Petition seeks removal of Swartz prosecutor Ortiz
Whitehouse.gov petition gets almost 40,000 signatures in four-plus days; beats deadline for increased threshold so White House must respond
Computerworld - A petition posted on whitehouse.gov that seeks the removal of U.S. Attorney Carmen Ortiz, who oversaw the prosecution of Internet activist and pioneer Aaron Swartz on hacking-related charges, is nearing 40,000 signatures.
Under the so-called "We the People" program, the White House will respond to any petition started before today that gains at least 25,000 signatures. The petition drive was launched on Jan. 12, a day after Swartz committed suicide.
The White House today raised the threshold from 25,000 signatures to 100,000 signatures in 30 days for any new petitions because response to the program "has exceeded our wildest expectations."
The petition seeks the removal of Ortiz from her post in Massachusetts because its backers contend she "overreached" in the Swartz case.
"A prosecutor who does not understand proportionality and who regularly uses the threat of unjust and overreaching charges to extort plea bargains from defendants regardless of their guilt is a danger to the life and liberty of anyone who might cross her path," the petition claimed.
The petition was launched on Jan. 12 and had received about 37,000 signatures as of early Wednesday afternoon.
Many believe that the 26-year old Swartz was driven to suicide by fears that he would have to spend decades in prison on the hacking charges brought against him by Ortiz.
Swartz was indicted on 13 counts of felony hacking and wire fraud related to the alleged theft of millions of documents from JSTOR, an online library of literary journals and scholarly documents sold by subscription to universities and other institutions.
The indictment charged that Swartz violated were tied to allegations that he violated parts of the Computer Fraud and Abuse Act (CFAA), a stringent federal anti-hacking statute that provides for prison terms ranging from five years to life in prison for felony violations.
Prosecutors claimed that Swartz, while a Fellow at Harvard University, misused his guest access privileges on neighboring Massachusetts Institute of Technology's network to illegally access and download over two million documents from JSTOR.
In court documents, prosecutors portrayed Swartz as an individual who went to considerable lengths to access the documents.
Prosecutors say Swartz broke into a utility closet at MIT to surreptitiously connect his computer to the university's network. Swartz hid his face behind a bicycle helmet whenever he accessed the closet, and used automated scripts to download more documents that he was allowed to, the court papers say.
In addition, Swartz repeatedly took steps to thwart JSTOR's attempts to block his downloads, the papers say.
Swartz contended that he took the documents to make them freely available to everyone online via file-sharing sites.
Countless supporters argue that while Swartz' actions may have been misguided, they did not merit the charges leveled against him by prosecutors. His backers say the charges filed by prosecutors, and potential jail time Swartz faced if found guilty, were onerous for what they call a minor infraction.
Swartz's death has galvanized calls for a review of how prosecutors interpret the CFAA law.
Several legal experts have said that overzealous prosecutors misuse the law to prosecute individuals for violating relatively minor crimes, such as ignoring a website user agreements or terms of service agreements.
Some experts note that the CFAA's references to "unauthorized access" and "exceeding authorized access" apply specifically to malicious hacking incidents and not to situations where someone with legitimate access to a system might misuse that access to misappropriate data.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- Syrian Electronic Army shanghais Microsoft's Twitter account, blog
- Is French outrage against U.S. spying misplaced?
- Lawmakers seek answers on Obamacare Data Hub security
- China-based hacking group behind hundreds of attacks on U.S. companies
- How to Prepare for a Potential Syrian Counterattack on the U.S. Power Grid
- New York Times site outage caused by attack on domain registrar, company says
- Cyber drills like Quantum Dawn 2 vital to security in financial sector
- Quantum Dawn 2 will test Wall Street's cyber readiness
- Pentagon accuses China of cyberattacks on U.S military, business targets
- Spamhaus attacks expose huge open DNS server dangers
Read more about Legal in Computerworld's Legal Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts