Tor, TrueCrypt, Tails topped the NSA's 'most wanted' list in 2012

The latest Snowden documents to be published reveal the security tools the NSA most wanted to crack in January 2012

Three out of three? That could be the score for the U.S. National Security Agency's cryptographic "most wanted" list of 2012.

In January 2012, it saw Internet traffic anonymizing tool Tor (The Onion Router), Linux distribution Tails (The Amnesic Incognito Live System) and disk encryption system TrueCrypt as the biggest threats to its ability to intercept Internet traffic and interpret other information it acquires.

Since then, flaws have been found in Tor and the FBI has unmasked Tor users and a vulnerability was found in Tails allowing attackers to determine users' IP addresses.

And while a source-code audit gave TrueCrypt a relatively clean bill of health in April, TrueCrypt's anonymous developers inexplicably abandoned the software a few weeks later, warning it was insecure.

That the NSA considered these tools dangerous is perhaps little surprise: In July it was revealed that the agency's XKeyScore traffic interception tool contains rules for tracking who visited the websites of the Tor and Tails projects.

But now German magazine Der Spiegel has published further documents from the cache leaked by Edward Snowden, including one outlining, on page 25, the tools the NSA most wanted to crack in order to intercept and decrypt its targets' communications.

The tools were ranked by their impact, from trivial to catastrophic, and their use risk, from current highest priority targets down to experimentation by technical thought leaders.

In the slide deck, the NSA explained that, with rare exceptions, it only developed "application-specific solutions" based on those two criteria, impact and use risk. In a resource-constrained environment, it said, the need for responses to current threats would always trump speculative work on threats that might become more widespread. Der Spiegel had something to say about those constraints: Of the NSA's 2013 budget of over US$10 billion, some $34.3 million was allocated to "Cryptanalysis and Exploitation Services."

Top of the NSA's list of major or catastrophic threats, capable of causing a majority or near-total loss or lack of insight into the highest-priority targets' communications or online presence, were Tor, Tails and TrueCrypt.

Of course, it's unlikely that the published attacks on Tor and Tails were developed by the NSA -- but with the Tor unmasking attack costing researchers just $3,000, the NSA could certainly have done something similar with its budget over the last three years. Although some of the wilder conspiracy theories linking TrueCrypt's demise to the NSA have evaporated, there is still no convincing explanation for why the developers abandoned a tool that had just come through a code audit with no major flaws found.

Other tools were also considered major or catastrophic threats, but of lesser priority because they were not yet, or no longer, used by the highest priority targets. Among the tools the NSA feared it might need to crack in future was encrypted telephony tool Redphone, which uses Phil Zimmermann's ZRTP secure key-agreement system for RTP (Real-Time Transport Protocol) voice communications.

Over two decades ago Zimmermann also developed PGP (Pretty Good Privacy), an encryption tool the NSA is still having trouble cracking, as illustrated by this slide published by Der Spiegel.

That PGP was not top of the NSA's most-wanted list could be down to its usability, which is such as to put off all but the more tech-savvy targets.

However, with ZRTP used to encrypt voice communications in off-the-shelf smartphones like the Blackphone, it's a fair bet that Redphone and its ZRTP-using ilk will be moving higher up next year's list.

The slide deck revealing the most-wanted list also held another couple of technical challenges the NSA faces -- ones that might be more familiar to enterprise users.

One slide lamented that "Excel tops out at a million rows," making Microsoft's spreadsheet inadequate for handling more than a couple of weeks' "summarized active user events" from one of the NSA's data capture programs alone. Using four or five pivot tables to visualize the data from each of thirty target sets, two weeks' data would generate 100 to 150 slides, the NSA presentation said.

Like many other organizations, the NSA apparently had a big problem with unstructured data. Slide 37 warns that "TKB/UTT (Target Knowledge Base/Unified Targeting tool) are victims of years of 'fill in the blank' freeform data entry." As of 2012, this was "very slowly being addressed" with a target date for completion of "~2015."

With Snowden's trove of documents all predating May 2013, when he fled from Hawaii to Hong Kong, we'll have to wait for another leaker to come forward before we find out whether the NSA hit that 2015 deadline, and what progress it has made with its other software challenges.

Peter Sayer covers general technology breaking news for IDG News Service, with a special interest in open source software and related European intellectual property legislation. Send comments and news tips to Peter at

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags governmentsecurityinternetencryptionInternet-based applications and servicesGovernment use of ITExploits / vulnerabilitiesU.S. National Security Agency

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Peter Sayer

IDG News Service
Show Comments

Cool Tech

Breitling Superocean Heritage Chronographe 44

Learn more >

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?