Saturday, February 16, 2013

Government/Political Parties Keeping Tabs on What Moves You

The Obama campaign greatly amplified the collection of digital information on voters, resulting in an enormous database of highly specific behavioral and motivational factors for all U.S. citizens.

Slashdot: Pols Blur Line Between Data Mining, Cyberstalking

Mother Jones: Inside the Obama Campaign's Hard Drive

Technology Review: How President Obama’s campaign used big data to rally individual voters

"Analysts identified their attributes and made them the core of a persuasion model that predicted, on a scale of 0 to 10..."

"...as campaigns developed deep portraits of the voters in their databases, it became possible to measure the attributes of the people who were actually moved by an experiment’s impact..."

Although the database was used during the campaign to elect Obama, the party has subsequently decided to keep it alive and growing in preparation for future uses (Sun Sentinel: Dems plan to tap voter database).

"...what you buy, what you read, where you browse and maybe even what kind of political message might prompt you..."

Favorite Sources

We can't keep up with everything. When you need a fix of security, privacy, and surveillance news, and we're behind or having published recently, here are a few worthy sources:

Slashdot, especially look at articles tagged yro or securityNetwork World is a good source of real IT security news, but for the more outlandish stuff, you should check Ms. Smith, the Privacy Fanatic. Some of the best and scariest news about exploits and malware come from KrebsOnSecurityBruce Schneier's site has blog entries about security and privacy on a wide variety of topics, and extensive reader commentary. TechNewsWorld  ArsTechnica  CNET's Politics and Law and Technically Incorrect section are good. (Technically Incorrect wins our praise and admiration for best apropos name for online news or commentary.)

Monday, February 11, 2013

Various Privacy, ID Theft, Hacks, and Other Stories

Ars Technica has a lot of stuff worth pointing out, so I will.

A hacker, now the subject of a criminal investigation, hacked AOL and/or Yahoo email accounts to expose a lot of what amounts to "aww shucks" stuff, potentially generating a lot of sympathy for the Bush family.
Bush family privacy shattered after e-mails, photos exposed online

I'd never heard of this type of cat before: Porn troll. Porn troll? I presume someone who hounds downloaders of porn for payment for violating copyright laws. The porn trolls sound like they are missing a few screws, because they keep breaking laws and violating decorum of the court in pursuit of their cases.
Judge hints at jail time for porn troll Prenda Law over identity theft
Man charges porn trolling firm Prenda Law with identity theft
Porn trolling case thrown out for "attempted fraud on the court"

The story of Aaron Swartz' attempt at liberating public court system documents from the PACER system is described here. A copy of his FBI file resulting from his actions is posted on his personal web site here.

On the more practical side, if you are concerned about malevolent criminals and hackers stealing your accounts and compromising your computer, and you need to know more about how to protect yourself read Keep it secret, keep it safe: A beginner's guide to Web safety.

Bank executives in the Midwest need to change their passwords.
Data siphoned in Fed reserve hack a “bonanza” for spear phishers

A disgraced scientist had hired a reputation management company to boost his standing in search engines, and minimize the number of articles appearing that described his retracted scientific papers. So someone then made DMCA copyright takedown complaints on the original articles after stealing the text and posting it on their own web site.
Site plagiarizes blog posts, then files DMCA takedown on originals

Revenge Porn Purveyor Doesn't See it Coming

Ars Technica reports on a web site operator who makes his money by extorting money from the women posted on his web site. Officially, there is no connection between Craig Brittain, proprietor of IsAnybodyDown, and the "takedown lawyer" who received $250 from each woman who wants her information removed from the site, but one expert says that emails from the supposed lawyer appear to be from Brittain's computer.

What Brittain doesn't see coming are the copyright lawsuits, and possibly invasion of privacy torts, and portrayal in a false light torts. Since some of the women depicted were their own photographers, they own the copyright to the films on the web site. Willful infringement penalties will quickly add up to the hundreds of thousands of dollars.

Another danger that Brittain faces is that some of the women may have been under age.

His rationale:  "When asked whether he thought what he was doing was "really sleazy," Brittain offered this: “We live in a really sleazy society.”"

China Hacks the United States

Red alert:

China hacked the New York Times.

China hacked the Wall Street Journal.

China hacked the Washington Post.

China hacked U.S. universities.

China hacked Twitter.

China hacked individual accounts of U.S. citizens and in order to extort money.

China is hacking all of the United States, including you.

In the past, China denied that it was doing any hacking at all. Recently its objections have become much lamer, and they have said something like "Well the U.S. is probably doing it too. So there!" The usual paranoid propaganda has been published in retaliation:  "Recently foreign media have been hyping up "cyber attack from China" and the talk of a "Chinese hacking threat" is in the air." As though the U.S. media were controlled by a single organization, or were making it up, or were all moving together, like a herd of like-minded animals. It just drips with disrespect for the individual.

China is a leader in corruption measures.

China is a leader in global warming contributions.

If this persists, Facebook and China will be racing neck and neck to be the first organization to gather all of the world's information, information that I own. Hurry up, guys. It will be so much cheaper if you do all the work for me, and I can't wait forever.

Facebook Control and Envy, Predicting the Future, etc.


I have a lot of links to pass on to you. The stack of pending items is so big that if I try to try an article on each topic I'll never get through it all. Instead, I'm going to try to clear the backlog by introducing each link briefly and then moving on.

"On Facebook, People Own and Control Their Information"
This blog posting by Zuckerberg isn't really new. I bumped into it while looking at something else more recent. Upon seeing the title, it struck me just how disingenuous it was. Then, deep in the article, Zuckerberg contradicts himself. Sorry buddy, you can't say that "people own and control their information" when in reality "There is no system today that enables me to share my email address with you and then simultaneously lets me control who you share it with and also lets you control what services you share it with." Both of those sentences are in the same article written by Zuckerberg. You can see what he wants, which is credit for trying to help keep control of your information, but he knows that reality is different. How deceptive.
http://blog.facebook.com/blog.php?post=54434097130

"Is Facebook envy making you miserable?"
German researchers have found that Facebook users are miserable. The problem? Everyone is envious of others' vacation pictures. Women are envious of friends' physical attractiveness. Men are envious of others' accomplishments and status.
http://www.reuters.com/article/2013/01/22/us-facebook-envy-idUSBRE90L0N220130122?feedType=RSS&feedName=lifestyleMolt

“Witnessing friends' vacations, love lives and work successes on Facebook can cause envy and trigger feelings of misery and loneliness…” “…unprecedented platform for social comparison.” Researchers from Humboldt University and from Darmstadt's Technical University found vacation photos were the biggest cause of resentment with more than half of envy incidents triggered by holiday snaps on Facebook.”

“It’s now possible to predict the future." 
"Not surprisingly, no one in the intelligence business is eager to talk about this.” With ubiquitous sensors, huge databases, and data mining algorithms, intelligence agencies either have or will soon have the ability to predict what each of us will do next. (If they do, can't they at least email us a to-do list each day? I'd hate not living up to the predictions others make of me.)
http://www.strategypage.com/htmw/htintel/articles/20130122.aspx

"Student Expelled from Dawson College in Montreal for Finding Sloppy Coding"
In the no-good-deed-goes-unpunished department, a Dawson College student discovered a security flaw, reported it fully, then when he went later to test that the exploit had been fixed, was accused of hacking. The professors at the school fully supported expulsion, despite the student's critical role in finding the flaw. Was Dawson attempting a cover-up? Slashdot suggests that the Dawson faculty are stuck in the past, pre-Internet.
http://news.slashdot.org/story/13/01/21/1244225/student-expelled-from-montreal-college-for-finding-sloppy-coding

http://news.nationalpost.com/2013/01/20/youth-expelled-from-montreal-college-after-finding-sloppy-coding-that-compromised-security-of-250000-students-personal-data/

http://news.slashdot.org/story/13/01/23/2347231/cto-says-al-khabaz-expulsion-shows-cs-departments-stuck-in-pre-internet-era

Dawson College defends its actions:
http://o.canada.com/2013/01/22/dawson-defends-students-expulsion/
"We have to abide by this legal requirement not to divulge any personal information of any student..."

"Researchers Achieve Storage Density of 2.2 Petabytes Per Gram of DNA"
Suppose you wanted to leave a message for future generations? Instead of printing hardcopy and storing it on acid-free paper, or chiseling it out on a piece of stone, could the perfect storage place be inside your DNA? I'm sure the science fiction story has already been written (please leave a comment if you know of such a story) about leaving messages for future generations in DNA itself.
http://hardware.slashdot.org/story/13/01/23/1927221/researchers-achieve-storage-density-of-22-petabytes-per-gram-of-dna

Uncle Sam wants you
to be a white hat hacker! In this bizarre development, it seems that the U.S. Government wants to encourage community hacking groups to sprout up all over America. Apple pie, baseball, and nmap. They go together likes peas and carrots. Bake sales and Metasploit, down on the corner at church!
http://yro.slashdot.org/story/13/01/23/1823208/us-government-announces-national-day-of-civic-hacking

"Google Report Shows Governments Want More Private Data"
Google continues to report on requests by governments to disclose private information and remove search results. As you would expect, the number of requests is rising.
http://tech.slashdot.org/story/13/01/23/1712213/google-report-shows-governments-want-more-private-data

Wednesday, February 6, 2013

Employers Give Away Employee Salary Information, Secretly

Equifax (EFX-NYSE) collects your detailed salary and paycheck data, period by period, from employers and sell it to financial companies and debt collectors. NBC broke this story first:
http://redtape.nbcnews.com/_news/2013/01/30/16762661-exclusive-your-employer-may-share-your-salary-and-equifax-might-sell-that-data

One practical use to make of this news is that when you apply for a loan, you may want to consider just telling the lender that your current salary is "exactly what The Working Number tells you." If the lender asks you separately for this information, they could be attempting to administer a kind of truth-telling test. If there is a discrepancy, they may conclude that you are lying and therefore less trustworthy. Since you may not know exactly what your income is anyway (net? gross? monthly? biweekly? it is easy to get a wrong number), you reduce your risk of being falsely accused by refusing to estimate or report a number. Or you might report all of your income, which won't match their number, which doesn't include dividends and interest.

A few choice quotes from NBC's article: "Equifax brags that The Work Number makes debt collectors' jobs easier." "...there are no special restrictions on how employment reports (such as salary information) is used for non-employment purposes..." "Its database is so detailed that it contains week-by-week paystub information dating back years for many individuals, as well as other kinds of human resources-related information, such as health care provider, whether someone has dental insurance and if they’ve ever filed an unemployment claim."

Not every employer sends in their information. As of 2009, the Equifax database covered only 30 percent of the U.S. working population. So if you do use the aforementioned trick, be sure first that your salary data is indeed in the Equifax database.

Thursday, January 31, 2013

Compete, Inc. Collected Personal Data Including Keystrokes

Compete "captured information consumers entered into websites, including consumers’ usernames, passwords, and search terms, and also some sensitive information such as credit card and financial account information, security codes and expiration dates, and Social Security Numbers."

Two analytics companies to settle charges for online user tracking
http://www.net-security.org/secworld.php?id=13820

Compete Inc. Settles FTC Privacy Charges
http://www.esecurityplanet.com/network-security/compete-inc.-settles-ftc-privacy-charges.html

Compete Inc. is owned by Taylor Nelson Sofres, which is in turn owned by WPP plc.

http://en.wikipedia.org/wiki/Compete.com

You can own WPP. The shares are publicly traded on the London (WPP.L) and NASDAQ (WPPGY) exchanges. 

