The CRUtape Letters™, an Alternative Explanation.

By charles the moderator

Rodin’s The Thinker at the Musée Rodin.

Author CJ. Licensed under Creative Commons.

I have a theory.

With the blogosphere all atwitter about the emails and data “stolen” from the Climatic Research Institute at the University of East Anglia, two theories have become dominant describing the origin of the incident.

  1. CRU was hacked and the data stolen by skilled hackers, perhaps an individual or more insidiously some sophisticated group, such as Russian agents.
  2. An insider leaked the information to the NSM (non-mainstream media)

Theory number one is the preferred explanation of the defenders of CRU. This allows them to portray CRU as victims of illegal acts. It allows them to scream bloody murder and call for an investigation of the crime. How can we take the fruits of hideous crime seriously?  The end does not justify the means!

One of our favorite writers, Gavin Schmidt, has expanded on this theme with the report:

He  [Gavin] said the breach at the University of East Anglia was discovered after hackers who had gained access to the correspondence sought Tuesday to hack into a different server supporting realclimate.org, a blog unrelated to NASA that he runs with several other scientists pressing the case that global warming is true.

The intruders sought to create a mock blog post there and to upload the full batch of files from Britain. That effort was thwarted, Dr. Schmidt said, and scientists immediately notified colleagues at the University of East Anglia’s Climatic Research Unit.

http://www.nytimes.com/2009/11/21/science/earth/21climate.html

I believe the above statement by Gavin to be a big bunch of hooey. I believe the “hack” was a posting of the same blog comment which was posted at The Air Vent

which was also submitted here at WUWT, but never was visible publicly, because all comments are moderated and publicly invisible until approved by an administrator or moderator.  Many of you have already seen it:

We feel that climate science is, in the current situation, too important to be kept under wraps.

We hereby release a random selection of correspondence, code, and documents.

Hopefully it will give some insight into the science and the people behind it.

This is a limited time offer, download now:

http://ftp.tomcity.ru/incoming/free/FOI2009.zip

Sample:

0926010576.txt * Mann: working towards a common goal

1189722851.txt * Jones: “try and change the Received date!”

0924532891.txt * Mann vs. CRU

0847838200.txt * Briffa & Yamal 1996: “too much growth in recent years makes it difficult to derive a valid age/growth curve”

0926026654.txt * Jones: MBH dodgy ground

1225026120.txt * CRU’s truncated temperature curve

1059664704.txt * Mann: dirty laundry

1062189235.txt * Osborn: concerns with MBH uncertainty

0926947295.txt * IPCC scenarios not supposed to be realistic

0938018124.txt * Mann: “something else” causing discrepancies

0939154709.txt * Osborn: we usually stop the series in 1960

0933255789.txt * WWF report: beef up if possible

0998926751.txt * “Carefully constructed” model scenarios to get “distinguishable results”

0968705882.txt * CLA: “IPCC is not any more an assessment of published science but production of results”

1075403821.txt * Jones: Daly death “cheering news”

1029966978.txt * Briffa – last decades exceptional, or not?

1092167224.txt * Mann: “not necessarily wrong, but it makes a small difference” (factor 1.29)

1188557698.txt * Wigley: “Keenan has a valid point”

1118949061.txt * we’d like to do some experiments with different proxy combinations

1120593115.txt * I am reviewing a couple of papers on extremes, so that I can refer to them in the chapter for AR4

I was the first at WUWT to see the comment above and immediately embargoed it. After discussions and many phone calls, we finally began to refer to the information after, and only after, we saw that it was available elsewhere, such as The Air Vent, and also after we knew that CRU was aware that it was circulating on the web.

Gavin’s elaborate description of the hacking attempt at RC is, in my humble opinion, nothing more than an attempt to add meat to the hacking theory in order to increase the vilification of the theoretical hackers.  Gavin has demonstrated this kind of misdirection in the past in the Mystery Man incident where he attempted to obfuscate his own involvement in a data correction to station files held by the British Antarctic Survey.  In this new spirit of transparency Gavin, why don’t you send Anthony the log files that demonstrate this attempted break in at realclimate.org?

And then Raymond T. Pierrehumbert also weighs in on this poor real-climate-scientist-as-victim meme or point of view.

After all, this is a criminal act of vandalism and of harassment of a group of scientists that are only going about their business doing science. It represents a whole new escalation in the war on climate scientists who are only trying to get at the truth. Think — this was a very concerted and sophisticated hacker attack. …Or at the next level, since the forces of darkness have moved to illegal operations, will we all have to get bodyguards to do climate science?

Sigh…and sigh again.

Theory number two is the preferred explanation of, for want of a better term, the Skeptics Camp.  It is a romantic  thought.  Some CRU employee, fed up with the machinations, deceit, and corruption of science witnessed around him or her, took the noble action of becoming whistle-blower to the world, bravely thrusting the concealed behavior and data into the light for all to see.  This theory is attractive for all the right reasons. Personal risk, ethics, selflessness etc.

I would like to offer a third possibility based on a bit of circumstantial evidence I noticed on the Web Saturday afternoon.

There’s an old adage, never assume malice when stupidity or incompetence will explain it.

A short time ago there was a previous  leak of CRU data by an insider.  In this case, Steve McIntyre acquired station data which he had been requesting for years, but someone inside CRU unofficially made the data available.

In this case, many commentators had various guesses as to the motivation or identity of the disgruntled mole even proposing that perhaps a disgruntled William Connelly was the perpetrator.

Of course it turned out the Phil Jones, director of CRU, himself had inadvertently left the data on an open FTP server.

Many have begun to think that the zip archive FOI2009.zip was prepared internally by CRU in response to Steve McIntyre’s FOI requests, in parallel with attempts to deny the request in case the ability to refuse was lost.  There are many reasons to think this is valid and it is consistent with either of the two theories at the beginning of this post.  Steve McIntyre’s FOI appeal was denied on November 13th and the last of the emails in the archive is from November 12th.

It would take a hacker massive amounts of work to parse through decades of emails and files but stealing or acquiring a single file is a distinct possibility and does not require massive conspiracy.  The same constraints of time and effort would apply to any internal whistle blower.  However, an ongoing process of internally collating this information for an FOI response is entirely consistent with what we find in the file.

In the past I have worked at organizations where the computer network grew organically in a disorganized fashion over time.  Security policies often fail as users take advantage of shortcuts to simplify their day to day activities. One of these shortcuts is to share files using an FTP server.  Casual shortcuts in these instances may lead to gaping security holes.  This is not necessarily  intentional, but a  consequence of human nature to take a shortcut here and there. This casual internal sharing can also lead to unintentional sharing of files with the rest of the Internet as noted in the Phil Jones, CRU mole, example above.  Often the FTP server for an organization may also be the organization’s external web server as the two functions are often combined on the same CPU or hardware box.  When this occurs, if the organization does not lock down their network thoroughly, the security breaches which could happen by accident are far more likely to occur.

Since Friday November 20th a few users noticed this interesting notice on the CRU website.

This website is currently being served from the CRU Emergency Webserver.

Some pages may be out of date.

Normal service will be resumed as soon as possible.

Here is a screen grab for posterity.

CRU embergency webserver notice

So as part of the security crackdown at CRU they have taken down their external webserver? Network security professionals in the audience will be spitting up coffee all over their keyboards at this point.

So this is my theory is and this is only my theory:

A few people  inside CRU possessed the archive of documents being held in reserve in case the FOI appeal decision was made in favor of Steve McIntyre.  They shared it with others by putting it in an FTP directory which was on the same CPU as the external webserver, or even worse, was an on a shared drive somewhere to which the  webserver had permissions to access. In other words, if you knew where to look,  it was publicly available.  Then, along comes our “hackers” who happened to find it, download it, and the rest is history unfolding before our eyes.  So much for the cries of sophisticated hacking and victimization noted above.

If I had to bet money, I would guess that David Palmer, Information Policy & Compliance Manager, University of East Anglia, has an even chance of being  the guilty party, but it would only be a guess.

To repeat the basic premise of this theory.

There’s an old adage, never assume malice when stupidity or incompetence will explain it.

CRUtape Letters, is a trademark of Moshpit Enterprises.

Get notified when a new post is published.
Subscribe today!
0 0 votes
Article Rating
474 Comments
Inline Feedbacks
View all comments
hotrod
November 23, 2009 3:49 pm

I is certainly possible the described sort of accident where data was pulled off of an open server is a more viable explanation than a hacking incident, but that still raises the question of why the data was bundled together in the first place.
I have seen institutional reactions to FOI requests first hand. In our case we got a FOI request and my supervisor was tasked with gathering the raw data for the response. He gathered a bunch of us together and told us in no uncertain terms, that screwing with a FOI request was not an option, that they would satisfy the request, and everyone was to be diligent in collecting anything and everything they knew of that “might” be relevant. Only after it was all pooled together would they cull out stuff that did not really fit the letter of the FOI request. This was in the 1980’s and our agency had boxes and boxes of paper records in a warehouse and a whole group of us went down to the warehouse and pulled all the record boxes and we each sat on the floor and went through the boxes we were assigned to screen page by page and pulled each and every page we found that had the slightest possible relationship with the request.
This file could fit that description as a first pass data mining operation to pull possibly relevant documents.
That said there is also much to be said for the idea that this file represents someones insurance policy.
Due to the high level of political intrigue in large government organizations a lot of folks both nefarious and ethical keep “little black book” files. The ethical folks do it to cover their butt if they are tasked with doing something that is deep in the gray area that they are not comfortable with. They make such protestations of the action that they can when it is proposed and then do it, but keep evidence that supports their view that something fishy was going on.
Some do it as an emergency “pay back file” for other folks in the agency that have done them or one of their friends wrong. That can then be used as an insurance policy if things go south at a later date, or if they are sufficiently aggrieved , as a “dish served cold” when the time is right.
Sort of like the events portrayed in the movie “Clear and Present Danger”, where both Jack Ryan and his nemesis are keeping track of each others activities.
I would find either possibility equally likely in a highly political organization. Many folks who work in those sort of highly political organizations quickly learn, that if a certain person does something to someone else, that they would have no compunction against doing it against you. The natural defense for that sort of potential ambush some time in the future, is to keep notes that will document behavior that are both undesirable and desirable. I know of cases where folks smelled a rat in a situation and made a point of sending a memo or email that documents that they were not comfortable with that decision or that they were complying with a given request under protest.
On superficial reading that document appears to make them just one of the guys, but if you look closely at the word choices, could also exist only to document that the person did not really support the action.
It might be interesting to data mine those emails to see if any specific person consistently includes such “I’m not sure this is the way to go” statements, or included tell tales that the email was sent to document some off the cuff conversation or phone call etc. that without that paper trail would be completely off the record.
Larry

John G. Bell
November 23, 2009 3:49 pm

The spin from the AGW side has changed. I think the spinners have been told to get under their desks and duck for cover. That this is not a drill.
Interesting that this message could get out so rapidly and be believed instantly. It argues it came from the high priests of AGW themselves.
Free the data. Free the code. Free the debate.

