MIT to probe its role in Aaron Swartz's suicide

Protests continue online with the MIT website inaccessible
  • John Ribeiro (IDG News Service)
  • — 14 January, 2013 04:18

The Massachusetts Institute of Technology is conducting an inquiry into its role in the legal struggles that are believed to have lead to the suicide Friday of Internet activist Aaron Swartz.

The institute's website was also inaccessible for a while late Sunday, apparently after protesters launched an attack on the site.

The Internet pioneer and computer programming prodigy faced a variety of charges in U.S. District Court for the District of Massachusetts, including computer intrusion, wire fraud and unlawful collection of information stemming from allegations that he used the MIT network to steal millions of scholarly articles and documents from the JSTOR database of scholarly articles between September 2010 and January 2011.

He allegedly intended to distribute the documents and articles through file-sharing sites. If convicted, he could have been hit with a 35-year jail sentence and a US$1 million fine.

"Although Aaron had no formal affiliation with MIT, I am writing to you now because he was beloved by many members of our community and because MIT played a role in the legal struggles that began for him in 2011," MIT president L. Rafael Reif said in a statement on Sunday.

Reif said he had asked Hal Abelson, professor of electrical engineering and computer science at the institution, to lead a thorough analysis of MIT's involvement from the time that it first noticed unusual activity on its network in fall 2010 up to the present.

"I have asked that this analysis describe the options MIT had and the decisions MIT made, in order to understand and to learn from the actions MIT took. I will share the report with the MIT community when I receive it," Reif said.

MIT did not immediately respond to a request for information on whether its website was under attack. Messages on Twitter by hacker group Anonymous and whistle-blower site WikiLeaks said the site had been brought down in protest against Swartz's death.

Decisions made by officials in the Massachusetts U.S. Attorney's office and at MIT contributed to his death, his family and partner said in a statement. The US Attorney's office pursued an exceptionally harsh array of charges, carrying potentially over 30 years in prison, to punish an alleged crime that had no victims, the family said. Unlike JSTOR, MIT refused to stand up for Aaron and its own community's most cherished principles, according to the statement.

Aaron returned the data he had in his possession and JSTOR settled any civil claims it might have had against him in June 2011, the not-for-profit service said in a statement on its website.

John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John's e-mail address is john_ribeiro@idg.com

Tags: security, legal, Massachusetts Institute of Technology, internet

Confirmed: hackers can use Heartbleed to steal private SSL keys

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Webroot Web Security

Proactive web security that blocks threats in the cloud before they reach users’ machines, or enter customers’ networks.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.