United States v. Aaron Swartz | |
---|---|
Court | United States District Court for the District of Massachusetts |
Full case name | United States of America v. Aaron Swartz |
Defendant | Aaron Swartz |
Prosecution | Carmen Ortiz Stephen Heymann |
Citation | 1:11-cr-10260 |
Court membership | |
Judge sitting | Nathaniel M. Gorton |
In United States of America v. Aaron Swartz, Aaron Swartz, an American computer programmer, writer, political organizer and Internet activist, was prosecuted for multiple violations of the Computer Fraud and Abuse Act of 1986 (CFAA), after downloading academic journal articles through the MIT computer network from a source (JSTOR) for which he had an account as a Harvard research fellow. Federal prosecutors eventually charged him with two counts of wire fraud and eleven violations of the Computer Fraud and Abuse Act, [1] charges carrying a cumulative maximum penalty of $1 million in fines plus 35 years in prison, asset forfeiture, restitution and supervised release. [2] Facing trial and the possibility of imprisonment, Swartz died by suicide, and the case was consequently dismissed. [3] [4] [5]
JSTOR is a digital repository that archives − and disseminates online − manuscripts, GIS systems, scanned plant specimens and content from academic journal articles. [6] Swartz was a research fellow at Harvard University, which provided him with a JSTOR account. Visitors to MIT's "open campus" were authorized to access JSTOR through its network. [7]
According to state and federal authorities, Swartz downloaded a large number [i] of academic journal articles from JSTOR through MIT's computer network, over the course of a few weeks in late 2010 and early 2011. [8] They said Swartz downloaded the documents to a laptop computer connected to a networking switch in a controlled-access wiring closet. [9] [10] [11] [12] According to press reports, the door to the closet was kept unlocked. [13] [14] [15]
A complete analysis and reconstruction of keepgrabbing.py, including translations into other languages, was published by the historian Camille Akmut in a series of papers released throughout 2019-2020. [16]
On January 6, 2011, Swartz was arrested near the Harvard campus by two MIT Police officers and a U.S. Secret Service agent. [17] [18] He was arraigned in Cambridge District Court on two state charges of breaking and entering with intent to commit a felony. [19] [8] [12] [20] The door Swartz had used was never locked; [13] [14] [15] in Massachusetts as in most jurisdictions, "breaking" means exerting physical force to remove an obstruction to entry, including by opening an unlocked door. [21]
On July 11, 2011, Swartz was indicted in federal District Court on four felony counts: wire fraud, computer fraud, unlawfully obtaining information from a protected computer, and recklessly damaging a protected computer. [3] [18] [22] [23]
On November 17, 2011, Swartz was indicted by a Middlesex County Superior Court grand jury on state charges of breaking and entering with intent, grand larceny, and unauthorized access to a computer network. [24] [25]
On December 16, 2011, the district attorney's office filed a nolle prosequi declaration in the case generated by Swartz's initial January 6, 2011, arrest. [8] The state charges against Swartz stemming from the November 17, 2011, indictment were dropped on March 8, 2012. [26] The state charges were dropped due to a deal being reached in which the data was returned by Swartz. [26] A report later submitted to the president of MIT about the Swartz case suggests, however, that Massachusetts state law required the Middlesex district attorney to dismiss the charges after the Boston U.S. Attorneys' Office and the Secret Service failed to promptly hand over evidence requested by Swartz's attorney during the Massachusetts case's discovery process. [27]
Writing in Massachusetts Lawyers' Weekly, Harvey Silverglate reported that lawyers familiar with the original case told him they had expected it to be dismissed after a "'continuance without a finding' ... The charge [would be] held in abeyance ... without any verdict ... for a period of a few months up to maybe a couple of years." [28] After the publication of his Massachusetts Lawyers' Weekly piece, Silverglate explained to CNET's Declan McCullagh that if the defendant manages to stay out of further legal trouble after such a continuance, the case is typically dismissed. [29] "Tragedy intervened," Silverglate had written, "when [U.S. Attorney Carmen] Ortiz's office took over the case to 'send a message.'" [28]
According to Verge reporter Jeff Blagdon [30] and the Huffington Post, [31] federal rather than local prosecutors had been "calling the shots" on the prosecution of the case since Swartz's arrest. Both cited a letter from Swartz's attorneys to the Department of Justice. [32]
The lead prosecutor in Mr. Swartz's [federal] case, AUSA Stephen Heymann ... and [Secret Service] Agent Pickett directed and controlled the investigation of Mr. Swartz from the time of [his] arrest on January 6 ... Heymann's involvement in the case had commenced very early in the investigation. [32]
On April 13, 2011, as part of their investigation, federal authorities interviewed Swartz's former partner, Wired journalist Quinn Norton; she penned an article, "Life Inside the Aaron Swartz Investigation," detailing her experiences in the case. [33] [34]
I mentioned ... a two-year-old public post on ... Aaron's blog. It had been fairly widely picked up by other blogs. I couldn't imagine that these people who had just claimed to have read everything I'd ever written had never looked at their target's blog, which appeared in his FBI file, or searched for what he thought about "open access." They hadn't.
So this is where I was profoundly foolish. I told them about the Guerilla Open Access Manifesto. And in doing so, Aaron would explain to me later (and reporters would confirm), I made everything worse. [33]
On July 19, 2011, the July 11th federal indictment [3] [18] [22] was unsealed, charging Swartz with two counts of fraud and two counts related to accessing and damaging a protected computer. [3] [23] According to the indictment, Swartz surreptitiously attached a laptop to MIT's computer network, which ran a script named "keepgrabbing.py", [3] [18] allowing him to "rapidly download an extraordinary volume of articles from JSTOR." [3] [35] Prosecutors in the case said Swartz acted with the intention of making the papers available on P2P file-sharing sites. [3] [9]
Swartz surrendered to authorities, pleading not guilty on all counts, and was released on $100,000 unsecured bail. [36] After his arrest, JSTOR released a statement saying that though it considered Swartz's access to be a "significant misuse" committed in an "unauthorized fashion," it would not pursue civil litigation against him; [10] [36] MIT did not comment on the proceedings. [37]
The New York Times wrote of the case: "a respected Harvard researcher who also is an Internet folk hero has been arrested in Boston on charges related to computer hacking, which are based on allegations that he downloaded articles that he was entitled to get free." [36] The Awl similarly commented that "Swartz is being charged with hacker crimes, not copyright-infringement crimes, because he didn't actually distribute any documents, plus JSTOR didn't even want him prosecuted." [38]
Assistant U.S. Attorneys Stephen Heymann and Scott Garland were the lead prosecutors, working under the supervision of U.S. Attorney Carmen Ortiz. [3] [11] [39] The case was brought under the Computer Fraud and Abuse Act, which was passed in 1986 to enhance the government's ability to prosecute hackers who accessed computers to steal information or to disrupt or destroy computer functionality. [40] [41] "If convicted on these charges," said Ortiz, "Swartz faces up to 35 years in prison, to be followed by three years of supervised release, restitution, forfeiture and a fine of up to $1 million." [2]
On September 12, 2012, the prosecution filed a superseding indictment adding nine more felony counts. [1] [42] George Washington University Law School Professor Orin Kerr, writing on the legal blog Volokh Conspiracy , opined that the risk of a maximum sentence in Swartz's case was not high. [43] In an interview with Boston's WBUR, retired federal judge Nancy Gertner said a sentence of 35 years for a case like Swartz's "never occurs." She questioned the propriety of pressing these charges at all. Referring to decision-making by Ortiz's office, she said "this is the example of bad judgment I saw too often," suggesting that a two-year diversion program leading to expunged charges would have been more fitting. [44]
Swartz's attorney, Elliot Peters, stated that prosecutors at one point offered a plea deal of four months in prison and pleading guilty to 13 charges, and warned that if Swartz rejected the deal, future deals would be less attractive; [45] and that two days before Swartz's death, that "Swartz would have to spend six months in prison and plead guilty to 13 charges if he wanted to avoid going to trial." [46] Under the six-month deal, after Swartz pled guilty to the 13 charges, the government would have argued for a six-month sentence, and Swartz would have argued for a lesser sentence; the judge would then be free to assign whatever sentence the judge thought appropriate, up to six months. [47] Peters later filed a complaint with the DOJ's Office of Professional Responsibility, stating that if Swartz didn't plead guilty, Heymann "threatened that he would seek for Mr. Swartz to serve seven years in prison," a difference in duration Peters asserts went "far beyond" the disparity encouraged by the plea-bargain portion of the Federal Sentencing Guidelines. [32]
Andy Good, Swartz's initial lawyer, told The Boston Globe : "I told Heymann the kid was a suicide risk. His reaction was a standard reaction in that office, not unique to Steve. He said, 'Fine, we'll lock him up.' I'm not saying they made Aaron kill himself. Aaron might have done this anyway. I'm saying they were aware of the risk, and they were heedless." [48]
Marty Weinberg, who took the case over from Good, said he nearly negotiated a plea bargain in which Swartz would not serve any time. "JSTOR signed off on it," he said, "but MIT would not." [48]
Two days before his death, JSTOR announced on January 9, 2013, that it would make "more than 4.5 million articles" available to the public free of charge. The "Register & Read" service, in beta for the previous 10 months, was capped at three articles every two weeks (78 per year), readable online only, with some downloadable for a fee. [49] [50]
After his death, Ortiz's office dismissed the charges against Swartz. [4] [5] She said, "This office's conduct was appropriate in bringing and handling this case ... This office sought an appropriate sentence that matched the alleged conduct—a sentence that we would recommend to the judge of six months in a low security setting ... At no time did this office ever seek—or ever tell Mr. Swartz's attorneys that it intended to seek—maximum penalties under the law." [51] [52]
On January 12, 2013, Alex Stamos, a computer forensics investigator employed by the Swartz legal defense team, posted an online summary of the expert testimony he had been prepared to present in the JSTOR case, had Swartz lived to see trial. He wrote:
If I had taken the stand as planned and had been asked by the prosecutor whether Aaron's actions were "wrong," I would probably have replied that what Aaron did would better be described as "inconsiderate." In the same way it is inconsiderate ... to check out every book at the library needed for a History 101 paper. It is inconsiderate to download lots of files on shared wifi ... [53]
U.S. Attorney Ortiz asserted after the 2011 indictment that "stealing is stealing, whether you use a computer command or a crowbar, and whether you take documents, data or dollars. It is equally harmful to the victim, whether you sell what you have stolen or give it away." [2] [38]
At a January 24, 2013, memorial for Swartz, Carl Malamud recalled their work with PACER. He noted that they had brought millions of U.S. District Court records out from behind PACER's "pay wall" and found them full of privacy violations.
We sent our results to the Chief Judges of 31 District Courts ... They redacted those documents and they yelled at the lawyers that filed them ... The Judicial Conference changed their privacy rules.
... [To] the bureaucrats who ran the Administrative Office of the United States Courts ... we were thieves ...
So they called the FBI ... [The FBI] found nothing wrong ...
"Was the overly aggressive posture of the Department of Justice prosecutors and law enforcement officials," he asked, "revenge because they were embarrassed that — in their view at least — we somehow got away with something in the PACER incident? Was the merciless JSTOR prosecution the revenge of embarrassed bureaucrats because they looked stupid in the New York Times, because the U.S. Senate called them on the carpet?" [54]
Former Nixon White House counsel John Dean wrote an article on the legal blog justia.com entitled "Dealing with Aaron Swartz in the Nixonian Tradition: Overzealous Overcharging Leads to a Tragic Result", saying "these are not people who are conscientiously and fairly upholding our federal laws. Rather, they are typically authoritarian personalities who get their jollies from shamelessly beating up on unfortunate people like Aaron Swartz." [55]
George Washington University law professor Orin Kerr wrote on January 15, 2013, that "the charges brought here were pretty much what any good federal prosecutor would have charged." [56] [57] Duke University law professor James Boyle replied in The Huffington Post: "I think that in [Kerr's] descriptions of the facts [and of] the issues surrounding prosecutorial discretion ... he tends ... to minimize or ignore facts that might put [Swartz] in a more favorable light." [58]
In response to a piece by Larissa MacFarquhar in the New Yorker , retired journalist Jane Scholz objected to what she perceived as an effort "to turn Swartz into a hero for facing government prosecution after hacking the JSTOR archive", arguing that "Swartz was apparently familiar with laws protecting proprietary-information-management systems, so he should not have been surprised by the severity of the prosecution's response to his crime. It is a crime, and not a victimless one. I am a retired journalist; during my working years, my salary depended, and today my pension relies, on people paying for copyrighted content. In recent years, as the business that supports journalism has declined, thousands of journalists have lost pay, benefits, and, ultimately, their jobs. [ ... ] I find it ironic that Swartz made several million dollars selling the rights to his own copyrighted programming to Conde Nast. Swartz's is a sad story, but it's not a heroic one." Law professor Mike Maddison commented on Scholz's letter: "it is difficult to find a better example of the glib equation of 'my career isn't the success that it once was' and 'somebody committed a crime' that infects contemporary dialogues about IP rights." [59]
