{"id":5335,"date":"2023-02-06T05:07:36","date_gmt":"2023-02-06T11:07:36","guid":{"rendered":"https:\/\/ustower.net\/?p=5335"},"modified":"2023-02-06T05:07:39","modified_gmt":"2023-02-06T11:07:39","slug":"exclusive-supreme-court-justices-used-personal-emails-for-work-and-burn-bags-were-left-open-in-hallways-sources-say","status":"publish","type":"post","link":"https:\/\/ustower.net\/?p=5335","title":{"rendered":"Exclusive: Supreme Court justices used personal emails for work and \u2018burn bags\u2019 were left open in hallways, sources say"},"content":{"rendered":"<p>Long before the leak of a draft opinion reversing Roe v. Wade, some&nbsp;Supreme Court&nbsp;justices often used personal email accounts for sensitive transmissions instead of secure servers set up to guard such information, among other security lapses not made public in the&nbsp;court\u2019s report&nbsp;on the investigation last month.<br \/>\nNew details revealed to CNN by multiple sources familiar with the court\u2019s operations offer an even more detailed picture of yearslong lax internal procedures that could have endangered security, led to the leak and hindered an investigation into the culprit.<br \/>\nSupreme Court employees also used printers that didn\u2019t produce logs \u2013 or were able to print sensitive documents off-site without tracking \u2013 and \u201cburn bags\u201d meant to ensure the safe destruction of materials were left open and unattended in hallways.<br \/>\n\u201cThis has been going on for years,\u201d one former employee said.<br \/>\nThe problem with the justices\u2019 use of emails persisted in part because some justices were slow to adopt to the technology and some court employees were nervous about confronting them to urge them to take precautions, one person said. Such behavior meant that justices weren\u2019t setting an example to take security seriously.<br \/>\nThe justices were \u201cnot masters of information security protocol,\u201d one former court employee told CNN.<br \/>\nIn a statement attached to the final report, the court called the leak a \u201cgrave assault\u201d on the court\u2019s legitimacy and the marshal of the court issued a road map to improve security.<br \/>\nThe report and the new revelations of weak protocols come as the court is trying to protect its own legitimacy after an embarrassing leak and allegations (prompted by the recent rash of high profile cases breaking along familiar ideological lines) that it has simply become another political branch. The 20-page report and its still secret \u201cAnnex A\u201d raised some questions as to whether the entire investigation should have been outsourced to someone without close ties to the court.<br \/>\nFormer Secretary of Homeland Security Michael Chertoff reviewed and endorsed the Supreme Court\u2019s internal investigation into the leak. However, the court\u2002did not disclose Chertoff had been paid at least $1 million&nbsp;in recent years to perform security assessments for the court.<br \/>\nThe court declined to comment.<br \/>\nOpen \u2018burn bags\u2019 left lying around<br \/>\nIn her report last month, Supreme Court Marshal Gail Curley noted that the \u201ccourt\u2019s current method of destroying court sensitive documents has vulnerabilities that should be addressed.\u201d<br \/>\nThree former employees told CNN of loose security around burn bags that are supplied to chambers to deal with sensitive documents. A burn bag is a security bag that holds sensitive documents which will ultimately be destroyed by fire or shredding.<br \/>\nThere was no uniform rule that established a procedure for these paper bags with red stripes. Instead, the justices each have their own protocols. According to a source familiar with the court\u2019s security practices, employees have the option to use the burn bags which are later taken to the basement of the building and emptied into locked bins so that they can be retrieved by a shredding company.<br \/>\nAnother source questioned how the burn bags were handled before they were collected. The source said some colleagues would staple a burn bag shut. Others simply filled them to capacity and left them near their desks. But some burn bags were simply left in the hallway outside of chambers, presumably so that they could be taken to the basement. It would not have been difficult, the source suggested, for someone with access to the non-public area of the court to access sensitive documents.<br \/>\nRemote access let employees print docs from anywhere<br \/>\nAnother vulnerability outlined by Curley was printer logs meant to track document production. A former employee highlights something that Curley did not detail: employees who had VPN access could print documents from any computer, making it difficult to track copies. Curley made an important concession in the report that some locally connected printers only logged the last 60 documents printed.<br \/>\nA look at the timeline of the leak reveals how such a system would be problematic for investigators.<br \/>\nThat\u2019s because the initial draft was distributed internally on February 10, 2022. But the leak investigation only started in May when Politico published the draft opinion. Some of those print logs would almost surely no longer exist because the 60-document threshold had been reached.<br \/>\nCurley did not go into great detail, but she did suggest the court \u201cinstitute tracking mechanisms\u201d in the future.<br \/>\nAnother potential problem revolved \u2013 especially during Covid \u2013 around the possibility that opinions could leave the building. According to the report, Court Information System User Guidelines prohibit \u201cattempting to leave facilities with Court Sensitive Information (hard copy or electronic) without proper authorization.\u201d<br \/>\nBut during Covid many such regulations were necessarily relaxed. And even with the rule in place, one source said, there were no mechanisms to check what was actually being taken from the court. To be sure, the hallways in the areas of the court that are closed to the public were guarded and protected by doors with a numerical code necessary to enter, but the code wasn\u2019t necessarily changed very often.<\/p>\n<p>Cnn<\/p>\n<p>Tags\uff1a personal emails<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Long before the leak of a draft opinion reversing Roe v. Wade, some&nbsp;Supreme Court&nbsp;justices often used personal email accounts for sensitive transmissions instead of secure servers set up to guard such information, among other security lapses not made public in the&nbsp;court\u2019s report&nbsp;on the investigation last month. New details revealed to CNN by multiple sources familiar [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5336,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1154],"tags":[1723,2281,2280],"class_list":["post-5335","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trending","tag-court","tag-justices","tag-supreme"],"_links":{"self":[{"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/posts\/5335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ustower.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5335"}],"version-history":[{"count":2,"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/posts\/5335\/revisions"}],"predecessor-version":[{"id":10122,"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/posts\/5335\/revisions\/10122"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/media\/5336"}],"wp:attachment":[{"href":"https:\/\/ustower.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ustower.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ustower.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}