Feeds

Reddit programmer charged with massive data theft

Harvard ethics fellow accused of hacking MIT

SANS - Survey on application security programs

A former employee of Reddit has been accused of hacking into the computer systems of the Massachusetts Institute of Technology and downloading almost 5 million scholarly documents from a nonprofit archive service.

Aaron Swartz, a 24-year-old researcher in Harvard University's Center for Ethics, broke into a locked computer-wiring closet in an MIT basement and used a switch there to gain unauthorized access the college's network, federal prosecutors alleged Tuesday. He then downloaded 4.8 million articles from JSTOR, an online archive of more than 1,000 academic journals, according to an indictment filed in US District Court in Boston.

“As JSTOR, and then MIT, became aware of these efforts to steal a vast proportion of JSTOR's archive, each took steps to block the flow of articles to Swartz's computer and thus to prevent him from redistributing them,” the court document stated. “Swartz, in turn, repeatedly altered the appearance of his Acer laptop and the apparent source of his automated demands to get around JSTOR's and MIT's blocks against his computer.”

Attempts to reach Swartz for comment weren't immediately successful. According to his personal website, he is a cofounder of the social news website Reddit, although many people dispute this characterization. He is also the author of numerous articles on a variety of topics including “the corrupting influence of big money on institutions.”

Members of Demand Progress, a nonprofit political action group Swartz founded, criticized the indictment.

“This makes no sense,” the group's executive director, David Segal, said in a statement. “It’s like trying to put someone in jail for allegedly checking too many books out of the library.”

When JSTOR blocked the MIT IP address Swartz used in September, for example, the Harvard fellow allegedly incremented a single digit and resumed his wholesale downloading binge, which was streamlined with a custom Python script. JSTOR at times responded by blocking huge ranges of IP addresses, causing legitimate JSTOR users at MIT to be denied access.

Eventually, MIT responded by blocking the MAC address of his Acer laptop, so Swartz allegedly spoofed the digital serial number, again by incrementing a single character of the address.

According to authorities, Swartz hid the laptop and a battery of external hard drives under a box in the wiring closet so they wouldn't be noticed by anyone who entered the enclosure. He then periodically swapped out the drives, taking pains to mask his face with a bicycle helmet to evade identification.

Of the 4.8 million documents allegedly downloaded, about 1.7 million of them were made available for purchase by independent publishers. Prosecutors said Swartz planned to dump the huge stash on one or more file-sharing sites.

Swartz was charged with computer intrusion, fraud, and data theft. If convicted, he faces a maximum of 35 years in prison, restitution and forfeiture, and a fine of $1 million. A PDF of the indictment is here. ®

This post was updated to clarify Swartz's position at Reddit and to add comments from Demand Progress.

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.