Feeds

Judge orders redacted Aaron Swartz prosecution docs to be revealed

MIT and JSTOR allowed to black out names and network info

Top three mobile application threats

A US judge has ordered that documents from the criminal hacking case against internet activist Aaron Swartz should be unsealed, after they've been redacted by MIT and JSTOR.

Swartz took his own life in January just ahead of the trial over the theft of academic articles from online reference library JSTOR using a computer at the Massachusetts Institute of Technology, which he allegedly planned to distribute online for free.

Since his death, critics have questioned whether Swartz was being prosecuted over-zealously, claiming that the Computer Fraud and Abuse Act under which he was charged carries overly heavy penalties and that prosecutors should make the distinction between misuse for criminal purposes and civil disobedience.

Both MIT and JSTOR argued against unsealing the court documents because people involved with the case had already been harassed and threatened. Revealing any other names would subject them to the same potential harassment, the two institutes said. However, they agreed that blanket protective orders preventing disclosure of the documents could be modified to apply only to sections of the paperwork, once names and identifying information had been blacked out.

District Judge Nathaniel Gorton therefore ordered the filings unsealed, once identities and sensitive information had been obscured.

"Although the public has expressed a strong interest in the investigation and prosecution of Mr Swartz, that fact does not bestow upon his estate the right to disclose criminal discovery materials produced to his counsel solely for the purpose of preparing for trial," Gorton said in his ruling.

"This is particularly true where disclosure may subject third parties to threats and harassment, and where those same parties have already expressed their intention to make public the records sought with appropriate redaction.

"Redaction of this kind of information perhaps runs a greater risk of rendering aspects of the government's investigation less clear to the public because it will result in the redaction of what was said, rather than merely who said it. Even so, the redaction is justified in order to protect the victims from further network intrusions," said Gorton. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
US Supreme Court supremo rakes Aereo lawman in oral arguments
Antenna-array content streamers: 'Ruling against us could dissipate the cloud'
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.