Who has your best interest in mind? You? Or Your Government?
This was our founder's   Research Grant Application  written to articulate a vision to develop a comprehensive future surveillance program to protect Americans after the 9/11 Terrorist Attack. For most of us here at VrMaverick Company, we have spent our entire professional lives thinking over this question of Freedom VS. Security. However, on May 20th, 2013, after a young NSA contractor named Edward Snowden escaped to Hong Kong to disclose 10,000 leaked documents on the details of an already-existing, global-surveillance program that operates from right here inside of United States, we, along with most the global tech community, are fully convinced that our government has gone too far. Here are Snowden's Own Arguments   against the legitimacy of such an intrusive-and-expansive, state surveillance apparatus . The U.S. government has been spying on all of its citizens in secrecy for many years now. Even President Obama was forced to confirm the existence of such an expansive NSA's surveillance program. If the NSA is getting their intel without our knowledge or consent straight from the tap, there's nothing much an average American citizen can do about it. But here at VrMaverick Company, we strongly feel that, at the very least, we can make the NSA's job of spying on ordinary citizens a lot harder. VrMaverick Company, with the help of hackers who work professionally in high-level security environments, whose jobs (or more) depend on personal communication security, have compiled a comprehensive package of the best, anti-surveillance software and hardware to help our clients protect their own privacy (and private interests) from the interference and meddling of a globalist government that is slowly becoming ever more authoritarian and deceitful by the day.

This is a comprehensive list of the security software that we use to keep your computer and mobile devices safe and secure. These software solutions will protect the privacy of your data and communications. They will also secure all of your phone calls, SMS, email, internet communication, passwords, and data. Most of these security, anti-surveillance, privacy software are provided to us for free by their developers. You can download them through the links that we have provided below. VrMaverick company only charge our clients for technical consulting, configuration, support, and services. After we are done locking down your devices, even the NSA will find it extremely hard, if not impossible, to hack and track your computers and mobile devices.

1. Virus & Malware DetectionWe use Avast Antivirus Scanner , Advanced Systemcare , and  IObit Malware Fighter (FREE)

2. GlassWire Firewall  -   GlassWire's firewall software reveals threats your antivirus missed. GlassWire's network monitor visualizes your current and past network activity by traffic type, application, geographic location on all of your internet devices using on a beautiful and easy to understand graph. (FREE)

3. NoRoot Firewall (Mobile Devices) - Firewall for your Android and iOS Devices WITHOUT ROOT. Host name/domain name filtering, simple interface, fine-grained access control and no suspicious permissions on the firewall app itself. (FREE)

4. Spybot Anti-Beacon Spybot Anti-Beacon is a standalone tool which was designed to block and stop the various tracking (telemetry) issues present in Windows 10. It has since been modified to block similar tracking functionality in Windows 7, Windows 8 and Windows 10 operating systems. (FREE)

5. Signal, Text Secure, Red Phone - These apps encrypt instant messaging and voice calling for Android and iOS. They allow you to send one-to-one and group messages, which can include images and video messages, and make one-to-one voice calls. These apps use standard cellular mobile numbers as identifiers and end-to-end encryption to secure all communications to other users. (FREE)

6. Spoof Call Fake Caller Id Fake Id caller app works with any mobile and cell phone numbers to spoof your phone number. (FREE)

7. TextNow  - This free app gives you a personal phone number that allows you to text and place calls, anonymously. (FREE)

8. 2 Factor Authentication - Protect your online passwords and accounts. With 2-Step Verification, you'll protect your account with something you know (your password) and something you have (your phone or a  U2F Security Key ). Codes are uniquely crafted for your account when you need them. If you choose to use verification codes, they will be sent to your phone via text, voice call, or our mobile app. Each code can only be used once.

9. LastPass Password Manager - Protect and encrypt all of your passwords with a single master key. (FREE)

10. AppLock or Passcode These apps allow you to lock apps and features using a password or a fingerprint. (FREE)

11. Drive & Endpoint Encryption - Provide centralized management to automatically encrypt drives and files and customize the protection of sensitive information. We use BitLocker  for Drive Encryption and  7-Zip   for File Encryption. (FREE)

12. Eraser - A tool to permanently remove sensitive data from your harddrive so that it can never be recover again by anyone. (FREE)

13. ProtonMail - Encrypted Email Service that does not store your email history. ProtonMail's email server is located in Switzerland - a country that is outside of the US and EU jurisdiction. Switzerland applies a very different set of privacy laws.  In the US and EU, gag orders can be issued to prevent an individual from knowing they are being investigated or under surveillance. While these type of orders also exist in Switzerland, the prosecutors have an obligation to notify the target of surveillance as soon as possible, and the target has an opportunity to appeal in court. There are no such things as National Security Letters and all surveillance requests MUST go through the courts (this is not the case in Germany). Furthermore, while Switzerland is party to international assistance treaties, such requests for information must hold up under Swiss law which has much stricter privacy provisions. ProtonMail's paid service also provide you with a custom domain name address. (FREE)

