Talking to German police in Stuttgart
In early January after 24C3, I travelled to Stuttgart to meet with the police there. I spoke to about 30 or 40 investigators. My goal wasn't to advocate for any particular laws or policies (that's up to them, after all), but rather to help give them background so they can make more informed decisions: explain who uses Tor and how it works, and try to answer any questions that come up. In particular, my goals were to open a discussion about the data retention laws, and also brainstorm how German Tor operators and German law enforcement can get along better.
It turns out that the fellow who did the September 2006 seizures was part of this group, and he was very interested to talk to me and learn more about Tor.
They explained that the data retention laws *they'd* asked for were basically that large ISPs should be required to answer them when they ask who had a given IP address at a given time (data the ISPs already keep for the most part), and as a bonus, it would be nice if they paid somebody to answer the requests on weekends too. The law that they got was way more than that, and they don't need or want most of it.
I tried to get them to be more public about the fact that they don't need most of the law they got, but they explained that there was a process, and their role was to tell the authorities what new powers they need. Now it's up to other folks (like the CCC) to make sure that the final version of the law isn't too bad.
And I can understand why they're reluctant to speak against it. First, there are probably political problems with publically disagreeing with the folks in charge. And second, they really do want the powers they asked for, and they worry that if they speak up then the whole thing might be killed.
Overall, they were nice and reasonable people. We left with three takeaway plans:
1) Tor should expand its exitlist.torproject.org system so there's an interface for asking "was this IP address a Tor exit relay in the past few months?" The goal is to give them an easy way to answer the question "is it not worth breaking down another door?" which will save them time and save Tor operators hassle.
2) They thought it was quite clear that Tor relays weren't included as "server providers" in the upcoming data retention laws. They offered to talk to a state prosecutor in their area to try to get a public statement to that effect. I'm not optimistic (it's hard to ever get the government to publically say anything), but that's a fine start.
3) They will tell other German police groups about me, and maybe I'll visit others at some point.
Comments
Please note that the comment area below has been archived.
I've only just found this
I've only just found this blog and I should like to say that the feedback from the German police that you received is very encouraging. It gives a jaded misanthropes like myself a little more reason to believe in humanity.
I give you my heartfelt thanks for doing this, it benefits all of us.
Same Here
Thank you, and thanks to all the Tor staff and volunteers for what you are doing to deter the internet from the Orwellian path that commerce and various Congresses have set our feet upon. It's groups like Tor and the EFF that are fighting to help preserve and protect privacy rights for all of us, in every country. Your German trip is a case in point.
My only wish is that you could do some form of advertising, as I happened across this page by chance. I am convinced that, as others discover how valuable this service is, its usage (and hopefully, relay volunteers) will grow immediately.
Good luck, and thanks again!
anonymity compromised by ISP?
Can Tor do anything with this trend?
http://www.washingtonpost.com/wp-dyn/content/article/2008/04/03/AR20080…
Encryption? of outgoing packets?
Yes, Tor can protect against that
That's one of the standard use cases for Tor -- protection from your local
ISP if it wants to watch what you're doing, sell it, combine it with other
databases, decide which websites you can reach and which ones you
can't, etc.
Plenty of people use Tor every day for simple data hygiene. See e.g.
https://www.torproject.org/torusers#normalusers
Tor network presence history data
Regarding your number 1 takeaway from this meeting with the German police in Stuttgart, I have now added a first cut at answering this question by showing what I am calling "Tor network presence history" data along with the existing Tor network node data we display on showmyip.com (and ippages.com for subscribers).
Initially I have set this up as with a 7-day default, meaning you can see when and whether an IP address has been part of the Tor network over the previous 7 days, not just as of right now. Applicable exit policies, contacts, versions, platforms, and bandwidths for each "published date and time" are also shown. Subscribers (a mere $20 for 20,000 lookups) get access to 31 days and can specify any previous date.
For example, try the following:
http://www.showmyip.com/?node=peacetime
Or if you are a subscriber, try this:
http://www.ippages.com/?node=blutmagie&date=20080131
Data retention laws
I am a member of the IT-Political Association of Denmark (IT-Politisk Forening, http://www.itpol.dk/presentation-of-it-pol), and the organisation and its members have been working a lot with the data retention laws, as they were effective in Denmark from 15. september 2007. I have two key points to add to this blog post, focusing on the Danish state of affairs, but maybe useful to people outside Denmark (because of the international laws etc.):
1) In a meeting with the boss of NITEC (Nationale IT-efterforskningscenter, the National IT-Investigationcentre), he said that they is no reason to investigate much further on a given IP-address if that IP-address is belonging to a known Tor exit-node.
2) Concerning plan #2 in the blog post: we have an official statement from the government of Denmark (IT- og Telestyrelsen, http://www.itst.dk/) that Tor servers and relays are not server providers, and therefore do not have to log anything.
If anybody has any questions regarding any of this, feel free to contact IT-Political Association of Denmark by email at the address bestyrelsen[--AT--]it-pol.dk , perhaps mentioning this blog post and comment.
Regards,
Markus
sounds good so far
i wasnt expecting the german police officials you talked with to give the answers that they gave. a little cynical yes but with reason. from what they did tell you, everything sounds promising though
to post where, please...?
Hello all,
despite the best school-education one can get in Germany, I do not only feel stupid, but mainly helpless, when reading this. ANY OF THIS...!
Where, please, is the right place to ask about TOR and what it can do? Simple question that is, nothing specific at all!
Reading alone - I tried - won´t help me, I need guidance from some nice male who doesn´t are I'm a blond...!
I am permanentally kicked from a "macho-blog". My simple question is 2-fold:
1.) Can TOR help me to re-register there in disguise?
2.) Is there any helpful soul out there, ready to guide me through the early steps, helping me to re-register at this forum?
Most likely I put this one in the wrong "place". Please excuse me, I couldn´t find any other, any better place.
Giving you my REAL address, I might lead the whole TOR-idea "ad absurdum". Still, for better communication and to avoid boring all you specalists, I´d prefer you contact me under: gandharainfoATaol.com
thank you, guys
Blond-and-not-so-anonymous
re: where to post
well ...
you get the vidalia bundle.. for what ever operating system you use,
get it running.
firs turn on privoxy, then vidalia, for my noobish understanding, the privoxy default configuration is ok so far in terms of leading about all your browser traffic through tor. make it do this by pressing the torbutton, which is part of the installation.
it causes you firefox to lead traffic through privoxy.
!!!!!!! DISABLE COOKIES; JAVA; JAVA-SCRIPT; HISTORY!!!!!!!!!!
type "about:config"
->gets the configuration of firefox onthe screen.
there is a search bar (i mean the very first line)
type in "refer"
you will now see about 8 entries or so.
toggle ( by right clicking the line ) ALL the "send http.referheader" like entries to FALSE!!
now type "useragent" to the search bar
these are just strings that show up, so you might want to change
them to some stupid fake entries (which would be unique by the way, that compromises anounymity) or leave them as they are.
one of these shows your time zone, i suggest to change it.
thats about it.
but notice that now only firefox goes through tor, other applications
must be configured to use privoxy->tor first, which can be tricky.
i just started my self..
well...
when you are done go to some torchecking sites ( www.torcheck.xenobite.eu or check.torproject.org )
some forums block tor users, but if not the disguise should work.
tor is for freedom!!
TOR-3
Hello back,
thank you VERY MUCH for your detailed explanation. I am a bit ashamed to say so towards somebody who was so kind to go through this effort to help, but..., excuse me, I didn´t understand much. Of course, if you sat beside me and I were to see what you were doing, I would be able to repeat it the next time. I am not thaaat stupid, I meant to say.But for somebody who must read up each time what a COOKIE is, it´s hard to digest, what you wrote. Must sound totally silly, I guess, what I am saying. Instead I am able to make glass-jewelry with the help of my hands, a burner, oxygene, raw-glass and the help of gravity. Not sure any PC-freak is able to to so. Don´t get me wrong, please - you know how it´s meant (and was just said in general, not to you).
Still, before asking further questions (can I...?), let me CAAAREFULLY read, what you just said. Then I will read again and another time. If there are questions after that - and there will be - would you mind I contact you again?
Is there any way, we could (then) communicate with personal mails, or do you fear a lack of safety, the FBI (or DEA or that matter...haaa) or that I take all of your hand, now that you gave me your little finger...? Yes, I would give you my normal AOL-address in such case, if that were not too "blond" for you.
Only question now is: do you recommend I use FIREFOX for tryin to follow your instructions? I´ve set it up only for TOR (because I read somewhere - possibly here...) that it works best with that browser or better than with Windows XP, at least.
And deleting Java, Java-script and HISTORY, as you pointed out - that is an action independant from using TOR, right? I mean, I should do on top of using TOR. Did you meant that?
thank you very-very much,
for your big effort
"Blondie"