![]()  | 
  |||||
Case MaterialCase NavigationMachado Case 
 
 Case Materials | 
     
        
        
       S: Hello? C: Hi Dr. Schiano, this is Christina Harmon from St. Olaf college S: Ahh, youre on speaker phone (laughter) hello there C: Is that still okay with you, if youre on speaker phone and being 
        recorded
? S: No problem whatsoever. Hold on one second while I close the door
.yes, 
        hello, I can hear you
 C: Alright you can hear me okay? S: Yeah. C: Great. I just wanted to talk with you a little bit today about the 
        project that Im doing and a few things that I wanted to fill in 
        that I couldnt without some input about your OAC, or I guess its 
        called NACS now, is that right? S: Yeah we just changed it
ah
4 days ago. C: Okay, did I make sense when I explained what our project was about, 
        or would you like to hear more
? S: Little bityoure doing a research project on, what is it, 
        computer ethics? C: Yeah, its going to bewell it already is a website, but 
        there is going to be a lot more
 S: Okay, well I havent seen the website, but Ill take a look 
        at it. C: Oh, thats okay, it doesnt matterthe website it going 
        to be used in computer science classes by professors to teach their students 
        about ethical and social issues in computing. The way that theyre 
        going to learn is through all these different cases that were presenting, 
        and the one that Im working on mostly is Richard Machado.  S: Okay. C: So, Sara Kiesler over at Carnegie Melon was nice enough to give us 
        4 huge binders of all the different informationexact testimony, 
        and things about the case, and so theres a lot that I know alreadybut
 S: Have you talked to anyone here at UCI? C: I havent. S: Okay, because I talked to my boss Dana Roode who was more closelyactually, 
        we both werebut he was the one who did official things about it. 
        The other persons name is John Ward. Hes the system administrator 
        who testified as to the steps we took to identify him. C: Okay
see that parts missing from our
 S: Yeah well, and since I dont know what you have, I was involved 
        in the background
and
I remember parts of it, but its 
        been a long time
so, I may have forgotten all sorts of parts (laughter) C: Thats okay
There are certain parts of the case that Im 
        interested in, but there are actually things that Im especially 
        interested in just about your computer center there
so, I did e-mail 
        Dana Roode and Liz Doan who was a student at the time, and you, and I 
        heard back from you
so
 S: Okay, whos the other person you e-mailed?  C: Umm, Liz Doan S: Liz Doan, rightshe was one of the recipients of the e-mail
works 
        for us
 C: Yeah
Well, one of the things I was interested in was just understanding 
        your network on campus a little better, your e-mail system, because I 
        was reading through the description on the web, and it sounds like you 
        guys have a lot of options for students. S: Okay, you wanna know at the time that this occurred, right? C: Yes, and nowI want to know both, because I want to know whats 
        changed. S: Okay. Umm
about 1990 or maybe even earlier, I dont know, 
        Ive been here since 1990somewhere along in there, weve 
        always had e-mail accounts for students available
at the time when 
        we first started this, the students would sign themselves up, they would 
        fill out a menu on a terminal that would basically ask them questions 
        and they would be assigned an initial password and theyd have an 
        account on the computer. C: Okay. So was it like UNIX, or Eudora
 S: Ah, in the background its always been a UNIX computerin 
        the front what they were seeing, initially, was a program named PINE. C: PINE, okay we have that here too. S: Okay, so theyre seeing a little program that has little menus. 
        We basically wanted to go with something that was not too complicated 
        for themnot too many options and whatnot. C: Right, so thats what Machado was using? S: No, havent got there yet
ahh, thats what we started 
        out with. Over time the demand kept going up and there started being instructional 
        uses for such, we moved to a model where all students were assigned information 
        based on what the registrar would give us, thats what were 
        currently doing at this point. And same thing with faculty and staff through 
        different data bases. C: Yeah, thats what I got out of it
 S: Right, so we would assign an ID to all of them, and underneath is 
        a thing called "curburos" [phon], which a lot of places use, 
        which basically assigns them a password in a central location and based 
        on that we would then create the UNIX computers essentially that would 
        manipulate their e-mail. And then what people would use to access that 
        e-mail over the years has migrated as more and more people use PCs. So 
        using ah, Eudora, Netscape, Outlook, lots of different ways to get e-mail. 
        But then down below is a series of UNIX computers that are using local 
        passwords, ah excuse me, passwords and logins that are maintained elsewhere. 
        Okay, so thats part of the e-mail. The other part is where do they 
        go to actually see this e-mail, and there are computer labs all over the 
        campus, and there are computers in peoples offices
generally 
        the students go to the labs or they log on from home. So in his case, 
        his use of e-mail was in our labs, and maybe elsewhere, I dont know
I 
        dont remember
that he would be using PCs that we owned and 
        using Netscape. C: Thats what I thought
okay
Because they had mentioned 
        in the documents that he had used the "finger" command to determine 
        who he would send this e-mail to
and Ive played around a little 
        bit with that
 S: Yeah
what he had done, what wed determinedbut like 
        I said I wasnt involved in the court proceedings at any time, except 
        that my employee John Ward was there, testifying and providing information 
        to the FBI, and DA and whateverwhat we determined was that he had 
        been a user of these systems for a long time like all students, and he 
        possibly could have used IRC, Internet Relay Chat, which is a chat-room 
        program, thats available to them, although we dont really 
        like itpeople to use itto identify some people. He had used 
        finger to figure out who was logged on. So he knew a little bit about 
        the access he could get through a UNIX shellwhich is what the students 
        have access to, and of which they can use PINE, or IRC or type finger, 
        things of that sortso he was getting info about who was logged on 
        about the people that he was talking to in e-mail, or in the chat room. 
        So he had done that and he was using the labs at the same time to be sitting 
        in front of and to be running these programs. He apparently had determined 
        how to use Netscapein fact some of the early messages that he sent 
        were teststo show that he could forge an identity.  C: Yeah, that was my next questionhe changed his address field, 
        right? S: Right, he changed his address field in Netscape, which you can do, 
        and use Netscape to talk via POP, to our mail servers, changed his name 
        and called himself something else. He also included himself on the "To:" 
        list, and there were lots of funny things
He had included a person 
        on there at our medical center that he had found whose name was I think 
        "Korea" or something, who turned out not to be Korean at all. 
        So he was basically pointing out Asians of various kinds, and he had found 
        them, and he had tried a couple tests, and then he sent out the message, 
        and then he sent out a follow up one to the same group saying "I 
        just got this, isnt this bad??" C: (laughter) Yeah, "he thinks Im Asian," or something 
        like that
 S: Right, so he tried to distance himself, so thats what he initially 
        did. While we were, what had happened at that point was that hed 
        sent this message out to 50 or 60 people, some of them were our employees. 
        Liz Doan is one, shes the one who actually testified, there were 
        a couple others as well who didnt really want to get too involved, 
        so there was a lot of apprehension of actually getting involved in it. 
        But some of our employees got the e-mails, and one of them worked in fact 
        for one of the system administrators we have, and he was quite good about 
        this, and he started figuring out where it came from
The computers, 
        the way e-mail works, the computer that you sit in front of, and the Netscape 
        session that this occurred from pointed to a particular PC in the lab. 
        So he didnt know it was R. Machado, but he knew it came from that 
        machine. Then he was very resourceful and figured out who at the same 
        time had logged into the computer running finger and whatnot, because 
        he [Machado] didnt have to do that, he couldve just gone to 
        Netscape, unaffiliated himself, unlogged in to any other accounts on the 
        computers, and just run Netscape and we wouldnt have known much 
        more about it. But the fact that he was also logged on to the UNIX box 
        at the same time, we put two and two together figured out it was that 
        computer, and that IDwe call it the UCI net IDof that person, 
        sitting in that spot, with that name! (laugher) So at the point he [the 
        employee] came upstairs and said "theres someone down in here 
        thats sending hate-mail, sending mail of some sort"  
        so Ill take a break here and describe something else
we have 
        a policy like most universities whove run into any problems like 
        this or anything much more minor than this, ah, a computer use policy. 
