ebook img

Report to the President: MIT and the Prosecution of Aaron Swartz PDF

182 Pages·2013·4.96 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Report to the President: MIT and the Prosecution of Aaron Swartz

Report  to  the  President   MIT  and  the  Prosecution  of  Aaron  Swartz           Review  Panel   Harold  Abelson   Peter  A.  Diamond   Andrew  Grosso   Douglas  W.  Pfeiffer  (support)     July  26,  2013 ©  Copyright  2013,  Massachusetts  Institute  of  Technology       This  work  is  licensed  under  a  Creative  Commons  Attribution  3.0  Unported  License. PRESIDENT  REIF’S  CHARGE  TO  HAL  ABELSON      |      iii     L. Rafael Reif, President 77 Massachusetts Avenue, Building 3-208 Cambridge, MA 02139-4307 U.S.A. Phone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iv   TABLE  OF  CONTENTS   PRESIDENT  REIF’S  CHARGE  TO  HAL  ABELSON  (LETTER)  ...............................................................  iii   INTRODUCTION  ............................................................................................................................  11   PART  I:   EVENTS  LEADING  TO  THE  ARREST  ................................................................................  16   I.A   Downloading  of  JSTOR  Articles  ..........................................................................  16   I.B   Discovery  of  the  Laptop  ......................................................................................  20   I.C   Events  of  January  6,  2011:  The  Arrest  ................................................................  24   I.D   Events  of  January  6,  2011:  Seizure  of  the  Laptop  ..............................................  25   I.E   Access  to  the  MIT  Network  ................................................................................  26   I.E.1   Connecting  to  the  MIT  network  ...............................................................  26   I.E.2   JSTOR  and  eControl  ..................................................................................  27   PART  II:   BACKGROUND  ON  AARON  SWARTZ  AND  LEGAL  EVENTS     FOLLOWING  THE  ARREST  ..............................................................................................  29   II.A   Background  on  Aaron  Swartz  .............................................................................  29   II.A.1   Aaron  Swartz  in  Cambridge  ....................................................................  30   II.A.2   Possible  motives  for  downloading  ..........................................................  31   II.B   The  Prosecutions  and  the  Legal  Defense:  An  Overview  ....................................  34   II.B.1   The  state  prosecution  .............................................................................  35   II.B.2   The  federal  prosecution  ..........................................................................  36   II.B.3   Plea  discussions  during  the  federal  prosecution  ....................................  38   II.B.4   Motions  to  suppress  ...............................................................................  41   II.C   Aaron  Swartz’s  Settlement  with  JSTOR  .............................................................  41   PART  III:  MIT’S  RESPONSE  TO  THE  PROSECUTION  (JANUARY  2011–JANUARY  2013)  ...............  44   III.A   Events  between  the  Arrest  and  the  Indictment  (January  2011–July  2011)  ......  48   III.A.1   MIT  provides  information  to  the  USAO  (January  2011–April  2011)  .......  49   III.A.2   MIT  is  informed  about  the  prosecution  (March  2011–June  2011)  ........  51   III.A.3   MIT  adopts  and  maintains  a  posture  of  neutrality  .................................  52   III.A.4   MIT  discusses  possible  public  statements  with  JSTOR  (June  2011)  .......  56 CONTENTS      |      v     III.B   Events  around  the  Time  of  the  Indictment  (April  2011–September  2011)  .......  58   III.B.1   Early  overtures  to  MIT  in  support  of  Aaron  Swartz     (April  2011–June  2011)  ..........................................................................  59   III.B.2   The  indictment:  Unauthorized  access  ....................................................  60   III.B.3   MIT  as  “victim”  .......................................................................................  62   III.B.4   Robert  Swartz  meets  with  MIT’s  Chancellor  ..........................................  62   III.C   MIT’s  Contacts  with  Prosecution  and  Defense     (October  2011–September  2012)  .......................................................................  64   III.C.1   Responses  to  defense  inquiries  are  slow  (May  2012–August  2012)  ......  64   III.C.2   Robert  Swartz  writes  to  MIT’s  President  ................................................  66   III.C.3   MIT’s  outside  counsel  speaks  with  the  lead  prosecutor     (August  9,  2012)  .....................................................................................  67   III.C.4   Robert  Swartz  meets  again  with  MIT  (September  2012)  .......................  69   III.C.5   Other  contacts  on  behalf  of  Aaron  Swartz  .............................................  70   III.D   Events  in  Anticipation  of  Trial  (August  2012–October  2012)  ............................  72   III.D.1   The  defense  asks  MIT  to  oppose  jail  time     (September  2012–October  2012)  ..........................................................  