David Aaronovitch noted in The Times that JSTOR was itself a "product of philanthropy" but that it had to charge access fees so that it could pay academic publishers for rights to their publications. He decried the "reckless" behavior of a generation which "cannot be persuaded—yet—that copyright matters". [60]
In contrast, Peter Ludlow in The Chronicle of Higher Education argued that due to the publish or perish nature of academia and the importance that journals' reputations have, "[w]hen an academic signs away copyright to an academic publisher, it amounts to a 'contract of adhesion'—meaning a contract in which one party has all the power and it was not freely bargained" and that "like the original authors, JSTOR had to negotiate its licensing agreements from a position of weakness", which Ludlow illustrated with a bargaining agreement from JSTOR's history, which stipulated that the publishers "be compensated if there was a loss to their (minimal) sales of rights to older materials, and they demanded compensation even before JSTOR covered its own expenses". Ludlow concluded that "Until academics get their acts together and start using new modes of publication, we need to recognize that actions like Aaron Swartz's civil disobedience are legitimate." [61]
Rob Weir, who describes himself as an "associate editor of a very small journal", writes in Inside Higher Ed that "Many wonder why money accrues to those whose only 'creation' is to aggregate the labor of others, especially when some form of taxpayer money underwrote many of the articles. That's a legitimate concern, but defending Swartz's method elevates vigilantism above the rules of law and reason." While he concedes that "JSTOR charges university libraries a king's ransom for its services", he also argues that "even a modest journal is expensive to produce" and that "if you want anyone to read your journal, you'll give it to JSTOR or some other aggregator. Unless, of course, you can drum up lots of free advertising". He concludes that the "information wants to be free" adage fails to account for the "hidden costs within the culture of free", and proposes that "there ain't no such thing as a free lunch" is the appropriate summary of production costs in the Information Age, which he transmutes to "if you can't do the time, don't do the crime" for "hackers and info thieves". [62]
Tim Wu, writing in The New Yorker , called out what he perceived as lack of proportionality, writing that "The act was harmless — [ ... ] meaning that there was no actual physical harm, nor actual economic harm. The leak was found and plugged; JSTOR suffered no actual economic loss. It did not press charges. Like a pie in the face, Swartz's act was annoying to its victim, but of no lasting consequence." [63] Wu went on to compare Swartz's act with that of Steve Jobs and Steve Wozniak, who, according to Wu, "in the nineteen-seventies, committed crimes similar to, but more economically damaging than, Swartz's. Those two men hacked AT&T's telephone system to make free long-distance calls, and actually sold the illegal devices (blue boxes) to make cash. Their mentor, John Draper, did go to jail for a few months (where he wrote one of the world's first word processors), but Jobs and Wozniak were never prosecuted. Instead, they got bored of phreaking and built a computer. The great ones almost always operate at the edge" writes Wu, in support of this thesis that "We can rightly judge a society by how it treats its eccentrics and deviant geniuses—and by that measure, we have utterly failed [in the case of Swartz]." [64]
After Boyle's Huffington Post column, Kerr returned to the topic, advocating reform of the Computer Fraud and Abuse Act (CFAA) under which Swartz was prosecuted. "The problem raised by the Swartz case is ... [that] felony liability under the statute is triggered much too easily. The law needs to draw a distinction between low-level crimes and more serious crimes, and current law does so poorly ..." [65]
Chris Soghoian, a technology policy analyst at the American Civil Liberties Union, argued similarly, "Existing laws don't recognise the distinction between two types of computer crimes: malicious crimes committed for profit ... and cases where hackers break into systems to prove their skillfulness or spread information that they think should be available to the public." [66] Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society, both defended Swartz and challenged the scope of the law under which he was prosecuted. [67] [68]
Law professor Stephen L. Carter agrees that the prosecution of Swartz was ridiculous, but also lays the blame on Congress for creating a new type of federal felony roughly every week. [69] Carter considers that the CFAA is a good example of this phenomenon. He writes: "Enacted in the 1980s, before the Internet explosion, the statute makes a criminal of anyone who 'intentionally accesses a computer without authorization or exceeds authorized access' and, in the process, obtains financial information, government information or 'information from any protected computer.'" Carter then gives the following example: "You're sitting in your office, when suddenly you remember that you forgot to pay your Visa bill. You take a moment to log on to your bank account, and you pay the bill. Then you go back to work. If your employer has a policy prohibiting personal use of office computers, then you have exceeded your authorized access; since you went to your bank website, you have obtained financial information. Believe it or not, you're now a felon. The likelihood of prosecution might be small, but you've still committed a crime." Carter further writes that the problem with the statute was well-known, and that "some federal courts have given the statute's language a narrow construction, but others have read it broadly, and the Obama administration has opposed efforts in Congress to narrow its scope. Alex Kozinski, chief judge of the U.S. Court of Appeals for the Ninth Circuit, warned in an opinion last spring [of 2012] the government's position 'would make criminals of large groups of people who would have little reason to suspect they are committing a federal crime.'" [70]
On January 11, 2013, two years after his initial arrest, Swartz was found dead in his Brooklyn apartment, where he had hanged himself. [71] [72] [73]
Speaking at his son's funeral, Robert Swartz said, "[Aaron] was killed by the government, and MIT betrayed all of its basic principles." [74] Mitch Kapor posted the statement on Twitter. [75] Carmen Ortiz's husband, IBM executive Tom Dolan, replied through his own Twitter feed, @TomJDolan, "Truly incredible that in their own son's obit they blame others for his death and make no mention of the 6 month offer." [76] In Esquire , Charlie Pierce wrote that "the glibness with which her husband and her defenders toss off a 'mere' six months in federal prison, low-security or not, is a further indication that something is seriously out of whack with the way our prosecutors think these days." [77]
Contacted by The Guardian , Ortiz's spokesperson had "no comment" to make on the matter; [76] Reuters reported being unable to contact Dolan. [78] On January 16, 2013, Ortiz released an official statement, in which she reiterated that "I must, however, make clear that this office's conduct was appropriate in bringing and handling this case," and that her subordinates "took on the difficult task of enforcing a law they had taken an oath to uphold, and did so reasonably." [78]
In 2013, Zoe Lofgren and Ron Wyden advanced a legislative proposal called "Aaron's Law" to amend the CFAA in order to eliminate the aforementioned vagueness and also eliminate the "redundant provisions that enable a person to be punished multiple times ... for the same crime". [79] In an opinion piece for Wired magazine, they wrote that "This is, in fact, what happened to Aaron Swartz — more than a third of the charges in the superseding indictment against him were under this redundant CFAA provision." [79]
On January 28, 2013, the lawyers for Swartz's estate sent a letter to the Justice Department accusing Assistant U.S. Attorney Stephen Heymann of professional misconduct. [31] [80] They said Heymann "may have misrepresented to the Court the extent of the federal government's [early] involvement in the investigation." [81]
Emails and reports further illustrated ... that AUSA Heymann was himself involved in the investigation even before Mr. Swartz was arrested on January 6, 2011. [32]
The lawyers also said Heymann "abused his discretion when he attempted to coerce" Swartz into pleading guilty: [31] [80] [81]
Swartz ... naturally felt extreme pressure to waive his rights ... The difference between an offer of four months and a threat of seven years went far beyond the minimal reduction ... that should properly have applied for [a defendant's] "acceptance of responsibility" under the Sentencing Guidelines. [32] [81]
On March 15, the lawyers asked the federal court to modify the protective order on Swartz's file to permit public disclosure of the discovery materials, including the names and titles of MIT, JSTOR and law enforcement employees. The lawyers said that withholding the names would make the documents "less intelligible and thus far less useful to Congress." [82] The First Assistant U.S. Attorney for Massachusetts, Jack Pirozzolo, said he was taking a role in the discussions and would be asking the court to give the affected employees an opportunity to be heard on the proposed disclosures. [82]
