"In a time of universal deceit telling the truth is a revolutionary act." -George Orwell

The Brink Of Mass Extinction

In Uncategorized on July 25, 2014 at 4:08 pm
Brink of extinction

(Image: Polluted dawn, ice bergs via Shutterstock; Edited: JR/TO)

Oldspeak: “As our Great Mother burns,  industrial civilization grinds along, destroying and contaminating all life it contacts; ever-widening ecological overshoot, triggering & accelerating ever more non-linear irreversible positive feedback loops, conditions worsen and we draw nearer to extinction. The latest state of the ecology report from Dahr Jamail brings more grim news that is generally being ignored.” -OSJ

By Dahr Jamail @ Truthout:

We do not inherit the earth from our ancestors; we borrow it from our children.”
 – Native American proverb

March through June 2014 were the hottest on record globally, according to the Japan Meteorological Agency. In May – officially the hottest May on record globally – the average temperature of the planet was .74 degrees Celsius above the 20th century baseline, according to data from the National Oceanic and Atmospheric Administration. The trend is clear: 2013 was the 37th consecutive year of above-average global temperatures, and since the Industrial Revolution began, the earth has been warmed by .85 degrees Celsius. Several scientific reports and climate modeling show that at current trajectories (business as usual), we will see at least a 6-degree Celsius increase by 2100.

In the last decade alone, record high temperatures across the United States have outnumbered record low temperatures two to one, and the trend is both continuing and escalating.

While a single extreme weather event is not proof of anthropogenic climate disruption (ACD), the increasing intensity and frequency of these events are. And recent months have seen many of these.

A record-breaking heat wave gripped India in June, as temperatures hovered at 46 degrees Celsius, sometimes reaching 48 degrees Celsius. Delhi’s 22 million residents experienced widespread blackouts and rioting, as the heat claimed hundreds of lives.

Also in June, Central Europe cooked in unseasonably extreme heat, with Berlin experiencing temperatures over 32 degrees Celsius, which is more than 12 degrees hotter than normal.

At the same time, at least four people died in Japan, and another 1,637 were hospitalized as temperatures reached nearly 38 degrees Celsius.

NASA is heightening its efforts to monitor ACD’s impacts on the planet; recently, it launched the first spacecraft dedicated solely to studying atmospheric carbon dioxide.

The spacecraft will have plenty to study, since earth’s current carbon dioxide concentration is now the longest ever in recorded history.


A recent report by the National Resource Defense Council warned that summers in the future are likely to bring increased suffering, with more poison ivy and biting insects, and decreasing quality of air and water.

As farmers struggle to cope with increasing demands for food as the global population continues to swell, they are moving towards growing crops designed to meet these needs as well as withstand more extreme climate conditions. However, a warning by an agricultural research group shows they may inadvertently be increasing global malnutrition by these efforts. “When I was young, we used to feed on amaranth vegetables, guava fruits, wild berries, jackfruits and many other crops that used to grow wild in our area. But today, all these crops are not easily available because people have cleared the fields to plant high yielding crops such as kales and cabbages which I am told have inferior nutritional values,” Denzel Niyirora, a primary school teacher in Kigali, said in the report.

The stunning desert landscape of Joshua Tree National Park is now in jeopardy, as Joshua trees are now beginning to die out due to ACD.

Another study, this one published in the journal Polar Biology, revealed that birds up on Alaska’s North Slope are nesting earlier in order to keep apace with earlier snowmelt.

Antarctic emperor penguin colonies could decline by more than half in under 100 years, according to a recent study – and another showed that at least two Antarctic penguin species are losing ground in their fight for survival amidst the increasing impacts of ACD, as the Antarctic Peninsula is one of the most rapidly warming regions on earth. The scientists who authored the report warned that these penguins’ fate is only one example of this type of impact from ACD on the planet’s species, and warned that they “expect many more will be identified as global warming proceeds and biodiversity declines.”


Given that the planetary oceans absorb approximately 90 percent of our carbon dioxide emissions, it should come as no surprise that they are in great peril.

This is confirmed by a recent report that shows the world’s oceans are on the brink of collapse, and in need of rescue within five years, if it’s not already too late.

As the macro-outlook is bleak, the micro perspective sheds light on the reasons why.

In Cambodia, Tonle Sap Lake is one of the most productive freshwater ecosystems on earth. However, it is also in grave danger from overfishing, the destruction of its mangrove forests, an upstream dam and dry seasons that are growing both longer and hotter due to ACD.

Anomalies in the planet’s marine life continue. A 120-foot-long jellyfish is undergoing massive blooms and taking over wider swaths of ocean as the seas warm from ACD.

The Pacific island group of Kiribati – home to 100,000 people – is literally disappearing underwater, as rising sea levels swallow the land. In fact, Kiribati’s president recently purchased eight square miles of land 1,200 miles away on Fiji’s second largest island, in order to have a plan B for the residents of his disappearing country.

Closer to home here in the United States, most of the families living on Isle de Jean Charles, Louisiana, have been forced to flee their multi-generational home due to rising sea levels, increasingly powerful storms, and coastal erosion hurried along by oil drilling and levee projects.

Looking at the bigger picture, a recently released US climate report revealed that at least half a trillion dollars of property in the country will be underwater by 2100 due to rising seas.

Meanwhile, the tropical region of the planet, which covers 130 countries and territories around the equator, is expanding and heating up as ACD progresses.

Residential neighborhoods in Oakland, California – near the coast – are likely to be flooded by both rising seas and increasingly intense storms, according to ecologists and local area planners.

On the East Coast, ocean acidification from ACD, along with lowered oxygen in estuaries, are threatening South Carolina’s coastal marine life and the seafood industry that depends upon it.

Record-setting “100-year” flooding events in the US Midwest are now becoming more the rule than the exception, thanks to ACD.

Even Fairbanks, Alaska received one-quarter of its total average annual rainfall in a 24-hour period earlier this summer – not long after the area had already received roughly half its average annual rainfall in just a two-week period.

Rising sea levels are gobbling up the coast of Virginia so quickly now that partisan political debate over ACD is also falling by the wayside, as both Republicans and Democrats are working together to figure out what to do about the crisis.

Reuters released a report showing how “Coastal flooding along the densely populated Eastern Seaboard of the United States has surged in recent years . . . with the number of days a year that tidal waters reached or exceeded NOAA flood thresholds more than tripling in many places during the past four decades.”

Flooding from rising seas is already having a massive impact in many other disparate areas of the world: After torrential rain and flooding killed at least a dozen people in Bulgaria this summer, the country continues to struggle with damage from the flooding as it begins to tally the economic costs of the disasters.

In China, rain and flooding plunged large areas of the Jiangxi and Hunan Provinces into emergency response mode. Hundreds of thousands were impacted.

The region of the globe bordering the Indian Ocean stretching from Indonesia to Kenya is now seen as being another bulls-eye target for ACD, as the impacts there are expected to triple the frequency of both drought and flooding in the coming decades, according to a recent study.

Another study revealed how dust in the wind, of which there is much more than usual, due to spreading drought, is quickening the melting of Greenland’s embattled ice sheet, which is already losing somewhere between 200 to 450 billion tons of ice annually. The study showed that increased dust on the ice will contribute towards another 27 billion tons of ice lost.

Down in Antarctica, rising temperatures are causing a species of moss to thrive, at the detriment of other marine creatures in that fragile ecosystem.

Up in the Arctic, the shrinking ice cap is causing drastic changes to be made in the upcoming 10th edition of the National Geographic Atlas of the World. Geographers with the organization say it is the most striking change ever seen in the history of the publication.

A UK science team predicted that this year’s minimum sea ice extent will likely be similar to last year’s, which is bad news for the ever-shrinking ice cap. Many scientists now predict the ice cap will begin to vanish entirely for short periods of the summer beginning next year.

Canada’s recently released national climate assessment revealed how the country is struggling with melting permafrost as ACD progresses. One example of this occurred in 2006 when the reduced ice layer of ice roads forced a diamond mine to fly in fuel rather than transport it over the melted ice roads, at an additional cost of $11.25 million.

Arctic birds’ breeding calendars are also being impacted. As ACD causes earlier Arctic melting each season, researchers are now warning of long-ranging adverse impacts on the breeding success of migratory birds there.

In addition to the aforementioned dust causing the Greenland ice sheet to melt faster, industrial dust, pollutants and soil, blown over thousands of miles around the globe, are settling on ice sheets from the Himalaya to the Arctic, causing them to melt faster.

At the same time, multi-year drought continues to take a massive toll across millions of acres across the central and western United States. It has caused millions of acres of federal rangeland to turn into dust, and has left a massive swath of land reaching from the Pacific Coast to the Rocky Mountains desolated. ACD, invasive plants and now continuously record-breaking wildfire seasons have brought ranchers to the breaking point across the West.

Drought continues to drive up food prices across the United States, and particularly prices of produce grown in California’s Central Valley. As usual, it is the poor who suffer the most, as increasing food prices, growing unemployment and more challenging access to clean water continue to escalate their struggle to survive.

California’s drought continues to have a massive and myriad impact across the state, as a staggering one-third of the state entered into the worst stage of drought. Even colonies of honeybees are collapsing due, in part, to there being far less natural forage needed to make their honey.

The snowpack in California is dramatically diminished as well. While snowpack has historically provided one-third of the state’s water supply, after three years of very low snowfall, battles have begun within the state over how to share the decreasing water from what used to be a massive, frozen reservoir of water.

The drought in Oklahoma is raising the specter of a return to the nightmarish dust bowl conditions there in the 1930s.

Recently, and for the first time, the state of Arizona has warned that water shortages could hit Tucson and Phoenix as soon as five years from now due to ongoing drought, increasing demand for water and declining water levels in Lake Mead.

This is a particularly bad outlook, given that the Lake Mead reservoir, the largest in the country, dropped to its lowest level since it was filled in the 1930s. Its decline is reflective of 14 years of ongoing drought, coupled with an increasing disparity between the natural flow rate of the Colorado River that feeds it and the ever-increasing demands for its water from the cities and farms of the increasingly arid Southwest.

Given the now chronic water crises in both Arizona and California, the next water war between the two states looms large. The one-two punch of ACD and overconsumption has combined to find the Colorado River, upon which both states heavily rely, in long-term decline.

Yet it is not just Arizona and California that are experiencing an ongoing water crisis due to ACD impacts – it is the entire southwestern United States. The naturally dry region is now experiencing dramatically extreme impacts that scientists are linking to ACD.

The water crisis spawned by ACD continues to reverberate globally.

North Korea even recently mobilized its army in order to protect crops as the country’s reservoirs, streams and rivers ran dry amidst a long-term drought. The army was tasked with making sure residents did not take more than their standard allotment of water.

The converging crises of the ongoing global population explosion, the accompanying burgeoning middle class, and increasingly dramatic impacts caused by ACD is straining global water supplies more than ever before, causing governments to examine how to manage populations in a world with less and less water.


A recent report provides a rather apocalyptic forecast for people living in Arizona: It predicts diminishing crop production, escalating electricity bills and thousands of people dying of extreme heat in that state alone.

In fact, another report from the Natural Resources Defense Council found experts predicting that excessive heat generated from ACD will likely kill more than 150,000 Americans by the end of the century, and that is only in the 40 largest cities in the country.

Poor air quality – and the diseases it triggers – are some of the main reasons why public health experts in Canada now believe that ACD is the most critical health issue facing Canadians.

Another recent study shows, unequivocally, that city-dwellers around the world should expect more polluted air that lingers in their metropolis for days on end, as a result of ACD continuing to change wind and rainfall patterns across the planet.

As heat and humidity increase with the growing impacts of ACD, we can now expect to see life-altering results across southern US cities, as has long been predicted. However, we can expect this in our larger northern cities as well, including Seattle, Chicago and New York; the intensifications are on course to make these areas unsuitable for outdoor activity during the summer.

Recently generated predictive mapping shows how many extremely hot days you might have to suffer through when you are older. These show clearly that if we continue along with business as usual – refusing to address ACD with the war-time-level response warranted to mitigate the damage – those being born now who will be here in 2100, will be experiencing heat extremes unlike anything we’ve had to date when they venture outside in the summer.

Lastly for our air section, June was the third month in a row with global average carbon dioxide levels above 400 parts per million. Levels of carbon dioxide in the atmosphere haven’t been this high in somewhere between 800,000 and 15 million years.


A new study published in Nature Geoscience revealed how increasing frequency and severity of forest fires across the planet are accelerating the melting of the Greenland ice sheet, as soot landing on the ice reduces its reflectivity. Melting at ever increasing speed, if the entire Greenland ice sheet melts, sea levels will rise 24 feet globally.

Down in Australia, the southern region of the country can now expect drier winters as a new study linked drying trends there, which have been occurring over the last few decades, to ACD.

On the other side of the globe, in Canada’s Northwest Territories, the region is battling its worst fires since the 1990s, bringing attention to the likelihood that ACD is amplifying the severity of northern wildfires.

A recently published global atlas of deaths and economic losses caused by wildfires, drought, flooding and other ACD-augmented weather extremes, revealed how such disasters are increasing worldwide, setting back development projects by years, if not decades, according to its publishers.

Denial and Reality

Never underestimate the power of denial.

Rep. Jeff Miller (R-Florida) was asked by an MSNBC journalist if he was concerned about the fact that most voters believe scientists on the issue of ACD. His response, a page out of the Republican deniers handbook, is particularly impressive:

Miller: It changes. It gets hot; it gets cold. It’s done it for as long as we have measured the climate.

MSNBC: But man-made, isn’t that the question?

Miller: Then why did the dinosaurs go extinct? Were there men that were causing – were there cars running around at that point, that were causing global warming? No. The climate has changed since earth was created.

