If they wanna get you, they can get you though. TOR was started by the Navy, Tails isn't completely anonymous, and Proxies and VPNs only keep out the low-level hackers and ISPs. If they really want to get you, they can. I used to work as a contractor for the gov, and we used TOR and an IP masker to get into extremist sites, but we still got caught. If they want to, they can find you. Nothing is really safe unless you use the "burner phone" method (i.e., buy a laptop with cash, use an open Wifi network, use TOR, VPNs, and Proxies, change your MAC address, do your dirt, and then throw the computer away). I don't know why any legit person would need to use the "burner phone" method, but it's really the only safe way. But if you need to do that,

you're probably doing disgusting illegal shyt.