Skip to main content
Skip to content
Case File
kaggle-ho-020224House Oversight

Document claims U.S. government deliberately open‑sourced TOR in 2008 to mask intelligence use and later sought vulnerabilities

Document claims U.S. government deliberately open‑sourced TOR in 2008 to mask intelligence use and later sought vulnerabilities The passage provides a narrative linking U.S. agencies (NSA, State Department, NSF) to the strategic release and funding of Tor, suggesting a covert motive to hide intelligence activity. It mentions specific years, agencies, and a named individual (Jacob Appelbaum) but offers no concrete transactions, emails, or whistleblower evidence. The claim is partially novel – the open‑source funding of Tor is known, but the framing as a deception tactic is not widely reported. It warrants further verification but lacks actionable leads such as documents, contracts, or dates of specific funding rounds. Key insights: U.S. government allegedly funded Tor development via State Department, NSF, and BBG in 2008.; Open‑sourcing Tor is presented as a cover to make intelligence use indistinguishable from civilian use.; NSA spokesperson is quoted as acknowledging efforts to find Tor vulnerabilities.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020224
Pages
1
Persons
2
Integrity
No Hash Available

Summary

Document claims U.S. government deliberately open‑sourced TOR in 2008 to mask intelligence use and later sought vulnerabilities The passage provides a narrative linking U.S. agencies (NSA, State Department, NSF) to the strategic release and funding of Tor, suggesting a covert motive to hide intelligence activity. It mentions specific years, agencies, and a named individual (Jacob Appelbaum) but offers no concrete transactions, emails, or whistleblower evidence. The claim is partially novel – the open‑source funding of Tor is known, but the framing as a deception tactic is not widely reported. It warrants further verification but lacks actionable leads such as documents, contracts, or dates of specific funding rounds. Key insights: U.S. government allegedly funded Tor development via State Department, NSF, and BBG in 2008.; Open‑sourcing Tor is presented as a cover to make intelligence use indistinguishable from civilian use.; NSA spokesperson is quoted as acknowledging efforts to find Tor vulnerabilities.

Tags

kagglehouse-oversightmedium-importancetornsastate-departmentintelligence-operationsopen-source-funding

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
ae software had a conceptual flaw. If US intelligence services used it, the targets could figure out that anyone visiting a site without an IP address was using TOR software to hide it. If TOR was exclusive used by US intelligence services, the targets could further deduce that all the anonymous visitors were avatars for American intelligence. It would be analogous to undercover police using pink-color cars that civilians did not use. To remedy this flaw, the US government in 2008 made TOR software open-source and freely available to everyone in the world. It even provided funding for its promulgation with the State Department, the National Science Foundation, and the Broadcasting Board of Governors financing TOR’s core developer. The public rationale for this generosity was that TOR could serve as a tool for, as the State Department called it, “democracy advocates in authoritarian states." The result was TOR software became a tool of both intelligence services and their adversaries. As TOR software became widely used by adversaries (as well as common criminals), the NSA sought to find vulnerabilities in it. “It should hardly be surprising that our intelligence agencies seek ways to counteract targets’ that use TOR software to hide their communications, explained a NSA spokesperson. The NSA’s adversaries also took an interest in identifying TOR users. TOR software also took on a cult-like importance to hacktavists concerned with the US government tracking their activities. An illuminating insight into the mind-set of the TOR hacktavists is provided by Catherine A. Fitzpatrick in her 2013 book Privacy For Me Not For Thee. She describes these hacktavists as largely “radical anarchists,” who believe “the state is all- powerful, that law-enforcement is so strong that it will prevail anyway, and that they are a persecuted minority.” As a refuge against the surveillance of the state, and in particular the NSA, they not only hide attempt to their own identity nut use encryption to obscure their messages. Their goal is free their movements from “of any interference from law-enforcement.” In this mind- set, according to Fitzpatrick, “They believe government intelligence agencies will stop at nothing to stop them from absolute encryption.” TOR software was a means to defeat the NSA, but to be successfully there needed to be such a proliferation of TOR servers that the NSA could not piece together IP addresses. The problem was that in 2012 the TOR project, as they called it, was still a very tiny operation in 2012. It employed less than 100 core developers who were located mainly in Germany, Iceland, Japan, Estonia, and the United States. Its staff worked mainly out of a single room in Cambridge, Massachusetts. The guiding spirit behind the TOR movement was Jacob Appelbaum, a charismatic 28-year old who had grown up in northern California. Like Snowden, he had dropped out of high school. Appelbaum identified himself to his followers on the Internet as a “hacktivist” battling state surveillance. For him, as with many in the hacktavist culture, the main enemy was the NSA. After all, the NSA had a vast army of computer scientists working to unravel TOR software.