The Department of Justice sought to redact the names of the prosecutors involved in the case. On April 3, 2013, a U.S. Attorney's Office spokesperson said, "Our argument against it is that not only does it have an effect on the people involved in the case, but there's also sometimes a residual effect." The Attorney's Office reported threats and hacking attempts against prosecutors already known to be involved: "threatening emails" received by Ortiz and Heymann, the hacking of Heymann's Facebook account and that "Heymann's father, a Harvard professor, received a postcard with his photo in a guillotine". [83] The postcard and some email excerpts were published by Wired magazine. [84]
On May 13, 2013, the court granted the estate's motion in part, permitting public disclosure of much of the material the estate's lawyers had sought to have unsealed, provided that the names of MIT and government employees were first redacted. The estate's argument for disclosure of these names was "substantially outweighed by the interest of the government and the victims in shielding their employees from potential retaliation," wrote Judge Nathaniel Gorton. [85] The judge also ruled that information disclosing details of computer network security at MIT should not be made public. [85] The prosecutors and Swartz's lawyers were ordered to propose the terms of the disclosures and redactions by May 27, 2013. [85]
Kevin Poulsen filed a FOIA lawsuit and in November 2013 obtained the release of 130 pages from the file that the US Secret Service has on Swartz, out of approximately 20,000 pages that the agency has in relation to Swartz. [86]
Of Heymann, BuzzFeed has noted: "Back in 2008, young hacker Jonathan James killed himself in the midst of a federal investigation led by the same prosecutor." [87]
In January 2013, WikiLeaks claimed through its Twitter account that Swartz had been in contact with Julian Assange through 2010 and 2011, and that Swartz may have been a source of leaked materials. [88] If true, this would offer an explanation as to why charges against Swartz were pursued by the federal government despite JSTOR dropping charges and urging that the government and MIT do the same. [89]
In common law jurisdictions, a preliminary hearing, preliminary examination, preliminary inquiry, evidentiary hearing or probable cause hearing is a proceeding, after a criminal complaint has been filed by the prosecutor, to determine whether there is enough evidence to require a trial. At such a hearing, the defendant may be assisted by a lawyer.
JSTOR is a digital library of academic journals, books, and primary sources founded in 1994. Originally containing digitized back issues of academic journals, it now encompasses books and other primary sources as well as current issues of journals in the humanities and social sciences. It provides full-text searches of almost 2,000 journals. Most access is by subscription but some of the site is public domain, and open access content is available free of charge.
The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law, which had been included in the Comprehensive Crime Control Act of 1984. Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire fraud, but the applying law was often insufficient.
Harold Abelson is an American mathematician and computer scientist. He is a professor of computer science and engineering in the Department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology (MIT), a founding director of both Creative Commons and the Free Software Foundation, creator of the MIT App Inventor platform, and co-author of the widely-used textbook Structure and Interpretation of Computer Programs, sometimes also referred to as "the wizard book."
The U.S. attorney for the District of New Jersey is the chief federal law enforcement officer in New Jersey. On December 16, 2021, Philip R. Sellinger was sworn in as U.S. Attorney. The U.S. District Court for the District of New Jersey has jurisdiction over all cases prosecuted by the U.S. attorney.
Aaron Hillel Swartz, also known as AaronSw, was an American computer programmer, entrepreneur, writer, political organizer, and Internet hacktivist. As a programmer, Swartz helped develop the web feed format RSS; the technical architecture for Creative Commons, an organization dedicated to creating copyright licenses; the Python website framework web.py; and the lightweight markup language format Markdown. Swartz was involved in the development of the social news aggregation website Reddit until he departed from the company in 2007. He is often credited as a martyr and a prodigy, and his work focused on civic awareness and activism.
Jennifer Stisa Granick is an American attorney and educator. Senator Ron Wyden has called Granick an "NBA all-star of surveillance law." She is well known for her work with intellectual property law, free speech, privacy law, and other things relating to computer security, and has represented several high-profile hackers.
