IDG News Service - An anonymous hacker has posted private e-mails, files and other documents belonging to a noted climate researcher, sparking an international debate between skeptics of global warming and those who see it as an urgent problem.
The files include about a decade of e-mail correspondence belonging to Phil Jones, director of the Climatic Research Unit at the University of East Anglia in Norwich, England. Shortly after news of the leak began circulating Thursday, critics of global warming science zeroed in on some of the messages as evidence of bias in the climate research community.
Jones' e-mails offer some candid insight into the thoughts of a noted climate researcher and his peers.
A spokeswoman with the University of East Anglia confirmed that the data was taken from a university server, but noted that because "of the volume of this information we cannot currently confirm what proportion of this material is genuine."
"We are undertaking a thorough internal investigation and we have involved the police in this enquiry," she added.
On Friday, the research unit's Web site had been moved to an emergency Web server, presumably as a result of the breach.
The e-mail, which includes Jones' correspondence with other researchers and journalists, can be searched here.
The RealClimate Web site, a forum for climate change scientists, disputed skeptics' claims that the e-mails showed any attempt to manipulate results. "More interesting is what is not contained in the emails," the site noted. "There is no evidence of any worldwide conspiracy, no mention of George Soros nefariously funding climate research, no grand plan to ‘get rid of the MWP’ [Medieval Warm Period], no admission that global warming is a hoax, no evidence of the falsifying of data, and no ‘marching orders’ from our socialist/communist/vegetarian overlords."
Judging from the data posted, the hack was done either by an insider or by someone inside the climate community who was familiar with the debate, said Robert Graham, CEO with the consultancy Errata Security. Whenever this type of incident occurs, "80 percent of the time it's an insider," he said.
E-mail data dumps are a familiar way of settling grudges in the hacker community, but they happen in the political world too. Last year, former Alaska Governor Sarah Palin's Yahoo Mail correspondence was published after a hacker managed to reset her account password.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cybercrime and Hacking White Papers | Webcasts