From Buff Mockingbird, 11 Years ago, written in Plain Text.
Embed
  1. The inside story of MIT and Aaron Swartz
  2.  
  3. More than a year after Swartz killed himself rather than face
  4. prosecution, questions about MIT's handling of the hacking case
  5. persist
  6.  
  7.  By Marcella Bombardieri | Globe Staff   March 30, 2014
  8.  
  9. CAMBRIDGE -- The mysterious visitor called himself Gary Host at first,
  10. then Grace Host, which he shortened for his made-up e-mail address to
  11. "ghost," a joke apparently, perhaps signaling mischievousness -- or
  12. menace. The intruder was lurking somewhere on the MIT campus,
  13. downloading academic journal articles by the hundreds of thousands.
  14.  
  15. The interloper was eventually traced to a laptop under a box in a
  16. basement wiring closet. He was Aaron Swartz, a brilliant young
  17. programmer and political activist. The cascade of events that followed
  18. would culminate in tragedy: a Secret Service investigation, a federal
  19. prosecution, and ultimately Swartz's suicide.
  20.  
  21. But in the fall of 2010, Swartz was still a stranger in the shadows,
  22. and the university faced a hard question: How big a threat was the
  23. "ghost" downloader? And a harder one: What should be done about him?
  24.  
  25. Answering those questions would prove a particularly knotty puzzle for
  26. the Massachusetts Institute of Technology, a place long supportive of
  27. the free flow of information and so famously friendly to pranks, known
  28. in MIT lingo as hacks, that a book published by the MIT Museum in the
  29. 1990s offered pranksters such tips as "always have two ways to run."
  30.  
  31. And yet, MIT is a cradle of world-class scientific research with
  32. unpublished data and unpatented inventions on its network, and its
  33. leaders felt vulnerable to the rising tide of high-tech espionage.
  34.  
  35. "There is some speculation that this might have been an MIT student
  36. experimenting with a robot," one MIT employee noted in an e-mail after
  37. a second breach by Swartz was discovered. But another pointed out that
  38. "sinister foreigners'' may have stolen credentials or compromised a
  39. computer.
  40.  
  41. MIT's efforts to track down Swartz, while under intense pressure from
  42. JSTOR, the not-for-profit that ran the journal database, eventually
  43. would lead to felony computer crimes charges that might have brought
  44. years in jail. Swartz, 26, was under indictment when he committed
  45. suicide in January 2013.
  46.  
  47. Critics, both on campus and around the world, have accused MIT of
  48. abandoning its values celebrating inventive risk-taking by helping to
  49. doom a young man whose project -- likely an act of civil disobedience
  50. to make information freely available -- didn't in the end cause serious
  51. harm.
  52.  
  53. MIT has insisted it maintained an appropriate, even compassionate,
  54. neutrality toward a determined hacker who stole 4.8 million articles
  55. and eluded numerous efforts to stop him before the college sought help
  56. from police.
  57.  
  58. But MIT's brand of neutrality proved one with notable limits,
  59. according to a Globe review of more than 7,000 pages of discovery
  60. documents -- many of them e-mails -- from Swartz's court case. In the
  61. wake of his death, both MIT and JSTOR posted online documents that
  62. they had turned over to authorities, a trove that drew little if any
  63. notice at the time. The Globe also obtained a number of e-mails
  64. related to the case not available publicly.
  65.  
  66. Only with a patient review of the complete record does the full
  67. picture of the dilemma MIT faced become clear. The aftershocks of the
  68. choices the institution made in the wake of the "ghost" continue to
  69. reverberate, on campus and off, more than a year after Swartz's death.
  70.  
  71. Most vividly, the e-mails underscore the dissonant instincts the
  72. university grappled with. There was the eagerness of some MIT
  73. employees to help investigators and prosecutors with the case, and
  74. then there was, by contrast, the glacial pace of the institution's
  75. early reaction to the intruder's provocation.
  76.  
  77. MIT, for example, knew for 2 1/2 months which campus building the
  78. downloader had operated out of before anyone searched it for him or
  79. his laptop -- even as the university told JSTOR they had no way to
  80. identify the interloper.
  81.  
  82. And once Swartz was unmasked, the ambivalence continued. MIT never
  83. encouraged Swartz's prosecution, and once told his prosecutor they had
  84. no interest in jail time. However, e-mails illustrate how MIT
  85. energetically assisted authorities in capturing him and gathering
  86. evidence -- even prodding JSTOR to get answers for prosecutors more
  87. quickly -- before a subpoena had been issued.
  88.  
  89. In a handful of e-mails, individual MIT employees involved in the case
  90. aired sentiments that were far from neutral. One, for example, gushed
  91. to prosecutor Stephen P. Heymann about the quality of the indictment
  92. of Swartz.
  93.  
  94. "Nicely done Steve and kudos! All points . . . are as accurate as I've
  95. ever seen," wrote the information technology employee. "(I only say
  96. that because every time I've ever given an interview, details are
  97. always slightly to horribly munged; not that I ever expected any less,
  98. it's just a true relief and very refreshing to see your accuracy and
  99. precision)."
  100.  
  101. Yet if MIT eventually adopted a relatively hard line on Swartz, the
  102. university had also helped to make his misdeeds possible, the Globe
  103. review found. Numerous e-mails make it clear that the unusually easy
  104. access to the campus computer network, which Swartz took advantage of,
  105. had long been a concern to some of the university's information
  106. technology staff.
  107.  
  108. Some at MIT believed that officials had failed to pay serious
  109. attention to what one person called "poor, limited, or outdated
  110. security protections" on resources like the JSTOR database.
  111.  
  112. The documents also put JSTOR's role in the case in a new light. In
  113. contrast to MIT, the journal archive organization has been widely
  114. hailed for publicly distancing itself from Swartz's prosecution,
  115. declaring that once Swartz returned the documents, it "had no interest
  116. in this becoming an ongoing legal matter."
  117.  
  118. But a number of JSTOR's internal e-mails show a much angrier face in
  119. the months that Swartz eluded capture, with employees sharing
  120. frustration about MIT's "rather tepid level of concern." JSTOR
  121. officials repeatedly raised the prospect, among themselves, of going
  122. to the police, e-mails show.
  123.  
  124. "What's wrong with us . . . alerting the cyber-crimes division of law
  125. enforcement and initiating an investigation, having a cop search a
  126. dorm room and try to retrieve any hard drive that contains our
  127. content?" asked one JSTOR official, whose name -- like most -- was
  128. redacted in the released documents.
  129.  
  130. In the end, JSTOR neither called the police nor asked MIT to do so,
  131. according to its president.
  132.  
  133. Eric Grimson, who recently stepped down as chancellor of MIT, defended
  134. the university's handling of the case as a judicious effort to protect
  135. the community without seeking retribution. MIT's first steps, he said,
  136. were simply to deny the downloader access to the network. They didn't
  137. search for the laptop for many weeks because they thought he had been
  138. thwarted.
  139.  
  140. When Swartz proved undeterred, he said, MIT had to do more.
  141.  
  142. "We were confronted with a situation of an unknown user accessing our
  143. network," he said in an interview, "using it to download massive
  144. amounts of material . . . for a three-month period, and evading our
  145. efforts to try and stop it."
  146.  
  147. MIT was harmed in the process, Grimson said, with 10,000 researchers
  148. denied an important resource for several days as JSTOR sought to cut
  149. off the mass downloading.
  150.  
  151. Helping investigators pursue the campus intruder was the only
  152. reasonable course, he said.
  153.  
  154. "I think we should as a matter of principle cooperate with law
  155. enforcement in an investigation of an alleged crime being committed on
  156. our campus," he said. "That's protecting our community."
  157.  
  158. After Swartz's arrest, Grimson said, the university went out of its
  159. way to be fair to the defense, voluntarily making staff members
  160. available to answer questions from Swartz's attorneys.
  161.  
  162. "I would like to suggest we took a path to try to balance being
  163. empathetic to Aaron's situation while acknowledging that there was a
  164. legal process involved," he said.
  165.  
  166. Allure of openness
  167.  
  168. Swartz was an Internet prodigy. By age 19, he had helped to build RSS,
  169. a service that allowed users to create personalized news feeds; to
  170. develop the social news website Reddit; and to establish Creative
  171. Commons, an alternative to traditional copyright more friendly to
  172. sharing.
  173.  
  174. In his 20s, the restless Stanford dropout turned his energies to
  175. political activism. He helped launch several progressive political
  176. groups and was a major force behind a national wave of protest against
  177. the Stop Online Piracy Act, which targeted unauthorized sharing of
  178. videos and music, but which Swartz and others saw as an attack on free
  179. speech.
