[I-lluminate] Exploring the Dark Web: TOR for Activism
The Tor browser – often mistaken as being the “dark net” itself and seen as being synonymous with illegal or nefarious activities – has become a useful platform for activists who require privacy and anonymity, and one has been attracting increasing attention from activists and citizens alike in recent years. Tor is being seen as a potential tool for ensuring privacy in a world where the online activity of both activists and even everyday citizens are being closely monitored by corporate and state interests.

Credit: Fedotov.co
SURVEILLANCE TECHNOLOGIES AGAINST ACTIVISTS
Many activists now rely on social media platforms, such as Facebook, Twitter, Instagram, YouTube, to organize and mobilize for their cause. These platforms are widely relied upon by activists because of the low barrier to access, the potential to reach the millions of users locally and globally, and because they can be used to document protests and initiatives. As it turns out, these platforms are also heavily used by governments to monitor activists.
. This phenomenon of increasing state surveillance coincides with a period of significant political and civic mobilization and action – including the Idle No More, Occupy Wall Street, and Black Lives Matter movements – and with the development and widespread global adoption of digital technologies, including personal computers, smart phones and social media platforms.
Journalists have reported that the Department of Homeland Security consistently collected information of those attending protests from their social media platforms2, such as Facebook events set up to promote the protests, Twitter hashtags, Instagram and Vine feeds. Furthermore, journalists or everyday citizens taking photos of protests who post them on social media are providing further data for police to identify and surveil activists. The goal for these surveillance tactics over social media platforms were reportedly to . However, as VICE points out, even without tagging an individual, .
Social media platforms are not neutral, open spaces and it’s clear that corporate interests do not align with activists needs. Social media design and policies are also often in tension with activist social media goals and needs (; ; ). While social media technologies , the primary objective of social media companies, many of which are publicly traded companies and have fiduciary obligations to shareholders, is generating profit through advertising. Business models of these companies are built upon the mining of personal data about users, and keeping those users online as long as possible ().
TOR AS AN ALTERNATIVE AND SECURE BROWSER
The Tor browser provides an online alternative, allowing activists who have some technological know-how to use the browser as a means of organizing and mobilizing while remaining anonymous. Tor addresses concerns about privacy by letting activists encrypt their messages to one another, thereby making it difficult to find out who is sending messages to whom. Tor masks your IP address (which identifies your location and then your potential identity) to prevent it from be used by governments to censor parts of the web. In this case Tor acts similar to a VPN but is volunteer-run, not subject to subpoenas, and does not keep logs of user traffic. For a VICE special on how to not get hacked, J. These are: .
Although the Tor platform is often associated with the “dark web” based on the “darker” acts that occur using such encrypted communication technologies, as discussed in other parts of this issue, the anonymity of Tor has human rights and social justice implications. The “dark web” is often associated with the dangers that stem from its applicability for “dark” purposes such as criminal activity, buying and selling deadly weapons, illegal drugs, child pornography, ISIS communication, and White Supremacist communication. But the privacy and encryption offered by Tor are not just useful for criminal masterminds. These darker aspects are just a small percentage of what takes place on Tor. :
Tor is neither “good” or “bad” just like the rest of the internet, however, what’s important here is in how it is being used, who has access to this knowledge and who is often left out of the positive potentials of being anonymous online. As Jardine (2015) shows, the technology of the Tor platform can be used for both “darker” activities but also for democratic purposes. Data collected from ), in 2015, for instance, with over 2.5 millions users on Tor, only 40% of Tor’s browser was used for nefarious purposes while 60% wasn’t.
The anonymity of Tor provides users the benefits of organizing and communicating online with some safety from surveillance. . Examples of groups using these won’t be that many because the whole point is for them to remain to be private. However, .
Tor, is, of course, not completely free from the risk of data and privacy breaches. There have been reports of security hacks and infiltration from the state and police that are concerning. Tor is left vulnerable through “weak links” in the computer network that is potentially logging more traffic that the node should be (Tor is hosted by volunteer computer nodes). This was how investigators were able to infiltrate ISIS communications (Roe, 2014). Police have also reportedly entered known child pornography forums, gathering information as a pretend pedophile. The FBI has also reportedly developed and used an application called .
But for now, . The issues with many of these aforementioned applications in comparison to Tor is that they retain some metadata and, just like Facebook and Twitter, comply with data requests and court orders from government and local police authorities.