Slashdot story and comments:

The penalties seem extremely light, considering that Compete Inc. (and hence WPP) violated the Computer Fraud and Abuse Act (CFAA) by committing fraud involving Protected Computers, which is a felony.

Facebook Graph Search Reveals All

Amusingly contradictory "likes" revealed!

Actual Facebook Graph Searches
http://actualfacebookgraphsearches.tumblr.com/
shows:
Mothers of Jews who like Bacon
Married people who like Prostitutes
Current employees of Tesco who like horses
Current employers of people who like Racism

Facebook Graph searches: Hooker hunger and other delish data
http://news.cnet.com/8301-1023_3-57565460-93/facebook-graph-searches-hooker-hunger-and-other-delish-data/
shows:
Mothers of Catholics from Italy who like Durex

But:
Facebook Graph Search: 4 big reasons it matters
http://news.cnet.com/8301-1023_3-57564801-93/facebook-graph-search-4-big-reasons-it-matters/

How Generation Y really feels about online privacy
http://ces.cnet.com/8301-34435_1-57563194/how-generation-y-really-feels-about-online-privacy/
Summary of their attitude and message: "we live in public."
But then, this is a panel of people who are on stage in front of a huge audience, being recorded, miked, and with giant video overhead. Clearly they aren't shy, or are perhaps even to the other extreme.

But! People are really amusing! Lamebook!
http://www.lamebook.com/

And Facebook can resurrect the dead!
When Facebook Resurrected the Dead
http://www.youtube.com/watch?v=Zf6C-pZ3heY

Additional Links on Aaron Swartz Case

22 PowerPoint slides at Slideshare showing the legal filing terminating the legal case.
http://www.slideshare.net/DeepDude/usa-v-aaron-swartz-terminated

Memorial for Aaron Swartz at the Internet Archive. Text by Carl Malamud.
https://public.resource.org/aaron/army/

Slashdot report on Dan Kennedy's re-publication of a Massachusetts Lawyers Weekly article saying that State prosecutors had planned to let Swartz off with a warning.

http://yro.slashdot.org/story/13/01/29/0219239/prosecution-of-swartz-typical-for-the-sick-culture-pervading-the-doj

Kennedy's article:
http://dankennedy.net/2013/01/24/the-swartz-suicide-and-the-sick-culture-of-the-justice-dept/

Tuesday, January 22, 2013

Your Computer is a "Protected Computer"

As was made plain by the recent Aaron Swartz scandal, the Computer Fraud and Abuse Act can be used to prosecute alleged violators at a high level for minor transgressions. The law, "18 USC § 1030 - Fraud and related activity in connection with computers" defines several forms of violations, all of which involve what the National Information Infrastructure Protection Act of 1996 defines as a protected computer:

a computer—
(A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or
(B) which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.

This is a rather wide definition, as any computer used to buy from Amazon or perform online banking with an out of state bank then immediately qualifies as being "used in interstate commerce." Also, anyone sending an email to any other person in another state would then also be using the computer for interstate communications, again meeting the standard.

What this means is that your personal computer is a protected computer, and any transgression against your computer then qualifies for a criminal complaint at the Federal level. More on this tomorrow.

Monday, January 21, 2013

France Proposes Personal Information Tax

Slashdot reports that the New York Times reports that France is considering a tax on companies that collect personal information.

France Proposes a Tax On Personal Information Collection
http://tech.slashdot.org/story/13/01/21/1253219/france-proposes-a-tax-on-personal-information-collection

France Proposes an Internet Tax
http://www.nytimes.com/2013/01/21/business/global/21iht-datatax21.html

The rationale in part is that "...users of services like Google and Facebook are, in effect, working for these companies without pay by providing the personal information that lets them sell advertising." Touché

The tax would be based on the number of users tracked, not by the quantity of information. Unfortunately, this would give internet companies further incentive to thwart anonymous and pseudonymous accounts. Fortunately, this would give the French government an incentive to allow anonymous and pseudonymous accounts, as the extra accounts would drive up tax collections.