73   III.D.2   The  defense  moves  to  suppress  evidence  (October  2012)  ....................  74   III.D.3   Effect  of  the  suppression  motions  (October  2012–December  2012)  ....  76   III.D.4   Final  weeks  (December  2012–January  2013)  .........................................  77   PART  IV:  DECISION  POINTS  FOR  MIT  ...........................................................................................  80   IV.A   The  Investigation  and  the  Immediate  Post-­‐arrest  Period  .................................  81   IV.A.1   Locating  the  laptop  and  performing  a  packet  scan  ................................  81   IV.A.2   Informing  the  MIT  Police  and  notifying  the  Cambridge  Police  ...............  82   IV.A.3   Providing  information  to  law  enforcement  pre-­‐subpoena  ....................  82   IV.B   Neutrality:  Issuing  Statements;  Providing  Information  to     Prosecution  and  Defense  ...................................................................................  83   IV.B.1   Issuing  public  statements  about  whether  to  prosecute  .........................  84   IV.B.2   Issuing  public  statements  about  the  criminal  charges  ...........................  85   IV.B.3   Making  private  statements  to  the  prosecution  about  the     criminal  charges  .....................................................................................  85   IV.B.4   Providing  prosecution  and  defense  with  documents  and     access  to  MIT  employees  .......................................................................  86   IV.B.5   Taking  non-­‐neutral  positions  for  people  with  MIT  associations  ............  87 CONTENTS      |      vi     IV.B.6   Becoming  more  informed  about  the  charges  ........................................  87   IV.B.7   Engaging  more  deeply  with  issues  around  the  Computer  Fraud     and  Abuse  Act  ........................................................................................  88   PART  V:   QUESTIONS  FOR  THE  MIT  COMMUNITY  ......................................................................  89   Question  1:   Should  MIT  develop  additional  on-­‐campus  expertise     for  handling  potential  computer  crime  incidents,  thus     giving  the  Institute  more  flexibility  in  formulating  its     responses?    ............................................................................................  90   Question  2:   Should  MIT  policies  on  the  collection,  provision,  and     retention  of  electronic  records  be  reviewed?  ......................................  92   Question  3:     Should  an  MIT  education  address  the  personal  ethics     and  legal  obligations  of  technology  empowerment?  ...........................  92   Question  4:     Should  MIT  increase  its  efforts  to  bring  its  considerable     technical  expertise  and  leadership  to  bear  on  the  study     of  legal,  policy,  and  societal  impact  of  information  and   communications  technology?  ...............................................................  93   Question  5:     What  are  MIT’s  institutional  interests  in  the  debate  over     reforming  the  Computer  Fraud  and  Abuse  Act?  ...................................  94   Question  6:   Should  MIT  strengthen  its  activities  in  support  of  open     access  to  scholarly  publications?  ..........................................................  95   Question  7:     What  are  MIT’s  obligations  to  members  of  our     extended  community?  ...........................................................................  96   Question  8:     How  can  MIT  draw  lessons  for  its  hacker  culture  from     this  experience?  .....................................................................................  97   CONCLUSION  ..............................................................................................................................  100   APPENDICES  ................................................................................................................................  102   Appendix  1:   Letter  to  the  MIT  Community  from  President  Reif  .............................  103   Appendix  2:   Letter  from  Hal  Abelson  to  the  MIT  Community  ................................  104   Appendix  3:   Review  Panel  Members  .......................................................................  106   Appendix  4:   Processes  Followed  in  Preparing  This  Report  .....................................  108   4.A   Criterion  for  Naming  Individuals  ..........................................................  108   4.B   Documents  Examined  ..........................................................................  109   4.C   Process  for  MIT  Privileged  Documents  ................................................  109 CONTENTS      |      vii     4.D   People  Interviewed  ..............................................................................  109   4.E   Review  Process  for  Publishing  This  Report  ..........................................  111   Appendix  5:   Timeline  of  Events  ...............................................................................  112   Appendix  6:   JSTOR  and  the  MIT  Libraries  ................................................................  116   Appendix  7:   Records  Produced  by  MIT  to  Law  Enforcement  ..................................  