Feeds

Palin demands $15m to search her own emails

The cost of transparency

Website security in corporate America

US vice presidential candidate Sarah Palin isn't saying citizens interested in open government can't get access to her emails. She's just saying it will cost a little.

The office of the Alaska governor, which by state law is required to make such messages public, says it could cost more than $15m for anyone conducting an exhaustive search. Even then, Palin - who ran for governor on a platform of running a clean and transparent government - says requests won't be honored until November 17, two weeks after the presidential election is held.

It's fair to say that interest in Palin's email has spiked since Republican presidential nominee John McCain named her as his running mate. Not only has her office been swamped with requests for copies of state records, but her personal Yahoo email account was breached and some of its contents were posted to the Wikileaks site.

The leak offered evidence strongly suggesting that Palin conducted official state business using the very unofficial gov.palin@yahoo.com email address. Messages sent to it bore subject headings such as "Draft letter to Governor Schwarzenegger," "Court of Appeals Nominations" and "CONFIDENTIAL Ethics Matter." Critics say her use of the Yahoo account could violate Alaska open records laws that require official communications to be available to members of the public.

An Alaska state judge has ordered Palin to preserve the contents of the account.

The emails Palin's office has valued at $15m were sent by various state employees to her husband, Todd, who is not a state employee. State bean counters say it will cost $960.31 to search each employee's account. If email for all 16,000 employees are processed, the exact figure is $15,364,000.96. They figure it will take 13 hours per email account. That figure doesn't include the cost of the paper. The office will only make the email available in hard copy.

Palin may portray herself as a Washington outsider unversed in the sleights of hand politicians use to keep Joe Six-Pack from seeing what's really going on in government. But in Alaska, she knows how it's done. ®

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.