This step by step tutorial should help an investigator or agency set up a Linux based laptop computer for surfing websites and sending and receiving emails securely and without revealing the user's identity.
This set up uses the Tor browser to enable anonymous browsing. Learn more about Tor here.
Time estimates for completing each step are provided.
A list of additional resources is available at the bottom of this page.
Linux is an operating system like Windows and MacOS. It is open source software which means that it is free to install and use.
There are many different versions of Linux available (called distributions or "distros") and many offer a user experience very similar to Windows or Mac computers. Popular distros are Ubuntu, Mint and Elementary.
Linux is very robust and secure. Linux powers the servers that run 96.5% of the top one million domains in the world! You can read more about the history of Linux here.
Linux is also the operating system underneath many of the OSINT (Open Source Intelligence) and InfoSec (Information Security) toolkits out there, for example:
Having experience with Linux will serve you well if you intend to do any work in these areas.
This tutorial relies on Ubuntu, a polished, reliable and easy to use distro.
Many websites maintain logs of their online visitors. IP addresses of most government and private organizations are easily identifiable.
Covert online investigations should therefore not be conducted over a corporate or government network. It is always best to obtain a separate internet connection not associated with a specific corporate or government entity.
Many regulatory and law enforcement agencies maintain a separate internet connection for investigative purposes. If this is not an option for you, consider exploring any available free wireless networks you may be able to use. Here is a guide if that is your only option.
It is important to keep your covert hardware truly covert. Do not use it for any sort of personal use. No personal browsing or emails. No logging into any websites with personal credentials. No documents containing any sort of personal information on the covert computer.
If there is no personal information on your covert machine your identity simply cannot be compromised.
A. Find a used laptop with at least the following specs:
(Potential sources: Work IT department, Craigslist, Kijiji, eBay, friends and family)
B. Find an 8 GB USB drive.
Find a working computer running Windows with an internet connection and a USB drive and create a USB installer by following the steps in this tutorial:
tutorials.ubuntu.com/tutorial/tutorial-create-a-usb-stick-on-windows#0
You will need to download Rufus on your Windows computer to create the installer.
A. Plug in your covert laptop, but do not turn it on.
B. Insert the USB drive into your covert laptop.
C. Determine how to get your laptop to boot from the USB drive. Turn your computer on and look for a message like "Press F12 to Select Boot Device". Then press and hold that key until a message appears confirming your choice. Your laptop may boot in its normal manner if you are not quick enough. In that case, hold down the power button until the computer shuts off and try again. For most computers, the key to hit is F12. For some it is F8, ESC, F10, or F2.
A. Start with Step 4 of the following tutorial, to install Ubuntu:
https://tutorials.ubuntu.com/tutorial/tutorial-install-ubuntu-desktop#3
Please be sure to do the following, for the noted steps in this tutorial:
A. Remove the USB drive and reboot your computer.
B. At the prompt, enter your password. You should now see the default Ubuntu interface:
C. Look for the Firefox icon on the left side of the screen, and click it (see above). This will open the Firefox browser.
Go to this page (https://sites.google.com/view/osint-tutorials/build-a-covert-pc).
Scroll down to Step 6.
Click this link to watch an introduction video which explains the Ubuntu interface:
You may need to increase the volume on your computer (click the speaker icon in the upper right hand corner and adjust as necessary).
Note that it skips the first bit of the video.
In order to use Ubuntu optimally, it is very useful to learn about the command line functionality, or "Terminal" application, where you can enter simple commands for Ubuntu to execute.
Go to this tutorial and read it through:
tutorials.ubuntu.com/tutorial/command-line-for-beginners#0
In order to make the Terminal easily accessible, you can create a shortcut for it in the side menu by right clicking on the icon (after you search for "Terminal") and selecting "Add to Favorites". See the screenshot below.
(You can also just use the keyboard shortcut CTRL-ALT-T.)
Open a Terminal window and run the following command:
sudo apt install torbrowser-launcher
You will be prompted for your account password. Enter it:
This will start the install process. Let it run its course. It will take a few seconds. Once you are back to a cursor, you are done:
Now close the Terminal window. Note that there is a new icon in your menu on the left. It looks like a little green Earth. This is the Tor launcher icon.
Click the Tor launcher icon. Tor will launch:
Once Tor is running, you can use it like any other browser!
Be sure to read the intro and the manual (see links at arrows above).
There are several options for email. For any of these, simply follow the account creation process from these links, after opening them in Tor: