[158532] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: William was raided for running a Tor exit node. Please help if

daemon@ATHENA.MIT.EDU (Anne P. Mitchell, Esq.)
Sat Dec 1 14:28:53 2012

From: "Anne P. Mitchell, Esq." <amitchell@isipp.com>
In-Reply-To: <mailman.8754.1354325031.12739.nanog@nanog.org>
Date: Sat, 1 Dec 2012 12:28:41 -0700
To: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


> Example of an actual warrant:
>=20
>=20
> =
https://www.eff.org/sites/default/files/filenode/inresearchBC/EXHIBIT-A.pd=
f

Please also keep in mind, if it's relevant, that *no warrant* is =
required for data that is stored by a third-party.  Data on a server, =
TOR or otherwise, would by definition be data that is stored by a third =
party.  Which means that if there is a person of interest (POI), it =
would not be terribly hard to get at personal information about the POI =
that is not on their own private machines.

(Here is an article we wrote about that:  =
http://www.theinternetpatrol.com/no-warrant-necessary-for-law-enforcement-=
to-access-data-stored-in-the-cloud/ )

> Not a lawyer.

Is a lawyer, but hasn't been following this thread.  That said, if there =
are specific questions, I'd be happy to answer them if I can.

Anne

Anne P. Mitchell, Esq
CEO/President
Institute for Social Internet Public Policy
http://www.ISIPP.com=20
Member, Cal. Bar Cyberspace Law Committee


home help back first fref pref prev next nref lref last post