story
This is exactly who an intelligent group of analyst would target for completion of their task.
The problem is that you misconstruing the They that are policy makers and the they that are the individuals that wrote these configuration files. The transfer of little theys actions onto big theys policy is flawed logic.
If I told you to find a bug in a large code base, there are two gross options. Scour the code yourself(xkey) or talk to an original author(JA). Those tasked with monitoring TOR obviously chose to try both approaches.
The value of a target always dictates the cost tolerance of the acquisition process. ie detain JA at political cost.
Lastly, the inference that JA detention was something other that a collection action and somehow a "terrorist" designation is disingenuous.