ICE Screws Up, Seizes Tor Exit Node; Vows Not to Learn From Its Mistake

from the these-people-protect-us? dept

Given the various domain seizures and other efforts by ICE to act as Hollywood's personal police force, it long ago became clear that they're not particularly technically competent. As if to demonstrate how technically illiterate they are, ICE recently seized six computer hard drives from the home of Nolan King as part of a criminal investigation. ICE's evidence in getting a warrant? Solely an IP address. Yet, as the EFF notes in the link above, if ICE were even mildly technically competent, it would have been able to tell before it seized the machines that King was running a Tor exit node, and thus was not the person connected to the IP (nor could he say who was).

We've seen this before. Earlier this year we wrote about law enforcement in Europe being equally confused by a Tor exit node.

Of course, some people will claim that this is "the price you pay" for running a Tor exit node. In fact, after the EFF gave ICE agents basic remedial training in how the internet works, it returned King's hard drives, but told him "this could happen again." Sure, it could. But it shouldn't. The fact that law enforcement is clueless over the fact that an IP address is not a unique identifier, and yet seems to rely on it as if it does, shouldn't place more of a burden on users. It should indicate that law enforcement should be required to do more than simply identify an IP address.

An IP address alone is not probable cause that a person has committed a crime. Furthermore, search warrants executed solely on the basis of IP addresses have a significant likelihood of wasting officers' time and resources rather than producing helpful leads.

In the case of Tor, the police can avoid mistakenly pursuing exit relay operators by checking the IP addresses that emerge in their investigations against publicly available lists of exit relays published on the Tor Project's web site. The ExoneraTor is another tool that allows anyone to quickly and easily see whether a Tor exit relay was likely to have been running at a particular IP address during a given date and time. The Tor Project can also help law enforcement agencies set up their own systems to query IP addresses easily. These simple checks will help officers concentrate their investigative resources on tracking down those actually committing crimes and ensure that they don't execute search warrants at innocent people's homes.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: evidence, exit node, ice, ip address, tor


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. identicon
    Anonymous Coward, 26 Aug 2011 @ 6:42pm

    This is an harassment tactic, they know they can't seize it, but they do it anyways.

    There is a problem when you don't get punished for doing such things.

    link to this | view in thread ]

  2. identicon
    anon, 26 Aug 2011 @ 7:20pm

    anyone with half a brain would run this on a box separate from their personal materials, so i really don't see an issue, besides the fact that ICE is incompetent?

    link to this | view in thread ]

  3. icon
    Atkray (profile), 26 Aug 2011 @ 7:21pm

    I fear the title is incorrect, I suspect they will learn all too well from this and it will become a common practice.

    As AC stated it is for harassment.

    Somewhere in ICE is an individual who once did a clean install of windows xp after getting a virus on the machine...

    Now drunk with power roaring out loud in an otherwise empty room

    "All your Tor are belong to us"

    link to this | view in thread ]

  4. icon
    Overcast (profile), 26 Aug 2011 @ 7:22pm

    Learn what? Learning first means you must admit you are ignorant on a specific thing or perhaps you were mistaken, I doubt they consider either concept in this. Their goal seems to be a police state, after all.

    If it was safety, wouldn't immigration issues - particularly potential terroristic issues at the borders take precedence over seizing computers?

    link to this | view in thread ]

  5. identicon
    Biggles, 26 Aug 2011 @ 7:37pm

    It happens because...

    ... stupid is the new normal.

    link to this | view in thread ]

  6. identicon
    notanon, 26 Aug 2011 @ 7:44pm

    Re:

    Anyone with the other half of that brain would know that ICE will not just take 1 box. They take everything they can find that might be 'evidence': personal materials, separate boxes...

    link to this | view in thread ]

  7. identicon
    Anonymous Coward, 26 Aug 2011 @ 7:52pm

    Re:

    Why can't they seize it? How is there not probable cause sufficient to get a warrant (as they did here)?

    link to this | view in thread ]

  8. identicon
    Anonymous Coward, 26 Aug 2011 @ 8:22pm

    Re:

    Harassement? Not really. If you are running a Tor node, you are allowing people to sneak around, possibly bypass legal restrictions on content, etc. At that point, you could be considered a co-conspirator.

    I don't think that Tor is going to have a very long life span.

    link to this | view in thread ]

  9. icon
    taoareyou (profile), 26 Aug 2011 @ 8:49pm

    Re: Re:

    Arrest that man, he is wearing all black and it makes it easier for him to sneak around! He must be a criminal! We do not need proof!

    link to this | view in thread ]

  10. icon
    taoareyou (profile), 26 Aug 2011 @ 8:52pm

    Coming to a Future Near You

    There comes a time when police will carry around pre-signed search warrants and go door to door looking for anything, taking everything, then filling out the warrants later if they find something.

    link to this | view in thread ]

  11. icon
    xenomancer (profile), 26 Aug 2011 @ 8:58pm

    Re: Re:

    Their probable cause was an IP address. That is not sufficient.

    link to this | view in thread ]

  12. icon
    xenomancer (profile), 26 Aug 2011 @ 9:05pm

    Re: Re:

    "you are allowing people to sneak around, possibly bypass legal restrictions on content, etc. At that point, you could be considered a co-conspirator"

    ...says the anonymous commenter on a public forum. How do we know you haven't defamed anyone? Should we have Mike arrested for allowing you the possibility of quoting whole books sans license on his forum? Maybe next we should just have the police walk around and punch out anyone who opens their mouth. Who knows, they could start a flash mob if they're allowed to communicate.

    link to this | view in thread ]

  13. identicon
    Anonymous Coward, 26 Aug 2011 @ 9:10pm

    Re:

    The problem is when the g-men appear they don't take only that separate box stupid.

    link to this | view in thread ]

  14. identicon
    Anonymous Coward, 26 Aug 2011 @ 9:12pm

    Re: Re:

    They can't seize it because it was not used to commit a crime, transporting data is not a crime, providing a service is protected by federal laws, remember safe harbours?

    link to this | view in thread ]

  15. identicon
    Anonymous Coward, 26 Aug 2011 @ 9:13pm

    Re: Re:

    Want to test that in court moron and see how far you go?

    link to this | view in thread ]

  16. identicon
    Pixelation, 26 Aug 2011 @ 9:22pm

    Re: Re:

    We should arrest Realtors too. They sell houses allowing people to secretly grow pot. Obviously they are co-conspirators. The banks should go down too, again co-conspirators.

    link to this | view in thread ]

  17. identicon
    Michael, 26 Aug 2011 @ 9:26pm

    Re: Re:

    TOR is a tool, tools can be used for many purposes, legal or illegal. Your computer for example, it could be used to browse the web, or to break into networks... should it be outlawed?

    link to this | view in thread ]

  18. icon
    Hephaestus (profile), 26 Aug 2011 @ 9:36pm

    Re: Re:

    "Harassement? Not really. If you are running a Tor node, you are allowing people to sneak around, possibly bypass legal restrictions on content, etc. At that point, you could be considered a co-conspirator."

    Do you even know what Tor is? Why it was created?

    link to this | view in thread ]

  19. icon
    G Thompson (profile), 26 Aug 2011 @ 10:26pm

    Re:

    A warrant to seize electronic devices that could be used in the commission of a crime allows the LEO's to seize anything that has the merest hint of a connection to a computer.

    This also includes normally all external hard drives, printers, flash cards, Mobile phones (including sim cards). floppy discs, routers, modems, networks witches, commercial programme boxes, manuals, notes, and basically anything that goes beep or could hold an electronic signature that might be able to be analysed.

    It's easier and more conducive to good evidence procedures to bag everything first then to miss something vital to the case and have to go back later. Collateral damage/seizure is always the case.

    It is highly unusual in the extreme if it is just for a specific individual computer/device.

    link to this | view in thread ]

  20. icon
    G Thompson (profile), 26 Aug 2011 @ 10:33pm

    Re: Re:

    It is a form of legal harassment that though unlikely if it can be shown to be part of a pattern of vindictiveness and inequity could remove that immunity the LEO's have.

    As for your other comment.

    If you are running a Website/Blog, you are allowing people to sneak around anonymously, possibly making stupid and troll like comments on content, etc. At that point, you could be considered a co-conspirator to the idiocy of some AC's.

    link to this | view in thread ]

  21. identicon
    Anonymous Coward, 26 Aug 2011 @ 10:39pm

    Re: Re: Re:


    Want to test that in court moron and see how far you go?





    The only moron is you. Criminal liability usually requires that the person possesses scienter with regard to all elements constituting the offense.

    In child pornography cases, you are not guilty of distributing child pornography unless you knows what you distribute is child pornography.

    The Supreme Court ruled that such a gloss on the reach of the law was necessary in order to save its constitutionality.

    The reasoning is that imposing strict liability on publishers and distributors would chill the exercise of First Amendment rights.

    Claiming that the First Amendment is no bar to imposing strict liability on third parties even in these unpopular cases is therefore wrong as a matter of law.

    link to this | view in thread ]

  22. icon
    The eejit (profile), 26 Aug 2011 @ 11:55pm

    Re: Re: Re: Re:

    So let me get this straight...ignorance of the law is a valid defense in criminal cases, but not civil?

    Do you actually know how much of a moron you sound?

    link to this | view in thread ]

  23. identicon
    Anonymous Coward, 27 Aug 2011 @ 12:14am

    Re: Re: Re: Re: Re:


    So let me get this straight...ignorance of the law is a valid defense in criminal cases, but not civil?




    Ignorance of the law is usually no defense, but since most criminal statutes requires knowledge - in child pornography prosecutions you must know that what you possess or distribute is of actual minors.

    In a criminal case, guilt must be proven beyond a reasonable doubt as to all elements conssituting the offense.

    A Tor exit node is unlikely to know what passes through his relay and is thus not guilty of child pornography.

    link to this | view in thread ]

  24. identicon
    Anonymous Coward, 27 Aug 2011 @ 1:27am

    Re: Re: Re: Re:

    Exactly moron, unless you can prove that the operator of the TOR node knew exactly what was happening and you can't(I dare you try) there is no case.

    Aside from plausible deniability there is the other issue of TOR being a service and being covered by the feking law.

    And the fact that most TOR nodes are operated by volunteer(among them several from the US government), they probably don't deploy costly filtering capabilities and they should never deploy such capabilities because it diminishes the plausible deniability aspect of TOR exit nodes, if you can't look at what is going out you can't be possibly responsible for any crime the law is very clear and you yourself cited the supreme court on the issue.

    So who is the moronic idiot who wants to take on a TOR exit node?
    We are waiting for ya.

    link to this | view in thread ]

  25. icon
    That Anonymous Coward (profile), 27 Aug 2011 @ 2:13am

    At some point is one of us going to use TOR to hack into the great AC talking points database and see what is there?

    Its gotta be a treasure trove of dumb ideas, and cat pictures.

    Dear Judges,
    IP Addresses are not like your medicare number, your social security number, your drivers license number. They do not point at actual people, and they can be red herrings. When in doubt making a decision about something technical you do not understand, you should NEVER rely on what the plaintiffs before you claim.
    See they want you to sign off, if it was proven to be wrong later oh well. But funny the citizens are supposed to have rights, and how can you consider those rights when you have no understanding of what is in front of you?
    There is no shame in having to ask for an outside expert to explain something to you, there should be much shame in making a ruling on something you have no understanding of just because the Government asked.

    link to this | view in thread ]

  26. identicon
    Anonymous Coward, 27 Aug 2011 @ 3:16am

    Re:


    So who is the moronic idiot who wants to take on a TOR exit node?
    We are waiting for ya.

    >



    I am not the AC claiming that Tor relay operators are criminally culpable. if you read carefully I am actually arguing the opposite position.

    Tor relay operators aren't legally responsible for criminal conduct of users unbeknownst to them.

    link to this | view in thread ]

  27. identicon
    Anonymous Coward, 27 Aug 2011 @ 3:17am

    Re:


    So who is the moronic idiot who wants to take on a TOR exit node?
    We are waiting for ya.

    >



    I am not the AC claiming that Tor relay operators are criminally culpable. if you read carefully I am actually arguing the opposite position.

    Tor relay operators aren't legally responsible for criminal conduct of users unbeknownst to them.

    link to this | view in thread ]

  28. identicon
    Anonymous Coward, 27 Aug 2011 @ 3:55am

    Re: Re: Re:

    yeah, it is.

    This is just wonderful. Now pirates are going to be responsible for ruining Tor.

    Awesome work guys.

    link to this | view in thread ]

  29. icon
    That Anonymous Coward (profile), 27 Aug 2011 @ 4:50am

    Re: Re:

    Not all AC's are evil, but there is a vast number of them making crazed statements.

    Yesterday I had to stop an AC from trying to bait people into a discussion of infringement being like rape. Not because the AC believes this for one second, but because that AC wanted to be able to take the high moral position of if you have no problem with infringement you have no problem with rape.

    There are several AC's who add to the discussion who use the AC cloak to say things they would not normally say or can not say given their position.

    When in doubt assume my war against the great unseen guiding hand for the AC's is not focused on you if your adding to the discussion. I do enjoy conversations and I have had my positions questioned and sometimes (rarely) they change when I see a different viewpoint I had not considered.

    I was an AC here once, I even used this name. It was a pejorative name used for AC's with nothing better to do that be "That Guy". I'm working on redeeming the title.

    link to this | view in thread ]

  30. identicon
    Anonymous Coward, 27 Aug 2011 @ 6:17am

    Re: Re: Re:

    "Transporting people is not a crime. You can't arrest me for taking this escaped convict across borders.'

    "Free speech, censorship, prior restraint, and um, uh, uh, free speech. Yeah."

    link to this | view in thread ]

  31. identicon
    Anonymous Coward, 27 Aug 2011 @ 6:56am

    Re: Re: Re: Re:

    You know, that is a great analogy. If you're transporting a criminal, but have no idea that he is one, are you culpable? If so, we'll have to shut down all public transportation out of fear. Chilling. Just like free speech. You know, that inconvenient thing Tor is all about.

    link to this | view in thread ]

  32. identicon
    Stynkfysh, 27 Aug 2011 @ 7:39am

    Still could be linked...

    I am no fan of the government's ability to monitor our internet usage, but the person could have been personally distributing copyrighted works and running a Tor exit point. They are not mutually exclusive. From the government's perspective, they can only go after the clues they have. At their disposal. There are bigger fish to fry out there than Joe teenager copying their favorite tune, however. And its copyright infringement. Software / music / movie piracy does not exist. These industries need to stop being drama queens. Maybe some real pirates should show up on their doorsteps?

    link to this | view in thread ]

  33. icon
    Shooter (profile), 27 Aug 2011 @ 8:02am

    Re: Re:

    Networks witches? Do they have anything to do with the email daemons?

    Sorry, couldn't help myself. I'll go quietly...

    link to this | view in thread ]

  34. icon
    That Anonymous Coward (profile), 27 Aug 2011 @ 8:15am

    Re: Still could be linked...

    The downside is we have no idea what ICE was actually looking for.
    The simple fact that the EFF needed to gently remind them to get rid of any copies they made is very troubling.
    Had they done any looking into the clues they had, they would and easily discovered it was a TOR exit node.
    Being able to get a Judge to issue a warrant on just an IP address sounds very good, but it is not a solid identification of a person, place, or computer.

    link to this | view in thread ]

  35. identicon
    Adam, 27 Aug 2011 @ 8:29am

    TOR Exit Node

    Anyone, particularly in the USA, contemplating a Tor Exit Node should first read "Tips for Running an Exit Node with Minimal Harassment" at https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment

    link to this | view in thread ]

  36. identicon
    Anonymous Coward, 27 Aug 2011 @ 9:01am

    Given that law enforcement- especially the homeland security/ICE brand of LE, is distinguished by kicking in a door at dawn, lots of yelling, and pointing assault weapons at you, your wife, kids, dog and so on, i wonder: is this the twilight zone? do pirates often shoot back? why do we allow law enforcement to treat people like this?

    why do we allow old people to elect judges who think every click is a doubleclick, and think an ip address is the same as an SSN?



    ill bet that guy did not any apology whatsoever for the trashed house, pissed wife, and nightmares his kids are having now.

    link to this | view in thread ]

  37. identicon
    Anonymous Coward, 27 Aug 2011 @ 9:24am

    Re: Re: Re:

    They can't seize it because it was not used to commit a crime, transporting data is not a crime, providing a service is protected by federal laws, remember safe harbours?

    Whether it "was not used to commit a crime" is a conclusion on your part. That doesn't explain why there was no probable cause.

    How is providing a Tor exit node "protected by federal laws"? Which federal laws? Which safe harbors?

    I think the EFF is outright lying when they claim an "IP address alone is not probable cause that a person has committed a crime." I can find lots of judges who thought otherwise. Can they show me one who agrees with them? I doubt it.

    The fact is, running a Tor exit node is inherently dangerous, and there is certainly probable cause to search your stuff if something bad comes out of your exit node.

    link to this | view in thread ]

  38. icon
    WysiWyg (profile), 27 Aug 2011 @ 9:43am

    Re: Re: Re: Re:

    Ehm, no, that would be the work of ICE.

    TOR is not good for filesharing, since it's so slow.

    link to this | view in thread ]

  39. icon
    That Anonymous Coward (profile), 27 Aug 2011 @ 9:48am

    Re:

    No they initially told him this could happen again.

    Why would that have to apologize?
    They are systematically stripping the peoples rights for fear of terrorism, fake drugs, fake handbags are they actually mutant aliens that are going to eat the children.
    A great number of people are so terrified of the boogeymen they serve up on a plate that they give up everything to be more safe. None of these laws will ever be used against me, because they only go after bad people.

    People are short sighted and want a quick solution from the end up a pen, it is against the law now so no one will ever do it. Then it happens again and again and rather than look at why things happen, they just want more laws and less freedom for everyone but themselves.

    Poor little frog, has no idea the pot is heating around them.

    link to this | view in thread ]

  40. icon
    John Fenderson (profile), 27 Aug 2011 @ 9:53am

    Re: Re:

    Harassement? Not really. If you are running a Tor node, you are allowing people to sneak around, possibly bypass legal restrictions on content, etc. At that point, you could be considered a co-conspirator.

    I don't think that Tor is going to have a very long life span.


    You know what's funny? The US state department and the US military run Tor nodes and considers Tor to be a critical tool for ensuring free speech in repressive regimes.

    So I guess the US government itself is a co-conspirator.

    Tor serves a legitimate and extremely valuable function. It's not going anywhere.

    link to this | view in thread ]

  41. identicon
    Anonymous Coward, 27 Aug 2011 @ 10:12am

    Re: Re: Re: Re:

    Sorry, but basic conspiracy theory stuff applies here. A criminal conspiracy doesn't require that the two parties have the same goal, only that they work in common to provide it.

    If you run a Tor portal, you know what someone people may use it for illegal activity. In fact, anyone who is using a Tor portal generally is doing so to conceal their actions, or to otherwise bypass some security or legal restrictions. Nobody would decide to route their traffic so poorly and so slowly on a normal basis.

    So as the operator of a Tor exit, you would know your portal is likely used for illegal activity, and you leave it up anyway. Negligent behavior, knowing the risks you still decide to operate the portal.

    The rest is for the lawyers. I however wouldn't recommend operating a Tor portal.

    link to this | view in thread ]

  42. identicon
    Anonymous Coward, 27 Aug 2011 @ 10:16am

    Re: Re:

    i cant think of a more effective method of creating homegrown revolutionaries than stomping on private citizens who value personal freedom enough to run TOR exits out of their homes.

    this is basic shit. i wont miss them when they are dead

    link to this | view in thread ]

  43. identicon
    Rekrul, 27 Aug 2011 @ 10:34am

    Re: Re: Re: Re: Re:

    If you run a Tor portal, you know what someone people may use it for illegal activity. In fact, anyone who is using a Tor portal generally is doing so to conceal their actions, or to otherwise bypass some security or legal restrictions. Nobody would decide to route their traffic so poorly and so slowly on a normal basis.

    Here's an interesting statistic: 100% of "cyber-crime" on the internet is committed through some form of ISP. So by your logic, every company that provides internet access is guilty of "negligent behavior".

    link to this | view in thread ]

  44. identicon
    Anonymous Coward, 27 Aug 2011 @ 10:40am

    Re: Re: Re: Re: Re:

    I however wouldn't recommend operating a Tor portal.

    Or you can do what I do, which is run a Tor exit node on a foreign server paid for with anonymous funds.

    link to this | view in thread ]

  45. identicon
    Rekrul, 27 Aug 2011 @ 10:41am

    Yet, as the EFF notes in the link above, if ICE were even mildly technically competent, it would have been able to tell before it seized the machines that King was running a Tor exit node, and thus was not the person connected to the IP (nor could he say who was).

    What makes you think that they even care? To them, anyone running such an exit node is the enemy and the more afraid they can make such people, the better (in their opinion). They'd love it if everyone was too scared to be involved in any part of Tor.

    link to this | view in thread ]

  46. identicon
    Anonymous Coward, 27 Aug 2011 @ 11:02am

    Re:

    I don't see how whether he's running an exit node or not is relevant. Either way, there's still probable cause.

    link to this | view in thread ]

  47. identicon
    Anonymous Coward, 27 Aug 2011 @ 11:09am

    Re: Re:

    basically anything that goes beep or could hold an electronic signature that might be able to be analysed.

    Umm, no, they've been known to take much more than that. Keyboards, monitors, mice, even power strips.

    link to this | view in thread ]

  48. identicon
    Anonymous Coward, 27 Aug 2011 @ 11:23am

    Re: Re:

    Harassement? Not really. If you are running a Tor node, you are allowing people to sneak around, possibly bypass legal restrictions on content, etc. At that point, you could be considered a co-conspirator.

    I read a story the other day about the local cops busting a couple of guys making a drug deal in the local mall. What I want to know is why didn't they arrest the mall owner too? I mean, the mall allowed these two guys to come inside, where they then attempted to bypass the law (they were obviously caught, though). The mall wasn't even checking ID's at the door, so doesn't that make the mall owner a co-conspirator? Shouldn't the cops seize the mall as evidence?

    I don't think that Tor is going to have a very long life span.

    We obviously need to rid of malls too.

    link to this | view in thread ]

  49. identicon
    Anonymous Coward, 27 Aug 2011 @ 11:30am

    Re: Re:

    probable cause? just barely.

    Lets assume the "criminal investigation" was related to some kiddie porn downloaded from a website hosted in the United States. ICE raids said host and starts looking at the site logs. ICE spots some IPs in their jurisdiction, gets some warrants and starts kicking in doors.

    Are there any steps missing? sure, probable cause is at least superficially there, but why spend thousand of dollars and a days effort raiding a home based on the info contained in a website log. Did they do any followup? why not get a wiretap warrant first, and monitor the online habits of the suspect? were there any other clues as to the pedo status of the subject?

    at the very minimum, this is an example of stupid waste of public resources by incompetent thugs. at worst it is willful ignorance of investigative best practices in the name of the security apparatus and the desire of some nobody ICE agent to get a gold star on his homework chart

    link to this | view in thread ]

  50. identicon
    Anonymous Coward, 27 Aug 2011 @ 11:30am

    Re: Re: Re: Re:

    The fact is, running a Tor exit node is inherently dangerous...

    It is dangerous to be right when the government is wrong.
    -- Voltaire (1694-1778)

    link to this | view in thread ]

  51. icon
    The Devil's Coachman (profile), 27 Aug 2011 @ 11:34am

    Re: Re: Re: Re:

    Said the fascist apologist.

    link to this | view in thread ]

  52. identicon
    Anonymous Coward, 27 Aug 2011 @ 11:34am

    Re: Re: Re: Re:

    there is certainly probable cause to search your stuff if something bad comes out of your exit node.

    Bull. That's like saying there's probable cause to search your city if something bad come out of it.

    link to this | view in thread ]

  53. icon
    The Devil's Coachman (profile), 27 Aug 2011 @ 11:37am

    Re: Re:

    Said the fascist apologist and facilitator.

    link to this | view in thread ]

  54. icon
    The Devil's Coachman (profile), 27 Aug 2011 @ 11:43am

    Re: Re: Re:

    You and I have made the same mistake - replying to the douchebag who writes fascist apologia.

    link to this | view in thread ]

  55. identicon
    Anonymous Coward, 27 Aug 2011 @ 11:53am

    Re: Re: Re: Re: Re:

    Bull. That's like saying there's probable cause to search your city if something bad come out of it.

    I don't think that analogy is apt, and as this article demonstrates, judges do deem the IP address and evidence it was used for crime to be probable cause on which to issue a warrant.

    link to this | view in thread ]

  56. identicon
    Anonymous Coward, 27 Aug 2011 @ 12:17pm

    Re: Re: Re: Re: Re:

    Sigh. I run a Tor exit node, so I don't understand your name-calling. I simply think that running a Tor exit node can give rise to liability, as is plainly evidenced by this story. What I'm saying is true. Sorry if reality isn't your cup of tea.

    link to this | view in thread ]

  57. identicon
    Anonymous Coward, 27 Aug 2011 @ 12:18pm

    Re: Re: Re: Re: Re:

    Good quote. I agree.

    link to this | view in thread ]

  58. icon
    The Devil's Coachman (profile), 27 Aug 2011 @ 12:23pm

    Re: Re: Re:

    That can't happen soon enough for me!

    link to this | view in thread ]

  59. icon
    The Devil's Coachman (profile), 27 Aug 2011 @ 12:25pm

    Re: Re:

    Said the fascist, and apologist.

    link to this | view in thread ]

  60. icon
    The Devil's Coachman (profile), 27 Aug 2011 @ 12:27pm

    Re: Re: Re: Re: Re: Re:

    And the government is almost always wrong, but that will never stop them. Starting to look to me like The Fourth Reich is well under way now.

    link to this | view in thread ]

  61. identicon
    Anonymous Coward, 27 Aug 2011 @ 12:32pm

    Re: Re: Re: Re: Re: Re:

    Sorry, you fail.

    The ISP sets things up for everyone, not specifically hide anything. The ISPs don't provide cloaking, they don't allow for "secret" downloading, etc.

    100% of people who commit cyber crime are breathing, so we should cut off air. Well, maybe yours, because clearly you aren't using any.

    link to this | view in thread ]

  62. icon
    The Devil's Coachman (profile), 27 Aug 2011 @ 12:35pm

    Re: Re: Re: Re: Re: Re:

    Listen up, Zippy! Your ludicrous assertion that there is probable cause at all is the crux of your problem. If you had said "improbable", then I would not be on you shite, but you did say "probable" as though it implied it was, in fact, probable. Please look up the meaning of the word probable. Your government abuses the term to the point of of creating a fascistic state, where all they have to do is utter the word "probable" and the slack-jawed goobers and douchebags who see

    link to this | view in thread ]

  63. icon
    The Devil's Coachman (profile), 27 Aug 2011 @ 12:42pm

    ICE = Gestapo

    That's the real heart of this matter. They are a law unto themselves and answer to nobody. They continually look to expand their power outside their legally permitted scope and are driven by power-mad bureaucrats who would water board their grandmothers if they thought it would get them a promotion!

    link to this | view in thread ]

  64. identicon
    Anonymous Coward, 27 Aug 2011 @ 12:50pm

    Re: ICE = Gestapo

    Godwin's already? Snore.

    link to this | view in thread ]

  65. identicon
    Rabbit80, 27 Aug 2011 @ 1:33pm

    Re: Re: Re:

    I even know a case where they took an Action Replay cartridge for an Amiga 500! (Though bizzarely they left the Amiga)

    link to this | view in thread ]

  66. identicon
    Anonymous Coward, 27 Aug 2011 @ 2:14pm

    Re: Re: Re: Re: Re:

    It's also incredibly dangerous to be stupid

    -- dead guy in a gang neighborhood after dark with lots of cash

    link to this | view in thread ]

  67. identicon
    Anonymous Coward, 27 Aug 2011 @ 2:16pm

    Re: Re: Re:

    Wow, talk about missing it!

    We aren't talking about written comments here. We are talking about people intentionally opening a gateway on their computers so others can do things that they otherwise cannot do, either legally or because they don't want to be traced.

    It will all fall down with anonymous starts to use tor portals as ways to launch LOIC attacks. Then the shit will hit the fan.

    link to this | view in thread ]

  68. identicon
    Anonymous Coward, 27 Aug 2011 @ 2:29pm

    Re: Re: Re: Re:

    Did you ever heard of some bus driver getting arrested for taking a escaped criminal accross the border on a tour bus full of other people?

    link to this | view in thread ]

  69. identicon
    Anonymous Coward, 27 Aug 2011 @ 2:37pm

    Re: Re:

    Well, what would happen if they seized all equipment from Facebook is there probable cause or not?

    link to this | view in thread ]

  70. identicon
    Anonymous Coward, 27 Aug 2011 @ 3:05pm

    Re: Re: Re: Re:

    Have you ever counted the number of TOR exit nodes?

    TOR won't be used for DDoS any time soon.

    What they could use is some form of the Herbivore concept from Cornell.

    And I believe you missed his point since his comparison is a valid one.

    If you operate "any service" on the internet that allows other people to use it, it is no different from TOR is it?

    Besides the US constitutions affirms the right of others to be anonymous and secure against their own government, this is something you fail to see apparently.

    link to this | view in thread ]

  71. identicon
    Anonymous Coward, 27 Aug 2011 @ 3:13pm

    Re: Re: Re: Re: Re:

    Well if that is true than all ISP are liable and accomplices of criminals because they know for a fact that crime is committed using their services don't they?

    Nobody would decide to route their traffic so poorly and so slowly on a normal basis.


    Except for: Iranian dissidents, Chinese dissidents or any dissident from an oppressive regime, for diplomats everywhere using TOR to pass sensitive information, whistleblowers and general free speech run of the mill kind of stuff and of course radicals and criminals.

    Yes it does happen, but like everybody else knows people who don't learn to take the good with the bad apparently will never taste the good.

    We know already for a fact that letting governments decide what is good for people is not an option, governments don't respect their citizens and they need to be reminded of that respect from time to time.

    link to this | view in thread ]

  72. identicon
    Anonymous Coward, 27 Aug 2011 @ 3:14pm

    Re: Re: Re: Re: Re: Re: Re:

    Your trolling is not that good mate!

    link to this | view in thread ]

  73. identicon
    Anonymous Coward, 27 Aug 2011 @ 5:07pm

    Re: Re: Re: Re:

    Those judges are idiots even more after public cases of people being hacked by their neighbours and having their internet used to do naughty stuff.

    Want another example of how someone could use your internet to do naughty stuff?
    http://www.digicrime.com/noprivacy.html

    "In fact, I could have snarfed your email address from this page, without you having to press a button or move your mouse. For an example of this, click here. In addition, I could trigger the browser to send mail when you pass your mouse over a link. For example, if you pass your mouse over the "Competely safe" link above, then it will send mail (watch the status bar at the bottom). Other examples can be found here (uses an invisible link in a frame) and here (uses a blue line)."

    Anyone who says, an IP is enough for probable cause is a lost cause.

    link to this | view in thread ]

  74. identicon
    Anonymous Coward, 27 Aug 2011 @ 5:09pm

    Re: Re: Re: Re: Re: Re:

    Well than it is time to educate judges everywhere about how stupid it is to use and IP as evidence of anything.

    link to this | view in thread ]

  75. identicon
    Anonymous Coward, 27 Aug 2011 @ 5:55pm

    Re: Re: Re: Re: Re:

    If you run a Tor portal, you know what someone people may use it for illegal activity.

    If you run a restaurant, you know what someone people may use it for illegal activity.

    In fact, anyone who is using a Tor portal generally is doing so to conceal their actions, or to otherwise bypass some security or legal restrictions.

    Bull. Using Tor doesn't mean that a person is doing so for illegal reasons. Furthermore, I such a claim to be highly hypocritical coming from someone posting anonymously. Hey, why don't do post your name and address? Are you doing something illegal?

    So as the operator of a Tor exit, you would know your portal is likely used for illegal activity, and you leave it up anyway. Negligent behavior, knowing the risks you still decide to operate the portal.

    So as the operator of a restaurant, you would know your restaurant is likely used for illegal activity, and you leave it open anyway. Negligent behavior, knowing the risks you still decide to operate the restaurant.

    I however wouldn't recommend operating a Tor portal.

    Trying to threaten and scare people, eh? Of course you "wouldn't recommend operating a Tor portal." You probably wouldn't recommend that people do anything that might upset your employers.

    link to this | view in thread ]

  76. identicon
    Anonymous Coward, 27 Aug 2011 @ 5:58pm

    Re: Re: Re:

    "You know what's funny? The US state department and the US military run Tor nodes and considers Tor to be a critical tool for ensuring free speech in repressive regimes."

    The military has nuclear weapons, too. But we don't let private citizens have them.

    link to this | view in thread ]

  77. icon
    btr1701 (profile), 27 Aug 2011 @ 5:58pm

    Re: Re: Re: Re: Re:

    > So let me get this straight...ignorance of the law is a valid
    > defense in criminal cases, but not civil?

    If you want to get it straight, you should, you know, actually get it straight.

    He didn't say ignorance of the law was a defense. He said ignorance of the *facts* is a defense. You can't be found guilty of distributing child porn if you don't know that what you're distributing is child porn. Knowledge is a requirement for guilt in the law.

    link to this | view in thread ]

  78. icon
    btr1701 (profile), 27 Aug 2011 @ 5:59pm

    Re: Re: Re: Re: Re:

    > Sorry, but basic conspiracy theory stuff applies here.

    No, it doesn't.

    > A criminal conspiracy doesn't require that the two parties have
    > the same goal, only that they work in common to provide it.

    You can't legally conspire with someone if you've never met them and have never communicated with them. The law simply doesn't cover such situations.

    link to this | view in thread ]

  79. icon
    btr1701 (profile), 27 Aug 2011 @ 6:03pm

    Re: Re: Re: Re:

    > The military has nuclear weapons, too. But we don't let private citizens have them.

    Holy shit. You're actually equating nuclear annihilation and anonymous copyright infringement.

    And I thought I'd seen it all around here.

    link to this | view in thread ]

  80. identicon
    Anonymous Coward, 27 Aug 2011 @ 6:08pm

    Re: Still could be linked...

    I am no fan of the government's ability to monitor our internet usage, but the person could have been personally distributing copyrighted works and running a Tor exit point.

    They "could" have been, but there's no evidence that they were. You "could" be a child molester, but without evidence should we just assume that you are?

    link to this | view in thread ]

  81. identicon
    Anonymous Coward, 27 Aug 2011 @ 6:11pm

    Re: Re: Re: Re: Re: Re: Re:

    No offense, but your personal definition seems immaterial and irrelevant.

    link to this | view in thread ]

  82. identicon
    Anonymous Coward, 27 Aug 2011 @ 6:20pm

    Re: Re: Re: Re: Re: Re: Re:

    Not so fast. Let's say a credible and "certain" tip came in: someone on the 1:10 PM bus from Omaha was going to murder your grandmother. Their IP address was 195.192.1.122. Should we ignore it completely? Or maybe we should do some due diligence and stop these fuckers, if possible, from murdering your grandma?

    link to this | view in thread ]

  83. identicon
    Anonymous Coward, 27 Aug 2011 @ 6:41pm

    Re: Re:

    I don't see how whether he's running an exit node or not is relevant. Either way, there's still probable cause.

    No, if he's running a Tor node it's *improbable* that he is the one responsible. "Possible" is not "probable". Big difference.

    link to this | view in thread ]

  84. identicon
    Anonymous Coward, 27 Aug 2011 @ 6:47pm

    Re: Re: Re: Re: Re: Re: Re: Re:

    Not so fast. Let's say a credible and "certain" tip came in: someone on the 1:10 PM bus from Omaha was going to murder your grandmother. Their IP address was 195.192.1.122. Should we ignore it completely? Or maybe we should do some due diligence and stop these fuckers, if possible, from murdering your grandma?

    Let's say a credible and "certain" tip came in: someone in New York city is going to commit a murder. Should we ignore it completely? Or maybe we should do some due diligence and just nuke the place to stop these fuckers, if possible, from murdering.

    link to this | view in thread ]

  85. identicon
    Anonymous Coward, 27 Aug 2011 @ 6:55pm

    Re: Re: Re: Re: Re: Re:

    You can't be found guilty of distributing child porn if you don't know that what you're distributing is child porn. Knowledge is a requirement for guilt in the law.

    Then why can you be guilty of possessing child porn if you didn't know that you were possessing child porn? (same thing for illegal drugs)

    link to this | view in thread ]

  86. icon
    btrussell (profile), 27 Aug 2011 @ 6:56pm

    Re: Re: ICE = Gestapo

    Yep, already
    80 posts and 18 hours

    Beats the previous record of 100 posts and 24 hours

    link to this | view in thread ]

  87. identicon
    Anonymous Coward, 27 Aug 2011 @ 7:02pm

    Re: Re: Re: ICE = Gestapo

    I wish people would just quit bring up history. It makes it harder to repeat it.
    /s

    link to this | view in thread ]

  88. icon
    G Thompson (profile), 27 Aug 2011 @ 11:52pm

    Re: Re: Re:

    hmmm not sure, but if you BIND the daemons to the witches they might enjoy it.

    yes.. I enjoy the insanity as well ;)

    link to this | view in thread ]

  89. icon
    G Thompson (profile), 27 Aug 2011 @ 11:58pm

    Re: Re: Re:

    Being one of the actual people who sometimes is called to teh places of seizure, I normally try to restrict it to actual things that can be used for evidence, especially when too much crap means storage is a nightmare.

    Though I take note of types of keyboards and mice etc, that way , when needed, you can recreate a reasonably exact environment/equipment match.

    But with the other quote in reply here, re the Amiga cartridge.. No idea why the Amiga itself was not taken, unless it had no internal drives (and was off) at the time. Though I have never yet run across an Amiga in investigations yet.. Though I have seen a, I kid you not, Commodore 64... now that was a weird one (and less than 5yrs ago too)

    link to this | view in thread ]

  90. icon
    G Thompson (profile), 28 Aug 2011 @ 12:14am

    Re: Re: Re: Re:

    You mean the same logic you used talking about Tor and people using it doesn't stand up when going to other actionable situations by people, whether intentional or not?

    Wow... look at your original logic hypothetical.. notice you are using elements of people doing intentional actions, or even inactions as the case may be. Whether it is done via typing, or done via using a TOR, or done by creation of a TOR exit Node, or done via creation of a Blog that allows comments. The same elements exist and the same illogical failure exists on BOTH your and My statement.

    And if you really think Anonymous [troll points of +10 awarded for FUD] are going to use Tor points, you have absolutely no knowledge on what else is available for the actual members of anonymous. Oh and LOIC attacks are like script kiddy attacks.. great for the press, but there are better ways to get access and cause shutdowns, In fact I use better thjngs than LOIC every day, so do most Network Admin/Security people.

    Come back when you learn more about the link/physical layer of the OSI/TCP stack

    link to this | view in thread ]

  91. identicon
    Anonymous Coward, 28 Aug 2011 @ 12:22am

    Re: Re: ICE = Gestapo

    Spoken like a good German.

    If it quacks, walks and looks like a duck refusing to call it a duck will not keep you from having to deal with duck shit.

    link to this | view in thread ]

  92. identicon
    Anonymous Coward, 28 Aug 2011 @ 6:50am

    Re: Re: Re: Re: Re:

    Sadly. Mr. Digicrimes site does nothing more than trigger the email process in windows, which accompishes very little. The mail isn't sent (he didn't even manage to get a subject or content in there), so it is sort of meaningless. It only exposes what is an incredibly common functionality of all browsers, nothing more.

    If you think that kills probable cause, then you have issues.

    link to this | view in thread ]

  93. identicon
    Anonymous Coward, 28 Aug 2011 @ 6:53am

    Re: Re: Re: Re: Re: Re:

    Sure it does. There is no issue here. It would be no different from someone placing a gun hidden at a key location, telling someone else, who in turns tells the future murderer where to get the weapon to commit the crime. A and B don't have to know each other, because C is the intermediary.

    In this case, C is the Tor system itself, which introduces potential criminals to willing assistants.

    link to this | view in thread ]

  94. identicon
    Anonymous Coward, 28 Aug 2011 @ 7:02am

    Re: Re: Re: Re: Re: Re: Re:

    I have studied the meaning of "probable cause" in great detail in my constitutional criminal law class. If you want to explain why there's no probable cause, legally speaking, I'd love to hear it. I suspect you're just talking out of your ass and trying to stir up shit though. Perhaps you could try adding something useful to the conversation for a change, or is that too much to ask?

    link to this | view in thread ]

  95. identicon
    Anonymous Coward, 28 Aug 2011 @ 7:11am

    Re: Re: Re:

    Wow. You really don't add anything of value, do you?

    link to this | view in thread ]

  96. identicon
    Anonymous Coward, 28 Aug 2011 @ 7:15am

    Re: Re: Re:

    Say they see child pornography coming from an IP address. That's probable cause. And then say they look on the Tor list and see that that IP address is a Tor exit node. What are they supposed to do, just say "fuck it"? If it were that easy, every child pornographer would just run an exit node.

    link to this | view in thread ]

  97. identicon
    Anonymous Coward, 28 Aug 2011 @ 7:16am

    Re: Re: Re:

    Why don't you stop acting childish and try adding something to the conversation?

    link to this | view in thread ]

  98. identicon
    Anonymous Coward, 28 Aug 2011 @ 7:18am

    Re: Re: Re:

    That may make it less probable, but it's still sufficiently probable enough to have probable cause. The alternative would be that whenever someone has a Tor exit node, there can't be probable cause. That makes no sense. All criminals would just run exit nodes.

    link to this | view in thread ]

  99. icon
    The Logician (profile), 28 Aug 2011 @ 7:19am

    Re: Re: Re: Re: Re: Re: Re:

    Your logic, AC #91, is flawed. Liability must only be placed on the person/entity performing the act. No more and no less. Otherwise, where would you have it end? To the fourth degree? The fifth? The sixth? Even further out?

    I admit my knowledge of Tor is limited, but I do know it is a form of encryption technology, with many legitimate uses. And since the data passing through it is encrypted, there is no way for the Tor operator or the node/exit point itself to know what it is.

    You cannot act merely on supposition and assumption. You must have proof, actual evidence. Otherwise you are using the tactics of a police state. Is that what you really want for this country? You must look at a given law and examine it to see if it is just and ethical, before deciding whether it is worth enforcing. If it is not, then ignoring it is not wrong.

    link to this | view in thread ]

  100. icon
    btr1701 (profile), 28 Aug 2011 @ 8:36am

    Re: Re: Re: Re: Re: Re: Re:

    > In this case, C is the Tor system itself

    One can't legally conspire with an inanimate object, genius.

    link to this | view in thread ]

  101. identicon
    jonvaljon, 28 Aug 2011 @ 9:22am

    Re: Re:

    we have a constitutional right to privacy. call it sneaking around, but when the NSA is logging every packet we send with no warrents, im inclined to think people will take their privacy back, cause our brave leaders are certianly not doing it for us.

    there are some folks out there that would like to develop the ability to communicate un-observed BEFORE its too late to create such a system.

    Respect your constitution brother. Your sounding like that dude from Lives of Others.

    link to this | view in thread ]

  102. identicon
    jonvaljon, 28 Aug 2011 @ 9:26am

    Re: Re: Re: Re:

    "I think the EFF is outright lying when they claim an "IP address alone is not probable cause that a person has committed a crime." I can find lots of judges who thought otherwise."

    and I can find a lot of people that think planet X is gonna hit the earth on dec. 24th 2012. Just cause a crap load of people hold false ideas doesnt make them any more accurate.

    and IP adress is not an identifier.

    link to this | view in thread ]

  103. identicon
    Anonymous Coward, 28 Aug 2011 @ 9:36am

    Re: Re: Re: Re: Re:

    "If you run a Tor portal, you know what someone people may use it for illegal activity. In fact, anyone who is using a Tor portal generally is doing so to conceal their actions, or to otherwise bypass some security or legal restrictions. Nobody would decide to route their traffic so poorly and so slowly on a normal basis."

    WRONG. I run it from my home, for a few simple reasons, none of them are breaking any laws or bypass security rrestrictions.

    I use it because the more pople that use it, the less suspicious those users are.

    I use it to support those without the rights to free speech, such as dissident groups in China.

    I use it because I want to make it hard for the government to gather my communication data, since they have no warrent, or right.

    I use it because I can.

    resistance to the survallince state is not futile, but convincing some americans of their rights, seems to be.

    link to this | view in thread ]

  104. identicon
    Anonymous Coward, 28 Aug 2011 @ 9:39am

    Re: Re: Re: Re: Re:

    An IP address is an identifier. If you threaten to kill the President using your home computer without masking your trail, the feds will use your IP address to identify you. That something originated from a certain IP address is evidence, and judges deem such evidence to give rise to probable cause. The EFF can lie and pretend like it's not true, but in fact when they ask people to run an exit node, they are asking people to take on the risk that the feds will kick in their front door.

    link to this | view in thread ]

  105. identicon
    Anonymous Coward, 28 Aug 2011 @ 9:40am

    Re: Re: Re: Re: Re: Re: Re:

    hahaha your logix R br0ke

    link to this | view in thread ]

  106. identicon
    Anonymous Coward, 28 Aug 2011 @ 10:27am

    Re: Re: Re: Re: Re: Re:


    An IP address is an identifier. If you threaten to kill the President using your home computer without masking your trail, the feds will use your IP address
    to identify you. That something originated from a certain IP address is evidence, and judges deem such evidence to give rise to probable cause. The EFF
    can lie and pretend like it's not true, but in fact when they ask people to run an exit node, they are asking people to take on the risk that the feds
    will kick in their front door.


    You are wrong. If you're really a lawyer, accusing the EFF of lying is defamatory when you should know that they haven't said it.


    The EFF has never claimed that running a Tor exit node may never give rise to probable cause. And a good attorney would be derilict for arguing such a claim in
    a suppression hearing.

    But neither does running a Tor exit node automatically give rise to probable cause. A probable cause determination is based on a totality of circumstances.

    The question of whether there was probable cause will usually come up in two different settings: (1) A civil plaintiff filing a § 1983 or a Bivens action for violation of the Fourth Amendment, or (2) A criminal defendant challenging the admission of evidence in a suppression hearing.

    And of course, even if there was probable cause, it doesn't answer the question of criminal culpability on the part of the Tor node operator.

    link to this | view in thread ]

  107. identicon
    Anonymous Coward, 28 Aug 2011 @ 10:54am

    Re: Re: Re: Re: Re: Re: Re:

    You are wrong. If you're really a lawyer, accusing the EFF of lying is defamatory when you should know that they haven't said it.

    If I'm wrong, please explain how and why.

    The EFF has never claimed that running a Tor exit node may never give rise to probable cause. And a good attorney would be derilict for arguing such a claim in a suppression hearing.

    Do you agree then that running a Tor exit node doesn't all of the sudden mean there's no probable cause?

    But neither does running a Tor exit node automatically give rise to probable cause. A probable cause determination is based on a totality of circumstances.

    Agreed. But if child porn or whatever is coming from your IP address, that's probably going to be probable cause whether you run a Tor exit node or not. In other words, whether you run a Tor exit node is immaterial to the determination.

    The question of whether there was probable cause will usually come up in two different settings: (1) A civil plaintiff filing a § 1983 or a Bivens action for violation of the Fourth Amendment, or (2) A criminal defendant challenging the admission of evidence in a suppression hearing.

    Not sure why the law lesson, but OK.

    And of course, even if there was probable cause, it doesn't answer the question of criminal culpability on the part of the Tor node operator.

    Of course. That's a completely separate issue.

