Feeds

Obama balks at recovery of lost Dubya emails

Another executive privilege

Choosing a cloud hosting partner with confidence

The Obama administration promises transparency and accountability in Washington, but it's siding with George W. Bush's view of executive privilege in an attempt quash recovery of what could be millions of missing White House emails.

Two open-government watchdog groups suing the Executive Office say White House emails documenting key points in Bush's presidency may be lost forever to the office's allegedly shoddy archiving processes. The National Security Archive and Citizens for Responsibility in Washington are calling for intervention of the Attorney General under the Federal Records Act.

In response, the Bush White House said it had found 14 million of the missing emails and claimed the lawsuit was now moot thanks to preservation of backup tapes which could be used for the eventual restoration of almost all the missing data. The groups shot back saying the controversy won't be resolved by "untested scraps of evidence" and that there's still a risk the data could be lost or deleted.

The watchdogs hoped executive efforts to block the email recovery would end with the new administration, but just one day after Obama was sworn in, the Justice Department filed a new motion to dismiss the recovery lawsuit. Last Friday, the Obama administration missed its deadline to withdraw the motion.

"President Obama on Day One ordered the government to become more transparent, but the Justice Department apparently never got the message, and that same day tried to dismiss the very litigation that has brought some accountability to the White House e-mail system," Archive director Tom Blanton said in a statement. "Justice could have pulled back from that first misstep but they have not. The White House e-mail presents a high-level test of the new Obama openness policies, and so far, the grade is at best an incomplete."

The groups allege the still-missing emails cover messages written in 2003 through 2005 — covering the the lead-up to the invasion of Iraq, the Valerie Plame leak investigation, and the federal government's (lack of) response to Hurricane Katrina.

CREW's top lawyer Anne Weismann said the group was disappointed the Obama administration is no more eager to recover the missing emails and set up a proper system to preserve records than Bush and company. ®

Intelligent flash storage arrays

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.