Skip to main content
Skip to content
Case File
kaggle-ho-020224House Oversight

Document claims U.S. government deliberately open‑sourced TOR in 2008 to mask intelligence use and later sought vulnerabilities

Document claims U.S. government deliberately open‑sourced TOR in 2008 to mask intelligence use and later sought vulnerabilities The passage provides a narrative linking U.S. agencies (NSA, State Department, NSF) to the strategic release and funding of Tor, suggesting a covert motive to hide intelligence activity. It mentions specific years, agencies, and a named individual (Jacob Appelbaum) but offers no concrete transactions, emails, or whistleblower evidence. The claim is partially novel – the open‑source funding of Tor is known, but the framing as a deception tactic is not widely reported. It warrants further verification but lacks actionable leads such as documents, contracts, or dates of specific funding rounds. Key insights: U.S. government allegedly funded Tor development via State Department, NSF, and BBG in 2008.; Open‑sourcing Tor is presented as a cover to make intelligence use indistinguishable from civilian use.; NSA spokesperson is quoted as acknowledging efforts to find Tor vulnerabilities.

Date
Unknown
Source
House Oversight
Reference
kaggle-ho-020224
Pages
1
Persons
2
Integrity
No Hash Available

Summary

Document claims U.S. government deliberately open‑sourced TOR in 2008 to mask intelligence use and later sought vulnerabilities The passage provides a narrative linking U.S. agencies (NSA, State Department, NSF) to the strategic release and funding of Tor, suggesting a covert motive to hide intelligence activity. It mentions specific years, agencies, and a named individual (Jacob Appelbaum) but offers no concrete transactions, emails, or whistleblower evidence. The claim is partially novel – the open‑source funding of Tor is known, but the framing as a deception tactic is not widely reported. It warrants further verification but lacks actionable leads such as documents, contracts, or dates of specific funding rounds. Key insights: U.S. government allegedly funded Tor development via State Department, NSF, and BBG in 2008.; Open‑sourcing Tor is presented as a cover to make intelligence use indistinguishable from civilian use.; NSA spokesperson is quoted as acknowledging efforts to find Tor vulnerabilities.

Tags

kagglehouse-oversightmedium-importancetornsastate-departmentintelligence-operationsopen-source-funding

Ask AI About This Document

0Share
PostReddit
Review This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
ae software had a conceptual flaw. If US intelligence services used it, the targets could figure out that anyone visiting a site without an IP address was using TOR software to hide it. If TOR was exclusive used by US intelligence services, the targets could further deduce that all the anonymous visitors were avatars for American intelligence. It would be analogous to undercover police using pink-color cars that civilians did not use. To remedy this flaw, the US government in 2008 made TOR software open-source and freely available to everyone in the world. It even provided funding for its promulgation with the State Department, the National Science Foundation, and the Broadcasting Board of Governors financing TOR’s core developer. The public rationale for this generosity was that TOR could serve as a tool for, as the State Department called it, “democracy advocates in authoritarian states." The result was TOR software became a tool of both intelligence services and their adversaries. As TOR software became widely used by adversaries (as well as common criminals), the NSA sought to find vulnerabilities in it. “It should hardly be surprising that our intelligence agencies seek ways to counteract targets’ that use TOR software to hide their communications, explained a NSA spokesperson. The NSA’s adversaries also took an interest in identifying TOR users. TOR software also took on a cult-like importance to hacktavists concerned with the US government tracking their activities. An illuminating insight into the mind-set of the TOR hacktavists is provided by Catherine A. Fitzpatrick in her 2013 book Privacy For Me Not For Thee. She describes these hacktavists as largely “radical anarchists,” who believe “the state is all- powerful, that law-enforcement is so strong that it will prevail anyway, and that they are a persecuted minority.” As a refuge against the surveillance of the state, and in particular the NSA, they not only hide attempt to their own identity nut use encryption to obscure their messages. Their goal is free their movements from “of any interference from law-enforcement.” In this mind- set, according to Fitzpatrick, “They believe government intelligence agencies will stop at nothing to stop them from absolute encryption.” TOR software was a means to defeat the NSA, but to be successfully there needed to be such a proliferation of TOR servers that the NSA could not piece together IP addresses. The problem was that in 2012 the TOR project, as they called it, was still a very tiny operation in 2012. It employed less than 100 core developers who were located mainly in Germany, Iceland, Japan, Estonia, and the United States. Its staff worked mainly out of a single room in Cambridge, Massachusetts. The guiding spirit behind the TOR movement was Jacob Appelbaum, a charismatic 28-year old who had grown up in northern California. Like Snowden, he had dropped out of high school. Appelbaum identified himself to his followers on the Internet as a “hacktivist” battling state surveillance. For him, as with many in the hacktavist culture, the main enemy was the NSA. After all, the NSA had a vast army of computer scientists working to unravel TOR software.