    Tell me this: Do you agree with Mike that ICE "screw[ed] up," or do you agree with me that they didn't because there was still probable cause despite the fact he ran a Tor exit node.

    link to this | view in thread ]

  108. icon
    Angry Puppy (profile), 28 Aug 2011 @ 10:59am

    It seems to me

    It seems to me that if I want to do criminal activity on the internet and provide myself a alibi running a TOR exit node would be a good cover.

    I have only used TOR so that I could watch TV shows using a static exit node located in the USA. This ended when TOR cut off streaming through TOR. For what other purposes is TOR utilized?

    According to the site (https://www.torproject.org/)even the military uses TOR to ensure anonymity and secure communications. What does the average person use it for?

    link to this | view in thread ]

  109. identicon
    Anonymous Coward, 28 Aug 2011 @ 2:07pm

    Re: Re: Re: Re: Re: Re: Re: Re:


    Do you agree then that running a Tor exit node doesn't all of the sudden mean there's no probable cause?





    Yes, I agree depending on what other facts are objectively known to the issuing magistrate or the officer.

    In many cases, I think an IP address would be sufficient to establish probable cause, but since PC is not determined by a hard fact but under the totality of circumstances standard, the knowledge that the IP address belongs to a Tor exit node could also subtract from the probability.
    It's likely that the Supreme Court would rule that running
    a Tor exit node under most circumstances gives rise to probable cause, but until there is a black and white ruling from the court on that issue, the EFF isn't wrong as a matt of law, or deliberately lying.


    Agreed. But if child porn or whatever is coming from your IP address, that's probably going to be probable cause whether you run a Tor exit node or not.
    In other words, whether you run a Tor exit node is immaterial to the determination.






    Yes, but what if it's objectively known to the magistrate and the officer that the operator of the Tor exit node isn't likely guilty of anything, and that no evidence identifying or leading to the criminal is likely to be recovered by a search apart from the fact that the IP address is associated with a crime?

    In such a scenario the there is no culprit or evidence of crime to be recovered by a search, precisely because the probability to recover any evidence identifying the criminal would be near zero.


    Tell me this: Do you agree with Mike that ICE "screw[ed] up," or do you agree with me that they didn't because there was still probable cause despite the
    fact he ran a Tor exit node.


    I agree with you on thee x ante probable cause question.

    But I don't agree with your claim explicitly stated or implied that an IP address is a settled question in the probable cause
    determination, more than anonymously reporting a gun incident at a neighbor's house automatically gives rise to probable cause.

    Maybe running a Tor exit node is "dangerous" or it's undesirable to provide criminals with plausible deniability, but all these arguments are at best public policy arguments best suited in a balancing
    exercise.

    They have no place in the probable cause determination.

    It may well be that a court is prepared to carve out another exigency exception in internet-crime-anonymity cases, but until the court explicitly carve out another exception, the totality of circumstances test should not give the government a free hand just because there is an IP address.

    link to this | view in thread ]

  110. identicon
    Anonymous Coward, 28 Aug 2011 @ 2:19pm

    Re: It seems to me


    It seems to me that if I want to do criminal activity on the internet and provide myself a alibi running a TOR exit node would be a good cover.





    Yes, and because criminals may use a tool or the presence of plausible deniability to avoid responsibility, the law should simply presume everyone claiming deniability are likely criminals.

    By that logic no defense should ever be available if it tends to benefit criminals or let some criminals go free.

    However, under our system of law, the onus is on the prosecution to prove guilt beyond a reasonable doubt, not the defendant's responsibility to prove that he is not guilty.




    I have only used TOR so that I could watch TV shows using a static exit node located in the USA. This ended when TOR cut off streaming through TOR. For
    what other purposes is TOR utilized?




    Please could you post your name, address and phone number, and promptly report to nearest police station. You are likely guilty of criminal copyright infringement or breaking the content provider's terms of service - itself a crime under The Computer Fraud and abuse Act.

    Avoiding data retention or snooping by your ISP is not illegal, and people have a right to hide themselves from the government - absent any law to the contrary.

    link to this | view in thread ]

  111. identicon
    Anonymous Coward, 28 Aug 2011 @ 2:30pm

    Re: Re: Re: Re: Re: Re: Re: Re: Re:

    It's likely that the Supreme Court would rule that running
    a Tor exit node under most circumstances gives rise to probable cause, but until there is a black and white ruling from the court on that issue, the EFF isn't wrong as a matt of law, or deliberately lying.


    If there's child porn coming from your IP address, there's probable cause whether you run a Tor exit node or not. It doesn't take the Supreme Court to say as much as a matter of law to make the EFF's position misleading.

    link to this | view in thread ]

  112. identicon
    darryl, 28 Aug 2011 @ 4:24pm

    he is still breaking the law... it's very simple....

    everyone knows if you trade in stolen goods you are equally guilty of the crime of theft.

    therefore you assume the same liability, risks and responsibilities as all the other liable parties.

    It is illegal to be complicit in the knowing conduct of a crime, and operating a TOR node you would have to have a clear expectation that you computer, at your location is being used in the conduct of a committing of a crime.

    link to this | view in thread ]

  113. identicon
    Anonymous Coward, 28 Aug 2011 @ 6:41pm

    Re: he is still breaking the law... it's very simple....

    Bwahahahahahha! ... Oh, wait, are you serious? SNRK! BWAHAHAAHAHAAHAHAHAAHAHA!

    link to this | view in thread ]

  114. identicon
    Anonymous Coward, 28 Aug 2011 @ 6:44pm

    Re: Re: Re: Re: Re: Re: Re: Re:

    Explain to us how running legal software is 'probable cause,' then? Seems a huge stretch, and that is the issue.

    link to this | view in thread ]

  115. identicon
    Anonymous Coward, 28 Aug 2011 @ 6:46pm

    Re: Re: Re: Re: Re: Re: Re: Re:

    Problem with your analogy and reality is that no due diligence was done. There was a possibility, very remote, that he knew something was going on. Instead of getting a warrant and seizing all of his equipment right away, why not due some REAL due diligence in the form of proper investigation? Jumping to conclusions just makes them look bad for targeting an innocent party.

    link to this | view in thread ]

  116. identicon
    Anonymous Coward, 28 Aug 2011 @ 7:29pm

    Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:

    There is so much wrong with this that it's just scary. An IP is not a definite identifier. This has been discussed over and over on this site, alone. That you think that it is basically tells us that you have no understanding of the technology, anyways.

    link to this | view in thread ]

  117. identicon
    Anonymous Coward, 28 Aug 2011 @ 10:41pm

    Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:

    Really so every ISP out there can have their equipment seized now? Google, Facebook, Microsoft, Amazon, Craiglist and others will have their servers seized too?

    If offering a server to others is enough to have probable cause how long until someone seize others business servers?

    link to this | view in thread ]

  118. identicon
    Anonymous Coward, 28 Aug 2011 @ 10:54pm

    Re: Re: Re: Re:

    They are supposed to watch it to see if a pattern emerges if it comes only from that node regularly there is something to it, if not there is no probable cause.

    There is probable cause to start an investigation, not to seize equipment.

    Why don't they seize the servers from AT&T?

    link to this | view in thread ]

  119. identicon
    Anonymous Coward, 28 Aug 2011 @ 10:57pm

    Re: It seems to me

    I use it everyday to surf the web, I don't want my ISP and the government to know where I go or what I'm reading it is none of their business.

    link to this | view in thread ]

  120. identicon
    Anonymous Coward, 28 Aug 2011 @ 10:59pm

    Re: Re: Re: Re:

    Not probable enough. because if it was everyone who puts a server to service others is also risking having their servers seized or is the law selective now?

    For Google, Microsoft, Amazon, Verizon, Comcast, Netflix, etc the law is one and for others the law is different?

    link to this | view in thread ]

  121. identicon
    Anonymous Coward, 28 Aug 2011 @ 11:02pm

    Re: Re: Re: Re:

    The same can be said about you.

    link to this | view in thread ]

  122. icon
    bratwurzt (profile), 29 Aug 2011 @ 2:10am

    Re: Re: Re: Re: Re:

    TOR is not good for filesharing, since it's so slow.

    Fixed that for you:
    Filesharing is not good for TOR since it slows it down.

