NSA has been trying to break through online anonymity

Latest secret documents provided by Edward Snowden and published by Guardian show that NSA has been trying to break through online anonymity provided by TOR.

The National Security Agency has been trying to crack the online anonymity provided by Tor, a US-funded Internet tool designed to keep Net activity private and said to be widely used by dissidents in oppressive countries, as well as by terrorists. That’s according to the latest secret intelligence documents drawn from the cache leaked by Edward Snowden and published by the UK’s Guardian newspaper.

The NSA hasn’t been able to crack Tor outright, but through various means it’s been able to “de-anonymize a very small fraction of Tor users,” says an internal NSA document quoted by the Guardian.

Part of a page from a secret NSA document titled "Tor Stinks"
Part of a page from a secret NSA document titled “Tor Stinks”

The news of the agency’s interest in Tor follows a report last month on the NSA’s efforts to circumvent privacy-ensuring encryption of all kinds. The New York Times said the agency has sidestepped common Net encryption methods in a number of ways, including hacking into the servers of private companies to steal encryption keys, collaborating with tech companies to build in back doors, and covertly introducing weaknesses into encryption standards. The revelations are all part of the outcry over surveillance that’s been kicked up by the Snowden leaks.

TOR or “The Onion Router” — was first developed by the US Naval Research Laboratory and is currently funded in part by the US State Department and Department of Defense.

To put it simply, Tor facilitates anonymous Web surfing, forum posting, instant messaging, and other Internet communication by wrapping signals in layers of encryption and then sending them on an unpredictable path through a network of routers. Each router peels off one “skin” of encryption to send the signal along, but no one router has access to all the details — thus the signal cannot be traced back to its sender.

US government funding is based, in part, on the desire to help Internet users in a country like China, say, access restricted sites or communicate about prohibited subjects without fear of reprisal. But Tor might also be used by journalists (in the US and elsewhere; Americans use Tor as well) — who are looking to protect communications. It might even be used, the Tor Project site says, “for socially sensitive communication: chat rooms and Web forums for rape and abuse survivors, or people with illnesses.” Law enforcement agencies say Tor is also used by terrorists, drug dealers, and child pornographers.

The newly published NSA documents say the agency will “never be able to de-anonymize all Tor users all the time” and that it’s also had “no success de-anonymizing a user in response” to a specific request. But the Guardian reports that the agency secretly tries to “direct traffic toward NSA-operated servers,” that it measures “the timings of messages going in and out of the [Tor] network to try to identify users,” that it “attempts to degrade or disrupt” Tor so people will stop using it, and that it has implanted “malicious code on the computers of Tor users who visit particular Web sites.”

One NSA technique, code-named EgotisticalGiraffe, took advantage of a flaw in a version of the Firefox browser that was packaged by the Tor Project with other software designed to let people easily get up and running with the service. If people using that software bundle visited particular Web sites, the NSA placed malware on their machines that let the agency access their files and monitor their keystrokes and Web activity. That flaw has since been fixed in more recent versions of Firefox.

The NSA justified its actions, in general terms, in a statement sent to the Guardian:

[box type=”shadow” align=”aligncenter” ]In carrying out its signals intelligence mission, NSA collects only those communications that it is authorized by law to collect for valid foreign intelligence and counter-intelligence purposes, regardless of the technical means used by those targets or the means by which they may attempt to conceal their communications. NSA has unmatched technical capabilities to accomplish its lawful mission.

As such, it should hardly be surprising that our intelligence agencies seek ways to counteract targets’ use of technologies to hide their communications. Throughout history, nations have used various methods to protect their secrets, and today terrorists, cybercriminals, human traffickers and others use technology to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that. [/box]

But a representative for the Electronic Frontier Foundation, a past Tor Project funder and a self-described defender of free speech and privacy in the realm of technology, was troubled by the revelations. Citing the example of a battered woman who might use Tor to hide her visits to an online help service from her attacker, as well as uses by dissidents, EFF Legal Director Cindy Cohn told CNET, “Of course the government should get to go after bad guys, but they shouldn’t be able to break the security and trust promises of the Internet to do that.”

