SlideShare a Scribd company logo
1 of 27
Download to read offline
United States v. Swartz
No. 11-cr-10260 (D. Mass.)
Swartz’s objective?
nothing/tbd | corpus analysis | limited works distribution
limited geography distribution| total distribution | commercial distribution
Sept. 2010 - Downloading began using Python script
•25 Sept. 2010 - JSTOR blocked 18.55.6.215
•26 Sept. 2010 - Swartz to 18.55.6.216
•26 Sept. 2010 - JSTOR blocked 18.55.*.* (later alleged to
have blocked 18.55.6.*)
•27 Sept. 2010 - JSTOR contacts MIT, MIT denies MAC
address 0:23:5a:73:5f:fb a network connection.
•2 Oct. 2010 - Swartz changed MAC address to 0:23:5a:
73:5f:fc
•
9 Oct. 2010 – JSTOR blocks all of MIT (restored few
days later)
•Nov. & Dec. 2010 - Swartz hard wires into MIT via
closet in Bldg. 16. Hid laptop. Obtains and begins using
a second laptop.
•4 Jan 2011 – MIT sysadmin traced IP address to network
switch in closet of MIT Bldg. 16.
•Cambridge Police, MIT Police, & Secret Service.
•External forensics, network monitoring, and video
surveillance.
•
4 Jan 2011 – Swartz observed entering closet.
•6 Jan 2011 – Swartz observed entering closet second
time.
•MIT Police ID’d Swartz on street, arrested, seized
USB device in backpack.
•Computer later recovered from the student center.
•In February, search warrants executed by USSS of
apartment, office, laptop, external hard drive, and
USB storage device (the latter 3 had been seized at
arrest).
•
Spring/Summer 2011: Resolved civil claims with
JSTOR; returned corpus.
•Same time: grand jury investigation
•First indictment issued on 14 July 2011
•
Superseding Indictment (12 Sept. 2012)

Two counts of wire fraud (18 U.S.C. § 1343)
•Fives counts of computer fraud (18 U.S.C. § 1030(a)(4))
•Five counts of unlawful access to protected computer
(§ 1030(a)(2))
•One count of reckless damage to protected computer
(§1030(a)(5))
•
Wire Fraud
18 U.S.C. § 1343 – “Whoever, having devised or intending to devise any scheme or artifice to
defraud, or for obtaining money or property by means of false or fraudulent pretenses,
representations, or promises, transmits or causes to be transmitted by means of wire, radio, or
television communication in interstate or foreign commerce, any writings, signs, signals, pictures,
or sounds for the purpose of executing such scheme or artifice, shall be fined under this title or
imprisoned not more than 20 years, or both. […]”

Scheme to defraud a person out of money or property (can be
intangible).
•

Uses a false pretense.

•

Must be material (Neder v. United States (SCOTUS))

•

Employs use of a wire communication

•
Wire Fraud
Four theories:
1. appearing to JSTOR that he was affiliated with MIT.
2. changing IP and MAC address to conceal identity.
3. using python script to appear as though he was multiple users
4. concealing physical location
Wire Fraud
Four theories:
1. appearing to JSTOR that he was affiliated with MIT.
2. changing IP and MAC address to conceal identity. (doubtful)
3. using python script to appear as though he was multiple users.
(maybe)
4. concealing physical location
CFAA Claims

§ 1030(a)(4)

“exceeds authorized
access”

Computer fraud

§ 1030(a)(2)
Unauthorized access of
protected computer

§ 1030(a)(5)(B)
Computer damage

“without
authorization”

- intent to defraud
- accessed computer
to further
- obtained a thing of
value
- obtained
“information”
- felony if value >
$5000
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)

“exceeds authorized
access”

Computer fraud

§ 1030(a)(2)
Unauthorized access of
protected computer

§ 1030(a)(5)(B)
Computer damage

“without
authorization”

- intent to defraud
- accessed computer
to further
- obtained a thing of
value
- obtained
“information”
- felony if value >
$5000
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)

“exceeds authorized
access”

Computer fraud

§ 1030(a)(2)
Unauthorized access of
protected computer

§ 1030(a)(5)(B)

“without
authorization”
- “outsider” required?

