Thank you, Mr. Chair.
I'm going to operate at a bit of a disadvantage since I'm not a regular member of this, Chair.
I was interested in your comments, Commissioner Oliver, about tracing it back to the originator of an image, which seems to me to be the core of the issue. What's not clear to me is how you trace it back. Do you have to go through his computer and his computer and her computer and my computer to get back to wherever the computer is that started this chain? If you are doing that, are you doing it with a warrant, or without?