Jonathan Joseph James was an American hacker who was the first juvenile incarcerated for cybercrime in the United States. The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died at his Pinecrest, Florida home on May 18, 2008, of a self-inflicted gunshot wound.
Harvey Allen Silverglate is an American attorney, journalist, writer, and a co-founder of the Foundation for Individual Rights and Expression (FIRE).
United States v. Drew, 259 F.R.D. 449, was an American federal criminal case in which the U.S. government charged Lori Drew with violations of the Computer Fraud and Abuse Act (CFAA) over her alleged cyberbullying of her 13-year-old neighbor, Megan Meier, who had died of suicide. The jury deadlocked on a felony conspiracy count and acquitted Drew of three felony CFAA violations, but found her guilty of lesser included misdemeanor violations; the judge overturned these convictions in response to a subsequent motion for acquittal by Drew.
Preetinder Singh Bharara is an Indian-born American lawyer and former federal prosecutor who served as the United States Attorney for the Southern District of New York from 2009 to 2017. He is currently a partner at the law firm Wilmer Cutler Pickering Hale and Dorr. He served as an Assistant U.S. Attorney for five years prior to leading the Southern District of New York.
Grand juries in the United States are groups of citizens empowered by United States federal or state law to conduct legal proceedings, chiefly investigating potential criminal conduct and determining whether criminal charges should be brought.
United States v. Nosal, 676 F.3d 854 was a United States Court of Appeals for the Ninth Circuit decision dealing with the scope of criminal prosecutions of former employees under the Computer Fraud and Abuse Act (CFAA). The Ninth Circuit's first ruling established that employees have not "exceeded authorization" for the purposes of the CFAA if they access a computer in a manner that violates the company's computer use policies—if they are authorized to access the computer and do not circumvent any protection mechanisms.
Carmen Milagros Ortiz is an attorney, college instructor, and former United States Attorney for the District of Massachusetts.
Stephen P. Heymann is an attorney who formerly served as an Assistant U.S. Attorney for the District of Massachusetts. He is no longer with the U.S. Attorney's office. He headed U.S. Attorney Carmen Ortiz's Internet and Computer Crimes Unit.
The Day We Fight Back was a one-day global protest against mass surveillance by the US National Security Agency (NSA), the UK GCHQ, and the other Five Eyes partners involved in global surveillance. The "digital protest" took place on February 11, 2014 with more than 6,000 participating websites, which primarily took the form of webpage banner-advertisements that read, "Dear Internet, we're sick of complaining about the NSA. We want new laws that curtail online surveillance. Today we fight back." Organizers hoped lawmakers would be made aware "that there's going to be ongoing public pressure until these reforms are instituted."
Tor Bernhard Ekeland is a New York City based computer, trial and appellate lawyer. He is best known for representing hackers prosecuted under the Computer Fraud and Abuse Act ("CFAA"), as well as white-collar defendants, in federal criminal court and on appeal across the United States.
Andrew E. Lelling is an American attorney who served as the United States Attorney for the District of Massachusetts from 2017 to 2021. He is best known for leading Operation Varsity Blues, the federal investigation and prosecution of a massive nationwide college admissions scandal, He also oversaw the largest-ever prosecution of MS-13, which all but eliminated the notorious Salvadoran gang in the Boston area and the prosecution of six eBay employees involved in the eBay stalking scandal which involved the terrorizing of a middle-aged couple living in greater Boston, Massachusetts. His tenure was also marked by major gang and healthcare enforcement actions. Lelling, however, was also criticized by some as being "overzealous, grandstanding, and politically motivated" for his prosecution of a local trial judge who helped an undocumented immigrant charged with drug crimes avoid arrest by immigration authorities.
Van Buren v. United States, 593 U.S. 374 (2021), was a United States Supreme Court case dealing with the Computer Fraud and Abuse Act (CFAA) and its definition of "exceeds authorized access" in relation to one intentionally accessing a computer system they have authorization to access. In June 2021, the Supreme Court ruled in a 6–3 opinion that one "exceeds authorized access" by accessing off-limit files and other information on a computer system they were otherwise authorized to access. The CFAA's language had long created a 4–3 circuit split in case law that led to the failed introduction of Aaron's Law, and this decision narrowed the applicability of CFAA in prosecuting cybersecurity and computer crime.
