Courts, DOJ: Using Tor Doesn't Give You A Greater Expectation Of Privacy
from the IP-addresses-all-the-way-down dept
When is a reasonable expectation of privacy unreasonable? When the government says it is.
In this month alone, we've had two federal judges and the DOJ state that there's no expectation of privacy in IP addresses. This would normally be something covered by the Third Party Doctrine -- where an IP address is part of the records retained by ISPs, and therefore, can be accessed with subpoenas rather than warrants.
The twist, though, is that all of these statements were made in reference to people who made an active effort to obscure their IP addresses by using Tor.
On February 1st, the judge presiding over the Jay Michaud case -- the one where the FBI (for the second time in recent history) ran a child porn website for two weeks in order to gather evidence on visitors to the site -- stated that Tor users had no reasonable expectation of privacy, despite their privacy-protecting efforts. Michaud was challenging the FBI's use of a standard warrant to deploy its NIT (Network Investigative Technique) -- a piece of malware that gathered information about computers connecting to the child porn website.
US district judge Robert J. Bryan denied the motion, noting that while the warrant technically violated the rule, a higher court's interpretation provides an exception for when the information sought could have been discovered by “other lawful means."In doing this, the judge agreed with the assertions the DOJ made in its earlier motion. The DOJ claimed Michaud's IP address was something he shared with third parties -- despite his use of Tor -- and was info the government would have eventually discovered one way or another, even without the use of its controversial hacking tool.
To prove this, the judge bizarrely argued that Tor doesn't give its users complete anonymity because a user has to give their IP address to their Internet Service Provider to connect to the Tor network. Therefore, he concluded, Michaud's IP address was “public information, like an unlisted telephone number” that “eventually could have been discovered.”
“[E]ven if a defendant wants to seek to hide his Internet Protocol address through the use of Tor, that does not cloak the IP address with an expectation of privacy,” the government wrote, in a statement very similar to the opinion later written by Judge Bryan. “While Michaud may have a reasonable expectation of privacy in stored information contained on his computer, he lacks a reasonable expectation of privacy in IP address information that belongs to an internet service provider and that is voluntarily shared with others in the course of Internet communications.”The interesting thing about this assertion is that Michaud voluntarily shared his IP address with others. It would seem fairly obvious there was nothing "voluntary" about this exposure. While it's true that IP addresses are "shared" with Tor when connecting, that information is stripped from communications as they travel through the Tor network.
The government argued the NIT merely rerouted this information to the FBI before Tor stripped it. Michaud apparently should have known his use of a privacy-protecting network would perhaps expose his IP address to others, including the FBI.
But as Tor itself states, without intervention from other parties, this information would not be collected by Tor, nor passed along its network.
It is clear that the court does not understand how the Tor network works. The entire purpose of the network is to enable users to communicate privately and securely. While it is true that users "disclose information, including their IP addresses, to unknown individuals running Tor nodes," that information gets stripped from messages as they pass through Tor's private network pathways.This statement is in response to another judge's declaration that people who utilize additional privacy protections when browsing the web still have no expectation of privacy in their IP addresses. This nearly-identical assertion was made by the judge presiding over the Silk Road 2.0 prosecution of Brian Farrell. In this case, the Defense Department (home of the NSA!) paid Carnegie Mellon researchers to attack the Tor network in order to expose identifying info about its users. The FBI followed along behind the DoD, firing off subpoenas to obtain this newly-discovered information.
The judge in this case wrote:
From the record, it appears the only information passed on to law enforcement about the defendant was his IP address. There is nothing presented by the defense, other than rank speculation, that anything more was obtained by SEI and provided to law enforcement to identify the defendant.The court goes on to say it's too bad Tor users expected more protection from the service, but their expectations are not "reasonable" under the Fourth Amendment.
The Court agrees with the government that applicable Ninth Circuit authority precludes the defendant’s success on his motion. SEI’s identification of the defendant’s IP address because of his use of the Tor network did not constitute a search subject to Fourth Amendment scrutiny. The Court reaches this conclusion primarily upon reliance on United States v. Forrester, 512 F.2d 500 (9th Cir. 2007). In Forrester, the court clearly enunciated that: “Internet users have no expectation of privacy in …the IP address of the websites they visit because they should know that this information is provided to and used by Internet service providers for the specific purpose of directing the routing of information.”
In the instant case, it is the Court’s understanding that in order for a prospective user to use the Tor network they must disclose information, including their IP addresses, to unknown individuals running Tor nodes, so that their communications can be directed toward their destinations. Under such a system, an individual would necessarily be disclosing his identifying information to complete strangers. Again, according to the parties’ submissions, such a submission is made despite the understanding communicated by the Tor Project that the Tor network has vulnerabilities and that users might not remain anonymous. Under these circumstances Tor users clearly lack a reasonable expectation of privacy in their IP addresses while using the Tor network. In other words, they are taking a significant gamble on any real expectation of privacy under these circumstances.A subjective expectation of privacy is in no way comparable to the historic view of the objective, reasonable expectation of privacy. Tor users may be taking extra steps to obscure their IP addresses, but two court rulings clearly state the judicial system won't be granting them any "extra" protection from government subpoenas. In fact, these rulings simply make it easier for the government to defend the intrusive techniques it deploys to unmask Tor users by declaring that, underneath it all, it's all about IP addresses, rather than users taking proactive steps to better protect their privacy. It's not quite a blank check for hacking, but it's close. As long as the target is information not historically awarded Fourth Amendment protections, courts will be hard-pressed to question the means used to achieve these ends.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: 4th amendment, courts, doj, expectation of privacy, privacy, tor
Reader Comments
Subscribe: RSS
View by: Time | Thread
Moreover, TOR is in many ways a form of "security by obscurity", hiding yourself in the shadows of others. But realistically, it means you share at least part of your websurfing (and whatever) not only with your own ISP, but now with a third party you don't even know and with whom you have absolutely not contract or privacy expectations.
Your expectation of privacy here should be as low as possible - you are asking people you don't know to keep your secrets.
[ link to this | view in thread ]
Orwellian
So he admits there is no need for unethical hacking, but hey... terrorists.
[ link to this | view in thread ]
Context
Fwiw, I agree that there's no expectation of privacy on the 127.0.1.0/24 network. Potentially vulnerable client software should probably be spun up in a virtual environment, with no other access or knowledge other than the interface of its proxy.
Alternatively, the 192.168.1.0/24 network can be used for physical isolation.
[ link to this | view in thread ]
Those who do not use Tor, have no rights
Let's take it into another arena: houses. Two people, Joe and Sam, each have a house. Joe leaves his house unlocked, in fact, he doesn't even have locks on the door. On the other hand, Sam has purchased and uses expensive high security locks.
So, given that scenario, should the government simply be able to walk into Joe's house and search whatever they want? No?
Are you suggesting that Joe has the same Fourth Amendment right as Sam to be secure in his house from search and seizure? Then it follows that Sam has no greater rights than Joe, despite Sam's expensive locks. Before searching either house, the government should have to meet the same legal standard, obtaining the same warrant.
Any other conclusion is unacceptable, for it leads to the idiotic conclusion that those who do not use Tor, have no rights. The rights belong to the person, not to the person's methods of protection.
[ link to this | view in thread ]
Time to wake the "judges" up a bit...
Let's see how long this "decision" stands...
Bwah hah hah hah hah
[ link to this | view in thread ]
Re:
IP addresses can be spoofed.
Wireless access nodes can be hacked.
MAC addresses can be spoofed.
Remember, multiple judges have handed down decisions that CLEARLY state that an IP address cannot identify a person.
Period.
[ link to this | view in thread ]
Re: Re:
https://www.techdirt.com/articles/20130218/21462222020/yet-another-court-says-ip-addresses-are- not-enough-to-positively-identify-infringers.shtml
http://techland.time.com/2012/05/07/you-are-not-an -ip-address-rules-judge/
https://torrentfreak.com/ip-address-not-person-140324/
https://torrentfreak.c om/judge-an-ip-address-doesnt-identify-a-person-120503/
http://www.skipease.com/blog/peoplefinder/ip- address-identify-people/
Just to name a few...
[ link to this | view in thread ]
He isn't wrong.
[ link to this | view in thread ]
Re: Those who do not use Tor, have no rights
[ link to this | view in thread ]
Re:
You fucking address. By your own fucking logic your mail should be fair game.
A TOR exit node (hell any routing device or endpoint) is the same principal. Just because those are public does not mean that your encapsulated messages should be considered public information either.
[ link to this | view in thread ]
Aw crap.
[ link to this | view in thread ]
Taking a gamble
Nothing is perfect. Any system might have vulnerabilities or become compromised. By this reasoning, there is no expectation of privacy anywhere. People should should realize that that their homes *might* be bugged and thus expect no privacy there either. Or that their medical records *might* someday be leaked. Etc, etc, etc.. Bye bye, pesky 4th amendment.
[ link to this | view in thread ]
Re: Aw crap.
[ link to this | view in thread ]
Re: Re: Those who do not use Tor, have no rights
[ link to this | view in thread ]
Re: Those who do not use Tor, have no rights
But in other contexts, a reasonable expectation of privacy was found for people merely speaking in hushed tones and covering their mouths, when they were speaking on the courthouse steps (where that would not have been found if they had been speaking loudly.) In many cases, putting up a fence around your front yard actually DOES stop law enforcement from passing that point without a warrant, whereas if you have no fence they can walk up to your door and at least knock on it. So, sometimes that lock matters.