Another impressive act of denial came from prominent Kentucky State Senate Majority Whip Republican Brandon Smith. At a recent hearing, Smith argued that carbon emissions from coal burning power plants couldn’t possibly be causing ACD because Mars is also experiencing a global temperature rise, and there are no coal plants generating carbon emissions on Mars. He even stated that Mars was the same temperature of Earth.

“I think that in academia, we all agree that the temperature on Mars is exactly as it is here. Nobody will dispute that,” Smith said.

On average, the temperature on Mars is about minus 80 degrees Fahrenheit.

“Yet there are no coal mines on Mars; there’s no factories on Mars that I’m aware of,” he added. “So I think what we’re looking at is something much greater than what we’re going to do.”

During a recent interview on CNBC, Princeton University professor and chairman of the Marshall Institute William Happer was called out on the fact that ExxonMobil had provided nearly $1 million for the Institute.

Happer compared the “hype” about ACD to the Holocaust, and when asked about his 2009 comparison of climate science to Nazi propaganda, he said, “The comment I made was, the demonization of carbon dioxide is just like the demonization of the poor Jews under Hitler. Carbon dioxide is actually a benefit to the world, and so were the Jews.”

Happer, who was introduced as an “industry expert” on the program, has not published one peer-reviewed paper on ACD.

The ACD-denier group that supports politicians and “scientists” of this type, Heartland (a free-market think tank with a $6 million annual budget) hosted a July conference in Las Vegas for deniers. One of Heartland’s former funders is ExxonMobil, and one of the panels at the conference was titled, “Global Warming As a Social Movement.” The leaders of the conference vowed to “keep doubt alive.”

Australian Prime Minister Tony Abbott used a current trip abroad to attempt to build support for a coalition aimed at derailing international efforts towards dealing with ACD.

He is simply following the lead of former Prime Minister John Howard, who teamed up with former US President George W. Bush and Canadian Prime Minister Stephen Harper to form a climate-denial triumvirate whose goal was to stop efforts aimed at dealing with ACD, in addition to working actively to undermine the Kyoto Protocol.

Meanwhile, Rupert Murdoch has said that ACD should be approached with great skepticism. He said that if global temperatures increased 3 degrees Celsius over the next 100 years, “At the very most one of those [degrees] would be manmade.” He did not provide the science he used to generate this calculation.

In Canada, Vancouver-based Pacific Future Energy Corporation claimed that a $10 billion oil sands refinery it wants to build on the coast of British Columbia would be the “world’s greenest.”

Miami, a low-lying city literally on the front lines of ACD impacts, is being inundated by rising sea levels as its predominantly Republican leadership – made up of ACD deniers – are choosing to ignore the facts and continue forward with major coastal construction projects.

Back to reality, the BBC recently ordered its journalists to cease giving any more TV airtime to ACD deniers.

Brenton County, Oregon has created a Climate Change Adaptation Plan that provides strategies for the communities there to deal with future impacts of ACD.

Despite the millions of dollars annually being pumped into ACD denial campaigns, a recent poll shows that by a 2-to-1 margin, Americans would be willing to pay more to combat ACD impacts, and most would also vote to support a candidate who aims to address the issue.

Another recent report on the economic costs that ACD is expected to generate in the United States over the next 25 years pegged an estimate well into the hundreds of billions of dollars by 2100. Property losses from hurricanes and coastal storms are expected to total around $35 billion, crop yields are expected to decline by 14 percent, and increased electricity costs to keep people cooler are expected to increase by $12 billion annually, to name a few examples.

The bipartisan report also noted that more than a million coastal homes and businesses could flood repeatedly before ultimately being destroyed.

The World Council on Churches, a group that represents more than half a billion Christians, announced that it would pull all its investments out of fossil fuels because the investments were no longer “ethical.”

US Interior Secretary Sally Jewell told reporters recently that she is witnessing ACD’s impacts in practically every national park she visits.

A June report by the UN University’s Institute for Environment and Human Security warned that ACD-driven mass migrations are already happening, and urged countries to immediately create adaption plans to resettle populations and avoid conflict.

For anyone who wonders how much impact humans have on the planet on a daily basis, take a few moments to ponder what just the impact of commercial airline emissions are in a 24-hour period by watching this astounding video.

Lastly, a landmark study released in June by an international group of scientists concluded that Earth is on the brink of a mass extinction event comparable in scale to that which caused the dinosaurs to go extinct 65 million years ago.

The study says extinction rates are now 1,000 times higher than normal, and pegged ACD as the driving cause.


Dahr Jamail, a Truthout staff reporter, is the author of The Will to Resist: Soldiers Who Refuse to Fight in Iraq and Afghanistan, (Haymarket Books, 2009), and Beyond the Green Zone: Dispatches From an Unembedded Journalist in Occupied Iraq, (Haymarket Books, 2007). Jamail reported from Iraq for more than a year, as well as from Lebanon, Syria, Jordan and Turkey over the last ten years, and has won the Martha Gellhorn Award for Investigative Journalism, among other awards.

Mega Drought: The New Normal For The American Southwest?

In Uncategorized on July 24, 2014 at 7:10 pm


Oldspeak: “As for now, personal bathing in showers in California continues without disruption for the foreseeable future because of advance planning for water shortages by state and federal agencies; however, in many respects the future is now as water resources are running short, quickly, very quickly, and as it happens, America’s dependency upon California for food is only as good as results from drilling into deep water aquifers on farmland, costing $500,000-to-$1,000,000 per job… As it goes, retail food costs are almost guaranteed to go up — a lot… Nevertheless, a much bigger issue is whether California produces food in 2015-20… In short, human influence is once again slowly inching the noose up around its own neck by carelessly burning fossil fuels like there is no tomorrow. At current rates of carbon dioxide emissions, setting new records year-by-year, there may not be much of a tomorrow left for upcoming decades… “Rising greenhouse gases will lead to a steady drying of the Southwest.” -Robert Hunziker

“It’s time for us to wake up. If this drought continues, we’re going to be in a terrible situation within the next 12-24 months… I think it says that this region is in trouble. I think it says that we need to really rethink our water use in this region, our demand in this region because it is far outstripping the supply.” -Jay Famiglietti, senior water scientist at NASA Jet Propulsion Laboratory

“i wonder if the relentless and ever-increasing extraction rates of Big Water, Big Ag and Big Oil has been factored into the advance planning for water shortages by government agencies? Business as usual extractive energy and resource extraction all but guarantee America’s foodbasket will go dry indefinitely.  Then what? Keep in mind that what’s happening in the American southwest, is happening in all other food producing regions on the planet…. Tick, tick, tick, tick….” -OSJ

By Robert Hunziker @ Dissident Voice:

According to the Assessment of Southwest Climate Change (Arizona Institute of the Environment), the five decades from 1950 to 2000 were the warmest in over 600 years. The report predicts that reduced snowfall and increased evaporation from global warming will lead to more droughts over the next 90 years.

Droughts are a natural part of the climate cycle. As a matter of fact, studies of tree rings going back 1,000 years show mega droughts lasting for decades. Then, nature alone was the culprit, but what happens now when global warming/climate change is superimposed onto nature’s handiwork?

Is an intensified mega drought in the works for the United States?

California is already burning up.

Markedly, to a great degree, America depends upon California for its food.

“Up to half of the nation’s fruit, nuts and vegetables are grown in the Central Valley, one of the planet’s most fertile growing regions, between Los Angeles and Sacramento.” 1

Furthermore, as an aside, how will someone in LA or San Francisco react when, hopping into an A.M. shower, the water barely dribbles out of the faucet? That would be a new twist for California’s famous “ride-sharing” on its slow-moving heated freeways traveling to and from work.

As for now, personal bathing in showers in California continues without disruption for the foreseeable future because of advance planning for water shortages by state and federal agencies; however, in many respects the future is now as water resources are running short, quickly, very quickly, and as it happens, America’s dependency upon California for food is only as good as results from drilling into deep water aquifers on farmland, costing $500,000-to-$1,000,000 per job.

As it goes, retail food costs are almost guaranteed to go up — a lot.

Nevertheless, a much bigger issue is whether California produces food in 2015-20.

Droughts – A Perspective

Recent studies reveal that persistent dry periods lasting for multiple years to several decades have occurred many times during the last 500-1,000 years over North America… These historic droughts are linked to tropical SST variations, with La Nina-like SST anomalies in the tropical Pacific often leading to widespread drought in North America….

Since the middle 20th century, global aridity and drought areas have increased substantially, mainly due to widespread drying since the 1970s… Although natural variations … have played a large role in the recent drying, the rapid warming since the late 1970s has increased atmospheric demand for moisture and likely altered atmospheric circulation patterns … contributing to the recent drying over land. Since a large part of the recent warming is attributed to human-induced GHG increases, it can be concluded that human activities have contributed significantly to the recent drying trend.

The large-scale pattern shown in figure 11 appears to be a robust response to increased GHGs. This is very alarming because if the drying is anything resembling figure 11 a very large population will be severely affected in the coming decades over the whole United States…. 2

In short, human influence is once again slowly inching the noose up around its own neck by carelessly burning fossil fuels like there is no tomorrow. At current rates of carbon dioxide emissions, setting new records year-by-year, there may not be much of a tomorrow left for upcoming decades.

“Rising greenhouse gases will lead to a steady drying of the Southwest.”3

Droughts- Southwestern U.S.

According to the State Water Resources Control Board, California is bone dry. Nearly 50 communities in the state of California are in danger of running out of water.

Additionally, the draining of aquifers on California farmland is happening so fast that the ground is sinking, up to a foot in some parts of the San Joaquin Valley, which is a very, very significant part of America’s breadbasket. Sinking ground, in turn, damages irrigation pipes that deliver the water. It’s a vicious circle.

A new social media phenomenon “Drought Shaming” has begun in California. This involves people who take videos of neighbors wasting water, and it is posted on Facebook or Twitter.

Meanwhile, in Las Vegas the situation is dire, according to climate scientist Tim Barnett, a geophysicist at Scripps Institution of Oceanography: The city must find new sources of water or go out of business. Vegas’s long-standing standby massive water reservoir of the past 80 years, Lake Mead, is depleting so fast that fishermen notice a difference in the water level every few weeks.

“Andy Ameigeiras and two of his friends spent Wednesday night and Thursday morning hooking carp, catfish and stripers from the rocky shore of Echo Bay. He said the water had easily dropped three to five feet since the last time they fished there, just four weeks ago.” 4

The Southern Nevada Water Authority is spending $817 million on a new intake that will reach deeper into Lake Mead at an elevation of 860 feet. The two current intakes reside at 1,050 feet and 1,000 feet whereas Lake Mead’s water level is currently 1,082 feet.

The ongoing drought in America’s Southwest highlights the importance of the Colorado River, providing water to over 40 million people in the West, including key agricultural production in California’s Coachella and Imperial Valleys, which are extremely important to the food supply for the entire U.S.

According to the U.S. Department of the Bureau of Reclamation, the Colorado River, aka: the “lifeblood of the Southwest,” has experienced drought conditions since the year 2000.

“It’s time for us to wake up. If this drought continues, we’re going to be in a terrible situation within the next 12-24 months,” says Jay Famiglietti, senior water scientist at NASA Jet Propulsion Laboratory.5 His research, which uses satellites to track changes in water supplies, has confirmed that the Colorado River Basin has lost vast amounts of groundwater during the past decade.

The fact that Lake Mead is now 39% full shows how dire the water situation has become, according to Famiglietti: “I think it says that this region is in trouble. I think it says that we need to really rethink our water use in this region, our demand in this region because it is far outstripping the supply,”

Further east, according to the Texas Commission on Environmental Quality, there are 12 water districts in Texas with only 45 days of water remaining.

Wichita Falls, Texas, a city of 105,000 is building a water treatment plant that will process local sewage into drinking water. As such, residents will be drinking what they passed into the toilet only days before, which is the epitome of recycling!

The Human Footprint Clomps Onward

As the 21st century progresses, human-influenced climate change is forever at the forefront of disaster scenarios, from melting glaciers’ rising sea levels to deformed ocean plankton threatening the base of the food chain as a result of too much CO2, now drought conditions, enhanced by human-caused global warming, threaten food production and adequate water resources.

A recent study provides quantitative evidence of California’s drought linked to the role of human-caused greenhouse gases. 6

As far back as 1990, James Hansen, one of the world’s foremost climatologist, in an article “Potential Evapotranspiration and the Likelihood of Future Drought“, (Journal of Geophysical Research, 95, 9983-10004), predicted that severe to extreme drought in the U.S., then occurring every couple of decades, would become an every-other-year phenomenon by mid-century: “If greenhouse gas emissions continue to increase rapidly, the model results suggest that severe drought (5% frequency today) will occur about 50% of the time by the 2050s.”

Hansen was wrong. He was too conservative, especially in consideration of the fact that annual CO2 emissions are 50% higher than when Hansen wrote his paper.

Bottom line: If fossil fuel (oil, gas, and coal) usage flagrantly continues to spew carbon dioxide (CO2) into the atmosphere, eventually an ice-free Arctic will kick up methane (CH4) like there’s no tomorrow, essentially injecting steroids into the global warming equation, and California will morph into a barren desert wilderness, similar to its ancient past.

Then, as large proportions of humanity are forced into a hunter/gatherer lifestyle, roaming eastward in search of sustenance, they’ll crash the gates.  It happened in France in the late 18th century when the world’s most powerful nation-state came tumbling down as starving people crashed the gates! There is no escaping the past.

Why should it be any different this time around?

As such, the real issue is: When will the United States government seriously promote a renewables energy plan?


The greenhouse effect is simple science; greenhouse gases trap heat, and humans are emitting ever more greenhouse gases.

— Nicholas Stern, British economist and academic, Professor of Economics and Government, Chair- Grantham Research Institute on Climate Change/Environment, London School of Economics.


  1. Stephen Neslage, “California Drought Threatens Food Supply of All Americans: Collapsing Aquifer Sinking Land”, Weather.com, May 29, 2014. []
  2. Aiguo Dai (Ph.D. Atmospheric Science, Columbia University), “Drought Under Global Warming- A Review”, Vol. 2, National Center for Atmospheric Research, Boulder, CO, Jan./Feb. 2011. []
  3. Richard Seager et al, “Atmosphere and Ocean Origins of North America Droughts”, Journal of Climate, 27, 4581-4606. []
  4. Henry Brean,”Lake Mead Sinks to a Record Low”, Las Vegas Review-Journal, July 10, 2014. []
  5. Ian James, “Mead Reservoir Drops to Record Low”, The Desert Sun, July 14, 2014 []
  6. S. Y. Wang, et al, “Probable Causes of the Abnormal Ridge Accompanying the 2013-2014 California Drought: ENSO Precursor and Anthropogenic Warming Footprint”, Geophysical Research Letters, Vol. 41, Issue 9, May 16, 2014. []

Robert Hunziker (MA, economic history, DePaul University) is a freelance writer and environmental journalist whose articles have been translated into foreign languages and appeared in over 50 journals, magazines, and sites worldwide, like Z magazine, European Project on Ocean Acidification, Ecosocialism Canada, Climate Himalaya, Counterpunch, Dissident Voice, Comite Valmy, and UK Progressive. He has been interviewed about climate change on Pacifica Radio, KPFK, FM90.7, Indymedia On Air and World View Show/UK. He can be contacted at: rlhunziker@gmail.com. Read other articles by Robert.




Peeling The Onion: Almost Everyone Involved In Developing Tor Was (Or Is) Funded By The US Government

In Uncategorized on July 21, 2014 at 11:35 pm


Oldspeak: “None are more hopelessly than those who falsely believe they are free-Goethe.

YEEEESH…  i can’t say i’m surprised.  i’m more gullible than i thought.  Turns out TOR was/is a great way for governments to identify and track people who value their anonymity .  And was developed originally for spooks. Needless to say, don’t use Tor if you want to communicate and browse the internet securely. Or maybe this story is bullshit too, who the shit knows at this point. Le Sigh… ” -OSJ

By Yasha Levine @ Pando:

“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent.” If those are the only people using the network.”

—Roger Dingledine, co-founder of the Tor Network, 2004


In early July, hacker Jacob Appelbaum and two other security experts published a blockbuster story in conjunction with the German press. They had obtained leaked top secret NSA documents and source code showing that the surveillance agency had targeted and potentially penetrated the Tor Network, a widely used privacy tool considered to be the holy grail of online anonymity.

Internet privacy activists and organizations reacted to the news with shock. For the past decade, they had been promoting Tor as a scrappy but extremely effective grassroots technology that can protect journalists, dissidents and whistleblowers from powerful government forces that want to track their every move online. It was supposed to be the best tool out there. Tor’s been an integral part of EFF’s “Surveillance Self-Defense” privacy toolkit. Edward Snowden is apparently a big fan, and so is Glenn Greenwald, who says it “allows people to surf without governments or secret services being able to monitor them.”

But the German exposé  showed Tor providing the opposite of anonymity: it singled out users for total NSA surveillance, potentially sucking up and recording everything they did online.

To many in the privacy community, the NSA’s attack on Tor was tantamount to high treason: a fascist violation of a fundamental and sacred human right to privacy and free speech.

The Electronic Frontier Foundation believes Tor to be “essential to freedom of expression.” Appelbaum — a Wikileaks volunteer and Tor developer — considers volunteering for Tor to be a valiant act on par with Hemingway or Orwell “going to Spain to fight the Franco fascists” on the side of anarchist revolutionaries.

It’s a nice story, pitting scrappy techno-anarchists against the all-powerful US Imperial machine. But the facts about Tor are not as clear cut or simple as these folks make them out to be…

Let’s start with the basics: Tor was developed, built and financed by the US military-surveillance complex. Tor’s original — and current — purpose is to cloak the online identity of government agents and informants while they are in the field: gathering intelligence, setting up sting operations, giving human intelligence assets a way to report back to their handlers — that kind of thing. This information is out there, but it’s not very well known, and it’s certainly not emphasized by those who promote it.

Peek under Tor’s hood, and you quickly realize that just everybody involved in developing Tor technology has been and/or still is funded by the Pentagon or related arm of the US empire. That includes Roger Dingledine, who brought the technology to life under a series of military and federal government contracts. Dingledine even spent a summer working at the NSA.

If you read the fine print on Tor’s website, you’ll see that Tor is still very much in active use by the US government:

“A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.”

NSA? DoD? U.S. Navy? Police surveillance? What the hell is going on? How is it possible that a privacy tool was created by the same military and intelligence agencies that it’s supposed to guard us against? Is it a ruse? A sham? A honeytrap? Maybe I’m just being too paranoid…

Unfortunately, this is not a tinfoil hat conspiracy theory. It is cold hard fact.

Brief history of Tor

The origins of Tor go back to 1995, when military scientists at the Naval Research Laboratory began developing cloaking technology that would prevent someone’s activity on the Internet from being traced back to them. They called it “onion routing” — a method redirecting traffic into a parallel peer-to-peer network and bouncing it around randomly before sending it off to its final destination. The idea was to move it around so as to confuse and disconnect its origin and destination, and make it impossible for someone to observe who you are or where you’re going on the Internet.

Onion routing was like a hustler playing the three-card monte with your traffic: the guy trying to spy on you could watch it going under one card, but he never knew where it would come out.

The technology was funded by the Office of Naval Research and DARPA. Early development was spearheaded by Paul Syverson, Michael Reed and David Goldschlag — all military mathematicians and computer systems researchers working for the Naval Research Laboratory, sitting inside the massive Joint Base Anacostia-Bolling military base in Southeast Washington, D.C.

The original goal of onion routing wasn’t to protect privacy — or at least not in the way most people think of “privacy.” The goal was to allow intelligence and military personnel to work online undercover without fear of being unmasked by someone monitoring their Internet activity.

“As military grade communication devices increasingly depend on the public communications infrastructure, it is important to use that infrastructure in ways that are resistant to traffic analysis. It may also be useful to communicate anonymously, for example when gathering intelligence from public databases,” explained a 1997 paper outlining an early version of onion routing that was published in the Naval Research Labs Review.

In the 90s, as public Internet use and infrastructure grew and multiplied, spooks needed to figure out a way to hide their identity in plain sight online. An undercover spook sitting in a hotel room in a hostile country somewhere couldn’t simply dial up CIA.gov on his browser and log in — anyone sniffing his connection would know who he was. Nor could a military intel agent infiltrate a potential terrorist group masquerading as an online animal rights forum if he had to create an account and log in from an army base IP address.