November 23, 2009 3:50 pm

Alumni Letters Coming to Penn State Calling for Ouster of Michael Mann
http://icecap.us/images/uploads/November_23.pdf

November 23, 2009 3:51 pm

Another FOOBL moment.
ABC Radio at 5.00am this morning had Tim “Hot Rocks” Flummery making excuses about context etc, and all the evidence for greenhouse happening. This was the very FIRST mention from the ABC that anything unsual had happened.
But then on A.M. this morning there was a fairly good discussion of it and interviews with former Chancellor(?) and Dr Watson. So the wheels are slowly creaking into motion.
If only someone smarter and with deeper pockets than me would write “You’re a liar” in the British press and challenge Jones to sue for libel.
We live in interesting times.
By the way most of the hot weather has passed, rain and a cool change have arrived in central Australia (Bedourie 18 degrees below average set a new record) .
Keep up the good work fellas!

Frank
November 23, 2009 3:55 pm

I have a theory along similar lines to 3, but not so innocent….
I have a theory, only a theory though…. What if all the e-mails and data is really a ‘delete’ file directory.
You are an organization who might be forced to imminently disclose embarrassing information that you do not want revealed. Further, it is a large amount of data and correspondence between many people and sources going back over a numbers of years. Let us further suppose that you are ‘important’ people with a lot of work to do before an important conference. What would you do?
You would get some bright ‘on message’ underlings (the sort of people you would find on a University campus) to go through all the files and delete anything incriminating. But of course you could not allow them to do this as they went along; too much chance of deleting important non-incriminating stuff. So you get them to put it all in one directory so that you can vet it first before it is all destroyed. But what if one of the underlings had some integrity and made a copy before the big deletion. As it is mainly text data rather than pictures, it would all transfer very quickly to a small flash card. Just a theory though….

rbateman
November 23, 2009 3:56 pm

Oh, I appreciate the service Glen Beck does, whom he speaks to, and the courage he displays on a daily basis.
It takes guts to get on the air and challenge ‘the science is settled’ agenda.
You see, 99.9% of Americans are NOT scientists.
So, if you don’t like Glen Beck taking up cause on behalf of the 99.9% of us, please roll out your 2009 version of Carl Sagan.

Roger Knights
November 23, 2009 3:58 pm

James Hastings-Trew (14:22:22) :
“You really need to change the word in title of this from “Alternate” to “Alternative”. Two different words, two different meanings. It stabs me in the brain when I see it. :P”
“Reply: Just for you, I shall make it happen.” ~ ctm

Thanks. There’s another benefit: it deprives The Other Side of an opportunity to stick in a “[sic]” when quoting your thread title.

Joseph
November 23, 2009 3:59 pm

I have a different theory, as far as the emails go. I have been searching through the emails using years as key words (i.e.”1996”, 1997”, 1998” etc.) so that I could view all the emails for a year in chronological order.
There are a lot of junk emails in there; housekeeping, meeting announcements, newsletters, travel arrangements and just your general blah, blah blah. These would not have been incorporated into a potential FOIA release file.
There are also weird ones like:
http://www.eastangliaemails.com/emails.php?eid=303&filename=1048106475.txt
and:
http://www.eastangliaemails.com/emails.php?eid=806&filename=1182795642.txt
These look like they may have been interrupted during download.
I think that these were a random selection of emails (as was claimed) that were selected using a multiple keyword search much like many of us have been doing at anelegantchaos.org (which has changed to eastangliaemails.com). It screened out “Honey, don’t forget to bring home milk”, but included office junk because they contained the keywords that were used, which makes sense.
Here is an example of the junk, a newsletter from “Earth Government” advocating a centralized one-world government. It was probably received as spam by someone at CRU:
http://www.eastangliaemails.com/emails.php?eid=304&filename=1048799107.txt
This has nothing to do with the work CRU does (Well, not directly anyway…), but it does contain the word “climate”. Interestingly, this email has a “From” line, but no “To” line. WUWT?
I have figured out that the search string “briffa climate research data” will extract 938/1073 of the emails, but I cannot figure out what the last keyword(s) are. Maybe someone else can figure out a better set of keywords, but I’m sure this is how it was done. Nothing else makes sense, because of the office junk, but not personal junk that was included.
BTW, in the initial news stories, Phil Jones claimed that CRU was aware of the hack 3-4 days before the .zip file appeared online. Bull. The .zip file contains an email dated Nov 12, the same day the .zip file appeared at the Russian ftp site. Now, unless this was an ongoing hack over many days, that they couldn’t stop, I think ole Phil was just trying to make it appear as though CRU was always on top of the hack, and doesn’t mind telling a porky to give that impression. Jeez, that comes so easily to this group.
So who did it? I think it had to be a CRU insider who was aware of SteveM’s FOIA request (and that it was going to be denied), who got fed up and scraped the files, compiled the .zip file, named it appropriately and uploaded it to the ftp site all on the same day (Nov 12).
BTW2, I visited that ftp site and learned that it is all in Cyrillic (Russian) which I guess is no surprise, but I sure would hate to be a CRU worker known to be fluent in Russian right about now. (Does Briffa speak Russian?)

Roger Knights
November 23, 2009 4:00 pm

Mike McMillan (14:16:23) :
Roger Knights (09:18:30) :
Jamie (10:06:28) :
“You might be wondering why an antisesquipedalian grammar n*zi like moi would not have leapt into the middle of the “alternate/alternative” controversy by now. …”

Congratulations–that’s a wonderfully sly dig at my “latitudinarian.” (I was hoping someone would rise to the bait.)

Roger Knights
November 23, 2009 4:04 pm

NK:
………….
and the bigger scandal — as always– is the FOI cover-up. Unforgivable.”

Let’s not lose sight of the culpability of the FOI officer in allowing himself to be “snowed”–and maybe his superiors.

Harold Blue Tooth (Viking not phone)
November 23, 2009 4:08 pm

so if ctm’s guess is right then it is some one from inside with a conscience
I also expect that if it really is him then he knew what he was doing was not breaking any laws. he may have actually been acting in line with his duties and will suffer no consequenses
but FOIA did say ‘we’ not ‘I’, or, more than one person
pass the popcorn! i’m intrigued!

November 23, 2009 4:12 pm

NK (15:45:21),
Thanks for posting that link. One interesting comment posted under the article:
“The American legal principle of withheld evidence is simple: If the party who controls the evidence refuses to provide it, it is permissible to infer that the evidence is contrary to the withholding party’s interests.”
It’s difficult to not infer that.
Jimmy Haigh’s link above is also very interesting. Michael Mann is not a Penn State alumni, although he’s employed there. The way it looks, he is tarnishing Penn’s reputation. Penn State alumni should make their feelings known.

vigilantfish
November 23, 2009 4:13 pm

Grumbler:
Re George Monbiot’s admission that he’s a dreadful journalist: I agree with your first comment, “wow” – I found myself repeating that over and over as I read your summary. I’m beginning to have hope that the CRUtape letters are going to have an effect on the MSM and the AGW debate sooner rather than later. Wow!

AKD
November 23, 2009 4:15 pm

I do not buy this stuff as prepackaged for potential FOI release. The NOAA funding e-mail, for example, does not seem to have any bearing on any of the known FOI requests, but it is certainly something someone might want to sweep under the carpet. Furthermore, no individual FOI request was broad enough to encompass even a fraction of what is contained in the archive.

Albert Coakes
November 23, 2009 4:16 pm

Guess what? The BBC has just covered this story in “Newsnight”. Jeremy Paxman was almost unbiased. No less than Fred Singer was on the prog and of course aquitted himself admirably.
Lets hope it grows and grows and brings some sense to Copenhagen – or is that too much to hope for?

Harold Blue Tooth (Viking not phone)
November 23, 2009 4:17 pm

disgruntled William Connelly was the perpetrator
I will assume stupidty on theorizing William Connelly was the perp. he’s been working for years in Wikipedia to create his green image of global warming in it’s pages. why would he do anything to harm manmade global warming????????

Alexandre
November 23, 2009 4:19 pm

Is this not indication of a crime?
From: “Mick Kelly”
To: Nguyen Huu Ninh (cered@xxx)
Subject: NOAA funding
Date: Tue, 24 Jun 2003 14:17:15 +0000
—-boundary-LibPST-iamunique-1131694944_-_-
Content-Type: text/plain; charset=”utf-8″
Ninh
NOAA want to give us more money for the El Nino work with IGCN.
How much do we have left from the last budget? I reckon most has been spent but we need to show some left to cover the costs of the trip Roger didn’t make and also the fees/equipment/computer money we haven’t spent otherwise NOAA will be suspicious.
Politically this money may have to go through Simon’s institute but there overhead rate is high so maybe not!
Best wishes
Mick
____________________________________________
Mick Kelly Climatic Research Unit
School of Environmental Sciences
University of East Anglia Norwich NR4 7TJ
United Kingdom
Tel: 44-1603-xxx Fax: 44-1603-xxx
Email: m.kelly@xxx
Web: http://www.cru.uea.ac.uk/tiempo/
1056478635.txt

November 23, 2009 4:22 pm

Slightly Off Topic.
RC is trying to spin this story in the most favorable light, focusing on the Soon 2003 paper to prove how inept the skeptic argument is when looking at the e-mails. I wrote a reply and posted on my blog. It’s too long to post here so here is the link.
I’m off to Washington now and will be off the grid for a couple of days.
Mike..

StuartR
November 23, 2009 4:26 pm

Joseph (15:59:28) :
http://www.eastangliaemails.com/emails.php?eid=303&filename=1048106475.txt
and:
http://www.eastangliaemails.com/emails.php?eid=806&filename=1182795642.txt
Both of these are complete in the actual zip file version. I guess some glitches may have occurred when it was all put in this searchable form?

J.Hansford
November 23, 2009 4:26 pm

Yep, scenario number 3. It was named FOI2009 for a reason.
The reason is obvious. They had it ready in case the FOI application by Steve McIntyre was successful….. It was unsecured and was revealed by a curious reader…. No hack. No mole. No whistle blower…. Just negligent security practices by CRU and co.

Robinson
November 23, 2009 4:31 pm

Lets hope it grows and grows and brings some sense to Copenhagen – or is that too much to hope for?

That is indeed too much to hope for. Government policy is like an oil tanker (that wasn’t a deliberate attempt at topical humour), it takes a long time to turn around.
First, a suitable exit strategy has to be found. This usually involves commissioning a whopping review that doesn’t report until the main players have retired. Secondly, the Minister for Climate Change has to change his title to Minister for Energy Security, thereby allowing the government to continue with exactly the same policies, but offer grants to a completely different set of scientists to do research and give advice on this completely different issue. Only then will the government be in a position to do precisely what it intended to do all along: raise taxes.

PR Guy
November 23, 2009 4:34 pm

J.Hansford (16:26:37) :
You know, had they produced this file as a result of the FOI, it would have had some impact, but not nearly the impact its having as a result of it being
“hacked”
Could it really be that they hoisted themselves on their own pitard? SMc would enjoy the irony.

jh
November 23, 2009 4:35 pm

Joseph (15:59:28) :
Turkey, Russia? = clues here maybe
http://www.eastangliaemails.com/emails.php?eid=462&filename=1105019698.txt
> > As you may remember, I was just in Turkey in October interacting with
> > many people in their climate group. They have a pretty good team.

Capn Jack Walker
November 23, 2009 4:40 pm

Free the Penguins and set Willy free.
Why are we chasing Cool Throat, they the nefarians, are not denying the emails as fakes, they are screaming context and personal messages.
I agree with Charles to a degree, that it is substandard network control as most likely, because let’s face it when the code for the climate models are examined it’s a nightmare.
This was not the work of a moment. The level and specifity of content means someone had a lot of time.
Me I say thanks. CT.

Manniac
November 23, 2009 4:44 pm

Oh Mosh, your such a tease!

1 13 14 15 16 17 19