Computer damage

Compare LVRC Holdings v. Brekka (9th Cir.);
with Int’l Airport Centers v. Citrin (7th Cir.)
1st Cir. has split D. Ct. authority.

- intent to defraud
- accessed computer
to further
- obtained a thing of
value
- obtained
“information”
- felony if value >
$5000
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)

“exceeds authorized
access”

Computer fraud

§ 1030(a)(2)
Unauthorized access of
protected computer

§ 1030(a)(5)(B)
Computer damage

“without
authorization”

- intent to defraud
- accessed computer
to further
- obtained a thing of
value
- obtained
“information”
- felony if value >
$5000
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)

“exceeds authorized
access”

Computer fraud

§ 1030(a)(2)
Unauthorized access of
protected computer

§ 1030(a)(5)(B)
Computer damage

“without
authorization”

- intent to defraud
- accessed computer
to further
- obtained a thing of
value
- obtained
“information”
- felony if value >
$5000
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)
Computer fraud

§ 1030(a)(2)
Unauthorized access of
protected computer

§ 1030(a)(5)(B)
Computer damage

“exceeds authorized
access”
Code | Contract | Norms
“without
authorization”

- intent to defraud
- accessed computer
to further
- obtained a thing of
value
- obtained
“information”
- felony if value >
$5000
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)
Computer fraud

§ 1030(a)(2)
Unauthorized access of
protected computer

§ 1030(a)(5)(B)
Computer damage

“exceeds authorized
access”
Code | Contract | Norms

- intent to defraud
- accessed computer
to further
- obtained a thing of
value

- obtained
- United States v. Drew (C.D. Cal.)
“information”
“without
- felony if value >
$5000
authorization”
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)
Computer fraud

§ 1030(a)(2)
Unauthorized access of
protected computer

§ 1030(a)(5)(B)
Computer damage

“exceeds authorized
access”
Code | Contract | Norms

- intent to defraud
- accessed computer
to further
- obtained a thing of
value

- obtained
- United States v. Drew (C.D. Cal.)
- JSTOR’s terms
“information”
- MIT’s terms
“without
- felony if value >
- but see United States v. Nosal (9th Cir.
$5000
authorization”
en banc)
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)
Computer fraud

“exceeds authorized
access”
Code | Contract | Norms

- JSTOR’s restrictions?
- MIT’s restrictions?
- “cat-and-mouse”
Unauthorized access of
protected computer IP
- with
- with MAC
§ 1030(a)(5)(B) use of
- through
Computer damage
script

§ 1030(a)(2)

- intent to defraud
- accessed computer
to further
- obtained a thing of
value

- obtained
- United States v. Drew (C.D. Cal.)
- JSTOR’s terms
“information”
- MIT’s terms
“without
- felony if value >
- but see United States v. Nosal (9th Cir.
$5000
authorization”
en banc)
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)
Computer fraud

“exceeds authorized
access”
Code | Contract | Norms

- JSTOR’s restrictions?
- MIT’s restrictions?
- “cat-and-mouse”
Unauthorized access of
protected computer IP
- with
- with MAC
§ 1030(a)(5)(B) use of
- through
Computer damage
script

§ 1030(a)(2)

- intent to defraud
- accessed computer
to further
- obtained a thing of
value

- obtained
- United States v. Drew (C.D. Cal.)
- JSTOR’s terms
“information”
- MIT’s terms
“without
- felony if value >
- but see United States v. Nosal (9th Cir.
$5000
authorization”
en banc)
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)
Computer fraud

“exceeds authorized
access”
Code | Contract | Norms | Physical?

- JSTOR’s restrictions?
- MIT’s restrictions?
- “cat-and-mouse”
Unauthorized access of
protected computer IP
- with
- with MAC
§ 1030(a)(5)(B) use of
- through
Computer damage
script

§ 1030(a)(2)

- intent to defraud
- accessed computer
to further
- obtained a thing of
value

- obtained
- United States v. Drew (C.D. Cal.)
- JSTOR’s terms
“information”
- MIT’s terms
“without
- felony if value >
- but see United States v. Nosal (9th Cir.
$5000
authorization”
en banc)
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)

“exceeds authorized
access”

