Personal Democracy Plus Our premium content network. LEARN MORE You are not logged in. LOG IN NOW >

Swartz’s Suicide Prompts Proposals To Curb DOJ’s Prosecutorial Power

BY Sarah Lai Stirland | Wednesday, January 16 2013

The suicide of Aaron Swartz, a prodigy whose technical contributions and political advocacy helped to shape the open architecture of the Internet, has revived calls to rein in the extent of the power that the Justice Department enjoys when it pursues suspects accused of computer crimes.

Swartz became the focus of a DOJ prosecution in 2011 after he allegedly violated the terms of service of JSTOR, a not-for-profit database of academic journals, by using an automated program to rapidly download in bulk almost five million articles between late September 2010 and early January 2011. Swartz downloaded the journal articles at MIT, whose network administrators then tried repeatedly to block his laptop from the university’s network. Swartz responded by changing the settings on his computer to get around these attempted virtual road blocks.

In an updated indictment filed with the federal district court for the district of Massachusetts last September, DOJ prosecutors criminally charged Swartz with violating several sections of the Computer Fraud and Abuse Act. Among other things, the DOJ charged Schwartz with violating JSTOR’s rules for using its service, fraudulently obtaining access to MIT’s network and the JSTOR database, accessing MIT’s network on an unauthorized basis, and impairing access to both JSTOR’s databases and MIT’s network while downloading thousands of journal articles en masse. Swartz potentially faced millions of dollars in fines and decades behind bars. His lawyers and family say the Justice Department prosecutors abused the power they wielded in order to coerce Swartz into a deal.

Many cyberlaw expertssay that the DOJ wouldn’t have been able to wield as much power if the Computer Fraud and Abuse Act wasn’t so vaguely written. Beyond “accessing a computer without authorization,” the law itself doesn’t provide much more detail, leaving it up to prosecutors to argue, and courts to determine, what nature of access constitutes a felony and what doesn’t.

“Since every communication with a computer is access, the distinguishing line between legal and prison is the ephemeral concept of ‘authorization.' Authorization is in the eye of the beholder," writes Jennifer Granick, the civil liberties director at Stanford University’s Center for Internet and Society in a recent blog post. Granick has also defended several hackers during her career. “Desired uses of systems can be expressed in terms of service, clickthrough notices (sometimes competing) cultural expectations, technological protection measures, employment contracts, or cease and desist letters.”

Similarly, Orin Kerr, a professor at George Washington University law school who’s seen as one of the preeminent voices on cybercrime law, has argued in the past that the law is too vague because it could make the violation of any contract a crime, regardless of the alleged crime’s impact. (But in Swartz’s case, he argues that the Justice Department brought the case based on a fair reading of the law — the question is whether they should have brought the case against him at all.)

To address these concerns, Rep. Zoe Lofgren is working on a bill that would specify that violations of terms of service contracts and employment agreements governing computer use are not a form of “unauthorized access” under the criminal code.

Lofgren posted a discussion draft of the proposed legislation on the social news site Reddit on Tuesday night. Harvard Law professor Larry Lessig, a friend and mentor to Swartz, posted a comment there saying he thought it was a good idea.

The California lawmaker’s move to amend the legislation is just the latest legislative attempt to fix what many critics are calling a crucial flaw in the law that gives the DOJ to much leeway in the way it pursues its cases against anyone accused of hacking.

Patrick Leahy, chairman of the Senate Judiciary Committee, has repeatedly tried to add an amendment with similar language to various legislative vehicles in the past couple of years. However, the status of that effort is in doubt, as the Electronic Frontier Foundation recently pointed out, because the Justice Department is pushing to expand its powers as part of the administration’s push on cybersecurity.

In testimony prepared for the Senate Judiciary Committee from November 2011, the DOJ explicitly opposed narrowing the definition of what “unauthorized access” means.

“We are concerned that that restricting the statute in this way would make it difficult or impossible to deter and address serious insider threats through prosecution,” according to testimony submitted at the time by Richard Downing, the DOJ’s deputy chief of its computer crime and intellectual property section of its criminal division.

He then proceeded to name several cases whereupon prosecutors had successfully used to the law and its wording to go after individuals who had done nefarious things in different circumstances. In one example, Downing recalled a case where a police officer leaked information from a law enforcement database to a defense investigator in a drug trafficking case. Federal prosecutors successfully used the Computer Fraud and Abuse Act and its language on unauthorized access to argue that the officer had exceeded the authority given to him when accessing the database for an improper purpose.

The courts, however, are split on the issue. While a 9th Circuit appeals court has decided that the language should be interpreted narrowly, the 5th, 7th and 11th circuits have interpreted the law as is, setting up the issue for the Supreme Court to potentially settle.

Some believe the recent focus on the Computer Fraud and Abuse Act is misguided, and that changing the wording in the law wouldn’t have helped Swartz much because DOJ attorneys have access to a broader range of legal tools they did and could have used against Schwartz. (The DOJ charged Swartz with wire fraud too.)

“There’s all kinds of statutes you can use,” noted Nick Akerman, a former federal prosecutor at the DOJ and trial lawyer and partner in the New York City offices of Dorsey, a law firm. “The whole idea that somehow changing this unauthorized access makes a difference is nothing more than saying whether this person had permission or did not have permission. That only begs the question of whether this case was worthy of being brought or not in the first instance under any fraud statute.”

Transparency and Public Shaming: Pakistan Tackles Tax Evasion

In Pakistan, where only one in 200 citizens files their income tax return, authorities published a directory of taxpayers' details for the first time. Officials explained the decision as an attempt to shame defaulters into paying up.


wednesday >

Facebook Seeks Approval as Financial Service in Ireland. Is the Developing World Next?

On April 13 the Financial Times reported that Facebook is only weeks away from being approved as a financial service in Ireland. Is this foray into e-money motivated by Facebook's desire to conquer the developing world before other corporate Internet giants do? Maybe.


The Rise and Fall of Iran's “Blogestan”

The robust community of Iranian bloggers—sometimes nicknamed “Blogestan”—has shrunk since its heyday between 2002 – 2010. “Whither Blogestan,” a recent report from the University of Pennsylvania's Iran Media Program sought to find out how and why. The researchers performed a web crawling analysis of Blogestan, survey 165 Persian blog users, and conducted 20 interviews with influential bloggers in the Persian community. They found multiple causes of the decline in blogging, including increased social media use and interference from authorities.


tuesday >

Weekly Readings: What the Govt Wants to Know

A roundup of interesting reads and stories from around the web. GO

Russia to Treat Bloggers Like Mass Media Because "the F*cking Journalists Won't Stop Writing"

The worldwide debate over who is and who isn't a journalist has raged since digital media made it much easier for citizen journalists and other “amateurs” to compete with the big guys. In the United States, journalists are entitled to certain protections under the law, such as the right to confidential sources. As such, many argue that blogging should qualify as journalism because independent writers deserve the same legal protections as corporate employees. In Russia, however, earning a place equal to mass media means additional regulations and obligations, which some say will lead to the repression of free speech.


Politics for People: Demanding Transparent and Ethical Lobbying in the EU

Today the Alliance for Lobbying Transparency and Ethics Regulation (ALTER-EU) launched a campaign called Politics for People that asks candidates for the European Parliament to pledge to stand up to secretive industry lobbyists and to advocate for transparency. The Politics for People website connects voters with information about their MEP candidates and encourages them to reach out on Facebook, Twitter or by email to ask them to sign the pledge.


monday >

Security Agencies Given Full Access to Telecom Data Even Though "All Lebanese Can Not Be Suspects"

In late March, Lebanese government ministers granted security agencies unrestricted access to telecommunications data in spite of some ministers objections that it violates privacy rights. Global Voices reports that the policy violates Lebanon's existing surveillance and privacy law, Law 140, but has gotten little coverage from the country's mainstream media.


friday >

In Google Hangout, NYC Mayor de Blasio Talks Tech and Outer Borough Potential

New York City Mayor Bill de Blasio followed the lead of President Obama and New York City Council member Ben Kallos Friday by participating in a Google Hangout to help mark his first 100 days in office, in which the conversation focused on expanding access to technology opportunities through education and ensuring that the needs of the so-called "outer boroughs" aren't overlooked. GO