Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Carnegie Mellon: We Didn't Get $1M to Hack Tor

The university said it cooperates with subpoena requests but "receives no funding for its compliance."

By Stephanie Mlot
November 19, 2015
Tor

Carnegie Mellon University this week denied reports it was paid by the FBI to help identify criminal suspects on the Dark Web.

"There have been a number of inaccurate media reports in recent days regarding [our] Software Engineering Institute work in cybersecurity," the university said in a statement.

"In the course of its work, the university from time to time is served with subpoenas requesting information about research it has performed," it continued. "The university abides by the rule of law, complies with lawfully issued subpoenas, and receives no funding for its compliance."

At issue is a blog post from The Tor Project, which accused Carnegie Mellon researchers of accepting "at least $1 million" to attack Tor and uncover details about those trafficking in illegal goods on Silk Road 2.0.

"Such action is a violation of our trust and basic guidelines for ethical research," the Tor Project wrote. "We strongly support independent research on our software and network, but this attack crosses the crucial line between research and endangering innocent users."

Largely funded by the U.S. Defense Department, Carnegie Mellon's Software Engineering Institute (SEI) is tasked with researching and identifying vulnerabilities in software and computer networks. Along the way, the firm is sometimes served with federal subpoenas requesting information about its research.

In its statement, Carnegie Mellon did not address Silk Road 2.0 directly. That case made headlines again last week when Vice's Motherboard suggested that Carnegie Mellon hacked Tor and provided data to the feds that led to a 2014 FBI raid on Tor users and several arrests.

Carnegie Mellon is not specifically named in court documents, but the defense team for one of the men arrested for his involvement with Silk Road 2.0, Brian Richard Farrell, said the feds found Farrell thanks to the assistance of a "university-based research institute," Motherboard reports.

There are, of course, numerous university-based research institutes in the U.S., but Motherboard says Carnegie Mellon is at the top of that list in part because of a presentation it was scheduled to give at Black Hat 2014 about weaknesses within the Tor network.

Recommended by Our Editors

That presentation was cancelled on the eve of the conference with little explanation. The description of the talk, however, "bore a startling resemblance" to the attack on Tor that eventually helped the FBI unmask its suspects, Motherboard says.

"This attack … sets a troubling precedent," Tor said in its blog post. "Civil liberties are under attack if law enforcement believes it can circumvent the rules of evidence by outsourcing police work to universities.

"If academia uses 'research' as a stalking horse for privacy invasion, the entire enterprise of security research will fall into disrepute," the post continued. "If this kind of FBI attack by university proxy is accepted, no one will have meaningful 4th Amendment protections online and everyone is at risk."

The FBI did not immediately respond to PCMag's request for comment.

Get Our Best Stories!

Sign up for What's New Now to get our top stories delivered to your inbox every morning.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Stephanie Mlot

Contributor

Stephanie Mlot

B.A. in Journalism & Public Relations with minor in Communications Media from Indiana University of Pennsylvania (IUP)

Reporter at The Frederick News-Post (2008-2012)

Reporter for PCMag and Geek.com (RIP) (2012-present)

Read Stephanie's full bio

Read the latest from Stephanie Mlot