NSA Bitcoin Tracking
NSA Bitcoin Tracking
NSA Bitcoin Tracking
The documents indicate that “tracking down” bitcoin users went well
beyond closely examining bitcoin’s public transaction ledger, known
as the Blockchain, where users are typically referred to through
anonymous identifiers; the tracking may also have involved gathering
intimate details of these users’ computers. The NSA collected some
bitcoin users’ password information, internet activity, and a type of
unique device identification number known as a MAC address, a
March 29, 2013 NSA memo suggested. In the same document,
analysts also discussed tracking internet users’ internet addresses,
network ports, and timestamps to identify “BITCOIN Targets.”
The agency appears to have wanted even more data: The March 29
memo raised the question of whether the data source validated its
users, and suggested that the agency retained bitcoin information in a
file named “Provider user full.csv.” It also suggested powerful search
capabilities against bitcoin targets, hinting that the NSA may have
been using its XKeyScore searching system, where the
bitcoin information and wide range of other NSA data was cataloged,
to enhance its information on bitcoin users. An NSA
reference document indicated that the data source provided “user
data such as billing information and Internet Protocol addresses.”
With this sort of information in hand, putting a name to a given
bitcoin user would be easy.
Pages From OAKSTAR Weekly 2013 03 295 pages
The NSA’s budding bitcoin spy operation looks to have been enabled
by its unparalleled ability to siphon traffic from the physical cable
connections that form the internet and ferry its traffic around the
planet. As of 2013, the NSA’s bitcoin tracking was achieved through
program code-named OAKSTAR, a collection of covert corporate
partnerships enabling the agency to monitor communications,
including by harvesting internet data as it traveled along fiber optic
cables that undergird the internet.
Specifically, the NSA targeted bitcoin through MONKEYROCKET,
a sub-program of OAKSTAR, which tapped network equipment to
gather data from the Middle East, Europe, South America, and Asia,
according to classified descriptions. As of spring 2013,
MONKEYROCKET was “the sole source of SIGDEV for the BITCOIN
Targets,” the March 29, 2013 NSA reportstated, using the term for
signals intelligence development, “SIGDEV,” to indicate the agency
had no other way to surveil bitcoin users. The data obtained through
MONKEYROCKET is described in the documents as “full take”
surveillance, meaning the entirety of data passing through a network
was examined and at least some entire data sessions were stored for
later analysis.
At the same time, MONKEYROCKET is also described in the
documents as a “non-Western Internet anonymization service” with a
“significant user base” in Iran and China, with the program brought
online in summer 2012. It is unclear what exactly this product was,
but it would appear that it was promoted on the internet under false
pretenses: The NSA notes that part of its “long-term strategy” for
MONKEYROCKET was to “attract targets engaged in terrorism,
[including] Al Qaida” toward using this “browsing product,” which
“the NSA can then exploit.” The scope of the targeting would
then expand beyond terrorists. Whatever this piece of software was, it
functioned a privacy bait and switch, tricking bitcoin users into using
a tool they thought would provide anonymity online but was actually
funneling data directly to the NSA.
The hypothesis that the NSA would “launch an entire operation
overseas under false pretenses” just to track targets is “pernicious,”
said Matthew Green, assistant professor at the Johns Hopkins
University Information Security Institute. Such a practice could
spread distrust of privacy software in general, particularly in areas
like Iran where such tools are desperately needed by dissidents. This
“feeds a narrative that the U.S. is untrustworthy,” said Green. “That
worries me.”
The NSA declined to comment for this article. The Bitcoin
Foundation, a nonprofit advocacy organization, could not
immediately comment.