A covert application, including one or more modules can be provided to assist individuals in conducting covert cyber operations. Furthermore, the covert application can operate in a secure operating environment, which provides a reliable and protected computing environment from which a user can conduct cover cyber operations. The covert application can allow a user to create and utilize one or more personas. Personas created by the covert application can appear to originate from any part of the world, and personas can allow a user of the covert application to interact through various Internet services, such as email, instant messaging, online forums, and website browsing.