Back to Results

HOUSE_OVERSIGHT_020223.jpg

Source: HOUSE_OVERSIGHT  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
View Original Image

Extracted Text (OCR)

71 anonymous. So, to evade this built-in transparency in the Internet, dark side users have come to rely on ingenious software to hide their IP address. The most commonly used software for this purpose is TOR. It was first called The Onion Router, since it moves IP addresses through multiple layers, but it quickly became known simply by its acronym, TOR. TOR software hides the IP address by routing messages through a network of TOR-enabled relay stations, called “nodes.” Each node further obscure the user’s IP, even from the next node in the network. This scrambling allows messages to exit the chain of TOR nodes without an easily discoverable IP. By doing so, it “anomizes” each user of the dark side. Because of the anonymity it provides, TOR became the software of choice for individuals and organization who wanted to hide their identity. For example, TOR software made possible Silk Road, which acted as an exchange for drug dealers, assassins, safe crackers, and prostitutes until it was closed down by the FBI in 2011. It was created by Ross Ulbricht, a libertarian who wore a Ron Paul t-shirt, “to create a website where people could buy anything anonymously, with no trail whatsoever that led back to them.” (Ulbricht received a life prison sentence for running this criminal enterprise in May 2015.) To eradicate the Internet trail, Silk Road employed TOR software. TOR was also employed to steal and transfer classified secrets by Private Bradley Manning (now called Chelsea Manning.) He used TOR software to transfer some 50,000 diplomatic cables and military reports from his laptop to Julian Assange’s Wikileaks website. Eventually Manning was identified by a fellow hacker, convicted by a military court for violations of the Espionage Act, and sentenced to 35 years in prison. TOR enabled Wikileaks to publish other secret data, such as the theft of Sony’s files allegedly by the North Korean intelligence service in 2015. It was the means for guaranteeing anonymity to the IT workers who responded to his by now famous clarion call “System admins of the world unite.” It allowed system administrators who opposed the “surveillance state,” as well as other disgruntled employees of government agencies or corporation, to send documents they copied to the Wikileaks website without revealing their IP addresses. Since Wikileaks did not know the identity of their sources, they could not be legally compelled to reveal them. "Tor's importance to WikiLeaks cannot be overstated," Assange said in an interview with Ro/ling Stone in 2010. Indeed without the anonymity provided by its TOR software, Wikileaks could not have easily entered into a document-sharing arrangement major newspapers, including the Guardian, New York Times, Der Spiegel, Le Monde and El Pais. Through the magic of TOR, these newspapers simply attribute their sources to Wikileaks which, in turn, made Assange a major force in international journalism/. Ironically, TOR originally was a creation of US intelligence. In the early 2000s, the US Naval Research Laboratory and the Defense Advance Research Project Agency (DARPA) developed it to allow US intelligence operatives to cloak their movements on the Internet. They could anonymously manipulate web sites operated by Islamic radicals, for example, and create their own Trojan Horse sites to lures would-be terrorists and spies. As it turned out, that use of TOR HOUSE_OVERSIGHT_020223

Document Preview

HOUSE_OVERSIGHT_020223.jpg

Click to view full size

Document Details

Filename HOUSE_OVERSIGHT_020223.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,436 characters
Indexed 2026-02-04T16:40:58.455878