       C: Yeah, I was going to ask about that too. S: And we have developed one from other universities that have 
        developed, and what weve been hearing about lawsuits, what laws 
        should be, etc, so we developed a policy about usage. It specifically 
        says a variety of thingsit may have been in fact in the documents 
        you have, and its online, it hasnt changed
 C: Yeah, I think I do have that
 S: And it basically says "Thou shalt not do certain things" 
        or youll run into all sorts of problems. And we worked that out 
        with our campus Dean of Students, as tothats our way of doing 
        the Dean of Students work for these thingsbasically our equipment 
        that we have
its up to us to decide what inappropriate use 
        is, of the systems themselves, like someone running a program we dont 
        want them to, that we told them not to, but we also have the responsibility 
        to work with the Dean of Students and the campus judicial sects when there 
        are things that occur that go beyond that, like ah, public indecency--Weve 
        just been dealing with a case of public indecency in the laboratory, so 
        that goes beyond campus to criminal law, so we have to, we help them with 
        that job and theyve assigned us the ability to do that job of, when 
        someone does something wrong its equivalent to someone cheating 
        on an exam or
ah
handing in somebody elses homework, we 
        basically could say "these are the penalties." So having said 
        that, when the student came up and in fact talked to me first saying "someones 
        sending me hate-mail, and I know who it is" we identified the system 
        administrator and Id gone down with him to point out where the person 
        was. And at first I thought it was essentially just someone sending an, 
        ah, annoying e-mail of some kind"I dont like you," 
        you know or ah some poor language which is something part of our policy 
        that is not allowed. Profane language, hows that? I thought it was 
        just profane language. And so, ah, at that point, I went with him and 
        saw where the person was, and at that point, also other people had started 
        coming upstairs and saying "Im receiving this as well," 
        and my boss at that point, Dana Roode and I went downstairs and Dana talked 
        to Richard Machado and asked for his ID, and theres a video tape 
        of this because we have surveillance tapes
ah, asked him who he was, 
        etc, and said, you know, "youve been using this equipment wrongly, 
        breaking our computer use policy,"  at that point neither one 
        of us actually had read the e-mail. What we had heard was, you know, "using 
        derogatory terms, sending bad-mail" or whatever. We didnt actually 
        sit down and read it. That was, in hindsight, one of our mistakes. We 
        should have looked at it more carefully, but we basically told him to 
        leave the building and he left. After that, the e-mail started getting 
        around and over the weekend my boss read the e-mail in detail, Dana did, 
        and on Monday morning we called the campus police. C: Okaythats something we were confused about, because we 
        knew that he been asked to leave on Friday and then nothing else
 S: Right, no one had really read the e-mail. It went by wild-fire over 
        the weekendpeople had received it and said "this is more serious"in 
        fact someone had talked to me, one of my staff, whos background 
        is Japanese-Hawaiian was very offended that this had occurred, and then 
        we called the campus police. They then called the DA and it went from 
        there. C: Okay, so it was kind of just more that nobody understood how serious 
        it was when it happened? S: Yes, yes. The people who received it, ah, some of them didnt 
        pay much attention to it, some of them got very concerned. The person 
        who had come to us firstit was one of our employees, and it wasnt 
        Lizessentially just thought this was just within in reason or whatever. 
        When the people who normallyah, John Ward who was applying the policy 
        and monitoring the usage at that timeby the time on Monday we all 
        got together and realized it was much more serious. So the delay was over 
        the weekend and the fact that we didnt read the message. We get 
        a lot of people saying "Yeah someone sent me mail with curse words 
        in it," and thats what it was assumed to have been. But when 
        we actually read the threatsyou know, "Im gonna kill 
        you," and the fact that he had sent it to 40 specific people, the 
        details are important too, it wasnt just sent to a newsgroups anonymously 
        and whatever
 C: Yeah, hed taken great care
 S: In hindsight, I never met him, but this was very foolish and stupid. 