That’s where onion routing came in. As Michael Reed, one of the inventors of onion routing, explained: providing cover for military and intelligence operations online was their primary objective; everything else was secondary:

The original *QUESTION* posed that led to the invention of Onion Routing was, “Can we build a system that allows for bi-directional communications over the Internet where the source and destination cannot be determined by a mid-point?” The *PURPOSE* was for DoD / Intelligence usage (open source intelligence gathering, covering of forward deployed assets, whatever). Not helping dissidents in repressive countries. Not assisting criminals in covering their electronic tracks. Not helping bit-torrent users avoid MPAA/RIAA prosecution. Not giving a 10 year old a way to bypass an anti-porn filter. Of course, we knew those would be other unavoidable uses for the technology, but that was immaterial to the problem at hand we were trying to solve (and if those uses were going to give us more cover traffic to better hide what we wanted to use the network for, all the better…I once told a flag officer that much to his chagrin).

Apparently solving this problem wasn’t very easy. Onion router research progressed slowly, with several versions developed and discarded. But in 2002, seven years after it began, the project moved into a different and more active phase. Paul Syverson from the Naval Research Laboratory stayed on the project, but two new guys fresh outta MIT grad school came on board: Roger Dingledine and Nick Mathewson. They were not formally employed by Naval Labs, but were on contract from DARPA and the U.S. Naval Research Laboratory’s Center for High Assurance Computer Systems. For the next several years, the three of them worked on a newer version of onion routing that would later become known as Tor.

Very early on, researchers understood that just designing a system that only technically anonymizes traffic is not enough — not if the system is used exclusively by military and intelligence. In order to cloak spooks better, Tor needed to be used by a diverse group of people: Activists, students, corporate researchers, soccer moms, journalists, drug dealers, hackers, child pornographers, foreign agents, terrorists — the more diverse the group that spooks could hide in the crowd in plain sight.

Tor also needed to be moved off site and disassociated from Naval research. As Syverson told Bloomberg in January 2014: “If you have a system that’s only a Navy system, anything popping out of it is obviously from the Navy. You need to have a network that carries traffic for other people as well.”

Dingledine said the same thing a decade earlier at the 2004 Wizards of OS conference in Germany:

“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, ‘Oh, it’s another CIA agent.’ If those are the only people using the network.”

The consumer version of Tor would be marketed to everyone and — equally important — would eventually allow anyone to run a Tor node/relay, even from their desktop computer. The idea was to create a massive crowdsourced torrent-style network made up from thousands of volunteers all across the world.

At the very end of 2004, with Tor technology finally ready for deployment, the US Navy cut most of its Tor funding, released it under an open source license and, oddly, the project was handed over to the Electronic Frontier Foundation.

“We funded Roger Dingledine and Nick Mathewson to work on Tor for a single year from November 2004 through October 2005 for $180,000. We then served as a fiscal sponsor for the project until they got their 501(c)(3) status over the next year or two.  During that time, we took in less than $50,000 for the project,” EFF’s Dave Maass told me by email.

In a December 2004 press release announcing its support for Tor, EFF curiously failed to mention that this anonymity tool was developed primarily for military and intelligence use. Instead, it focused purely on Tor’s ability to protect free speech from oppressive regimes in the Internet age.

“The Tor project is a perfect fit for EFF, because one of our primary goals is to protect the privacy and anonymity of Internet users. Tor can help people exercise their First Amendment right to free, anonymous speech online,” said EFF’s Technology Manager Chris Palmer.

Later on, EFF’s online materials began mentioning that Tor had been developed by the Naval Research Lab, but played down the connection, explaining that it was “in the past.” Meanwhile the organization kept boosting and promoting Tor as a powerful privacy tool:

“Your traffic is safer when you use Tor.”

Playing down Tor’s ties to the military…

The people at EFF weren’t the only ones minimizing Tor’s ties to the military.

In 2005, Wired published what might have been the first major profile of Tor technology. The article was written by Kim Zetter, and headlined: “Tor Torches Online Tracking.” Although Zetter was a bit critical of Tor, she made it seem like the anonymity technology had been handed over by the military with no strings attached to “two Boston-based programmers” — Dingledine and Nick Mathewson, who had completely rebuilt the product and ran it independently.

Dingledine and Mathewson might have been based in Boston, but they — and Tor — were hardly independent.

At the time that the Wired article went to press in 2005, both had been on the Pentagon payroll for at least three years. And they would continue to be on the federal government’s payroll for at least another seven years.

In fact, in 2004, at the Wizards of OS conference in Germany, Dingledine proudly announced that he was building spy craft tech on the government payroll:

“I forgot to mention earlier something that will make you look at me in a new light. I contract for the United States Government to built anonymity technology for them and deploy it. They don’t think of it as anonymity technology, although we use that term. They think of it as security technology. They need these technologies so they can research people they are interested in, so they can have anonymous tip lines, so that they can buy things from people without other countries knowing what they are buying, how much they are buying and where it is going, that sort of thing.”

Government support kept rolling in well after that.

In 2006, Tor research was funded was through a no-bid federal contract awarded to Dingledine’s consulting company, Moria Labs. And starting in 2007, the Pentagon cash came directly through the Tor Project itself — thanks to the fact that Team Tor finally left EFF and registered its own independent 501(c)(3) non-profit.

How dependent was — and is — Tor on support from federal government agencies like the Pentagon?

In 2007, it appears that all of Tor’s funding came from the federal government via two grants. A quarter million came from the International Broadcasting Bureau (IBB), a CIA spinoff that now operates under the Broadcasting Board of Governors. IBB runs Voice of America and Radio Marti, a propaganda outfit aimed at subverting Cuba’s communist regime. The CIA supposedly cut IBB financing in the 1970s after its ties to Cold War propaganda arms like Radio Free Europe were exposed.

The second chunk of cash — just under $100,000 — came from Internews, an NGO aimed at funding and training dissident and activists abroad. Tor’s subsequent tax filings show that grants from Internews were in fact conduits for “pass through” grants from the US State Department.

In 2008, Tor got $527,000 again from IBB and Internews, which meant that 90% of its funding came U.S. government sources that year.

In 2009, the federal government provided just over $900,000, or about 90% of the funding. Part of that cash came through a $632,189 federal grant from the State Department, described in tax filings as a “Pass-Through from Internews Network International.” Another $270,000 came via the CIA-spinoff IBB. The Swedish government gave $38,000, while Google gave a minuscule $29,000.

Most of that government cash went out in the form of salaries to Tor administrators and developers. Tor co-founders Dingledine and Mathewson made $120,000. Jacob Appelbaum, the rock star hacker, Wikileaks volunteer and Tor developer, made $96,000.

In 2010, the State Department upped its grant to $913,000 and IBB gave $180,000 — which added up to nearly $1 million out of a total of $1.3 million total funds listed on tax filings that year. Again, a good chunk of that went out as salaries to Tor developers and managers.

In 2011, IBB gave $150,00, while another $730,000 came via Pentagon and State Department grants, which represented more than 70% of the grants that year. (Although based on tax filings, government contracts added up to nearly 100% of Tor’s funding.)

The DoD grant was passed through the Stanford Research Institute, a cutting edge Cold War military-intel outfit. The Pentagon-SRI grant to Tor was given this description: “Basic and Applied Research and Development in Areas Relating to the Navy Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance.”

That year, a new government funder came the scene: Swedish International Development Cooperation Agency (SIDA), Sweden’s version of USAID, gave Tor $279,000.

In 2012, Tor nearly doubled its budget, taking in $2.2 million from Pentagon and intel-connected grants: $876,099 came from the DoD, $353,000 from the State Department, $387,800 from IBB.

That same year, Tor lined up an unknown amount funding from the Broadcasting Board of Governors to finance fast exit nodes.

Tor at the NSA?

In 2013, the Washington Post revealed that the NSA had figured out various ways of unmasking and penetrating the anonymity of the Tor Network.

Since 2006, according to a 49-page research paper titled simply “Tor,” the agency has worked on several methods that, if successful, would allow the NSA to uncloak anonymous traffic on a “wide scale” — effectively by watching communications as they enter and exit the Tor system, rather than trying to follow them inside. One type of attack, for example, would identify users by minute differences in the clock times on their computers.

The evidence came out of Edward Snowden’s NSA leaks. It appeared that the surveillance agency had developed several techniques to get at Tor. One of the documents explained that the NSA “pretty much guaranteed to succeed.”

Snowden’s leaks revealed another interesting detail: In 2007, Dingledine gave at a talk at the NSA’s HQ explaining Tor, and how it worked.

The Washington Post published the NSA’s notes from their meeting with Dingledine. They showed that Dingledine and the NSA mostly talked about the technical details of Tor — how the network works and some of its security/usability tradeoffs. The NSA was curious about “Tor’s customers,” and Dingledine ran down some of the types of people who could benefit from Tor: Blogger Alice, 8 yr. old Alice, Sick Alice, Consumer Alice, Oppressed Alice, Business Alice, Law Enforcement Alice…

Interestingly, Dingledine told the NSA that “the way TOR is spun is dependent on who the ‘spinee’ is” — meaning that he markets Tor technology in different ways to different people?

Interestingly, the Washington Post article described Dingledine’s trip to the NSA as “a wary encounter, akin to mutual intelligence gathering, between a spy agency and a man who built tools to ward off electronic surveillance.” Dingledine told the paper that he came away from that meeting with the feeling that the NSA was trying to hack the Tor network:

“As he spoke to the NSA, Dingledine said in an interview Friday, he suspected the agency was attempting to break into Tor, which is used by millions of people around the world to shield their identities.”

Dingledine may very well have been antagonistic during his meeting with the NSA. Perhaps he was protective over his Tor baby, and didn’t want its original inventors and sponsors in the US government taking it back. But whatever the reason, the antagonism was not likely borne out of some sort of innate ideological hostility towards the US national security state.

Aside from being on the DoD payroll, Dingledine has spends a considerable amount of his time meeting and consulting with military, intelligence and law enforcement agencies to explain why Tor’s so great, and instructing them on how to use it. What kind of agencies does he meet with? The FBI, CIA and DOJ are just a few… And if you listen to Dingledine explain these encounters in some of his public appearances, one does not detect so much as a whiff of antagonism towards intelligence and law enforcement agencies.

In 2013, during a talk at UC San Diego, Dingledine cheerfully recalled how an exuberant FBI agent rushed up to thank him during his recent trip to the FBI:

“So I’ve been doing a lot of talks lately for law enforcement. And pretty much every talk I do these days, sone FBI person comes up to me afterwards and says, ‘I use Tor everyday for my job. Thank you.’ Another example is anonymous tips — I was talking to the folks who run the CIA anonymous tip line. It’s called the Iraqi Rewards Program…”

Dingledine’s close collaboration with law enforcement aside, there’s the strangely glib manner in which he dismissed news about the NSA hacking into Tor. He seemed totally unconcerned by the evidence revealed by Snowden’s leaks, and played down the NSA’s capabilities in his comments to the Washington Post:

“If those documents actually represent what they can do, they are not as big an adversary as I thought.”

I reached out to Dingledine to ask him about his trip to the NSA and whether he warned the Tor community back in 2007 that he suspected the NSA was targeting Tor users. He didn’t respond.

How safe is Tor, really?

If Dingledine didn’t appear to be fazed by evidence of the NSA’s attack on Tor anonymity, it’s strange considering that an attack by a powerful government entity has been known to be one Tor’s principle weaknesses for quite some time.

In a 2011 discussion on Tor’s official listserv, Tor developer Mike Perry admitted that Tor might not be very effective against powerful, organized “adversaries” (aka governments) that are capable monitoring huge swaths of the Internet.

“Extremely well funded adversaries that are able to observe large portions of the Internet can probably break aspects of Tor and may be able to deanonymize users. This is why the core tor program currently has a version number of 0.2.x and comes with a warning that it is not to be used for “strong anonymity”. (Though I personally don’t believe any adversary can reliably deanonymize *all* tor users . . . but attacks on anonymity are subtle and cumulative in nature).

Indeed, just last year, Syverson was part of a research team that pretty much proved that Tor can no longer be expected to protect users over the long term.

“Tor is known to be insecure against an adversary that can observe a user’s traffic entering and exiting the anonymity network. Quite simple and efficient techniques can correlate traffic at these separate locations by taking advantage of identifying traffic patterns. As a result, the user and his destination may be identified, completely subverting the protocol’s security goals.”

The researchers concluded: “These results are somewhat gloomy for the current security of the Tor network.”

While Syverson indicated that some of the security issues identified by this research have been addressed in recent Tor versions, the findings only added to a growing list of other research and anecdotal evidence showing Tor’s not as safe as its boosters want you to think — especially when pitted against determined intelligence agencies.

Case-in-point: In December 2013, a 20-year-old Harvard panicked overachiever named Edlo Kim learned just how little protection Tor offered for would be terrorists.

To avoid taking a final exam he wasn’t prepared for, Kim hit up on the idea of sending in a fake bomb threat. То cover his tracks, he used Tor, supposedly the best anonymity service the web had to offer. But it did little mask his identity from a determined Uncle Sam. A joint investigation, which involved the FBI, the Secret Service and local police, was able to track the fake bomb threat right back to Kim — in less than 24 hours.

As the FBI complaint explained, “Harvard University was able to determine that, in the several hours leading up to the receipt of the e-mail messages described above, ELDO KIM accessed TOR using Harvard’s wireless network.” All that Tor did was make the cops jump a few extra steps. But it wasn’t hard, nothing that a bit of manpower with full legal authority to access network records couldn’t solve. It helped that Harvard’s network logging all metadata access on the network — sorta like the NSA.

Over the past few years, U.S. law enforcement has taken control and shutdown a series of illegal child porn and drug marketplaces operating on what should have been untraceable, hyper-anonymous servers running in the Tor cloud.

In 2013, they took down Freedom Hosting, which was accused of being a massive child porn hosting operation — but not before taking control of its servers and intercepting all of its communication with customers. The FBI did the same thing that same year with the online drug superstore Silkroad, which also ran its services in the Tor cloud. Although, rookie mistakes helped FBI unmask the identity of Dred Pirate Roberts, it is still a mystery how they were able to totally take over and control, and even copy, a server run in the Tor cloud — something that is supposed to be impossible.

