The Complete Privacy & Security Desk Reference (2016)

Justin Carroll and I have collaborated to create a comprehensive reference guide that includes the details of many years of successes and failures while researching privacy methods and techniques. It is used as the training manual for our live Privacy Crash Course. This page was created as a digital guide to help readers navigate directly to the public resources mentioned in the book.

Book Links

Chapter One: Basic Computer Security

Chapter Two: Web Browser Security

Chapter Three: Preparation

Chapter Four: Self Pre-Assessment

Chapter Five: Self-Background Check

Chapter Six: Online Account Security

Chapter Seven: Social Networks

Chapter Eight: Personal Data Removal

Public Data Brokers

Non-Public Data Brokers

Data Marketers

Ancestry Records

Removal Databases:

Chapter Nine: Credit Companies

Chapter Ten: Anonymous Purchases

Chapter Eleven: Anonymous Telephones

Chapter TWelve: Smart Phone Security

Chapter Thirteen: Computer Security: Data-at-Rest

Chapter Fourteen: Computer Security: Data-in-Motion

Chapter Fifteen: Aliases

Chapter Sixteen: Disinformation

Chapter Seventeen: Future Habits

Chapter Eighteen: Government Records

Chapter Nineteen: Communications Security: Email

Chapter Twenty: Communications Security: Voice and Text

Chapter TWent-One: Secure File Deletion

Chapter Twenty-Two: Stateless Operating Systems

Chapter Twenty-Three: Web Publishing

Chapter Twenty-Four: Official Physical Address

Chapter Twenty-Five: Major Life Events

Chapter Twenty-Six: Data Leakage Response

Chapter Twenty-Seven: The Ideal Setup

Buy The Book!

-Available Now
-Ships Immediately
-Free International Shipping
-Click the Book Below

Free Newsletter

to subscribe to our free monthly newsletter:

Suggested VPN

We currently recommend Private Internet Access (PIA) as our VPN of choice. While we are an affiliate of PIA, we also use it every day on all of our devices, and have for several years. If you would like a full comparison of the most popular VPN's check out If you would like to learn why we use PIA, CLICK HERE.

Additional Resources

Please visit all three of our Websites focused on OSINT, Digital Privacy, & Cyber Security:

Privacy Related Gifts

We always keep an updated list of privacy related gifts for those looking to introduce this topic to others (or just buy cool stuff for yourself). From books to security gadgets to faraday bags, we have you covered HERE.