[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework
On 12/18/2013 11:18 PM, Jim wrote:
> spaceman wrote:
>>> From what I got they simply used timings:
>> 1. They knew when the email arrived give or take (from headers).
>> 2. They knew who connected to Tor at that particular time (from
>> network logs).
>> Even on college campus there might be a couple of Tor users. I would
>> have used SSH to get to a 'unmonitored network', Tor and then mixmaster.
> But the email could have come from anywhere. It didn't have to
> originate on the campus. Then a timing correlation could link to
> somebody who was merely unfortunate enough to be accessing Tor at
> approximately the same time as somebody who was doing something
> nefarious. I have certainly had the misfortune of being in the wrong
> place at the wrong time and this is just a cyberspace equivalent of that.
Police are trained in how to manipulate suspects into confessing. And
most people have no clue how to deal with that. It's not so bad for the
innocent. They can just be natural. But, for the guilty, it's much^N
harder. It takes skill to convincingly feign innocence.
As Ted Smith noted: "The moral of the story is, never talk to police
other than to say you want a lawyer." That's the appropriate answer
whether you're innocent or guilty.
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to