[158532] in North American Network Operators' Group
Re: William was raided for running a Tor exit node. Please help if
daemon@ATHENA.MIT.EDU (Anne P. Mitchell, Esq.)
Sat Dec 1 14:28:53 2012
From: "Anne P. Mitchell, Esq." <amitchell@isipp.com>
In-Reply-To: <mailman.8754.1354325031.12739.nanog@nanog.org>
Date: Sat, 1 Dec 2012 12:28:41 -0700
To: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
> Example of an actual warrant:
>=20
>=20
> =
https://www.eff.org/sites/default/files/filenode/inresearchBC/EXHIBIT-A.pd=
f
Please also keep in mind, if it's relevant, that *no warrant* is =
required for data that is stored by a third-party. Data on a server, =
TOR or otherwise, would by definition be data that is stored by a third =
party. Which means that if there is a person of interest (POI), it =
would not be terribly hard to get at personal information about the POI =
that is not on their own private machines.
(Here is an article we wrote about that: =
http://www.theinternetpatrol.com/no-warrant-necessary-for-law-enforcement-=
to-access-data-stored-in-the-cloud/ )
> Not a lawyer.
Is a lawyer, but hasn't been following this thread. That said, if there =
are specific questions, I'd be happy to answer them if I can.
Anne
Anne P. Mitchell, Esq
CEO/President
Institute for Social Internet Public Policy
http://www.ISIPP.com=20
Member, Cal. Bar Cyberspace Law Committee