Ed Felten comments on the news that MIT has moved to delay the release of the Secret Service files on Aaron Swartz:
It seems unlikely that MIT will find information redactable under FOIA that hasn’t already been redacted by the Secret Service.
But there are two things that MIT’s filing will more likely achieve. First, it will delay the disclosure of facts about MIT’s role in the Swartz investigation. Second, it will help MIT prepare its public-relations response to whatever is in the documents.
MIT is acting like it has something to hide. This is deeply worrying for people like me who think of MIT and American universities more generally as unique and valuable institutions.
What made MIT great is the way it made itself a mecca for the Aaron Swartzes of the world. Over the years, MIT was willing to make investments and take a few risks to build a community devoted to the creation and dissemination of knowledge. If someone broke the rules in a way that didn’t strike at the institution’s core values, they faced consequences that were proportionate and aimed to educate—not a relentless Federal prosecutor threatening decades in prison.
What I fear most of all is that we will learn that MIT encouraged the U.S. Attorney to behave the way she did.
MIT asks to intervene in Swartz FOIA suit
The Freedom of the Press Foundation’s lawsuit against the DoJ has resulted in the release of documents showing that a bill with that was nearly unanimously supported in Congress and the Senate was killed by behind-the-scene lobbying by the Department of Justice, which feared that they would lose the ability to arbitrarily reject Freedom of […]
Lee Jae-yong is nominally “vice-chairman” of Samsung, but his father, Samsung chairman Lee Kun-hee, is considered to be a mere figurehead, with Lee Jae-yong as the true boss of the company.
NSO is an Israel cyberarms dealer, which buys or researches vulnerabilities in software and then weaponizes them; claiming that these cyberweapons will only be used by democratic governments and their police forces to attacks serious criminals and terrorists — a claim repeated by its competitors, such as Italy’s Hacking Team and Gamma Group.
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]