How M.I.T. Ensnared a Hacker, Bucking a Freewheeling Culture
In the early days of 2011, the Massachusetts Institute of Technology learned that it had an intruder. Worse, it believed the intruder had been there before.
Months earlier, the mysterious visitor had used the schoolâs computer network to begin copying millions of research articles belonging to Jstor, the nonprofit organization that sells subscription access to universities.
The visitor was clever â" switching identifications to avoid being blocked by M.I.T.âs security system â" but eventually the university believed it had shut down the intrusion, then spent weeks reassuring furious officials at Jstor that the downloading had been stopped.
However, on Jan. 3, 2011, according to internal M.I.T. documents obtained by The New York Times, the university was informed that the intruder was back â" this time downloading documents very slowly, with a new method of access, so as not to alert the universityâs security experts.
âThe user was now not using any of the typical methods to access MITnet to avoid all usual methods of being disabled,â concluded Mike Halsall, a senior security analyst at M.I.T., referring to the universityâs computer network.
What the university officials did not know at the time was that the intruder was Aaron Swartz, one of the shining lights of the technology world and a leading advocate for open access to information, with a fellowship down the road at Harvard.
Mr. Swartzâs actions presented M.I.T. with a crucial choice: the university could try to plug the weak spot in its network or it could try to catch the hacker, then unknown.
The decision â" to treat the downloading as a continuing crime to be investigated rather than a security threat that had been stopped â" led to a two-day cat-and-mouse game with Mr. Swartz and, ultimately, to charges of computer and wire fraud. Mr. Swartz, 26, who faced a potentially lengthy prison term and whose trial was to begin in April, was found dead of an apparent suicide in his Brooklyn apartment on Jan. 11.
Mr. Swartzâs supporters called M.I.T.âs decision a striking step for an institution that prides itself on operating an open computer network and open campus â" the home of a freewheeling programming culture. M.I.T.âs defenders viewed the intrusion as a computer crime that needed to be taken seriously.
M.I.T. declined to confirm any of these details or comment on its actions during the investigation. The universityâs president, L. Rafael Reif, said last week, âIt pains me to think that M.I.T. played any role in a series of events that have ended in tragedy.â He appointed a professor, Hal Abelson, to analyze M.I.T.âs conduct in the investigation. To comment now, a spokeswoman for the university said, would be âto get ahead of that analysis.â
Early on Jan. 4, at 8:08 a.m., according to Mr. Halsallâs detailed internal timeline of the events, a security expert was able to locate that new method of access precisely â" the wiring in a network closet in the basement of Building 16, a nondescript rectangular structure full of classrooms and labs that, like many buildings on campus, is kept unlocked.
In the closet, Mr. Halsall wrote, there was a netbook, or small portable computer, âhidden under a box,â connected to an external hard drive that was receiving the downloaded documents.
At 9:44 a.m. the M.I.T. police were called in; by 10:30 a.m., the Cambridge police were en route, and by 11 a.m., Michael Pickett, a Secret Service agent and expert on computer crime, was on the scene. On his recommendation, a surveillance camera was installed in the closet and a second laptop was connected to the network switch to track the traffic.
There may have been a reason for the universityâs response. According to the timeline, the tech team detected brief activity from China on the netbook â" something that occurs all the time but still represents potential trouble.
E-mails among M.I.T. officials that Tuesday in January 2011 highlight the pressures university officials felt over a problem they thought they had solved. Ann J. Wolpert, the director of libraries, wrote to Ellen Finnie Duranceau, the official who was receiving Jstorâs complaints: âHas there ever been a situation similar to this when we brought in campus police The magnitude, systematic and careful nature of the abuses could be construed as approaching criminal action. Certainly, thatâs how Jstor views it.â
Some of Mr. Swartzâs defenders argue that collecting and providing evidence to the government without a warrant may have violated federal and state wiretapping statutes.
John Schwartz contributed reporting.
This article has been revised to reflect the following correction:
Correction: January 21, 2013
An earlier version of this article misquoted part of statement by a spokeswoman for the Massachusetts Institute of Technology. Referring to a review of M.I.T.âs conduct that was commissioned by the universityâs president, she said to comment now on the events surrounding Aaron Swartzâs arrest would be âto get ahead of that analysis,â not âto get ahead of that investigation.âÂ