Judge: Wash Post and Agence France-Presse Stole Photos

A judge has granted a summary judgment stating that defendants Washington Post and AFP improperly used without license photographs owned by photographer Daniel Morel. Morel took photographs within hours of the Haiti earthquake in 2010 and posted links to them on Twitter. AFP had argued that any photos posted on the internet and linked to from Twitter were available for all to use without licence.

News outlets improperly used photos posted to Twitter: judge
http://www.reuters.com/article/2013/01/15/us-socialmedia-copyright-ruling-idUSBRE90E11P20130115

The case is not yet concluded, as determination of willfulness and damages will be determined at trial.

The case highlights the evolving area of copyright law as applied to photographs used in social media. While Twitter's service terms do allow the reposting and rebroadcasting of users' images in certain circumstances, such as "retweeting," they do not apply to commercial use.

There is a tendency in the social media business and photographic support businesses, such as printing of digital photographs, to treat consumer photos as "not copyrighted" even though existing copyright law states explicitly that all photographs are protected by copyright from the moment of capture, and that the copyright is owned by the photographer.

Although this law applies even to supposedly non-professional photographs, it is in the interest of social media companies such as Google+, Facebook, Instagram, and LinkedIn to insist upon unlimited distribution rights as a non-negotiable part of their Terms of Service. Instagram recently changed their TOS to take a right to use customer photographs for any purpose, which could have included advertising, without compensating the owner of the photograph.

More on Instagram's TOS:
Instagram's TOS Go Into Effect Today
Terms of Use • Instagram
What Instagram’s New Terms of Service Mean for You

The TOS of companies that make prints from digital photographs also overreach in most cases. The actual wording of the contracts makes it clear that when you upload photographs to Sams Club, Costco, Wal-Mart, Target, SnapFish, SmugMug, Mpix, Wolf Camera, Shutterfly, Flickr, and so on that the company gains a perpetual license to reproduce your photograph, with no compensation to you.

Sams Club TOS

Excerpt from the Sams Club TOS:
"You grant to samsclub.com a non-exclusive, royalty-free, perpetual, irrevocable, unrestricted, world-wide right and license to access, use, copy, reproduce, distribute, transmit, display, perform, communicate to the public, modify, adapt, publish, translate, create derivative works from, and otherwise use such Materials (in whole or in part) in connection with the Site and/or the Products, using any form, media or technology now known or later developed, without providing compensation to you or any other person, without any liability to you or any other person, and free from any obligation of confidence or other duties on the part of samsclub.com, its affiliates and their respective licensees;"

In short, you must be extremely vigilant when getting prints made from your better photographs, because some larger businesses are looking to monetize your content. To avoid losing rights to your own pictures, insist on a new, separate contract that grants a right to the print-making company to copy your files and photos only for the purpose of making prints for you as customer, and limits the time frame on the license to no more than 30 days.

North Korea: "It's like The Truman Show, at country scale"

Google chief Eric Schmidt,  who said at one time that everything you do should be posted on line*, visited North Korea with his daughter Sophie. Sophie blogged about the visit in a post titled It might not get weirder than this. Everything she says in her article is surprising. I highly recommend reading it, especially if you like traveling.

Networkworld's Ms. Smith's take: Bugged guesthouse: Eric Schmidt's daughter reveals North Korea trip details.

* Actually, he said something like "if you don't want anyone to know what you are doing, then maybe you shouldn't be doing it." But it amounts to the same thing. I could even prove it mathematically, except that I'm too lazy at the moment, and you probably believe me already.

1/22/13 update:
More articles about the trip, with new details:
Sophie Schmidt Recounted North Korea Trip with Her Father, Google Chairman Eric Schmidt on a Blog
SOPHIE SCHMIDT GOES TO NORTH KOREA & REPORTS BACK META
Eric Schmidt's daughter lifts lid on 'very strange' North Korea
Eric Schmidt's post on Google+



Trusteer may not be worth the CPU cycles

Trusteer's Rapport software is an application written that a number of banks have asked their customers to download onto their systems. Banks that have offered the software include Bank of America, Société Générale, INGDirect (now owned by Capital One), HSBC, NatWest, The Royal Bank of Scotland, CIBC,Ulster Bank, First Direct, Santander, Standard Bank of South Africa, Scotiabank, Bank of Montreal, Banco de Chile, and The Co-operative Bank. Reports are that the software is difficult to remove, as it has some features that resemble malware in the way it installs itself, and offers little protection against most malware. It can consume an excessive amount of CPU time and prevent some normal programs, such as screen snapshot applications, from functions. The purported purpose is to stop screen-scraping programs and keyloggers, and to verify that you are connected to the bank’s actual Web site.

Should you install it? Should you uninstall it if you already have it?

We recommend against installing it. It is not proven that the software doesn't violate privacy, and your financial institution would not take responsibility for its actions should there be data leakage or intrusions into your computer if Rapport were found to be culpable. Overall, the risks are much larger than the rewards for this particular application. The application has been found to be weak at accomplishing its goals, and it is likely well behind the current wave of malware technology being used by the bad guys. Another problem is that it has been almost three years since the last authoritative article appeared on the web analyzing Rapport.

The intent of the bankers and the company offering the application is to thwart criminals that target customer systems with malware in order to steal credentials, identities, and the contents of bank accounts. The problem is that, legally, the software is acting on behalf of the bank, not you, so you have no recourse when the software does stupid things, like consume all of your computing power, or be difficult to uninstall. A better solution is to increase your computer's defenses with better firewall, better virus and malware detection, and especially to surf the web using only a non-administrative account. Even if you are the only user on your computer, you will be safer if you create two accounts:  one for administrative functions, and the other for everything else, especially cruising the internet and online banking, which does not have the power to locally modify the registry, other computer settings, or install applications.

Businesses are usually liable for losses arising from this type of fraud. If you are in this position, we recommend this solution:  Dedicate a single computer for the purpose of online banking. Use it to connect only to your online bank web site. Make it company policy that using that computer for any other purpose is grounds for immediate dismissal.

Free Software to Protect Your Bank Account
A Closer Look at Rapport from Trusteer

Friday, January 18, 2013

Compendium for the Aaron Swartz Case

“We can rightly judge a society by how it treats its eccentrics and deviant geniuses—and by that measure, we have utterly failed.”

"Steve Jobs and Steve Wozniak in the 1970s committed crimes more damaging than Swartz's"

