In December 2013, Harvard University was rocked by a bomb threat. As the threat threw the campus into a state of chaos, local law enforcement and the FBI went to work, catching the culprit in under two days. The perpetrator in question was actually a student, sophomore Eldo Kim, who had attempted to use the bomb threat to, of all things, get out of taking his final exams.1
Foregoing the obvious jokes about how ridiculously over the top this student’s plan was and about Ivy League schools, still leave interesting facts to reveal. Eldo Kim had taken some basic precautions to not be detected as the bomb threat maker, using a famous and highly touted free privacy service called Tor, short for The Onion Router, which is supposed to guarantee complete anonymity when it is used, along with a brand new temporary email, but to no avail. His mistake? Connecting to Tor on the campus WiFi! Investigators determined the bomb threats had come through Tor, and conducted a search on the university network for anyone using Tor at the same time the threats were sent. Only one name came up – Eldo Kim. His use of Tor made him stand out like a “glow stick”.2 Kim was tripped up by that, not by Tor failing, but it did lead to some questions about the reliability of Tor’s protective capabilities. Is Tor truly anonymous, and safe to use?
Tor works by basically creating an alternate path to wherever you are logging onto the internet. It prevents identification of your computer IP address by relaying and bouncing your commands around thousands of servers, run by volunteers around the world.3 It is somewhat akin to someone trying to shake a suspected pursuer by taking an indirect route to their destination in real life. In fact, with Tor, you get access to the vast majority of the internet you probably did not even know existed. Only an estimated 10% of the internet is actually indexed and visible (making it accessible to everyone), while 90% is out of sight, similar to an iceberg.
Tor takes you to the Deep Web, which is different from the Dark Web. The Dark Web – containing everything from black markets like the infamous Silk Road to assassination groups like the Hitman Network – is the illegal subset of the Deep Web. The Deep Web is everything that is unindexed, meaning it does not come up on in searches using basic search engines, like Google or MetaCrawler. There can be overlap between the two, but this is not always the case. Basically, to navigate anywhere in the Deep Web, you highly desire to remain anonymous, hence the use of Tor, and you need to know the web address of wherever it is you want to go since you cannot simply search for it. The sites accessed through Tor, end in dot onion (.onion), not dot com, .org, or any other common ending. The .onion, and the name of the application, come from the idea that using Tor is like peeling back the layers of an onion – there is always another one under the surface, layers within layers, to protect your identity.4
While there are definitely some illicit places in the Deep Web, such as the aforementioned two sites and other illegal and exploitative child porn sites, there can also be warranted uses for it as well. Using Tor, whistle-blowers can post things to places, including areas like Wikileaks or the CIA’s website, without worrying about their identity going public.5 Human rights journalists can publish reports, oppressed people under strict authoritarian governments can access news sites, business owners can hide trade secrets, and people stranded in war zones can conceal their location. The trade-off for security is speed however, as the process of routing your requests around the world and hiding your identity takes time, so it tends to be much slower than a regular internet connection. However, while Tor can help hide your IP address, it is not foolproof.6
The U.S. Government, for example, has ways to decloak certain Tor users. In 2013, when whistleblower Edward Snowden released hundreds of secret documents from NSA, he included one that revealed the NSA was able to unmask 24 Tor users over one weekend, one of which was an Al-Qaeda operative.7 The NSA, however, is only able to target individual users – despite their efforts to reveal users en masse, including by trying to track users by microscopic differences in the internal time of the computers clocks – but that is not necessarily the case for other government agencies.8 The FBI, though, has remained quiet about its capability to break through Tor’s anonymity. In a court case against a man busted for sharing child pornography on Tor, the judge presiding over the case ordered the FBI to reveal how they had discovered the suspect’s true identity. The FBI refused, and dropped all charges rather than revealing how they did it. From the Tech Times, who was reporting on the case: “The FBI used ‘network investigative techniques’ to reveal users’ real identities despite Tor’s efforts, but in court it refused to comply with a request for information regarding its techniques. Rather than divulging its methods, the FBI preferred to see all charges dropped.”9
In addition, attempts to find new ways to crack Tor constantly make progress. In 2015, researchers from Carnegie Mellon University scheduled a talk at the Black Hat hacking Conference (one of the two most famous meetups for hackers and internet security, along with Def Con). The Carnegie Mellon presentation promised to reveal the IP addresses and real users on Tor by using a $3,000 piece of equipment. While the talk was abruptly canceled at the last minute, it is extremely likely the FBI and Department of Defense have access to that technique as well. The very next year, in 2016, a federal judge confirmed that the FBI and DOD had hired researchers and software engineers from Carnegie Mellon University to help them break into Tor.10 That does not necessarily mean that the US Government is using their ability to target Tor users in a bad way – they have used that ability to shut down numerous illicit sites on the Dark Web, such as the Silk Road – but it is definitely something that potential users need to be aware of, especially those who are using Tor to protect their privacy.
