User:Dervorguilla/sandbox-null

From Wikipedia, the free encyclopedia

United States v. Aaron Swartz

== Background ==

On January 6, 2011, Swartz was arrested by MIT police on state breaking-and-entering charges, in connection with the systematic downloading of academic journal articles from JSTOR.[1][2][3][4] Federal prosecutors eventually charged him with two counts of wire fraud and 11 violations of the Computer Fraud and Abuse Act,[5] charges carrying a cumulative maximum penalty of $1 million in fines plus 35 years in prison, asset forfeiture, restitution and supervised release.[6]

On January 11, 2013, two years after his initial arrest, Swartz was found dead in his Crown Heights, Brooklyn apartment, where he had hanged himself.[7][8][9]

JSTOR is a digital repository that archives content from journal articles, manuscripts, GIS systems, and scanned plant specimens and disseminates it online.[10] Swartz was a research fellow at Harvard University, which provided him with a JSTOR account. Visitors to MIT’s "open campus" were authorized to access JSTOR through its network.[11]

According to state and federal authorities, over the course of a few weeks in late 2010 and early 2011 Swartz downloaded a large number[i] of academic journal articles from JSTOR through MIT’s computer network.[2] The authorities say Swartz downloaded the documents through a laptop connected to a networking switch in a controlled-access wiring closet.[12][13][14][15] According to press reports, the door to the closet was kept unlocked.[16][17][18]

== Arrest, charges and indictments ==

On January 6, 2011, Swartz was arrested near the Harvard campus[3][19] by two MIT police officers and a U.S. Secret Service agent. He was arraigned in Cambridge District Court on two state charges of breaking and entering with intent to commit a felony. [1][2][15][20]

On July 11, 2011, Swartz was indicted in Federal District Court on four felony counts: wire fraud, computer fraud, unlawfully obtaining information from a protected computer and recklessly damaging a protected computer.[21][4][22][23]

On November 17, 2011, Swartz was indicted by a Middlesex County Superior Court grand jury on state charges of breaking and entering with intent, grand larceny and unauthorized access to a computer network.[24][25]

On December 16, 2011, the district attorney’s office filed a nolle prosequi declaration in the case generated by Swartz's initial January 6, 2011 arrest.[2] The state charges against Swartz stemming from the November 17, 2011 indictment were dropped on March 8, 2012.[26] According to a spokesperson for the Middlesex County prosecutor, the state charges were dropped in order to permit federal prosecution to proceed, unimpeded.[26]

Writing in Massachusetts Lawyers’ Weekly, Harvey Silverglate reported that lawyers familiar with the original case told him they had expected it to be dismissed after a "'continuance without a finding'.... The charge [would be] held in abeyance ... without any verdict ... for a period of a few months up to maybe a couple of years."[27] After the publication of his Massachusetts Lawyers' Weekly piece, Silverglate explained to CNET's Declan McCullagh that if the defendant manages to stay out of further legal trouble after such a continuance, the case is typically dismissed.[28] "Tragedy intervened," Silverglate had written, "when [U.S. Attorney Carmen] Ortiz’s office took over the case to 'send a message.'"[27]

According to Verge reporter Jeff Blagdon[29] and the Huffington Post,[30] federal rather than local prosecutors had been "calling the shots" on the prosecution of the case since Swartz’s arrest. Both cited a letter from Swartz's attorneys to the Department of Justice.[31]

The lead prosecutor in Mr. Swartz’s [federal] case, AUSA Stephen Heymann ... and [Secret Service] Agent Pickett directed and controlled the investigation of Mr. Swartz from the time of [his] arrest on January 6.... Heymann’s involvement in the case had commenced very early in the investigation.[31]

== Federal prosecution ==

On April 13, 2011, as part of their investigation, federal authorities interviewed Swartz’s former partner, Wired journalist Quinn Norton; she penned an article, "Life Inside the Aaron Swartz Investigation," detailing her experiences in the case.[32][33]

I mentioned ... a two-year-old public post on ... Aaron's blog. It had been fairly widely picked up by other blogs. I couldn't imagine that these people who had just claimed to have read everything I'd ever written had never looked at their target's blog, which appeared in his FBI file, or searched for what he thought about "open access." They hadn't.

