Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

"So Called "Lost" White House Emails Are NOT Lost (a note from your friendly, neighborhood IT Guy)"

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
Pirate Smile Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 09:49 PM
Original message
"So Called "Lost" White House Emails Are NOT Lost (a note from your friendly, neighborhood IT Guy)"
Edited on Wed Apr-11-07 10:22 PM by Pirate Smile
From Daily Kos:


So Called "Lost" White House Emails Are NOT Lost (a note from your friendly, neighborhood IT Guy)

by jpadgett
Wed Apr 11, 2007 at 07:13:42 PM PDT
So, the White House is asserting they "lost" some email, huh? You've got to be kidding me. Is this a joke?

As an IT guy, I know all too well that emails are nearly impossible to "lose," especially if one really wants to find them. In fact, if the emails in question really are gone for good it can only mean that there was a tremendously expensive, concerted effort to destroy them (and, if so, it should be very easy to prove that they were intentionally destroyed).

Even so, I find it very difficult to believe that copies of these little devils aren't lurking on various electronic devices hither and thither throughout the country (if not the world). Unless a Department of Defense grade hard drive wipe was initiated on every single workstation or device that came in contact with the emails in question, they can be found.

More below the fold

jpadgett's diary :: ::
This is the most important point to remember: it really doesn't matter if someone pressed the delete button or not. Email is easy to recover.

In point of fact, nothing much is actually gone for good if it has traveled over the Internet in the past. Not only the ISPs themselves but the many servers the emails bounce off of can be used to recover digital messages of any type. The assertion that these emails are "lost" is a lie--and a bad one. In fact, probably every email that has been sent over the Internet for the past two years could hypothetically be recovered if a concerted effort was made to do so.

Congress must subpoena the server in question and start reconstructing these "lost" messages. The WH being in charge of "finding" these "lost" emails is laughable. They have long ago lost the right to investigate themselves. "Who watches the Watchmen" indeed.

Please educate anyone we talk to (friends, family or politicians) about this outrageous situation. At least more public humiliation is in order for dubya and his fellow shit heels. Tell it!

http://www.dailykos.com/story/2007/4/11/22220/7274


edit to add - Solo_in_MD disagrees with the Diarist.

I personally don't know diddle about this stuff but thought DU would want to see this Diary.

There are people in the thread of the original Diary at the link who also disagree with the Diarist.

"Solo_in_MD (1000+ posts) Wed Apr-11-07 10:03 PM
Response to Original message
7. I would call the author an idiot, but that would be unfair to idiots, most likely he is a MCSE
He if knew anywhere near what he thinks he knows, he would have realized what he said is just so much crap...the other jump along comments go the same way. Sheesh what fools.

I read but dont post on DKOS. Not sure if its worth the effort to correct the fool."
Printer Friendly | Permalink |  | Top
CatWoman Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 09:55 PM
Response to Original message
1. recommended!!!
Printer Friendly | Permalink |  | Top
 
in_cog_ni_to Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 09:57 PM
Response to Original message
2. WhoooEEEEEEE! Are they in BIG trouble! K & R!
Printer Friendly | Permalink |  | Top
 
L. Coyote Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Apr-13-07 11:48 PM
Response to Reply #2
226. NEW SCANDAL: Years of OFFICIAL WHITE HOUSE E-MAILS go missing.
This is a distinct new scandal/crime, and these 5,000,000 e-mails may not have been kept in the first instance as required by law. This story is still breaking.

MORE: http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x649088
Printer Friendly | Permalink |  | Top
 
Ahgoo Donating Member (55 posts) Send PM | Profile | Ignore Wed Apr-11-07 09:58 PM
Response to Original message
3. You can run
but you can't hide 'em.

Just give 'em up you're only making it worse, but hey it's not my image so waddya I care.
Printer Friendly | Permalink |  | Top
 
TomInTib Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 09:59 PM
Response to Original message
4. We were just talking about this.
How idiotic it is for the WH to make these asinine claims.

knr
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:04 PM
Response to Reply #4
9. As I guy who has set up and runs "irrecoverable systems" its quite plausible
and its easy to do.
Printer Friendly | Permalink |  | Top
 
TomInTib Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:19 PM
Response to Reply #9
16. I do not understand.
I am pretty ignorant when it comes to this sort of thing.

Are you saying that those emails are irretrievable?
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:41 PM
Response to Reply #16
18. They could well be gone forever.
Its easy enough to set up a server that would have nothing to find, even forensically.
Printer Friendly | Permalink |  | Top
 
Straight Shooter Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 11:31 PM
Response to Reply #18
30. Seems to me if you set up a server in such a manner, it implies intent to hide records.
They were conducting White House business with those e-mails. If I am not mistaken, such records are, by law, supposed to be kept in a manner that they might be retrieved if required, and not so that they can be "lost" or "deleted" if someone is trying to hide some information.

I'm waiting for the excuse of, "My computer crashed and I replaced it and all those records are gone, I dunno, in a landfill somewhere." That's my favorite that witnesses come up with.

I think a lot of people are going to look at this ploy as an excuse that sounds a lot like "the dog ate my homework."

Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:18 AM
Response to Reply #30
36. There is no requirement to keep records for a private server.
I have a server set up like that and if I ever get asked why, my answer will be "sovereign election" (I may have to spell it for them).

If its not an offical server, its should not be used for official business. However, that is the responsibility of the user, not the server operator. The law simply does not apply to private servers.



Printer Friendly | Permalink |  | Top
 
Usrename Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:51 AM
Response to Reply #36
51. The emails in question belong to the public.
These emails that are being sought are not private property.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:00 AM
Response to Reply #51
58. Its not private vs public property, the issue is that there is no requirement for
private server to archive emails or keep transaction logs. None, nada, zip.

If a user misuses an email server, its the the fault of the server operator, and they have no requirement to archive, notify etc. Responsibility for misuse lies with the users (which has been admitted by the Whitehouse).
Printer Friendly | Permalink |  | Top
 
napi21 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 06:55 AM
Response to Reply #58
65. I'm not quite sure I understand your position here. If you are saying
ifan email serveris set up to permanently delete emails, and the emails dubpoenaed by congress are gone it's NOT the fault of the server operator, I mostly agree with you. The problem here is, WH correspondance is required by law to be archived. If the users of this "private server" did so to AVOID complying with the law by sending emails pertaining to WH business, YES it is the fault of the user. The only way I see the server operator fuilty of a crime would be IF he/she knowingly set the server up to delete correspondance KNOWING the reason why, that it was illegal, and did it anyway.
Printer Friendly | Permalink |  | Top
 
pnwmom Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:31 AM
Response to Reply #58
94. There is a requirement for the White House to archive all its records.
Edited on Thu Apr-12-07 10:33 AM by pnwmom
If they purposely used a system that wiped them all out, that proves something about their intent, IMO.

But what about the point that there isn't just one server that email will have passed or bounced through? Couldn't the email be reconstructed from those servers?

From the OP:

"Not only the ISPs themselves but the many servers the emails bounce off of can be used to recover digital messages of any type."
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:44 AM
Response to Reply #94
111. No there is not a requriement for ALL records. Read Title 44 carefully
If they purposely used a system that wiped them all out, that proves something about their intent, IMO.

Not necessarily. If it was part of the long term data retention approach for that system, its not destruction of evidence and technically no adverse inference should be drawn in a court.


But what about the point that there isn't just one server that email will have passed or bounced through? Couldn't the email be reconstructed from those servers?

From the OP:

"Not only the ISPs themselves but the many servers the emails bounce off of can be used to recover digital messages of any type."


The OP is clueless about how email actually moves across the internet.


In the Clinton administration, the WH staff was criticized for using Gov IT for political purposes. That is why the parallel system was set up. Official Gov stuff on one, political party stuff on the other. There clearly has been some bleed over. How much, by whom, what was the content is the crux of this matter.

Additionally there is no requirement for a non-Gov server operator to archive anything. Its is the responsibility of the users to use the correct system.
Printer Friendly | Permalink |  | Top
 
Jeff In Milwaukee Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:42 PM
Response to Reply #111
163. So if I file the serial numbers off my handgun...
Edited on Thu Apr-12-07 02:57 PM by Jeff In Milwaukee
nobody really shot the gas station attendant, right?

No offense, but you are entirely full of horseshit. If it can be proven that the Bush Administration set up "black ops" e-mail servers for the sole purpose of shielding their communications from ever being recovered in the event of prosecution on other criminal charges, then they've engaged in obstruction of justice.

No adverse inference could be drawn in court? Only if the prosecutor is a drooling idiot.
Printer Friendly | Permalink |  | Top
 
ieoeja Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:06 PM
Response to Reply #163
177. "If it can be proven ..."

And if it can not, then Solo is correct. There are plenty of legitimate reasons to NOT archive deleted private emails. The number one reason is actually to protect the right to privacy.

Republicans may claim there is no such right, but the courts have correctly disagreed with this absurd claim.


Printer Friendly | Permalink |  | Top
 
Jeff In Milwaukee Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:29 PM
Response to Reply #177
181. It can be proven
Old Saying: Two people can keep a secret, just so long as one of them is dead.

Those e-mails all went somewhere and to somebody. Lots of somebodies. There are literally hundreds, if not thousands, of recipients out there and somebody kept at least one e-mail. And I would not for a moment rule out a nervous technician who, knowing that he was facilitating a crime, kept a back-up disc as "insurance" against prosecution sometime down the road. And don't forget the Print Button and people who save their e-mails on their hard drive.

But beyond that, you waive the legal right to privacy when you're engaged in a criminal enterprise(that's why the Good Lord invented wiretaps). All a prosecutor has to do is prove that the White House was engaged in criminal activity, and their loving attempts to destroy all the evidence will simply result in a charge of obstruction of justice.

And that was good enough to impeach Nixon.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:22 PM
Response to Reply #163
179. As I understand it, the parallel system was installed to comply with Federal IT policy
Apparently it was openly done and well known. The analogy being tossed around is that it is like having a work and personal cell phone.

We are all assuming the RNC workstations were misused, and there are a number of pointers that it was pretty egregious. . The focus is now on what can be recovered and documented in terms of this misuse. That would be at least a Title 44 violations, but its not clear what the penalties for that are. Erasure since the start of the investigation would clearly be obstruction.

There are a number of circumstances where juries are instructed where they can or can not draw adverse inferences from. An example is a defendant not testifying. That they are not supposed to and what they do can often be different things. Generically, if the defendant had a long term policy of not keeping records beyond a certain date, then not having those records is not supposed to be held against them.
Printer Friendly | Permalink |  | Top
 
Jeff In Milwaukee Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:34 PM
Response to Reply #179
183. I understand your point...
But if the defendant is charged pursuant to an ongoing criminal conspiracy (let's say: awarding no-bid federal contracts to political contributors) then proof that they created an e-mail system for the specific purpose of shielding their illegal activity is obstruction of justice. And no matter how much a judge tells a jury to ignore damning evidence, we both know that juries simply don't come down with a case of selective amnesia once they start deliberating.
Printer Friendly | Permalink |  | Top
 
nebenaube Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 06:21 PM
Response to Reply #36
199. it's not a private server... it's a corporate server.... n/t
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:19 PM
Response to Reply #199
203. Actually it is
Private as in private sector, not government and not subject to open records act or Title 44 in this case
Private as in in-house (not and ISP)

My apologies for the confusion on the use of terms
Printer Friendly | Permalink |  | Top
 
mwb970 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 05:59 AM
Response to Reply #30
63. Republican amnesia should set in pretty soon.
Memories become hazy. Recent meetings and conversations on important topics cannot be recalled. Memos received a few weeks ago have been completely forgotten.

