I just read a flurry of accounts describing the many ways the Bush Administration has repeatedly violated the Presidential Records Act.
There’s an excellent segment explaining why this act requires White House officials to communicate via their official e-mail addresses and how much of the activity behind the Gonzales / AG firings scandal took place on RNC servers, where the data transmitted could be encrypted, deleted, and stay out of the public eye. You can click here and listen to the segement on this from this weekend’s On the Media:
Additionally, we now know that the White House has added five years of delay into the process of releasing presidential records (since 2001) if for nothing else than to cover their asses.
Further investigation of this issue points to conspiratorial — but heavily documented — accusations that Karl Rove is the kingpin of covert (and illegal) e-mail communications in concert with a Republicans-trusted server farm based in Tennessee.
UPDATE: Coptix is now taking credit for manufacturing the digitally altered photo referred to below.
This post at CorrenteWire explains best how a recent photo of Rove with a Coptix folder unravels into a long paper trail of activity involving the nameserver gwb43.com and Rove (he privatized his e-mail there). This method helps him, and other White House staffers, like his ex-assistant Susan Ralston, feel confident that they will not be held liable as they can destroy any evidence that might lead to a subpoena. But, alas, might the circumvention of white house communication policies alone be enough to serve a subpoena. Furthermore, the same company, Coptix, also SmartTech, is said to have been involved with filtering election results through their servers.
OK, now — I know it’s April Fool’s Day and this sounds incredibly tin-foiled-hatty as I’ve tried to relay it, but listen to the short radio piece and read the Corrente piece (and comments)…. Of course, this isn’t the first (or last) time BushCo will be caught breaking laws, but…
Finally, in another careless and potentially fatal blow (the Department of Homeland Security seems to be able to do whatever it wants):
“At an ICANN meeting in Lisbon, the US Department of Homeland Security made it clear that it has requested the master key for the DNS root zone. The key will play an important role in the new DNSSec security extension, because it will make spoofing IP-addresses impossible. By forcing the IANA to hand out a copy of the master key, the US government will be the only institution that is able to spoof IP addresses and be able to break into computers connected to the Internet without much effort. There’s a further complication, of course, because even ‘if the IANA retains the key … the US government still reserves the right to oversee ICANN/IANA. If the keys are then handed over to ICANN/IANA, there would be even less of an incentive [for the U.S.] to give up this role as a monitor. As a result, the DHS’s demands will probably only heat up the debate about US dominance of the control of Internet resources.'”