According to the website for the popular Tor web browser, “Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.”

I felt that the intelligence community would probably take a great interest in this technology, and I requested information from multiple agencies to see what they might have. Many are still being processed, but what has come back is available below:

Central Intelligence Agency (CIA) Records

 Central Intelligence Agency [ 2 Pages, 0.2MB ]

Continue scrolling for more...

Federal Bureau of Investigation (FBI) Records

 Federal Bureau of Investigation Records, Released October 2015 [ 27 Pages, 18.9MB ]

 

Additional Information on Tor (For Reference)

(Source)

The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor’s users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members’ online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company’s patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

Follow The Black Vault on Social Media:

This post was published on November 1, 2015 4:20 pm

John Greenewald

Recent Posts

Future Battlefield Energy: 2009 DIA Report Examines Nonconventional Power Sources for U.S. Troops

A document released from the Defense Intelligence Agency (DIA), obtained under the Freedom of Information…

May 19, 2025

FBI Files: Historical Figures & Groups

Background Welcome to the FBI Files on Historical Figures & Groups archive at The Black…

May 19, 2025

FBI Files: American Military

Welcome to the FBI Files on American Military Personnel archive at The Black Vault. This…

May 13, 2025

From AATIP to NPSMS: The Mystery Continues To Deepen

This article was originally published June 5, 2024. It was updated on May 7, 2025,…

May 7, 2025

DHS Briefing Details Select Drone Sightings in New Jersey, Highlights Potential Misidentifications Among 5,000+ Reports

Following a surge of more than 5,000 drone sighting reports in New Jersey in late…

May 5, 2025

The Robert F. Kennedy Assassination Records Archive

(Click here to jump directly to the search engine) In January 2025, President Donald J.…

April 28, 2025