I'm not so sure that you give up any expectation of privacy just because of a theoretical weakness. Yes, the person knows Tor has weaknesses, but in the end so does a 12-inch thick titanium door with biometric access and security guards. And if I uncover the identity of an undercover officer by spying on his Internet activity, do you think they'd buy my argument that the officer was publicly declaring he was an officer by sending an email to his superior, even if he used something like Tor?
[ link to this | view in thread ]
Re:
To say anything else is disingenuous.
[ link to this | view in thread ]
Re: Re: Re: Those who do not use Tor, have no rights
MAC addresses are used at a layer underneath the IP datagram layer.
In short, when you say that a ‘MAC address [is] encoded into every TCP/IP packet’, you are not just using language in a too-loose fashion, you are indicating a lack of basic knowledge about something that you really ought to understand.
(*) Networking 101: Links found with a quick google. My introductory course had a much better textbook, but I don't think that hardcover textbook is available online.
[ link to this | view in thread ]
My potential objections
- As I see things here, the problem should not be about the expectation of privacy about the IP address, as much as about the means used to collect it. If the government can use any means and justify it afterwards saying it's about "public information", then there simply is no such thing as "privacy" or fourth amendment on the internet.
- This also conflicts with care about cops who prohibit people from filming them.
A public agent performing public duties in a public place has expectations of privacy.
A private individual on private business in a public space while trying to limit the private information he shares... has none?
That's all kinds of crazy. Someone should really explain everyone what a "reasonable expectation of privacy" is. We can't let government decide that it only applies when it says it does.
[ link to this | view in thread ]
Re:
I agree with this. I'd liken it to standing on the sidewalk of a street you've never been to on the seedy side of town. You hope no-one you know sees you while driving by. Until then, your privacy is ensured by your anonymity. Good enough.
I'm not asking them anything but to ignore me like they do everyone else. Just move the packets.
[ link to this | view in thread ]
Re: Context
If you're already on localhost, you don't need the network. Physical access == no security.
[ link to this | view in thread ]
Re: Those who do not use Tor, have no rights
[ link to this | view in thread ]
Re: Re: Context
127.0.0.1 localhost
[ link to this | view in thread ]
[ link to this | view in thread ]
Re: Re:
If you can capture the exit node data of the DoD or FBI, then yes you can legally have their IP address, but you can't then get into their system without a warrant.
I don't agree with the courts warrant, but disagree with your analogy even more.
[ link to this | view in thread ]
Re: Re: Re: Context
IPv4 network standards reserve the entire 127.0.0.0/8 address block for loopback purposes. That means any packet sent to one of those 16,777,214 addresses (127.0.0.1 through 127.255.255.254) is looped back.
[ link to this | view in thread ]
Expect privacy only when you can guarantee it.
Get to work.
[ link to this | view in thread ]
Re: Re:
Remember: when you browse the internet, headers are sent on every request. Things like plugins that are active, the particular version of your browser, your OS... those are things that are regularly included. Google and others have proven that it's just about enough to identify you down to the person - not in the legal sense, but in the "jamming ads in your face" sense. It would make it reasonably easy to differentiate between say a laptop, a desktop, and a tablet at a given location.
[ link to this | view in thread ]
Re: Re:
Exactly the point: TOR (and other such concepts) give you a certain amount of privacy, kind of like Groucho glasses would (now there's an old style reference). The sense of privacy is perhaps more in your head than in reality.
It's really a no brainer - you are purposely asking someone to hide you. At that moment, you are already exposed to them. Your secret is in their hands, no longer in yours, so your privacy is already broken in many ways.
[ link to this | view in thread ]
Re: Re: Re:
[ link to this | view in thread ]
[ link to this | view in thread ]
Re:
Use of a TOR system may be only a token effort at privacy, but it's a far more intensive one than merely closing the door of a phone booth.
[ link to this | view in thread ]
Closing the phone booth door gives an expectation of privacy for the content of your conversation, but not the number dialed which can be retrieved from the operator at will.
Speaking in hushed tones in a small group gives an expectation of privacy to the words spoken, but not the identities of the people in the group.
The contents of the mailed envelope is private, but the destination and return addresses are not.
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re: Re: Those who do not use Tor, have no rights
So houses were chosen specifically because the courts do recognize a right for that domain, just as a right is recognized for certain wiretaps.
[ link to this | view in thread ]
Re: Re: Re: Those who do not use Tor, have no rights
But in houses, the openly visible doctrine applies only to those things that can be seen through windows or doors, which the officer may not open; and indoors only if the officer has a legal right to be indoors. Established law is that the officer cannot open a door to enter unless certain reasonable causes are in effect. If the doors are closed (but unlocked) the officer would have no grounds to enter and view anything.
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
It's time to change whose in charge .
Unfortunately they will not go quietly into the night .
[ link to this | view in thread ]
Re: Re:
There you go, spoiling things with the truth.
[ link to this | view in thread ]