Click amount to donate direct to CounterPunch
  • $25
  • $50
  • $100
  • $500
  • $other
  • use PayPal
Support Our Annual Fund Drive! We only ask one time of year, but when we do, we mean it. Without your support we can’t continue to bring you the very best material, day-in and day-out. CounterPunch is one of the last common spaces on the Internet. Help make sure it stays that way.
FacebookTwitterGoogle+RedditEmail

The NSA Wants You to Trust Tor, Should You?

by

In the ongoing drizzle of Snowden revelations the public has witnessed a litany of calls for the widespread adoption of online anonymity tools. One such technology is Tor, which employs a network of Internet relays to hinder the process of attribution. Though advocates at the Electronic Frontier Foundation openly claim that “Tor still works[i]” skepticism is warranted. In fact anyone risking incarceration (or worse) in the face of a highly leveraged intelligence outfit like the NSA would be ill-advised to put all of their eggs in the Tor basket. This is an unpleasant reality which certain privacy advocates have been soft-pedaling.

The NSA Wants You To Use Tor

Tor proponents often make a big deal of the fact that the NSA admits in its own internal documents that “Tor Stinks,” as it makes surveillance more work-intensive[ii]. What these proponents fail to acknowledge is that the spies at the NSA also worry that Internet users will abandon Tor:  “[A] Critical mass of targets use Tor. Scaring them away from Tor might be counterproductive”

Go back and re-read that last sentence. Tor is a signal to spies, a big waving flag that gets their attention and literally draws them to your network traffic[iii]. Certain aspects of Tor might “stink” but ultimately the NSA wants people to keep using Tor. This highlights the fact that security services, like the FBI[iv], have developed sophisticated tools to remove the veil of anonymity that Tor aims to provide.

For example, the Washington Post reports[v]:

“One document provided by Snowden included an internal exchange among NSA hackers in which one of them said the agency’s Remote Operations Center was capable of targeting anyone who visited an al-Qaeda Web site using Tor.”

It’s well known that Tor is susceptible to what’s called a traffic confirmation attack (AKA end-to-end correlation), where an entity monitoring the network traffic on both sides of a Tor session can wield statistical tools to identify a specific communication path. Keep in mind that roughly 90 percent of the world’s internet communication flows through the United States[vi], so it’s easy for U.S. intelligence to deploying this approach by watching data flows around entry and exit points[vii].

Another method involves “staining” data with watermarks. For example, the NSA has been known to mark network traffic by purchasing ad space from online companies like Google. The ads cause web browsers to create a cookie artifact on the user’s computer which identifies the machine viewing the ad[viii]. IP addresses may change but the cookie and its identifiers do not.

De-cloaking Tor users doesn’t necessarily require a federal budget either. According to a couple of researchers slated to speak at Black Hat in a few weeks[ix]:

“In our analysis, we’ve discovered that a persistent adversary with a handful of powerful servers and a couple gigabit links can de-anonymize hundreds of thousands Tor clients and thousands of hidden services within a couple of months. The total investment cost? Just under $3,000.”

Client Network Exploitation (CNE) Trumps Crypto   

Back in 2009 security researcher Joanna Rutkowska implemented what she dubbed the “Evil Maid” attack to foil TrueCrypt’s disk encryption scheme[x]. By compromising the Windows boot environment her team was able to capture the hard disk’s encryption passphrase and circumvent TrueCrypt’s protection. While users can [usually] defend against this sort of monkey business, by relying on a trusted boot process, the success of the Evil Maid attack underscores the capacity for subversion to trump encryption.

This type of client-side exploitation can be generalized for remote network-based operations. In a nutshell, it doesn’t matter how strong your network encryption is if a spy can somehow hack your computer and steal your encryption passphrase (to decrypt your traffic) or perhaps just pilfer the data that they want outright.

Enter the NSAs QUANTUM and FOXACID tag team. QUANTUM servers have the ability to mimic web sites and subsequently re-direct user requests to a second set of FOXACID servers which infects the user’s computer with malware[xi]. Thanks to Ed Snowden it’s now public knowledge that the NSA’s goal is to industrialize this process of subversion (a system codenamed TURBINE[xii]) so it can be executed on an industrial scale. Why go to the effort of decrypting Tor network traffic when spies can infect, infiltrate, and monitor millions of machine at a time?