Other issues with Tor include the fact that Tor popularized itself as a way to hide your identity from “Big Brother” and from the government, but was actually founded by the Navy and DARPA (Defense Advanced Research Projects Agency). Tor also is funded in large part by the US government, including the Pentagon, the US Department of State, a CIA branch organization, and others. This is because these agencies have a vested interest in keeping Tor afloat. As the co-founder of Tor, Roger Dingledine, said in a speech “they think of it as security technology. They need these technologies so that they can research people they’re interested in, so that they can have anonymous tip lines, so that they can buy things from people without other countries figuring out what they are buying, how much they are buying and where it is going, that sort of thing.” Later in his speech, he doubled down, saying “The United States government can’t simply run an anonymity system for everybody and then use it [for] themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent looking at my website,” if those are the only people using the network. So you need to have other people using the network so they blend together.”11 Even more worrisome is the fact that Tor has backdoor routes of communication with the FBI and other agencies. A journalist did some digging using the Freedom Of Information Act, and found Roger Dingledine had been communicating with the Department of Justice and the FBI about vulnerabilities they had found, and talking about installing backdoors into Tor.12 Below is a picture of some of their messages with some redacted parts.
There are, however, ways to further enhance the security and anonymity of using Tor. While Tor itself remains so far untraceable, barring some stupid mistakes by users who set it up improperly, all the known ways of breaking Tor’s cloak of secrecy revolve around finding you by looking at was done before and after using Tor, and matching them up. Using a VPN (Virtual Private Network) to conceal your IP address even before logging into Tor works wonders for foiling that method. While many VPNs do still log what goes on while using them, there are a few that have been proven as “no leak VPNs” by court cases and investigations, and those, when used in conjunction with Tor, work very well. In addition, running Tor through The Amnesiac Incognito Live System (also known as TAILS), adds an extra layer of security. TAILS boots your computer from a flash drive, from which you access Tor. This allows you to simply remove the flash drive from your computer to instantly remove any traces of your history from your computer. While not foolproof, this does help add extra safety.
While many people, especially in the privacy and internet security circles, swear by Tor, it is not without its cons. There are bad people using it and bad places that can be accessed through Tor, but it is also a safe haven for those who are in danger and need a place to hide, or for whatever reason cannot access the internet directly, for fear of surveillance. Is Tor foolproof? No. If a nation-state, especially one of the so-called “Five Eyes”, the USA, UK, Canada, New Zealand, and Australia, who are in a tightly knit cyber security alliance, really wanted to, they could detect an individual with some effort.13 Other countries that are involved in the lesser extensions of the Five Eyes, the Nine Eyes and the Fourteen Eyes, might be able to as well, though it is not guaranteed. What Tor can do, beyond a shadow of a doubt, is make a user safer. It will protect against your local and average hackers, and, even if it fails to conceal your identity, certainly makes it harder on those trying to find you. A way of thinking about it is “Tor is good, but not perfect”. Added security steps like TAILS and VPNs only make using Tor safer, and while Tor is not quite as invulnerable as it is often touted to be, it is still the best option for anyone in need of safety and anonymity.
- Russell Brandom, “FBI Agents Tracked Harvard Bomb Threats Despite Tor,” December 2013, The Verge, https://www.theverge.com/2013/12/18/5224130/fbi-agents-tracked-harvard-bomb-threats-across-tor. ↵
- Sven Taylor, “Is Tor Trustworthy and Safe?”, October 2019, Restoreprivacy.com, https://restoreprivacy.com/tor/. ↵
- Jill Schar, “What is Tor? Answers to Frequently Asked Questions,” October 2013, Tom’s Guide, https://www.tomsguide.com/us/what-is-tor-faq,news-17754.html. ↵
- Steve Symanovich, “How to Safely Access the Deep and Dark Webs”, Norton.com, https://us.norton.com/internetsecurity-how-to-how-can-i-access-the-deep-web.html. ↵
- Vladimir Unterfingher, “How to Get on the Dark Web – A Step by Step Guide”, August 2019, Heimdal Security, https://heimdalsecurity.com/blog/how-to-get-on-the-dark-web/. ↵
- Vladimir Unterfingher, “How to Get on the Dark Web – A Step by Step Guide”, August 2019, Heimdal Security, https://heimdalsecurity.com/blog/how-to-get-on-the-dark-web/. ↵
- Barton Gellman, Craig Timberg and Steven Rich, “Secret NSA Documents Show Campaign Against Tor Encrypted Network,” October 2013, The Washington Post, https://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html. ↵
- Kevin Poulsen, “The FBI Used the Web’s Favorite Hacking Tool to Unmask Tor Users,” December 2014, WIRED, https://www.wired.com/2014/12/fbi-metasploit-tor/. ↵
- Alexandra Burlacu, “FBI Drops Child Pornography Case To Avoid Disclosing TOR Vulnerabilities,” March 2017, Tech Times, https://www.techtimes.com/articles/200592/20170307/fbi-drops-child-pornography-case-to-avoid-disclosing-tor-vulnerability.htm. ↵