It all kind of fits with the electronic amnesia their servers seem to have suffered. Maybe we could get them one of those free bottles of Focus Factor.
Printer Friendly | Permalink |  | Top
 
dae Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 05:17 PM
Response to Reply #63
196. I've heard of that virus, the more guilty you are, the more
likely you'll catch it.:)
Printer Friendly | Permalink |  | Top
 
Spiffarino Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 12:49 AM
Response to Reply #18
33. For sure it's easy to do...
However, you have to assume they had the good sense to do it in the first place. As stupid as Republicans in general and the White House in particular have proven to be over the past six years, I have a feeling we'll be hearing about some unsavory leftovers in a PST file on some poor schmuck's hard drive.

I've been doing IT for a very long time and there will always be folks who save every email. If Waxman can get his hands on the workstations, user's online storage, etc., nasty things shall belch forth.
Printer Friendly | Permalink |  | Top
 
Seldona Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:07 AM
Response to Reply #18
54. True enough.
However I wouldn't even start with the server. I am willing to bet that perhaps not all, but a lot of these emails, could be reconstructed simply by subpoenaing all client devices and using them to make the most complete picture possible. At the same time they can at least check the server or servers.

It is true that a concerted effort to wipe all those emails from both server and client would be obvious as hell. But copping to that would still be better than having all their dirty little secrets come out. Plus they can still spin it as incompetence. Their base seems to have no problem with that.

These guys give sleaze a bad name.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:45 AM
Response to Reply #54
57. Without server logs, how would you know what machines to take
the in-house ones are easy, but beyond that it gets real hard, real fast
Printer Friendly | Permalink |  | Top
 
druidity33 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:51 AM
Response to Reply #57
68. take them all...
Surely all you need to do is find out which machines the RNC gave to administration individuals and take them all. Barring that, all personal laptops of all individuals mentioned in the e-mails released prior to today. If i understand correctly, it just takes one or two "clients" to reconstruct e-mail chains? There must be dozens of these things out there. What do you think it would look like if they had all had a DoD grade wipe recently?

:shrug:

Printer Friendly | Permalink |  | Top
 
tiptoe Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:26 AM
Response to Reply #68
80. would look like conspiracy to coverup..to obstruct justice: then, some aides might "recollect"
Edited on Thu Apr-12-07 09:28 AM by tiptoe
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:06 AM
Response to Reply #68
88. not sure thats really viable legally
Assuming there is nothing on the server side except a user/account list, you would have to confiscate every piece of IT gear those people had access too, work or personal. That is one helluva net

As for using security software, its quite common and its use is growing. Its also very cheap.

Printer Friendly | Permalink |  | Top
 
Seldona Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:55 PM
Response to Reply #57
137. A blanket subpoena for ALL machines should do it.
It is only a couple dozen people at the most we are talking about here. I imagine it wouldn't be to difficult to track down the hardware of anyone working for the government for someone with subpoena power.

Not only that but if they are involved in the destruction of evidence we then have individuals being charged. Someone would most likely take a deal. Something tells me that there is NO honor among thieves here.

Even the Blackberries of everyone involved should be taken and checked for evidence by forensic experts. Even the evidence of applications that overwrite individual sectors could be held against anyone who SHOULD have the data but doesn't. At least I would think so, I am no lawyer.

Whatever is done I believe it is not a good idea having the Whitehouse investigating itself.

Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:11 PM
Response to Reply #137
146. Not sure if that would hold up...Its not clear how broad a net Congree can throw
Certainly all the RNC hardware would okay. All their personal H/W would be a stretch. All of the H/W in their home should be out of reach.

Remember that it is not illegal not to save something, not to keep records, or to keep a disk clean. It is illegal to do that once you have been notified an investigation is underway.

Blackberries really don't hold all that much data, but they are a place to start. From what I understand there won't be much.

There is nothing illegal about using overwriting software. However using it after you have been notified of an investigation would be.
Printer Friendly | Permalink |  | Top
 
Seldona Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Apr-13-07 03:26 PM
Response to Reply #146
223. True, but there is a mandate for them to keep official records.
They have admitted to doing a majority of official US Government business on unofficial RNC servers and hardware. So I would think it wouldn't take a lot to track down that hardware. I agree that personal machines are out, at least until we start recovering some of these 'deleted' emails if they exist at all. However I do believe that if we are able to get our hands on a lot of this stuff further investigation would be warranted.

To be fair I did read that there are over 20 principles and something like 50 staffers using RNC servers and hardware to conduct official business. It is getting harder and harder, particularly since they seem to be willing to take the rap for deleting the data rahter than let all those emails to go public.

This is the most unamerican administration in HISTORY. They really do consider the Constitution, the Bill of Rights, not to mention the rule of law, as obstacles. These SOBs really do believe *Bush has dictorial powers. Scary!
Printer Friendly | Permalink |  | Top
 
nebenaube Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 06:31 PM
Response to Reply #137
200. hmm.... blackberry's servers..... hmmmm.....
NSA records of blackberry transmissions hmmm...
MessageLabs archives.... ( they intercept a lot of e-mail )
The vacuuming/archiving of data at ATT's main hubs... hmmm... do they pre-aggregate the packets?

keywords, what are the keywords to scan for? oh yeah address fields as the first filter...
MTA caches.... Carnivore records...
Echelon... Maybe a brit or austrialian willl spill the beans...
Printer Friendly | Permalink |  | Top
 
meldroc Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:02 AM
Response to Reply #18
87. Yeah, but creating a system that deliberately wiped data would be very obvious.
If you had emails and such on a system deliberately rigged to wipe incriminating data, sure, it could be done, but it would be very, very obvious.

Waxman needs to seize the RNC servers and put computer forensics experts to work on them. Either they will recover the emails, or they will prove that the emails were wiped deliberately. Either way, they're fucked.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:06 AM
Response to Reply #87
89. If it was a standard part of your data retetion process, its quite legal
Printer Friendly | Permalink |  | Top
 
meldroc Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:23 AM
Response to Reply #89
105. Depends...
Let's say the scuttlebutt is true - that the RNC servers have a 30-day retention policy after which email is deleted. That would be legal, with exceptions...

If any particular emails may become of interest to a legal proceeding, then by law it MUST be retained. Very early in a lawsuit, the lawyers for a particular organization will be notifying sysadmins and users, telling them "Retain these emails." The moment you even slightly think an email might be subpoenaed, you legally CANNOT delete it, if you do, you could face criminal penalties. You have to take steps to ensure that email is saved - your hide is on the line.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:37 AM
Response to Reply #105
110. Once there is notice of legal action or even the reasonable anticipation of it
autodeletion etc must stop. However prior to that, there is no requirement and technically no adverse inference can be drawn from following a data retention policy.

30 deletion is pretty standard, no idea where the gouge on that is coming from. However, that is normally for items on the server. If they were read most likely they were transferred to the workstation and removed from the server.
Printer Friendly | Permalink |  | Top
 
iamthebandfanman Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:20 AM
Response to Reply #18
104. actually


see, when you write things onto the hard drive, it leaves an image on that hard drive.
even if you delete the file or files incorporated with this imagine they will still remain physically on the hard drive. even if its been over written on the same exact spot.

the fbi has had software and techniques to find deleted things on hard drives for more than a decade(prolly even longer than that).

the only way to try and make sure that date is not recoverable from a HD is to A) physically destroy it or B) take a high power magnet to it .

i suggest the latter since its faster and can be done quicker if you have a magnet handy.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 12:02 PM
Response to Reply #104
120. The ghost images fade exponentially (or so)
There are NSA approved overwrite techniques that prevent recovery. Software that does that is cheap and in some cases free. If it is running the background as part of disk management, there can be no forensic recovery.

Printer Friendly | Permalink |  | Top
 
CabalPowered Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:38 PM
Response to Reply #18
130. The server yes, but what about the clients
It would seem very difficult to make sure that all the clients are correctly configured, and users trained to leave no trace.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:59 PM
Response to Reply #130
140. You can do a lot of that automatically
If the access was only via RNC supplied workstations, it would be easy. If it wasn't, it becomes much more problematical.
Printer Friendly | Permalink |  | Top
 
CabalPowered Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:14 PM
Response to Reply #140
148. I agree
but I don't think the RNC thought this all the way through in the beginning. Most likely they setup a vanilla server and handed out the laptops/workstations with commonly configured clients. They didn't think that this system would ever come to light so they didn't take that many precautions. And the fact that we do have some emails from the system, like the recovered Ralston email stating that she was using this to avoid WH security problems, indicates that they did not setup the system to make everything irrecoverable. I don't hold any hope out for the server(s) as the hardware is probably sitting at the bottom of a river somewhere, but I think there could be some juicy emails on some of the clients.

Second point, if they did setup a secure system, wouldn't that have to include a VPN? And wouldn't that require the assistance of WH IT to make it accessible on the LAN. I'm not sure, just asking.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:23 PM
Response to Reply #148
152. Insufficient data to say
I agree but I don't think the RNC thought this all the way through in the beginning. Most likely they setup a vanilla server and handed out the laptops/workstations with commonly configured clients.

You are most likely correct. A lot of this geek stuff I have been posting has been to refute that absolutely things were recoverable. We really don't know how things were set up by the RNC.

Second point, if they did setup a secure system, wouldn't that have to include a VPN?

VPN would just require the opening of ports in the firewall. Not really a big thing. However VPN and related encryption techniques are really aimed at hostile interception more so than deny forensic recovery. It would have been a good thing to do overall, but would have nothing to do with the recovery of deleted data.

Printer Friendly | Permalink |  | Top
 
CabalPowered Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:27 PM
Response to Reply #152
156. Right. My point with #2 is
if ports were opened, that would make WH IT staff accessories to the crime(s). That's who we really need to hear from and if there was evidence of that then I'm sure the committees would like to hear from them as well.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:36 PM
Response to Reply #156
160. The parallel systems were installed to comply with other Federal rules
so I am not sure you can reasonable hold the IT staff accountable as accessories.
Printer Friendly | Permalink |  | Top
 
CabalPowered Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:47 PM
Response to Reply #160
166. I'm confused, you're saying that the RNC systems were installed to
comply with other Federal rules? If so, please enlighten me.

It would seem to me that the WH IT staff would be the ones that would have to be trained into archiving for official, WH email, according to the requirements. I would also think that the IT staff would notice that each employee in the west wing had two workstations. I think there's someone on WH IT staff that could shed a lot of light on the situation and that's who I'm hoping gets subpoenaed next. :toast:
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:07 PM
Response to Reply #166
178. IIRC the Clinton WH staff was criticized for using Gov IT for party purposes
The parallel system was put in so that would not happen. Sort of like having a work and personal cell phone. Clearly there was some bleed over. What, how much, was it an intentional bypass of the required archiving and such are all key issues here. Hopefully there will be enough data left to settle them, but I am not hopeful. The older items are most likely lost forever.

I have read references here and elsewhere about multiple workstations at people desks. Its not like I have been in the west wing and checked personally. Saw some of that discussion today IIRC. Something to the effect of Rove doing 90% on his RNC machine and others sliding smoothly between the two.
Printer Friendly | Permalink |  | Top
 
CabalPowered Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:51 PM
Response to Reply #178
189. FWIW, I read yesterday that RNC handed out 50 laptops/workstations
to the West Wing. And now that you mention, I do remember reading about Clinton's party usage of the WH email ssytem.

But it appears a lot more details are coming out right now. I guess we'll have to wait and see what treasures are unearthed.

Thanks again for the dialogue.
Printer Friendly | Permalink |  | Top
 
Maraya1969 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:44 PM
Response to Reply #18
164. I think they can find them. Like they said an email goes to 2 different
computers and who knows where else in between. I asked a computer geek about erasing things on my computer and he said they can run a program that erases it 7 times but in the end the information can be retrieved. It is just more difficult.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:36 PM
Response to Reply #164
184. The easiest (an most likely only place) to find copies will be on the
sender and receivers workstations. The servers will most likely have deleted them long ago.

Current thinking is it is quite possible to make data not recoverable forensically.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:47 AM
Response to Reply #16
49. It depends on a lot of factors
Are you saying that those emails are irretrievable?

As a caveat I don't know anything about GWB43.com's email system other than what's available through whois and dig (*cough cough* and nmap *cough*)

That said, if they had a faulty backup strategy, and the originals were deleted, then, yes, the emails (or most of them) are probably irretrievable, particularly if they are old.
Printer Friendly | Permalink |  | Top
 
paparush Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:57 PM
Response to Reply #9
172. Do we think all of these servers and laptops have been zeroed out?
I doubt it.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:30 PM
Response to Reply #172
182. We really don't know
If any were scrubbed since the investigation began, its a no brainer for contempt or obstruction. Prior its more dicey.

What security measures and data retention policies if any were being used have not been disclosed. There has been some speculation about 30 day auto delete.
Printer Friendly | Permalink |  | Top
 
paparush Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:37 PM
Response to Reply #182
185. These guys running this sideshow HAD to know they were violating some
serious Federal Regs by providing a non-monitored channel and would put preventive measures in place.

But..ya never know.

Will make for great theater.

Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:59 PM
Response to Reply #185
191. Its been stated that the parallel system was required to comply with Federal IT rules
and its existence was known and acknowledged. The key issue is the level of misuse, which is why all the noise about recovering the emails.

You are quite right about it leading to some great theater.
Printer Friendly | Permalink |  | Top
 
paparush Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 04:03 PM
Response to Reply #191
193. Hey, Solo, have you seen this...?
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 04:50 PM
Response to Reply #193
194. More grist for the mill
Be interesting to have the details filled in. As some one else pointed out, this is turning into grand theater
Printer Friendly | Permalink |  | Top
 
supernova Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:01 PM
Response to Original message
5. Yep. I work in IT
Edited on Wed Apr-11-07 10:04 PM by supernova
and you never really "delete" anything, eventhough the software you are using has that option.

Moral of the story: don't put anything on a computer you don't want hanging around for forever. :evilgrin:

There are also firms that specialize in recovering data from "destroyed" hard drives. So I don't tell me it can't be done.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 11:41 PM
Response to Reply #5
31. Nonsnense -They could easily be made non recoverable,
A server can be set up to not keep logs or archives and delete files with nonrecoverable wiping including end of sector, swap, and free space. Similar configuration options are available for workstations. All off the shelf and at low cost. Its also quite legal and not cosidered evidence tampering or contempt.

Printer Friendly | Permalink |  | Top
 
snooper2 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:19 AM
Response to Reply #31
78. Due to the Sarbanes Oxley Act, companies must retain all email...
Edited on Thu Apr-12-07 09:37 AM by snooper2
We have to keep process documents, email, data center doors secure, etc., all from the Sarbanes Oxley Act. Now, if you are a private group like the RNC, I don't think any law applies on them keeping backups of servers.

If somebody can find that answer out you'll know if the emails are there or not.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:53 AM
Response to Reply #78
82. Sarbane-Oxley has much more limited scope than that
Edited on Thu Apr-12-07 10:08 AM by Solo_in_MD
It applies to financial data of publicly traded companies and only to the data required to support audits. Most commercial companies treat that as every email sent for ease of compliance. I do not see how it is applicable here.
Printer Friendly | Permalink |  | Top
 
meldroc Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:26 AM
Response to Reply #82
107. How is the RNC legally organized? Is it a corporation?
Just wondering whether Sarbanes-Oxley applies to them.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:52 AM
Response to Reply #107
114. S-O only applies to publicly held companies reporting to the SEC and over a specified market cap
Printer Friendly | Permalink |  | Top
 
paparush Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:58 PM
Response to Reply #78
173. That would mean obeying the law...something the repugs have no problem avoiding..
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:11 PM
Response to Reply #31
127. Any Network Admin That Would Set Up Such A System Should Be Fired
If you did set up such a system, how would you recover data in case of failure? Are you seriously telling me that the White House e-mail system would be set up without any disaster recovery system in place?
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:03 PM
Response to Reply #127
142. Get a clue. It was the parallel RNC email system.
The non-cognoscenti here (including yourself) have been claiming that it should easy to retrieve everything, which is utter nonsense.

If a system was set intentionally set up to resist forensic discovery, it would still be quite functional. Its seems clear to me that you do not understand some to the key principles on how this is done. However it is quite doable.

There is nothing substantiated about how the RNC servers were set up, so no one here knows what should be recoverable or not. However blanket pronouncements that everything is recoverable by you and others are specious.
Printer Friendly | Permalink |  | Top
 
lovuian Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:47 PM
Response to Reply #5
133. Thats what I thought so this is just BS to stall the Congress
and it shows obstruction of justice
Printer Friendly | Permalink |  | Top
 
nicknameless Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:01 PM
Response to Original message
6. Good!
K&R
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:03 PM
Response to Original message
7. I would call the author an idiot, but that would be unfair to idiots, most likely he is a MCSE
He if knew anywhere near what he thinks he knows, he would have realized what he said is just so much crap...the other jump along comments go the same way. Sheesh what fools.

I read but dont post on DKOS. Not sure if its worth the effort to correct the fool.
Printer Friendly | Permalink |  | Top
 
Pirate Smile Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:17 PM
Response to Reply #7
15. I'll edit the OP to add your caveats. If there is anything you want me to
stick in the OP to counter the Diary, let me know quick and I'll add it.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:00 AM
Response to Reply #15
34. Sorry for not getting back sooner...however here are a few points for consideration
1) There is no legal requirement to keep backups,save copies of emails or even to do backups.

2) The posters technical terms used indicate a Window orientation. Only the lazy or fools use Microsoft products as a mail server. If what I read was correct, the RNC servers were *nix boxes.

3) The keeping of server logs or connection logs is totally optional.

4) Disk management software continuously packs and optimizes disk space. There are options to do EOS, swap, and free space security wipes as part of that activity.

5) The best backup for this kind of system is a RAID array with a system image without data in case of catastrophic failure

I have built and run servers that do all of the above. There are similar approaches for workstations. I'm old school, I am sure a young whiz kid could build one tighter. Check out the Jetico line of products and see what is available for low cost.

That it is easily possible does not mean that it was done, but to claim it is impossible is silly.
Printer Friendly | Permalink |  | Top
 
Usrename Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:44 AM
Response to Reply #34
47. There is a legal requirement for the President to keep this stuff.
There’s a whole chapter in the Federal Code about this:

http://www.archives.gov/about/laws/presidential-records.html

(2) The term "Presidential records" means documentary materials, or any reasonably segregable portion thereof, created or received by the President, his immediate staff, or a unit or individual of the Executive Office of the President whose function is to advise and assist the President, in the course of conducting activities which relate to or have an effect upon the carrying out of the constitutional, statutory, or other official or ceremonial duties of the President. Such term--

(A) includes any documentary materials relating to the political activities of the President or members of his staff, but only if such activities relate to or have a direct effect upon the carrying out of constitutional, statutory, or other official or ceremonial duties of the President; but

(B) does not include any documentary materials that are (i) official records of an agency (as defined in section 552(e) of title 5, United States Code; (ii) personal records; (iii) stocks of publications and stationery; or (iv) extra copies of documents produced only for convenience of reference, when such copies are clearly so identified.


Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:47 AM
Response to Reply #47
59. Indeed, but it does not flow out to outside services that may have been misused
The RNC network (servers, workstations etc) have no requirement to preserve anything any more than Google or Comcast under Title 44. The onus is on users. They are the responsible party here, and it looks like the WH has admitted that the rules were not clearly understood by everyone (yeah, right).

Don't forget that there is other Federal rules that say you can't use Federal IT for political purposes. IIRC, the Clinton WH was accused of this, and this is why the parallel system was put it. Was it misused? Certainly. The key issue is how much and why, and its clear there will never be an uncontested answer on that.

This analogy was given to me earlier today and it makes some sense. Consider that you two have cell phones, one for work, one personal. There is going to be some bi-directional bleed over. Small amounts are tolerable and to be expected. Large amount require corrective action and maybe even punishment.

I am still looking for definitive penalties associated with violation of Title 44, whether its civil or legal, and what the grades of violation would be, and any requirements for intent. Right now it looks a lot like other areas where there is no real penalties other than being told not to do that again.

The full text of Title 44 is here: http://www.access.gpo.gov/uscode/title44/title44.html
Printer Friendly | Permalink |  | Top
 
Usrename Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:08 PM
Response to Reply #59
144. It's hard for me to believe you are being sincere here.
If the White House gets into court or an impeachment trial, it most likely not be caused by their violation of the Presidential Records Act. But their willingness to knowingly violate the Act to the point where it is effectively useless should have legal ramifications on how ANY court would view their arguments on any other grounds, especially if executive privilege is the claim.

You must know this.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:35 PM
Response to Reply #144
159. I am being quite sincere, my position is pedantic than adversarial
A number of posters clearly have a misunderstanding of the technology and the law.

On the technical side I am pointing out that is is quite possible to have intentionally secure a system against forensic recovery. However, its not known if this was done by the RNC. Even if it wasn't, the older the data, the less likely it can be recovered. Thats just the way it works.

On the legal side, some seem to think that official WH emails have some sort of magic flag that every computer can recognize that they fall under Title 44 and must be preserved, which is not true. The law and implementation instructions are clear. The user is supposed to do official WH business on the WH system which has all the archiving stuff implemented. If official stuff was done outside of the official systems it is the users responsibility, not the systems they used. Any punitive actions can only be taken against the user.

My personal opinion is that the parallel system was set up to comply with other Federal rules and that there was clearly some bleed over. How much, by whom, and intent are yet to be determined. However finding those answers is far from assured. We need to get competent independent pros in there to make and assessment, and that clearly is not happening.
Printer Friendly | Permalink |  | Top
 
Usrename Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:47 PM
Response to Reply #159
167. I think you are very ill-informed about this particular case.
Redacted versions of these emails were just recently delivered to the committee. Now they can't find any unredacted copies and all of them are inadvertently lost?

Are you sure you want go this route? Is this the story now?

First you said there was nothing in the law that says they had to keep this stuff.

Then you said that there was no criminal penalty for breaking the law that says they must keep this stuff.

Now you say it is an accident that this stuff is lost.

Pick a story and try to stick to it.

They are OBSTRUCTING JUSTICE, and it can be easily shown that they had to willfully and intentionally break the law to do it, and this can carry some jail time in some circumstances.

RIGHT?????

Do you have a misunderstanding of the facts here, or you trying to fool people?
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:00 PM
Response to Reply #167
175. I don't think you have understood what I have said
I said that there was nothing that required the RNC to archive emails that flowed through their system.

I have said it is the responsibility of the users to use the correct system. Clearly this was not happening.

I have pointed out the the people claiming that all the old emails were recoverable are wrong.

I have said that I have not found any penalties associated with violation of Title 44, asked if anyone else had found them. There may well not be any. It may also be a civil not criminal matter. I really don't know.

I don't recall having said anything was accidentally lost. What I said was that I believe there was bleed over between the parallel, but that it is not clear we will every know how much, by whom, and its content.


I am fairly confident there is obstruction going on. Whether it reaches the level of contempt of Congress or is otherwise punishable is unclear. Right now there is insufficient data available to the public to say.

That has always been my position on this.


Printer Friendly | Permalink |  | Top
 
snooper2 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:29 AM
Response to Reply #34
81. I question your first assertation., (1)
Edited on Thu Apr-12-07 09:40 AM by snooper2
Not the Patriot Act as I stated above(Sorry, the law that passed to make Exec's accountable)(I can't remember ARGH!)

(on edit) I remember now, the Sarbanes Oxley Act....dur...

