[LINK] Has the US Govt Compromised TOR?
Roger Clarke
Roger.Clarke at xamax.com.au
Wed Sep 18 05:53:35 AEST 2013
=======================================================================
E P I C A l e r t
=======================================================================
Volume 20.18 September 17, 2013
-----------------------------------------------------------------------
<http://www.epic.org/alert/epic_alert_20.18.html>http://www.epic.org/alert/epic_alert_20.18.html
=========================================================================
[3] EPIC Files FOIA Suit to Determine If Tor Is Compromised
=========================================================================
EPIC has filed a Freedom of Information Act lawsuit against the
Broadcasting Board of Governors, a federal agency that oversees all US
civilian international media. EPIC seeks information about the federal
government's interest in the Tor network, a privacy-enhancing network.
EPIC has been interested in the NSA's involvement in the development
of cryptographic standards since EPIC's inception. In 1993, EPIC (then
the Computer Professionals for Social Responsibility) initiated FOIA
litigation over the NSA's use of the "Clipper Chip," an encryption
protocol that was developed to ensure government access to encrypted
information. The NSA developed the technical basis for the Clipper
Chip. Public opposition to the Clipper Chip eventually led to the
Chip's withdrawal.
The Guardian, The New York Times, and Pro Publica have recently
reported that the NSA compromised many of the encryption technologies
available for public use, raising many of the same concerns that drove
opposition to Clipper. Through covert partnerships with Internet
providers and software developers, the NSA has built in secret
"backdoors," or deliberate network vulnerabilities, that allow the
agency to surveil, decrypt, collect, and even control the flow of user
data. According to top-secret NSA documents, "For the past decade,
NSA has lead an aggressive, multi-pronged effort to break widely-used
Internet encryption technologies . . . Vast amounts of encrypted
Internet data which have up till now been discarded are now
exploitable."
Wired reported that the FBI was using Tor to spread malware that could
identify Tor users. Another story in The Washington Post highlighted
the likelihood that the malware originated in the federal government
for the purpose of surveiling encrypted communications. The Post also
noted that 60 percent of Tor's funding comes from the Federal
government, prompting the paper to ask whether the network suffered
from similar backdoors and vulnerabilities.
EPIC is pursuing the FOIA case against the Broadcasting Board of
Governors to determine whether the NSA or the FBI may have compromised
Tor.
Tor is software currently maintained by The Tor Project. Internet users
around the world use Tor to maintain anonymity and circumvent Internet
restrictions. Tor is used by academics, political dissidents, law
enforcement, journalists, whistleblowers, NGOs, the U.S. Navy, and
everyday individuals. Tor adheres to a policy of openness and
transparency in its own management while working to protect the
anonymity of its users. To that end, Tor publishes its list of
sponsors, its open-source software, its financial reports,
documentation, and lists of projects. Tor provides an invaluable
tool for encrypted web use.
EPIC: EPIC v. BBG
<http://epic.org/foia/tor/>http://epic.org/foia/tor/
Wired: Kevin Poulsen, "FBI Admits It Controlled Tor Servers Behind
Mass Malware Attack" (Sep. 13, 2013)
<http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/>http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/
The Washington Post: Brian Fung, "The feds pay for 60 percent of Tor's
development. Can users trust it?" (Sep. 6, 2013)
<http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/06/the->http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/06/the-
feds-pays-for-60-percent-of-tors-development-can-users-trust-it
The Guardian: James Ball, Julian Borger, and Glen Greenwald,
"Revealed: how US and UK spy agencies defeat internet privacy and
security" (Sep. 5, 2013)
<http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption->http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-
codes-security
The New York Times: Nicole Perlroth, Jeff Larson, and Scott Shane,
"N.S.A. Able to Foil Basic Safeguards of Privacy on Web" (Sep. 5, 2013)
<http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet->http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-
encryption.html?hp&_r=0,
The Washington Post: Brian Fung, "We've all practically given up on
internet privacy. Here's how not to" (Sep. 5, 2013)
<http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/05/weve->http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/05/weve-
all-practically-given-up-on-internet-privacy-heres-how-not-to/
=========================================================================
--
Roger Clarke http://www.rogerclarke.com/
Xamax Consultancy Pty Ltd 78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Tel: +61 2 6288 6916 http://about.me/roger.clarke
mailto:Roger.Clarke at xamax.com.au http://www.xamax.com.au/
Visiting Professor in the Faculty of Law University of N.S.W.
Visiting Professor in Computer Science Australian National University
More information about the Link
mailing list