So this is where I was profoundly foolish. I told them about the Guerrilla Open Access Manifesto. And in doing so, Aaron would explain to me later (and reporters would confirm), I made everything worse.[32]

On July 19, 2011, the July 11th federal indictment[21][4][22] was unsealed, charging Swartz with two counts of fraud and two counts related to accessing and damaging a protected computer.[21][23] According to the indictment, Swartz surreptitiously attached a laptop to MIT’s computer network, which ran a script named "keepgrabbing.py",[21][4] allowing him to "rapidly download an extraordinary volume of articles from JSTOR."[21][34] Prosecutors in the case said Swartz acted with the intention of making the papers available on P2P file-sharing sites.[21][12]

Swartz surrendered to authorities, pleading not guilty on all counts, and was released on $100,000 unsecured bail.[35] After his arrest, JSTOR released a statement saying that though it considered Swartz’s access to be a "significant misuse" committed in an "unauthorized fashion," it would not pursue civil litigation against him;[13][35] MIT did not comment on the proceedings.[36]

The New York Times wrote of the case: "a respected Harvard researcher who also is an Internet folk hero has been arrested in Boston on charges related to computer hacking, which are based on allegations that he downloaded articles that he was entitled to get free."[35]

Assistant U.S. Attorneys Stephen Heymann and Scott Garland were the lead prosecutors, working under the supervision of U.S. Attorney Carmen Ortiz.[21][14][37] The case was brought under the Computer Fraud and Abuse Act, which was passed in 1986 to enhance the government’s ability to prosecute hackers who accessed computers to steal information or to disrupt or destroy computer functionality.[38][39] "If convicted on these charges," said Ortiz, "Swartz faces up to 35 years in prison, to be followed by three years of supervised release, restitution, forfeiture and a fine of up to $1 million."[6]

On September 12, 2012, the prosecution filed a superseding indictment adding nine more felony counts.[5][40] George Washington University Law School Professor Orin Kerr, writing on the legal blog Volokh Conspiracy, opined that the risk of a maximum sentence in Swartz’s case was not high.[41] In an interview with Boston's WBUR, retired federal judge Nancy Gertner said a sentence of 35 years for a case like Swartz's "never occurs." She questioned the propriety of pressing these charges at all. Referring to decision-making by Ortiz's office, she said "this is the example of bad judgment I saw too often," suggesting that a two-year diversion program leading to expunged charges would have been more fitting.[42]

=== Plea negotiations ===

Swartz’s attorney, Elliot Peters, said prosecutors told him, two days before Swartz’s death, that “Swartz would have to spend six months in prison and plead guilty to 13 charges if he wanted to avoid going to trial.”[43] Peters later filed a complaint with the DOJ's Office of Professional Responsibility, stating that if Swartz didn't plead guilty, Heymann "threatened that he would seek for Mr. Swartz to serve seven years in prison," a difference in duration Peters asserts went "far beyond" the disparity encouraged by the plea-bargain portion of the Federal Sentencing Guidelines.[31]

Andy Good, Swartz’s initial lawyer, told The Boston Globe: “I told Heymann the kid was a suicide risk. His reaction was a standard reaction in that office, not unique to Steve. He said, ‘Fine, we’ll lock him up.’ I’m not saying they made Aaron kill himself. Aaron might have done this anyway. I’m saying they were aware of the risk, and they were heedless.”[44]

Marty Weinberg, who took the case over from Good, said he nearly negotiated a plea bargain in which Swartz would not serve any time. "JSTOR signed off on it," he said, "but MIT would not."[44]

Shortly before Swartz’s death, JSTOR announced that it would make "more than 4.5 million articles" available to the public for free.[45] The service was capped at three articles every two weeks, readable online only, with some downloadable for a fee.[46][47]

After his death, Ortiz’s office dismissed the charges against Swartz.[48][49] She said, "This office’s conduct was appropriate in bringing and handling this case.... This office sought an appropriate sentence that matched the alleged conduct—a sentence that we would recommend to the judge of six months in a low security setting.... At no time did this office ever seek—or ever tell Mr. Swartz’s attorneys that it intended to seek—maximum penalties under the law."[50][51]

On January 12, 2013, Alex Stamos, a computer forensics investigator employed by the Swartz legal defense team, posted an online summary of the expert testimony he had been prepared to present in the JSTOR case, had Swartz lived to see trial. He wrote:

If I had taken the stand as planned and had been asked by the prosecutor whether Aaron’s actions were "wrong," I would probably have replied that what Aaron did would better be described as "inconsiderate." In the same way it is inconsiderate ... to check out every book at the library needed for a History 101 paper. It is inconsiderate to download lots of files on shared wifi...[52]

=== Federal prosecutory rationale and responses ===

U.S. Attorney Ortiz asserted after the 2011 indictment that “stealing is stealing, whether you use a computer command or a crowbar, and whether you take documents, data or dollars.”[6]

==== About the prosecution ====

At a 2013 memorial for Swartz at the Internet Archive, his collaborator Carl Malamud recalled their work with PACER. He noted that they had brought millions of U.S. District Court records out from behind PACER's "pay wall" and found them full of privacy violations including people's medical records and the names of minor children and confidential informants.

We sent our results to the Chief Judges of 31 District Courts.... They redacted those documents and they yelled at the lawyers that filed them... The Judicial Conference changed their privacy rules.

... [To] the bureaucrats who ran the Administrative Office of the United States Courts ... we were thieves that took $1.6 million of their property.

So they called the FBI.... [The FBI] found nothing wrong....

"Was the overly aggressive posture of the Department of Justice prosecutors and law enforcement officials," he asked, "revenge because they were embarrassed that — in their view at least — we somehow got away with something in the PACER incident? Was the merciless JSTOR prosecution the revenge of embarrassed bureaucrats because they looked stupid in the New York Times, because the U.S. Senate called them on the carpet?"[53]

Former Nixon White House counsel John Dean wrote an article on the legal blog justia.com entitled Dealing With Aaron Swartz in the Nixonian Tradition: Overzealous Overcharging Leads to a Tragic Result, saying "these are not people who are conscientiously and fairly upholding our federal laws. Rather, they are typically authoritarian personalities who get their jollies from shamelessly beating up on unfortunate people like Aaron Swartz."[54]

George Washington University law professor Orin Kerr wrote on January 15, 2013 that "the charges brought here were pretty much what any good federal prosecutor would have charged."[55][56] Duke University law professor James Boyle replied in The Huffington Post: "I think that in [Kerr’s] descriptions of the facts [and of] the issues surrounding prosecutorial discretion ... he tends ... to minimize or ignore facts that might put [Swartz] in a more favorable light."[57]

==== About the law ====

After Boyle's Huffington Post column, Kerr returned to the topic, advocating reform of the Computer Fraud and Abuse Act (CFAA) under which Swartz was prosecuted. "The problem raised by the Swartz case is ... [that] felony liability under the statute is triggered much too easily. The law needs to draw a distinction between low-level crimes and more serious crimes, and current law does so poorly...."[58]

Chris Soghoian, a technology policy analyst at the American Civil Liberties Union, argued similarly, "Existing laws don’t recognise the distinction between two types of computer crimes: malicious crimes committed for profit ... and cases where hackers break into systems to prove their skillfulness or spread information that they think should be available to the public."[59] Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society, both defended Swartz and challenged the scope of the law under which he was prosecuted.[60][61]

=== Post-dismissal motions and complaint ===

On January 28, 2013, the lawyers for Swartz’s estate sent a letter to the Justice Department accusing Assistant U.S. Attorney Stephen Heymann of professional misconduct.[30][62] They said Heymann "may have misrepresented to the Court the extent of the federal government’s [early] involvement in the investigation."[63]

Emails and reports further illustrated ... that AUSA Heymann was himself involved in the investigation even before Mr. Swartz was arrested on January 6, 2011.[31]

The lawyers also said Heymann "abused his discretion when he attempted to coerce" Swartz into pleading guilty:[30][62][63]

Swartz ... naturally felt extreme pressure to waive his rights.... The difference between an offer of four months and a threat of seven years went far beyond the minimal reduction ... that should properly have applied for [a defendant’s] "acceptance of responsibility" under the Sentencing Guidelines.[31][63]

On March 15, the lawyers asked the federal court to modify the protective order on Swartz’s file to permit public disclosure of the discovery materials, including the names and titles of MIT, JSTOR and law enforcement employees. The lawyers said that withholding the names would make the documents "less intelligible and thus far less useful to Congress."[64] The First Assistant U.S. Attorney for Massachusetts, Jack Pirozzolo, said he was taking a role in the discussions and would be asking the court to give the affected employees an opportunity to be heard on the proposed disclosures.[64]

The Department of Justice sought to hide the names of the prosecutors involved in the case. A U.S. Attorney’s Office spokesperson said, "Our argument against it is that not only does it have an effect on the people involved in the case, but there’s also sometimes a residual effect."[65]

On May 13, 2013, the court granted the estate's motion in part, permitting public disclosure of much of the material the estate's lawyers had sought to have unsealed, provided that the names of MIT and government employees were first redacted. The estate's argument for disclosure of these names was "substantially outweighed by the interest of the government and the victims in shielding their employees from potential retaliation," wrote Judge Nathaniel Gorton.[66] The judge also ruled that information disclosing details of computer network security at MIT should not be made public.[66] The prosecutors and Swartz's lawyers were ordered to propose the terms of the disclosures and redactions by May 27, 2013.[66]

000000000000000000000000000000000000000000 000000000000000000000000000000000000000000 000000000000000000000000000000000000000000 000000000000000000000000000000000000000000

Aaron Swartz

== JSTOR ==

According to state and federal authorities, Swartz used JSTOR, a digital repository, to download a large number of academic journal articles through MIT's computer network over the course of a few weeks in late 2010 and early 2011. At the time, Swartz was a research fellow at Harvard University, which provided him with a JSTOR account. Visitors to MIT's "open campus" were authorized to access JSTOR through its network. The authorities said Swartz downloaded the documents through a laptop connected to a networking switch in a controlled-access wiring closet at MIT.

=== Arrest and prosecution ===

On January 6, 2011, Swartz was arrested near the Harvard campus by MIT police and a U.S. Secret Service agent. He was arraigned in Cambridge District Court on two state charges of breaking and entering with intent to commit a felony.

On July 11, 2011, Swartz was indicted by a federal grand jury on charges of wire fraud, computer fraud, unlawfully obtaining information from a protected computer and recklessly damaging a protected computer.

On November 17, 2011, Swartz was indicted by a Middlesex County Superior Court grand jury on state charges of breaking and entering with intent, grand larceny and unauthorized access to a computer network. On December 16, 2011, state prosecutors filed a notice that they were dropping the two original charges; the charges listed in the November 17, 2011 indictment were dropped on March 8, 2012. According to a spokesperson for the Middlesex County prosecutor, the state charges were dropped in order to permit the federal prosecution to proceed unimpeded.

On September 12, 2012, federal prosecutors filed a superseding indictment adding nine more felony counts, which increased Swartz's maximum criminal exposure to 50 years of imprisonment and $1 million in fines.

After his death, federal prosecutors dropped the charges.

000000000000000000000000000000000000000000 000000000000000000000000000000000000000000 000000000000000000000000000000000000000000 000000000000000000000000000000000000000000

  1. ^ a b Gerstein, Josh (July 22, 2011). "MIT also pressing charges against hacking suspect". Politico. Swartz['s] alleged use of MIT facilities and Web connections to access the JSTOR database … resulted in two state felony charges for breaking into a 'depository' and breaking & entering in the daytime, according to local prosecutors.
  2. ^ a b c d Commonwealth v. Swartz, Nos. 11-52CR73 & 11-52CR75, MIT Police Incident Report (Mass. Dist. Ct. dismissed Dec. 16, 2011) ("MIT’s IS&T Department … explained that they were able to determine that this laptop was illegally downloading…. IS&T had put an approximate value on the downloaded information at $50,000.… The suspect … was arrested for two counts of Breaking and Entering in the daytime with the intent to commit a felony.").
  3. ^ a b Hak, Susana (January 26, 2011). "Compilation of December 15, 2010–January 20, 2011" (PDF). Hak–De Paz Police Log Compilations. MIT Crime Club. p. 6. Jan. 6, 2:20 p.m., Aaron Swartz, was arrested at 24 Lee Street as a suspect for breaking and entering…. {{cite news}}: Unknown parameter |coauthors= ignored (|author= suggested) (help)
  4. ^ a b c d Cite error: The named reference 2011tech was invoked but never defined (see the help page).
  5. ^ a b "September 2012 Superseding Federal Indictment of Aaron Swartz" (PDF). wired.com. 2012-09-12. Retrieved 2013-05-20.
  6. ^ a b c Cite error: The named reference SwartzAaronPR was invoked but never defined (see the help page).
  7. ^ Cite error: The named reference BusinessInsider was invoked but never defined (see the help page).
  8. ^ "Aaron Swartz, internet freedom activist, dies aged 26". BBC News. January 13, 2013. Retrieved 2013-01-13.
  9. ^ "Aaron Swartz, Tech Prodigy and Internet Activist, Is Dead at 26". Time. Retrieved January 13, 2013.
  10. ^ "Terms and Conditions of Use". JSTOR. New York: ITHAKA. January 15, 2013. JSTOR's integrated digital platform is a trusted digital repository providing for long-term preservation and access to … scholarly materials: journal issues …; manuscripts and monographs; …; spatial/geographic information systems data; plant specimens; …
  11. ^ Granick, Jennifer, Towards Learning from Losing Aaron Swartz: Part 2, The Center for Internet and Society at Stanford Law School blog, 15 January 2013. Retrieved 26 January 2013.
  12. ^ a b Cite error: The named reference lindsay was invoked but never defined (see the help page).
  13. ^ a b Cite error: The named reference jstor-statement was invoked but never defined (see the help page).
  14. ^ a b Carter, Zach; Grim, Ryan; Reilly, Ryan J (January 12, 2013). "Aaron Swartz, Internet Pioneer, Found Dead Amid Prosecutor 'Bullying' In Unconventional Case". Huffington Post.
  15. ^ a b Cohen, Noam (January 20, 2013). "How M.I.T. ensnared a hacker, bucking a freewheeling culture". The New York Times. p. A1. 'Suspect is seen on camera entering network closet' [in an unlocked building].…  Within a mile of MIT … he was stopped by an MIT police captain and [U.S. Secret Service agent] Pickett.
  16. ^ Peters, Justin (February 7, 2013). "The Idealist: Aaron Swartz wanted to save the world. Why couldn't he save himself?". Slate. N.Y.C. 6. The superseding indictment … claimed that Swartz had 'contrived to break into a restricted-access wiring closet at MIT.'  But the closet door had been unlocked—and remained unlocked even after the university and authorities were aware that someone had been in there trying to access the school's network.
  17. ^ MacFarquhar, Larissa (March 11, 2013). "Requiem for a dream: The tragedy of Aaron Swartz". The New Yorker. [Swartz] wrote a script that instructed his computer to download articles continuously, something that was forbidden by JSTOR's terms of service.…  He spoofed the computer's address….  This happened several times.  MIT traced the requests to his laptop, which he had hidden in an unlocked closet.
  18. ^ Merritt, Jeralyn (January 14, 2013). "MIT to conduct internal probe on its role in Aaron Swartz case". TalkLeft (blog). Att’y Jeralyn Merritt. The wiring closet was not locked and was accessible to the public.  If you look at the pictures supplied by the Government, you can see graffiti on one wall.
