December 8, 2009
Leaked or Hacked? The CRU Files Tell the Story
[Editors note: The notations cited below as “./(dir-name)” refer to the particular subdirectory's “dir-name" in the CRU files that have recently been released on the Internet. “./(dir-name)” is command-line notation in Unix and DOS.]
From day one of ClimateGate there has been conflict over how to frame the release: an illegal hack, or a protected leak by a whistleblower.
Many have commented that the incident has the signature of a leak. A network administrator, Lance Levsen, has conducted an analysis of the two main subdirectories of ./FOIA.
Regarding the highly ordered ./mail subdirectory, the author concludes that a hacker:
[Would] have to have access to the gateway mail server and/or the Administration file server where the emails were archived. This machine would most likely be an Administrative file server. It would not be optimal for an Administrator to clutter up a production server open to the Internet with sensitive archives.
Not being connected to the internet, access to an Administrative file server is only available to insiders.
Regarding the disorganized ./documents subdirectory, the author concludes:
I suggest that the contents of ./documents didn't originate from a single monolithic share, but from a compendium of various sources.
For the hacker to have collected all of this information s/he would have required extraordinary capabilities. The hacker would have to crack an Administrative file server to get to the emails and crack numerous workstations, desktops, and servers to get the documents. The hacker would have to map the complete UEA network to find out who was at what station and what services that station offered. S/he would have had to develop or implement exploits for each machine and operating system without knowing beforehand whether there was anything good on the machine worth collecting.
For the hacker to have collected all of this information s/he would have required extraordinary capabilities. The hacker would have to crack an Administrative file server to get to the emails and crack numerous workstations, desktops, and servers to get the documents. The hacker would have to map the complete UEA network to find out who was at what station and what services that station offered. S/he would have had to develop or implement exploits for each machine and operating system without knowing beforehand whether there was anything good on the machine worth collecting.
The analysis makes the case that the ./mail files were accumulated from archive files located on a UEA mail server, as opposed to a CRU departmental mail server. The case is made that the ./documents files are a collection of selectively copied files, some of which reference other files of interest that are curiously missing. Such selectivity would be expected in response to a contentious FOIA request. And since a) the FOIA officer involved operated at the UEA level, not the departmental level, and b) the contents of the./mail directory appear built from a UEA server, the author suggests that the ./FOIA file was most likely available to people on campus outside the CRU.
And since the broader UEA community is likely to include people less ethically challenged than CRU staff, access might have resulted in a leak.
FOLLOW US ON
Recent Articles
- A Multi-Point Attack on the National Debt
- Nearing the Final Battle Against the Deep State
- Now’s the Time to Buy a Nuke (Nuclear Power Plant, That Is)
- The Fall and Fall of the Associated Press
- Bill Gates and the AI Delusion
- New York Greenlights Quarantine Camps
- Reality Check for Democrats
- A MAGA Siege of the Democrats’ Deep State
- Why Incel and 4B Culture Matter
- Defending Donald Trump: A Response to Jeffrey Goldberg and The Atlantic on the Signal Leak
Blog Posts
- We must reclaim Islam from Islamism
- Texas under siege: the stealth Islamic takeover we can’t ignore
- The UFO mystery
- NYT: Dems in ‘denial’ about ‘comprehensive defeat’
- Stupiditywatch: Columbia's pro-Hamas protestors tear up their own diplomas for the cameras
- U.K. to institute two-tier system of justice?
- We remember those who served in Vietnam
- A curiosity about the DC District Court’s judges
- The 9th Circuit prepares to be reversed again
- Tim Walz really is a knucklehead
- A Ph.D. in ‘Molecular and Cell Biology’ shows the difference between credentials and knowledge
- Nasty Venezuelan migrant who flashed taxpayer dollars and urged squatting, gets thrown out
- Watch white leftist women’s brains breaking—and repairing—in real-time
- The last, best hope ...
- In Pennsylvania, are Democrats stealing votes again?