Keep up with the news by installing RT’s extension for . Never miss a story with this clean and simple app that delivers the latest headlines to you.

 

Tor anonymizer network among NSA’s targets, Snowden leaks reveal

Published time: October 04, 2013 15:04
Edited time: October 06, 2013 18:43

Top-secret national security documents disclosed to the Guardian by Edward Snowden show United States and British intelligence have long attempted to crack the Tor anonymizer network used by human rights workers, journalists, cybercriminals and others.

On Friday, the Guardian published leaked documents attributed to the former intelligence contractor revealing how the US National Security Agency and Britain’s Government Communications Headquarters, or GCHQ, have worked extensively towards compromising the computers of people who browse the Internet with Tor, a program that routes traffic through multiple nodes in an effort to help mask the identities of its users.

According to the Guardian’s James Ball, Bruce Schneier and Glenn Greenwald, the NSA’s “current successes against Tor rely on identifying users and then attacking vulnerable software on their computer.”

While it seems that the NSA has not compromised the core security of the Tor software or network, the documents detail proof-of-concept attacks, including several relying on the large-scale online surveillance systems maintained by the NSA and GCHQ through internet cable taps,” the writers add.

The Guardian has so far published three top-secret government slideshows used to discuss the Tor network and possible vulnerabilities that might compromise users if properly exploited.

In one document, the NSA notes that Tor, or “The Onion Router,” enables anonymous Internet activity to Iranian and Chinese dissidents, terrorists and “other targets too!” The software has become increasingly used around the globe by privacy-minded individuals of all sorts in recent months. However, previous documents disclosed by Mr. Snowden detailed how the intelligence community have made many successful efforts to compromise other would-be secure modes of communicating.

As RT reported previously, the number of Americans using Tor jumped 75 percent between June 1, just days before the first Snowden leak, and August 27, 2013.

One government document, “Peeling Back the Layers of TOR with Egotisticalgiraffe,” suggests the security of some Tor users can be compromised if the government or other malicious actor can exploit bugs in the Firefox browser and other vulnerabilities.

In another slideshow, “Tor Stinks,” the government claims it already has access to a select number of nodes which anonymized traffic is navigated through.

The “goal,” according to the NSA slide, is to “expand [the] number of nodes we have access to.” To accomplish as much, it’s acknowledged that  GCHQ runs Tor nodes under a program of its own, and that other partners may be able to assist with further efforts to deconstruct traffic patterns to narrow-in on otherwise anonymous users.

Other tools used by the NSA involve collecting cookies from Tor users created when they are browsing the Web without the anonymizer software running. One technique, codenamed “QUANTUM,” exists to degrade, deny and disrupt Tor access, according to the documents. Another, “QUANTUMCOOKIE,” “forces client to divulge stored cookies” which could then further aid investigators attempting to hone in on targets otherwise protected by Tor.

Despite the NSA and GCHQ’s efforts, though, Tor itself has proved to be invincible to government attacks thus far.

Can we exploit nodes? Probably not,” reads one slide which cites “legal and technical challenges.”

Still, the government has considered disrupting traffic over the Tor network to likely draw users off the nodes and into a habitat where their actions could be more easily traced. In one slide, the NSA suggests they could “set up a lot of really slow Tor nodes,” disguised as high bandwidth, “to degrade the overall stability of the network.”

Tor documents, courtesy of Glenn Greenwald:

Comments (13)

 

Regula 28.01.2014 10:09

David 05.10.2013 10:22

What would they do if people suddenly started using the US postal service and wrote LETTERS!! The NSA would be totally lost. Snail mail = security + forced to use language efficiently and effectively. It may even necessitate learning language!

  


Not really, the US postal service photographs every piece of mail. Mail also gets opened whenever the "authorities&qu ot; apparently the FBI, the NSA etc. suspect some "telling" document/item in the mail. There is no privacy there. They even open handwritten private mail in search of financial information. It is sickening.

 

Ernest Bizzell 22.10.2013 06:50

Every single piece of mail that goes through the us postal service is photographed and recorded. Don't believe me? Look it up for yourself...

 

Justin Miller 22.10.2013 05:49

David 05.10.2013 10:22

What would they do if people suddenly started using the US postal service and wrote LETTERS!! The NSA would be totally lost. Snail mail = security + forced to use language efficiently and effectively. It may even necessitate learning language!

  


Fa lse...They already inspect mail to make sure we are not mailing bombs, anthrax, letters that talk trash about our crappy president.

View all comments (13)
Add comment

Authorization required for adding comments

Register or

Name

Password

Show password

Register

or Register

Request a new password

Send

or Register

To complete a registration check
your Email:

OK

or Register

A password has been sent to your email address

Edit profile

X

Name

New password

Retype new password

Current password

Save

Cancel

Follow us

Follow us