        He didnt know what he was getting himself into at all. Then if you 
        read the rest of the things that were going on in the community, I have 
        to describe UCI a little bitUCI is about 30-40% Asian-American or 
        actually Asian nationals coming here for instruction. So theres 
        a large Asian contingent at the University. Orange County itself has a 
        large Vietnamese ethnicityseveral hundred thousand peopleand 
        a comparable size of other Asian cultures in the county. So it hit in 
        an area where there was a lot of sensitivity to anything like this. So 
        that caused campus and communities groups to get up in armsthe fact 
        that it went to 60 people, and the local FBI got a hold of it very quickly, 
        and it seems to us in hindsight that they were looking for, they had seen 
        lots of hate-mail incidents in the LA area, and they were very attune 
        to such things. This one was just unusual being an e-mail. So it basically 
        mushroomed in a hurry! (laughter) C: Yeah
Would you mind if I asked you a couple questions just about 
        your procedure in general? S: Sure. C: So it sounds like theres not really...ah
you dont 
        go to the Dean then? S: Well, lets saylets get a better example. Ah, we 
        find outwe get a complaint that someone has received an e-mail from 
        an account or an account seems to be in a weird state. So, we will then 
        ask the person responsible to come here, or in e-mail, "did you send 
        this e-mail?"  usually we ask them for an interview, and how 
        we get them in an interview, we lock their account to get their attention, 
        because they basically work with e-mail only. University students dont 
        usually give us access to their home phone numbers, we dont use 
        that information, so we use their e-mail account, locking it to get their 
        attention, we have essentially what amounts to a hearing, to figure out 
        what has occurred, and its to find out if something serious has 
        occurred, like an account has been broken into
 C: Now is this a hearing within the computing
 S: Within, yes, with the system administrator and maybe a few staff at 
        most here, acting as lieutenants to the Dean of Students. Our job is essentially 
        to find out what did they do to the equipment that were responsible 
        for? We often get people who will, say, share a password, and thats 
        a definite no-no. But they do it, you know
so we try to determine 
        if it was something where they violated policy, or is it something more 
        serious, like did someone break in, or did they break in? Based on that, 
        we make a judgement, "Well, you shared your password, you should 
        have known better, you didnt read the rules"  We force 
        them to read the rules when they log onthey cant get an account 
        unless they physically read it and answer a few questions. If its 
        a sort of moderate level case like I said, with the password being shared, 
        we say "well, no account access for two weeks" or something. 
        If its more serious than that, then we advise the Dean of Students, 
        and theyre usually, theyre pretty draconian of making people 
        doing community servicetheyre used to people stealing things. 
        So theyre going one step before calling the police. Or theyll 
        call the police, and sometimes well do it directly ourselves. But 
        most of the time, its essentially an internal hearing, making sure 
        theyve read the policy, they understand, at the same time try to 
        figure out exactly what the incidents were.  C: I think that sounds like a really beneficial procedure
 S: Well, there are still lots of pieces that people have difficulty withuniversities 
        have this problemgetting all the info out to all the students, that 
        this is the responsibility, its not for free that they have a right 
        to it, that they have responsibilities not to do a lot of things; people 
        believe that anythings okay on the web or an e-mail, and its 
        not. C: Right, thats part of what were trying to target. S: Yes. Not everything is okay, and a lot of things cross the boundary 
        to criminal activities, and the FBI are very interested in such these 
        days, and I think in the case of Machado, he had no clue. He added to 
        his miserythey probably would have let him get off with some probation 
        or whatnot, but he skipped bail, went to Mexico, they found him again 
        as a fugitive, that added to his woes, but because now he was in jail, 
        when they finally found him guilty, it was essentially "well, you 
        serve time"and we havent heard from him since! I dont 
        know what happened to him
Umm, its the worst case weve 
        had in terms of dealing with, following this through, but weve had 
        hacking incidents where weve traced it and had the police come in, 
        students have been expellednot manybut, people have been suspended, 
        but
its equivalent on a college campus
the same thing 
        as people cheating on tests, the worst cases you have
its very 
        similar. C: So policies and penalties are pretty case-specific then, right? S: Well, we have a list, its not public, but its something 
