Tor: What It Is and How It Can Support DoD Information Operations
Abstract:
Tor is an open source anonymizing application which operates on the physical infrastructure of the standard internet through the use of non-standard protocols. It functions by routing its traffic encased in multiple layers of encryption through a series of privately controlled nodes. The layered encryption provides the user complete anonymityno outside observer can determine the source, destination, or content of the information traversing the network. Utilizing Tor, users can collaborate with others, browse the Internet, or access hidden services within the Tor network itself without compromising their identity. The anonymity provided by Tor makes it a popular tool for individuals who wish to hide their online activities, and is widely used by dissidents in repressive regimes and members of extremist organizations at odds with the United States. Because of this, Tor is an exceptional platform for intelligence-gathering, gaining effects through messaging to populations, and as a vector for the delivery of cyber weapons. Using Tor, the DoD can conduct real-time messaging and collaboration with dissident populations inside adversarial nations, more efficiently gather intelligence during Phase 0(Shaping) and Phase 1 (Deterrence) operations, and effectively deliver cyber weapons which provide an asymmetric advantage to US forces.