The Tools Already Exist to Make Power Visible
60+ free, open-source tools for investigation, conflict monitoring, democratic oversight, AI security, decentralized communication, OSINT, personal counter-surveillance, and accountability. Nobody compiled the list — until now.
Why Information Changes Everything
Donella Meadows, the systems scientist who gave us the concept of leverage points, identified twelve places where you can intervene in a complex system. Most activism — most politics, most media — operates at the lowest-leverage points: arguing about numbers, tweaking parameters, fighting over budgets. The interventions that actually transform systems happen higher up.
Leverage point #6 is Information Flows: who knows what, who can see what, who can verify what.
Meadows' most powerful example: In 1986, the US government required companies to report what toxic chemicals they released into the environment. No fines. No new regulations. Just information — made public. Within years, toxic emissions dropped 40%.
This principle is why fifth-generation warfare targets information flows first. It's why data sovereignty matters. It's why our ICE activity tracking follows the same logic as the Toxic Release Inventory: make the system's behavior visible so people can respond.
What follows is a curated list of tools that do exactly this. Every one is free, open-source, or community-maintained. Every one takes something that was previously opaque — financial networks, military operations, congressional votes, media framing, ecological damage, police conduct — and makes it publicly navigable.
Nobody had to pass a law requiring these tools to exist. Nobody had to get permission. People saw that power was hiding in opacity and built instruments of visibility.
Investigation & Financial Network Analysis
Tools for surfacing hidden relationships in financial crime, corporate ownership, and political money.
Conflict Monitoring & Military Accountability
Tools for making military operations, their costs, and their consequences visible in real time.
Democratic Transparency
Tools for making the behavior of elected officials and government institutions visible.
Media Literacy & Disinformation Detection
Tools for making narrative manipulation visible — essential in an era of fifth-generation warfare.
Environmental Monitoring
Tools for making ecological damage visible — following the exact principle of the Toxic Release Inventory.
Police & Government Accountability
Where to Start
Thirty tools is overwhelming. Here's how to pick based on what you care about:
| If you want to... | Start here |
|---|---|
| Follow the money in politics | OpenSecrets + LittleSis |
| Investigate corporate networks | OCCRP Aleph + OpenCorporates |
| Track conflicts in real time | World Monitor |
| Understand media bias | Ground News |
| File public records requests | MuckRock |
| Monitor deforestation or air quality | Global Forest Watch + OpenAQ |
| Track congressional votes | Suffragium |
| Research Epstein primary sources | Jmail + SilenceDidThis + SomaliScan |
| Learn OSINT investigation | Bellingcat Toolkit |
| Detect cell-site simulators | Rayhunter (EFF, $20 hardware) |
| Secure AI agent infrastructure | Cisco MCP Scanner + A2A Scanner |
| Build offline resilience | Offline Directory + RNode |
| Track ICE contracts | ICE Contracts Explorer |
| Map critical infrastructure | Open Infrastructure Map + Gridline World |
| Build decentralized communication | Reticulum + Sideband |
| Run automated OSINT collection | SpiderFoot + Shodan |
Government Accountability & Contract Tracking
Tools for tracking government contracts, congressional behavior, and enforcement patterns — added March 12, 2026.
Intelligence & Infrastructure Mapping
Multi-layer OSINT dashboards and infrastructure maps for situational awareness — added March 12, 2026.
AI & Agentic Security
As AI agents gain authority to execute code, access databases, and act on behalf of humans, the security of the “connective tissue” — the protocols, tools, and skills that connect AI to the world — becomes critical infrastructure. These tools make that attack surface visible. Context: Cisco’s State of AI Security 2026 found that 26% of 31,000 agent skills contained at least one vulnerability, and multi-turn jailbreak attacks succeed 92.78% of the time against open-weight models.
Personal Security & Resilient Communication
Tools for detecting surveillance at the personal level, communicating when infrastructure is compromised, and maintaining digital autonomy. These operate at the individual layer that our psychology of authoritarian control research identifies as the first target of coercive systems.
Decentralized Communication
Networking stacks and clients that operate without centralized infrastructure. When ISPs, cell towers, or platforms are compromised or shut down, these tools maintain the ability to communicate — added March 12, 2026.
OSINT & Investigation
Automated open-source intelligence collection, relationship visualization, breach monitoring, and internet-connected device discovery — added March 12, 2026.
AI Governance
Frameworks and policy instruments for governing AI systems as operational actors rather than passive tools — added March 12, 2026.
The Principle Behind the Tools
Every tool on this list follows the same logic: information flow as structural intervention. Nobody had to pass a law requiring them to exist. Nobody had to get permission. People saw that power was hiding in opacity and built instruments of visibility.
This is the same principle behind our ICE activity tracking for Austin and Minneapolis. The same principle behind our surveillance countermeasures research. The same principle behind our data sovereignty guides: when you make the system's behavior visible, people can respond. When you keep it hidden, they can't.
Meadows understood something that most activists miss: you don't always need to fight a system to change it. Sometimes you just need to make it visible. The rest follows.
"There is a systematic tendency on the part of human beings to avoid accountability for their own decisions. That's why there are so few feedback loops in the structures of most systems."
— Donella Meadows, Leverage Points: Places to Intervene in a System (1999)
These tools are the feedback loops that were missing. They exist because people built them. They work because information, once visible, changes how everyone behaves — the watched and the watchers alike.
If you know of tools we've missed — especially for supply chain transparency, labor rights monitoring, or environmental justice — send them our way. This list should be as complete as we can make it.
Related Reading
- The Psychology of Authoritarian Control: From Cults to Cognitive Warfare
- Fifth-Generation Warfare: The Invisible War Already Underway
- Data Privacy & Sovereignty Best Practices (Feb 2026)
- Defeating Facial Recognition in an AI Surveillance Era
- How Isolated People Find Each Other
- ICE Activity Within a 2-Hour Radius of Austin, TX