Anons, in light of recent events it might be wise to educate yourselves in the fundamentals of cybersecurity (if you haven't done so already). Below are some tools and techniques you should consider using depending on your individual circumstances. Other CSEC anons will likely have more to add in the replies.
NOTE: These measures will help protect against surveilance and direct attacks. The clowns will likely be using DDOS attacks and CPU-destroying malware in order to shut down anons. Backup your research on multiple flashdrives; use physical pads to write down notes. Furthermore, these measures are only worthwhile if you practice good OPSEC. Be sure to read up on the topic if you're unfamiliar.
1. Stop Using Windows/macOS
While Linux might not be as invulnerable as a lot of tech-evangelists claim it is, Windows and macOS are packed to the brim with backdoors. Ultimately it's better to stick to what you know, but if you use a proprietary OS, you have been warned.
2. Tor
The bread and butter of anonymous browsing. Easy to use and allows you to select the level of security you desire. Be aware of its limitations though: Tor is safest when you completely disable scripts, which will break quite a few sites. It also doesn't encypt any of the data you upload or send, so you will have to use a seperate program. Lastly, be aware that the clowns have been know to set up malicious exit nodes in order to spy on users. Stay aware of where you're connecting to.
3. Brave
Doesn't anonymize your IP address like Tor, but is built around blocking trackers. This will at least help you stay out of the Google-sphere if you have to use their services during the course of your research.
4. VPNs
Law enforcement and the IC have "unmasked" Tor users by simply checking to see who was using Tor at the time of an incident. One way to thwart this is to add an extra layer of protection by hiding your Tor usage with a VPN. The quality and security of the VPN will depend on which one you choose. Vet accordingly.
5. MAT
Pictures and other files contain metadata, which can be used to find their originator. This is particularly important for photos, since the metadata can not only include the camera used to take the picture, but the location of where it was taken. Any original images posted here should first be cleaned up with the Metadata Anonymisation Toolkit.
6. Tails
WARNING: SNOWDEN HAS PERSONALLY RECOMMENDED THIS. POSSIBLE CLOWN OS.
A portable Linux distro that's booted up from a thumbdrive. It's designed to pipe everything through Tor and forget all data upon shutdown. More suited for quick browsing and communication. Each version is dependant on the then-current version of Tor, so be aware of any vulnerabilities that might come out of the box.
7. Whonix
A two-piece virtual machine that--like Tails–connects to the internet via Tor. However it is not anmesiac and will retain your data. The virtual aspect provides a good deal of protection from attacks on the host machine. There are currently efforts to expand this protection by having a multi-host setup, though this is only for power users.
8. Stegnography
The concealment of files in other files. This can range from glaringly obvious, to almost impossible to detect. There are many different programs, but steghide is one of the most commonly used. Be sure to keep track of which file you use, where that file is, and what you're hiding inside it. For example, it wouldn't be wise to try hiding a 10 GB archive in a 250x250 jpeg that is the only file in your Pictures folder. Make sure the file size makes sense and that it blends in with its surroundings.
9. VeraCrypt
Very handy tool for encrypting files and hard drives. Be sure to verify your download using the PGP Key listed on the Downloads page.
10. Air gaps
This is overkill, but worth thinking about. An air gap is a configuration of two computers where one is used to download and scan files for malware before they're transfered over to an offline computer. This can help protect your achives (and memes) from damaging online attacks.
11. MELTDOWN/Spectre Precautions
MELTDOWN is a vulnerability affecting Intel x86 CPUs, which basically puts any computer using post-1995 Intel hardware at risk. AMD CPUs are not affected by MELTDOWN, but are susceptable to another, somewhat harder to execute vulnerability known as Spectre. Study these vulnerabilities closely and find your own way to try mitigating them. Patches are being released, but at the cost of performance. There reason I mention this is because these will likely be MAJOR weapons used by the clowns in their attempts to erase as many of our findings as possible.
There are many more tools and techniques out there to help keep you safe online, but this is a good starting point.