NSA has been trying to break through online anonymity

Latest secret documents provided by Edward Snowden and published by Guardian show that NSA has been trying to break through online anonymity provided by TOR.

The National Security Agency has been trying to crack the online anonymity provided by Tor, a US-funded Internet tool designed to keep Net activity private and said to be widely used by dissidents in oppressive countries, as well as by terrorists. That’s according to the latest secret intelligence documents drawn from the cache leaked by Edward Snowden and published by the UK’s Guardian newspaper.

The NSA hasn’t been able to crack Tor outright, but through various means it’s been able to “de-anonymize a very small fraction of Tor users,” says an internal NSA document quoted by the Guardian.

Part of a page from a secret NSA document titled "Tor Stinks"
Part of a page from a secret NSA document titled “Tor Stinks”

The news of the agency’s interest in Tor follows a report last month on the NSA’s efforts to circumvent privacy-ensuring encryption of all kinds. The New York Times said the agency has sidestepped common Net encryption methods in a number of ways, including hacking into the servers of private companies to steal encryption keys, collaborating with tech companies to build in back doors, and covertly introducing weaknesses into encryption standards. The revelations are all part of the outcry over surveillance that’s been kicked up by the Snowden leaks.

TOR or “The Onion Router” — was first developed by the US Naval Research Laboratory and is currently funded in part by the US State Department and Department of Defense.

To put it simply, Tor facilitates anonymous Web surfing, forum posting, instant messaging, and other Internet communication by wrapping signals in layers of encryption and then sending them on an unpredictable path through a network of routers. Each router peels off one “skin” of encryption to send the signal along, but no one router has access to all the details — thus the signal cannot be traced back to its sender.

US government funding is based, in part, on the desire to help Internet users in a country like China, say, access restricted sites or communicate about prohibited subjects without fear of reprisal. But Tor might also be used by journalists (in the US and elsewhere; Americans use Tor as well) — who are looking to protect communications. It might even be used, the Tor Project site says, “for socially sensitive communication: chat rooms and Web forums for rape and abuse survivors, or people with illnesses.” Law enforcement agencies say Tor is also used by terrorists, drug dealers, and child pornographers.

The newly published NSA documents say the agency will “never be able to de-anonymize all Tor users all the time” and that it’s also had “no success de-anonymizing a user in response” to a specific request. But the Guardian reports that the agency secretly tries to “direct traffic toward NSA-operated servers,” that it measures “the timings of messages going in and out of the [Tor] network to try to identify users,” that it “attempts to degrade or disrupt” Tor so people will stop using it, and that it has implanted “malicious code on the computers of Tor users who visit particular Web sites.”

One NSA technique, code-named EgotisticalGiraffe, took advantage of a flaw in a version of the Firefox browser that was packaged by the Tor Project with other software designed to let people easily get up and running with the service. If people using that software bundle visited particular Web sites, the NSA placed malware on their machines that let the agency access their files and monitor their keystrokes and Web activity. That flaw has since been fixed in more recent versions of Firefox.

The NSA justified its actions, in general terms, in a statement sent to the Guardian:

[box type=”shadow” align=”aligncenter” ]In carrying out its signals intelligence mission, NSA collects only those communications that it is authorized by law to collect for valid foreign intelligence and counter-intelligence purposes, regardless of the technical means used by those targets or the means by which they may attempt to conceal their communications. NSA has unmatched technical capabilities to accomplish its lawful mission.

As such, it should hardly be surprising that our intelligence agencies seek ways to counteract targets’ use of technologies to hide their communications. Throughout history, nations have used various methods to protect their secrets, and today terrorists, cybercriminals, human traffickers and others use technology to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that. [/box]

But a representative for the Electronic Frontier Foundation, a past Tor Project funder and a self-described defender of free speech and privacy in the realm of technology, was troubled by the revelations. Citing the example of a battered woman who might use Tor to hide her visits to an online help service from her attacker, as well as uses by dissidents, EFF Legal Director Cindy Cohn told CNET, “Of course the government should get to go after bad guys, but they shouldn’t be able to break the security and trust promises of the Internet to do that.”

By Edward Moyer | Cnet

Find us here

Get news from the CSGLOBE in your inbox each weekday morning

The views and opinions expressed in this article are those of the authors/source and do not necessarily reflect the position of CSGLOBE or its staff.

Paid content

Putin has Banned Rothschild and His New World Order Banking Cartel Family from Entering Russian Territory

As of recently, Russian president Vladimir Putin took yet another decision for his country. "Under any circumstances", the Rothschild family is banned from entering Russian territory. Along...

Georgia House Votes To Allow Citizens To Abolish Police Departments In The State

The Georgia House backed an effort on Friday to dissolve the Glynn County Police Department and any...

14 African Countries Who Still Pay Colonial Tax To France

80% of the 10 countries with the lowest literacy rates in the WORLD among adults are in francophone Africa. Namely: Benin (40%), Burkina Faso (26%),...

What's New Today

Georgia House Votes To Allow Citizens To Abolish Police Departments In The State

The Georgia House backed an effort on Friday to dissolve the Glynn County Police Department and any...

Leaked CDC document contradicts Pence claim that U.S. coronavirus cases ‘have stabilized’

Even as Vice President Mike Pence wrote in a Wall Street Journal op-ed published Tuesday that coronavirus...

Five bombshells about Trump from Bolton ‘s book

Excerpts from former national security adviser John Bolton ’s book about his time in the Trump administration...

Don’t Listen to Fox. Here’s What’s Really Going On in Seattle’s Protest Zone.

It seems I live in a city undergoing a “totalitarian takeover” that will lead to “fascist outcomes”...

MOST READ

What Is Agenda 21? Depopulation of 95% of the World By 2030

Most people are unaware that one of the greatest threats to their freedom may be a United Nations program which plans to depopulate 95%...

Putin has Banned Rothschild and His New World Order Banking Cartel Family from Entering Russian Territory

As of recently, Russian president Vladimir Putin took yet another decision for his country. "Under any circumstances", the Rothschild family is banned from entering Russian territory. Along...

Georgia House Votes To Allow Citizens To Abolish Police Departments In The State

The Georgia House backed an effort on Friday to dissolve the Glynn County Police Department and any...

Putin has Banned Rothschild and His New World Order Banking Cartel Family from Entering Russian Territory

As of recently, Russian president Vladimir Putin took yet another decision for his country. "Under any circumstances", the Rothschild family is banned from entering Russian territory. Along...

Jon Stewart Quits Comedy, Starts Animal Sanctuary to Rescue Abused Factory Farm Animals

In an effort to be the change he wishes to see in the world, comedian John Stewart, after stepping down as host of “The...

Great Pyramid: Awesome Illegal Photos from the top of one of the Seven Wonders of the Ancient World

These photographs capture the views from the top of one of the Seven Wonders of the Ancient World. A group of Russian tourists waited until...

US soldiers used as guinea pigs for experiments

Judge sides with US servicemen used as guinea pigs in terrifying Cold War experiments A federal judge has ruled the United States Army must quickly...

It’s Official: Weed Legalization Advocate Could Head Up The FDA

In December of 2016, Bloomberg News reported that Jim O’Neill, a managing director at Peter Thiel’s Mithril Capital, was being eyed by Donald Trump...

Paris bans 50% of cars from the roads

Paris pollution leads to car ban Only half of city's drivers will be allowed on French capital's roads on any given day via scheme based...

The Metanoid Universe

There are only two ways for conscious beings to be – either paranoid or metanoid. Either we perceive that the universe is out to...

Ex-DEA Spokeswoman: ‘Marijuana Is Safe,’ Kept Illegal Because It’s a ‘Cash Cow’

Before the heroin epidemic became a nationwide problem, claiming thousands of lives, Plano, Texas, was already entrenched. And like many of the places caught in...