Is it any wonder that the Kremlin has turned to old-school typewriters[xiii] and that German officials have actually considered a similar move[xiv]? In the absence of a faraday cage even tightly configured air-gapped systems can be breached using clever radio and cellular-based rootkits[xv]. As one user shrewdly commented in an online post[xvi]:

“Ultimately, I believe in security. But what I believe about security leaves me far from the cutting edge; my security environment is more like bearskins and stone knives, because bearskins and stone knives are simple enough that I can *know* they won’t do something I don’t want them to do. Smartphones and computers simply cannot provide that guarantee. The parts of their security models that I do understand, *won’t* prevent any of the things I don’t want them to do.”

Software is hard to trust, there are literally thousands upon thousands of little nooks where a flaw can be “accidentally” inserted to provide a back door. Hardware is even worse.

Denouement   

About a year ago John Young, the operator of the leaks site Cryptome, voiced serious concerns in a mailing list thread about the perception of security being conveyed by tools like Tor[xvii]:

“Security is deception. Comsec a trap. Natsec the mother of secfuckers”

Jacob Appelbaum, who by the way is intimately involved with the Tor project, responded:

“Whatever you’re smoking, I wish you’d share it with the group”

Appelbaum’s cavalier dismissal fails to appreciate the aforementioned countermeasures. What better way to harvest secrets from targets en mass than to undermine a ubiquitous technology that everyone thinks will keep them safe? Who’s holding the shit-bag now? For activists engaged in work that could get them executed, relying on crypto as a universal remedy is akin to buying snake oil. John Young’s stance may seem excessive to Tor promoters like Appelbaum but if Snowden’s revelations have taught us anything it’s that the cynical view has been spot on.

Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

Notes.


[i] Cooper Quintin, “7 Things You Should Know About Tor,” Electronic Frontier Foundation, July 1, 2014, https://www.eff.org/deeplinks/2014/07/7-things-you-should-know-about-tor

[ii] ‘Tor Stinks’ presentation, Guardian, October 4, 2013, http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document

[iii] J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge, “NSA targets the privacy-conscious,” http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html

[iv]Kevin Poulsen, “FBI Admits It Controlled Tor Servers Behind Mass Malware Attack,”

Wired, September 13, 2013, http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/

[v] Barton Gellman, Craig Timberg, and Steven Rich, “Secret NSA documents show campaign against Tor encrypted network,” Washington Post, October 4, 2013

[vi] James Ball, “NSA stores metadata of millions of web users for up to a year, secret files show,” Guardian, September 30, 2013, http://www.theguardian.com/world/2013/sep/30/nsa-americans-metadata-year-documents/print

[vii] Maxim Kammerer, [tor-talk] End-to-end correlation for fun and profit, August 20, 2007, https://lists.torproject.org/pipermail/tor-talk/2012-August/025254.html

[viii] Seth Rosenblatt, “NSA tracks Google ads to find Tor users,” CNET, October 4, 2013, http://news.cnet.com/8301-1009_3-57606178-83/nsa-tracks-google-adsto-find-tor-users/

[ix] Alexander Volynkin &  Michael McCord, “You Don’t Have to be the NSA to Break Tor: Deanonymizing Users on a Budget,” Black Hat USA 2014, https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget

[x] Joanna Rutkowska, “Evil Maid goes after TrueCrypt!” Invisible Things Lab’s Blog, October 16, 2009, http://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-after-truecrypt.html

[xi] Bruce Schneier, “Attacking Tor: how the NSA targets users’ online anonymity,” Guardian, October 4, 2013, http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity/print

[xii] Ryan Gallagher and Glenn Greenwald, “How the NSA Plans to Infect ‘Millions’ of Computers with Malware,” Intercept, March 12, 2014, https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/

[xiii] Chris Irvine, “Kremlin returns to typewriters to avoid computer leaks,” Telegraph, July 11, 2014, http://www.telegraph.co.uk/news/worldnews/europe/russia/10173645/Kremlin-returns-to-typewriters-to-avoid-computer-leaks.html

[xiv] Cyrus Farivar, “In the name of security, German NSA committee may turn to typewriters,” Ars Technica, July 14, 2014, http://arstechnica.com/tech-policy/2014/07/in-the-name-of-security-german-nsa-committee-may-turn-to-typewriters/

