US intelligence agencies see Tor as important to their covert spying work and have not been pleased to see it used to leak their own secrets. Tor means that submissions can be hidden, and internal discussions can take place out of sight of would-be monitors. Tor was a US Naval Research Laboratory project, developed in 1995, which has been taken up by hackers around the world. It uses a network of about 2,000 volunteer global computer servers, through which any message can be routed, anonymously and untraceably, via other Tor computers, and eventually to a receiver outside the network. The key concept is that an outsider is never able to link the sender and receiver by examining “packets” of data.
That’s not usually the case with data sent online, where every message is split into “packets” containing information about its source, destination and other organising data (such as where the packet fits in the message). At the destination, the packets are reassembled. Anyone monitoring the sender or receiver’s internet connection will see the receiver and source information, even if the content itself is encrypted. And for whistleblowers, that can be disastrous.
Tor introduces an uncrackable level of obfuscation. Say Appelbaum in Seattle wants to send a message to Domscheit-Berg in Berlin. Both men need to run the Tor program on their machines. Appelbaum might take the precaution of encrypting it first using the free-of-charge PGP system. Then he sends it via Tor. The software creates a further encrypted channel routed through the Tor servers, using a few “nodes” among the worldwide network. The encryption is layered: as the message passes through the network, each node peels off a layer of encryption, which tells it which node to send the payload to next. Successive passes strip more encryption off until the message reaches the edge of the network, where it exits with as much encryption as the original – in this case, PGP- encrypted.
An external observer at any point in the network tapping the traffic that is flowing through it cannot decode what is being sent, and can only see one hop back and one hop forward. So monitoring the sender or receiver connections will only show a transmission going into or coming out of a Tor node – but nothing more. This “onion” style encryption, with layer after layer, gave rise to the original name, “The Onion Router” – shortened to Tor.
Tor also allows users to set up “hidden services”, such as instant messaging, that can’t be seen by tapping traffic at the servers. They’re accessed, appropriately, via pseudo-top-level domains ending in “.onion”. That provides another measure of security, so that someone who has sent a physical version of an electronic record, say on a thumb drive, can encrypt it and send it on, and only later reveal the encryption key. The Jabber encrypted chat service is popular with WikiLeakers.
“Tor’s importance to WikiLeaks cannot be overstated,” Assange told
On the verge of his debut WikiLeaks publication, at the beginning of 2007, Assange excitedly messaged the veteran curator of the Cryptome leaking site, John Young, to explain where his trove of material was coming from:
“Hackers monitor chinese and other intel as they burrow into their targets, when they pull, so do we. Inexhaustible supply of material. Near 100,000 documents/emails a day. We’re going to crack the world open and let it flower into something new …We have all of pre 2005 afghanistan. Almost all of india fed. Half a dozen foreign ministries. Dozens of political parties and consulates, worldbank, opec, UN sections, trade groups, tibet and falun dafa associations and … russian phishing mafia who pull data everywhere. We’re drowning. We don’t even know a tenth of what we have or who it belongs to. We stopped storing it at 1Tb [one terabyte, or 1,000 gigabytes].”
A few weeks later, in August 2007, a Swedish Tor expert, Dan Egerstad, told
The speculation was largely confirmed in 2010, when Assange gave Raffi Khatchadourian access to write a profile. The
The geeky hacker underground was only one part of the soil out of which WikiLeaks grew. Another was the anti-capitalist radicals – the community of environmental activists, human rights campaigners and political revolutionaries who make up what used to be known in the 1960s as the “counter-culture”. As Assange went public for the first time about WikiLeaks, he travelled to Nairobi in Kenya to set out their stall at the World Social Forum in January 2007. This was a radical parody of the World Economic Forum at Davos, Switzerland, where rich and influential people gather to talk about money. The WSF, which originated in Brazil, was intended, by contrast, to be where poor and powerless people would gather to talk about justice.
At the event, tens of thousands in Nairobi’s Freedom Park chanted, “Another world is possible!” Organisers were forced to waive entry fees after Nairobi slum dwellers staged a demonstration. The BBC reported that dozens of street children who had been begging for food invaded a five-star hotel tent and feasted on meals meant for sale at $7 a plate when many Kenyans lived on $2 a day: “The hungry urchins were joined by other participants who complained that the food was too expensive and police, caught unawares, were unable to stop the free-for-all that saw the food containers swept clean.”
Assange himself spent four days in a WSF tent with his three friends, giving talks, handing out flyers and making connections. He was so exhilarated by what he called “the world’s biggest NGO beach party” that he stayed on for much of the next two years in a Nairobi compound with activists from Medecins Sans Frontieres and other foreign groups.
“I was introduced to senior people in journalism, in human rights very quickly,” he told an Australian interviewer later. “[Kenya] has got extraordinary opportunities for reforms. It had a revolution in the 1970s. It has only been a democracy since 2004.” He wrote that he met in Africa “many committed and courageous individuals – banned opposition groups, corruption investigators, unions, fearless press and clergy”. These brave people seemed like the real deal to him: his mail-out contrasted them witheringly with western fellow-travellers. “A substantial portion of Social Forum types are ineffectual pansies who specialise in making movies about themselves and