IDG News Service - An anonymous hacker has posted private e-mails, files and other documents belonging to a noted climate researcher, sparking an international debate between skeptics of global warming and those who see it as an urgent problem.
The files include about a decade of e-mail correspondence belonging to Phil Jones, director of the Climatic Research Unit at the University of East Anglia in Norwich, England. Shortly after news of the leak began circulating Thursday, critics of global warming science zeroed in on some of the messages as evidence of bias in the climate research community.
Jones' e-mails offer some candid insight into the thoughts of a noted climate researcher and his peers.
A spokeswoman with the University of East Anglia confirmed that the data was taken from a university server, but noted that because "of the volume of this information we cannot currently confirm what proportion of this material is genuine."
"We are undertaking a thorough internal investigation and we have involved the police in this enquiry," she added.
On Friday, the research unit's Web site had been moved to an emergency Web server, presumably as a result of the breach.
The e-mail, which includes Jones' correspondence with other researchers and journalists, can be searched here.
The RealClimate Web site, a forum for climate change scientists, disputed skeptics' claims that the e-mails showed any attempt to manipulate results. "More interesting is what is not contained in the emails," the site noted. "There is no evidence of any worldwide conspiracy, no mention of George Soros nefariously funding climate research, no grand plan to ‘get rid of the MWP’ [Medieval Warm Period], no admission that global warming is a hoax, no evidence of the falsifying of data, and no ‘marching orders’ from our socialist/communist/vegetarian overlords."
Judging from the data posted, the hack was done either by an insider or by someone inside the climate community who was familiar with the debate, said Robert Graham, CEO with the consultancy Errata Security. Whenever this type of incident occurs, "80 percent of the time it's an insider," he said.
E-mail data dumps are a familiar way of settling grudges in the hacker community, but they happen in the political world too. Last year, former Alaska Governor Sarah Palin's Yahoo Mail correspondence was published after a hacker managed to reset her account password.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts