Search

band annie's Weblog

I have a parallel blog in French at http://anniebannie.net

Category

USA

“The Most Important Journalist You’ve Never Heard Of”: Remembering William Worthy (1921-2014)

CLICK ON IMAGE

wworthy

DM :
We spend the hour remembering the pioneering journalist William Worthy, who died earlier this month at the age of 92. During the height of the Cold War, Worthy defied the U.S. government by reporting from the Soviet Union, Cuba, China, Iran, North Vietnam and Algeria. He also worked closely with many African-American leaders, including A. Philip Randolph and Malcolm X. In the late 1950s, the State Department refused to renew his passport after he returned from a reporting trip into China. Despite not having a passport, Worthy traveled to Cuba in 1961 — two years after the Cuban revolution — and interviewed Fidel Castro. He was arrested upon returning to the United States — not for traveling to Cuba but for entering the United States illegally — an American citizen without a passport. The ordeal became the subject of Phil Ochs’ song, “The Ballad of William Worthy.” In 1981, Worthy traveled to Iran, two years after the revolution ousted the U.S.-backed Shah, resulting in a series of blockbuster exposés about U.S. actions in Iran.

“For this generation of younger journalists who are coming of age in the era of the Edward Snowden documents, WikiLeaks, of the government surveillance on the metadata of journalists and many millions of people in this country and around the world, I would say that William Worthy is the single most important journalist that they’ve never heard of,” said investigative journalist Jeremy Scahill, who considered Worthy a mentor. “If Bill Worthy was a white journalist, and not been an African-American journalist, he would be much better known than he is right now.” We air excerpts of our 1998 interview with Worthy and speak to Scahill, former Washington Post reporter Scott Armstrong, and Randy Goodman, a photojournalist who worked and traveled with Worthy throughout the 1980s.

Photo Credit: Walter Lippmann

“Right Out of a Spy Movie”: Glenn Greenwald on First Secret Meeting with NSA Leaker Edward Snowden

CLICK ON IMAGE

 

snowden

Cliven Bundy Blames His Racism On Martin Luther King Jr.

Thomas Piketty

CLICK ON IMAGE

pikkety

AND SEE THIS LECTURE BY PIKETTY

Who Goes to Jail? Matt Taibbi on American Injustice Gap from Wall Street to Main Street

CLICK ON IMAGE

220px-Matt_Taibbi

Noam Chomsky: The Dimming Prospects for Human Survival

  VISIONS  
 
From nuclear war to the destruction of the environment, humanity is steering the wrong course.

 

 

A previous article I wrote explored how security is a high priority for government planners: security, that is, for state power and its primary constituency, concentrated private power – all of which entails that official policy must be protected from public scrutiny.

In these terms, government actions fall in place as quite rational, including the rationality of collective suicide. Even instant destruction by nuclear weapons has never ranked high among the concerns of state authorities.

To cite an example from the late Cold War: In November 1983 the U.S.-led North Atlantic Treaty Organization launched a military exercise designed to probe Russian air defenses, simulating air and naval attacks and even a nuclear alert.

These actions were undertaken at a very tense moment. Pershing II strategic missiles were being deployed in Europe. President Reagan, fresh from the “Evil Empire” speech, had announced the Strategic Defense Initiative, dubbed “Star Wars,” which the Russians understood to be effectively a first-strike weapon – a standard interpretation of missile defense on all sides.

Naturally these actions caused great alarm in Russia, which, unlike the U.S., was quite vulnerable and had repeatedly been invaded.

Newly released archives reveal that the danger was even more severe than historians had previously assumed. The NATO exercise “almost became a prelude to a preventative (Russian) nuclear strike,” according to an account last year by Dmitry Adamsky in the Journal of Strategic Studies .

Nor was this the only close call. In September 1983, Russia’s early-warning systems registered an incoming missile strike from the United States and sent the highest-level alert. The Soviet military protocol was to retaliate with a nuclear attack of its own.

The Soviet officer on duty, Stanislav Petrov, intuiting a false alarm, decided not to report the warnings to his superiors. Thanks to his dereliction of duty, we’re alive to talk about the incident.

Security of the population was no more a high priority for Reagan planners than for their predecessors. Such heedlessness continues to the present, even putting aside the numerous near-catastrophic accidents, reviewed in a chilling new book, “Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety,” by Eric Schlosser.

It’s hard to contest the conclusion of the last commander of the Strategic Air Command, Gen . Lee Butler, that humanity has so far survived the nuclear age “by some combination of skill, luck and divine intervention, and I suspect the latter in greatest proportion.”

The government’s regular, easy acceptance of threats to survival is almost too extraordinary to capture in words.

In 1995, well after the Soviet Union had collapsed, the U.S. Strategic Command, or Stratcom, which is in charge of nuclear weapons, published a study, “Essentials of Post-Cold War Deterrence.”

A central conclusion is that the U.S. must maintain the right of a nuclear first strike, even against non-nuclear states. Furthermore, nuclear weapons must always be available, because they “cast a shadow over any crisis or conflict.”

Thus nuclear weapons are always used, just as you use a gun if you aim it but don’t fire when robbing a store – a point that Daniel Ellsberg, who leaked the Pentagon Papers, has repeatedly stressed.

Stratcom goes on to advise that “planners should not be too rational about determining … what an adversary values,” all of which must be targeted. “[I]t hurts to portray ourselves as too fully rational and cool-headed. . That the U.S. may become irrational and vindictive if its vital interests are attacked should be a part of the national persona we project to all adversaries.”

It is “beneficial [for …our strategic posture] that some elements may appear to be potentially’out of control'” – and thus posing a constant threat of nuclear attack.

Not much in this document pertains to the obligation under the Non-Proliferation Treaty to make “good faith” efforts to eliminate the nuclear-weapon scourge from the earth. What resounds, rather, is an adaptation of Hilaire Belloc’s famous 1898 couplet about the Maxim gun:

Whatever happens we have got,

The Atom Bomb and they have not.

Plans for the future are hardly promising. In December the Congressional Budget Office reported that the U.S. nuclear arsenal will cost $355 billion over the next decade. In January the James Martin Center for Nonproliferation Studies estimated that the U.S. would spend $1 trillion on the nuclear arsenal in the next 30 years.

And of course the United States is not alone in the arms race. As Butler observed, it is a near miracle that we have escaped destruction so far. The longer we tempt fate, the less likely it is that we can hope for divine intervention to perpetuate the miracle.

In the case of nuclear weapons, at least we know in principle how to overcome the threat of apocalypse: Eliminate them.

But another dire peril casts its shadow over any contemplation of the future – environmental disaster. It’s not clear that there even is an escape, though the longer we delay, the more severe the threat becomes – and not in the distant future. The commitment of governments to the security of their populations is therefore clearly exhibited by how they address this issue.

Today the United States is crowing about “100 years of energy independence” as the country becomes “the Saudi Arabia of the next century” – very likely the final century of human civilization if current policies persist.

One might even take a speech of President Obama’s two years ago in the oil town of Cushing, Okla., to be an eloquent death-knell for the species.

He proclaimed with pride, to ample applause, that “Now, under my administration, America is producing more oil today than at any time in the last eight years. That’s important to know. Over the last three years, I’ve directed my administration to open up millions of acres for gas and oil exploration across 23 different states. We’re opening up more than 75 percent of our potential oil resources offshore. We’ve quadrupled the number of operating rigs to a record high. We’ve added enough new oil and gas pipeline to encircle the Earth and then some.”

The applause also reveals something about government commitment to security. Industry profits are sure to be secured as “producing more oil and gas here at home” will continue to be “a critical part” of energy strategy, as the president promised.

The corporate sector is carrying out major propaganda campaigns to convince the public that climate change, if happening at all, does not result from human activity. These efforts are aimed at overcoming the excessive rationality of the public, which continues to be concerned about the threats that scientists overwhelmingly regard as near-certain and ominous.

To put it bluntly, in the moral calculus of today’s capitalism, a bigger bonus tomorrow outweighs the fate of one’s grandchildren.

What are the prospects for survival then? They are not bright. But the achievements of those who have struggled for centuries for greater freedom and justice leave a legacy that can be taken up and carried forward – and must be, and soon, if hopes for decent survival are to be sustained. And nothing can tell us more eloquently what kind of creatures we are.

This is Part II of an article adapted from a lecture by Noam Chomsky on Feb. 28, sponsored by the Nuclear Age Peace Foundation in Santa Barbara, Calif (Read part 1 here).

© 2014 Noam Chomsky — Distributed by The New York Times Syndicate

source

Boycott Koch Industry Products!

Note: If you are in a hurry and simply want to view the list of Koch Industries Products, the list is below this report on Koch Industries. 

It has become increasingly clear that Koch Industries is the money source behind the 2010 GOP landslide as well as behind Wisconsin Gov. Scott Walker, their favored Tea Party candidate.

Koch Industries wants to end the strong and decades old public employees’ unions.

For 30 years the GOP has mounted a concerted effort (and with extraordinary success) to get rid of unions around the country.  Their target is now public employees’ unions, as we see in Wisconsin, Florida, Michigan, Ohio and other states.

Think Progress reported a few days ago that:

Koch Industries is a major player in Wisconsin: Koch owns a coal company subsidiary with facilities in Green Bay, Manitowoc, Ashland and Sheboygan; six timber plants throughout the state; and a large network of pipelines in Wisconsin. While Koch controls much of the infrastructure in the state, they have laid off workers to boost profits. At a time when Koch Industries owners David and Charles Koch awarded themselves an extra $11 billion of income from the company, Koch slashed jobs at their Green Bay plant:

Officials at Georgia-Pacific said the company is laying off 158 workers at its Day Street plant because out-of-date equipment at the facility is being replaced with newer, more-efficient equipment. The company said much of the new, papermaking equipment will be automated. […] Malach tells FOX 11 that the layoffs are not because of a drop in demand. In fact, Malach said demand is high for the bath tissue and napkins manufactured at the plant.

Koch Industries was one of the biggest contributors to Walker’s gubernatorial campaign, funneling $43,000 over the course of last year. In return, Koch front groups are closely guiding the Walker agenda. The American Legislative Exchange Council, another Koch-funded group,advised Walker and the GOP legislature on its anti-labor legislation and its first corporate tax cuts.

It’s time to send a message to the Koch Brothers and Koch Industries that they cannot treat American citizens this way and still expect us to support their products:

Koch Industry Gasoline:

Chevron
Union
Union 76
Conoco

Koch Industry/Georgia-Pacific Products:

Angel Soft toilet paper
Brawny paper towels
Dixie plates, bowls, napkins and cups
Mardi Gras napkins and towels
Quilted Northern toilet paper
Soft ‘n Gentle toilet paper
Sparkle napkins
Vanity fair napkins
Zee napkins

Koch Industry/Invista Products:

COMFOREL® fiberfill
COOLMAX® fabric
CORDURA® fabric
DACRON® fiber
POLYSHIELD® resin
SOLARMAX® fabric
SOMERELLE® bedding products
STAINMASTER® carpet
SUPPLEX® fabric
TACTEL® fiber
TACTESSE® carpet fiber
TERATE® polyols
TERATHANE® polyether glycol
THERMOLITE® fabric
PHENREZ® resin
POLARGUARD® fiber and
LYCRA® fiber

Georgia Pacific Building products

Dense Armor Drywall and Decking
ToughArmor Gypsum board
Georgia pacific Plytanium Plywood
Flexrock
Densglass sheathing
G/P Industrial plasters (some products used by a lot of crafters)-
Agricultural Plaster
Arts & Crafts Plaster
Dental Plaster
General Purpose Plaster
Glass-reinforced Gypsum (GRG)
Industrial Tooling Plaster
Investment Casting Plaster
Medical Plaster
Metal Casting Plaster
Pottery Plaster
FibreStrong Rim board
G/P Lam board
Blue Ribbon OSB Rated Sheathing
Blue Ribbon Sub-floor
DryGuard Enhanced OSB
Nautilus Wall Sheathing
Thermostat OSB Radiant Barrier Sheathing
Broadspan Engineered Wood Products
XJ 85 I-Joists
FireDefender Banded Cores
FireDefender FS
FireDefender Mineral Core
Hardboard and Thin MDF including Auto Hardboard,
Perforated Hardboard and Thin MDF
Wood Fiberboard –
Commercial Roof Fiberboard
Hushboard Sound Deadening Board
Regular Fiberboard Sheathing
Structural Fiberboard Sheathing

H/T Boycott and Defeat Koch Industries

source

George Carlin – Death Penalty + list

 

The inside story of MIT and Aaron Swartz

More than a year after Swartz killed himself rather than face prosecution, questions about MIT’s handling of the hacking case persist

Aaron Swartz, a brilliant young programmer and political activist, helped launch several progressive political groups and was a major force behind a national wave of protest against the Stop Online Piracy Act, which targeted unauthorized sharing of videos and music.

DANIEL J. SIERADSKI/DPA/CORBIS/FILE 2012

xw004346@belgacomfon..be

, a brilliant young programmer and political activist, helped launch several progressive political groups and was a major force behind a national wave of protest against the Stop Online Piracy Act, which targeted unauthorized sharing of videos and music.

CAMBRIDGE — The mysterious visitor called himself Gary Host at first, then Grace Host, which he shortened for his made-up e-mail address to “ghost,” a joke apparently, perhaps signaling mischievousness — or menace. The intruder was lurking somewhere on the MIT campus, downloading academic journal articles by the hundreds of thousands.

The interloper was eventually traced to a laptop under a box in a basement wiring closet. He was Aaron Swartz, a brilliant young programmer and political activist. The cascade of events that followed would culminate in tragedy: a Secret Service investigation, a federal prosecution, and ultimately Swartz’s suicide.

 

But in the fall of 2010, Swartz was still a stranger in the shadows, and the university faced a hard question: How big a threat was the “ghost” downloader? And a harder one: What should be done about him?

Related

PHOTOS

Surveillance footage shows a man officials claim to be Aaron Swartz entering a wiring closet at the Massachusetts Institute of Technology (MIT) on Jan. 4, 2011. These images come from documents MIT provided to the US Attorney's office. //credit: US Attorney's office//

Surveillance images from Aaron Swartz case

Answering those questions would prove a particularly knotty puzzle for the Massachusetts Institute of Technology, a place long supportive of the free flow of information and so famously friendly to pranks, known in MIT lingo as hacks, that a book published by the MIT Museum in the 1990s offered pranksters such tips as “always have two ways to run.”

 

And yet, MIT is a cradle of world-class scientific research with unpublished data and unpatented inventions on its network, and its leaders felt vulnerable to the rising tide of high-tech espionage.

“There is some speculation that this might have been an MIT student experimenting with a robot,” one MIT employee noted in an e-mail after a second breach by Swartz was discovered. But another pointed out that “sinister foreigners’’ may have stolen credentials or compromised a computer.

MIT’s efforts to track down Swartz, while under intense pressure from JSTOR, the not-for-profit that ran the journal database, eventually would lead to felony computer crimes charges that might have brought years in jail. Swartz, 26, was under indictment when he committed suicide in January 2013.

Critics, both on campus and around the world, have accused MIT of abandoning its values celebrating inventive risk-taking by helping to doom a young man whose project — likely an act of civil disobedience to make information freely available — didn’t in the end cause serious harm.

MIT has insisted it maintained an appropriate, even compassionate, neutrality toward a determined hacker who stole 4.8 million articles and eluded numerous efforts to stop him before the college sought help from police.

But MIT’s brand of neutrality proved one with notable limits, according to a Globe review of more than 7,000 pages of discovery documents — many of them e-mails — from Swartz’s court case. In the wake of his death, both MIT and JSTOR posted online documents that they had turned over to authorities, a trove that drew little if any notice at the time. The Globe also obtained a number of e-mails related to the case not available publicly.

Only with a patient review of the complete record does the full picture of the dilemma MIT faced become clear. The aftershocks of the choices the institution made in the wake of the “ghost” continue to reverberate, on campus and off, more than a year after Swartz’s death.

Most vividly, the e-mails underscore the dissonant instincts the university grappled with. There was the eagerness of some MIT employees to help investigators and prosecutors with the case, and then there was, by contrast, the glacial pace of the institution’s early reaction to the intruder’s provocation.

MIT, for example, knew for 2½ months which campus building the downloader had operated out of before anyone searched it for him or his laptop — even as the university told JSTOR they had no way to identify the interloper.

And once Swartz was unmasked, the ambivalence continued. MIT never encouraged Swartz’s prosecution, and once told his prosecutor they had no interest in jail time. However, e-mails illustrate how MIT energetically assisted authorities in capturing him and gathering evidence — even prodding JSTOR to get answers for prosecutors more quickly — before a subpoena had been issued.

In a handful of e-mails, individual MIT employees involved in the case aired sentiments that were far from neutral. One, for example, gushed to prosecutor Stephen P. Heymann about the quality of the indictment of Swartz.

“Nicely done Steve and kudos! All points . . . are as accurate as I’ve ever seen,” wrote the information technology employee. “(I only say that because every time I’ve ever given an interview, details are always slightly to horribly munged; not that I ever expected any less, it’s just a true relief and very refreshing to see your accuracy and precision).”

Yet if MIT eventually adopted a relatively hard line on Swartz, the university had also helped to make his misdeeds possible, the Globe review found. Numerous e-mails make it clear that the unusually easy access to the campus computer network, which Swartz took advantage of, had long been a concern to some of the university’s information technology staff.

Some at MIT believed that officials had failed to pay serious attention to what one person called “poor, limited, or outdated security protections” on resources like the JSTOR database.

The documents also put JSTOR’s role in the case in a new light. In contrast to MIT, the journal archive organization has been widely hailed for publicly distancing itself from Swartz’s prosecution, declaring that once Swartz returned the documents, it “had no interest in this becoming an ongoing legal matter.”

But a number of JSTOR’s internal e-mails show a much angrier face in the months that Swartz eluded capture, withemployees sharing frustration about MIT’s “rather tepid level of concern.” JSTOR officials repeatedly raised the prospect, among themselves, of going to the police, e-mails show.

“What’s wrong with us . . . alerting the cyber-crimes division of law enforcement and initiating an investigation, having a cop search a dorm room and try to retrieve any hard drive that contains our content?” asked one JSTOR official, whose name — like most — was redacted in the released documents.

In the end, JSTOR neither called the police nor asked MIT to do so, according to its president.

Eric Grimson, who recently stepped down as chancellor of MIT, defended the university’s handling of the case as a judicious effort to protect the community without seeking retribution. MIT’s first steps, he said, were simply to deny the downloader access to the network. They didn’t search for the laptop for many weeks because they thought he had been thwarted.

When Swartz proved undeterred, he said, MIT had to do more.

“We were confronted with a situation of an unknown user accessing our network,” he said in an interview, “using it to download massive amounts of material . . . for a three-month period, and evading our efforts to try and stop it.”

MIT was harmed in the process, Grimson said, with 10,000 researchers denied an important resource for several days as JSTOR sought to cut off the mass downloading.

Helping investigators pursue the campus intruder was the only reasonable course, he said.

“I think we should as a matter of principle cooperate with law enforcement in an investigation of an alleged crime being committed on our campus,” he said. “That’s protecting our community.”

Video footage of allegedly shows Aaron Swartz in a wiring closet at MIT on Jan. 4, 2011.

MIT

Video footage of allegedly shows Aaron Swartz in a wiring closet at MIT on Jan. 4, 2011.

After Swartz’s arrest, Grimson said, the university went out of its way to be fair to the defense, voluntarily making staff members available to answer questions from Swartz’s attorneys.

“I would like to suggest we took a path to try to balance being empathetic to Aaron’s situation while acknowledging that there was a legal process involved,” he said.

Allure of openness

Swartz was an Internet prodigy. By age 19, he had helped to build RSS, a service that allowed users to create personalized news feeds; to develop the social news website Reddit; and to establish Creative Commons, an alternative to traditional copyright more friendly to sharing.

In his 20s, the restless Stanford dropout turned his energies to political activism. He helped launch several progressive political groups and was a major force behind a national wave of protest against the Stop Online Piracy Act, which targeted unauthorized sharing of videos and music, but which Swartz and others saw as an attack on free speech.

While Swartz’s motive for downloading the JSTOR archive remains unknown, there is one simple and plausible possibility: to make academic research freely available to the public. In 2008, he published a “Guerrilla Open Access Manifesto” in which he avowed a “moral imperative” to share scholarship locked behind exorbitant subscription walls.

“It’s time to come into the light and, in the grand tradition of civil disobedience, declare our opposition to this private theft of public culture,” he wrote.

But why use MIT as his gateway — or, to some eyes, his victim? He had a fellowship at Harvard at the time, which gave him access to JSTOR, but apparently worried about getting himself or his colleagues in hot water, since bulk downloading is forbidden by JSTOR.

Since MIT had been known for generations for its idealistic devotion to the spirit of openness, venturing a couple of miles down Massachusetts Avenue may have seemed irresistible to Swartz. He had no formal tie to the university but had friends there and had been involved in campus activities.

A blog entry Swartz wrote in 2009, titled “Honest Theft,” neatly details his view of the school as a haven for rebelliousness. He described friends who he said secretly lived for free on campus, sleeping on couches in common rooms and stealing food from the cafeterias — and using the money they saved “to promote the public good.”

“MIT has a notoriously relaxed security policy,” he wrote, so his friends “likely wouldn’t get in too much trouble.”