Related Documents (5)

House OversightUnknown

Jacob Appelbaum’s deep ties to WikiLeaks and anti‑NSA activism raise questions about possible covert collaborations

Jacob Appelbaum’s deep ties to WikiLeaks and anti‑NSA activism raise questions about possible covert collaborations The passage outlines specific connections between Jacob Appelbaum—a known hacktivist and former WikiLeaks security manager—and high‑profile figures such as Julian Assange. It mentions his role in protecting WikiLeaks releases and his public statements about the NSA, suggesting potential undisclosed coordination or intelligence‑related activities. While the text lacks concrete financial or operational details, it provides actionable leads (names, dates, organizations) that merit further investigation into possible covert support, funding streams, or intelligence sharing between WikiLeaks, Appelbaum, and U.S. surveillance agencies. Key insights: Jacob Appelbaum served as WikiLeaks’ North American representative and managed its cybersecurity during the 2010 Manning document release.; Assange publicly praised Appelbaum and selected him as a keynote replacement at a major hacker conference.; Appelbaum’s public statements frame the NSA as a primary adversary, indicating possible motive for covert collaboration.

1p
House OversightUnknown

Bibliography of security and intelligence books with no actionable leads

Bibliography of security and intelligence books with no actionable leads The passage is a simple list of published works on intelligence, surveillance, and related topics. It contains no specific names, transactions, dates, or allegations linking powerful actors to misconduct, thus offering no investigative value. Key insights: Lists titles and authors of books on espionage, surveillance, and security policy.; Includes works about Edward Snowden, the CIA, and the Warren Commission.; No direct references to current officials, financial flows, or alleged wrongdoing.

1p
House OversightUnknown

Citation list on Anonymous, Tor, Snowden, Assange, and Silk Road

Citation list on Anonymous, Tor, Snowden, Assange, and Silk Road The passage only compiles published sources and quotations without presenting new factual claims, specific transactions, dates, or direct connections to high‑level officials. It offers minimal investigative value beyond confirming existing public discourse. Key insights: References to Anonymous, Tor funding, and Snowden revelations are all from publicly available books and articles.; Mentions a Justice Department official speaking anonymously about Silk Road, but provides no substantive detail.; Cites multiple authors discussing Tor's alleged U.S. government funding, but no new evidence is offered.

1p
House OversightUnknown

Document cites various media references linking Snowden, Tor, Anonymous, and alleged NSA involvement

Document cites various media references linking Snowden, Tor, Anonymous, and alleged NSA involvement The passage is a compilation of citations to publicly available articles and books about Snowden, Tor, and hacktivist groups. It does not provide new, actionable information, specific transactions, or undisclosed relationships involving high‑level officials. Its value is limited to contextual references, offering low investigative utility. Key insights: References to Snowden’s interactions with Runa Sandvik and CryptoParty events.; Citations of media pieces on Anonymous, Silk Road, and Tor’s origins.; Mentions of an unnamed Justice Department official and former NSA executive speaking anonymously.

1p
House OversightUnknown

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies

NSA’s Global Surveillance Partnerships with Five Eyes and Other Allies The passage outlines known intelligence-sharing arrangements between the NSA and allied nations, describing capabilities and legal frameworks. It does not provide new, actionable leads, specific transactions, dates, or allegations of misconduct beyond what is already public knowledge. Key insights: NSA collaborates with the Five Eyes alliance (UK, Canada, Australia, New Zealand) for extensive phone and internet monitoring.; Additional liaisons exist with Germany, France, Spain, Italy, the Netherlands, Portugal, Israel, Japan, and South Korea.; British Intelligence Services Act of 1994 allegedly permits GCHQ officers to conduct illegal acts abroad.

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.