INT. OBCO'S OFFICE - DAY
In the ObCo meeting room, the FBI has set up a temporary interrogation room. AGENT JONES and two other FBI agents sit on one side of the meeting room table, with a tape recorder and microphone on the table.
CARL enters the room.
AGENT JONES
Please sit down, Mr. Y. We asked you to come in here to ask you some questions about the recent events.
CARL
Sure, whatever you need.
AGENT JONES
You seem very co-operative.
CARL
Of course, co-operating with the police in their investigations is the right thing to do.
AGENT JONES
A noble attitude. As you know, we're analyzing the ObCo computers to learn what exactly happened. I understand that the security system is set up by you?
CARL
Yes, that is correct.
AGENT JONES
As I understand it, the software distribution server is the only machine that can send out new software for the computers in trucks and forklifts and other vehicles?
CARL
Correct.
AGENT JONES
How secure are the log files on that computer? The five people who can log into it, can they modify log files?
CARL
Not unless they crack the operating system security. Each of the five logins has only minimal access, just enough to provide a new software binary file via a CD-ROM. Additionally, the logins run inside virtual systems, and the log files are outside.
AGENT JONES
What you're saying, then, is that if the log files say that someone logged in at a particular time, they really did, there's nothing they could have done to hide that?
CARL
Yes, unless, like I said, they can crack the operating system security.
AGENT JONES
What about the root account? Could they use that?
CARL
Only I and Alan have access to that. Any use of that account is automatically logged to a hardcopy terminal, with sequentially numbered log messages, so there's an indelible paper trail. Likewise, if the system is rebooted, this results in a paper trail.
AGENT JONES
So, if we were to say that the log files indicate that Vera X. logged in at 3:37 AM and inserted a new software version, that is really what happened?
CARL
Yes. I can't believe she would do that, but I believe the log files.