Posted on 11/21/2014 2:03:17 PM PST by CivilWarBrewing
Up to 30,000 missing emails sent by former Internal Revenue Service official Lois Lerner have been recovered by the IRS inspector general, five months after they were deemed lost forever.
The U.S. Treasury Inspector General for Tax Administration (TIGTA) informed congressional staffers from several committees on Friday that the emails were found among hundreds of disaster recovery tapes that were used to back up the IRS email system.
They just said it took them several weeks and some forensic effort to get these emails off these tapes, a congressional aide told the Washington Examiner.
(Excerpt) Read more at washingtonexaminer.com ...
“So legally, a bunch of admin people defrauded congress and perjured themselves. Which in non-bizzarro world would have legal consequences.”
They have no attachment to any reality except their agenda.
They can overcome the “optics” of their actions by lying and then saying they didn’t lie, by committing acts which are illegal and then saying they aren’t illegal and then calling into question the “critical thinking skills” of those who cited the illegality. The shame of the whole charade is that they have a larger and larger plurality of voters who love what they do.
IMHO
By comparing the “hash values” it should show if the files have been changed.
How do we know this isn’t better news?
The IRS is not allowed to use email for any client related matters due to the lack of privacy. I deal with the IRS on a regular basis and have heard this over and over from them.
Thus the emails should not need to be reviewed for taxpayer private information as it was against their own rules to include this information in emails.
LOL on the difference in standards for professional Congress critters and IT geeks.
Computer files have hash values.
What is a hash value? A judicial guide defines hash value as:
A unique numerical identifier that can be assigned to a file, a group of files, or a portion of a file, based on a standard mathematical algorithm applied to the characteristics of the data set. The most commonly used algorithms, known as MD5 and SHA, will generate numerical values so distinctive that the chance that any two data sets will have the same hash value, no matter how similar they appear, is less than one in one billion. Hashing is used to guarantee the authenticity of an original data set and can be used as a digital equivalent of the Bates stamp used in paper document production.
In forensic work such as pedophile computer searches, they just screen for the known hash values of common child porn photos rather than opening all the pics.
They should be able to compare the hash values of the delivered emails with the original back up values.
Flashback:
October 12, 2014
Republican Kansas Sen. Pat Roberts said Friday that he thinks the IRS targeting scandal was driven by Valerie Jarretts office in the White House, according to information that he saw that Democrats tried to whitewash.
http://www.teaparty.org/senator-valerie-jarrett-involved-irs-scandal-60978/#sthash.8MItEhiI.dpuf
I guess the IRS just learned of the election results. They must be soiling their pants.
I hope they sit tight on this info until Rick Snyder takes over the governorship so he can appoint the new senator. Carl Levin is going down.
They’re using Exchange servers, and the message store is one big, monolithic file. There are no individually discernible emails in the file - they have to be extracted to .pst files to be exported so what they have is not a copy of what’s on the tapes.
Amazing! Who could have guessed that any emails still existed? Well, except for every computer user with even the most basic knowledge of email.
He was a Dem from '85 to '90 when he switched. He's been a Pubbie ever since.
The same chance that Democrats will magically find enough votes to win close elections. In other words, 105%.
Here is an article on the extraction process.
Information security insights and other ramblings
Searching and extracting data from PST files(in a Linux environment)
http://dereknewton.com/2011/02/searching-and-extracting-data-from-pst-files/
A PST file is an offline message store, typically used for archival of old data or migrating data across domains, and only containing data for one mailbox. What’s on the servers will be EDB files. This is where the current, online data is stored. When you do legal discovery, you plug in search parameters, and the software finds the relevant items in the EDB file, and extracts it out into one or more PST files. Disaster recovery tapes would be backups of the servers.
Maybe they will find the missing EPA emails in the same place.
— The fact is President Obama will do with the stroke of a pen what 300 years of slavery, Jim Crow and legal segregation could not: destroy the hopes and dreams of millions of black Americans. His position on illegal immigration and reform is not tenable given the numerous sources of information that warn of the negative impact of immigration reform on black Americans and low-income Americans.
— Charles Butler - black talk radio host -
What’s the chance that bears do their business in wooded areas?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.