Privacy and security have become ongoing concerns for citizens of every country worldwide.

While most of us are not doing anything wrong on the internet, we all have plenty to protect, including our identities, our health data and our financial and investment information. Today human rights advocates, journalists, law enforcement agencies and normal people who want to protect their right to privacy use a technology called tor and an operating systems called Tails.


Tor ( and Tails( are freely available to the public and at CSI we have created a set-by-step program that takes you through how to use them and how to get them to launch from your own computer (which can be really tricky). So please join us for a collaborative session to learn how to take back the internet and be private and secure online. Please send us your expression of interest at

Read the Brochure

Tails operating system

CSIs Internet Anonymity Training comes complete with a bootable USB that includes the open-source operating system, Tails, a user manual for how to access the Internet anonymously and access to our online video tutorials. Tails is a live operating system that you can start on almost any computer from a USB stick.

Tails aims at preserving your privacy and anonymity, and helps you to:

  • use the Internet anonymously and circumvent censorship;
  • all connections to the Internet are forced to go through the Tor network;
  • leave no trace on the computer you are using unless you ask it explicitly;
  • use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.

who uses tails?

  • Normal people use Tails to protect themselves and their children from unauthorised use of personal data and to be protected against identity and property theft;
  • Journalists use Tails to to securely accept documents from and communicate with anonymous sources;
  • Law enforcement uses Tails for online surveillance and to create completely anonymous tip-lines;
  • Activists & Whistleblowers use Tails to anonymously report corruption and human-rights abuses.

Our CIA-CAT teaches you how to browse the internet anonymously, how to set up a secure data storage area, and how to access information, email and office applications with the highest possible degree of privacy and security.

Our Tails manual and bootable Tails USB are available for use in training session in our Melbourne, Australia offices. This page is here for people to provide expressions of interest to help us determine when and how to deliver the Tails training in early 2020.


Our curriculum includes:

  1. Why is your privacy and security so important;
  2. What is a computer operating system (OS) and how the most popular OSs compromise your privacy and security;
  3. What data is being collected about you, often without your knowledge or consent, and why this could be problematic for you;
  4. What is the onion router (tor), what is the Tails operating system;
  5. How to startup your own computer using the Tails operating system using a USB;
  6. Who are the 5-eyes countries, the 9-eyes countries and the 14-eyes countries and why you should know about them, particularly how they might share your data with each other without you knowing;
  7. What are the best applications  to use for sharing information and storing data;
  8. Which countries have the best data privacy laws and how to access services that are hosted there and why this helps you to maintain a high degree of privacy and security.

The course runs over a full day once a month and is limited to 20 people. 

Please see the below calendar for more information and send us your expression of interest at

    Get in Touch


      Upcoming Courses

      No event found!