Indeed, MIT’s own 180-page internal report on the Swartz case, released in July by a panel led by professor Hal Abelson, described a “culture of creative disobedience where students are encouraged to explore secret corners of the campus, commit good-spirited acts of vandalism . . . and resist restrictions that seem arbitrary or capricious.”

Student “hacks” have included putting a faux firetruck on the MIT Great Dome and turning a high-rise facade into a working Tetris game. They are meant to be public and harmless, but often involve trespassing and “borrowing” materials without permission, like a 3-ton cannon brazenly snatched from Caltech.

The ethic of openness extends to MIT’s computer network, where anyone on campus can get onto the wired network for 14 days by logging on as a guest, an extremely unusual perk for visitors to a university campus.

As an MIT manager of network security noted in an e-mail reviewing the downloading case as it unfolded in October 2010, misuse of the MIT network was made possible by the fact that there was “no authentication of visitors” and “no identity verification.”

The open-door policy meant Swartz could easily sign in, as he did, as an anonymous guest with fake names and disposable e-mail addresses.

Between 5 p.m. on Sept. 25, 2010, and 4 a.m. the next morning, the code Swartz wrote, which he called “keepgrabbing,” downloaded 450,000 JSTOR articles.

It was the opening salvo in a cat-and-mouse game that would extend over three months. JSTOR would cut off the Internet protocol address Swartz was using; he would switch to another. MIT detected and shut down the registration for his computer; he altered his computer’s identifying information.

Officials would conclude the ghost downloader had moved on, then he’d reappear weeks later.

The maddening pursuit prompted some MIT technology personnel to say, essentially, I told you so. Databases like JSTOR’s, some said, should have been kept behind a virtual gate — though this would inconvenience legitimate users.

“I frankly don’t know why it’s not used more,” an employee wrote about such a security measure.

Another employee in network security lamented that only the Swartz case prompted MIT to smarten up. “I hope it helps enlighten them to the need to really think long and hard about these issues. Kind of silly that it took a JSTOR crawling issue to get everyone a little frenzied.”

MIT and JSTOR did agree to a security upgrade after Swartz’s second round of downloading was discovered in October 2010, requiring those seeking access to have MIT credentials. But it took JSTOR weeks to prepare for the change, the e-mails show.

That delay would prove fateful. Aaron Swartz had only gotten started.

Drawing concern at JSTOR

Given the institution’s global stature, MIT inevitably drew most of the public focus. But what Swartz did was more of a threat to JSTOR, a small organization in a precarious position. Its business is selling access to journal articles, but it doesn’t own those articles. If it can’t protect them, the journals could yank their material out of the library and threaten JSTOR’s survival.

Swartz ultimately downloaded 80 percent of JSTOR’s archive, 4.8 million articles. At one point his downloading was so rapid, JSTOR e-mails said it created “a monstrous amount” of traffic that was “threatening the website.”

The stakes for MIT were murkier. The university’s contract with JSTOR promised that it would guard against misuse, so there was some risk of losing an important library resource. And a rogue stranger poking around MIT’s network could be truly dangerous. The discovery shortly before Swartz’s arrest that his computer was being contacted from China raised passing fears of a foreign cyberattack, e-mails show, although such probing from overseas is quite routine.

Yet MIT was used to seeing excessive downloading — albeit on a much smaller scale — and some staff downplayed the threat.

“There will always be one person a semester who, regardless of intent, will write a script to crawl through some catalog,” an MIT employee wrote when JSTOR first cut off the portion of campus where Swartz was operating. The MIT worker called JSTOR’s move “draconian” and “knee-jerk.”

The result of their differing vulnerabilities, e-mails indicate, was that JSTOR was far more bellicose toward the interloper than was MIT — at least until the days right before Swartz’s arrest.

JSTOR pressed again and again for MIT to find the downloader. Some of the archive’s employees said MIT was being cooperative, but other staff members were irate at the university.

“I am sure that if they had lost an equivalent number of books from their library overnight (what 25,000-30,000 books) they would not be so nonchalant,” someone at JSTOR wrote in an e-mail.

“This is an astronomical number of articles — again, real theft,” another wrote. “Does the university contact law enforcement? Would they be willing to do so in this instance?”

When Swartz popped up again in late December after weeks of quiet, the tension was even plainer.

“I might just be irked because I am up dealing with [the downloader] on a Sunday night,” a JSTOR employee wrote, “but I am starting to feel like [MIT needs] to get a hold of this situation and right away or we need to offer to send them some help (read FBI).”

These were “heat of the moment” reactions by officials anxious about an unknown threat, said Kevin M. Guthrie, president of ITHAKA, JSTOR’s parent organization.

“You get a report that 100,000 articles have been downloaded on a Saturday, you’re trying to figure out what to do,” he said in an interview.

As for JSTOR’s internal comments about calling the police, he said, “We talked about it, but we made a decision — no, this wouldn’t be appropriate; it’s not our role to indicate that law enforcement should be called.”

When it came to Swartz’s prosecution, JSTOR was notably reticent. It insisted on being served with a subpoena before it would provide information to the government and then, according to Abelson’s report, tried to limit its answers.

Guthrie told the Globe that the not-for-profit was simply trying to be careful. As for its decision to publicly oppose prosecution, he said, once Swartz returned the files, the journal provider was no longer interested in the matter.

JSTOR was “trying to balance our obligation both to be good stewards of the content for the content owners and publishers, for our own viability, for broad access to information, and then the personal situation, the human situation,” Guthrie said.

JSTOR’s very existence, he said, is all about broadening access to scholarly journals. Its fees go to support the archive, and it provides free access in developing countries.

E-mails from before Swartz was captured suggest that JSTOR might also have been worried about its public image. The archive is already viewed in some quarters as a greedygatekeeper constricting the pursuit of knowledge. One JSTOR employee, in an e-mail addressing the possibility of bringing in law enforcement, noted several technical obstacles after opening with, “aside from the considerations about the PR of it all . . . ”

A sudden shift

If MIT was initially slow to react to the “ghost,” even tepid about the whole thing as some at JSTOR surmised, that changed drastically after the university learned of another breach in December 2010.

 After the laptop Swartz was accused of setting up to download JSTOR articles was found in a wiring closet at MIT, investigators left the computer up and running and installed a hidden camera.come from documents MIT provided to the US Attorney's office

MIT

After the laptop Swartz was accused of setting up to download JSTOR articles was found in a wiring closet at MIT, investigators left the computer up and running and installed a hidden camera.

On the night after Christmas, JSTOR discovered a new round of downloading. It had actually started some 10 weeks earlier, but Swartz had slowed the process enough to avoid tripping alarms.

Out on a furlough, MIT staff did not get the urgent messages from JSTOR until Jan. 3, 2011. “This is a heck of a way to start the new year,” one person at MIT wrote. “We need to escalate the seriousness of our response. This looks like grand theft.”

And escalate MIT did. The academic building where the activity seemed to emanate from had been pinpointed in mid-October. But only on the morning of Jan. 4 did a network engineer began searching Building 16. He quickly discovered a laptop, hidden under a cardboard box, connected to the network from a wiring closet in the basement.

MIT police decided they needed more help, and called a Cambridge police detective who belonged to a regional electronic crimes task force. He showed up with another task force member, a Secret Service agent named Michael S. Pickett.

Seeking not only to find the downloader but to collect as much evidence as possible, they set up a hidden camera in the wiring closet. And instead of shutting down the laptop, the authorities decided to “leave it up and running for a couple of days while the investigation continues,” a library employee wrote in an e-mail.

“Now a federal case,” the library staffer wrote in separate notes she took on a conversation with an MIT security analyst. “We [MIT] are considered the victim. All we provide is by choice — not subpoenaed.”

A laptop that was hidden under a box in a wiring closet.

US ATTORNEY’S OFFICE

A laptop that was hidden under a box in a wiring closet.

That cooperation with law enforcement also extended to a senior MIT network engineer who monitored traffic to and from Swartz’s laptop and appeared to be looking to Pickett for instructions. On Jan. 5, having collected 70 gigabytes of network traffic, he e-mailed the agent, “I was just wondering what the next step is.”

Swartz’s lawyers argued that MIT, by monitoring Swartz and turning over materials to law enforcement without a court order, violated his Fourth Amendment rights. Abelson, who wrote MIT’s own review, disagreed, and legal experts interviewed by the Globe differed on whether those arguments had merit. They were never ruled on by the judge in the case.

Grimson, the former university chancellor, acknowledged in an interview that it would have been “cleaner” to ask prosecutors to seek a court order sooner. Turning over evidence without a subpoena raised, in some eyes, painful questions about MIT’s avowed neutrality.

Swartz was identified by the hidden camera and arrested on Jan. 6 after allegedly trying to flee police on Massachusetts Avenue in Cambridge.

The startling discovery that the “ghost” downloader was a well-known activist prompted a few MIT employees to share their opinions with Pickett, the Secret Service agent, or their colleagues.

“Looks like he is a big hacker, i googled him,” one wrote to Pickett at midnight the morning after Swartz’s arrest.

That afternoon, someone from the IT security department wrote to Pickett, deeming Swartz a “really intelligent kid that just got buried under an avalanche of dumb.”

A few days later, Swartz took to Twitter to ask his followers if they knew anyone at JSTOR, presumably hoping he could defuse the situation. One person at MIT responded by circulating among colleagues a made-up messagepurporting to be what Swartz wanted to say to JSTOR.

“hi, jstor, I’m still a few million pdf’s shy of grabbing your whole db; really had high hopes on collecting the whole set by 1/1/11,” it read. “could you tell me what number I left off at, because I don’t currently have access to my lappy that was keeping track. k thnx bye.”

The MIT employee’s commentary on his or her own fictional tweet: “LOL.”

The documents say little about what MIT was thinking and doing once the case morphed from an investigation into an active prosecution. But MIT’s own report on the case raises serious questions about the wisdom of MIT’s neutrality stance.

The report noted that some within MIT believe “there has been a change in the institutional climate over recent years, where decisions have become driven more by a concern for minimizing risk than by strong affirmation of MIT values.”

The Computer Fraud and Abuse Act has been widely condemned as extreme in both its sweeping scope and its grave punishments. Sentencing guidelines suggest Swartz faced up to seven years in prison.

To his supporters, MIT bears some responsibility for that fact. MIT officials privately told the prosecutor that the university had no interest in jail time, but refused to oppose his prosecution publicly or privately, despite repeated entreaties from Swartz’s father, his lawyers, and a couple of faculty members, who argued MIT had the institutional heft to influence the US attorney’s office.

MIT may have also missed an opportunity to point out a potentially serious flaw in the case against Swartz.

The Computer Fraud and Abuse Act charges centered on the claim that Swartz had unauthorized access to MIT and JSTOR’s networks. But even if he was doing something improper, Swartz was logged on at MIT as a guest, leading Abelson and some legal observers to conclude that his access could be construed as authorized.

Aaron Swartz

NOAH BERGER/COURTESY OF SUNDANCE INSTITUTE

Aaron Swartz

It was hardly a clear-cut case, and the judge may not have agreed. But either way, MIT — resolute about not getting drawn into a criminal case to which it was not a named party — “paid little attention to the details of the charges,” Abelson found. The institute simply did not consider whether Swartz may have been an authorized user under the terms of the law, according to the report.

The defense didn’t raise it, either, until close to Swartz’s death.

MIT was helping the prosecution “understand how to prosecute, what information is necessary to prosecute, but not taking steps to help them understand the limits to their prosecution,” said Lawrence Lessig, a Harvard Law School professor who was close to Swartz. “Nobody would call that neutral. That’s aiding and abetting the prosecution.’’

Grimson defended MIT’s decision to leave it up to the justice system to decide Swartz’s fate, given that MIT leaders believe he harmed the school. And he disagreed that MIT is less driven by its ideals than it once was. He pointed to the Abelson report as an example of MIT’s willingness to soul-search and learn from a tragedy.

Still, he said, MIT will be second-guessing itself for a long time, and the university is still considering some policy changes in light of what happened to Swartz. Its first concrete move, last month, was to set up a presidential committee that will create an online data privacy policy.

A famously sensitive person, Swartz had some history with depression. Yet loved ones insist that he was not clinically depressed before he hanged himself in his Brooklyn apartment on Jan. 11, 2013, but overwhelmed by the threat of years injail and the toll of fighting the charges.

His father, Bob Swartz, believes that MIT’s lack of compassion helped destroy his son’s life.

“We can’t bring Aaron back, he can no longer be the tireless worker for good,” he said at a memorial service for his son held at MIT last spring. “What we can do is change things for the better. We can work to change MIT so that it . . . once again becomes a place where risk and coloring outside the lines is encouraged, a space where the cruelties of the world are pushed back and our most creative flourish rather than being crushed.”

Matt Carroll contributed to this report. Marcella Bombardieri can be reached at bombardieri@globe.com. Follow her on Twitter @GlobeMarcella.

Blog at WordPress.com.

Up ↑