[xv] Jacob Appelbaum, “Shopping for Spy Gear: Catalog Advertises NSA Toolbox,” Der Spiegel, December 29, 2013, http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html

[xvi] “Iron Box Security,” Cryptome, June 6, 2014, http://cryptome.org/2014/06/iron-box-security.htm

[xvii] “Natsec the Mother of Secfuckers,” Cryptome, June 9, 2013, http://cryptome.org/2013/06/nat-secfuckers.htm

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

More articles by:

2016 Fund Drive
Smart. Fierce. Uncompromised. Support CounterPunch Now!

  • cp-store
  • donate paypal

CounterPunch Magazine

minimag-edit

September 27, 2016
Louisa Willcox
The Tribal Fight for Nature: From the Grizzly to the Black Snake of the Dakota Pipeline
Jeffrey St. Clair
Idiot Winds at Hofstra: Notes on the Not-So-Great Debate
Mark Harris
Clinton, Trump, and the Death of Idealism
Mike Whitney
Putin Ups the Ante: Ceasefire Sabotage Triggers Major Offensive in Aleppo
Anthony DiMaggio
The Debates as Democratic Façade: Voter “Rationality” in American Elections
Binoy Kampmark
Punishing the Punished: the Torments of Chelsea Manning
Paul Buhle
Why “Snowden” is Important (or How Kafka Foresaw the Juggernaut State)
Jack Rasmus
Hillary’s Ghosts
Brian Cloughley
Billions Down the Afghan Drain
Lawrence Davidson
True Believers and the U.S. Election
Matt Peppe
Taking a Knee: Resisting Enforced Patriotism
James McEnteer
Eugene, Oregon and the Rising Cost of Cool
Norman Pollack
The Great Debate: Proto-Fascism vs. the Real Thing
Michael Winship
The Tracks of John Boehner’s Tears
John Steppling
Fear Level Trump
Lawrence Wittner
Where Is That Wasteful Government Spending?
James Russell
Beyond Debate: Interview Styles of the Rich and Famous
September 26, 2016
Diana Johnstone
The Hillary Clinton Presidency has Already Begun as Lame Ducks Promote Her War
Gary Leupp
Hillary Clinton’s Campaign Against Russia
Dave Lindorff
Parking While Black: When Police Shoot as First Resort
Robert Crawford
The Political Rhetoric of Perpetual War
Howard Lisnoff
The Case of One Homeless Person
Michael Howard
The New York Times Endorses Hillary, Scorns the World
Russell Mokhiber
Wells Fargo and the Library of Congress’ National Book Festival
Chad Nelson
The Crime of Going Vegan: the Latest Attack on Angela Davis
Colin Todhunter
A System of Food Production for Human Need, Not Corporate Greed
Brian Cloughley
The United States Wants to Put Russia in a Corner
Guillermo R. Gil
The Clevenger Effect: Exposing Racism in Pro Sports
David Swanson
Turn the Pentagon into a Hospital
Ralph Nader
Are You Ready for Democracy?
Chris Martenson
Hell to Pay
Doug Johnson Hatlem
Debate Night: Undecided is Everything, Advantage Trump
Frank X Murphy
Power & Struggle: the Detroit Literacy Case
Chris Knight
The Tom and Noam Show: a Review of Tom Wolfe’s “The Kingdom of Speech”
Weekend Edition
September 23, 2016
Friday - Sunday
Andrew Levine
The Meaning of the Trump Surge
Jeffrey St. Clair
Roaming Charges: More Pricks Than Kicks
Mike Whitney
Oh, Say Can You See the Carnage? Why Stand for a Country That Can Gun You Down in Cold Blood?
Chris Welzenbach
The Diminution of Chris Hayes
Vincent Emanuele
The Riots Will Continue
Rob Urie
A Scam Too Far
Pepe Escobar
Les Deplorables
Patrick Cockburn
Airstrikes, Obfuscation and Propaganda in Syria
Timothy Braatz
The Quarterback and the Propaganda
Sheldon Richman
Obama Rewards Israel’s Bad Behavior
Libby Lunstrum - Patrick Bond
Militarizing Game Parks and Marketing Wildlife are Unsustainable Strategies
FacebookTwitterGoogle+RedditEmail