Michael A. Sussmann is an American former federal prosecutor and a former partner at the law firm Perkins Coie, who focused on privacy and cybersecurity law. Sussmann represented the Democratic National Committee (DNC) and retained CrowdStrike to examine its servers after two Russian hacker groups penetrated DNC networks and stole information during the 2016 U.S. elections.
JSTOR's integrated digital platform is a trusted digital repository providing for long-term preservation and access to … scholarly materials: journal issues …; manuscripts and monographs; …; spatial/geographic information systems data; plant specimens; …
'Suspect is seen on camera entering network closet' [in an unlocked building].… Within a mile of MIT … he was stopped by an MIT police captain and [U.S. Secret Service agent] Pickett.
The superseding indictment … claimed that Swartz had 'contrived to break into a restricted-access wiring closet at MIT.' But the closet door had been unlocked—and remained unlocked even after the university and authorities were aware that someone had been in there trying to access the school's network.
[Swartz] wrote a script that instructed his computer to download articles continuously, something that was forbidden by JSTOR's terms of service.… He spoofed the computer's address…. This happened several times. MIT traced the requests to his laptop, which he had hidden in an unlocked closet.
The wiring closet was not locked and was accessible to the public. If you look at the pictures supplied by the Government, you can see graffiti on one wall.
Jan. 6, 2:20 p.m., Aaron Swartz, was arrested at 24 Lee Street as a suspect for breaking and entering….
Swartz['s] alleged use of MIT facilities and Web connections to access the JSTOR database … resulted in two state felony charges for breaking into a 'depository' and breaking & entering in the daytime, according to local prosecutors.
Swartz is accused … of stealing the articles by attaching a laptop directly to a network switch in … a 'restricted' room, though neither the police report nor the indictment [mentions] a door lock or signage indicating the room is off-limits.
Swartz … was indicted … in Middlesex Superior Court … for breaking and entering, larceny over $250, and unauthorized access to a computer network.
Swartz … was indicted today on charges of Breaking and Entering with Intent to Commit a Felony, Larceny over $250, and Unauthorized Access to a Computer Network by a Middlesex Superior Grand Jury.
After the state indictment, Martin Weinberg filed demands for discovery. In state prosecutions that involve joint investigations with outside law enforcement agencies or foreign jurisdictions, Massachusetts state law governing criminal discovery requires that the District Attorney obtain from those agencies and jurisdictions certain evidence that may be relevant to the case. Some of this evidence was in the sole possession of the Boston U.S. Attorney's Office and the U.S. Secret Service. Mr. Weinberg demanded this material as discovery from the DA's Office, and the USAO refused to produce it to that office. As a result, the DA's Office could not comply with the Massachusetts discovery laws so as to continue its prosecution, and it dismissed its charges.
Swartz's laptop … w[as] seized by the Cambridge Police Department on January 6th, 2011, when Swartz was first arrested ... Heymann had an email proving that the US Attorney's Office, ... not the Cambridge Police Department, was calling the shots on the search and seizure.
The handling of the case has already stunted the career of U.S. Attorney … Ortiz, who has become politically toxic and is no longer discussed seriously as a contender for judicial vacancies.
The [federal prosecutors] remarkably suggest … the Cambridge Police Department, not the Secret Service, was in possession of the computer equipment…. The Secret Service was plainly in charge of the investigation at MIT.
This is the example of bad judgment I saw too often." When asked if she was referring to the bad judgement of Carmen Ortiz, Gertner responded, "That's right.
The government provided no evidence that these downloads caused a negative effect on JSTOR or MIT, except due to silly overreactions such as turning off all of MIT's JSTOR access due to downloads from a pretty easily identified user agent.
[T]he bureaucrats who ran the Administrative Office of the U.S. Courts … called the FBI…. They found nothing wrong.
JSTOR's attorney, Mary Jo White — formerly the top federal prosecutor in Manhattan — had called the lead Boston prosecutor in the case and asked him to drop it, said Peters.
Pirozzolo … has become involved in the Swartz case.
Threatening emails have been sent to … Ortiz and … Heymann.