Computer fraud

§ 1030(a)(2)
Unauthorized access of
protected computer

§ 1030(a)(5)(B)
Computer damage

“without
authorization”

- intent to defraud
- accessed computer
to further
- obtained a thing of
value
- obtained
“information”
- felony if value >
$5000
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)

“exceeds authorized
access”

Computer fraud

§ 1030(a)(2)
Unauthorized access of
protected computer

§ 1030(a)(5)(B)
Computer damage

“without
authorization”

- intent to defraud
- accessed computer
to further
- obtained a thing
of value
- obtained
“information”
- felony if value >
$5000
- recklessly cause
damage
- felony if “loss” >
$5000
CFAA Claims

§ 1030(a)(4)

“exceeds authorized
access”

Computer fraud

§ 1030(a)(2)
Unauthorized access of
protected computer

§ 1030(a)(5)(B)
Computer damage

“without
authorization”

- intent to defraud
- accessed computer
to further
- obtained a thing
of value
- obtained
“information”
- felony if value >
$5000
- recklessly cause
damage
- felony if “loss” >
$5000
what remains…
United States v. Swartz

More Related Content

Viewers also liked

мой мир 8 кл
мой мир 8 клмой мир 8 кл
мой мир 8 клAnna-Luda
 
Making the right_impression
Making the right_impressionMaking the right_impression
Making the right_impressionRehman Siddiq
 
Состав слова
Состав словаСостав слова
Состав словаAnna-Luda
 
Lesson plan presentation
Lesson plan presentationLesson plan presentation
Lesson plan presentationdua pak
 
Gradaute Academic Transcript
Gradaute Academic TranscriptGradaute Academic Transcript
Gradaute Academic TranscriptThomas Bainbridge
 
портфолиопрезентация Microsoft office power point
портфолиопрезентация Microsoft office power pointпортфолиопрезентация Microsoft office power point
портфолиопрезентация Microsoft office power pointAnna-Luda
 
Tips on making great taglines
Tips on making great taglinesTips on making great taglines
Tips on making great taglinesRehman Siddiq
 
خصائص النمو في مرحلة الطفولة المبكرة
خصائص النمو في مرحلة الطفولة المبكرة خصائص النمو في مرحلة الطفولة المبكرة
خصائص النمو في مرحلة الطفولة المبكرة علاء القاضي
 
خصائص النمو في مرحلة الطفولة المبكرة
خصائص النمو في مرحلة الطفولة المبكرةخصائص النمو في مرحلة الطفولة المبكرة
خصائص النمو في مرحلة الطفولة المبكرةعلاء القاضي
 

Viewers also liked (13)

Speedyparrot (2)
Speedyparrot (2)Speedyparrot (2)
Speedyparrot (2)
 
Self Assessment
Self AssessmentSelf Assessment
Self Assessment
 
мой мир 8 кл
мой мир 8 клмой мир 8 кл
мой мир 8 кл
 
Prueba
PruebaPrueba
Prueba
 
Prueba
PruebaPrueba
Prueba
 
Making the right_impression
Making the right_impressionMaking the right_impression
Making the right_impression
 
Состав слова
Состав словаСостав слова
Состав слова
 
Lesson plan presentation
Lesson plan presentationLesson plan presentation
Lesson plan presentation
 
Gradaute Academic Transcript
Gradaute Academic TranscriptGradaute Academic Transcript
Gradaute Academic Transcript
 
портфолиопрезентация Microsoft office power point
портфолиопрезентация Microsoft office power pointпортфолиопрезентация Microsoft office power point
портфолиопрезентация Microsoft office power point
 
Tips on making great taglines
Tips on making great taglinesTips on making great taglines
Tips on making great taglines
 
خصائص النمو في مرحلة الطفولة المبكرة
خصائص النمو في مرحلة الطفولة المبكرة خصائص النمو في مرحلة الطفولة المبكرة
خصائص النمو في مرحلة الطفولة المبكرة
 
خصائص النمو في مرحلة الطفولة المبكرة
خصائص النمو في مرحلة الطفولة المبكرةخصائص النمو في مرحلة الطفولة المبكرة
خصائص النمو في مرحلة الطفولة المبكرة
 

Similar to United States v. Swartz

Similar to United States v. Swartz (20)

Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Recall Roque Court Documents
Recall Roque Court DocumentsRecall Roque Court Documents
Recall Roque Court Documents
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber law
Cyber lawCyber law
Cyber law
 
Social Engineering : To Err is Human...
Social Engineering : To Err is Human...Social Engineering : To Err is Human...
Social Engineering : To Err is Human...
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber crime in WORLD
Cyber crime in WORLDCyber crime in WORLD
Cyber crime in WORLD
 
Cyber laws of US
Cyber laws of USCyber laws of US
Cyber laws of US
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber
CyberCyber
Cyber
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism Analysis
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Jama Masjid | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Jama Masjid | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Jama Masjid | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Jama Masjid | Delhisoniya singh
 
Panipat Call Girls in Five Star Services Call 08860008073
Panipat Call Girls in Five Star Services Call 08860008073 Panipat Call Girls in Five Star Services Call 08860008073
Panipat Call Girls in Five Star Services Call 08860008073 Apsara Of India
 
AliExpress Clothing Brand Media Planning
AliExpress Clothing Brand Media PlanningAliExpress Clothing Brand Media Planning
AliExpress Clothing Brand Media Planningjen_giacalone
 
Riya 9058824046 Call Girls Service in Rishikesh
Riya 9058824046 Call Girls Service in RishikeshRiya 9058824046 Call Girls Service in Rishikesh
Riya 9058824046 Call Girls Service in Rishikeshjaanseema653
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip CallMs Riya
 
Sakshi 9058824046 Call Girls Service in Kanpur
Sakshi 9058824046 Call Girls Service in KanpurSakshi 9058824046 Call Girls Service in Kanpur
Sakshi 9058824046 Call Girls Service in Kanpurjaanseema653
 
💞Call Girls In Sonipat 08168329307 Sonipat Kundli GTK Bypass EsCoRt Service
💞Call Girls In Sonipat 08168329307 Sonipat Kundli GTK Bypass EsCoRt Service💞Call Girls In Sonipat 08168329307 Sonipat Kundli GTK Bypass EsCoRt Service
💞Call Girls In Sonipat 08168329307 Sonipat Kundli GTK Bypass EsCoRt ServiceApsara Of India
 
💞SEXY💞 UDAIPUR ESCORTS 09602870969 CaLL GiRLS in UdAiPuR EsCoRt SeRvIcE💞
💞SEXY💞 UDAIPUR ESCORTS 09602870969 CaLL GiRLS in UdAiPuR EsCoRt SeRvIcE💞💞SEXY💞 UDAIPUR ESCORTS 09602870969 CaLL GiRLS in UdAiPuR EsCoRt SeRvIcE💞
💞SEXY💞 UDAIPUR ESCORTS 09602870969 CaLL GiRLS in UdAiPuR EsCoRt SeRvIcE💞Apsara Of India
 
Dubai Call Girls O528786472 Call Girls Dubai OL
Dubai Call Girls O528786472 Call Girls Dubai OLDubai Call Girls O528786472 Call Girls Dubai OL
Dubai Call Girls O528786472 Call Girls Dubai OLhf8803863
 
22K Indian Gold Jewelry Online - Buy 22 Karat Gold Jewelry in USA
22K Indian Gold Jewelry Online - Buy 22 Karat Gold Jewelry in USA22K Indian Gold Jewelry Online - Buy 22 Karat Gold Jewelry in USA
22K Indian Gold Jewelry Online - Buy 22 Karat Gold Jewelry in USAQueen of Hearts Jewelry
 
Top 10 Makeup Brands in India for women
Top 10  Makeup Brands in India for womenTop 10  Makeup Brands in India for women
Top 10 Makeup Brands in India for womenAkshitaBhatt19
 
Model Call Girl in Adarsh Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Adarsh Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Adarsh Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Adarsh Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts Service
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts ServiceCall Girls In Goa 7028418221 Call Girls In Colva Beach Escorts Service
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts ServiceApsara Of India
 
Dubai Call Girls Big Tit Wives O528786472 Call Girls Dubai
Dubai Call Girls Big Tit Wives O528786472 Call Girls DubaiDubai Call Girls Big Tit Wives O528786472 Call Girls Dubai
Dubai Call Girls Big Tit Wives O528786472 Call Girls Dubaihf8803863
 
