In December 2013, Harvard University was rocked by a bomb threat. As the threat threw the campus into a state of chaos, local law enforcement and the FBI went to work, catching the culprit in under two days. The perpetrator in question was actually a student, sophomore Eldo Kim, who had attempted to use the bomb threat to, of all things, get out of taking his final exams.1

Harvard University – Courtesy of Wikimedia Commons

Foregoing the obvious jokes about how ridiculously over the top this student’s plan was and about Ivy League schools, still leave interesting facts to reveal. Eldo Kim had taken some basic precautions to not be detected as the bomb threat maker, using a famous and highly touted free privacy service called Tor, short for The Onion Router, which is supposed to guarantee complete anonymity when it is used, along with a brand new temporary email, but to no avail. His mistake? Connecting to Tor on the campus WiFi! Investigators determined the bomb threats had come through Tor, and conducted a search on the university network for anyone using Tor at the same time the threats were sent. Only one name came up – Eldo Kim. His use of Tor made him stand out like a “glow stick”.2 Kim was tripped up by that, not by Tor failing, but it did lead to some questions about the reliability of Tor’s protective capabilities. Is Tor truly anonymous, and safe to use?

Tor works by basically creating an alternate path to wherever you are logging onto the internet. It prevents identification of your computer IP address by relaying and bouncing your commands around thousands of servers, run by volunteers around the world.3 It is somewhat akin to someone trying to shake a suspected pursuer by taking an indirect route to their destination in real life. In fact, with Tor, you get access to the vast majority of the internet you probably did not even know existed. Only an estimated 10% of the internet is actually indexed and visible (making it accessible to everyone), while 90% is out of sight, similar to an iceberg.

Graph with the Iceberg representation of the Web | Courtesy of Wikimedia Commons

Tor takes you to the Deep Web, which is different from the Dark Web. The Dark Web – containing everything from black markets like the infamous Silk Road to assassination groups like the Hitman Network – is the illegal subset of the Deep Web. The Deep Web is everything that is unindexed, meaning it does not come up on in searches using basic search engines, like Google or MetaCrawler. There can be overlap between the two, but this is not always the case. Basically, to navigate anywhere in the Deep Web, you highly desire to remain anonymous, hence the use of Tor, and you need to know the web address of wherever it is you want to go since you cannot simply search for it. The sites accessed through Tor, end in dot onion (.onion), not dot com, .org, or any other common ending. The .onion, and the name of the application, come from the idea that using Tor is like peeling back the layers of an onion – there is always another one under the surface, layers within layers, to protect your identity.4

TOR (The Onion Router) logo | Courtesy of Wikimedia Commons

While there are definitely some illicit places in the Deep Web, such as the aforementioned two sites and other illegal and exploitative child porn sites, there can also be warranted uses for it as well. Using Tor, whistle-blowers can post things to places, including areas like Wikileaks or the CIA’s website, without worrying about their identity going public.5 Human rights journalists can publish reports, oppressed people under strict authoritarian governments can access news sites, business owners can hide trade secrets, and people stranded in war zones can conceal their location. The trade-off for security is speed however, as the process of routing your requests around the world and hiding your identity takes time, so it tends to be much slower than a regular internet connection. However, while Tor can help hide your IP address, it is not foolproof.6

The U.S. Government, for example, has ways to decloak certain Tor users. In 2013, when whistleblower Edward Snowden released hundreds of secret documents from NSA, he included one that revealed the NSA was able to unmask 24 Tor users over one weekend, one of which was an Al-Qaeda operative.7 The NSA, however, is only able to target individual users – despite their efforts to reveal users en masse, including by trying to track users by microscopic differences in the internal time of the computers clocks – but that is not necessarily the case for other government agencies.8 The FBI, though, has remained quiet about its capability to break through Tor’s anonymity. In a court case against a man busted for sharing child pornography on Tor, the judge presiding over the case ordered the FBI to reveal how they had discovered the suspect’s true identity. The FBI refused, and dropped all charges rather than revealing how they did it. From the Tech Times, who was reporting on the case: “The FBI used ‘network investigative techniques’ to reveal users’ real identities despite Tor’s efforts, but in court it refused to comply with a request for information regarding its techniques. Rather than divulging its methods, the FBI preferred to see all charges dropped.”9

Picture of Def Con Las Vegas | Courtesy of Tony Webster and Flickr

In addition, attempts to find new ways to crack Tor constantly make progress. In 2015, researchers from Carnegie Mellon University scheduled a talk at the Black Hat hacking Conference (one of the two most famous meetups for hackers and internet security, along with Def Con). The Carnegie Mellon presentation promised to reveal the IP addresses and real users on Tor by using a $3,000 piece of equipment. While the talk was abruptly canceled at the last minute, it is extremely likely the FBI and Department of Defense have access to that technique as well. The very next year, in 2016, a federal judge confirmed that the FBI and DOD had hired researchers and software engineers from Carnegie Mellon University to help them break into Tor.10 That does not necessarily mean that the US Government is using their ability to target Tor users in a bad way – they have used that ability to shut down numerous illicit sites on the Dark Web, such as the Silk Road – but it is definitely something that potential users need to be aware of, especially those who are using Tor to protect their privacy.

