advertisement
September 16, 2007 12:05 AM PDT

Tor anonymity server admin arrested

by Chris Soghoian

In a recent blog posting, a German operator of a Tor anonymous proxy server revealed that he was arrested by German police officers at the end of July. Although he was released shortly afterwards, information about the arrest had been kept quiet until his lawyers were able to get the charges dropped.

Tor Project Logo

(Credit: Tor Project)

Tor is a privacy tool designed to allow users to communicate and browse anonymously on the Internet. It's endorsed by the Electronic Frontier Foundation and other civil liberties groups as a method for whistle blowers and human rights workers to communicate with journalists. Tor provides anonymous Web-browsing software to hundreds of thousands of users around the world, according to its developers. The largest numbers of users are in the United States, the European Union and China.

The police were investigating a bomb threat posted to an online forum for German police officers. The police traced one of the objectionable posts on the forum to the IP address for Janssen's server. Up until his arrest, Alex Janssen's Tor server carried more than 40GB of random strangers' Internet traffic each day.

Showing up at his house at midnight on a Sunday night, police cuffed and arrested him in front of his wife and seized his equipment. In a display of both bitter irony and incompetence, the police did not take or shutdown the Tor server responsible for the traffic they were interested in, which was located in a different city, more than 500km away.

Janssen's attempts to explain what Tor is to the police officers initially fell on deaf ears. After being interrogated for hours, someone from the city of D?sseldorf's equivalent of the Department of Homeland Security showed up and admitted to Janssen that they'd made a mistake. He was released shortly after.




Germany is clearly not going out of its way to make computer security researchers and activists feel too welcome. Germany recently passed a law that "renders the creation and distribution of software illegal that could be used by someone to break into a computer system or could be used to prepare a break in. This includes port scanners like nmap, security scanners like nessus [as well as] proof of concept exploits."

Back in summer 2006, German authorities conducted a simultaneous raid of seven different data centers, seizing 10 Tor servers in the process. Agents took the servers believing them to be related to a child porn investigation. Furthermore, in 2003 a German court ordered the developers of the Jap anonymity system, a completely different project than Tor, to create a back-door in their system to be used in national security investigations.

This event does raise some interesting legal questions. If 40GB of other people's Internet traffic flows through your own home network, can authorities, be they the RIAA or FBI, reasonably link anything that has been tracked to your computer's IP address to you?

Does setting up a Tor server give you the ultimate plausible deniability card? "No officer, that BitTorrent download wasn't mine. It was from one of the thousands of people who route their Internet traffic through the anonymizing sever on my home network."

The ability to have a believable claim to plausible deniability is something that some of us have been attempting to get for a while by having an open wireless access point at home. And 40GB of Internet traffic from perfect strangers may be more significant in the eyes of a court than the possibility of one or two of your neighbors connecting to your wireless network. All of this, for now, remains theoretical. No Tor-related case has made it to the courts.. but it's just a matter of time until one does.

E-mail Chris Soghoian

If you have a question or comment for Chris Soghoian, you can submit it here. However, because our editors and writers receive hundreds of requests, we cannot tell you when you may receive a response.

Submit your question or comment here: 0 of 1500 characters

Christopher Soghoian delves into the areas of security, privacy, technology policy and cyber-law. He is a student fellow at Harvard University's Berkman Center for Internet and Society , and is a PhD candidate at Indiana University's School of Informatics. His academic work and contact information can be found by visiting www.dubfire.net/chris/. He is a member of the CNET Blog Network, and is not an employee of CNET. Disclosure.

