1. Control or monitor *all* Tor nodes.
2. Directly attack the computer of the user trying to be anonymous. 3. Taking advantage of user stupidity.I seriously doubt the NSA or any organization is succeeding at #1, and protecting yourself from #2 and #3 is not that hard.