By Edward Moyer | Cnet

Find us here

Get news from the CSGLOBE in your inbox each weekday morning

The views and opinions expressed in this article are those of the authors/source and do not necessarily reflect the position of CSGLOBE or its staff.

Paid content

France Declares All New Rooftops Must Be Topped With Plants Or Solar Panels

A new law recently passed in France mandates that all new buildings that are built in commercial zones in France must be partially covered in...

Iranian commander warns US of ‘irreversible consequences’ over ‘unprofessional’ moves in Gulf

Iranian navy Commander Mehdi Hashemi blamed the U.S. for the weekend’s incident that involved a U.S. Navy ship and Tehran’s vessels, Iranian media reported Wednesday. On Saturday,...

14 African Countries Who Still Pay Colonial Tax To France

80% of the 10 countries with the lowest literacy rates in the WORLD among adults are in francophone Africa. Namely: Benin (40%), Burkina Faso (26%),...

What's New Today

Georgia House Votes To Allow Citizens To Abolish Police Departments In The State

The Georgia House backed an effort on Friday to dissolve the Glynn County Police Department and any...

Leaked CDC document contradicts Pence claim that U.S. coronavirus cases ‘have stabilized’

Even as Vice President Mike Pence wrote in a Wall Street Journal op-ed published Tuesday that coronavirus...

Five bombshells about Trump from Bolton ‘s book

Excerpts from former national security adviser John Bolton ’s book about his time in the Trump administration...

Don’t Listen to Fox. Here’s What’s Really Going On in Seattle’s Protest Zone.

It seems I live in a city undergoing a “totalitarian takeover” that will lead to “fascist outcomes”...

MOST READ

Ancient Paintings of UFO’s from 200 to 15.000 years ago

Ancient Paintings of UFO's Over the past 15,000 years UFOs have been clearly depicted in paintings from all around the world. This video features some...

Out of the Blue

OUT OF THE BLUE is widely considered one of the best documentary films ever made about UFOs and was directed by celebrated filmmakers James...

What Is Agenda 21? Depopulation of 95% of the World By 2030

Most people are unaware that one of the greatest threats to their freedom may be a United Nations program which plans to depopulate 95%...

France Declares All New Rooftops Must Be Topped With Plants Or Solar Panels

A new law recently passed in France mandates that all new buildings that are built in commercial zones in France must be partially covered in...

Media Blackout: Surface-To-Air Missile System Deployed at Standing Rock

The militarization of law enforcement at the site of the Dakota Access Pipeline has apparently reached a whole new level. On Monday, independent journalist John...

Trump Considers Pulling All US Troops Out of Afghanistan

After months of the Pentagon failing to sell a concrete plan of military escalation in Afghanistan to the White House, officials now say that the...

Hawaii Lawmakers Unanimously Pass Bill to Legalize Hemp

Hawaii’s full House of Representatives has given unanimous approval to legislation that would explicitly legalize the cultivation, production and distribution of hemp in the...

Wikileaks Founder Julian Assange Reveals Real Intentions Behind The Trans-Pacific Partnership (TPP)

WikiLeaks founder Julian Assange has been seeking refuge for close to three years inside Ecuador’s Embassy in London where he has political asylum. Facing both...

New study suggests Black Holes could support Alien life

According to a new study, Black Holes could support bizarre forms of alien life. According to researchers, its cold temperature may help make worlds...

Bernie Sanders On Donald Trump: ‘This Guy Is A Fraud’

Sen. Bernie Sanders (I-Vt.) criticized President Donald Trump for his actions toward Wall Street, saying that he’d abandoned the populist rhetoric he used while...

Cure For Cancer – Death Sentence for a Number of Doctors

Modern medicine always seems to occupy an important field of studies. Doctors face various responsibilities when researching for one cure after the other. Let's see...