Recent posts from Surveillance State
YouTube's new 'nocookie' feature continues to serve cookies
Is the White House changing its YouTube tune?
Recovery.gov blocked search engine tracking
Obama's BlackBerry brings personal safety risks
White House expands use of search-blocking code
Activists call for a mashup-friendly Recovery.gov
White House yanks 'YouTube' from privacy policy
White House acts to limit YouTube cookie tracking
Add a Comment (Log in or register) (14 Comments)
  • prev
  • next
As for plausible deniability...
by patrickyeon September 16, 2007 6:42 AM PDT
I'm not convinced you can make a strong enough case for plausible deniability in this case (from the technical side at least, I can't vouch for the legal side). There are just a few too many ways to tie the Bittorrent (or other) traffic to you. A quick shot at it here: <a class="jive-link-external" href="http://patrickyeon.blogspot.com/2007/09/plausible-deniability-with-tor.html" target="_newWindow">http://patrickyeon.blogspot.com/2007/09/plausible-deniability-with-tor.html</a>
Reply to this comment
Plausible deniability and Tor - add TrueCrypt
by john data September 16, 2007 11:04 AM PDT
Tor might provide good plausible deniability but
adding TrueCrypt to hide any files, possibly in
a hidden volume, would add security.
Reply to this comment
TOR and plausible deniability
by unknown unknown September 16, 2007 1:38 PM PDT
I think your post is based on some fundamental misunderstandings of how TOR actually works, that is if I understood what you were trying to say. For example, if privoxy is used, DNS requests can be routed through the TOR network and because the exact path chosen is only known to originator, watching both the entry and exit points of a circuit would be a bit difficult. Further, each node only knows the node that passed it a packet and where it is suppose to send it next.
Reply to this comment
Regarding Tor..
by pgunn01 September 16, 2007 3:57 PM PDT
I've always felt that if it passes through one's computer through a service one provides, then it's one's responsibility if it can't be tracked to someone else. Unless somebody else can be found, everything that passes through Tor is the admin's responsibility, legally speaking. From this perspective, running a Tor exit node is an extremely foolish thing to do.
Reply to this comment
German seizures last year, and deniability
by shava23 September 16, 2007 6:08 PM PDT
Chris, the Ars Technica article has some fact checking errors, you might not want to link to it.

This is a better article.

<a class="jive-link-external" href="http://www.boingboing.net/2006/09/11/tor-german-police-ar.html" target="_newWindow">http://www.boingboing.net/2006/09/11/tor-german-police-ar.html</a>

Ars Technica tends to use slashdot as a source without verifying facts with the interested parties.

The servers were, as far as I know, all returned and no charges were made. PRIME protects anonymity online in the EU as part of consumer protection. That's at an EU level.

As far as deniability goes, no server operator has ever been brought to trial, that we've ever heard of. Mostly law enforcement seizes the equipment or otherwise harasses a server operator, is educated on how Tor works, realizes it is a pass-through network legally similar to a phone switch or internet router, and drops any action against the operator.

If all internet services were liable for content that passed through them, or who even wrote content on their systems, then there would be no ISPs or blogging sites -- the liability would be too high.

Shava Nerad
Development Director
The Tor Project
Reply to this comment
Re: German seizures last year, and deniability
by AlexanderJanssen September 17, 2007 12:51 AM PDT
I agree with Shava. Once again, to state it loud and clear, this was not against Tor but about a bomb-threat. If someone annouces that he plans to "set someone up the bomb"[1] the police has to react.

Unfortunately, in my case, the police didn't bother to do the most basic investigation - if they would've done that, they would've seized my server in Erfurt instead. But what did they do? They didn't check for plausibility, the lawyer of the state in charge didn't have any clue at all, the interrogating officers weren't IT-specialists and the only guy who had some clue, understood that they screwed up but still said "well, you know, your own fault if you expose yourself like that, you can expect more visits or nastygrams in the future if you continue like that" was a guy from Düsseldorf's Staatsschutz (something like the DHS).

Well. I won't support nutters who want to see a global or national conspiracy that the governemt want's to scare Tor-operators to death if they aren't able to ban the service in a legal manner. But it's still frightening what could happen, as Dan pointed out on El Reg[2]. And he's right. Been there, done that. As sad as it sounds.

Cheers, Alex.

[1] <a class="jive-link-external" href="http://en.wikipedia.org/wiki/All_your_base_are_belong_to_us" target="_newWindow">http://en.wikipedia.org/wiki/All_your_base_are_belong_to_us</a>
[2] <a class="jive-link-external" href="http://www.theregister.co.uk/2007/09/16/bomb_threat_leads_police_to_raid_tor_operator/" target="_newWindow">http://www.theregister.co.uk/2007/09/16/bomb_threat_leads_police_to_raid_tor_operator/</a>
Reply to this comment
I just assumed that's what it was for.
by pingpong111 September 17, 2007 9:43 AM PDT
I've been running Tor off and on to post controversial messages on message boards without Big Brother tracking me down, but I'm more worried someone will accuse me of something I didn't do than have an excuse for something I did, since other than practicing free speech I don't do anything illegal online.
Reply to this comment
pingpong111, you have it backwards
by chickenandporn September 18, 2007 4:46 AM PDT
@pingpong111 you have the roles reversed: you use Tor to do things as a client. There are Tor gateways that proxy your connection, and you get your anonymity at their risk. The victim here was a guy accepting risk to give people like you your ability to practice free speech. You are not at risk, but he is/was. It is as though you are the dude discussion chemistry (in this case, explosives) through his router.
Reply to this comment
by tatianahunt May 5, 2008 4:05 AM PDT
I`m agree
I have found two interesting sources ( <a class="jive-link-external" href="http://filesfinds.com" target="_newWindow">http://filesfinds.com</a> &#38; <a class="jive-link-external" href="http://fileshunt.com" target="_newWindow">http://fileshunt.com</a> ) and would like to give the benefit of my experience to you.
by Zak70smith March 4, 2008 9:21 PM PST
i saw some of the arrests of the admins. but there are some really funny clips about the work of admins here <a class="jive-link-external" href="http://loadingvault.com" target="_newWindow">http://loadingvault.com</a>
Reply to this comment
by needforn March 24, 2008 1:35 AM PDT
<a href="http://needfornews.com/top_search.php">needfornews.com</a>
Reply to this comment
by zarak0 April 9, 2008 6:45 AM PDT
There certainly are big risks involved in hosting a Tor server.

---
Zarak
<a class="jive-link-external" href="http://www.callerbase.com/" target="_newWindow">http://www.callerbase.com/</a>
Reply to this comment
by tatianahunt May 5, 2008 4:08 AM PDT
I am tuning my pc by the best software for free, with the file search engine <a class="jive-link-external" href="http://fileshunt.com" target="_newWindow">http://fileshunt.com</a> and <a class="jive-link-external" href="http://filesfinds.com" target="_newWindow">http://filesfinds.com</a> . May be you have your own experience and could give some useful sites too. Because this two social sites help me much.
Reply to this comment
by salamzadeh2004 October 30, 2009 10:18 AM PDT
Hi thanks.Please send me torpark software.
Reply to this comment
(14 Comments)
  • prev
  • next
advertisement
CNET River

First impressions of the Nexus S

We received the Samsung Nexus S and have started to put it through its paces. While we poke and prod, check out our first impressions.

WikiLeaks armors itself to survive cyberattacks

Facing denial-of-service and political attacks, WikiLeaks bolsters infrastructure in bid to become harder to censor.
• Full WikiLeaks coverage

About Surveillance State

Christopher Soghoian delves into the areas of security, privacy, technology policy and cyber-law. He is a student fellow at Harvard University's Berkman Center for Internet and Society, and is a PhD candidate at Indiana University's School of Informatics. His academic work and contact information can be found by visiting www.dubfire.net/chris/. He is a member of the CNET Blog Network and is not an employee of CNET. Disclosure.

Add this feed to your online news reader

Surveillance State topics

Inside CNET News

Scroll Left Scroll Right