the program I use for recording and amplifying silent sound. It can also be used to make or review recordings taken while you are away from home or asleep. It is easy to visually see when any sound occurred, saving a lot of time. I find it most useful in spectrogram view.
This App will Help you in Detecting “IMSI Catchers” (also called “Fake Cell Towers” or “Stingrays”).
For several years the FBI and Local Police have been listening to our Calls and Reading our Text Messages, using so-called “IMSI-catchers”. One Example of such a “Fake Cell Tower” is the “Stingray”, which is produced in the USA.
“Stingrays” are Mobile Devices that simulate Cell Phone Towers, forcing nearby Phones to Connect to them. They can Identify your Phone, and possibly listen to your Calls. Without having to put a Spy app in your Phone!
These “Cell Spy” Devices can capture Information from All Cell Phones within Range, including IMSI Identity, Location, SMS Messages, Call Logs and Call content.
(IMSI stands for “International Mobile Subscriber Identity”, which will Identify your Phone).
It is known that at least 53 Agencies in 21 States own “Stingrays”.
Law Enforcement Agencies, Foreign Powers – and possibly Criminals – are using such “Cell Site Simulators” for Surveillance Purposes – without our knowledge.
“Cell Spy” Devices can be Hand-carried, or be mounted in Vehicles, Airplanes, Helicopters and Unmanned Aerial Vehicles.
This App will Detect all types of fake WiFi hotspots.
This “Fake Hotspot Detector” makes use of Geolocation to associate each Detected WiFi Hotspot (i.e. Network) with a particular WiFi Zone.
Since I have unlimited data, the only wifi networks to which I usually connect are the ones at home or at my parents’ house, which I already knew were “Evil Twin” networks (a network which shares the SSID and credentials of a legitimate network, which is suppressed, prompting devices to connect to the malicious network instead). I connected to multiple public hotspots in order to test this app, however, and only the known malicious networks registered hits, so it appears to work as advertised.
The website of Steve Gibson, the voice of the “Security Now” podcast, which I highly recommend, for staying up to date on the latest cyber security threats.
GRC offers a host of freeware utilities, focused on security, an online port scanner called ShieldsUp, as well as a paid program called SpinRite, which can revive most dead hard drives.
Harden Windows 10 – A Security Guide, provides documentation on how to harden your Windows 10. It explains how to secure your Windows 10 computer. The knowledge contained stems from years of experience starting with Windows Vista. Hardening is performed using mostly native Windows tools and Microsoft tools. For a small fee, the author will send you a set of batch files he created to automate the process.
Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. All its incoming and outgoing connections are forced to go through Tor, and any and all non-anonymous connections are blocked. The system is designed to be booted as a live DVD or live USB, and will leave no digital footprint on the machine unless explicitly told to do so. The Tor Project has provided financial support for its development. According to the Whonix Project, in comparison with other anonymity-focused software or platforms, “Tails is better suited for high-risk users who face aggressive, targeted surveillance.
SpyBot is a free windows ad-ware, spyware and malware scanner, with a wide scope of protection and immunization, which can be run alongside Windows Defender or other antivirus program.
Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with an android device. It can get you out of all sorts of jams and give you a lot of information about what is going on inside of a phone and if your phone suddenly becomes unable to be booted into recovery, as one of mine has, you can still clear the cache and view recovery logs.
Windows Sysinternals is a suite of more than 70 freeware utilities, used to monitor, manage and troubleshoot the Windows operating system.Windows Sysinternals is a suite of more than 70 freeware utilities, used to monitor, manage and troubleshoot the Windows operating system
These utilities are executable files that do not require installation to run. To use them, simply download the file, extract it to a folder on your computer and right-click on the utility you want to use and run as administrator.
Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).
Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level
KeePassX is an application for people with extremly high demands on secure personal data management. It has a light interface, is cross platform and published under the terms of the GNU General Public License.
KeePassX saves many different information e.g. user names, passwords, urls, attachments and comments in one single database. For a better management user-defined titles and icons can be specified for each single entry. Furthermore the entries are sorted in groups, which are customizable as well. The integrated search function allows to search in a single group or the complete database.
KeePassX offers a little utility for secure password generation. The password generator is very customizable, fast and easy to use. Especially someone who generates passwords frequently will appreciate this feature.
The complete database is always encrypted either with AES (alias Rijndael) or Twofish encryption algorithm using a 256 bit key. Therefore the saved information can be considered as quite safe. KeePassX uses a database format that is compatible with KeePass Password Safe. This makes the use of that application even more favorable.
This is open source, free encryption software. It can encrypt folders, files, and systems. It gives you extra protection against data theft and data leaks. It was created a way of addressing some of the security issues and vulnerabilities that were seen with TrueCrypt.
Other Features of VeraCrypt Include:
- Protection against Cold Boot Attacks
- No Backdoor Access
- Creates On-The-Fly Encryption Volumes
- Stops Data Leaks
- Prevents Data Theft
The ability to produce on-the-fly encryption volumes means that your data is encrypted automatically just prior to its being saved. And your data is decrypted instantly as it is loaded. No additional intervention is required on your part. No data that is stored inside of an encrypted volume can be decrypted or read if the user does not have the correct password, encryption keys, or key file. You can encrypt an entire filing system, including folder names, filenames, all of the content of each and every file, the metadata, free space, and more.
Some versions of Windows come pre-installed with full-disk encryption software, called Bitlocker. It is only available on some Pro and Enterprise versions of Windows. It uses something that is built into most modern motherboards, called a Trusted Platform Module, to store its encryption keys. VeraCrypt has chosen not to use this method, because it has been successfully exploited in the past. Since BitLocker is not open source, there is no way of knowing whether Microsoft has any built-in backdoors, which could be used to break the encryption. On a positive note, Bitlocker is simpler to use, so if you don’t want to hassle with VeraCrypt, you should at least roll the dice and turn on Bitlocker in your Windows settings. It can be enabled with just a few clicks and is better than nothing.
VirusTotal is an online service that analyzes files and URLs enabling the detection of viruses, worms, trojans and other kinds of malicious content using antivirus engines and website scanners. It also can be used to detect false positives.
They also produce an app for Android and iOS, which scans, not only URLs but apps and more.