Missing e-mails should be on backup tapes, White House CIO says

E-mails from the White House, which watchdog groups alleged to be improperly deleted between 2003 and 2005, may exist on backup tapes, the White House chief information officer claims in court documents filed yesterday.

During the 2006 Valerie Plame incident, in which presidential aides were found to have leaked Plame's CIA identity to the media, Special Counsel Patrick Fitzgerald disclosed that not all e-mail traffic at the White House and in the office of Vice President Dick Cheney was preserved properly during certain time periods in 2003. Such preservation is required under the Presidential Records Act. The White House blamed the oversight on a technical glitch. In October 2007, the government watchdog groups National Security Archive and Citizens for Responsibility and Ethics, both based in Washington, filed lawsuits requesting that the courts order the White House to produce the e-mails -- estimated to total between 5 million to 10 million -- that were improperly deleted from White House computer servers.

On Jan. 8, 2008, a federal magistrate ordered the White House to reveal within five business days whether copies of the missing e-mails had been stored on computer backup tapes.

"At this stage, this office does not know if any e-mails were not properly preserved in the archiving process," said Theresa Payton, CIO of the Office of Administration in the Executive Office of the President. Her statement appeared in a declaration filed with the court in response to the Jan. 8 order.

"However, in view of this office's practice in the 2003-2005 time period of regularly creating backup tapes for the EOP network, which includes servers containing e-mails, and in view of this office's practice of preserving all such backup tapes from October 2003 to present, the backup tapes should contain substantially all the e-mails sent or received in the 2003-2005 time period."

The office is trying to determine if there may be anomalies in "e-mail counts for any particular days" during the time period in question, which would result in the potential failure to properly archive messages, Payton wrote.

An investigation is under way to determine whether the alleged missing e-mails resulted from the White House's failure to properly archive messages. Meredith Fuchs, general counsel for the National Security Archive, said in a written statement that the White House's explanation raises more questions. "The White House seems to be changing its story," Fuchs wrote. "This declaration may mean that records about policy and decisions in the Executive Office of the President are not entirely lost, but in many respects, it raises more questions. We still do not know what was lost, why it was lost, and what steps we have to take to recover it -- assuming it is still recoverable.

"While finding out some information from the White House has been a victory, I fear we have many battles ahead of us to preserve the documentary history of the government for eventual access," she said.

Payton also noted in her declaration that prior to October 2003, backup tapes were recycled "consistent with industry best practices relating to tape media management for disaster recovery backup systems."

Fuchs responded to that point, writing, "It strikes me as odd that they recognized a problem and changed their practice in 2003 to start saving the e-mail backups, but four and a half years later, they have not yet figured out whether anything of significance happened."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.