The NSA and TOR
TOR (a/k/a The Onion Router) is an anonymous, encrypted web browser bundle that, in theory, is intended to allow for untraceable activity in cyberspace. Like most tools, it is neutral in value, and thus capable of use for good (it enables journalists to speak with sources and dissidents to communicate without scrutiny by authoritarian governments) and ill (it is widely used by criminals and, some say, by terrorists as well). Until recently it was thought to be completely impervious to attack -- but recent disclosures suggest that the NSA has been working on the "TOR problem" for a while.
Published by The Lawfare Institute
in Cooperation With
TOR (a/k/a The Onion Router) is an anonymous, encrypted web browser bundle that, in theory, is intended to allow for untraceable activity in cyberspace. Like most tools, it is neutral in value, and thus capable of use for good (it enables journalists to speak with sources and dissidents to communicate without scrutiny by authoritarian governments) and ill (it is widely used by criminals and, some say, by terrorists as well). Until recently it was thought to be completely impervious to attack -- but recent disclosures suggest that the NSA has been working on the "TOR problem" for a while. The Washington Post has the story:
[T]he NSA has mounted increasingly successful attacks to unmask the identities and locations of users of Tor. In some cases, the agency has succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. In others, it has been able to “stain” anonymous traffic as it enters the Tor network, enabling the NSA to identify users as it exits.There are links to plenty of supporting documents and detail. As always, those who are prohibited by their employment from reviwing classified material that was disclosed by Edward Snowden should refrain from clicking on the underlying links.
Paul Rosenzweig is the founder of Red Branch Consulting PLLC, a homeland security consulting company. He formerly served as deputy assistant secretary for policy in the Department of Homeland Security. He is a professorial lecturer in law at George Washington University, a senior fellow in the Tech, Law & Security program at American University, and a board member of the Journal of National Security Law and Policy.
More Articles
-
Reconfiguring U.S. Cyber Strategy in the Wake of Salt Typhoon
Persistent penetration of domestic networks makes coordinated defenses and robust deterrence essential to preventing cyber conflict. -
Rational Security: The “Pickled Fish in Cozy Sweaters” Edition
Scott Anderson sat down with Eric Columbus, Anastasiia Lapatina, and Loren Voss to talk through the week’s big news in national security. -
Shared Residual Liability for Frontier AI Firms
To promote AI accountability and peer-monitoring, AI firms should be held collectively liable for catastrophic damages.