Just the other day I emailed aaronsw asking about OCLC and his plans to topple it. His response wasn't very optimistic. I should have asked him a more humane question, like "sup" or "how's it hanging".<p>For whatever reason, I keep bumping into his work, whether it's through the python world or through BOSSlab, geurrilla open access, or The Sprouts. He has had a very strong impact on some very important problems in the world. I suspect that he might have seen some (perhaps twisted) value in being a martyr, especially in the face of extreme stress.. So far I prefer the living version of aaronsw.<p>I think a lot of us can see parts of each other in Aaron, both in his values and work. Another someone pointed out, just how many spiders have you written? Everyone does it, but hardly nobody talks about it. Is it really so terrible that we want to read science? or share code? And then this happens.<p>All of the criminal documents from his last court case are published on the Internet Archive. This one in particular is rather thrilling to read:<p><a href="http://ia601205.us.archive.org/25/items/UsaV.AaronSwartz-CriminalDocument53/UsaV.AaronSwartz-CriminalDocument53.pdf" rel="nofollow">http://ia601205.us.archive.org/25/items/UsaV.AaronSwartz-Cri...</a><p>"An analysis of one of the fingerprints on the Acer laptop purchased and used by the defendant cannot exclude his friend, Alec Resnick."<p>"Promises, rewards, or inducements have been given to witness Erin Quinn Norton. Copies of the letter agreement with her and order of immunity with respect to her grand jury testimony are disclosed on Disk 3."<p>"a. The computer was registered under the fictitious guest name “Gary Host.” b. The computer’s client name was specified as “ghost laptop.” A computer’s client name helps to identify it on a network and can be chosen by its user. In this case, the name was simply created by abridging the pseudonym “Gary Host,” combining the first initial “g” with the last name “host.” c. The fictitious “Gary Host’s” e-mail address was identified as “ghost@mailinator.com.” This was a “throwaway” e-mail address. Mailinator is a free, disposable e-mail service that allows a user to create a new e-mail address as needed, without even registering the address with Mailinator. Mailinator provides this service for users to have an anonymous and temporary e-mail address. Mailinator accepts mail for any e-mail address directed to the mailinator.com domain without need for a prior registration, and it allows anyone in the world to read that mail without having to create an account or enter a password. All mail sent to mailinator.com is automatically deleted after several hours whether read or not."<p>"... "The defendant has requested first that the government provide ".. any and all notes and reports provided to USSS or USAO by CERT in relation to the forensic analysis of the ACER laptop, or any analysis of any evidence including but not limited to the PCAP log information"."<p>`.. earlier posted on one of his websites, guerrillaopenaccess.com, a call-to-arms entitled "Guerrilla Open Access Manifesto" which concluded "We need to download scientific journals and upload them to file sharing networks. We need to fight for Guerrilla Open Access."`<p>Context for some of these quotes can be found here: <a href="http://gnusha.org/logs/2012-09-15.log" rel="nofollow">http://gnusha.org/logs/2012-09-15.log</a><p><a href="http://news.ycombinator.com/user?id=aaronsw" rel="nofollow">http://news.ycombinator.com/user?id=aaronsw</a>