HOUSE_OVERSIGHT_020331.jpg
house-oversight-gdrive Image 1.2 MB • Feb 13, 2026
**Page 179:**
* **Text:**
* messages which would allow it to trace the path of messages that passed through them. Through this technology, it could tag and follow TOR users as their communications travelled across the Internet. It could even borrow their Internet identities. To be sure, the NSA also had such a capability. The Silk Road founder Ross Ulbricht discovered that his TOR software did not make his computer server in Iceland invisible. According to a former top official in the Justice Department, the NSA was able to locate it by cracking the TOR swofare, (Ulbric is currently serving a life prison sentence for his Silk Road activities.). Unlike adversary services, however, the NSA needs a warrant to investigate US citizens who use TOR.
* Even the NSA is not immune from an attack of its own computers. CIA deputy director Morell, who served on the committee evaluating the NSA's vulnerability in the Snowden affair after retiring from the CIA in 2013, wrote in his 2015 book "The Great War of our Times," that many financial institutions have "better cyber security than the NSA." If nothing else, the Internet helped make the activities of US intelligence workers visible to the SVR.
* Even if the SVR theoretically had opportunities, it still had to find at least one disgruntled civilian contractor inside the NSA who had access to the sealed-off computer networks. Did it find its man? If so, was it before or after Snowden arrived in Hong Kong with the Level 3 NSA files?
* **Header:**
* 179
* **Footer:**
* HOUSE_OVERSIGHT_020331
Entities
0 total entities mentioned
No entities found in this document
Document Metadata
- Document ID
- 009a994e-4345-43ed-8f51-4bb4eef87ab5
- Storage Key
- house-oversight/gdrive/images/HOUSE_OVERSIGHT_020331.jpg
- Content Hash
- 5779f5b23b08e2581e4f67ff05267922
- Created
- Feb 13, 2026