Free Tools to Send Anonymous Messages

A corporate investigations manager shares five tools for concealing your identity

Whether it is for an investigation, a whistle-blower statement, a prank or just extreme paranoia, you may have a need for anonymously sending messages. The following five tools provide an easy to use way to communicate incognito with Internet surfing, emails, phone calls and text messages. While these tools have their limitations, they do provide an Investigator a great way to hide his identity, gather intelligence, and communicate secretly when needed.

Fake Name Generator If you have ever tried to use your social engineering skills to gather information and were confronted for a name or other information, causing you to pause in deep thought only to blurt out "John Smith!", you are not alone. Before creating any covert online profile or making any surreptitious phone calls, you need a realistic-yet-random pseudonym. Visit, pick your nationality and gender then instantly receive a new name, address, phone number, usable email address, mother's maiden name, birthday, credit card number, expiration date (not valid of course), social security number, job occupation and UPS tracking number. Never be caught off guard or use the name Cliff Huxtable again.

XB Browser (aka Easy-to-Use TOR) Before doing any Internet browsing on your suspect's website or when using some of the tools below, make sure you are hiding your IP address from prying eyes. The last thing you want your suspect to see on their counter log is your company's IP address hitting their site hundreds of times while you collect evidence. TOR (The Onion Router) is a complex set of networks that bounce your browsing request across the globe to its final destination, making your IP appear to be from the last TOR volunteer network host. XB Browser (, formally known as Tor Park, is a free and easy-to-use browser with TOR ready to run -- no tricky setup or installation steps.

Before I begin I always check my IP address on with my personal browser and then again with XB Browser. Even if you have your own fake third party email account, use XB Browser to send and receive email. Some suspects know how to check your IP address in the email header and can see you are sending fake emails from your company.

Two further notes: Internet surfing on TOR is very slow and not secure. By design you are jumping across the globe, sometimes going across personal networks can slow down your speed when viewing data. If the information must be secure, encrypt and send it.

Email Spoofing Although offers a free anonymous email and XB browser prevents your third party email from being tracked back to you, sometimes you want to anonymously send someone an email with a spoofed email address to get their attention. A lot of people refuse to open emails they don't recognize, opting to delete or send to the spam folder. With you can easily use any email address as the sender and anonymously send your email to someone. Combine with XB Browser and truly hide your identity.

Caller ID Spoofing Caller ID spoofing has gotten a lot of attention in the press over the last couple of years. (See Truth, Lies and Caller ID.) From hacking into Paris Hilton's voicemail to pre-texting scandals, the media has scared Congress into trying to create laws to block companies like and that provide caller ID changing, call recording and voice changing services. Although not free, both offer five free minutes to try their caller ID services online and are great tactics to make your suspect pick up his phone when his "mom" calls.

Anonymous Text Messages Last on the list is, a website that offers free anonymous text messaging. Unfortunately these text messages cannot be spoofed or returned to sender, but provide a great way to anonymously get your message across. (If you are looking to spoof a text message, try for anonymous and spoofed messages at $.08 apiece.)

Brandon Gregg is a Corporate Investigations Manager.

Join the CSO newsletter!

Error: Please check your email address.

Tags MessagingIMsecurity tools

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Brandon Gregg

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place