Feds Charge Activist As Hacker For Downloading Millions of Academic Articles
• By Ryan Singel
• July 19, 2011 |
• 2:55 pm |
• Categories: Sunshine and Secrecy, The Courts
http://www.wired.com/threatlevel/2011/07/swartz-arrest/
Well-known coder and activist Aaron Swartz was arrested Tuesday, charged with
violating federal hacking laws for downloading millions of academic articles
from a subscription database service that MIT had given him access to. If
convicted, Swartz faces up to 35 years in prison and a $1 million fine.
Swartz, the 24-year-old executive director of Demand Progress, has a history of
downloading massive data sets, both to use in research and to release public
domain documents from behind paywalls. Swartz, who was aware of the
investigation, turned himself in Tuesday.
Disclosure: Swartz is a co-founder of Reddit, which like Wired.com is owned by
Condé Nast. He is also a general friend of Wired.com, and has done coding work
for Wired.
The grand jury indictment accuses Swartz of evading MIT’s attempts to kick his
laptop off the network while downloading more than four million documents from
JSTOR, a non-for-profit company that provides searchable, digitized copies of
academic journals. The scraping, which took place from September 2010 to
January 2011 via MIT’s network, was invasive enough to bring down JSTOR’s
servers on several occasions.
The indictment alleges that Swartz, at the time a fellow at Harvard University,
intended to distribute the documents on peer-to-peer networks. That did not
happen, however, and all the documents have been returned to JSTOR.
JSTOR, the alleged victim in the case, did not refer the case to the feds,
according to Heidi McGregor, the company’s vice president of Marketing &
Communications, who said the company got the documents, a mixture of both
copyrighted and public domain works, back from Swartz and was content with that.
As for whether JSTOR supports the prosecution, McGregor simply said that the
company was not commenting on the matter. She noted, however, that JSTOR has a
program for academics who want to do big research on the corpus, but usually
faculty members ask permission or contact the company after being booted off
the network for too much downloading.
“This makes no sense,” said Demand Progress Executive Director David Segalin a
statement provided by Swartz to Wired.com before the arrest. “It’s like trying
to put someone in jail for allegedly checking too many books out of the
library.”
“It’s even more strange because the alleged victim has settled any claims
against Aaron, explained they’ve suffered no loss or damage, and asked the
government not to prosecute,” Segal said.
JSTOR doesn’t go quite as far in its statement on the prosecution — though
there are clear hints that they were not the ones who wanted a prosecution, and
that they were subpoenaed to testify at the grand jury hearing by the federal
government.
We stopped this downloading activity, and the individual responsible, Mr.
Swartz, was identified. We secured from Mr. Swartz the content that was taken,
and received confirmation that the content was not and would not be used,
copied, transferred, or distributed.
The criminal investigation and today’s indictment of Mr. Swartz has been
directed by the United States Attorney’s Office.
But the feds clearly think they have a substantial hacking case on their hands,
even though Swartz used guest accounts to access the network and is not accused
of finding a security hole to slip through or using stolen credentials, as
hacking is typically defined.
In essence, Swartz is accused of felony hacking for violating MIT and JSTOR’s
terms of service. That legal theory has had mixed success — a federal court
judge dismissed that argument in the Lori Drew cyber-bullying case, but it was
later re-used with more success in a case brought against ticket scalpers who
used automated means to buy tickets faster from Ticketmaster’s computer system.
“Stealing is stealing whether you use a computer command or a crowbar, and
whether you take documents, data or dollars. It is equally harmful to the
victim whether you sell what you have stolen or give it away,” said United
States Attorney Carmen M. Ortiz in a press release.
The indictment (.pdf) accuses Swartz of repeatedly spoofing the MAC address —
an identifier that is usually static — of his computer after MIT blocked his
computer based on that number. Swartz also allegedly snuck an Acer laptop
bought just for the downloading into a closet at MIT in order to get a
persistent connection to the network.
Swartz allegedly hid his face from surveillance cameras by holding his bike
helmet up to his face and looking through the ventilation holes when going in
to swap out an external drive used to store the documents. Swartz also
allegedly named his guest account “Gary Host,” with the nickname “Ghost.”
Why would Swartz want to download what is likely gigabytes of information? His
history includes a study co-authored with Shireen Barday, which looked through
thousands of law review articles looking for law professors who had been paid
by industry patrons to write papers. That study was published in 2008 in the
Stanford Law Review.
Swartz is no stranger to the feds being interested in his skills at prodigious
downloads. In 2008, the federal court system decided to try out allowing free
public access to its court record search system PACER at 17 libraries across
the country. Swartz went to the 7th U.S. Circuit Court of Appeals library in
Chicago and installed a small PERL script he had written. The code cycled
sequentially through case numbers, requesting a new document from PACER every
three seconds. In this manner, Swartz got nearly 20 million pages of court
documents, which his script uploaded to Amazon’s EC2 cloud computing service.
While the documents are in the public record and free to share, PACER normally
charges eight cents a page.
The courts reported him to the FBI, which investigated whether the public
records were “exfiltrated.” After in-depth background searches, a luckless
stakeout and futile attempts to get Swartz to talk, the FBI dropped the case.
The same anti-hacking statute was used to prosecute Lori Drew, who was charged
criminally for participating in a MySpace cyberbullying scheme against a
13-year-old Missouri girl who later committed suicide. The case against Drew
hinged on the government’s novel argument that violating MySpace’s terms of
service was the legal equivalent of computer hacking and a violation of the
Computer Fraud and Abuse Act.
A federal judge who presided over the prosecution tossed the guilty verdicts in
July 2009, and the government declined to appeal.
(This piece was edited by Wired.com Epicenter editor John Abell.)
_______________________________________________
Infowarrior mailing list
[email protected]
https://attrition.org/mailman/listinfo/infowarrior