- Judge Richard A. Jones, “Order on Defendant’s Motion To Compel,” February 2016, United States Court For the Western District of Washington at Seattle, https://www.documentcloud.org/documents/2719591-Farrell-Weds.html. ↵
- Roger Dingledine, “The Future of the Digital Commons,” (speech, Berlin, Germany, June 11, 2004,), Internet Archive, https://archive.org/details/3_fr_t2_15h_4-Dingledine_a. ↵
- Yasha Levine, “Fact-checking the Tor Project’s Government Ties,” February 2018, Surveillance Valley, https://surveillancevalley.com/blog/fact-checking-the-tor-projects-government-ties. ↵
- Sven Taylor, “Five Eyes, Nine Eyes, 14 Eyes – Explained,” February 2020, Restoreprivacy.com, https://restoreprivacy.com/5-eyes-9-eyes-14-eyes/. ↵
46 comments
Berenice Alvarado
Reading this article gave me goosebumps. I didn’t know that the internet could be this scary. Tor is a really interesting platform to do good things but many people use it to do bad things. I have only heard of the dark web in movies and I know it’s something that no ordinary person wants to get into. But I had never heard of Tor and reading about it makes me think about how much the internet keeps on changing not only for good but also bad. But honestly, I thought this article was going to be more about Eldo Kim since it was the first thing that the writer talked about. Overall, amazing work!
Nathaniel Bielawski
I think that TOR presents some very interesting questions about one’s right to privacy. While good people who use TOR simply want to remain anonymous, criminals can use the program to advance their own illicit trade. Although it might seem like the wild west of the internet at the moment, perhaps more people will use TOR to prevent big data companies from tracking their every move on the internet.
Hali Garcia
Wow! I am not very tech savy so I do not know a whole lot about the internet so this article really made me think. I do not think I have ever heard of The Onion Router so the fact that it can be untraceable is kind of scary because there is no telling what threats there can be and how long it will be able to trace. It is interesting how Eldo posted a threat using TOR, which should have kept him hidden, to get out of taking finals but was caught because the threat was traced to him because he used the school’s wifi.
Savannah Alcazar
The cover photo of this article captured my attention along with the title. This was an interesting read; you dove deep into the details which makes it enjoyable for us readers! I have a minimal understanding of the dark web- mostly coming from movies haha. I find it to be insane that there is so much unknown out there for people to take advantage of.
Andres Ruiz
I’ve always heard Tor was a useful browser for anonymous usage of the internet. Long was it touted as completely anonymous, but this article has opened my eyes to the possible ways one can be traced on the browser. As data usage becomes more and more prevalent over the years, it is important to keep in mind that a person can still track you down even if you believe you are safe.
Matthew Avila
this article was very interesting and enjoyable to read! I personally almost downloaded Tor browser to see what was actually on it but never did because I was too scared. it is crazy to know that it isn’t one hundred percent secure and anonymous like I always thought it was. I also think it’s crazy that the FBI dropped the charges because they didn’t want to reveal how they cracked Tor security.
Thiffany Yeupell
Like the ocean, the internet is vast and endless, and sometimes, the necessary tools are needed to reach depths previously out of reach. For Tor, its very existence seems to be in the grey area. Whether it should continue or not, is up to the Navy, DARPA and the US, but it does present itself useful when needed. When reading this, my thought process went to a hypothetical: should the possibility of Tor being shut down occur, would the activities of the deep web and dark web start to surface in the internet the average person has access to? Or would a similar system to Tor be created by another entity, making it a new and uncontrolled area that may be out of the control of the mentioned Five Eyes? Unknown, but I thought it was an interesting hypothetical given the contents of the article
Nelly Perez
The fact that a student created a dangerous device to get out of finals is disgusting and disturbing at the same time. The Onion Router was supposed to give Kim anonymity, but it failed since the school internet system can supervise students. Tor is seen as a gateway to more possibilities of online activity, even though it could lead to online danger.
Giselle Garcia
This was a fascinating article to read. I was unaware of computer programs that could conceal your identity so well. It’s interesting how much effort people will put into being anonymous while on the internet but also scary how much illegal things are out there on the dark web. The description of Tor being like an onion with layers that can be peeled back to reveal many more layers was a cool visual aid to understand the program better.
Andrea Degollado
At first glance this article has a very eye catching title and picture. I think this article was very fascinating to read. I am personally not a tech genius and I did not know about systems such as TAILS that help enhance your anonymity when using tor.I think it crazy to think about the amount of stuff on the internet and how many of us are barely even scratching the surface on the web.