    ;)

    link to this | view in thread ]

  123. icon
    bratwurzt (profile), 29 Aug 2011 @ 2:46am

    Re: Re: Re: Re:

    I think the EFF is outright lying when they claim an "IP address alone is not probable cause that a person has committed a crime." I can find lots of judges who thought otherwise.

    And therein lieth the problem - EFF know its technology jargon while judges ussually don't know, what link actually is (a pointer. That points to data. Which isn't always there where link points.).

    In your country lobbying is like an appetizer before main dish called law and/or politics is thrown on a table. Everybody likes money and judges are no exception. And so they understand hard topics (like torrenting - link to other LINKS! argh!) in terms of "who shouts more money my way, wins".

    If you have a "couch surf" at your home - are you liable for what a potential wacko does, while you're not watching him/her (e.g. when not on your couch). Also - is GPS trace from a month ago your actual location? Why am I asking this? Google "dynamic IP address".

    In a perfect world, judges would be forced to use experts on things they're not experts on themselves. Expert witnesses should NOT include recording industry shills and payed off ex-politicians.

    link to this | view in thread ]

  124. icon
    bratwurzt (profile), 29 Aug 2011 @ 4:03am

    Re: Re: Re: Re: Re:

    hehe, geek alert! ;)

    link to this | view in thread ]

  125. icon
    bratwurzt (profile), 29 Aug 2011 @ 4:06am

    Re: Re: Re: Re:

    And you are? With AC comments here, on Techdirt. Where AC comments are statistically most valued ones...

    Mike, I'd love a function of wikiwatcher here. All these payed anonymous Diebolds are getting really annoying...

    link to this | view in thread ]

  126. icon
    bratwurzt (profile), 29 Aug 2011 @ 4:19am

    Re: Re: Re: Re:

    Or you can do what I do, which is run a Tor exit node on a foreign server paid for with anonymous funds.

    Irony much? You wouldn't recommend running a TOR exit node, but you do run it, in a big Onion way. You are TOR-ing your tor exit node. Why? Do you have anything to hide?

    "adding something to the conversation" sometimes happens, when you act childish and lash at apologists. Not always (since it's a troll technique) but usually integrity of a poster is higher, when they aren't afraid when all of their posts connects them to one identity. You know - a profile. Well, there are exceptions - out_of_the_blue could be one...
    :)

    link to this | view in thread ]

  127. icon
    another mike (profile), 29 Aug 2011 @ 2:18pm

    Re: Re:

    I don't think that Tor is going to have a very long life span.

    And yet...

    If they want to start that arms race, it'll happen just like the pointless fight against file-sharing networks. Tor is already decentralized and encrypted. The next version of Tor would add rotating exit nodes, cycling through its network for that next level of difficulty to break it.

    link to this | view in thread ]

  128. identicon
    Anonymous Coward, 30 Aug 2011 @ 5:38am

    Re: Re: Re:

    fuck that shit. We use tor to beat censors in oppressive regimes. Even the C.I.A funds parts of it. Anybody wanting to shut it down is clearly working for the government of China or Iran

    link to this | view in thread ]

  129. identicon
    Anonymous Coward, 30 Aug 2011 @ 11:51am

    Re: Re: Re: Re:

    Tor exits do not place content on your computer, so this is not a way to avoid prosecution.

    link to this | view in thread ]

  130. icon
    PaulT (profile), 30 Aug 2011 @ 2:06pm

    Re: Re: Re: Re: Re: Re: Re: Re:

    An astoundingly poor analogy. The IP address would identify a piece of equipment, not a person. It may help as a lead to find who sent it, but it would be useless to identify that person. You might be able to use it to narrow down the router, ISP or modem used but you wouldn't get the specific person unless they happened to be using their own connection to send the information.

    In this case, the IP address you supplied seems to be assigned to the Danish Ministry Of Education. Would you just round up the Danish Education Minister, or would you rather do some investigation to see which person was actually using that IP at the time?

    Besides, in that analogy, why would you even go after the person sending the message? Wouldn't you rather be checking that bus out instead, or at least spend the time getting grandma out of the house?

    link to this | view in thread ]

  131. icon
    btr1701 (profile), 30 Aug 2011 @ 3:16pm

    Re: Re: Re: Re: Re: Re: Re:

    > Then why can you be guilty of possessing
    > child porn if you didn't know that you were
    > possessing child porn? (same thing for
    > illegal drugs)

    If that were true, the simple answer would be, because the law doesn't have an intent require for possession like it does for distribution.

    However, even for possession, you have to have intent/knowledge. If someone slips a bag of cocaine onto your boat without your knowledge, you're not guilty of possession.

    This is why major airlines and cruise lines, for example, don't lose their planes and ships and their captains and crews aren't arrested when a passenger is found on board with illegal drugs. They had no knowledge; they're not guilty of possession.

    link to this | view in thread ]

  132. identicon
    Joe, 31 Aug 2011 @ 1:10pm

    Re:

    It's by design. Move along, there's nothing to see here.

    link to this | view in thread ]

  133. identicon
    Joe, 31 Aug 2011 @ 1:27pm

    I2P

    Stories like this are why I use I2P instead of TOR. I don't have the outbound proxy enabled... It's too easy of an excuse for someone to deliberately make a lot of requests on a computer running TOR to a honeypot. Then they can claim every single IP address that accessed it is a kiddy fiddler and harass the TOR exit node operators. This is the #1 reason that TOR is obsolete. Just run a hidden service and don't worry about the open Internet, if you're so worried about censorship or 'disappearing' for saying something someone doesn't like.

    link to this | view in thread ]

  134. identicon
    Anonymous Coward, 7 Sep 2011 @ 9:55am

    Re:

    Sounds about right.

    link to this | view in thread ]

  135. identicon
    Harlan Sanders, 7 Sep 2011 @ 9:57am

    Re: Re:

    It's been around for 9 years now... That's a fairly long time.

    link to this | view in thread ]

  136. identicon
    Harlan Sanders, 7 Sep 2011 @ 10:02am

    Re: Re: Re:

    Sure. Safe harbor has been tested in federal court many times for ISPs, shared hosting providers, file download sites, email providers, VPN providers, and various other businesses that I may not know about. Safe harbor for carriers is enshrined in law and has been challenged many times by the MAFIAA.

    Personally, I have no inclination to run a TOR exit node because I know the pigs make mistakes and are willfully ignorant about what TOR is and how safe harbor applies and I don't want to subject myself to harassment and having to go to court and use that defense. The defense works and is well tested, but it's still a pain in the ass because you have to go to court.

    link to this | view in thread ]

  137. identicon
    Harlan Sanders, 7 Sep 2011 @ 10:14am

    Re: Re: Re: Re:

    "A safe harbour is a provision of a statute or a regulation that reduces or eliminates a party's liability under the law, on the condition that the party performed its actions in good faith or in compliance with defined standards. Legislators may include safe-harbour provisions to protect legitimate or excusable violations, or to incentivise the adoption of desirable practices." (Wikipedia)

    TOR operators cannot know what passes through their machines, and so they operate their service with good faith that what passes isn't bad content. On the face of it TOR operators do only what is technically possible (read nothing) to filter bad content. As long as it remains impossible to observe that traffic and TOR is not criminalized (which I don't think routing can be banned, but it's the US who knows) they are eligible for safe harbor protection.

    The EFF was able to argue that (and this was multifaceted for them to get that computer back):

    1. IP != person because there was a TOR exit node.
    2. TOR exit node operators are eligible for safe harbor protection. And their ISPs are eligible as well. Everyone's protected!

    If you want to see how the defense for a TOR operator works read this: http://www.torproject.org/eff/tor-dmca-response.html

    Otherwise just keep speculating and just keep being wrong.

    link to this | view in thread ]

  138. identicon
    Harlan Sanders, 7 Sep 2011 @ 10:25am

    Re: Re: Re: Re: Re:

    It's not ignorance of the law, but rather, ignorance of what the content is. If there's no way for a reasonable person to determine whether the person appearing in the alleged child pornography is a child without carding that person, that's a fair defense according to the AC above. Where that defense applies is very much so limited in scope to pornography, and thus not subject to your strawmen about drug distribution.

    link to this | view in thread ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.