It has all kinds of provisions about document retention (private and public companies). People don't realize this, but a lot of requirements were thrown at companies; small, medium and large. For example, we must be CALEA compliant by April 18th. (If you don't know what Calea means, just understand that now all phone providers must be able to no only provide accounting records but content (I.E. your live VoIP conversation)). If you are not also aware, the majority of VoIP Voicemail systems store messages as yes, email. (.wav file)

Also companies are required to save email, process documents, procedures, all kinds of bullshit. (Guy came out to make sure our Data Center was Secure because of Sarbanes Oxley :eyes: )

So, the question posed is the RNC some kind of non-profit organization/company that these provisions in the act apply to? I don't know...

Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:55 AM
Response to Reply #81
83. S-O has limited applicability and none here
its one of the things I first considered
Printer Friendly | Permalink |  | Top
 
snooper2 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:00 AM
Response to Reply #83
85. Is that because it only applies to traded companies?
I'm not a Sarbanes Oxley person (we have a small crew who's only job is SOX compliance)

I went the the Sarbanes Oxley forums trying to dig for more info, I'm not sure what if any parts apply to the RNC..
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:09 AM
Response to Reply #85
90. From what I understand It applies only to financial data of publicly traded companies
and then only to the data required to support audits. Most commercial companies treat that as every email sent for ease of compliance. I do not see how it is applicable here.
Printer Friendly | Permalink |  | Top
 
snooper2 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:25 AM
Response to Reply #90
93. Found what I was looking for....
Sarbanes-Oxley Act (SOA, Sox)

Enacted by the U.S. government in 2002 in response to corporate financial scandals, Sarbanes-Oxley Act (SOA, Sox) applies to all publicly held companies in the United States that have more than $75 million equity market capitalization and that report quarterly to the Securities and Exchange Commission (SEC).

It covers financial reporting to the SEC, auditing practices and associated document retention. By holding CEOs and CFOs directly responsible for the accuracy of financial reports, this act has had a major effect on U.S. corporations and has already sent one executive to jail. The intent is to preserve all records of business dealings and financial audits for long enough to allow detailed investigations of questionable business activities.

The company must save all documentation used to create financial reports and audits.

Sarbanes-Oxley defines documentation as:

* relevant records such as workpapers;
* documents that form the basis of an audit or review;
* memoranda;
* correspondence;
* communications;
* other documents and records (including electronic records) that are created, sent, or received in connection with an audit or review and contain conclusions, opinions, analyses, or financial data relating to such an audit or review.

The law requires risk assessment, either across the entire company, or by a summation of narrower risk assessments on individual transactions and operations within the company. Storage risk assessment is part of the overall requirement.

The document retention period is seven years and recovery time is limited to a very few days following a federal request. Because of the legal importance of these documents, Write-Once-Read-Many (WORM) magnetic disk storage should be considered. Security is vital to protect against malicious use of this gold mine of company information.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:41 AM
Response to Reply #93
95. Yep. Financial data of publicly held companies with SEC reporting
Printer Friendly | Permalink |  | Top
 
lovuian Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Apr-14-07 12:07 AM
Response to Reply #81
227. I have a family member familiar with Sarbane "Follow the Money"
Lets face it Abrahamhoff was all about Money and companies and the RNC is all about MONEy from Corporations
Cunningham was all about dummy corps funneling MONEY

Money is traceable if the emails went to Corporations with Sarbanes Oxly and I'm sure they know which ones then that RNC server might be involved

Everything is connected in the Network
and I find it hard to believe a Terrorist could have it so easy to hide damaging emails

Homeland Security and the Defense have their ways

Unless Solo you work at the highest security check points in our nation you have to admit you don't know what technology is available to the US maybe Leahy knows better
Printer Friendly | Permalink |  | Top
 
TahitiNut Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:27 PM
Response to Reply #7
17. Well, theoretically he's sorta right ... but pragmatically and economically ...
Edited on Wed Apr-11-07 10:30 PM by TahitiNut
... he's in never-never-land. It'd be a bit like reassembling a coral reef from the sand on a beach. (Maybe not quite that extreme.) OTOH, if some MX administrator has a warehouse full of streaming backup tapes for some bizarre reason, it'd be verrrry interesting. (I wonder whether the NSA might have a skunk works.)
Printer Friendly | Permalink |  | Top
 
supernova Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:44 PM
Response to Reply #17
19. Ohh, wouldn't that just teach * a thing or two?
All this time and effort they've spent insiting that they must record and tape everything everybody's doing, prying into our private lives .... it would be just too delicious if NSA recorded the WH too!

:rofl:
Printer Friendly | Permalink |  | Top
 
Little Wing Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:16 AM
Response to Reply #7
102. haha yep, you got it
Never ran across an IT guy more useless than an MCSE

Printer Friendly | Permalink |  | Top
 
southerncrone Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:03 PM
Response to Original message
8. They think all of Amurika is as stupid as their mindless, pitiful sheeple!
They're so used to saying & doing what ever they please & no one (media or congress) calls their hand on it.

Well, in the words of Nancy, "there's a new sheriff in town!"

Let the accountability begin! Along w/the data recovery!
:woohoo:
Printer Friendly | Permalink |  | Top
 
Whoa_Nelly Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:06 PM
Response to Original message
10. K&R
And sent to Keith :evilgrin:
Printer Friendly | Permalink |  | Top
 
greenman3610 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:06 PM
Response to Original message
11. Isn't this what Homeland Security is for?
I want criminals tracked and their emails read,
dammit!
Printer Friendly | Permalink |  | Top
 
malaise Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 04:53 AM
Response to Reply #11
60. Wrong
DHS finds your email and loses Bushcos.
Printer Friendly | Permalink |  | Top
 
Rosa Luxemburg Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:13 AM
Response to Reply #60
99. yes Homeland Security is probably programmed not to log RNC email?
Printer Friendly | Permalink |  | Top
 
John Q. Citizen Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:09 PM
Response to Original message
12. Is it time to Impeach, yet?
Printer Friendly | Permalink |  | Top
 
Oilwellian Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:12 PM
Response to Original message
13. GMTA
I posted the same thing in KPete's thread just 2 minutes before you posted this one. We are on it dude! There's an interesting discussion in the comments of the DKos thread...some of the IT people are saying emails could easily disappear...others are saying, nope, not so. It'll be interesting to see what happens. Personally, I think Schumer & Leahy already have them. :D
Printer Friendly | Permalink |  | Top
 
peacetalksforall Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:14 PM
Response to Original message
14. Very informative. So what does Congress do - hold a hearing
with IT experts to prove that? Any ideas on how they get it? I believe you. How can it be spread it and educate non-IT people? It's one lie that can be fought - easily? First of all, have to find out if they said lost, but meant destroyed - the expensive way? Maybe they'll tell us that those laptops were the ones reported stolen?
Printer Friendly | Permalink |  | Top
 
cyberpj Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:44 PM
Response to Original message
20. Intentionally destroyed may be better than what they would disclose in the long run. (?) nt
Printer Friendly | Permalink |  | Top
 
nolabels Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:53 PM
Response to Reply #20
136. It will be ironic that some maverick I.T. guys somewhere will be the down fall of *
Edited on Thu Apr-12-07 01:53 PM by nolabels
The * that couldn't figure out that internet has no plural. The even better thing could be that the reconstruction will have dates to show how much contempt there really was.
Printer Friendly | Permalink |  | Top
 
cyberpj Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:04 PM
Response to Reply #136
219. I just have the sickening feeling Rove is well aware of the process and has IT guys on his side too.
This group has been so good at setting up "outs" in advance of situations I'm ready to believe they had someone capable of truly deleting this info in their pocket.

Printer Friendly | Permalink |  | Top
 
Pachamama Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:46 PM
Response to Original message
21. I'm so glad to see this post! In another thread about the "emails being lost" I posted that I hope
the Judiciary Committee and Congress immediately issue subpoenas for all the WH and RNC servers. I mentioned that I used to work for a large software company that was being investigated by the Justice Dept. and it would have been considered a crime to destroy any evidence requested and also that it was nearly impossible to actually eliminate all copies and that with proper investigation, they could not only be located, but any effort to delete or eliminate them would be able to be detected.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:32 AM
Response to Reply #21
42. I'm the naysayer here (with a couple of supporters) but its easy to build a system that does not
leave records. It has to be done upfront and by design. Using such a system is not considered destruction of evidence or contempt since the records are never kept.

Such systems tend to annoy the subpeona holders, but like a TOR node, are perfectly legal
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:44 AM
Response to Reply #42
48. I email through TOR when I'm in full paranoid mode
And in psycho-paranoid mode I do all my DNS lookups through it. I think the performance is too slow to be practical for an office full of naive users, though.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:22 AM
Response to Reply #48
55. TOR can be slow, but it has its uses
Another really cool trick is private wireless cutouts. Its a trick some of my students told me about. Data comes in from one ISP, it goes through a wireless access point to another computer and then out via another bandwidth provider. Absolutely untraceable depending on type and antenna, surprisingly long range as well.
Printer Friendly | Permalink |  | Top
 
paparush Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:01 PM
Response to Reply #42
176. If these guys are registering domains with legit names and legit addresses
I'm thinking they they were not planning too carefully. I'm thinking they were not thinking of getting caught. I'm thinking hubris. I'm thinking its going to bite them squarely on the ass.

Unless they zeroed out all of their drives.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:35 PM
Response to Reply #176
211. The parallel system was legitimate and was installed to meet other Federal IT rules
clean domain registrations make sense
Printer Friendly | Permalink |  | Top
 
file83 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 10:51 PM
Response to Original message
22. Key phrase: "Unless a Department of Defense grade hard drive wipe was initiated..."
Who is to say that hasn't already happened? This guy is assuming that these Whitehouse emails are travelling over they same network servers ours do and in an unencrypted form. He also assumes that there was NOT a concerted effort to destroy those emails.

He assumes much.
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 11:07 PM
Response to Reply #22
24. The CIA may have wanted this to happen deliberately, along with the "others" mentioned
Edited on Wed Apr-11-07 11:08 PM by EVDebs
"It's all part of a growing ongoing investigation into corruption in defense and intelligence contracts, which already has sent former Rep. Randy “Duke” Cunningham to prison and, legal sources say, may threaten others in Congress and the CIA."

http://www.msnbc.msn.com/id/12634250/

...in CIA and Congress, eh ? It's STILL obstruction of justice and the trail is still hot.
Printer Friendly | Permalink |  | Top
 
Jackpine Radical Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 11:14 PM
Response to Reply #24
25. Seems to me there might be more than one faction in the CIA.
The careerists versus the political hacks, for example. Gues which bunch has the greater technical expertise...
Printer Friendly | Permalink |  | Top
 
Oilwellian Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 11:20 PM
Response to Reply #25
26. That's exactly why I think Leahy & Schumer...
already have the damning emails. They're baiting these thugs big time and are on the verge of pouncing. A girl can dream, right? :D
Printer Friendly | Permalink |  | Top
 
Jackpine Radical Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 11:29 PM
Response to Reply #26
29. Sweet dreams, dear Oily.
And I think you might be right. There are no doubt a lot of people lining up to leak, for a variety of reasons ranging from patriotism to revenge, and a lot of stuff to be leaked.

Interesting times. This is probly what Watergate would have been like if we had had the net back then.
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:10 AM
Response to Reply #26
97. Or something far more scary....Think Ptech
Ptech (wikipedia)
http://en.wikipedia.org/wiki/Ptech

Dollars of terror (I know, the source is a conservative link, but the info is damning to Bushco !)
http://www.frontpagemag.com/Articles/ReadArticle.asp?ID=17730

"Ptech is used primarily to develop enterprise blueprints at the highest level of US government and corporate infrastructure. These blueprints hold every important functional, operational, and technical detail of the enterprise. A secondary use of this powerful tool is to build other smart tools in a short period of time. Ptech’s clients in 2001 included the Department of Justice, the Department of Energy, Customs, Air Force, the White House, the FAA, IBM, Sysco, Aetna, and Motorola, to name just a few. "

Ptech, now GoAgile, is STILL inside the WH et al. This is the smoking gun.
Printer Friendly | Permalink |  | Top
 
file83 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 08:49 PM
Response to Reply #24
216. I'll bet that the NSA has copies of those emails...
...and they are holding on to them for political leverage. You don't just give stuff like that away to whomever wants it.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 11:24 PM
Response to Reply #22
27. DoD grade wipe S/W is cheap and off the shelf
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:37 AM
Response to Reply #27
44. Or even free and open-source
http://wipe.sourceforge.net/
http://www.jetico.com/
http://sourceforge.net/projects/srm/

Don't know if any of those work on Windows; NTFS itself in my experience is pretty good at wiping files away (d'oh!)

But at the risk of beating a dead horse, if they were actually concerned about security and not just incompetent boobs, they would have encrypted their damn emails, something it still astounds me that nobody does.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:25 AM
Response to Reply #44
56. I use Jetico myself, and there are good widows versions of some of their stuff
Ive heard claims by some here that using wiping software or not keeping everything is proof of criminal intent...if that so I am going to be in jail for a very long time.
Printer Friendly | Permalink |  | Top
 
lovuian Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Apr-14-07 12:09 AM
Response to Reply #22
228. I agree there are many things here we don't know but
he's giving us another view from where Republicans are coming from and thats good to know
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-11-07 11:05 PM
Response to Original message
23. Yeah, and even the NSA can't find 'em LOL !
Printer Friendly | Permalink |  | Top
 
formercia Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 06:35 AM
Response to Reply #23
64. But they can find every email that I have ever written
Edited on Thu Apr-12-07 06:36 AM by formercia
I bet NSA has copies of them. Perhaps all of this surveillance network might have some use after all.
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:13 AM
Response to Reply #64
98. I didn't miss the irony of it all. BTW, think Ptech in the WhiteHouse
Any involvement in this ? Whatcha think ? There's one connection the GOP doesn't want anyone to find out about.
Printer Friendly | Permalink |  | Top
 
formercia Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:17 AM
Response to Reply #98
103. I bet the Saudis have copies too.
Sweet mysteries of life in the fast lane. Some times things just get away from you and all you see is the World spinning round and round and now way to stop.
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:25 AM
Response to Reply #103
106. Google up this company and what it does
""Ptech is used primarily to develop enterprise blueprints at the highest level of US government and corporate infrastructure. These blueprints hold every important functional, operational, and technical detail of the enterprise. A secondary use of this powerful tool is to build other smart tools in a short period of time. Ptech’s clients in 2001 included the Department of Justice, the Department of Energy, Customs, Air Force, the White House, the FAA, IBM, Sysco, Aetna, and Motorola, to name just a few.""

from Rachel Ehrenfeld's Dollars of Terror (article on the web)

What do you make of this Saudi company's access in DOJ, DOE (nuk-u-lar), AF, WH, FAA (9-11, anyone ?).
Printer Friendly | Permalink |  | Top
 
formercia Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:48 AM
Response to Reply #106
112. WE tin-foil-hatters used to rant about this
I guess few were listening.


ARE WE HAVING FUN YET?
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:53 AM
Response to Reply #112
115. Dude, hoisting them on their own petard, that article was from
a conservative website ! The info is enough to impeach. The CIA/GOP moneylines are the key to this whole obstruction of justice thing. Why else would CIA and GOP be soooo desperate right now ? Lots to cover up and too little time. Leads to even more clumsy efforts to obstruct and more trails to follow.
Printer Friendly | Permalink |  | Top
 
formercia Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 12:16 PM
Response to Reply #115
121. Even the Crusaders are screaming bloody murder.
Edited on Thu Apr-12-07 12:56 PM by formercia
may I have some more butter on my popcorn, please?
Printer Friendly | Permalink |  | Top
 
snooper2 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:50 PM
Response to Reply #106
188. sounds like middleware to me...
not very nefarious....
Printer Friendly | Permalink |  | Top
 
crappyjazz Donating Member (886 posts) Send PM | Profile | Ignore Wed Apr-11-07 11:25 PM
Response to Original message
28. Let's just hope that the Whitehouse IT person isn't


Sorry, I can't quit this, it has always cracked me up!
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:49 AM
Response to Reply #28
50. But that's the thing -- White House IT had nothing to do with it
It was specifically a system not managed by WH IT. That's why they used it. Because it wasn't spec'd out for the level of retention required by law for WH communications, it's not designed to archive transported messages. And if archives and backups weren't made to those specs, then you might as well be reading from /dev/null
Printer Friendly | Permalink |  | Top
 
Renew Deal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 12:39 AM
Response to Original message
32. I'm an IT guy and I don't totally agree.
It's common in certain types of businesses to make things disappear on purpose. The reason why this happens is so there is nothing that can be subpoenaed. These company's will encourage deleting messages. They will also not keep tape backups older than a month. You can't hand over something that doesn't exist.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:22 AM
Response to Reply #32
38. Actually there are several stable and secure approaches that literally leave nothing on a server
that could be subpeonaed. There are similar approaches for the workstations as well. Literally no backups requried. See post #37 for a more technical description. Easy, legal, off the shelf, and immune to forensic reconstruction

Printer Friendly | Permalink |  | Top
 
Xithras Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:04 AM
Response to Original message
35. Like others, I sort of have to disagree.
Edited on Thu Apr-12-07 01:08 AM by Xithras
I used to admin an Exchange server that deleted messages after 90 days to conserve disk space. Unless someone deliberately archived the messages onto their own computer, they would be lost at that time. Some people have pointed out that files never really get deleted, which is true, but it ignores the reality that email servers are high-transaction systems (especially if they receive a lot of spam). A deleted block will get overwritten fairly quickly, and numerous overwrites will happen over a period of months.

Despite the mythology, data clusters can only be recovered if they've been overwritten once or twice. Complete files can be reconstructed if they're overwritten a few more than that, but I haven't seen an email server in 10+ years that stores messages as discreet files on the server. When a message is "deleted", it's simply the clusters being released from within a larger mail database file. Those clusters will be reassigned to a new entry once a new message comes in, and the old message data will be overwritten.

And the info about intermediary servers on the Internet storing the messages is just garbage. Unless an upstream provider has SPECIFICALLY configured their network to capture email traffic, nothing is logged. What he's claiming might have been true in 1993, but nowadays there is too much email on the Internet for anyone to even think about logging all of it. Unless the connections are being specifically monitored (which is typically only done during anactive criminal investigation), the only way to read an email is to pull it from either the transmitting or destination servers. If the email server was set up as a secure system, with certificate authentication, even a deliberate intercept won't work. You'll capture the messages, but they'll be undecryptable garbage.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:57 AM
Response to Reply #35
53. Good God, man!
but I haven't seen an email server in 10+ years that stores messages as discreet files on the server.

Funny, I seem to run across a lot of them. :)

But then again if you want those to deliver the performance they're capable of, you'll use a lazy-writing filesystem like JFS or XFS, or for that matter keep the spool in memory explicitly and trust your swap manager to be faster than your filesystem (that sounds counterintuitive but with good disks it works well).
Printer Friendly | Permalink |  | Top
 
Xithras Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:55 AM
Response to Reply #53
117. Sendmail still uses discrete files?
That's odd. I was just talking to a guy a couple months ago, and he admins a Sendmail cluster with a MySQL based message storage system. I haven't touched SendMail in about 7 years, so I just assumed that the program had finally gone in that direction. Does it still store the messages in the users home directory?

As for the other two, those are old programs that aren't widely installed anymore. There may still be quite a few legacy installations out there, but no sysadmin who deserves his job would suggest either Courier-MTA or Postfix for any kind of serious business email server today.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:11 PM
Response to Reply #117
126. Umm... I think you have things switched
Postfix is newer and for most purposes "better" than sendmail (it's billed as "Sendmail's replacement"). Courier is a groupware suite; closer in capabilities to Exchange (which the exception that it actually works as advertised).

I have a cluster that transports about 4 million emails in a given day; it uses postfix to filter and transport, and goes to courier.
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:33 PM
Response to Reply #53
129. What's UML ? Ptech's software in the WH and DOJ appears to use this nt
Printer Friendly | Permalink |  | Top
 
tiptoe Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Apr-16-07 07:03 AM
Response to Reply #35
236. What about Fitzgerald's "active investigation"? He'd been requesting email records. He knew there
Edited on Mon Apr-16-07 07:04 AM by tiptoe
"holes" in the data.

Wouldn't/couldn't he have initiated legal pursuits of email systems data? I'd find it hard to believe he was unaware of the RNC parallel system, given the numbers of persons in the WH he interviewed.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:21 AM
Response to Original message
37. I have to agree with Solo_in_MD, and I'm an IT guy
Lots and lots of stuff is lost forever. Our data systems are like our financial systems: we have a lot more floating around in electrons than we have physical capacity to instantiate if need be.

I deal with lots of mail servers. Lots and lots of them. I don't know a single one that actually logs the contents of a transported email, only the routing information. So, it probably is possible to find who sent an email to whom when (those logs can be and generally are retained for a while), but recovering the body of a year-old deleted email off of a large groupware cluster (particularly if it is configured *not* to retain mail) is a non-starter.

If they're using a real mail transport agent (say, Postfix) the message never even made it on to disk unless there was very heavy queuing going on (and if they're using a real file system (say, JFS) and a real disk (say, one with a gig or so of write-ahead cache) stuff gets physically written to disk only rarely.

This image people have that everything you say and do on a computer getting recorded is just a CSI plot twist; a computer generates orders of magnitude more data than it can store in an hour of use.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:25 AM
Response to Original message
39. If anybody in the WH had their technical head out of their arse they would have used encryption
Public-key encryption is easy to use. There are free software suites available that implement it. Before anybody would go to the expense of zeroing out hard drives, I think they would have just downloaded GPG or OpenPGP; it would take longer for a supercomputer to crack than *co still has in office.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:34 AM
Response to Reply #39
43. There is a problem with that...you have to surrender your key if subpoenaed
Edited on Thu Apr-12-07 01:34 AM by Solo_in_MD
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:39 AM
Response to Reply #43
46. True, but you hem and haw for 6 months
During which time the press and Congress don't know what's in the email. It's a very good way to delay and a very very good way at preventing unauthorized leaks. And if I were running a criminal enterprise out of the White House on a secondary mail system the first thing I would say is, "everyone generates a PGP key right this second, and nobody uses the RNC email system without encryption".
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:52 AM
Response to Reply #46
52. Encryption really only helps with hostile interception
That said there is no reason not to be using it. There are plugins for every significant client out there.
Printer Friendly | Permalink |  | Top
 
lovuian Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Apr-14-07 12:11 AM
Response to Reply #39
229. I have always felt the republicans are so backward with tech
its been proven so many times
look at the page scandal how he used messenger
Printer Friendly | Permalink |  | Top
 
Marr Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:26 AM
Response to Original message
40. What about the NSA records?
I thought they had a desperate and 'reasonable' need to keep a record of all our emails?
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:32 AM
Response to Reply #40
41. You have to consider the logistics
Actually storing the bodies of all the emails transported just through the MAE routers would require literally terabytes of storage per minute (not to mention a faster TCP parsing suite than is currently known to exist). That's not only billions of dollars per month in disk space needing to be added, it's more energy to spin the drives than is produced on earth and probably enough heat to boil our atmosphere away (though it would explain global warming, I suppose). At a national level, conceivably one could log routing and protocol information for all traffic, but even that is a big stretch.

