Prosecutors, others involved in Swartz case express safety, privacy concerns
Pirozzolo noted that Heymann's home address, personal phone number and the names of family members and friends have been posted online and his Facebook page hacked since Swartz's death. He added that Heymann and his father had received postcards with an image depicting a man's head in a guillotine.
Pirozzolo said he had informed Swartz's attorney "that whatever additional public benefit might exist by disclosing certain names was, in this case, outweighed by the risk to those individuals of becoming targets of threats, harassment and abuse."
A similar motion filed by MIT noted that the university had no objection to certain documents being unsealed so long as it was given a chance to redact them first to protect "the privacy and safety" of members of the MIT community. The university said it also wanted to redact some information to prevent the disclosure of MIT network vulnerabilities to the public.
Kevin Guthrie, the president of Ithaka Harbors, called on the court to protect the identity of the company's employees. "A number of events since Mr. Swartz's death have caused JSTOR and our employees to be concerned for their safety and privacy," Guthrie said in an affidavit last week.
He pointed to the hacking of MIT's website and the site of the U.S. Sentencing Commission by those protesting Swartz's death as examples of the fallout from Swartz's death. "We also are aware of public reports of an anonymous call to MIT claiming that a gunman was on the campus to retaliate against people involved in Swartz's case," Guthrie said.
He claimed the company had received several threatening emails and other online messages after Swartz's suicide. "A number of JSTOR personnel have spoken with me to express concern that their safety and privacy could be compromised if their names were released in connection with this matter," he noted.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center... All Cybercrime and Hacking White Papers | Webcasts