        we share with the Dean of Students and the people coming along, essentially 
        a penal code as to what we do-- C: Oh, okay. S: --and some of the things are just administrativeif we dont 
        want you to write a file in a particular area because it causes trouble, 
        we tell you dont do it, and if you do it once, its a warning
If 
        you do it many times youre not paying attention and we lock your 
        account, take away privileges. So getting access is a privilege, not a 
        right. The basic description that the Dean of Students will saythese 
        are UCI rulesthat, ah, once their students are admitted to the college, 
        then they have rights like any other students to the various things on 
        campus, unless they get themselves in a situation where theyre basically 
        denied those privileges. If they break a rule that we set, its our 
        responsibility to say "No, you dont need this"  
        where it comes up very difficultly in an academic setting is more and 
        more instructors are using the web and e-mail and whatnot to communicate 
        with their students, and in those cases what it ends up being is students 
        have been told they no longer have an account, and you need to tell your 
        instructor ahead of time, and theyll need to do something else. C: So then, what is the liability for the NACS? S: Well, you mean if theyre being sued by the people or something? C: Yeah. S: Well, again were representing the University and the policies 
        we set, we have to be specific about writing the policies we use, and 
        we have to follow a due process where we allow the student to say whats 
        going on
We have to communicate that to the Dean, so the Dean knows 
        thats what we decided upon, and that about covers it. The various 
        things that we give out are not any kind of rights, as I said, the services 
        we providein terms of something like the Machado case, we generally 
        will just turn it all over to the campus police, and the Dean, who basically 
        take it from there, so were representatives mostly to the Dean but 
        not to the police dept., but it just goes off. So our liability is not 
        necessarily to us identifying them, but the steps we have to take are 
        that were not discriminating against them, that were applying 
        the same rules to everyone, and that were stating what those rules 
        are, and thats what they sign-off at the beginning, saying "yes 
        I have read this policy." Ah theres one other thingI 
        talk too much, I need to let you ask some more questionsthe other 
        one that were trying to do is, weve sort of stream-lined this 
        a bit, to make the people who actually investigate a lit more formal, 
        with a penal code and a set of rules. In the past in was little bit more 
        informalthe system administrator would write these things down, 
        but theyd be like the only agent. Theyd come to their manager 
        if there was someone who wanted to talk to the management or something 
        like that. The other thing that were doing thats maybe kind 
        of interesting and unique is, we realize a lot of these issues are minor. 
        There are things like "even though I gave my friend my login," 
        were worried more about its consequences more than the actual 
        act. So weve set up what Ive called a "Computer Traffic 
        School," which is essentiallyall the things that are minor 
        we make the students go back and go through and read questions related 
        to the computer use policy and answer them appropriately, or if they dont, 
        keep answering them until they get it rightso it forces them to 
        sit down for maybe a half hour in our areas, going through this again. 
       C: I think thats a really good, good idea. S: Well, I think youve got to do that because most of them are 
        in fact minor so youre worried more about big things happening, 
        but you want to make sure you educate people and you cant just do 
        things like "Oh, go read this, its over there"they 
        dont. Youve got to get them to sign something offthats 
        where you get the liability issue as wellyou said you read it. C: You kind of touched on something I was going to ask, you said its 
        kind of new, and I was just wondering how much or what in your policy 
        has changed since the Machado case, like penalties and that sort of thing. S: No, nothing since this is so far outside the range of ittheres 
        nothing that says "Thou shalt not send hate mail," anymore than 
        it says "Thou shalt not be indecent in the lab"right now 
        were dealing with a situation where someone in the lab was indecent, 
        probably even worse than that, but Ill leave that to your imaginationand 
        he went off to court and he was tried in court today and found guilty 
        of doing various things in our labs that other students were seeing. Now 
        thats not something were going to write in our policy, you 
        cant violate the laws of the state of CA in the US penal codes, 
        so were not writing down the worst case scenarios, and in the Machado 
        case, there was really nothing to write down. The only thing it taught 
        us is that these things can be more serious than at first, and doing things 
        like reading the message or assuming that the message is of one kind when 
        it could have been something else. And then part of the whole legal case 
        was, is this just a normal flame or is this in fact hate-mail, or a criminal 
        activity? And in fact the actual regulation is quite fascinating, that 
        was used by the federal government on him was a law from 1968, or was 
        it 63? C: Oh, I didnt know that part. S: Yeah, well the actual part that was used was that in the federal statuesand 
        this comes back from the civil rights erathat no one will have the 
        right to abridge the access of any citizen to public institutions of learning 
        based on sex, race, creed, etc. And what they were saying essentially 
        was that by scaring these students that there was somebody here willing 
        to kill them was abridging their right to come to the University. So that 
        this was a constitutional rights case. And thats in fact what they 
        tried him on. And that goes back to the 1960s with the various black 
        students being not allowed to go to Universities in Alabama, Louisiana, 
        being barred by the governor. So it was in fact a very serious law, nothing 
        minor, people were killed over this. So thats what they had said 
        that he was trying to provide fear and it wasnt just a flame because 
        hed picked out particular people, he had looked to see if they were 
        Asians, it wasnt just a message in a newsgroup that was known for 
        people flaming each other left and right and saying, you know , "I 
        dont like the Japanese," or "I dont like the Romanians" 
        and being very bland. This was "You particular, Im gonna come 
        and kill you," and that crossed that border, and thats something 
        that, you know, computer folks dont spend much time on. C: Right, and thats another thingI noticed that when they 
        convicted him that it wasnt at all, like you said, about anything 
        having to do with e-mail, but something broader, and they applied that 
        law to an e-mail case. Ive done a lot of looking into laws about 
        e-mail, but like youre saying, there doesnt seem to be a lot 
        of concrete stuff about harassment or threats like this, do you know S: Yeah, that is in fact why the federal government and the FBI and the 
        US DA were heavily involved in this and I think it went all the way to 
        Janet Reno at some pointit was because they wanted to set law. They 
        still continue to want to, in the justice dept., wants to set definitions. C: But they havent, right? S: Ah, well I wouldnt know
Im not a legal expert, but 
        nothing has come to us. We have a campus e-mail policy now, a UC-wide 
        policy, but it generally deals with things like, who has access to your 
        e-mail if youre an employee or a staff member. Those are more issues 
        of access because theyre worried about liability again. The actual 
        issue of freedom of speech, as far as I can tell, hasnt really been 
        defined much more. So what they were applying were existing rules to show 
        that e-mail is no different. And essentially thats what the sort 
        of policy we follow in generaljust because its an e-mail conversation 
        of some sort, thats no different than if it was a personal conversation. 
        You know, thats like if someone sends you regular mail and you open 
        it up and its addressed to you and it says "I hate you, Im 
        gonna kill you," the post office wants to know. (laughter) So theyll 
        go and do things about it, and theres a long tradition of regular 
        mail and regular communication, so they wanted to set policy here thats 
        saying e-mail is no different. And as far as I can tell no one has made 
        a counter-judgement, but I dont think its gone like to the 
        Supreme Court or anything but I dont see why it would be judged 
        any differently actually. Theres nothing really different about 
        ittheres this belief that the Internet is wide-open, but you 
        still dont go around and flander people or ah threaten them, that 
        hasnt changed. Its just that theres easier opportunity 
        of telling a whole bunch of people through something like your website 
        what you think. So the Machado case hasnt really affected us, except 
        internally of being more careful. C: Yeah, sureumm, one of the last things I was wondering about 
        was that, we, just to understand it ourselves a little bit better we were 
        trying to figure out a little more about his background and we havent 
        found much and I was wondering if you knew of anything
 S: Umm, all we knew was what we knew from the registrar and the policehed 
        been a student here a couple years already, the Orange County Register 
        put a lot of effort into this and we spent a lot of time talking to their 
        reporters and theyd spent a lot of time trying to figure out his 
        background, why hed do this, etc, so Id aim you maybe in their
they 
        have a website as well, I think it should be either ocr or ocregister 
        but they have archives and whatnot. Their reporters there, I cant 
        remember their names, but they were around quite a bit. But the ah
what 
        we knew from the papers essentially was that hed been a student 
        here, his grades had been failing a bit, he was depressed about a brother 
        of his who was killed in some event, and those were the things he said 
        in court that affected why hed want to do this. As I said, the University 
        has a large Asian contingent of students, theres probably feelings 
        of bigotry on both ends and obviously that came up and thats why 
        they thought this was a racially motivated hate crime, he picked on this 
        group. This University is a little unusual it got a reputation in the 
        early 60sits only been here since 1965St. Olafs 
        has been there a lot longer, I know that!but ah, its not been 
        here a long time, it got a reputation for being, ah, it was a new school, 
        so it was less traditional than Berkeley or UCLA and it also started out 
        more of an engineering school and but it isnt really that way now, 
        so people migrated through this area who were interested in computers 
        and engineering and whatnot and, I dont know if you want to attach 
        any racial bias to that
and because the community too has a large 
        Asian contingency, its not really that unusual for the county or 
        California. So, I dont know why he came to this University, what 
        his major was
Dont know what happened to him. It really was 
        sad because he didnt know what he was getting himself into, this 
        was not a situation where this was developed for years, he wanted to use 
        this as a sounding board for his views, he had apologized profusely in 
        various public events that were staged by the campus to basically try 
        to diffuse the situation, but then the federal government wanted to use 
        this as an example and so the DA just followed along saying "yes, 
        this was a crime." C: Well, and I think thats a good point to make, because we are 
        trying to, especially for students, help them understand that exactlythat 
        things like this happen and you dont realize what youre getting 
        yourself into when youre doing with it
 S: Yeah the way we describe the authorization part, the password and 
        login, to students is "This is like your PIN on a credit card"would 
        you give this out to anybody? Your best friend could get on your account 
        in a few minutes, send mail to the president of the US, saying you personally 
        were gonna come and kill him, and the security would be here in minutes! 
        (laughter) So you dont want to identify yourselfto give them 
        things like, it came from your account, with your name, your password, 
        you dont want to give them that. Because people do things like that, 
        and this is no differentits not as open as they believe, theres 
        just as much responsibility as anything else. So thats the most 
        important thing I think I would tell anyone about this case or this in 
        general is that, you have responsibilities to ah the same way you would 
        do a variety of things for the same reasons for other mediums. It surely 
        allows you to communicate quicker with large numbers of people in a variety 
        of ways, but then theres even more responsibility. Its like 
        SPAMyou can easily send mail to hundreds of thousands of people 
        and you may thing "oh thats no big deal," but then all 
        the computers along the way have to process that, and that slows everybody 
        down and they dont get something important and its all because 
        you played a joke and right now people arecommercial companies are 
        suing people left and right that send huge amounts of SPAM and their winning 
        cases. So there could be serious financial consequences for something 
        as simple as that. A lot of responsibilities. C: Yeah. Okay
 S: So good luck to ya! C: Yeah, thanks! Is there anything I didnt ask that youd 
        like to touch onI think that pretty much covers what I had
 S: Umm, no Id say look at our computer use policy, there are other 
        universities that have them
If you wanted to look some more into 
        this particular case, Id contact the Orange County Register Newspapereither 
        ocr or ocregister.comor use some search engine.  C: Oh great. S: Theyd go into a lot more detail, and in fact maybe even a reporter 
        could talk to you about it. Ah, Dana Roode my boss is out of town for 
        about a week. What he would add to it maybe is his personal interaction 
        because he had to testify and give information. He had dealt with the 
        mediathey descended on us like nuts from all over the country. And 
        John Ward would be able to tell you more about the specificshes 
        not back till Monday. You can find all our phone numbers and e-mail 
        on our webpage, so
 C: Okay, well, thank you so much  youve been incredibly helpful. S: Sure well good luck to youwhen you write something up tell me 
        about it, love to see what you said. C: Yes, I will transcribe this too and send it to you on e-mail. S: Oh okay! Good luck! C: Thank you  S: Bye-bye. C: Bu-bye.  | 
  ||||
|  
       | 
  |||||