Tor
anonymizer network among NSA’s targets, Snowden leaks reveal
Top-secret
national security documents disclosed to the Guardian by Edward
Snowden show United States and British intelligence have long
attempted to crack the Tor anonymizer network used by human rights
workers, journalists, cybercriminals and others.
RT,
4
October, 2013
On
Friday, the Guardian published leaked documents attributed to the
former intelligence contractor revealing how the US National Security
Agency and Britain’s Government Communications Headquarters, or
GCHQ, have worked extensively towards compromising the computers of
people who browse the Internet with Tor, a program that routes
traffic through multiple nodes in an effort to help mask the
identities of its users.
According
to the Guardian’s James Ball, Bruce Schneier and Glenn Greenwald,
the NSA’s “current successes against Tor rely on identifying
users and then attacking vulnerable software on their computer.”
“While
it seems that the NSA has not compromised the core security of the
Tor software or network, the documents detail proof-of-concept
attacks, including several relying on the large-scale online
surveillance systems maintained by the NSA and GCHQ through internet
cable taps,” the writers add.
The
Guardian has so far published three top-secret government slideshows
used to discuss the Tor network and possible vulnerabilities that
might compromise users if properly exploited.
In
one document, the NSA notes that Tor, or “The Onion Router,”
enables anonymous Internet activity to Iranian and Chinese
dissidents, terrorists and “other targets too!” The software has
become increasingly used around the globe by privacy-minded
individuals of all sorts in recent months. However, previous
documents disclosed by Mr. Snowden detailed how the intelligence
community have made many successful efforts to compromise other
would-be secure modes of communicating.
As
RT reported previously, the number of Americans using Tor jumped 75
percent between June 1, just days before the first Snowden leak, and
August 27, 2013.
One
government document, “Peeling Back the Layers of TOR with
Egotisticalgiraffe,” suggests the security of some Tor users can be
compromised if the government or other malicious actor can exploit
bugs in the Firefox browser and other vulnerabilities.
In
another slideshow, “Tor Stinks,” the government claims it already
has access to a select number of nodes which anonymized traffic is
navigated through.
The
“goal,” according to the NSA slide, is to “expand [the] number
of nodes we have access to.” To accomplish as much, it’s
acknowledged that GCHQ runs Tor nodes under a program of its own,
and that other partners may be able to assist with further efforts to
deconstruct traffic patterns to narrow-in on otherwise anonymous
users.
Other
tools used by the NSA involve collecting cookies from Tor users
created when they are browsing the Web without the anonymizer
software running. One technique, codenamed “QUANTUM,” exists to
degrade, deny and disrupt Tor access, according to the documents.
Another, “QUANTUMCOOKIE,” “forces client to divulge stored
cookies” which could then further aid investigators attempting to
hone in on targets otherwise protected by Tor.
Despite
the NSA and GCHQ’s efforts, though, Tor itself has proved to be
invincible to government attacks thus far.
“Can
we exploit nodes? Probably not,” reads one slide which cites “legal
and technical challenges.”
Still,
the government has considered disrupting traffic over the Tor network
to likely draw users off the nodes and into a habitat where their
actions could be more easily traced. In one slide, the NSA suggests
they could “set up a lot of really slow Tor nodes,” disguised as
high bandwidth, “to degrade the overall stability of the network.”
Tor
documents, courtesy of Glenn Greenwald:
No comments:
Post a Comment
Note: only a member of this blog may post a comment.