Prosecutors, others involved in Swartz case express safety, privacy concerns
Pirozzolo noted that Heymann's home address, personal phone number and the names of family members and friends have been posted online and his Facebook page hacked since Swartz's death. He added that Heymann and his father had received postcards with an image depicting a man's head in a guillotine.
Pirozzolo said he had informed Swartz's attorney "that whatever additional public benefit might exist by disclosing certain names was, in this case, outweighed by the risk to those individuals of becoming targets of threats, harassment and abuse."
A similar motion filed by MIT noted that the university had no objection to certain documents being unsealed so long as it was given a chance to redact them first to protect "the privacy and safety" of members of the MIT community. The university said it also wanted to redact some information to prevent the disclosure of MIT network vulnerabilities to the public.
Kevin Guthrie, the president of Ithaka Harbors, called on the court to protect the identity of the company's employees. "A number of events since Mr. Swartz's death have caused JSTOR and our employees to be concerned for their safety and privacy," Guthrie said in an affidavit last week.
He pointed to the hacking of MIT's website and the site of the U.S. Sentencing Commission by those protesting Swartz's death as examples of the fallout from Swartz's death. "We also are aware of public reports of an anonymous call to MIT claiming that a gunman was on the campus to retaliate against people involved in Swartz's case," Guthrie said.
He claimed the company had received several threatening emails and other online messages after Swartz's suicide. "A number of JSTOR personnel have spoken with me to express concern that their safety and privacy could be compromised if their names were released in connection with this matter," he noted.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts