Aaron Swartz was no criminal
Dan Purcell, one of Swartz' lawyers, writes about the spiteful and unreasonable charges that led to his suicide—and MIT's gutless support of his prosecutors.
I am a lawyer in San Francisco with a firm called Keker & Van Nest. I was one of Aaron's lawyers in his criminal case, in 2012 and early 2013.
I didn’t know Aaron that well, and our interactions were always colored by the fact that he didn’t really want to be talking to me. I was a criminal defense lawyer after all, and the only reason we knew each other was because he was facing a federal criminal indictment under the CFAA (Computer Fraud and Abuse Act) for computer fraud.
Those of you who knew Aaron don't need me to tell you what kind of person he was. Brian Knappenberger's excellent movie, "The Internet's Own Boy," will tell you more about Aaron than I could. But one thing Aaron was not was a criminal, and I'm here to clear up a few misconceptions you may have about what he did and what he was charged with.
One thing that drives me crazy is when people refer to his criminal case as a case about "hacking." And they do it in sort of a pejorative, scary way. And it's just nonsense. Aaron was, of course, a hacker in the broad sense of the term: he was an innovative thinker, looking for creative ways around problems. But in the criminal sense of the word, as somebody who breaks into a secure computer system for nefarious purposes, Aaron was no hacker, and he didn't do anything like that.
One thing that Aaron strongly believed was that the advances, the discoveries and the secrets we’ve collectively unlocked over the past millennia, about how the world works, belong to all of us. Aaron greatly resented people or entities who try to lock up scientific knowledge and keep it away from general use, so they might monetize it for personal gain.
You might be surprised at how much money is being made in this world by entities that follow just that business model. They take things that are in the public domain, and take them out of the public domain, and then charge for access to them. One field where this happens a lot is academic publishing. Obviously, there is so much information in so many books that it’s not practical to just have physical copies of them all. Digitizing all that data is an easy solution, and indeed there are many places to look up scholarly content online. But when you go to try to do that, you'll generally find that there's a subscription fee, or you can't access them unless you are affiliated with a certain institution. They're in the public domain—meaning that everyone is entitled to read it—but they’re not actually public or available for public use.
This bothered Aaron. It bothered him a lot. And he had fought against this problem throughout his life. He wanted to teach the system a lesson. So, he went to MIT, a university that had, and still has, one of the most permissive computer networks in the world—certainly for an institution of that size. At the time he did what he did, in 2010-2011, anyone in the world could walk onto MIT’s campus. With or without a student ID. With or without any affiliation with MIT at all. They could log on to MIT’s system as a guest. They didn't have to use their real name. And then they could do whatever they wanted on MIT's system.
One thing that MIT made available to its users was access to JSTOR, an online database of scholarly materials. So anybody in the world could go to MITs campus, they could get on to JSTOR, and they could download articles from JSTOR. Anyone.
That’s what Aaron did.
He went to the MIT campus, like anyone could have done. He logged onto the system, like anyone could have done. He went on to JSTOR, like anyone could have done. And he downloaded articles.
That is not hacking. That is walking through a door that MIT, the owner of the door, deliberately left open for anyone to walk through.
Of course, the story's not exactly that simple, because Aaron didn’t want to take the time to manually download thousands of articles, which would have been impractical. He wrote what experts have confirmed was a fairly simple computer program to automate the downloading. So he left his laptop behind, and he went on his way. He downloaded the files, but he didn't steal anything; he used the access freely given at MIT. All the articles that he downloaded stayed in the JSTOR database. They were still available to anybody with access to JSTOR. If you have a JSTOR subscription, and you go to the database, they are still there today. He didn't deprive anybody of access to that material.
After a while, JSTOR noticed the downloading activity and JSTOR shut down access to their database from MIT’s network. For a few days, nobody could get onto JSTOR using the MIT network. That was an inconvenience, for sure, but it was temporary, and MIT’s access to JSTOR was soon restored.
What Aaron did, whether you call it a prank or a consciousness-raising exercise, was not a crime. He downloaded a bunch of articles he was permitted to access using an automated program that made it easier. The idea that anybody could think that was a crime was insane to me. Was it inconsiderate? Possibly. Many acts of civil disobedience and conscious-raising are, and I think Aaron probably would have pleaded guilty to that.
JSTOR was the ostensible victim here, but JSTOR made it clear from the start that they didn't see this as a Federal case. They didn't want Aaron to be prosecuted; they just basically wanted it to be over.
So, why all the fuss? Why did this terrible thing happen?
The first reason is prosecutorial discretion. The prosecutor was Steve Heymann, the head of the Computer Crimes division of the United States Attorney’s office in Boston. You’ll hear a little from him, and a little about him, in Brian’s movie, but I have nothing good to say about him. You might ask, like I did, what Aaron’s actions had to do with “computer crimes.” Aaron hadn’t broken into a secure network and stolen credit card numbers. He hadn't stolen anyone's healthcare data. He hadn't violated anyone's privacy. He hadn't caused anybody to lose any money. There are things that are "computer crimes" that we all recognize are invasive and dangerous, and this was not one of them.
But Steve Heymann did what bureaucrats and functionaries often choose to do. He wanted make a big case to justify his existence and justify his budget. The casualties be damned.
Unfortunately, he had a lot of weapons on his side, in addition to having the power of the Federal Government. He had the Computer Fraud and Abuse Act, which is an over broad federal statute that has been made more broad by federal prosecutors trying to stretch its terms. But under the indictment in Aaron's case, the government still had to prove that Aaron had gained unauthorized access to a computer system. Our defense was really pretty simple. There were going to be other nuances, and we were going to talk a lot about Aaron’s motivations and the type of person Aaron was, but our bottom line was going to be that Aaron had done only what MIT permitted him to do. He hadn't gained unauthorized access to anything. He had gained access to JSTOR with full authorization from MIT. Just like anyone in the jury pool, anyone reading Boing Boing, or anyone in the country could have done.
We hoped that the jury would understand that and would acquit Aaron, and it quickly became obvious to us that there really wasn't going to be opportunity to resolve the case short of trial because Steve Heymann was unreasonable.
Of course, after Aaron's passing, it's really easy for them to say "35 years. That was a bluff. It was never gonna happen." That was not what they were telling us. Heymann always insisted on a sentence of hard time in Federal Prison. We said, "this is really a very trivial thing. Can't we resolve it with probation or some other thing that made a little more sense and would make it possible for Aaron to go on with his life?”
He said "no." He insisted that Aaron plead to a felony and serve prison time. And of course, what he said, as prosecutors often do, is that if we go to trial, it won't be so easy, and if we lose, well, this is a tough judge, and the prosecution is going to recommend a very difficult sentence. Aaron may end up having a term of years.
These after-the-fact statements they're making in the media, to try to make them seem more reasonable? That's all they are.
It really goes to show you how much power prosecutors wield in our Federal system. They dictate the charges that are brought. They dictate how serious the sentence will be, because the sentence depends on how the crime is charged, and there are sentencing guidelines that limit the judge’s discretion. And if a prosecutor has bad judgment, as Steve Heymann did—blowing out of all proporition a harmless effort to point out a problem with how public-domain information is being locked up—there isn't a lot you can do about that other than fight, and the consequences can be terrible.
The second reason for this terrible outcome is MIT.
As a defense attorney, I never expect the prosecutors to do the right thing, but I did expect MIT to do the right thing. JSTOR, as I said, came out and said "We don't want to see Aaron prosecuted. We consider the matter closed." MIT never did that. MIT carries a lot of water in Boston. I don't know if they could have stopped Heymann from prosecuting Aaron, but they could have done a lot more than they did.
MIT is an institution that was known for creativity, for hacking, for pranks, for pushing the boundaries—and for showing that good can come out of it. In this case, they responded like a typical corporation. They were entirely gutless. They were supplicants to the government, and they did whatever they could to help the government's case. They were not cooperative with us. A lot of people in the MIT community are furious with MIT, and I think they have good reason to be.
There's no question that Aaron paid a price because of who he was, because he was in the habit of sticking his thumb in the eye of the government, of challenging things, and of challenging certain things that were happening that weren't fair. He was an activist, and he wasn't afraid to ruffle a few feathers.
We'll see what the FOIA requests come to. I don't think there were orders from on high to hurt Aaron, and that Steven Heymann was just the arm of the law. But there's no question in our society, those that go along, get along better, and Aaron wasn't willing to go along, much to his credit.
In the end, the whole thing makes me very sad. It is sad for all of us that Aaron is no longer with us. Sad for his family and friends, most of all. I’m sad I didn’t have the chance to try to help him, and walk him out of the courtroom a free man. We could have done that, and it was certainly what he deserved. But I'm glad to honor Aaron's memory, and to think about what we can do for our own sakes, and our country’s sake.
Former dentist Kuang-Yi Ku created a prototype orthodontic retainer designed to improve the fellatio experience for the wearer’s partner. After practicing dentistry for six years, Ku is now a student at Design Academy in Eindhoven, the Netherlands. His Fellatio Modification Project is a speculative design effort featured in the Science Gallery London’s new exhibit Mouthy: […]
Truth and Power: New TV series on ordinary people exposing corruption from Brian Knappenberger ('Internet's Own Boy')
Today on KCRW’s Press Play, a daily news program to which I’m a contributor, host Madeleine Brand spoke to filmmaker Brian Knappenberger about his new documentary TV series Truth and Power. Audio of the interview is below. The series is narrated by Maggie Gyllenhaall, and kicks off Friday on Pivot. Here’s a trailer. The new […]
Lisa Rein writes, “Chelsea Manning prepared a statement for this year’s “Aaron Swartz Day Celebration of Hackers and Whistleblowers That Make The World A Better Place” that took place at the Internet Archive, in San Francisco, on November 7th. It’s pretty amazing.
Things move fast in the world of social media, and they don’t slow down for marketers looking to make an impact. Whether you’re grabbing eyeballs for a major company or a local business, you’ll need to adjust your strategy for every platform. Don’t have a strategy to begin with? That’s where the Social Media Marketing […]
It’s a rude awakening for that rookie vacationer abroad when they try to plug in their gear for the night. Veteran jet-setters know that outlet shapes can vary wildly from country to country, which necessitates that most boring must-have for any world-traveler: A sackful of clunky power adapters. Awkward problem, elegant solution: The Twist Plus […]
Looking for a career in music behind the boards, either as a music producer or DJ? It’s a good bet that you’re going to be working with Ableton Live. Each new iteration of this powerful workstation gives the user more tools to create, and it’s just as well suited for the task of meticulous track […]