118   7.A   Network  Flow  Data  Logs  ......................................................................  118   7.B   Dynamic  Host  Configuration  Protocol  (DHCP)  Server  Logs  ..................  118   7.C   RADIUS  Server  Logs  ..............................................................................  120   7.D   Network  Registration  Database  ...........................................................  120   7.E   Packet  Stream  ......................................................................................  121   Appendix  8:   MIT  and  Open  Access  Publishing  ........................................................  122   8.A   Open  Educational  Resources:  OpenCourseWare  .................................  122   8.B   Open  Repository  Software:  DSpace  .....................................................  122   8.C   Open  Access  to  MIT  Scholarly  Publications  ..........................................  123   8.D   Massive  Open  Online  Courses:  MITx  and  edX  ......................................  123   Appendix  9:   Some  Prior  Relevant  Incidents  at  MIT  ................................................  124   9.A   David  LaMacchia  (1994)  .......................................................................  124   9.B   Andrew  Huang  (2002)  ..........................................................................  126   9.C   Star  Simpson  (2007)  .............................................................................  127   Appendix  10:  Legal  Analysis  of  MIT’s  Provision  of  Documents     and  Packet  Capture  .............................................................................  129   10.A   The  Federal  Laws  Protecting  Electronic  Communications  ...................  129   10.A.1   The  electronic  communications  were  lawfully  disclosed  ........  130   10.A.2   The  metadata  was  lawfully  disclosed  ......................................  132   10.B   Massachusetts  Law  Regarding  Electronic  Communications  ................  132   10.C   Document  Production  ..........................................................................  133   Appendix  11:  Comments  on  the  Computer  Fraud  and  Abuse  Act     Charges  against  Aaron  Swartz  .............................................................  135   11.A   Exceeding  Authorized  Access  ...............................................................  135   11.B   Unauthorized  Access  ............................................................................  137   11.C   Losses  Exceeding  Five  Thousand  Dollars  ..............................................  139   Appendix  12:  Letter  from  JSTOR  to  Its  Publishers  .....................................................  141 CONTENTS      |      viii     Appendix  13:  Legal  Procedure  and  Practice  in  Criminal     Investigations  and  Prosecutions  .........................................................  142   13.A   The  U.S.  Department  of  Justice  and  the  United  States  Attorneys  .......  142   13.B   The  Investigative  Agencies  ...................................................................  143   13.C   The  Federal  Criminal  Investigation:  Pre-­‐indictment  .............................  144   13.D   The  Arrest  .............................................................................................  146   13.E   Investigations,  Discovery,  and  the  Asymmetric  Nature  of  Criminal   Litigation  ...............................................................................................  147   13.F   Interviews  and  Compliance  with  Subpoenas  .......................................  149   13.G   Pretrial  Motions  and  Hearings  .............................................................  150   13.H   The  Status  of  “Victims”  in  Federal  Prosecutions  ..................................  151   Appendix  14:  Questions  from  the  MIT  Community  ..................................................  153   Appendix  15:  Glossary  ...............................................................................................  162   ILLUSTRATIONS   Map  1.  The  MIT  Central  Campus  ....................................................................................  ix   Map  2.  The  Central  Square  Area  of  Cambridge  ..............................................................  x ILLUSTRATIONS      |      ix     Albany Street The person who was seen on video entering Building 16 network closet is noticed and followed by MIT Police (1/6/11) Vassar Street Vassar Street M a s sa Laptop connected to a switch in c a network closet is discovered h u by MIT IS&T (1/4/11) s e t t Stratton Bldg s Student Center A 16 v W20 e n u e Laptop first discovered in Building 16 is found connected to network port in SIPB offices and taken as evidence by MIT Police (1/6/11) Killian Court Memorial Drive Map  1.  The  MIT  Central  Campus ILLUSTRATIONS      |      x       Lee Street ACeanrotrna Sl Swqauratzr ea,r Creasmtebdr indegaer (1/6/11) Massachusetts Avenue The person who was seen on video entering Building 16 network closet is noticed and followed by MIT Police (1/6/11) Massachusetts AvenueVassar Street Massachusetts 16 Institute of Technology W20 Map  2.  The  Central  Square  Area  of  Cambridge

Description:
Jul 26, 2013 PRESIDENT REIF'S CHARGE TO HAL ABELSON | iii Internet celebrity—a former child prodigy who as a young teenager had worked.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.