[163938] in North American Network Operators' Group
Re: PRISM: NSA/FBI Internet data mining project
daemon@ATHENA.MIT.EDU (William Herrin)
Fri Jun 21 14:32:33 2013
In-Reply-To: <8D3ACC12-DC67-492C-AE97-A0B134FF282F@delong.com>
From: William Herrin <bill@herrin.us>
Date: Fri, 21 Jun 2013 14:31:46 -0400
To: Owen DeLong <owen@delong.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Fri, Jun 21, 2013 at 11:19 AM, Owen DeLong <owen@delong.com> wrote:
> On Jun 21, 2013, at 5:10 PM, Phil Fagan <philfagan@gmail.com> wrote:
>> I would think this is only an issue if they throw out the Fourth in that when
>> they use that data collected "inadvertantly" to build a case a against you
>> they use no other data collected under a proper warrant.
>
> That statement ignores a longstanding legal principle known as "fruit of the poison tree".
Howdy,
In spite of what you may have seen on TV, law enforcement is not
required to ignore evidence of a crime which turns up during a lawful
search merely because it's evidence of a different crime. Fruit of the
poisonous tree applies when the original search for whatever it was
they were originally looking for is unlawful. Supposedly the FISA
court found the NSA's troll for terrorists to be lawful. Once that's
true, evidence of any crime may be lawfully introduced in court.
For a fun read, check out the Ilustrated Guide to Criminal Law:
http://lawcomic.net/guide/?p=18
Regards,
Bill Herrin
--
William D. Herrin ................ herrin@dirtside.com bill@herrin.us
3005 Crane Dr. ...................... Web: <http://bill.herrin.us/>
Falls Church, VA 22042-3004