Remember, a snoop on a gateway won't see "email" or "web request" or "streaming video"; he'll see either fragmented IP datagrams or datalink frames (depending on at what point in the stack he inserts his snooping device). These datagrams or frames will have to be assembled into TCP or UDP streams in real time (or the storage problem mentioned above hits you), somehow sorted and parsed, and stored. And all it takes to foil him is a free encryption plugin to your mail client or web browser.

It just doesn't seem like something the NSA would waste a whole lot of time trying.
Printer Friendly | Permalink |  | Top
 
bananarepublican Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 05:28 AM
Response to Reply #41
61. Would the NSA be remotely interested in trying to assist?
Under Bush/Cheney their snooping powers have greatly expanded. Is it possible to hold a super secret organization even remotely accountable? Me thinks not.
Printer Friendly | Permalink |  | Top
 
Rosa Luxemburg Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:14 AM
Response to Reply #61
101. things will change
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:26 PM
Response to Reply #61
180. It's a question of logistics, not accountability or authorization
There simply isn't enough disk storage in the world to store even a fraction of all the data that passes through routers, and even if there were there isn't enough energy inthe world to spin all the hard drives it would take.

The impracticality of storing and searching the ming-bogglingly huge amount of data that is transported over the Internet every day is still one of the best guards against random snooping.
Printer Friendly | Permalink |  | Top
 
bobthedrummer Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:38 AM
Response to Original message
45. Fwiw, DUers L Coyote and Fridays Child (as well as others) started threads
that are directly related to this criminal conspiracy.

If any DUer or visitor wants to invest their time to go over what these folks took their time and effort to compile here are the links:

L Coyote "Email-Gate Facts:..."
http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x523978

Fridays Child "...Karls girls"
http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x548152
Printer Friendly | Permalink |  | Top
 
donkeyotay Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:29 AM
Response to Reply #45
109. And for relevant RNC's connections to Ohio, 2004, this jackstraw45 thread
Printer Friendly | Permalink |  | Top
 
formercia Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 05:54 AM
Response to Original message
62. The author does make a good point about the Internet
Usually, email is not high priority on the Internet and it often gets spooled(delayed) due to other higher priority traffic. It could theoretically be found if the data hadn't been deleted and overwritten.
Printer Friendly | Permalink |  | Top
 
napi21 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:15 AM
Response to Reply #62
66. I bel;ieve there's another avenue here as well. I've readthat quite a
few of the emails in question were sent to Abramoff. I'm willing to accept that emails amoung the people only using the RNC servers could be wiped clean because you have both the sender and the receiver on the same server, but the emails to Jack Abramoff would HAVE to go outside that small world. I don't know about ALL ISP'S and what their retention programs are, but I recently readthat Googlefor instance hasevery bit of datathey've ever handled retained. The article I read was actually talking about snooping and identity theft and many other servers retain data for 2, 3, 4, and 5 years.

I'm sure no expert in IT, as far as I know, once data of any kindgoes out of ONE network(the RNC), the information is retained somewhere and most likely many places. Since Abramoff is "helping" in order to lessen his sentence, I can see HIS computer just might be a great place to start!
Printer Friendly | Permalink |  | Top
 
formercia Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:24 AM
Response to Reply #66
67. I hope Waxman's people are reading these threads
Rove and company are just trying to make Waxman's work difficult, hoping to delay the process.

They will be caught eventually.

The good part is that their communications system is at least partially paralyzed, which limits their ability to coordinate.

In War, one of the first targets is the enemy commo.
Printer Friendly | Permalink |  | Top
 
SpiralHawk Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:55 AM
Response to Original message
69. republicons are lacking in all honor. Why do they hate America?
Why do republicons hate the truth?
Printer Friendly | Permalink |  | Top
 
Ganja Ninja Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:57 AM
Response to Original message
70. Of course they aren't gone.
How could they be? They used laptops, blackberry's, home computers, cell phones, work stations, servers and so on. They can't delete them all. They can't have wiped or destroyed every hard drive.
Printer Friendly | Permalink |  | Top
 
dapper Donating Member (755 posts) Send PM | Profile | Ignore Thu Apr-12-07 08:18 AM
Response to Original message
71. Back Ups???
I know all our servers get backed up. The Full back up's are kept for years and the incremental back ups are re-used every two weeks or so.

I would consider it bull crap if they stand by this "oops". Time to subpoena the tapes!

Dapper
Printer Friendly | Permalink |  | Top
 
LSK Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 04:00 PM
Response to Reply #71
192. not with email, it is too high a volume thing for backups
Emails are constantly coming and going.

You can run a backup and an hour later there were hundreds of emails sent and recieved and the backup is now not up to date anymore.
Printer Friendly | Permalink |  | Top
 
The Backlash Cometh Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 08:50 AM
Response to Original message
72. That's true, because e-mails never travel the internets in their original
form. Each server it has to travel through simply makes a copy, so there are as many copies as there are servers involved in the transportation of these little boogers.

Thank you, Al Gore!
Printer Friendly | Permalink |  | Top
 
rhett o rick Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 08:55 AM
Response to Original message
73. Oh yeah!! Oliver North was seen shredding the servers. nm
Printer Friendly | Permalink |  | Top
 
focusfan Donating Member (884 posts) Send PM | Profile | Ignore Thu Apr-12-07 09:01 AM
Response to Original message
74. i think there lying
plan and simple there not wanting to give those emails over
because there incriminating.I wonder if they could go in there
hard drive and get the emails that away?
Printer Friendly | Permalink |  | Top
 
DBoon Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:03 AM
Response to Original message
75. I'm sure the Russian or PRC's intelligence agencies could find them
You can be sure that this unsecured "back channel" has already been exploited by foreign intelligence.

With the proper request, these agencies could provide us with a complete collection.

Now tell me again what Sandy Berger did that was so terrible?
Printer Friendly | Permalink |  | Top
 
Hardrada Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:04 PM
Response to Reply #75
218. Good point!
Late night reading for Putin!
Printer Friendly | Permalink |  | Top
 
gollygee Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:06 AM
Response to Original message
76. I find it difficult to believe they didn't back up their email system
I'm not an expert but I worked somewhere where the email system's backups were put under subpoena and a bunch of backup tapes were taken so the emails could be read.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:56 AM
Response to Reply #76
119. Depends on the design
Its easy to insure that the emails are purged from the server when its moved to the workstation. From there the disk space is reused. To "backup" that kind of server you use a raid array. You have a system image (without data) in case of a catastrophic failure. Its really not that hard to make it impossible to recover things.
Printer Friendly | Permalink |  | Top
 
Beetwasher Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:16 AM
Response to Original message
77. Yup! I Posted This Here Too:
Printer Friendly | Permalink |  | Top
 
CK_John Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:24 AM
Response to Original message
79. This is a myth! If you own and control the server, you can do what you want. Just like google or
yahoo or myspace.
Printer Friendly | Permalink |  | Top
 
Matariki Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:02 AM
Response to Reply #79
86. Huh?
which part do you think is a 'myth'? That it is difficult to completely destroy data from a server? Or that the Whitehouse 'owns' the server and therefore can 'do what they want'?

Your post makes little sense.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:18 AM
Response to Reply #86
92. The servers and workstations belong to the RNC
who can set them up any way they want. They can not destroy data once they know an investigation is underway, and that includes stopping anything preplanned destruction of archives.

Its easy to make electronic data disappear from a server and have it not be retrievable, even with computer forensics.
Printer Friendly | Permalink |  | Top
 
Matariki Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:48 AM
Response to Reply #92
96. Sorry, but you are wrong on both accounts
Edited on Thu Apr-12-07 10:50 AM by kineta
Well, partially wrong about one. Yes the RNC can legally do what they want with their servers, however any official emails are still ruled by the Presidential Records Act and if they've been destroyed that is a clear violation.

Second, it is NOT 'easy' to completely destroy computer data - a person would have to make a very deliberate effort to do so.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:50 AM
Response to Reply #96
113. No I am not wrong on this
Edited on Thu Apr-12-07 12:04 PM by Solo_in_MD
The onus on preservation falls on the users not the non-government server operators. Substitute Comcast, Cox, etc. for RNC If items that should be preserved were sent via their servers would they would not have to keep them. Same with the RNC. Its the users responsibility, not the carriers.

Its is quite easy to insure non recovery of removed data on a routine basis with little to no user interaction on either server or workstations. Its off the shelf, inexpensive, and easy to implement. Yes it would be deliberate part of the system design, but its quite legal.
Printer Friendly | Permalink |  | Top
 
rhett o rick Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 08:03 PM
Response to Reply #96
215. Yeah so they made a deliberate effort. Don't think they weren't prepared for this. nm
Printer Friendly | Permalink |  | Top
 
Matariki Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:59 AM
Response to Original message
84. Have you considered writing to Reps Conyers and Waxman?
You'd think they know this but perhaps they don't. As someone who works in the tech industry too, I mistakingly assume that stuff like this is common knowledge.

On the other hand maybe subpoenaing entire WH servers isn't politically feasible at this point?
Printer Friendly | Permalink |  | Top
 
Jack Rabbit Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 10:10 AM
Response to Original message
91. As an ex-IT guy, I'm aware of this
Which is why I'm not getting too excited about it.

I would prefer that an outside source should take responsibility for recovering lost data and that the contracter be responsible to either Congress or the FBI.

The White House should be treated as a crime scene.

Printer Friendly | Permalink |  | Top
 
Little Wing Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:14 AM
Response to Original message
100. What a naive young IT guy he must be
People talking tech from the outside might as well be holding a megaphone out their asses
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:26 AM
Response to Original message
108. This Is My Career Field
Recovering deleted e-mails is no big deal at all.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:53 AM
Response to Reply #108
116. Is the ink dry on you MCSE yet?
Because if it was, you would know better than to make statements like that
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:01 PM
Response to Reply #116
124. Don't Have A MCSE, But
Recovering "deleted" e-mails is not a huge undertaking. I know because I've had to do it. There's an entire industry of vendors that does just this kind of work, and I get calls from the every day and use them every day.

So, please do not insult me with your high and mighty IT references. Thank you very much.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:41 PM
Response to Reply #124
131. Depends on the system configuration and the actions of the user
Yes people use recovery services and tools. However, they only work under restricted circumstances. In an environment designed to prevent recovery, they are useless.

You would do well to understand the concepts and implementations in your "career field" before you make such blanket declarations about the ease of recovering deleted data.
Printer Friendly | Permalink |  | Top
 
stklurker Donating Member (138 posts) Send PM | Profile | Ignore Thu Apr-12-07 01:56 PM
Response to Reply #124
138. Solo is correct
Edited on Thu Apr-12-07 01:59 PM by stklurker
"There are no absolutes in the IT world."

Follow your own advice, Solo is correct.. Recovering emails is not necessarily trivial, and in most cases isnt, it largely depends on the email system in place. In truly secure setups they are encrypted on the server store (if one exists) and cant be read without the correct keys..
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:10 PM
Response to Reply #138
145. I'm Not Going To Argue Any More
Keep believing what you write at your own peril.
Printer Friendly | Permalink |  | Top
 
ProdigalJunkMail Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:15 PM
Response to Reply #145
149. the surest sign that you are in over your head is giving up n/t
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:08 PM
Response to Reply #116
125. Also, Don't Forget About Backup Tapes and Redundancies
Most server systems have some sort of backups somewhere. Data is written to multiple server simultaneously in order to prevent loss. Also, data is backed up to tape. It's never going to be one single server without any sort of backup.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:47 PM
Response to Reply #125
134. You clearly do not understand the concept on how to build systems to resist
reconstruction and subpoena, something I have already done. Short summary:

- Level 5 RAID Array on the server
- System Image without data in case of catastrophe
- Disk management software running continuous doing EOS, Swap/Temp, and Free space overwriting.

