Surveillance and the Art of Digital Camouflage is a practical textbook for stealth Internet communication. The author wrote it for IT laypeople owning a standard Windows or Linux computer. When you read this book and exercise with it, you reach a perfectly protected digital message exchange via four milestones. Those milestones are full control of your computer, receptive anonymity, expressive anonymity, and combining anonymity and encryption. Each milestone has a chapter assigned to it.
At the beginning of each chapter, the text defines and explains the respective milestone. Then the chapter introduces some free, open-source tools that the reader will use to reach the milestone. The third section of each chapter is a practical part. It presents numerous exercises to put the tools to work and practice stealth communication. Each of those exercises begins with an introduction listing the difficulty, the estimated working time, and prerequisites if needed.
When reading the chapters' exercise sections, you should have a running computer at your side, your gaze switching between the computer screen and book pages, and your fingers on the keyboard. The author will encourage readers to double-check assertions from the book against the results of own Internet inquests, to reproduce findings with their system, to install and use free, open-source software for digital defense, and to practice secure modes of communication. In the finalizing section of the chapters, the author describes attackers' options against the techniques practiced before and means to defend against those attacks.