Silk Road Seizure Message – Courtesy of Wikimedia Commons

Other issues with Tor include the fact that Tor popularized itself as a way to hide your identity from “Big Brother” and from the government, but was actually founded by the Navy and DARPA (Defense Advanced Research Projects Agency). Tor also is funded in large part by the US government, including the Pentagon, the US Department of State, a CIA branch organization, and others. This is because these agencies have a vested interest in keeping Tor afloat. As the co-founder of Tor, Roger Dingledine, said in a speech “they think of it as security technology. They need these technologies so that they can research people they’re interested in, so that they can have anonymous tip lines, so that they can buy things from people without other countries figuring out what they are buying, how much they are buying and where it is going, that sort of thing.” Later in his speech, he doubled down, saying “The United States government can’t simply run an anonymity system for everybody and then use it [for] themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent looking at my website,” if those are the only people using the network. So you need to have other people using the network so they blend together.”11 Even more worrisome is the fact that Tor has backdoor routes of communication with the FBI and other agencies. A journalist did some digging using the Freedom Of Information Act, and found Roger Dingledine had been communicating with the Department of Justice and the FBI about vulnerabilities they had found, and talking about installing backdoors into Tor.12 Below is a picture of some of their messages with some redacted parts.

Messages between Tor & FBI
Some messages obtained in 2018 by a Freedom of Information Act request, showing communication between TOR and the FBI and DOJ | Courtesy of Journalist Yasha Levine

There are, however, ways to further enhance the security and anonymity of using Tor. While Tor itself remains so far untraceable, barring some stupid mistakes by users who set it up improperly, all the known ways of breaking Tor’s cloak of secrecy revolve around finding you by looking at was done before and after using Tor, and matching them up. Using a VPN (Virtual Private Network) to conceal your IP address even before logging into Tor works wonders for foiling that method. While many VPNs do still log what goes on while using them, there are a few that have been proven as “no leak VPNs” by court cases and investigations, and those, when used in conjunction with Tor, work very well. In addition, running Tor through The Amnesiac Incognito Live System (also known as TAILS), adds an extra layer of security. TAILS boots your computer from a flash drive, from which you access Tor. This allows you to simply remove the flash drive from your computer to instantly remove any traces of your history from your computer. While not foolproof, this does help add extra safety.

While many people, especially in the privacy and internet security circles, swear by Tor, it is not without its cons. There are bad people using it and bad places that can be accessed through Tor, but it is also a safe haven for those who are in danger and need a place to hide, or for whatever reason cannot access the internet directly, for fear of surveillance. Is Tor foolproof? No. If a nation-state, especially one of the so-called “Five Eyes”, the USA, UK, Canada, New Zealand, and Australia, who are in a tightly knit cyber security alliance, really wanted to, they could detect an individual with some effort.13 Other countries that are involved in the lesser extensions of the Five Eyes, the Nine Eyes and the Fourteen Eyes, might be able to as well, though it is not guaranteed. What Tor can do, beyond a shadow of a doubt, is make a user safer. It will protect against your local and average hackers, and, even if it fails to conceal your identity, certainly makes it harder on those trying to find you. A way of thinking about it is “Tor is good, but not perfect”. Added security steps like TAILS and VPNs only make using Tor safer, and while Tor is not quite as invulnerable as it is often touted to be, it is still the best option for anyone in need of safety and anonymity.

Friendly Local Hackers provide warning about lack of security | Courtesy of The Next Web
  1. Russell Brandom, “FBI Agents Tracked Harvard Bomb Threats Despite Tor,” December 2013, The Verge, https://www.theverge.com/2013/12/18/5224130/fbi-agents-tracked-harvard-bomb-threats-across-tor.
  2. Sven Taylor, “Is Tor Trustworthy and Safe?”, October 2019, Restoreprivacy.com, https://restoreprivacy.com/tor/.
  3. Jill Schar, “What is Tor? Answers to Frequently Asked Questions,” October 2013, Tom’s Guide, https://www.tomsguide.com/us/what-is-tor-faq,news-17754.html.
  4. Steve Symanovich, “How to Safely Access the Deep and Dark Webs”, Norton.com, https://us.norton.com/internetsecurity-how-to-how-can-i-access-the-deep-web.html.
  5. Vladimir Unterfingher, “How to Get on the Dark Web – A Step by Step Guide”, August 2019, Heimdal Security, https://heimdalsecurity.com/blog/how-to-get-on-the-dark-web/.
  6. Vladimir Unterfingher, “How to Get on the Dark Web – A Step by Step Guide”, August 2019, Heimdal Security, https://heimdalsecurity.com/blog/how-to-get-on-the-dark-web/.
  7. Barton Gellman, Craig Timberg and Steven Rich, “Secret NSA Documents Show Campaign Against Tor Encrypted Network,” October 2013, The Washington Post, https://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html.
  8. Kevin Poulsen, “The FBI Used the Web’s Favorite Hacking Tool to Unmask Tor Users,” December 2014, WIRED, https://www.wired.com/2014/12/fbi-metasploit-tor/.
  9. Alexandra Burlacu, “FBI Drops Child Pornography Case To Avoid Disclosing TOR Vulnerabilities,” March 2017, Tech Times, https://www.techtimes.com/articles/200592/20170307/fbi-drops-child-pornography-case-to-avoid-disclosing-tor-vulnerability.htm.
  10. Judge Richard A. Jones, “Order on Defendant’s Motion To Compel,” February 2016, United States Court For the Western District of Washington at Seattle, https://www.documentcloud.org/documents/2719591-Farrell-Weds.html.
  11. Roger Dingledine, “The Future of the Digital Commons,” (speech, Berlin, Germany, June 11, 2004,), Internet Archive, https://archive.org/details/3_fr_t2_15h_4-Dingledine_a.
  12. Yasha Levine, “Fact-checking the Tor Project’s Government Ties,” February 2018, Surveillance Valley, https://surveillancevalley.com/blog/fact-checking-the-tor-projects-government-ties.
  13. Sven Taylor, “Five Eyes, Nine Eyes, 14 Eyes – Explained,” February 2020, Restoreprivacy.com, https://restoreprivacy.com/5-eyes-9-eyes-14-eyes/.

Share this post

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email

44 Responses

  1. The internet is a very scary place and the situations like this are the ones that make it even scarier. I had never heard about this incident and also the program of TOR but it was nice to read the fact that the person who made the bomb threats was found because of his mistake.

  2. Wow this was such a crazy article. I honestly never even think about the dark web or how scary it could be. I also have never even heard of TOR and to think about how many negative things it could be used for is terrifying. I’m glad I came across this article because it was very informative and it opened my eyes to something I hardly even think about.

  3. After reading this article, it really made me think about the underworld that indeed lurks behind TOR and other internet sites! The information regarding VPS’s really makes things come into perspective in the fact that in all honesty, no one is truly untraceable in this digital age we are living in! Even though most criminals have this invincibility aura around them, I am glad that agencies are also experimenting with this software to aid in its disbandment.

  4. This article was fascinating, I always found the dark web interesting, but never really put too much effort into researching it and looking into what exactly it was and how it operated, so this article was very interesting to read. I am not as familiar with TOR as, so learning about how it was a way to remain anonymous and that the government has a potential way of decoding it and removing that anonymity was very interesting.

  5. This article was a very interesting read. I didn’t know about this bomb threat that occurred at Harvard. It is crazy to think that a student really felt the need to go these lengths to get out of taking finals. I had also never heard of Tor prior to reading this article. It’s crazy that these websites like Tor or TAILS, that are supposed to let you be anonymous even exist in the first place.

  6. Reading this article gave me goosebumps. I didn’t know that the internet could be this scary. Tor is a really interesting platform to do good things but many people use it to do bad things. I have only heard of the dark web in movies and I know it’s something that no ordinary person wants to get into. But I had never heard of Tor and reading about it makes me think about how much the internet keeps on changing not only for good but also bad. But honestly, I thought this article was going to be more about Eldo Kim since it was the first thing that the writer talked about. Overall, amazing work!

  7. I think that TOR presents some very interesting questions about one’s right to privacy. While good people who use TOR simply want to remain anonymous, criminals can use the program to advance their own illicit trade. Although it might seem like the wild west of the internet at the moment, perhaps more people will use TOR to prevent big data companies from tracking their every move on the internet.

  8. Wow! I am not very tech savy so I do not know a whole lot about the internet so this article really made me think. I do not think I have ever heard of The Onion Router so the fact that it can be untraceable is kind of scary because there is no telling what threats there can be and how long it will be able to trace. It is interesting how Eldo posted a threat using TOR, which should have kept him hidden, to get out of taking finals but was caught because the threat was traced to him because he used the school’s wifi.

  9. The cover photo of this article captured my attention along with the title. This was an interesting read; you dove deep into the details which makes it enjoyable for us readers! I have a minimal understanding of the dark web- mostly coming from movies haha. I find it to be insane that there is so much unknown out there for people to take advantage of.

  10. I’ve always heard Tor was a useful browser for anonymous usage of the internet. Long was it touted as completely anonymous, but this article has opened my eyes to the possible ways one can be traced on the browser. As data usage becomes more and more prevalent over the years, it is important to keep in mind that a person can still track you down even if you believe you are safe.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.