

The first step of this process is finding Tor users. The NSA refers to these capabilities as CNE, or computer network exploitation. The trick identified Tor users on the internet and then executes an attack against their Firefox web browser. The majority of NSA employees work in SID, which is tasked with collecting data from communications systems around the world.Īccording to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software.

The work of attacking Tor is done by the NSA's application vulnerabilities branch, which is part of the systems intelligence directorate, or SID. He online anonymity network Tor is a high-priority target for the National Security Agency. Secret servers and a privileged position on the internet's backbone used to identify users and attack target computers Attacking TOR: The NSA War on Online Anonymity