14. OpenPGP - Email Encryption using PGP standard with an Open Key (for sharing) and a Private Key. (FREE)

15. JustProxy - Web based Proxy Server for Anonymous Web Surfing. (FREE)  

16. Tor - Protect your online anonymity and communication data by Toring Everything using the Tor Network as a Transparent Proxy for all of your Apps and Traffic by "rooting" your phone. Orbot , Orfox , and Onion Browser are the Tor apps that we use for mobile devices. (FREE)

17. CyberGhost VPN VPN software to access the internet, network resources, and services securely and anonymously. (FREE)

18. Open VPN  - The best inexpensive premium VPN software for IPhone and Android and Computers. (Free Trial)

19. Mac Makeup - Mac Makeup is a nifty little utility designed to modify your MAC address to hide your identity. (FREE)

20. Alternate DNS  - Add the following DNS servers to your network configuration to prevent DNS Leaks, to speed up your browsing experience, to improve your security, and to block ads: 208.67.222.222 and 208.67.220.220. Also use DNS Leak Test in order to test for DNS anonymonity. (FREE)

21. Tails Linux Distribution  - Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship anywhere you go and on any computer - leaving no traces. It is a complete operating system designed to be used from a DVD, USB stick, or SD card independently of the computer's original operating system. Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. Install on an USB Disk using LinuxLive USB Creator (FREE)

22. Let's Encrypt Open SSL  - " Let’s Encrypt" is a free, automated, and open certificate authority service for your website brought to you by the non-profit Internet Security Research Group (ISRG). (FREE)

23. BitCoin - Make payments using a cryptocurrency that is completely anonymous and untraceable using a mature open-source system that is peer-to-peer. All transactions take place between users directly, without any intermediary. This currency allows you to make all purchases and payments anonymously that even the CIA and NSA cannot track. This currency keeps the government, the financial regulators, the legislative bodies, and the law enforcement from monitoring, controlling, inflating, and devaluing your money through their Globalist Agenda and Monetary Policies. In fact, BitCoin has continued to appreciate in value and proves it to be a valid investment option.

24. Our Own Cocktail of Security Tools & Methods - Our tools will fortify your computers and your mobile, IoT, and communication devices to prevent the NSA from exploiting backdoors and zero-day exploits and spy on you by turning on your computer or phone's camera, microphone, GPS, and other sensors that are built into your own phone and other smart devices.


Network Analysis Tools:

1. WiFi Analyzer - WiFi Analyzer can help you to identify Wi-Fi problems, find the best channel or the best place for your router/access-point by turning your PC/laptop, tablet or mobile device into an analyzer for your wireless network. (FREE)

2.  Wireshark - One of the most powerful network protocol analyzers on the market (free or paid). In fact, Wireshark is often considered the de facto standard among the industry. (FREE)

3.  Zenmap - Zenmap, GUI for Nmap Security Scanner, is available for Windows, Linux, Mac, and BSD. Zenmap can be used to read live captures or save captures for later viewing. With Zenmap you can empower the features of Nmap to help you with: network inventory, managing service upgrade schedules, and monitoring host or service uptime. Features include Host discovery, port scanning, version detection, OS detection, scriptable interface, web scanning, full IPv6 support, Nping support, fast scanning. (FREE)

4.  NAST (Network Analyzer Sniffer Tool) - Nast is a packet sniffer and a LAN analyzer. It sniffs packets and save data in files, checks NIC in promiscuous mode, build LAN hosts list, find a gw, performs a port scanning, catches daemon banner etc... It also provides a GTK/Ncurses interface. (FREE)

5.  Angry IP Scanner  - An open-source, cross-platform scanner that is designed, from the ground up, to be incredibly fast and very simple to use. Angry IP offers the following features: Portable (zero installation on certain platforms); ping checks; NetBIOS information; resolves hostnames; determines MAC address; can determine currently logged-in user; plug-in system; scan results can be saved as CSV, TXT, XML, or IP-Port list; and fast, multi-threaded scanning. (FREE)

6.  Security & Surveillance, Spy & Anti-Spying Equipment  - Range of spy equipment products that include: Spy phones, Phone Bugging devices, Micro-transmitters, Wireless earphones, Invisible earphones, Micro-recorders, Digital micro-recorders, Micro-cameras, Aerial video surveillance systems, Remote-controlled helicopters, Telephone micro-transmitters, Micro bugs, Environmental and counter surveillance systems, Bug sweeping and interception, Radars that allow you to see through walls, and etc.

7.  Frequency Counter  - This frequency meter measures 27Mhz to 3Ghz of the continuous carrier signal with signal strength indicator.