Very high integrity, all off the shelf, low cost.


There is no evidence that this is how the RNC servers are configured. However to do the above is legal and achievable even by lesser skilled admins.

Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:28 PM
Response to Reply #116
128. One Last Point To You, Be Very, Very Careful on How You Advise Your Clients
If you tell your clients that their data can be safely destroyed without it being recovered, even partially, then you are giving advice to your clients which may result in them losing a major case or even face imprisonment.

There are no absolutes in the IT world.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:58 PM
Response to Reply #128
139. There are absolutes in the IT world...
newbies with think they know it all and will offer grand pronouncements which many of us find amusing.

Look, if this is your career field, you need to buckle down and start learning the fundamentals of your craft, because the only thing you have shown so far is that you really don't know much at all. Learn the basics of the technology, including H/W. That includes cooling, physical interconnection, cooling, and pinouts. Learn how the different OSes work. There are some very different paradigms. Understand how file systems work both logically and physically. Otherwise you too can and will be replaced by a very small shell script (http://www.thinkgeek.com/tshirts/frustrations/374d/)
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Thu Apr-12-07 02:05 PM
Response to Reply #139
143. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
ProdigalJunkMail Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:13 PM
Response to Reply #143
147. wow...he speaks politely to you and you say "fuck you"
Edited on Thu Apr-12-07 02:43 PM by ProdigalJunkMail
all he did was give you advice and in a non-condesending tone, if you ask me. Solo has stated nothing but facts upstream and simply contradicted you with true statements...and then even offered you advice as to how to NOT sound like a newbie. I am sorry, but Solo didn't do a damned thing wrong here. There are things you obviously don't know about...and speaking about them makes you seem like you aren't really very knowledgeable about anything (which you very well may be).

Calm down...

sP
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:24 PM
Response to Reply #147
153. He Started His Reply With A Condescending Remark
He directly challenged me and my intelligence. He didn't have to do that, and I responded to him with a "Fuck You". Deal with it.
Printer Friendly | Permalink |  | Top
 
ProdigalJunkMail Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:26 PM
Response to Reply #153
155. sorry...not how I read it
looked to me like he was trying to help you not sound like a newb by telling you not to make such grand statements about something that isn't true...I guess we all see things through the lenses we wear...

sP
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:33 PM
Response to Reply #155
157. I am not a "Newbie"
Again, you begin your post with an insult, and then get mad at me when I fire back at you. Also, I work and manage people in the data recovery field for legal purposes. I cannot get into more detail on this board since I am typing from work.

Let me assure you, data, or even fragments of data, can be recovered from most if not all e-mail systems in some form or another.
Printer Friendly | Permalink |  | Top
 
ProdigalJunkMail Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:38 PM
Response to Reply #157
162. I am not mad and I did not insult you
I told you what I thought I read. I don't know why you are so angry. There are ways to prevent data from being recovered. It is neither expensive nor difficult to achieve that end. Solo contradicted a statement of yours about that and suggested some things to help you sound more like you knew what you were talking about by not making absolute statements. I pointed that out. But once again, you make an absolute statement that you cannot back up. Most if not all? I think not (if precautions are taken).

And no, you cannot get any data that I do not want you to have access to. Legal or no...I can stop that very simply...and I bet Solo_in_MD could as well.

sP
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:46 PM
Response to Reply #162
165. Here's How He Started His Reply
"Is that ink dry on your MCSE?"

That wasn't condescending?

As for your statement, "And no, you cannot get any data that I do not want you to have access to. Legal or no...I can stop that very simply...and I bet Solo_in_MD could as well."

Okay, would you risk having Child porn on your server? If you say yes, then I won't argue with you any more. I will conceed.
Printer Friendly | Permalink |  | Top
 
ProdigalJunkMail Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:50 PM
Response to Reply #165
168. sorry...didn't start reading there...that WAS a little harsh
and porn on the servers in our environment is not a problem...but if I wanted to get rid of it I could with little or no problem...I would need a LITTLE notice though ...

sP
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:53 PM
Response to Reply #168
170. "I would need a LITTLE notice though"
Ahhh, and therein begins your problems, advanced notice.
Printer Friendly | Permalink |  | Top
 
ProdigalJunkMail Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:59 PM
Response to Reply #170
174. well, for our world notice would be needed as we have no program
to manage this sort of thing as we really don't have retention issues here. However, there are, as stated before, means by which data can be continuously purged off of systems in such a way that it is not recoverable. Without methods like these security of certain data could NEVER be guaranteed by anyone...gov't or no.

sP
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 05:06 PM
Response to Reply #168
195. The issue at hand is the abiltiy to forensically recover deleted data
and there are clearly readily available tools and methods to block that.

The hiding/locking of current/operational files is another matter. The concept of the computer erasing itself while the cops breakdown the door is pure Hollywood fantasy. There are ways to hide stuff from a raid (variations of offsite storage) but those are only a delaying action and could easily lead to charges of obstruction. Encryption is not a magic bullet there either since you have to turn over the key when subpoenaed, even in a criminal case.
Printer Friendly | Permalink |  | Top
 
ProdigalJunkMail Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:44 PM
Response to Reply #195
221. not sure you were responding to me
because none of what you are talking about here was even remotely mentioned by me...perhaps somewhere else?

sP
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:18 PM
Response to Reply #143
151. Clearly you need to take some anger management as well as technical courses
Don't confuse what you run into as being what skilled pros can do. 99% of users and close to that of sysadmins take the easy road, and that is why we have spam problems, botnets, and things left behind for others to find.
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Thu Apr-12-07 02:25 PM
Response to Reply #151
154. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
file83 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:00 PM
Response to Reply #143
217. Ha Ha!
I'm glad you said that. That guy was being VERY condescending. They sounded like they were trying a little too hard to sound knowledgeable to the point of insecurity. Props to you for calling them out on it. :applause:
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 11:55 AM
Response to Reply #108
118. Ptech access to WH, DOJ, DOD etc computer systems...
www.frontpagemag.com/Articles/ReadArticle.asp?ID=17730

Leads to obstruction of justice but also elsewhere. Is there foreign access to the emails etc ? Then start asking more serious questions of a national security nature.
Printer Friendly | Permalink |  | Top
 
lovuian Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:15 PM
Response to Reply #108
150. Bingo go in and confiscate the damn things
problem is the Attorney general isn't going to do it
Printer Friendly | Permalink |  | Top
 
bleever Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 12:49 PM
Response to Original message
122. Title 44, Chapter 22: President is required to preserve the records.
TITLE 44--PUBLIC PRINTING AND DOCUMENTS

CHAPTER 22--PRESIDENTIAL RECORDS

Sec. 2203. Management and custody of Presidential records

(a) Through the implementation of records management controls and
other necessary actions, the President shall take all such steps as may
be necessary to assure that the activities, deliberations, decisions,
and policies that reflect the performance of his constitutional,
statutory, or other official or ceremonial duties are adequately
documented and that such records are maintained as Presidential records
pursuant to the requirements of this section and other provisions of
law.
(b) Documentary materials produced or received by the President, his
staff, or units or individuals in the Executive Office of the President
the function of which is to advise and assist the President, shall, to
the extent practicable, be categorized as Presidential records or
personal records upon their creation or receipt and be filed separately.

http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=browse_usc&docid=Cite:+44USC2203


The onus is on the President.
Printer Friendly | Permalink |  | Top
 
EVDebs Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 12:53 PM
Response to Reply #122
123. Nice catch bleever ! 44 USC 2203 Title 44 Chap 22 (a and b) !
Edited on Thu Apr-12-07 01:32 PM by EVDebs
The "Decider" doesn't have a choice on this one ! And as my post #118 above shows, even trying to hide emails via the Ptech system in the WhiteHouse and DOJ (and elsewhere...?) doesn't let him off the hook
Printer Friendly | Permalink |  | Top
 
mzmolly Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:44 PM
Response to Original message
132. "I've got a teenage kid in my neighborhood that can go get 'em for them," ~ Pat Leahy
http://news.yahoo.com/s/ap/20070412/ap_on_go_co/fired_prosecutors

"They say they have not been preserved. I don't believe that!" Leahy shouted from the Senate floor.

"You can't erase e-mails, not today. They've gone through too many servers," said Leahy, D-Vt. "Those e-mails are there, they just don't want to produce them. We'll subpoena them if necessary."

White House spokesman Scott Stanzel said there is no effort to keep the e-mails under wraps, and that the counsel's office is doing everything it can to find any that were lost.

"The purpose of our review is to make every reasonable effort to recover potentially lost e-mails, and that is why we've been in contact with forensic experts," he said.


Printer Friendly | Permalink |  | Top
 
NMDemDist2 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 01:49 PM
Response to Original message
135. so let me ask something. if the email is sent and recieved on the same
servers will it leave a legacy out side the main servers?

although I find it EXTREMELY difficult to believe the RNC didn't back up their data regularly and store it off site (as most large organizations do)
Printer Friendly | Permalink |  | Top
 
ProdigalJunkMail Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:00 PM
Response to Original message
141. Solo_in_MD deserves a big hand!
:applause:

You have kept your head the entire time in this thread whilst dealing with people who have little concept of what it means to manage a server and the transmission of data across a network. Some folks here that most likely have no idea how a hard drive even operates are making statements that do nothing more than show their ignorance. I applaud your efforts and your desire to communicate facts while maintaining your calm demeanor. I work in a world that understands the efforts (IT efforts, that is) you make...thank you for your level-headed discourse. You're a better man than I, Charlie Brown!

sP
Printer Friendly | Permalink |  | Top
 
central scrutinizer Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:34 PM
Response to Original message
158. maybe the weak link won't be electronic
I'm not an IT guy so I have to defer to others. But, like with all conspiracies, the more people involved, the more likely (exponentially likely) that somebody will have a laptop or work station somewhere with all of this shit sitting on its hard drive and forgot about it. Or, maybe somebody who didn't get the plum job they expected from Bushco will turn state's evidence.
Printer Friendly | Permalink |  | Top
 
Lena inRI Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:25 PM
Response to Reply #158
220. Exactly, centralscrutinizer. . .hubris every time. . .
brings down the house of cards. . .

OR I could see a Deepthroat II presenting the incriminating emails as part of his/her covert sting of the Bush criminal enterprise. . .in that case, duty, honor, and country are the motives.

Let's hope for either or both scenarios. . .wait and watch. . .


:popcorn: :popcorn: :popcorn: :popcorn: :popcorn:
Printer Friendly | Permalink |  | Top
 
SpunkMonkey Donating Member (27 posts) Send PM | Profile | Ignore Thu Apr-12-07 02:37 PM
Response to Original message
161. Recommended reading, for "Solo_in_MD" alone
I won't bother anyone with my credentials, but everything I've seen from Solo_in_MD reads true from my experiences. There certainly are cases where data is still retrievable when all hope was lost, but that's common knowledge and easily exploitable. Those who understand the how and why of this can easily get around that with a little planning and creativity.

Yavin4z: Please, just chill. Have a cookie. If you have can point to specifics we're all interested to read it. But now you're just inviting condescension.
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:51 PM
Response to Reply #161
169. Like I Said, Because of My Job, I Cannot Get Into Details
And I won't argue any more. I will be polite and respectful when it's shown to me. When it's not, I will respond in my own way even if that means cursing.

Let me just say this, if you believe that no incriminating evidence/data can ever be recovered from certain server configurations, then you are playing with fire my friend. But, if I'm a newbie, if I am dumbass MCSE, if I'm wrong, and you all are genius ITers, then go right ahead and put whatever you want on your servers legal or not.