Reddit: On the Death of Aaron Schwartz
http://www.reddit.com/r/technology/comments/16hzpx/on_the_death_of_aaron_schwartz/
Aaron's Law: Violating a Site's Terms of Service Should Not Land You in Jail
http://www.theatlantic.com/national/archive/13/01/aarons-law/267247/#
Prosecutor as bully
http://lessig.tumblr.com/post/40347463044/prosecutor-as-bully
Reddit: I'm Rep Zoe Lofgren & I'm introducing "Aaron's Law" to change the Computer Fraud and Abuse Act (CFAA)
http://www.reddit.com/r/technology/comments/16njr9/im_rep_zoe_lofgren_im_introducing_aarons_law_to/
Aaron's Fight is Our Fight
http://www.rootstrikers.org/
US Government Ups Felony Count In JSTOR/Aaron Swartz Case From Four To Thirteen
http://www.techdirt.com/articles/20120917/17393320412/us-government-ups-felony-count-jstoraaron-swartz-case-four-to-thirteen.shtml
How the Legal System Failed Aaron Swartz—And Us
http://www.newyorker.com/online/blogs/newsdesk/2013/01/everyone-interesting-is-a-felon.html
Thanks To The Lori Drew Case, I Can Make Each Of You A Criminal
http://www.techdirt.com/articles/20081201/0252082984.shtml
Thomas J. Dolan, Ortiz' husband, attacked Swartz's parents, saying on Twitter: "Truly incredible that in their own son’s obit they blame others for his death and make no mention of the 6-month offer."
http://www.huffingtonpost.com/2013/01/15/tom-dolan-aaron-swartz_n_2479980.html
Many on Twitter were outraged by Dolan's attack on Swartz and his family:
http://betabeat.com/2013/01/tom-dolan-defends-carmen-ortiz-aaron-swartz-twitter/
Tom Dolan bio:
http://en.wikipedia.org/wiki/Thomas_J._Dolan
Punitive Damages, Remunerated Research, and the Legal Profession
http://www.stanfordlawreview.org/print/article/punitive-damages-remunerated-research-and-legal-profession
Carmen Ortiz, lead prosecutor of Aaron Swartz
http://en.wikipedia.org/wiki/Carmen_Ortiz
Aaron Swartz indicted on charges of "wire fraud, computer fraud" etc.
http://kottke.org/11/07/aaron-swartz-indicted-on-charges-of-wire-fraud-computer-fraud-etc
JSTOR Prosecutes User for Downloading Too Much
http://vorpaltrade.blogspot.com/2011/10/jstor-prosecutes-user-for-downloading.html
Another example of prosecutorial overreach:
http://www.wbur.org/2012/11/14/tewksbury-motel-owner-fights-property-seizure
Aaron Swartz's Lawyer: Prosecutor Stephen Heymann Wanted 'Juicy' Case For Publicity
http://www.huffingtonpost.com/2013/01/14/aaron-swartz-stephen-heymann_n_2473278.html
Carmen Ortiz and Stephen Heymann: accountability for prosecutorial abuse
http://www.guardian.co.uk/commentisfree/2013/jan/16/ortiz-heymann-swartz-accountability-abuse
After Aaron Swartz's Death, the Focus Now Falls On the Prosecutors
http://yro.slashdot.org/story/13/01/16/239259/after-aaron-swartzs-death-the-focus-now-falls-on-the-prosecutors
Prosecutor in Aaron Swartz 'hacking' case comes under fire
http://news.cnet.com/8301-13578_3-57564212-38/prosecutor-in-aaron-swartz-hacking-case-comes-under-fire/
Aaron Swartz Lawyer: I Warned Prosecutors Of Suicide Risk
http://www.techweekeurope.co.uk/news/aaron-swartz-lawyer-suicide-104262
"...prosecutors only responded by saying Swartz would have been safe in jail..."

Added 1/21/13:
Harvard Business Review blog: Aaron Swartz's "Crime" and the Business of Breaking the Law
http://www.bloomberg.com/news/2011-11-21/former-synthes-executive-huggins-sentenced-in-bone-cement-marketing-case.html

This article makes reference to dis-proportionality of punishment in two cases:
Ex-Synthes Officials Get Prison Terms in Bone Drug Case
http://www.bloomberg.com/news/2011-11-21/former-synthes-executive-huggins-sentenced-in-bone-cement-marketing-case.html
A number of patients were killed when the company decided to evade medical device testing ethics.

Outrageous HSBC Settlement Proves the Drug War is a Joke
http://www.rollingstone.com/politics/blogs/taibblog/outrageous-hsbc-settlement-proves-the-drug-war-is-a-joke-20121213
British mega-bank HSBC (former owner of The Money Store, Household Finance, GM Card) managed to avoid all criminal prosecution for multiple, extensive money-laundering schemes. If you would rather have a more sober description of the matter, try Wikipedia's entry on HSBC.

Added 1/21/13:
O'Reilly Giving Away Open Government As Aaron Swartz Tribute
http://news.slashdot.org/story/13/01/21/1644254/oreilly-giving-away-open-government-as-aaron-swartz-tribute
We’re releasing the files for O’Reilly’s Open Government book
http://radar.oreilly.com/2013/01/open-government-files-released.html

Edward Tufte's Defense of Aaron Swartz and the "Marvelously Different"
http://news.slashdot.org/story/13/01/20/1823256/edward-tuftes-defense-of-aaron-swartz-and-the-marvelously-different