Print 56 comment(s) - last by marraco.. on Mar 31 at 8:43 AM

Austin Carroll was expelled for posting profanity on Twitter  (Source:
The student said he posted it during non-school hours, but the school's computer tracking system says otherwise

An Indiana high school student was expelled for posting an inappropriate tweet on Twitter, possibly during non-school hours.

Austin Carroll, a former senior at Garrett High School in Garrett, Indiana, recently posted a tweet that used the F-word five times. But it's no big deal, since Twitter is a non-school-related account and the tweet was posted after school hours, right? Wrong.

Garrett High School's computer system is capable of tracking its students' social media sites on the Internet. According to Yahoo News, the tweet was posted at 2:30 a.m. -- clearly outside of school hours -- but even though Carroll tweeted from home, Garrett High School's computer system could have recognized the tweet when he logged in again at school.

The tweet in question is the following, where all BEEPs are actually F-words: "BEEP is one of those BEEP words you can BEEP put anywhere in a BEEP sentence and it still BEEP make sense."

Carroll claims the tweet was posted from home, but the school claims it was posted from Garrett High School. Carroll lost this battle and was expelled with three months left of his senior year.

"If my account is on my own personal account, I don't think the school or anybody should be looking at it," said Carroll. "Because it's my own personal stuff and it's none of their business. I didn't post the thing at school but their computer is saying that I did post it, and I shouldn't be getting in trouble for stuff I did on my own time, on my own computer."

Carroll will now finish his senior year at an alternative school, where he will still receive his diploma. However, other students at Garrett High School are not ready to back down quite yet. Some students tried to protest Carroll's expulsion, but local police made sure to stop them quickly.

"I totally didn't agree with what Austin said but I didn't agree with an expulsion either," said Carroll's mother. "I mean if they suspended him for 3 days or something, I would be fine with that but to kick him out of school, his senior year, 3 months to go, wrong."

It seems schools and the government are both getting a bit invasive when it comes to social media sites, since a recent DailyTech report described how government agencies and colleges are asking applicants/students to log onto Facebook pages and other social networks during interviews.

Sources: Yahoo News, Indiana News Center

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

RE: I don't get it....
By Quadrillity on 3/28/2012 4:48:55 PM , Rating: 2
I'm not sure how you plan on running a proxy from server. Because those systems will not let you get to or via direct IP.

You could easily SSH on port 22 to an outside machine and redirect SOCKS5 traffic. As I stated earlier, it's virtually impossible to block internet traffic if you have even a single port open. An IDS/IPS system would even have trouble on my connections since I use 2048 bit encryption across the tunnel. I say "virtually" because there are many ways to prevent this type of port usage.

RE: I don't get it....
By wempa on 3/28/2012 5:13:01 PM , Rating: 1
Who leaves port 22 open to the interent from an internal network ? That's the golden ticket to freedom via an SSH tunnel. You force ALL internal computers to go through one proxy/gateway and only allow connections out from the proxy on the standard HTTP and HTTPS ports.

RE: I don't get it....
By Quadrillity on 3/28/2012 6:36:57 PM , Rating: 3
You can tunnel encrypted traffic of any type on any port. I don't know of many production networks (other than ones that are highly specialized) that explicitly block port 22. It's a standard port, after-all.

You force ALL internal computers to go through one proxy/gateway and only allow connections out from the proxy on the standard HTTP and HTTPS ports.

That works well on a very special network, but it's pretty much a dream world for most administrators. It's not really scalable and cost effective.

RE: I don't get it....
By ritualm on 3/28/2012 6:07:22 PM , Rating: 3
Start using 16MBit encryption for your connections, boy. That 2Kbit encryption scheme you have is just going to be cracked by my custom Tesla cluster.

RE: I don't get it....
By Quadrillity on 3/28/2012 6:30:07 PM , Rating: 2
lol, true. I don't actually use it for top security transmission, I just keep it from curious eyes. Plus, it's running to a 768k connection anyway.

"I'd be pissed too, but you didn't have to go all Minority Report on his ass!" -- Jon Stewart on police raiding Gizmodo editor Jason Chen's home

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki