The People Who Risk Jail to Maintain the Tor Network

Posted: May 3, 2015 by gamegetterII in Uncategorized

Richard* had a long drive ahead of him. About an hour earlier, at 5:30 AM, his wife Lisa* had phoned.

“The house is filled up,” she said in a calm but audibly tense voice. Richard, having just woken up and now trying to make sense of the call, thought there must have been another water leak in the basement.

Instead, his wife told him, the house was full of FBI agents and they wanted to talk to Richard.

“Okay, I’m on my way,” Richard said. He threw on some clothes, grabbed his laptop and phone as requested by the FBI, and stepped out into the night. The interstate drive from Milwaukee, where he was working as a software engineer, back to his home in Indianapolis would take a good five hours, more than enough time to figure out what this was all about.

It was something to do with computers, Lisa had said. The only thing Richard thought may be linked to that was his Tor exit node.

The Tor network—originally a project fund​ed by the US Navy—is a collection of servers, some big, some smaller, spread across the world. When a user connects to the network, her internet traffic is randomly pinged between at least three of these servers, all the while covered in layers of encryption, making it near impossible for anyone monitoring the traffic to determine who is sending it or where it is going to.

It allows dissidents to communicate anonymously, citizens to bypass government censorship, and criminals to sell drugs or distribute child pornography. Tor also facilitates special sites called “hidden services,” part of the so-called dark web. These allow the owners of websites and their users to remain largely anonymous.

The final set of servers that Tor uses in this process are called “exit nodes,” because they are the points at which a user’s traffic exits the Tor network and joins the normal web that we use everyday.

Rather than being run by one company, most of these exits are set up by volunteers, or “operators.” A few organizations maintain the larger exits, a number of universities have their own, and individual activists run some too. Edward Snowden rep​ortedly had one.

Richard was one of these operators.

Richard’s exit could have been implicated in just about anything

Although Richard, 57, assumed the call was related to his exit, he still didn’t know what specifically the FBI was investigating as he started the drive home.

“A child porn ring had been busted? Or a hacking attack? Or a bomb threat called in? I had no idea what it was,” Richard later told me over the phone.

When someone uses Tor, his IP address is that of the exit node he has been randomly assigned. This means that if someone emails a death threat, or sends a barrage of spam, it is the exit node’s IP that appears when the authorities start investigating the digital fingerprints of the crime. Richard’s exit could have been implicated in just about anything.

However, Kurt Opsahl, the deput​y general counsel of the Electronic Frontier Foundation (EFF), believes that running a Tor exit is legal, at least under US law.

But if an operator runs an exit from his or her home, and on their own internet connection, “they may be confused with being the source of the traffic, instead of an exit node of the traffic,” Opsahl told me. To anyone looking at activity flowing from the exit—whether that’s child abuse material, or an attempt to hack a website—it looks one and the same as the operator’s own personal usage. This could lead to a raid on the operator’s house, even though running an exit is arguably legal.

For this reason, and ​others listed on the Tor Project website, operators are strongly advised to only run their exits remotely, by renting out server space.

This is what Richard did. Through a St. Louis-based company, his Tor exit had been whirring away in a German data centre for 18 months. But it appears that wasn’t enough to stop a raid on his house.

A section of the search warrant obtained by Motherboard, showing that the FBI were searching for malware, computer forensics programs and other pieces of evidence.

Back in suburbia, the FBI agents questioned Lisa. Why did the family rent so many cars? Why was Richard renting so many computers? Lisa, a salesperson for the computer networking firm 3Com Corporation, breezed through the more technical questions from the agents.

The raid had started before dawn. After turning up in eight unmarked law enforcement vehicles, the FBI agents pounded on the door and swarmed the house, automatic weapons drawn. They didn’t even let Richard’s sister-in-law turn on the coffee pot until the area was declared “secure.” A team of computer experts entered the property after the initial FBI squad. According to the search warrant obtained by Motherboard, they were looking for evidence of unauthorized access of a computer, theft of trade secrets, or conspiracy to do the same.

The experts seized the household server and a personal desktop computer, both running Linux. Noticeably, they left the other two Windows machines. After taking the computers, the agents conducted a more thorough search. One agent even looked behind a painting to see if anything was hidden. Although the rest of the house was left in a tidy state, Richard’s office had been torn apart, he told me after he had seen the effect of the raid.

This wasn’t the first time an operator had received a visit from law enforcement.

In 2013, police raided the home of William Weber, an Austrian IT administrator, and confiscated 20 computers, gaming consoles and other devices because child pornography had been transmitted across one of his many exits.

Read the rest @ http://motherboard.vice.com/read/the-operators?trk_source=popular

Comments
  1. If they only spent a fraction of this energy in trapping terrorists or bent politicians the world would be one happy place.
    Only they don’t, preferring to quash free speech instead.

    Like

Leave a comment