THE TOR PROJECT
Because the Tor browser is funded through the US government and military but run completely by volunteers, it’s hard to say how long the browser will survive given the trend of increasing state surveillance. And as more activists turn to Tor, technical limitations could pose challenges, including the need to handle the uptake of users while ensuring enough volunteer computers are in place to keep traffic secure.
The , a non-profit organization that maintains the Tor software, is one example of a current initiative to expand Tor to everyone, beyond the criminal masterminds and spies that we often think of lurking in the dark depths of the Internet. The wants everyone to be using it, so this shows us its capabilities as more than just a space where evil lurks. Using Tor effectively still requires technical know-how and access to the Internet, and in countries with repressive governments, such access to Tor may be hard to penetrate.
Donating to the Tor project, which , or becoming an active relay for computer nodes, are just a few ways to help ensure that the present and future of internet privacy is maintained for some of us until more of us demand action from our current browser and social media owners and more transparency from our governments in their interactions with them.
LESSONS FOR EVERYONE ELSE
Corporate online surveillance is not just an issue that active protestors now need to worry about, but something that so many more of us are affected by in various ways. Recently, . While the outing of such research studies has been a catalyst for improvement, with social media companies taking a more meaningful approach to educating users about privacy (Facebook and recent privacy notifications and suggestions to improve your privacy settings), users’ data is still at risk given the legal authority of government authorities to access data through court order or through surveillance of digital technologies by agencies responsible for protecting national security.
Privacy is important for everyone who engages with online and networked forms of communication. Platforms like Tor help us to maintain our privacy to some extents. For activists engaged in social justice, this could provide a more secure way to organize and mobilize.
Works Cited:
Altman, A. (2015). “Person of the year, the short list: Black Lives Matter.” In Time Magazine. Retrieved from
Chang, A. (May 2, 2018). “The Facebook and Cambridge Analytica scandal, explained with a simple diagram.” In Vox. Retrieved from
Dencik, L. & Leistert, O. (2015). . Maryland: Rowman & Littlefield International.
Hern. A. (Aug 23, 2017). “The dilemma of the dark web: Protecting neo-Nazis and dissidents alike.” In The Guardian. Retrieved from
Igo, S. (Apr 10, 2018). “How you helped create the crisis in private data.” In The Conversation. Retrieved from
Jardine, E. (2015). “The Dark Web dilemma: Tor, anonymity and online policing.” Global Commission on Internet Governance Paper Series, No. 21. Retrieved from SSRN: o
Jardine, E. (2018). “Tor, what is it good for? Political repression and the use of online anonymity-granting technologies.” New Media & Society, 20(2), 435-452. Retrieved from
Jeong, S. (Nov 27, 2017). “The Motherboard guide to avoiding state surveillance.” In Motherboard by VICE. Retrieved from
Leistert, O. (2015). “The revolution will not be liked: On the systemic constraints of corporate social media platforms for protests.” In L. Dencik and O. Leistert (Eds.) perspectives on social media and protest: Between control and emancipation. Maryland: Rowman and Littlefield.
Patterson, B. E. (Oct 19, 2017). “Police spied on New York Black Lives Matter group, internal police documents show”. In Mother Jones. Retrieved from
Poulsen, K. (Dec 16, 2014). “The FBI used the web’s favorite hacking tool to unmask TOR users.” In Wired. Retrieved from
Roe, K. (Nov 5, 2014). “Meet TOR: The misunderstood gateway into the Dark Web.” In The Bottom Line. Retrieved from
Rogers, K. (Feb 7, 2016). “That time the Super Bowl secretly used facial recognition software on fans”. In Motherboard by VICE. Retrieved from
Russell, J. (2016). “TOR turns to crowdfunding to lessen its dependence on government money.” In Techcrunch. Retrieved from
Taylor, A. (Sept 8, 2011). “9/11 The day of the attacks”. In The Atlantic. Retrieved from
Tor Project. (n.d.). “Tor project.” Retrieved from
van Dijck, J. (2013). Oxford: Oxford University Press.
Youmans, W. L., & York, J. C. (2012). “Social media and the activist toolkit: User agreements, corporate interests, and the information infrastructure of modern social movements.” Journal of Communication, 62, 315–329. Retrieved from
