Personal Democracy Plus Our premium content network. LEARN MORE You are not logged in. LOG IN NOW >

Swartz’s Suicide Prompts Proposals To Curb DOJ’s Prosecutorial Power

BY Sarah Lai Stirland | Wednesday, January 16 2013

The suicide of Aaron Swartz, a prodigy whose technical contributions and political advocacy helped to shape the open architecture of the Internet, has revived calls to rein in the extent of the power that the Justice Department enjoys when it pursues suspects accused of computer crimes.

Swartz became the focus of a DOJ prosecution in 2011 after he allegedly violated the terms of service of JSTOR, a not-for-profit database of academic journals, by using an automated program to rapidly download in bulk almost five million articles between late September 2010 and early January 2011. Swartz downloaded the journal articles at MIT, whose network administrators then tried repeatedly to block his laptop from the university’s network. Swartz responded by changing the settings on his computer to get around these attempted virtual road blocks.

In an updated indictment filed with the federal district court for the district of Massachusetts last September, DOJ prosecutors criminally charged Swartz with violating several sections of the Computer Fraud and Abuse Act. Among other things, the DOJ charged Schwartz with violating JSTOR’s rules for using its service, fraudulently obtaining access to MIT’s network and the JSTOR database, accessing MIT’s network on an unauthorized basis, and impairing access to both JSTOR’s databases and MIT’s network while downloading thousands of journal articles en masse. Swartz potentially faced millions of dollars in fines and decades behind bars. His lawyers and family say the Justice Department prosecutors abused the power they wielded in order to coerce Swartz into a deal.

Many cyberlaw expertssay that the DOJ wouldn’t have been able to wield as much power if the Computer Fraud and Abuse Act wasn’t so vaguely written. Beyond “accessing a computer without authorization,” the law itself doesn’t provide much more detail, leaving it up to prosecutors to argue, and courts to determine, what nature of access constitutes a felony and what doesn’t.

“Since every communication with a computer is access, the distinguishing line between legal and prison is the ephemeral concept of ‘authorization.' Authorization is in the eye of the beholder," writes Jennifer Granick, the civil liberties director at Stanford University’s Center for Internet and Society in a recent blog post. Granick has also defended several hackers during her career. “Desired uses of systems can be expressed in terms of service, clickthrough notices (sometimes competing) cultural expectations, technological protection measures, employment contracts, or cease and desist letters.”

Similarly, Orin Kerr, a professor at George Washington University law school who’s seen as one of the preeminent voices on cybercrime law, has argued in the past that the law is too vague because it could make the violation of any contract a crime, regardless of the alleged crime’s impact. (But in Swartz’s case, he argues that the Justice Department brought the case based on a fair reading of the law — the question is whether they should have brought the case against him at all.)

To address these concerns, Rep. Zoe Lofgren is working on a bill that would specify that violations of terms of service contracts and employment agreements governing computer use are not a form of “unauthorized access” under the criminal code.

Lofgren posted a discussion draft of the proposed legislation on the social news site Reddit on Tuesday night. Harvard Law professor Larry Lessig, a friend and mentor to Swartz, posted a comment there saying he thought it was a good idea.

The California lawmaker’s move to amend the legislation is just the latest legislative attempt to fix what many critics are calling a crucial flaw in the law that gives the DOJ to much leeway in the way it pursues its cases against anyone accused of hacking.

Patrick Leahy, chairman of the Senate Judiciary Committee, has repeatedly tried to add an amendment with similar language to various legislative vehicles in the past couple of years. However, the status of that effort is in doubt, as the Electronic Frontier Foundation recently pointed out, because the Justice Department is pushing to expand its powers as part of the administration’s push on cybersecurity.

In testimony prepared for the Senate Judiciary Committee from November 2011, the DOJ explicitly opposed narrowing the definition of what “unauthorized access” means.

“We are concerned that that restricting the statute in this way would make it difficult or impossible to deter and address serious insider threats through prosecution,” according to testimony submitted at the time by Richard Downing, the DOJ’s deputy chief of its computer crime and intellectual property section of its criminal division.

He then proceeded to name several cases whereupon prosecutors had successfully used to the law and its wording to go after individuals who had done nefarious things in different circumstances. In one example, Downing recalled a case where a police officer leaked information from a law enforcement database to a defense investigator in a drug trafficking case. Federal prosecutors successfully used the Computer Fraud and Abuse Act and its language on unauthorized access to argue that the officer had exceeded the authority given to him when accessing the database for an improper purpose.

The courts, however, are split on the issue. While a 9th Circuit appeals court has decided that the language should be interpreted narrowly, the 5th, 7th and 11th circuits have interpreted the law as is, setting up the issue for the Supreme Court to potentially settle.

Some believe the recent focus on the Computer Fraud and Abuse Act is misguided, and that changing the wording in the law wouldn’t have helped Swartz much because DOJ attorneys have access to a broader range of legal tools they did and could have used against Schwartz. (The DOJ charged Swartz with wire fraud too.)

“There’s all kinds of statutes you can use,” noted Nick Akerman, a former federal prosecutor at the DOJ and trial lawyer and partner in the New York City offices of Dorsey, a law firm. “The whole idea that somehow changing this unauthorized access makes a difference is nothing more than saying whether this person had permission or did not have permission. That only begs the question of whether this case was worthy of being brought or not in the first instance under any fraud statute.”

News Briefs

RSS Feed thursday >

NYC Open Data Advocates Focus on Quality And Value Over Quantity

The New York City Department of Information Technology and Telecommunications plans to publish more than double the amount of datasets this year than it published to the portal last year, new Commissioner Anne Roest wrote last week in an annual report mandated by the city's open data law, with 135 datasets scheduled to be released this year, and almost 100 more to come in 2015. But as preparations are underway for City Council open data oversight hearings in the fall, what matters more to advocates than the absolute number of the datasets is their quality. GO

Civic Tech and Engagement: Announcing a New Series on What Makes it "Thick"

Announcing a new series of feature articles that we will be publishing over the next several months, thanks to the support of the Rita Allen Foundation. Our focus is on digitally-enabled civic engagement, and in particular, how and under what conditions "thick" digital civic engagement occurs. What we're after is answers to this question: When does a tech tool or platform enable actual people to make ongoing and significant contributions to each other, to a place or cause, at a scale that produces demonstrable change? GO

monday >

Tweets2Rue Helps Homeless to Help Themselves Through Twitter

While most solutions to homelessness focus on addressing physical needs -- a roof over the head and food to eat -- one initiative in France known as Tweets2Rue knows that for the homeless, a house is still not a home, so to speak: the homeless are often entrenched in a viscous cycle of social isolation that keeps them invisible and powerless. GO

Oakland's Sudo Mesh Looks to Counter Censorship and Digital Divide With a Mesh Network

In Oakland, a city with deep roots in radical activism and a growing tech scene at odds with the hyper-capital-driven Silicon Valley, those at the Sudo Room hackerspace believe that the solution to a wide range of problems, from censorship to the digital divide, is a mesh net, a type of decentralized network that is resilient to censorship and disruption and can also bring connectivity to poor communities.

GO

More