‘Richard Windsor’ Was Up on His Ethics, Cybersecurity and Records Management Training

WASHINGTON, D.C., June 3, 2013 — Richard Windsor may not ever have existed as an employee at the Environmental Protection Agency. But he was up to date on his training for both ethics and records preservation, according to emails revealed today by the Competitive Enterprise Institute.

Following up on revelations of former EPA administrator Lisa Jackson’s false-identity email account plainly in violation of the Federal Records Act and EPA policy, Christopher Horner, senior fellow at CEI, asked for any certification of Jackson receiving e-mail, recordkeeping and ethics training.

It turns out Jackson completed training in ethics for 2010, 2011 and 2012 as her alter ego/false identity, Richard Windsor, as well as training for document preservation and how to deal with whistleblowers.

‘Windsor’ scored a 100 on cyber security awareness, but had various scores – one as low as 75 – on whistleblower training.

Eric Wachter, director of the EPA’s Office of the Secretariat, said Jackson “completed the EPA-hosted, computer-based training while using [the Richard Windsor] account.”

‘Richard Windsor’ was the fake name Jackson used for an alternate email address created for certain correspondence with her inner circle both inside and out of government. EPA has claimed this account was for internal use only – one in a series of what seem to be false claims made to get past the seemingly endless revelations of unlawful behavior.

Horner discovered Jackson’s alias email address – Richard is the name of her dog; Windsor comes from East Windsor, N.J., where she used to live – during research for his book, ‘The Liberal War On Transparency.’

Horner has since sued EPA seeking emails to and from the Windsor account, as well as text messages and IM communications of various senior EPA officials and correspondence to, from and about EPA’s ‘chosen’ environmentalist pressure groups. EPA has refused to produce – or produced only heavily redacted documents – in response to virtually all Horner’s requests.

Jackson took the cybersecurity awareness training in her own name in 2010 but had ‘Windsor’ take it for her in 2011.

“I don’t know how grown men and women could think having a non-existent employee take tests for the administrator of an agency – or have the administrator receive training under a false identity – is acceptable,” Horner said.

“This series of attestations that a non-existent employee completed required training reveals corruption to the core of the Agency. The best one can say is that, if you’re going to use a false identity for federal recordkeeping purposes, the fake employee may as well be fully certified in the law and ethics of the matter.”