This article is within the scope of WikiProject Biography, a collaborative effort to create, develop and organize Wikipedia's articles about people. All interested editors are invited to join the project and contribute to the discussion. For instructions on how to use this banner, please refer to the documentation.BiographyWikipedia:WikiProject BiographyTemplate:WikiProject Biographybiography
This article is within the scope of WikiProject California, a collaborative effort to improve the coverage of the U.S. state of California on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.CaliforniaWikipedia:WikiProject CaliforniaTemplate:WikiProject CaliforniaCalifornia
This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
This article is within the scope of WikiProject Crime and Criminal Biography, a collaborative effort to improve the coverage of Crime and Criminal Biography articles on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Crime and Criminal BiographyWikipedia:WikiProject Crime and Criminal BiographyTemplate:WikiProject Crime and Criminal BiographyCrime-related
Have added the California Counties “Best Policies” for the Countywide Information Security Program, as this suggests that he was only complying with policy.
Especially: Page 34 "Here is a list of things to avoid:• Telling your boss your password" Page 40 "Assigned administrators will only be granted access to necessary resources and no others as approved by the CA. Appropriate physical security measures must be implemented on all resources within the Security Perimeter as deemed necessary by the CA." It is possible that he [Childs] was following policy and his boss (a DTIS manager) was engaging the wrong person in ‘office politics and empire building’ which might then account for the ‘official’ press releases that don’t make sense.
This document will help make sense of things, once trail evidence becomes available. At the moment most info seems ‘hearsay’ and thus not encyclopaedic.--Aspro (talk) 16:09, 16 December 2009 (UTC)[reply]
The above info sounds useful and important and I hope it makes its way into the main article. A thorough, balanced discussion of the issues is needed. 68.110.104.80 (talk) 03:01, 28 April 2010 (UTC)[reply]
Please avoid false balance and spreading misinformation from defense counsel that was thoroughly disproved during the trial. Please note these posts by a juror on the case, who was also an experienced network engineer. In his own words: "we had to look through a lot of testimony, in addition to pieces of evidence which showed who he had previously determined to be "authorized users". In the end it was our determination that he knew the person requesting access was authorized to have it. Like I said, this was really the hardest question for us to answer, but after examining job descriptions, job vacancy bulletins, performance appraisals, numerous emails, etc., we were able to reach the conclusion we did. Terry Childs already had this knowledge (as evidenced in the emails). We had to spend the time to sift through all the information to make sure we were beyond a reasonable doubt about this conclusion." (emphasis added). Option (talk) 16:34, 28 April 2010 (UTC)[reply]