Hacker News new | comments | show | ask | jobs | submit login

Are there any legal scholars, lawyers, or law enforcement around that can comment on why they would take this approach? Would the burden of proof required for wiretapping authorization be more stringent than for seizure of a server? Could they have actually already been tapping the communications in and out of riseup and performed the seizure to use the server as evidence in a case that was already prepared based on information pulled from the tap?



Applications are open for YC Summer 2016

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: