You know normally I sit back and enjoy the show and not post. However, this guy's post and approach is quite interesting to me. With my background, and a small bit of observation it is quite easy to come to a few conclusion.
First, the picture you showed is of court records from a court database. It is not an record of arrest because some of the listed items are not arrests- like the child support or custody or whatever it was. I don't care to go back and look again.
Taking that into account then we draw conclusion 2:
You are accessing a court database which either means you work at a court house, work for the court IT department, are connected with the DA, have hacked your way into the system, or MAYBE an attorney who has found a way to bypass formally requesting records (which would be a violation several rules and laws by the way).
Which brings to point 3: Whatever you are accessing will require authentication credentials to access and there is an audit trail. So, if you feel that there is no way to trace back to you then you are blindly wrong. Even if you are accessing the records with someone else's information, every time you access authenticate and pull records your IP address is logged. (I could go into a lot more details but just take my word for that everyone)
That brings to point 4: Your "TOR" protection.
I am going to presume you mean that you are using a proxy server to reroute your activities. Which, by the way is traceable. Only a very small few service providers make it a point to not keep track of any connections and activities. Unless you have chosen one of the very good ones, you can be traced since many of them keep a log on their servers of what is routed where.
If anyone wants me to go into detail about anything I said or how I know what I stated please feel free to PM me.