  19. ^ Lipinski, Pearle and Joseph Maurer, Police Log (12/19-2/5), The Tech, 18 February 2011 (Volume 131, Issue 6). Retrieved 24 January 2011.
  20. ^ Singel, Ryan (February 27, 2011). "Rogue academic downloader busted by MIT webcam stakeout, arrest report says". Wired. N.Y.C. Swartz is accused … of stealing the articles by attaching a laptop directly to a network switch in … a 'restricted' room, though neither the police report nor the indictment [mentions] a door lock or signage indicating the room is off-limits.
  21. ^ a b c d e f g Cite error: The named reference JulyFedIndictment was invoked but never defined (see the help page).
  22. ^ a b Kao, Joanna The Tech’s coverage of Aaron Swartz The Tech, 12 January 2013. Retrieved 18 May, 2013
  23. ^ a b Cite error: The named reference Internet Activist Charged in Data Theft was invoked but never defined (see the help page).
  24. ^ Hawkinson, John (November 18, 2011). "Swartz indicted for breaking and entering". The Tech. MIT. p. 11. Swartz … was indicted … in Middlesex Superior Court … for breaking and entering, larceny over $250, and unauthorized access to a computer network.
  25. ^ "Cambridge man indicted on breaking & entering charges, larceny charges in connection with data theft" (Press release). Middlesex District Attorney. November 17, 2011. Swartz … was indicted today on charges of Breaking and Entering with Intent to Commit a Felony, Larceny over $250, and Unauthorized Access to a Computer Network by a Middlesex Superior Grand Jury.
  26. ^ a b Hawkinson, John State drops charges against Swartz; federal charges remain The Tech, 16 March 2012. Retrieved 14 May 2013.
  27. ^ a b Silverglate, Harvey (January 23, 2013). "The Swartz suicide and the sick culture of the DOJ". Massachusetts Lawyers Weekly. Archived from the original on 2013-01-24.
  28. ^ McCullagh, Declan, Swartz didn't face prison until feds took over case, report says, cnet, 25 January 2013. Retrieved 7 February 2013.
  29. ^ Blagdon, Jeff (March 14, 2013). "US Attorney's Office accused of deliberately withholding evidence in Aaron Swartz trial". The Verge. Vox Media. Swartz's laptop … w[as] seized by the Cambridge Police Department on January 6th, 2011, when Swartz was first arrested....  Heymann had an email proving that the US Attorney's Office, ... not the Cambridge Police Department, was calling the shots on the search and seizure.
  30. ^ a b c Grim, Ryan; Reilly, Ryan (March 14, 2013). "Aaron Swartz lawyers accuse prosecutor Stephen Heymann of misconduct". Huffington Post. The handling of the case has already stunted the career of U.S. Attorney … Ortiz, who has become politically toxic and is no longer discussed seriously as a contender for judicial vacancies.
  31. ^ a b c d e Peters, Elliot (January 28, 2033). "Re: United States v. Aaron Swartz". Letter to Robin Ashton, Counsel, US Dept of Justice. Keker & Van Nest LLP. The [federal prosecutors] remarkably suggest … the Cambridge Police Department, not the Secret Service, was in possession of the computer equipment…. The Secret Service was plainly in charge of the investigation at MIT. {{cite web}}: Check date values in: |date= (help); Unknown parameter |coauthors= ignored (|author= suggested) (help)
  32. ^ a b Norton, Quinn (March 3, 2013). "Life inside the Aaron Swartz investigation". The Atlantic. D.C. Retrieved 2013-03-08.
  33. ^ Madrigal, Alexis (March 3, 2013). "Editor's note to Quinn Norton's account of the Aaron Swartz investigation". The Atlantic. D.C. Retrieved 2013-03-08.
  34. ^ Cite error: The named reference CB1 was invoked but never defined (see the help page).
  35. ^ a b c Schwartz, John (July 19, 2011). "Open-Access advocate is arrested for huge download". The New York Times.
  36. ^ Cite error: The named reference lessig-obituary was invoked but never defined (see the help page).
  37. ^ Poulsen, Kevin (January 12, 2013). "Aaron Swartz, Coder and Activist, Dead at 26". Wired.
  38. ^ McCool, Grant (July 30, 2012). "Computer Fraud and Abuse Act: The 1980s-Era Hacking Law Out Of Step With Today's Internet, Analysts Say". Huff Post Tech. Reuters. Retrieved 2013-01-17.
  39. ^ Cite error: The named reference crln was invoked but never defined (see the help page).
