Mr. Twister

True Names

Robinson and Bultmann had employed one of their computers—an old Asus Netbook—to run the software that makes the anonymity browser network possible, and specifically to run the riskiest node in the chain: the exit relay which provides the IP address ultimately associated with a user’s activity. In this case, someone used Tor to make the porn post, and his or her traffic had been routed through the computer in Robinson and Bultmann’s house. The couple wasn’t pleased to have helped someone post child porn to the internet, but that’s the thing about privacy-protective tools: They’re going to be used for good and bad purposes, and to support one, you might have to support the other.

“I haven’t run an exit relay since. The police told me they’d be back if it happened again,” Robinson said; he’s still running a Tor node, just not the end point anymore. “I have to take the threat seriously because I don’t want my wife or I to wake up with guns in our faces.”
http://fusion.net/story/349359/cops-and-ip-addresses/

Менты, конечно, скажут, что они совершенно обычные люди и что у них такая же работа, как любая другая.