This is a review of recently leaked documents that detail state-actors surveillance technologies. In the presentation I provide easy to implement actionable methods to detect state actor surveillance, and steps you can take to defend against them. (short version)