Fun Call Girls In Yamunanagar 08168329307 Jagadhri Escort Services
Fun Call Girls In Yamunanagar 08168329307 Jagadhri Escort ServicesFun Call Girls In Yamunanagar 08168329307 Jagadhri Escort Services
Fun Call Girls In Yamunanagar 08168329307 Jagadhri Escort ServicesApsara Of India
 
❤️Call Girls In Chandigarh 08168329307 Dera Bassi Zirakpur Panchkula Escort S...
❤️Call Girls In Chandigarh 08168329307 Dera Bassi Zirakpur Panchkula Escort S...❤️Call Girls In Chandigarh 08168329307 Dera Bassi Zirakpur Panchkula Escort S...
❤️Call Girls In Chandigarh 08168329307 Dera Bassi Zirakpur Panchkula Escort S...Apsara Of India
 
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy Girls
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy GirlsCall Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy Girls
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy GirlsPooja Nehwal
 
Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.soniya singh
 
Russian BINDASH Call Girls In Mahipalpur Delhi ☎️9711199012
Russian BINDASH Call Girls In Mahipalpur Delhi ☎️9711199012Russian BINDASH Call Girls In Mahipalpur Delhi ☎️9711199012
Russian BINDASH Call Girls In Mahipalpur Delhi ☎️9711199012Mona Rathore
 
Call Girls in civil lines Delhi 8264348440 ✅ call girls ❤️
Call Girls in civil lines Delhi 8264348440 ✅ call girls ❤️Call Girls in civil lines Delhi 8264348440 ✅ call girls ❤️
Call Girls in civil lines Delhi 8264348440 ✅ call girls ❤️soniya singh
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Jama Masjid | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Jama Masjid | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Jama Masjid | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Jama Masjid | Delhi
 
Panipat Call Girls in Five Star Services Call 08860008073
Panipat Call Girls in Five Star Services Call 08860008073 Panipat Call Girls in Five Star Services Call 08860008073
Panipat Call Girls in Five Star Services Call 08860008073
 
AliExpress Clothing Brand Media Planning
AliExpress Clothing Brand Media PlanningAliExpress Clothing Brand Media Planning
AliExpress Clothing Brand Media Planning
 
Riya 9058824046 Call Girls Service in Rishikesh
Riya 9058824046 Call Girls Service in RishikeshRiya 9058824046 Call Girls Service in Rishikesh
Riya 9058824046 Call Girls Service in Rishikesh
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199012 ☎️ Hard And Sexy Vip Call
 
Sakshi 9058824046 Call Girls Service in Kanpur
Sakshi 9058824046 Call Girls Service in KanpurSakshi 9058824046 Call Girls Service in Kanpur
Sakshi 9058824046 Call Girls Service in Kanpur
 
💞Call Girls In Sonipat 08168329307 Sonipat Kundli GTK Bypass EsCoRt Service
💞Call Girls In Sonipat 08168329307 Sonipat Kundli GTK Bypass EsCoRt Service💞Call Girls In Sonipat 08168329307 Sonipat Kundli GTK Bypass EsCoRt Service
💞Call Girls In Sonipat 08168329307 Sonipat Kundli GTK Bypass EsCoRt Service
 
💞SEXY💞 UDAIPUR ESCORTS 09602870969 CaLL GiRLS in UdAiPuR EsCoRt SeRvIcE💞
💞SEXY💞 UDAIPUR ESCORTS 09602870969 CaLL GiRLS in UdAiPuR EsCoRt SeRvIcE💞💞SEXY💞 UDAIPUR ESCORTS 09602870969 CaLL GiRLS in UdAiPuR EsCoRt SeRvIcE💞
💞SEXY💞 UDAIPUR ESCORTS 09602870969 CaLL GiRLS in UdAiPuR EsCoRt SeRvIcE💞
 
Dubai Call Girls O528786472 Call Girls Dubai OL
Dubai Call Girls O528786472 Call Girls Dubai OLDubai Call Girls O528786472 Call Girls Dubai OL
Dubai Call Girls O528786472 Call Girls Dubai OL
 
22K Indian Gold Jewelry Online - Buy 22 Karat Gold Jewelry in USA
22K Indian Gold Jewelry Online - Buy 22 Karat Gold Jewelry in USA22K Indian Gold Jewelry Online - Buy 22 Karat Gold Jewelry in USA
22K Indian Gold Jewelry Online - Buy 22 Karat Gold Jewelry in USA
 
Top 10 Makeup Brands in India for women
Top 10  Makeup Brands in India for womenTop 10  Makeup Brands in India for women
Top 10 Makeup Brands in India for women
 
Model Call Girl in Adarsh Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Adarsh Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Adarsh Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Adarsh Nagar Delhi reach out to us at 🔝8264348440🔝
 
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts Service
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts ServiceCall Girls In Goa 7028418221 Call Girls In Colva Beach Escorts Service
Call Girls In Goa 7028418221 Call Girls In Colva Beach Escorts Service
 
Dubai Call Girls Big Tit Wives O528786472 Call Girls Dubai
Dubai Call Girls Big Tit Wives O528786472 Call Girls DubaiDubai Call Girls Big Tit Wives O528786472 Call Girls Dubai
Dubai Call Girls Big Tit Wives O528786472 Call Girls Dubai
 
Fun Call Girls In Yamunanagar 08168329307 Jagadhri Escort Services
Fun Call Girls In Yamunanagar 08168329307 Jagadhri Escort ServicesFun Call Girls In Yamunanagar 08168329307 Jagadhri Escort Services
Fun Call Girls In Yamunanagar 08168329307 Jagadhri Escort Services
 
❤️Call Girls In Chandigarh 08168329307 Dera Bassi Zirakpur Panchkula Escort S...
❤️Call Girls In Chandigarh 08168329307 Dera Bassi Zirakpur Panchkula Escort S...❤️Call Girls In Chandigarh 08168329307 Dera Bassi Zirakpur Panchkula Escort S...
❤️Call Girls In Chandigarh 08168329307 Dera Bassi Zirakpur Panchkula Escort S...
 
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy Girls
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy GirlsCall Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy Girls
Call Girls In Vashi Call Girls Pooja 📞 9892124323 ✅Book Hot And Sexy Girls
 
Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Govindpuri Escort Service Delhi N.C.R.
 
Russian BINDASH Call Girls In Mahipalpur Delhi ☎️9711199012
Russian BINDASH Call Girls In Mahipalpur Delhi ☎️9711199012Russian BINDASH Call Girls In Mahipalpur Delhi ☎️9711199012
Russian BINDASH Call Girls In Mahipalpur Delhi ☎️9711199012
 
Call Girls in civil lines Delhi 8264348440 ✅ call girls ❤️
Call Girls in civil lines Delhi 8264348440 ✅ call girls ❤️Call Girls in civil lines Delhi 8264348440 ✅ call girls ❤️
Call Girls in civil lines Delhi 8264348440 ✅ call girls ❤️
 

United States v. Swartz

  • 1. United States v. Swartz No. 11-cr-10260 (D. Mass.)
  • 2. Swartz’s objective? nothing/tbd | corpus analysis | limited works distribution limited geography distribution| total distribution | commercial distribution
  • 3.
  • 4. Sept. 2010 - Downloading began using Python script •25 Sept. 2010 - JSTOR blocked 18.55.6.215 •26 Sept. 2010 - Swartz to 18.55.6.216 •26 Sept. 2010 - JSTOR blocked 18.55.*.* (later alleged to have blocked 18.55.6.*) •27 Sept. 2010 - JSTOR contacts MIT, MIT denies MAC address 0:23:5a:73:5f:fb a network connection. •2 Oct. 2010 - Swartz changed MAC address to 0:23:5a: 73:5f:fc •
  • 5. 9 Oct. 2010 – JSTOR blocks all of MIT (restored few days later) •Nov. & Dec. 2010 - Swartz hard wires into MIT via closet in Bldg. 16. Hid laptop. Obtains and begins using a second laptop. •4 Jan 2011 – MIT sysadmin traced IP address to network switch in closet of MIT Bldg. 16. •Cambridge Police, MIT Police, & Secret Service. •External forensics, network monitoring, and video surveillance. •
  • 6. 4 Jan 2011 – Swartz observed entering closet. •6 Jan 2011 – Swartz observed entering closet second time. •MIT Police ID’d Swartz on street, arrested, seized USB device in backpack. •Computer later recovered from the student center. •In February, search warrants executed by USSS of apartment, office, laptop, external hard drive, and USB storage device (the latter 3 had been seized at arrest). •
  • 7. Spring/Summer 2011: Resolved civil claims with JSTOR; returned corpus. •Same time: grand jury investigation •First indictment issued on 14 July 2011 •
  • 8. Superseding Indictment (12 Sept. 2012) Two counts of wire fraud (18 U.S.C. § 1343) •Fives counts of computer fraud (18 U.S.C. § 1030(a)(4)) •Five counts of unlawful access to protected computer (§ 1030(a)(2)) •One count of reckless damage to protected computer (§1030(a)(5)) •
  • 9. Wire Fraud 18 U.S.C. § 1343 – “Whoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises, transmits or causes to be transmitted by means of wire, radio, or television communication in interstate or foreign commerce, any writings, signs, signals, pictures, or sounds for the purpose of executing such scheme or artifice, shall be fined under this title or imprisoned not more than 20 years, or both. […]” Scheme to defraud a person out of money or property (can be intangible). • Uses a false pretense. • Must be material (Neder v. United States (SCOTUS)) • Employs use of a wire communication •
  • 10. Wire Fraud Four theories: 1. appearing to JSTOR that he was affiliated with MIT. 2. changing IP and MAC address to conceal identity. 3. using python script to appear as though he was multiple users 4. concealing physical location
  • 11. Wire Fraud Four theories: 1. appearing to JSTOR that he was affiliated with MIT. 2. changing IP and MAC address to conceal identity. (doubtful) 3. using python script to appear as though he was multiple users. (maybe) 4. concealing physical location
  • 12. CFAA Claims § 1030(a)(4) “exceeds authorized access” Computer fraud § 1030(a)(2) Unauthorized access of protected computer § 1030(a)(5)(B) Computer damage “without authorization” - intent to defraud - accessed computer to further - obtained a thing of value - obtained “information” - felony if value > $5000 - recklessly cause damage - felony if “loss” > $5000
  • 13. CFAA Claims § 1030(a)(4) “exceeds authorized access” Computer fraud § 1030(a)(2) Unauthorized access of protected computer § 1030(a)(5)(B) Computer damage “without authorization” - intent to defraud - accessed computer to further - obtained a thing of value - obtained “information” - felony if value > $5000 - recklessly cause damage - felony if “loss” > $5000
  • 14. CFAA Claims § 1030(a)(4) “exceeds authorized access” Computer fraud § 1030(a)(2) Unauthorized access of protected computer § 1030(a)(5)(B) “without authorization” - “outsider” required? Computer damage Compare LVRC Holdings v. Brekka (9th Cir.); with Int’l Airport Centers v. Citrin (7th Cir.) 1st Cir. has split D. Ct. authority. - intent to defraud - accessed computer to further - obtained a thing of value - obtained “information” - felony if value > $5000 - recklessly cause damage - felony if “loss” > $5000
  • 15. CFAA Claims § 1030(a)(4) “exceeds authorized access” Computer fraud § 1030(a)(2) Unauthorized access of protected computer § 1030(a)(5)(B) Computer damage “without authorization” - intent to defraud - accessed computer to further - obtained a thing of value - obtained “information” - felony if value > $5000 - recklessly cause damage - felony if “loss” > $5000
  • 16. CFAA Claims § 1030(a)(4) “exceeds authorized access” Computer fraud § 1030(a)(2) Unauthorized access of protected computer § 1030(a)(5)(B) Computer damage “without authorization” - intent to defraud - accessed computer to further - obtained a thing of value - obtained “information” - felony if value > $5000 - recklessly cause damage - felony if “loss” > $5000
  • 17. CFAA Claims § 1030(a)(4) Computer fraud § 1030(a)(2) Unauthorized access of protected computer § 1030(a)(5)(B) Computer damage “exceeds authorized access” Code | Contract | Norms “without authorization” - intent to defraud - accessed computer to further - obtained a thing of value - obtained “information” - felony if value > $5000 - recklessly cause damage - felony if “loss” > $5000
  • 18. CFAA Claims § 1030(a)(4) Computer fraud § 1030(a)(2) Unauthorized access of protected computer § 1030(a)(5)(B) Computer damage “exceeds authorized access” Code | Contract | Norms - intent to defraud - accessed computer to further - obtained a thing of value - obtained - United States v. Drew (C.D. Cal.) “information” “without - felony if value > $5000 authorization” - recklessly cause damage - felony if “loss” > $5000
  • 19. CFAA Claims § 1030(a)(4) Computer fraud § 1030(a)(2) Unauthorized access of protected computer § 1030(a)(5)(B) Computer damage “exceeds authorized access” Code | Contract | Norms - intent to defraud - accessed computer to further - obtained a thing of value - obtained - United States v. Drew (C.D. Cal.) - JSTOR’s terms “information” - MIT’s terms “without - felony if value > - but see United States v. Nosal (9th Cir. $5000 authorization” en banc) - recklessly cause damage - felony if “loss” > $5000
  • 20. CFAA Claims § 1030(a)(4) Computer fraud “exceeds authorized access” Code | Contract | Norms - JSTOR’s restrictions? - MIT’s restrictions? - “cat-and-mouse” Unauthorized access of protected computer IP - with - with MAC § 1030(a)(5)(B) use of - through Computer damage script § 1030(a)(2) - intent to defraud - accessed computer to further - obtained a thing of value - obtained - United States v. Drew (C.D. Cal.) - JSTOR’s terms “information” - MIT’s terms “without - felony if value > - but see United States v. Nosal (9th Cir. $5000 authorization” en banc) - recklessly cause damage - felony if “loss” > $5000
  • 21. CFAA Claims § 1030(a)(4) Computer fraud “exceeds authorized access” Code | Contract | Norms - JSTOR’s restrictions? - MIT’s restrictions? - “cat-and-mouse” Unauthorized access of protected computer IP - with - with MAC § 1030(a)(5)(B) use of - through Computer damage script § 1030(a)(2) - intent to defraud - accessed computer to further - obtained a thing of value - obtained - United States v. Drew (C.D. Cal.) - JSTOR’s terms “information” - MIT’s terms “without - felony if value > - but see United States v. Nosal (9th Cir. $5000 authorization” en banc) - recklessly cause damage - felony if “loss” > $5000
  • 22. CFAA Claims § 1030(a)(4) Computer fraud “exceeds authorized access” Code | Contract | Norms | Physical? - JSTOR’s restrictions? - MIT’s restrictions? - “cat-and-mouse” Unauthorized access of protected computer IP - with - with MAC § 1030(a)(5)(B) use of - through Computer damage script § 1030(a)(2) - intent to defraud - accessed computer to further - obtained a thing of value - obtained - United States v. Drew (C.D. Cal.) - JSTOR’s terms “information” - MIT’s terms “without - felony if value > - but see United States v. Nosal (9th Cir. $5000 authorization” en banc) - recklessly cause damage - felony if “loss” > $5000
  • 23. CFAA Claims § 1030(a)(4) “exceeds authorized access” Computer fraud § 1030(a)(2) Unauthorized access of protected computer § 1030(a)(5)(B) Computer damage “without authorization” - intent to defraud - accessed computer to further - obtained a thing of value - obtained “information” - felony if value > $5000 - recklessly cause damage - felony if “loss” > $5000
  • 24. CFAA Claims § 1030(a)(4) “exceeds authorized access” Computer fraud § 1030(a)(2) Unauthorized access of protected computer § 1030(a)(5)(B) Computer damage “without authorization” - intent to defraud - accessed computer to further - obtained a thing of value - obtained “information” - felony if value > $5000 - recklessly cause damage - felony if “loss” > $5000
  • 25. CFAA Claims § 1030(a)(4) “exceeds authorized access” Computer fraud § 1030(a)(2) Unauthorized access of protected computer § 1030(a)(5)(B) Computer damage “without authorization” - intent to defraud - accessed computer to further - obtained a thing of value - obtained “information” - felony if value > $5000 - recklessly cause damage - felony if “loss” > $5000