| Recurring |
one_organization, multiple_organization |
(a) The software failure incident related to the attack on the Tor network by the NSA with the codename EgotisticalGiraffe involved exploiting vulnerabilities in the Firefox web browser used with Tor. This incident targeted Tor users by attacking their browsers through vulnerable software on their computers [22160].
(b) The article mentions that a similar but less complex exploit against the Tor network was revealed by security researchers, leading to speculation that it had been built by the FBI or another US agency. The FBI later admitted to operating malware to target an alleged host of images of child abuse on the Tor network, although the attack also hit numerous unconnected services. This indicates that similar incidents involving exploiting vulnerabilities in software have occurred with other organizations or agencies [22160]. |
| Phase (Design/Operation) |
design, operation |
(a) The software failure incident related to the design phase:
- The NSA developed attacks against people using Tor by targeting vulnerable software on their computers, specifically exploiting the Firefox web browser used with Tor [22160].
- The NSA's technique to attack Tor users through vulnerable software on their computers had the codename EgotisticalGiraffe, which involved exploiting the Tor browser bundle and vulnerabilities in an older version of Firefox [22160].
(b) The software failure incident related to the operation phase:
- The NSA's efforts to attack Tor users through vulnerable software on their computers involved identifying website visitors using the protective software and executing attacks against them, indicating a failure in the operation or misuse of the system [22160].
- The FBI or another US agency operated malware to target an alleged host of images of child abuse on the Tor network, but the attack hit numerous unconnected services on the network, suggesting a failure in the operation phase [22160]. |
| Boundary (Internal/External) |
within_system, outside_system |
(a) within_system:
- The software failure incident related to the Tor service being targeted by the NSA through the EgotisticalGiraffe technique involved exploiting vulnerabilities in the Firefox web browser used with Tor, giving the agency full control over targets' computers [22160].
- The NSA's attack on Tor users through vulnerable software on their computers, codenamed EgotisticalGiraffe, involved exploiting the Tor browser bundle and vulnerabilities in an older version of Firefox [22160].
(b) outside_system:
- The failure was also influenced by contributing factors originating from outside the system, such as the NSA's repeated attempts to develop attacks against people using Tor, despite the software being primarily funded and promoted by the US government itself [22160].
- The NSA's efforts to attack the Tor service, including attempts to de-anonymize users and implant malicious code on their computers, were external factors contributing to the software failure incident [22160]. |
| Nature (Human/Non-human) |
non-human_actions, human_actions |
(a) The software failure incident occurring due to non-human actions:
- The software failure incident involving the Tor service was primarily due to attacks and exploitation by the NSA through techniques like EgotisticalGiraffe, which targeted vulnerable software on users' computers [22160].
- The NSA's efforts to attack Tor users were focused on exploiting vulnerabilities in the Firefox web browser used with Tor, rather than directly compromising the core security of the Tor software or network [22160].
- The NSA's technique of attacking Tor users through vulnerable software on their computers, such as the EgotisticalGiraffe exploit, did not involve direct attacks on the Tor system itself [22160].
(b) The software failure incident occurring due to human actions:
- The failure of the Tor service was exacerbated by the NSA's deliberate efforts to develop attacks against Tor users, including exploiting vulnerabilities in the Firefox web browser used with Tor [22160].
- The NSA's actions in targeting Tor users through techniques like EgotisticalGiraffe and attempting to influence the future development of Tor in conjunction with GCHQ contributed to the software failure incident [22160].
- The NSA's involvement in developing and implementing attacks against Tor users through vulnerable software on their computers can be attributed to human actions within the intelligence agency [22160]. |
| Dimension (Hardware/Software) |
software |
(a) The articles do not provide information about a software failure incident occurring due to contributing factors originating in hardware.
(b) The software failure incident in the articles is related to vulnerabilities in software, specifically the Tor browser bundle and the Firefox web browser used with Tor. The NSA developed a technique called EgotisticalGiraffe to exploit these vulnerabilities in the software to gain control over targets' computers [22160]. |
| Objective (Malicious/Non-malicious) |
malicious, non-malicious |
(a) The software failure incident related to the Tor network, specifically the attack technique developed by the NSA known as EgotisticalGiraffe, falls under the category of a malicious software failure incident. This attack involved exploiting vulnerabilities in the Firefox web browser used with Tor to gain full control over targets' computers, including access to files, keystrokes, and online activity [22160].
(b) On the non-malicious side, the article mentions that the Tor network itself has not been compromised by the NSA, and the core security of the Tor software remains intact. The NSA's efforts to target or undermine Tor include proof-of-concept attacks and attempts to influence the future development of Tor, but there is no indication that the proposed de-anonymization technique was ever implemented [22160]. |
| Intent (Poor/Accidental Decisions) |
poor_decisions, accidental_decisions |
(a) The intent of the software failure incident:
- The software failure incident related to the NSA's attempts to develop attacks against Tor users through vulnerable software on their computers, specifically targeting the Firefox web browser used with Tor [22160].
- The NSA's technique, codenamed EgotisticalGiraffe, involved exploiting vulnerabilities in an older version of Firefox to gain full control over targets' computers, including access to files, keystrokes, and online activity [22160].
- The NSA's efforts to attack Tor users through vulnerable software on their computers were part of a broader strategy to counteract targets' use of technologies to hide their communications, as stated by the agency [22160].
(b) The intent of the software failure incident:
- The software failure incident could be seen as an accidental decision or unintended consequence resulting from the NSA's efforts to exploit vulnerabilities in the Tor network and the Firefox browser used with Tor [22160].
- The NSA's actions to attack Tor users through vulnerable software on their computers could have unintended consequences, potentially impacting law-abiding users such as activists and journalists who rely on Tor for secure browsing [22160]. |
| Capability (Incompetence/Accidental) |
development_incompetence, accidental |
(a) The software failure incident related to development incompetence is evident in the NSA's repeated attempts to develop attacks against users of the Tor software despite the fact that Tor is primarily funded and promoted by the US government itself [22160]. This shows a lack of professional competence in the decision-making process within the NSA, as they targeted vulnerable software on users' computers instead of directly compromising the core security of the Tor software or network.
(b) The software failure incident related to accidental factors is seen in the unintentional fixing of vulnerabilities in an older version of Firefox used in the Tor browser bundle. The vulnerabilities were inadvertently fixed by Mozilla Corporation in Firefox 17, released in November 2012, which the NSA had not circumvented by January 2013 when the documents were written [22160]. This accidental fix rendered certain exploits unusable against Tor users who had not updated their software, highlighting a failure due to accidental circumstances. |
| Duration |
temporary |
The software failure incident related to the Tor service can be considered as a temporary failure. The NSA developed attacks against Tor users through vulnerable software on their computers, specifically targeting the Firefox web browser used with Tor. This attack, codenamed EgotisticalGiraffe, exploited vulnerabilities in an older version of Firefox to gain control over targets' computers [22160].
However, it is important to note that the fundamental security of the Tor service itself remained intact despite these attacks. The NSA's attempts to de-anonymize Tor users were described as having "no success" in response to specific requests, indicating that the core security of the Tor software or network was not compromised [22160]. |
| Behaviour |
omission, value, other |
(a) crash: The articles do not mention any instance of the software crashing.
(b) omission: The software failure incident related to omission is seen in the NSA's attempts to attack Tor users through vulnerable software on their computers. The NSA's technique, codenamed EgotisticalGiraffe, involved exploiting vulnerabilities in the Firefox web browser used with Tor to gain control over targets' computers. This attack was targeted at specific Tor users who were identified by the NSA, and the attack was executed against their browsers [22160].
(c) timing: The articles do not mention any instance of the software performing its intended functions too late or too early.
(d) value: The software failure incident related to value is evident in the NSA's efforts to attack Tor users through vulnerable software on their computers. By exploiting vulnerabilities in the Firefox web browser used with Tor, the NSA gained full control over targets' computers, including access to files, keystrokes, and online activity. This incorrect performance of the software's intended functions led to a breach of privacy and security for the targeted users [22160].
(e) byzantine: The articles do not mention any instance of the software behaving erroneously with inconsistent responses and interactions.
(f) other: The software failure incident also involves the NSA's efforts to undermine the security and privacy provided by the Tor network. Despite not compromising the core security of the Tor software or network, the NSA's proof-of-concept attacks and attempts to de-anonymize Tor users demonstrate a significant threat to the intended functions of the software in maintaining anonymity and privacy for its users [22160]. |