NSA might tag you as extremist when you use Tor, other privacy online services
Internet users who have used Tor or visited its website to read up on its services are very likely included in a list of "extremists" kept by the National Security Agency (NSA). And if you are reading this article and other articles about Tor and other online privacy services, there's also a good chance that the NSA has harvested and stored your IP address.
German radio and television broadcasting organizations Norddeutscher Rundfunk and Westdeutscher Rundfunk first revealed the top-secret source code used in the NSA's XKeyScore, the agency's electronic surveillance program first revealed by former NSA contractor Edward Snowden, who described the software as a tool to track "nearly everything a user does on the Internet."
Tor Project developer Jacob Appelbaum, along with German journalists Lena Kampf and John Goetz, published an analysis of the source code, which made the shocking revelations on the NSA's widespread efforts to track and monitor individuals who use privacy tools, which include thousands of activists in oppressive regimes, journalists and their sources, political dissidents and a good many others who may have different reasons for wanting to stay anonymous online.
Surveillance, however, is not simply limited to collecting IP addresses. Analysis of the code reveals rules that describe how the software monitors users found to have visited Linux Journal, the popular Linux publication which the agency dubs an "extremist forum" in the code. Even more disturbing are the rules that reveal how the agency conducts deep-packet inspections of emails sent and received through Tor's anonymous MixMinion email service, whose server is maintained by Tor Project leader Roger Dingledine at the Massachusetts Institute of Technology (MIT). Aside from the Tor directory, the MIT server is also host to a number of unrelated websites, including gaming libraries, which means the NSA could be collecting metadata of those users as well.
Ironically, Tor began as The Onion Router developed by the U.S. Naval Research Laboratory in the late 1990s as a way for government employees to remain anonymous on the Internet. It was later passed on to the public sector, although it is still largely funded by the U.S. government. Tor allows users to become anonymous on the Internet by encrypting data sent while browsing, sending messages and chatting with friends and rerouting the traffic to a number of servers managed by some 5,000 volunteers from around the world. Each server can only "see" connections with the previous server that sent the data and the next server that will receive it, making it impossible to link a user's IP address with his online activities.
But Tor is not the only target. XKeyScore is also reportedly tracking users of other online privacy services, including the anonymous operating system Tails developed initially for human rights activists and journalists with access to the Snowden leaks, FreeNet, HotSpotShield, Centurian, FreeProxies.org and MegaProxy. The code referring to Tails also includes anyone "viewing documents relating to Tails, or viewing websites that detail Tails."
It's unclear how the source code for XKeyScore was obtained, but experts believe it may have been revealed by a second source, not Snowden, since the original leaks did not contain information of this sort. One thing is clear, though. If the findings are true, the NSA is flying in the face of its own assertions that its surveillance program is only targeted at those considered threats to national security.
"It's a dead certainty that people who heard the NSA's reassurances about 'targeting' its surveillance on people who were doing something suspicious didn't understand that the NSA meant people who'd looked up technical details about systems that are routinely discussed on the front page of every newspaper in the world," writes activist and fiction writer Cory Doctorow.