Prosecutors, others involved in Swartz case express safety, privacy concerns
Pirozzolo noted that Heymann's home address, personal phone number and the names of family members and friends have been posted online and his Facebook page hacked since Swartz's death. He added that Heymann and his father had received postcards with an image depicting a man's head in a guillotine.
Pirozzolo said he had informed Swartz's attorney "that whatever additional public benefit might exist by disclosing certain names was, in this case, outweighed by the risk to those individuals of becoming targets of threats, harassment and abuse."
A similar motion filed by MIT noted that the university had no objection to certain documents being unsealed so long as it was given a chance to redact them first to protect "the privacy and safety" of members of the MIT community. The university said it also wanted to redact some information to prevent the disclosure of MIT network vulnerabilities to the public.
Kevin Guthrie, the president of Ithaka Harbors, called on the court to protect the identity of the company's employees. "A number of events since Mr. Swartz's death have caused JSTOR and our employees to be concerned for their safety and privacy," Guthrie said in an affidavit last week.
He pointed to the hacking of MIT's website and the site of the U.S. Sentencing Commission by those protesting Swartz's death as examples of the fallout from Swartz's death. "We also are aware of public reports of an anonymous call to MIT claiming that a gunman was on the campus to retaliate against people involved in Swartz's case," Guthrie said.
He claimed the company had received several threatening emails and other online messages after Swartz's suicide. "A number of JSTOR personnel have spoken with me to express concern that their safety and privacy could be compromised if their names were released in connection with this matter," he noted.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel... All Cybercrime and Hacking White Papers | Webcasts