Only for a question session

Nov 15, 2007 14:14 GMT  ·  By

Dan Egerstad, a Swedish security researcher who managed to obtain the login information for numerous embassies and organizations was arrested on Monday after a police raid conducted by the country's authorities. It all started a few months ago when Mr. Egerstad used TOR to remain anonymous while surfing the web, discovering approximately 1,000 email login credentials used by foreign embassies and human rights organizations. "Egerstad posted the login details of embassies belonging to Iran, India, Japan, and Russia, among others, in late August," The Register informs.

On Monday the Swedish National Police and the Swedish Security Police arrested the security researcher and took him to the police station for questioning. The authorities also found two computers and some CDs which were sent for a closer analysis. "I got a couple of police IDs in my face while told that they are taking me in for questioning," Dan Egerstad said for The Sydney Morning Herald. "They broke my wardrobe, short-cutted my electricity, pulled out my speakers, phone and other cables having nothing to do with this and been touching my bookkeeping, which they have no right to do."

During the question session, the investigators "played every trick in the book, good cop, bad cop and crazy mysterious guy in the corner not wanting to tell his name and just staring at me," as he said for the same source. "Well, if they want to try to manipulate, I can play that game too. [I] gave every known body signal there is telling of lies ... covered my mouth, scratched my elbow, looked away and so on."

Now, do you think Dan Egerstand is really guilty of finding the login credentials or it was only a mistake of the authorities? Although he was released without any charge, one thing is clear: the security researcher discovered one major glitch in the protection system of the organization which should be patched as soon as possible.