Back in 2007, a Swedish hacker/researcher named Dan Egerstad showed that just by running a Tor node, he could siphon and read all the unencrypted traffic that went through his chunk of the Tor network. He was able to access logins and passwords to accounts of NGOs, companies, and the embassies of India and Iran. Egerstad thought at first that embassy staff were just being careless with their info, but quickly realized that he had actually stumbled on a hack/surveillance operation in which Tor was being used to covertly access these accounts.

Although Egerstad was a big fan of Tor and still believes that Tor can provide anonymity if used correctly, the experience made him highly suspicious.

He told Sydney Morning Herald that he thinks many of the major Tor nodes are being run by intelligence agencies or other parties interested in listening in on Tor communication.

“I don’t like speculating about it, but I’m telling people that it is possible. And if you actually look in to where these Tor nodes are hosted and how big they are, some of these nodes cost thousands of dollars each month just to host because they’re using lots of bandwidth, they’re heavy-duty servers and so on. Who would pay for this and be anonymous? For example, five of six of them are in Washington D.C.…”

Tor stinks?

Tor supporters point to a cache of NSA documents leaked by Snowden to prove that the agency fears and hates Tor. A 2013 Guardian story based on these docs — written by James Ball, Bruce Schneier and Glenn Greenwald — argues that agency is all but powerless against the anonymity tool.

…the documents suggest that the fundamental security of the Torservice remains intact. One top-secret presentation, titled ‘Tor Stinks’, states: “We will never be able to de-anonymize all Tor users all the time.” It continues: “With manual analysis we can de-anonymize a very small fraction of Tor users,” and says the agency has had “no success de-anonymizing a user in response” to a specific request.

Another top-secret presentation calls Tor “the king of high-secure, low-latency internet anonymity”.

But the NSA docs are far from conclusive and offer conflicting bits of evidence, allowing for multiple interpretations. But the fact is that the NSA and GCHQ clearly have the capability to compromise Tor, but it might take a bit of targeted effort.

One thing is clear: the NSA most certainly does not hate or fear Tor. And some aspects about Tor are definitely welcomed by the NSA, in part because it helps concentrate potential “targets” in one convenient location.

Tor Stinks… But it Could be Worse

• Critical mass of targets use Tor. Scaring them away might be counterproductive.

• We can increase our success rate and provide more client IPs for individual Tor users.

• We will never get 100% but we don’t need to provide true IPs for every target every time they use Tor.

Tor network is not as difficult to capture as it may seem…

In 2012, Tor co-founder Roger Dingledine revealed that the Tor Network is configured to prioritize speed and route traffic through through the fastest servers/nodes available. As a result, the vast bulk of Tor traffic runs through several dozen of the fastest and most dependable servers: “on today’s network, clients choose one of the fastest 5 exit relays around 25-30% of the time, and 80% of their choices come from a pool of 40-50 relays.”

Dingledine was criticized by Tor community for the obvious reason that funneling traffic through a handful of fast nodes made surveilling and subverting Tor much easier. Anyone can run a Tor node — a research student in Germany, a guy with FIOS connection in Victorville (which is what I did for a few months), an NSA front out of Hawaii or a guy working for China’s Internet Police.

There’s no way of knowing if the people running the fastest most stable nodes are doing it out of goodwill or because it’s the best way to listen in and subvert the Tor network. Particularly troubling was that Snowden’s leaks clearly showed the NSA and GCHQ run Tor nodes, and are interested in running more.

And running 50 Tor nodes doesn’t seem like it would be too difficult for any of the world’s intelligence agencies — whether American, German, British, Russian, Chinese or Iranian. Hell, if you’re an intelligence agency, there’s no reason not to run a Tor node.

Back in 2005, Dingledine admitted to Wired that this was a “tricky design question” but couldn’t provide a good answer to how they’d handle it. In 2012, he dismissed his critics altogether, explaining that he was perfectly willing to sacrifice security for speed — whatever it took to take get more people to use Tor:

This choice goes back to the original discussion that Mike Perry and I were wrestling with a few years ago… if we want to end up with a fast safe network, do we get there by having a slow safe network and hoping it’ll get faster, or by having a fast less-safe network and hoping it’ll get safer? We opted for the “if we don’t stay relevant to the world, Tor will never grow enough” route.

Speaking of spooks running Tor nodes…

If you thought the Tor story couldn’t get any weirder, it can and does. Probably the strangest part of this whole saga is the fact that Edward Snowden ran multiple high-bandwidth Tor nodes while working as an NSA contractor in Hawaii.

This only became publicly known last May, when Tor developer Runa Sandvik (who also drew her salary from Pentagon/State Department sources at Tor) told Wired’s Kevin Poulsen that just two weeks before he would try to get in touch with Glenn Greenwald, Snowden emailed her, explaining that he ran a major Tor node and wanted to get some Tor stickers.

Stickers? Yes, stickers.

Here’s Wired:

In his e-mail, Snowden wrote that he personally ran one of the “major tor exits”–a 2 gbps server named “TheSignal”–and was trying to persuade some unnamed coworkers at his office to set up additional servers. He didn’t say where he worked. But he wanted to know if Sandvik could send him a stack of official Tor stickers. (In some post-leak photos of Snowden you can see the Tor sticker on the back of his laptop, next to the EFF sticker).

Snowden’s request for Tor stickers turned into something a bit more intimate. Turned out that Sandvik was already planning to go to Hawaii for vacation, so she suggested they meet up to talk about communication security and encryption.

She wrote Snowden back and offered to give a presentation about Tor to a local audience. Snowden was enthusiastic and offered to set up a crypto party for the occasion.

So the two of them threw a “crypto party” at a local coffee shop in Honolulu, teaching twenty or so locals how to use Tor and encrypt their hard drives. “He introduced himself as Ed. We talked for a bit before everything started. And I remember asking where he worked or what he did, and he didn’t really want to tell,” Sandvik told Wired.

But she did learn that Snowden was running more than one Tor exit node, and that he was trying to get some of his buddies at “work”to set up additional Tor nodes…

H’mmm….So Snowden running powerful Tor nodes and trying to get his NSA colleagues to run them, too?

I reached out to Sandvik for comment. She didn’t reply. But Wired’s Poulsen suggested that running Tor nodes and throwing a crypto party was a pet privacy project for Snowden. “Even as he was thinking globally, he was acting locally.”

But it’s hard to imagine a guy with top secret security clearance in the midst of planning to steal a huge cache of secrets would risk running a Tor node to help out the privacy cause. But then, who hell knows what any of this means.

I guess it’s fitting that Tor’s logo is an onion — because the more layers you peel and the deeper you get, the less things make sense and the more you realize that there is no end or bottom to it. It’s hard to get any straight answers — or even know what questions you should be asking.

In that way, the Tor Project more resembles a spook project than a tool designed by a culture that values accountability or transparency.


Get every new post delivered to your Inbox.

Join 404 other followers