Related Documents (6)

House OversightUnknown

Sparse House Oversight Document Lacks Substantive Content

Sparse House Oversight Document Lacks Substantive Content The document contains only a header and no substantive information linking any influential actors, financial flows, or misconduct. It provides no actionable leads for investigation. Key insights: Document appears to be a placeholder or file identifier only; No names, dates, transactions, or allegations present

1p
House OversightNov 16, 2015

Draft Document Titled “The Snowden Affair: A Spy Story in Six Parts”

Draft Document Titled “The Snowden Affair: A Spy Story in Six Parts” The passage only provides a title and metadata for a 287‑page draft about the Snowden affair. It contains no specific names, dates, transactions, or allegations that could be pursued as an investigative lead. Consequently, it offers no actionable information and is likely already covered in public discourse. Key insights: Document appears to be a draft manuscript by Edward Jay Epstein.; Length indicated as 287 pages, suggesting extensive coverage.; Associated with a House Oversight file identifier (HOUSE_OVERSIGHT_020153).

1p
House OversightUnknown

WSJ article claims Edward Snowden lied about whistleblower motive and details his 2013 escape to Hong Kong

WSJ article claims Edward Snowden lied about whistleblower motive and details his 2013 escape to Hong Kong The passage repeats widely known facts about Snowden’s 2013 leak and his travel to Hong Kong, offering no new names, transactions, or evidence. It suggests possible deception but provides no concrete leads for investigation, making it low‑value despite involving a high‑profile figure. Key insights: Alleges Snowden fabricated the story that he was a whistleblower rather than an espionage operative.; Claims Snowden left Hawaii on May 20, 2013, while falsely telling his supervisor he was in a hospital.; States Snowden met with Laura Poitras and Glenn Greenwald in Hong Kong to provide key documents.

1p
House OversightUnknown

Empty House Oversight Document Lacks Substantive Content

Empty House Oversight Document Lacks Substantive Content The provided file contains only a title and no substantive text, offering no names, transactions, dates, or allegations to pursue. Consequently, it provides no investigative leads, controversy, novelty, or power linkages. Key insights: Document contains only a header and filename.; No mention of individuals, agencies, or actions.

1p
House OversightUnknown

Document cites various media references linking Snowden, Tor, Anonymous, and alleged NSA involvement

Document cites various media references linking Snowden, Tor, Anonymous, and alleged NSA involvement The passage is a compilation of citations to publicly available articles and books about Snowden, Tor, and hacktivist groups. It does not provide new, actionable information, specific transactions, or undisclosed relationships involving high‑level officials. Its value is limited to contextual references, offering low investigative utility. Key insights: References to Snowden’s interactions with Runa Sandvik and CryptoParty events.; Citations of media pieces on Anonymous, Silk Road, and Tor’s origins.; Mentions of an unnamed Justice Department official and former NSA executive speaking anonymously.

1p
House OversightJan 5, 2018

Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content

Document titled “INSIDE THE TRUMP WHITE HOUSE” with minimal content The file contains only a title and file identifier with no substantive information, names, dates, transactions, or allegations. It provides no actionable leads or novel insights into any controversial actions or actors. Key insights: File appears to be a placeholder or index page; No mention of individuals, agencies, or financial details

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Support This ProjectSupported by 1,550+ people worldwide
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.