Skip to main content
Skip to content
Case File
d-26654House OversightOther

Alleged NSA TOR-tracking capability and possible SVR infiltration via disgruntled contractor

The passage hints at NSA technical ability to de-anonymize TOR users and suggests a possible Russian SVR foothold through an insider contractor, offering a moderately actionable lead. However, it lack NSA purportedly could tag and follow TOR communications and even borrow users' internet identities. Former DOJ official claims NSA located Ross Ulbricht’s server by cracking TOR. CIA Deputy Director

Date
November 11, 2025
Source
House Oversight
Reference
House Oversight #020331
Pages
1
Persons
0
Integrity
No Hash Available

Summary

The passage hints at NSA technical ability to de-anonymize TOR users and suggests a possible Russian SVR foothold through an insider contractor, offering a moderately actionable lead. However, it lack NSA purportedly could tag and follow TOR communications and even borrow users' internet identities. Former DOJ official claims NSA located Ross Ulbricht’s server by cracking TOR. CIA Deputy Director

Tags

surveillanceforeign-influencecybersecurity-vulnerabilitysvrtorintelligence-surveillanceinsider-threathouse-oversightnsarussian-intelligencecybersecuritycia

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
179 messages which would allow it to trace the path of messages that passed through them. Through this technology, it could tag and follow TOR users as their communications travelled across the Internet. It could even borrow their Internet identities. To be sure, the NSA also had such a capability. The Silk Road founder Ross Ulbricht discovered to his distress that his TOR software did not make his computer server in Iceland invisible. According to a former top official in the Justice Department, the NSA was able to locate it by cracking the TOR software, (Ulbricht is currently serving a life prison sentence for his Silk Road activities.). Unlike adversary services, however, the NSA needs a warrant to investigate US citizens who use TOR. Even the NSA is not immune from an attack of its own computers. CIA deputy director Morell, who served on the committee evaluating the NSA’s vulnerability in the Snowden affair after retiring from the CIA in 2013, wrote in his 2015 book “The Great War of our Times,” that many financial institutions have “better cyber security than the NSA.” If nothing else, the Internet helped make the activities of US intelligence workers visible to the SVR. Even if the SVR theoretically had opportunities, it still had to find at least one disgruntled civilian contractor inside in the NSA who had access to the sealed-off computer networks. Did it find its man? If so, was it before or after Snowden arrived in Hong Kong with the Level 3 NSA files?

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.