I won't argue with you.
Printer Friendly | Permalink |  | Top
 
ProdigalJunkMail Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 02:56 PM
Response to Reply #169
171. now THAT is right...CERTAIN configuration is the key phrase
I agree with you on this 100%. If you don't know what you are doing just about anything can be recovered from your system in the correct timeframe. But, as pointed out upthread...data can be well destroyed and irrecoverable (or the DOD/NSA/CIA would not have a hard drive in existence).

sP
Printer Friendly | Permalink |  | Top
 
Norrin Radd Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:43 PM
Response to Original message
186. It doesn't matter whether or not the emails can be recovered.
What matters is that the opposition has to sweat it out, thinking they may not have covered their tracks as well as they might. And the fright could cause them to slip up.
Printer Friendly | Permalink |  | Top
 
haktar Donating Member (108 posts) Send PM | Profile | Ignore Thu Apr-12-07 03:48 PM
Response to Original message
187. Don't forget the human factor
1st:
read solo_in_md's postings he's technically absolutely correct

it's absolutely possible to "loose" emails (or any data) in a way that's forensically un suspicious
If you have an MX record in the DNS system your mails are not stored on any other computer on the net.
For example none of the server i sat up leaves any evidence behind.

BUT:
I've set up a lot of mail servers. (Weather in Solaris or Linux
or even Exchange(to solo: no, i don't have a MCSE) i always added protection against DAUs (Dümmster annzunehmender user, or in english:
DIU: dumbest imaginable user.(or 12 o'clock flashers if you prefer this expression)).
So all my data is always saved regularly. Depending on the amount of users or traffic it's saved
4 times 2 times 1, times an hour, 4 times 2 times 1 times a day , 4,times 2 times one time a week ... (you get the impression). So , if let's say 13 days of emails or an email here and a email there are lost, it's definitely deliberate. While this may not be enough to prosecute * in a court, it should be suspicious enough to have a vote of no confidence like we say here or like you say: "Impeach the bastard".

To solo_in_md: Shouldn't we fire up hydra and install bofu on the RNC servers ? :-,
(ok I'm a coward, all pptp and ipsec connections i have are to client computers, and i don't want my clients to get in trouble, but maybe you have a bot network ?)

PS: skip the welcome messages, i'm here for several years, i just don't post very often.
Printer Friendly | Permalink |  | Top
 
LSK Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 03:58 PM
Response to Original message
190. another IT guy here who ran Eudora Worldmail Server for a while
The email files would come onto the Email server and when the user checked his email, the files would be downloaded to the users PC email software(Outlook) and the email is not kept on the server.

However, there are log files but log files only say where what came from and when, it does not record the contents of the emails.

As far as emails kept on ISPs on the internet in the route from point A to point B, that is pure rubbish. Anyone who knows TCP/IP knows that emails are broken up into packets and the packets take different routes to arrive at the destination.

So in summary, it is not a stretch to conclude that emails are lost.

Printer Friendly | Permalink |  | Top
 
nonny Donating Member (309 posts) Send PM | Profile | Ignore Thu Apr-12-07 05:49 PM
Response to Original message
197. So.......... What about this new law?
Dec. 1 (2006) : The Supreme Court ruled Friday that companies must keep all employee e-mails, instant messages and other electronic documents as possible evidence to present in court if necessary. NBC’s Michelle Franzen reports.


New rules make firms track e-mails, IMs
Rules benefit some companies that help businesses track and search

AP Associated Press
Updated: 7:07 p.m. ET Dec 1, 2006


Snip--

Companies and other parties involved in federal litigation must now produce “electronically stored information” as part of discovery, the process by which both sides share evidence before a trial. Federal and state courts have increasingly been requiring the production of such evidence in individual cases, and the new rules clarify that the data will be required in federal lawsuits.

Under the new rules, an information technology employee who routinely copies over a backup computer tape could be committing “virtual shredding” once a lawsuit has been filed, said Alvin F. Lindsay, a partner at Hogan & Hartson LLP and expert on technology and litigation.
Companies still could routinely purge their archives if the data aren’t relevant to cases companies have pending or expect to face, though specific sectors such as financial services remain governed by other data-retention rules.

Company lawyers and information-technology staff will have to work more closely together to ensure that routine erasing of backup data doesn’t pose legal problems, Lindsay said, while also ensuring that lawyers know where their company’s data are stored.

Snip--

http://www.msnbc.msn.com/id/15984058/

So, I think this means that IT departments had to save emails since 12/1/06




Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:30 PM
Response to Reply #197
209. Only if they are in litigation or reasonable expect to be
Sarbanes-Oxley adds to that for financial data for certain companies.
Printer Friendly | Permalink |  | Top
 
achtung_circus Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:50 PM
Response to Reply #209
214. I just went and talked to my little brother
who works in SOX audit & compliance for a major bank. When I asked him about RNC and SOX he laughed. He says, and he is a guy who people listen to, that SOX applies to financial records for audit purposes. It does NOT apply to emails. He says that banks keep emails for 7 years, but that's under Bank Act (in Canada) and its American analogue.

He says the emails are gone from any competently configured server, but to pay close attention to what is found on workstations, especially laptops.

And yes, he's a lefty, I can hear him learning Pink's Dear Mr. President on the guitar as I type.
Printer Friendly | Permalink |  | Top
 
jgraz Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 06:10 PM
Response to Original message
198. You can delete some of the bits from all of the servers...
and you can delete all of the bits from some of the servers.

But you can't delete all of the bits from all of the servers.


These guys are so fucked.

Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 06:54 PM
Response to Original message
201. This IT guy should get another job
Edited on Thu Apr-12-07 07:18 PM by high density
He's been watching too much TV it sounds like to me. There are lots of other self proclaimed "IT Guys" on that thread that also have no clue what the heck they are talking about. There's just too much bullshit to counter.

Edit: This guy sums it up better than I could: http://www.dailykos.com/comments/2007/4/11/22220/7274/272#c272
Printer Friendly | Permalink |  | Top
 
happy5 Donating Member (57 posts) Send PM | Profile | Ignore Thu Apr-12-07 07:11 PM
Response to Original message
202. He's right, you can't delete everything...
once it has left your computer that is. If they subpoena the servers they are screwed. Maybe they won't find all of it but they will find plenty to go around.

The fact that they used outside email accounts is a felony in itself. That they erased, or "misplaced" them, is far worse.

Let Leahy Push, I think he already has a small sample of them, but wants to see who will bite.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:22 PM
Response to Reply #202
205. Not sure you have it quite right
1) The servers are the least likely place to find data, the recipients the most likely
2) The parallel network was set up to comply with other Federal IT rules
3) Its misuse for official function is the crux of the matter. How much, by whom, what content.

As someone else observed here, its going to be some grand theater
Printer Friendly | Permalink |  | Top
 
Beetwasher Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:20 PM
Response to Original message
204. ALL YOU TECHIE NERDS ARE MISSING THE POINT
Edited on Thu Apr-12-07 07:22 PM by Beetwasher
It's irrelevant whether or not you can or can't erase all traces of email. Who cares? Maybe it's possible, maybe it's not. The bottom line is this: IF YOU DID IT (however you did it, possible or not) IT'S SMOKING GUN EVIDENCE OF OBSTRUCTION OF JUSTICE. It means you DELIBERATELY made sure emails that by law SHOULD have been saved were not. End of story. Even if you tried and were unsuccessful, you tried to obstruct justice and you did it deliberately.
Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:26 PM
Response to Reply #204
206. How do you prove something has been deleted?
Edited on Thu Apr-12-07 07:28 PM by high density
That would work for emails that might have been forwarded outside or printed. But what law says you can't delete emails? The RNC is not under Sarbanes-Oxley, subpoena, or other sort of data retention requirements that I'm aware of.
Printer Friendly | Permalink |  | Top
 
Beetwasher Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:27 PM
Response to Reply #206
207. Umm, They've Already Admitted It (The WH, RNCand DOJ)
And it seems obvious that certain people already have SOME copies of some of the emails, which is why they are asking for the rest.
Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:33 PM
Response to Reply #207
210. I guess everybody who deletes email regularly needs to be
charged with obstruction of justice under your requirements.
Printer Friendly | Permalink |  | Top
 
Beetwasher Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:39 PM
Response to Reply #210
212. If They Work For The WH, Yes, Yes They Should
Duh.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Apr-13-07 10:37 PM
Response to Reply #212
224. INcluding their home systems? Where would the line be drawn for privacy for Gov or WH employees?
Printer Friendly | Permalink |  | Top
 
Beetwasher Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Apr-14-07 01:43 PM
Response to Reply #224
233. If They Are Doing Official Federal Business???
Edited on Sat Apr-14-07 01:44 PM by Beetwasher
That my tax dollars are paying for? Yes. Seriously, WTF are you talking about?

Umm, Einstein, they've admitted using these systems to do official WH business.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Apr-14-07 07:58 PM
Response to Reply #233
234. Your comment was that all encompassing that they should not ever be allowed to delete emails
My response was an effort to see just how broad you meant it. Did it include home or family systems.

Bear in mind that it has been acknowledged that Fitz had access to all of Rove's IT equipment, WH, RNC and personal.
Printer Friendly | Permalink |  | Top
 
Beetwasher Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Apr-15-07 09:58 AM
Response to Reply #234
235. Bullshit. No, It Wasn't
Edited on Sun Apr-15-07 10:00 AM by Beetwasher
WTF are you talking about? All encompassing? Bullshit. Only in your mind. It was made in the context of this situation, Einstein, which is about Gov't (WH) emails gone missing. Nice try, Chester.

"DELIBERATELY made sure emails that by law SHOULD have been saved..."

Reading comprehension and context, try it sometime.
Printer Friendly | Permalink |  | Top
 
Solo_in_MD Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:28 PM
Response to Reply #204
208. I don't think its quite a prima facie case without the emails
The parallel system was set up legitimately for good reasons. Clearly there was some bleed over. The samples released look fairly egregious. However, you do not have intent at this time. More over you do not have obstruction unless things were destroyed after investigations started. Up until then you have Title 44 violation at most by the staffers using the wrong system. The emails will tell us who, what, topics, etc. and are key. They are not going to be nearly as easy to retrieve as some here seem to think.

We need to get independent experts in to work this and so far its not happening.
Printer Friendly | Permalink |  | Top
 
Beetwasher Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 07:40 PM
Response to Reply #208
213. Umm, Things WERE Destroyed After The Investigations Started
Printer Friendly | Permalink |  | Top
 
HeeBGBz Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Apr-12-07 09:59 PM
Response to Original message
222. This thread is full of replies from someone on my Ignore list
It sure yanked someone's chain.

Excellent OP, btw.
Printer Friendly | Permalink |  | Top
 
AZBlue Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Apr-13-07 11:30 PM
Response to Original message
225. Thank you for this - I was wondering about that!
I always hear "be careful what you say in your work e-mail because it's never really deleted" - so "lost" e-mails made no sense to me whatsoever (and I don't even know IT).
Printer Friendly | Permalink |  | Top
 
lovuian Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Apr-14-07 12:14 AM
Response to Original message
230. Heres a thought What if Rove has a traitor who turns over their
blackberry with everything on it for immunity
Printer Friendly | Permalink |  | Top
 
mc jazz Donating Member (94 posts) Send PM | Profile | Ignore Sat Apr-14-07 01:50 AM
Response to Original message
231. No, he's correct. They're called 'backups'
Every IT operation in the world backs up it's data
This should be especially true for secure government system
In my company we backup every night and keep monthly tapes forever

Those emails are sitting on some backup medium in a fire safe
The truth is there's probably no will to find them

About once a month we get asked to restore deleted emails and we do, it's such a menial task just like resetting a forgotten password. As an IT guy I'm insulted by the idea we could lose the data we're paid to protect!!!
Printer Friendly | Permalink |  | Top
 
yurbud Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Apr-14-07 03:50 AM
Response to Original message
232. subpoena the route
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri May 03rd 2024, 10:36 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC