Petition seeks removal of Swartz prosecutor Ortiz petition gets 40,000 signatures in four-plus days; needs 100,000 in 30 days for White House response

A petition posted on that seeks the removal of U.S. Attorney Carmen Ortiz, who oversaw the prosecution of Internet activist and pioneer Aaron Swartz on hacking-related charges, has is nearing 40,000 signatures.

The White House will respond to the petition if it gets 100,000 signatures in 30 days. The petition drive was launched on Jan. 12.

The White House today raised the threshold from 25,000 signatures to 100,000 signatures in 30 days because response to the so-called We the People program "has exceeded our wildest expectations."

The petition was launched a day after Swartz' suicide last Friday.

The petition seeks the removal of Ortiz from her post in Massachusetts because its backers contend she "overreached" in the Swartz case.

"A prosecutor who does not understand proportionality and who regularly uses the threat of unjust and overreaching charges to extort plea bargains from defendants regardless of their guilt is a danger to the life and liberty of anyone who might cross her path," the petition claimed.

The petition was launched on Jan. 12 and had received about 37,000 signatures as of early Wednesday afternoon.

Many believe that the 26-year old Swartz was driven to suicide by fears that he would have to spend decades in prison on the hacking charges brought against him by Ortiz.

Swartz was indicted on 13 counts of felony hacking and wire fraud related to the alleged theft of millions of documents from JSTOR, an online library of literary journals and scholarly documents sold by subscription to universities and other institutions.

The indictment charged that Swartz violated were tied to allegations that he violated parts of the Computer Fraud and Abuse Act (CFAA), a stringent federal anti-hacking statute that provides for prison terms ranging from five years to life in prison for felony violations.

Prosecutors claimed that Swartz, while a Fellow at Harvard University, misused his guest access privileges on neighboring Massachusetts Institute of Technology's network to illegally access and download over two million documents from JSTOR.

In court documents, prosecutors portrayed Swartz as an individual who went to considerable lengths to access the documents.

Prosecutors say Swartz broke into a utility closet at MIT to surreptitiously connect his computer to the university's network. Swartz hid his face behind a bicycle helmet whenever he accessed the closet, and used automated scripts to download more documents that he was allowed to, the court papers say.

In addition, Swartz repeatedly took steps to thwart JSTOR's attempts to block his downloads, the papers say.

Swartz contended that he took the documents to make them freely available to everyone online via file-sharing sites.

Countless supporters argue that while Swartz' actions may have been misguided, they did not merit the charges leveled against him by prosecutors. His backers say the charges filed by prosecutors, and potential jail time Swartz faced if found guilty, were onerous for what they call a minor infraction.

Swartz's death has galvanized calls for a review of how prosecutors interpret the CFAA law.

Several legal experts have said that overzealous prosecutors misuse the law to prosecute individuals for violating relatively minor crimes, such as ignoring a website user agreements or terms of service agreements.

Some experts note that the CFAA's references to "unauthorized access" and "exceeding authorized access" apply specifically to malicious hacking incidents and not to situations where someone with legitimate access to a system might misuse that access to misappropriate data.

Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is

Read more about legal in Computerworld's Legal Topic Center.

Join the CSO newsletter!

Error: Please check your email address.

Tags Cybercrime and Hackingsecuritylegal

More about Harvard UniversityMassachusetts Institute of TechnologyMITTechnologyTopic

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jaikumar Vijayan

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts