How to Protect Your Privacy in the Age of NSA Surveillance
I recommend people use Tor to help protect their
privacy. The easiest way to get started using Tor is TBB
Right to Internet access
The right to Internet access, also known as the right to broadband,
is the view that all people must be able to access the Internet in
order to exercise and enjoy their rights to Freedom of expression
and opinion and other fundamental human rights, that states have a
responsibility to ensure that Internet access is broadly available,
and that states may not unreasonably restrict an individual's
access to the Internet. Internet access is recognized as a right by
the laws of several countries. 
The Value of Privacy, security expert Bruce Schneier says, "Privacy
protects us from abuses by those in power, even if we're doing
nothing wrong at the time of surveillance." [2,3]
How the NSA Threatens National Security
BRUCE SCHNEIER ON PRIVACY AND THE DATA FREE-FOR-ALL
Why We Encrypt
Over 700 Million People Taking Steps to Avoid NSA
You can send email to cp at the domain name.
If you have a signed pgp key in the strong set, you can check out
the PGP path to key ef9d128d23e9eb24.
Many of the docs on creating GPG or PGP keys are out of date and
will lead you to creating weak keys. You should also use subkeys
and keep your certification key (the key used to sign other
people's keys) secure and offline as much as possible. This way you
can revoke subkeys and create a new one, or periodically expire
subkeys, and not lose all your certificate key signings.
covers the basics of using PGP/GPG but doesn't cover creating a
secure key that avoids using a SHA1 hash.
Debian's Creating a new GPG
Debian's Using OpenPGP
OpenPGP Best Practices
Chuck Peters, Linux Systems Administrator.