Let's face it, anyone can fall victim to a crime at any time. And we all have loved ones and valuables that we want to keep safe and protect. But we do not want to pay hundreds of dollars a month for security. We want security to be FREE! We want to have a peace-of-mind in this world for FREE!

That's where "AI" smart-home automation comes in using IoT and mobile devices. Instead of paying hundreds-of-dollars a month to purchase a comprehensive security plan (like ADT), use our "AI" security software package to guard your home, 24/7, for FREE. Our advanced security system that can be customized and installed in minutes comes with the support for unlimited devices, unlimited cameras, unlimited rules, unlimited alerts, unlimited sharing, unlimited drone interfaces, and no monthly subscription fees required. This is the future of home security and how it should be done using "AI" smart-home automation.

Want to get started? It's simple. Got an "old-phone-at-home?" (Or we can get you a new compatible phone for under $50 dollars.) VrMaverick offers our custom suite of security software to transform your "old-phone-at-home" into an "AI" surveillance camera & security monitor for FREE. By accessing your old-phone-at-home's built-in sensors and networking and calling capabilities, our software package can turn your old-phone-at-home into a motion, sound, smoke, flood, vibration, and temperature-activated security camera. When a problem or a threat happening in your home has been detected, our software will sound the alarm and notify you on your personal smartphone - wherever you are. And if the threat persists, our software has the option to allow itself to automatically dial "9-1-1" and "talk" to the police with a voice description of the exact problem(s) or threat(s) happening to your home using its speech engine. This "9-1-1" call option is FREE through the use your old-phone-at-home's innate calling capability without the need of installing a SIM card.

(Note: You do not need a SIM card to use the "9-1-1" emergency service in the US. By Law, all network carriers in the US must accept "9-1-1" calls and allow them to go through for free - even if the phone does not have a SIM card. If you live outside of the US, please check your own local laws.)

Our smart-home's security package can also be further expanded to use IoT add-on products that will allow you to monitor and control your home from anywhere in the world. Outdoor IP cameras and security sensors with night-vision capabilities, 360-degrees cameras, motion detectors, smoke detectors, flood detectors, water sensors, temperature sensors, humidity sensors, touch sensors and more can all be easily added on, wirelessly, to watch over and keep you connected with the things that matter to you the most. Our "AI" security software can do more than just watch over your home. It can be customized to control electric appliances remotely with our support for Wireless Smart Plugs. It can also be programmed to see if your kids got home safely, make sure your garage door is closed, and check if your pet's water dish is empty - all done from your smartphone from anywhere.

Finally, in the future, on top of supporting Smart Home IoT Devices, we want to expand our "AI" software package to interface with and support surveillance and weaponized robotic drones. Access and control a remote car camera over the internet. Automatically send drones armed with tasers to fire upon intruders in your home. So, instead of paying big bucks for traditional security systems, be part of the Internet-of-Things Revolution and automate your Smart Home Security with us for FREE!



Our Spy Solutions are made both for computers and for mobile devices. These spy solutions can be sent through a SMS message, an email, or be manually downloaded to run in the background as an invisible process. They are completely undetectable and can be installed in a matter of seconds. After they are installed, whenever the infected phone or the computer is used, the background invisible process will send reports and data back to the cloud for you to access.

Our Spy Solutions can help you keep a close eye on and track and record everything that your enemies can do with a computer or a smartphone. For example, you can use the mobile app to spy on your enemies' calls, application usage, emails, GPS locations, text messages, photos, Social Media, and much more. You can even trigger your victim's Phone Camera and Microphone to see and hear what is going on around the person that you are spying on. These spy records, data, and usage reports are constantly updated in real-time for as long as the computer or the smartphone is connected to the internet. Checking the spy reports and data online, from the cloud, is easy. You can use any web browser to log into your cloud account to view those reports.

Our Spy Solutions are fully compatible with all mobile platforms and computer operating systems. Their Full Functional Specs include:

1. Keylogger
2. Activating the phone’s camera to take secret pictures
3. Activating the phone's microphone to record its surroundings
4. View the Phone’s Screen
5. Record Phone Calls and Track Call logs and Contacts
6. Track and record SMS/MMS/Text/Social Media
7. View URL Browsing History
8. Instant GPS Locations Tracking & GPS History Logging
9. Access Photos & Videos
10. View All Emails
11. View YouTube Videos Watched
12. Monitor Social Media and Track Social Networking Logs
13. Application Monitoring & Blocking
14. Monitor Calendar Events
15. Delete Files and Uninstall Software
16. Accessing Voice Memo Recordings
17. Get SIM Card Information
18. Remotely Change Password, Lock Down, or Uninstall and Remove All Traces of Our Spy Solution from Your Victim's Device(s).
Making your ideas into a "virtual" reality