  180.  
  181. While Swartz's motive for downloading the JSTOR archive remains
  182. unknown, there is one simple and plausible possibility: to make
  183. academic research freely available to the public. In 2008, he
  184. published a "Guerrilla Open Access Manifesto" in which he avowed a
  185. "moral imperative" to share scholarship locked behind exorbitant
  186. subscription walls.
  187.  
  188. "It's time to come into the light and, in the grand tradition of civil
  189. disobedience, declare our opposition to this private theft of public
  190. culture," he wrote.
  191.  
  192. But why use MIT as his gateway -- or, to some eyes, his victim? He had
  193. a fellowship at Harvard at the time, which gave him access to JSTOR,
  194. but apparently worried about getting himself or his colleagues in hot
  195. water, since bulk downloading is forbidden by JSTOR.
  196.  
  197. Since MIT had been known for generations for its idealistic devotion
  198. to the spirit of openness, venturing a couple of miles down
  199. Massachusetts Avenue may have seemed irresistible to Swartz. He had no
  200. formal tie to the university but had friends there and had been
  201. involved in campus activities.
  202.  
  203. A blog entry Swartz wrote in 2009, titled "Honest Theft," neatly
  204. details his view of the school as a haven for rebelliousness. He
  205. described friends who he said secretly lived for free on campus,
  206. sleeping on couches in common rooms and stealing food from the
  207. cafeterias -- and using the money they saved "to promote the public
  208. good."
  209.  
  210. "MIT has a notoriously relaxed security policy," he wrote, so his
  211. friends "likely wouldn't get in too much trouble."
  212.  
  213. Indeed, MIT's own 180-page internal report on the Swartz case,
  214. released in July by a panel led by professor Hal Abelson, described a
  215. "culture of creative disobedience where students are encouraged to
  216. explore secret corners of the campus, commit good-spirited acts of
  217. vandalism . . . and resist restrictions that seem arbitrary or
  218. capricious."
  219.  
  220. Student "hacks" have included putting a faux firetruck on the MIT
  221. Great Dome and turning a high-rise facade into a working Tetris game.
  222. They are meant to be public and harmless, but often involve
  223. trespassing and "borrowing" materials without permission, like a 3-ton
  224. cannon brazenly snatched from Caltech.
  225.  
  226. The ethic of openness extends to MIT's computer network, where anyone
  227. on campus can get onto the wired network for 14 days by logging on as
  228. a guest, an extremely unusual perk for visitors to a university
  229. campus.
  230.  
  231. As an MIT manager of network security noted in an e-mail reviewing the
  232. downloading case as it unfolded in October 2010, misuse of the MIT
  233. network was made possible by the fact that there was "no
  234. authentication of visitors" and "no identity verification."
  235.  
  236. The open-door policy meant Swartz could easily sign in, as he did, as
  237. an anonymous guest with fake names and disposable e-mail addresses.
  238.  
  239. Between 5 p.m. on Sept. 25, 2010, and 4 a.m. the next morning, the
  240. code Swartz wrote, which he called "keepgrabbing," downloaded 450,000
  241. JSTOR articles.
  242.  
  243. It was the opening salvo in a cat-and-mouse game that would extend
  244. over three months. JSTOR would cut off the Internet protocol address
  245. Swartz was using; he would switch to another. MIT detected and shut
  246. down the registration for his computer; he altered his computer's
  247. identifying information.
  248.  
  249. Officials would conclude the ghost downloader had moved on, then he'd
  250. reappear weeks later.
  251.  
  252. The maddening pursuit prompted some MIT technology personnel to say,
  253. essentially, I told you so. Databases like JSTOR's, some said, should
  254. have been kept behind a virtual gate -- though this would inconvenience
  255. legitimate users.
  256.  
  257. "I frankly don't know why it's not used more," an employee wrote about
  258. such a security measure.
  259.  
  260. Another employee in network security lamented that only the Swartz
  261. case prompted MIT to smarten up. "I hope it helps enlighten them to
  262. the need to really think long and hard about these issues. Kind of
  263. silly that it took a JSTOR crawling issue to get everyone a little
  264. frenzied."
  265.  
  266. MIT and JSTOR did agree to a security upgrade after Swartz's second
  267. round of downloading was discovered in October 2010, requiring those
  268. seeking access to have MIT credentials. But it took JSTOR weeks to
  269. prepare for the change, the e-mails show.
  270.  
  271. That delay would prove fateful. Aaron Swartz had only gotten started.
  272.  
  273. Drawing concern at JSTOR
  274.  
  275. Given the institution's global stature, MIT inevitably drew most of
  276. the public focus. But what Swartz did was more of a threat to JSTOR, a
  277. small organization in a precarious position. Its business is selling
  278. access to journal articles, but it doesn't own those articles. If it
  279. can't protect them, the journals could yank their material out of the
  280. library and threaten JSTOR's survival.
  281.  
  282. Swartz ultimately downloaded 80 percent of JSTOR's archive, 4.8
  283. million articles. At one point his downloading was so rapid, JSTOR
  284. e-mails said it created "a monstrous amount" of traffic that was
  285. "threatening the website."
  286.  
  287. The stakes for MIT were murkier. The university's contract with JSTOR
  288. promised that it would guard against misuse, so there was some risk of
  289. losing an important library resource. And a rogue stranger poking
  290. around MIT's network could be truly dangerous. The discovery shortly
  291. before Swartz's arrest that his computer was being contacted from
  292. China raised passing fears of a foreign cyberattack, e-mails show,
  293. although such probing from overseas is quite routine.
  294.  
  295. Yet MIT was used to seeing excessive downloading -- albeit on a much
  296. smaller scale -- and some staff downplayed the threat.
  297.  
  298. "There will always be one person a semester who, regardless of intent,
  299. will write a script to crawl through some catalog," an MIT employee
  300. wrote when JSTOR first cut off the portion of campus where Swartz was
  301. operating. The MIT worker called JSTOR's move "draconian" and
  302. "knee-jerk."
  303.  
  304. The result of their differing vulnerabilities, e-mails indicate, was
  305. that JSTOR was far more bellicose toward the interloper than was MIT --
  306. at least until the days right before Swartz's arrest.
  307.  
  308. JSTOR pressed again and again for MIT to find the downloader. Some of
  309. the archive's employees said MIT was being cooperative, but other
  310. staff members were irate at the university.
  311.  
  312. "I am sure that if they had lost an equivalent number of books from
  313. their library overnight (what 25,000-30,000 books) they would not be
  314. so nonchalant," someone at JSTOR wrote in an e-mail.
  315.  
  316. "This is an astronomical number of articles -- again, real theft,"
  317. another wrote. "Does the university contact law enforcement? Would
  318. they be willing to do so in this instance?"
  319.  
  320. When Swartz popped up again in late December after weeks of quiet, the
  321. tension was even plainer.
  322.  
  323. "I might just be irked because I am up dealing with [the downloader]
  324. on a Sunday night," a JSTOR employee wrote, "but I am starting to feel
  325. like [MIT needs] to get a hold of this situation and right away or we
  326. need to offer to send them some help (read FBI)."
  327.  
  328. These were "heat of the moment" reactions by officials anxious about
  329. an unknown threat, said Kevin M. Guthrie, president of ITHAKA, JSTOR's
  330. parent organization.
  331.  
  332. "You get a report that 100,000 articles have been downloaded on a
  333. Saturday, you're trying to figure out what to do," he said in an
  334. interview.
  335.  
  336. As for JSTOR's internal comments about calling the police, he said,
  337. "We talked about it, but we made a decision -- no, this wouldn't be
  338. appropriate; it's not our role to indicate that law enforcement should
  339. be called."
  340.  
  341. When it came to Swartz's prosecution, JSTOR was notably reticent. It
  342. insisted on being served with a subpoena before it would provide
  343. information to the government and then, according to Abelson's report,
  344. tried to limit its answers.
  345.  
  346. Guthrie told the Globe that the not-for-profit was simply trying to be
  347. careful. As for its decision to publicly oppose prosecution, he said,
  348. once Swartz returned the files, the journal provider was no longer
  349. interested in the matter.
  350.  
  351. JSTOR was "trying to balance our obligation both to be good stewards
  352. of the content for the content owners and publishers, for our own
  353. viability, for broad access to information, and then the personal
  354. situation, the human situation," Guthrie said.
  355.  
  356. JSTOR's very existence, he said, is all about broadening access to
  357. scholarly journals. Its fees go to support the archive, and it
  358. provides free access in developing countries.
  359.  
  360. E-mails from before Swartz was captured suggest that JSTOR might also
  361. have been worried about its public image. The archive is already
  362. viewed in some quarters as a greedygatekeeper constricting the pursuit
  363. of knowledge. One JSTOR employee, in an e-mail addressing the
  364. possibility of bringing in law enforcement, noted several technical
  365. obstacles after opening with, "aside from the considerations about the
  366. PR of it all . . . "
  367.  
  368. A sudden shift
  369.  
  370. If MIT was initially slow to react to the "ghost," even tepid about
  371. the whole thing as some at JSTOR surmised, that changed drastically
  372. after the university learned of another breach in December 2010.
  373.  
  374. After the laptop Swartz was accused of setting up to download JSTOR
  375. articles was found in a wiring closet at MIT, investigators left the
  376. computer up and running and installed a hidden camera.
  377.  
  378. On the night after Christmas, JSTOR discovered a new round of
  379. downloading. It had actually started some 10 weeks earlier, but Swartz
  380. had slowed the process enough to avoid tripping alarms.
  381.  
  382. Out on a furlough, MIT staff did not get the urgent messages from
  383. JSTOR until Jan. 3, 2011. "This is a heck of a way to start the new
  384. year," one person at MIT wrote. "We need to escalate the seriousness
  385. of our response. This looks like grand theft."
  386.  
  387. And escalate MIT did. The academic building where the activity seemed
  388. to emanate from had been pinpointed in mid-October. But only on the
  389. morning of Jan. 4 did a network engineer began searching Building 16.
  390. He quickly discovered a laptop, hidden under a cardboard box,
  391. connected to the network from a wiring closet in the basement.
  392.  
  393. MIT police decided they needed more help, and called a Cambridge
  394. police detective who belonged to a regional electronic crimes task
  395. force. He showed up with another task force member, a Secret Service
  396. agent named Michael S. Pickett.
  397.  
  398. Seeking not only to find the downloader but to collect as much
  399. evidence as possible, they set up a hidden camera in the wiring
  400. closet. And instead of shutting down the laptop, the authorities
  401. decided to "leave it up and running for a couple of days while the
  402. investigation continues," a library employee wrote in an e-mail.
  403.  
  404. "Now a federal case," the library staffer wrote in separate notes she
  405. took on a conversation with an MIT security analyst. "We [MIT] are
  406. considered the victim. All we provide is by choice -- not subpoenaed."
  407.  
  408. That cooperation with law enforcement also extended to a senior MIT
  409. network engineer who monitored traffic to and from Swartz's laptop and
  410. appeared to be looking to Pickett for instructions. On Jan. 5, having
  411. collected 70 gigabytes of network traffic, he e-mailed the agent, "I
  412. was just wondering what the next step is."
  413.  
  414. Swartz's lawyers argued that MIT, by monitoring Swartz and turning
  415. over materials to law enforcement without a court order, violated his
  416. Fourth Amendment rights. Abelson, who wrote MIT's own review,
  417. disagreed, and legal experts interviewed by the Globe differed on
  418. whether those arguments had merit. They were never ruled on by the
  419. judge in the case.
  420.  
  421. Grimson, the former university chancellor, acknowledged in an
  422. interview that it would have been "cleaner" to ask prosecutors to seek
  423. a court order sooner. Turning over evidence without a subpoena raised,
  424. in some eyes, painful questions about MIT's avowed neutrality.
  425.  
  426. Swartz was identified by the hidden camera and arrested on Jan. 6
  427. after allegedly trying to flee police on Massachusetts Avenue in
  428. Cambridge.
  429.  
  430. The startling discovery that the "ghost" downloader was a well-known
  431. activist prompted a few MIT employees to share their opinions with
  432. Pickett, the Secret Service agent, or their colleagues.
  433.  
  434. "Looks like he is a big hacker, i googled him," one wrote to Pickett
  435. at midnight the morning after Swartz's arrest.
  436.  
  437. That afternoon, someone from the IT security department wrote to
  438. Pickett, deeming Swartz a "really intelligent kid that just got buried
  439. under an avalanche of dumb."
  440.  
  441. A few days later, Swartz took to Twitter to ask his followers if they
  442. knew anyone at JSTOR, presumably hoping he could defuse the situation.
  443. One person at MIT responded by circulating among colleagues a made-up
  444. message purporting to be what Swartz wanted to say to JSTOR.
  445.  
  446. "hi, jstor, I'm still a few million pdf's shy of grabbing your whole
  447. db; really had high hopes on collecting the whole set by 1/1/11," it
  448. read. "could you tell me what number I left off at, because I don't
  449. currently have access to my lappy that was keeping track. k thnx bye."
  450.  
  451. The MIT employee's commentary on his or her own fictional tweet: "LOL."
  452.  
  453. The documents say little about what MIT was thinking and doing once
  454. the case morphed from an investigation into an active prosecution. But
  455. MIT's own report on the case raises serious questions about the wisdom
  456. of MIT's neutrality stance.
  457.  
  458. The report noted that some within MIT believe "there has been a change
  459. in the institutional climate over recent years, where decisions have
  460. become driven more by a concern for minimizing risk than by strong
  461. affirmation of MIT values."
  462.  
  463. The Computer Fraud and Abuse Act has been widely condemned as extreme
  464. in both its sweeping scope and its grave punishments. Sentencing
  465. guidelines suggest Swartz faced up to seven years in prison.
  466.  
  467. To his supporters, MIT bears some responsibility for that fact. MIT
  468. officials privately told the prosecutor that the university had no
  469. interest in jail time, but refused to oppose his prosecution publicly
  470. or privately, despite repeated entreaties from Swartz's father, his
  471. lawyers, and a couple of faculty members, who argued MIT had the
  472. institutional heft to influence the US attorney's office.
  473.  
  474. MIT may have also missed an opportunity to point out a potentially
  475. serious flaw in the case against Swartz.
  476.  
  477. The Computer Fraud and Abuse Act charges centered on the claim that
  478. Swartz had unauthorized access to MIT and JSTOR's networks. But even
  479. if he was doing something improper, Swartz was logged on at MIT as a
  480. guest, leading Abelson and some legal observers to conclude that his
  481. access could be construed as authorized.
  482.  
  483. It was hardly a clear-cut case, and the judge may not have agreed. But
  484. either way, MIT -- resolute about not getting drawn into a criminal
  485. case to which it was not a named party -- "paid little attention to the
  486. details of the charges," Abelson found. The institute simply did not
  487. consider whether Swartz may have been an authorized user under the
  488. terms of the law, according to the report.
  489.  
  490. The defense didn't raise it, either, until close to Swartz's death.
  491.  
  492. MIT was helping the prosecution "understand how to prosecute, what
  493. information is necessary to prosecute, but not taking steps to help
  494. them understand the limits to their prosecution," said Lawrence
  495. Lessig, a Harvard Law School professor who was close to Swartz.
  496. "Nobody would call that neutral. That's aiding and abetting the
  497. prosecution.''
  498.  
  499. Grimson defended MIT's decision to leave it up to the justice system
  500. to decide Swartz's fate, given that MIT leaders believe he harmed the
  501. school. And he disagreed that MIT is less driven by its ideals than it
  502. once was. He pointed to the Abelson report as an example of MIT's
  503. willingness to soul-search and learn from a tragedy.
  504.  
  505. Still, he said, MIT will be second-guessing itself for a long time,
  506. and the university is still considering some policy changes in light
  507. of what happened to Swartz. Its first concrete move, last month, was
  508. to set up a presidential committee that will create an online data
  509. privacy policy.
  510.  
  511. A famously sensitive person, Swartz had some history with depression.
  512. Yet loved ones insist that he was not clinically depressed before he
  513. hanged himself in his Brooklyn apartment on Jan. 11, 2013, but
  514. overwhelmed by the threat of years injail and the toll of fighting the
  515. charges.
  516.  
  517. His father, Bob Swartz, believes that MIT's lack of compassion helped
  518. destroy his son's life.
  519.  
  520. "We can't bring Aaron back, he can no longer be the tireless worker
  521. for good," he said at a memorial service for his son held at MIT last
  522. spring. "What we can do is change things for the better. We can work
  523. to change MIT so that it . . . once again becomes a place where risk
  524. and coloring outside the lines is encouraged, a space where the
  525. cruelties of the world are pushed back and our most creative flourish
  526. rather than being crushed."