  40. ^ Cite error: The named reference techdirt was invoked but never defined (see the help page).
  41. ^ Orin Kerr (January 16, 2013). "The Criminal Charges Against Aaron Swartz Part 2: Prosecutorial Discretion". Retrieved January 16, 2013.
  42. ^ Boeri, David. "Retired Federal Judge Joins Criticism Over Handling Of Swartz Case". WBUR. Retrieved 17 May 2013. This is the example of bad judgment I saw too often." When asked if she was referring to the bad judgement of Carmen Ortiz, Gertner responded, "That's right.
  43. ^ "Mass. lawyer: told federal prosecutors Swartz suicidal". Associated Press. January 14, 2013. Retrieved 2013-02-08.
  44. ^ a b Cullen, Kevin (January 15, 2013). "On humanity, a big failure in Aaron Swartz case". Boston Globe.
  45. ^ "Net activist found dead before trial". 3 News NZ. January 14, 2013.
  46. ^ "Many JSTOR Journal Archives Now Free to Public". Library Journal. January 9, 2013. Retrieved January 14, 2013.
  47. ^ "Register & Read". About. JSTOR. Retrieved January 14, 2013.
  48. ^ Landergan, Katherine (2013-01-14). "US District Court drops charges against Aaron Swartz - MIT - Your Campus". Boston.com. Retrieved 2013-01-23.
  49. ^ United States v Swartz, 1:11-cr-10260, 106 (D. Mass. filed Jan. 14, 2013).
  50. ^ Laura Smith-Spark (January 17, 2013). "Prosecutor defends case against Aaron Swartz". CNN. Retrieved January 17, 2013.
  51. ^ Ortiz, Carmen M. (Jan 16, 2013). "Statement of United States Attorney Carmen M. Ortiz Regarding The Death of Aaron Swartz". US Attorney for the District of Massachusetts. Retrieved Jan 17, 2013.
  52. ^ Stamos, Alex (January 12, 2013). "The truth about Aaron Swartz's "crime"". Unhandled Exception. The government provided no evidence that these downloads caused a negative effect on JSTOR or MIT, except due to silly overreactions such as turning off all of MIT's JSTOR access due to downloads from a pretty easily identified user agent.
  53. ^ Malamud, Carl (January 24, 2013). "Aaron's Army". Speech at Memorial for Aaron Swartz. Public.Resource.Org. [T]he bureaucrats who ran the Administrative Office of the U.S. Courts … called the FBI….  They found nothing wrong.
  54. ^ "Dealing With Aaron Swartz in the Nixonian Tradition: Overzealous Overcharging Leads to a Tragic Result". verdict.justia.com. January 25, 2013. Retrieved 2013-01-26.
  55. ^ Lauerman, John (January 15, 2013). "MIT's embrace of Web freedom clashes with hacking case". Bloomberg. N.Y.C.
  56. ^ Kerr, Orin (January 14, 2013). "The criminal charges against Aaron Swartz (Part 1: The law)". The Volokh Conspiracy. Eugene Volokh.
  57. ^ Boyle, James (January 18, 2013). "The Prosecution of Aaron Swartz: A reply to Orin Kerr". Huffington Post.
  58. ^ Kerr, Oren, Aaron’s Law, Drafting the Best Limits of the CFAA, And A Reader Poll on A Few Examples Volokh Conspiracy, 27 January 2013. Retrieved 23 April 2013.
  59. ^ Wagner, Daniel; Verena Dobnik (January 13, 2013). "Swartz' death fuels debate over computer crime". Associated Press. JSTOR's attorney, Mary Jo White — formerly the top federal prosecutor in Manhattan — had called the lead Boston prosecutor in the case and asked him to drop it, said Peters.
  60. ^ "Towards Learning from Losing Aaron Swartz: Part 2". Cyberlaw.stanford.edu. January 15, 2013. Retrieved 2013-01-20.
  61. ^ "With the CFAA, Law and Justice Are Not The Same: A Response to Orin Kerr". Cyberlaw.stanford.edu. 2013-01-14. Retrieved 2013-01-20.
  62. ^ a b Castillo, Michael (March 14, 2003). "J'accuse! Aaron Swartz's lawyers fight prosecutors with document dump". Upstart Business Journal.
  63. ^ a b c Merritt, Jeralyn (March 13, 2013). "Aaron Swartz lawyers seek misconduct review against prosecutor". TalkLeft (blog). Att’y Jeralyn Merritt.
  64. ^ a b Anderson, Derek (March 16, 2013). "Swartz estate seeks release of documents: Papers are under protective order". Boston Globe. p. B2. Pirozzolo … has become involved in the Swartz case.
  65. ^ Smith, Erin (April 3, 2013). "U.S. attorney: Keep names out of Aaron Swartz case". Boston Herald. Threatening emails have been sent to … Ortiz and … Heymann.
  66. ^ a b c Mullin, Joe Aaron Swartz prosecutors will unseal evidence, but won’t name names 13 May 2013, arstechnica. Retrieved 26 May 2013.