Note: I felt Steve’s essay deserved the wider audience that WUWT could provide. Be sure to go to this thread at CA to post comments. – Anthony
Did Jones Delete Emails?
By Steve McIntyre, Climate Audit
It turns out that Muir Russell didn’t bother asking, since that would have exposed Jones to potential liability.
But in a surprising new turn of events, it seems that VC Acton sort-of did what Muir Russell was supposed to do – ask Jones whether he had deleted emails. The Guardian reports Acton’s testimony as follows:
Prof Phil Jones told the University of East Anglia’s boss that he did not delete any of the emails that were released from the university last November, despite apparently saying he would in one of those emails.
In the narrowest sense, the very existence of the Climategate emails seems to show that, whatever Jones may or may not have attempted to do, he had not deleted the emails that survived on the back up server.
But, needless to say, you have to watch the pea under the thimble as there is more to the story than this, as I found out last spring.
Jones’ delete-all-emails request was directed particularly at the Wahl-Briffa exchange about IPCC in summer 2006. (In a related emails, Jones said that Briffa should deny the existence of such correspondence to the UEA administration – something that was never investigated as misconduct.)
Wahl’s insertions in the IPCC report – the unilateral changes in assessment that do not appear to have had any third party oversight other than Briffa’s – were made in attachments to his emails to Briffa.
Last spring, I sent an FOI request to the University of East Anglia for the attachments to the Wahl emails that would show precisely what Wahl had inserted. These, of course, are precisely the sort of thing that Muir Russell panel was obligated to examine but didn’t bother.
Contrary to claims by Jones and Acton that nothing had been deleted, the University refused the FOI request on the basis that the attachments had been deleted, that they no longer possessed the attachments to the emails – see previous review here.
In response to my request, they said:
We were unable to provide the following four documents as we had determined that these were no longer held by the University and cited Reg. 12(4)(a):
AW_Editorial_July15.doc
AR4SOR_BatchAB_Ch06_ERW_comments.doc
Ch06_SOD_Text_TSU_FINAL_2000_12jul06_ERW_suggestions.doc
Ch06_SOD_Text_TSU_FINAL_2000_25jul06KRB-FJRV_
ERW_suggestions.doc
There is no single repository in which all information is held and in order to determine whether the University holds specific information searches are required in a number of locations. I have reviewed the criteria and searches that were undertaken to locate the requested documents and agree with the assessment that these documents are no longer held and agree that Reg. 12(4)(a) applies in this instance.
Acton tells the Sci Tech Committee that nothing has been deleted, but when asked for the documents that Jones specifically asked to be deleted, the university refuses the FOI request on the basis that they no longer have the documents.
Needless to say, Muir Russell didn’t bother trying to figure out what was going on.
=======================================================
Meanwhile in the UK, yet another select committee inquiry is in progress, as Josh points out:

I guess it’s a bit like the thing brought up a few posts ago. It depends on how you look at it….
If you increase the number of deleted emails in my hand from 4% to 5% is that an increase of 1% or 20%?
Therefore the emails which were deleted could also be the emails which were hacked, but also could be the emails that were unreleased but were either hacked (or not)!!
Of course it may be that the emails which were not deleted which were hacked were the ones which were or were not released? (I should have been a lawyer) – or a politician?
Oh dear, Phil Jones and Muir Russell both caught with their trousers down!
This is going to run and run as there are still a handful of influential politicians in Westminster who won’t let this matter rest. The next few weeks should be very interesting – must order some more beer and popcorn!
If I understood the original post correctly the sensitive material was in the attachments not the emails themsleves. So the changes could have been to delete the attachments leaving the emails themselves untouched. If that is the case he can completely correctly claim he has not deleted any emails nor did he modify the email itself. Non the less the sensitive data would indeed have been expunged. If true an interesting escape on a technicality.
Henry chance says:
October 27, 2010 at 9:02 am
We are approachin g the 1 year anniversary of the leak. Why haven’t they named the hackers?
Well, Henry, that’s a very good question!
Perchance could it be –would it be– that the ‘leak’ was intended to forestall a ~real~ investigation into matters, and was instead used to ‘entertain,’ i.e., distract, the hoi polloi whilst something else very much bigger was taking place?
Yes, I know: That’s giving them way too much credit!
But still: FDR once remarked “Nothing happens in politics, but that it was made to happen.”
And we’re NOT dealing with science here. Rather, it’s all a matter of politics.
For what it’s worth, take my word on this: We are all being played for fools if we buy into anything of what the cadre of insiders have lain out for us to consume.
If I read my ‘tea leaves’ correctly enough, this whole charade will be used to dismiss any further discussion, if only that it will be shown to have been an exercise in deception used to discover who the true believers are, and not.
Once the names and addresses have been collected, the net will become a ‘members only’ club, and the rest of us obviated like so much trash.
That’s my take.
Re R.Craigen
Yes and no. Postmasters feel free to correct me as I’m a bit rusty on this. Exim looks to be the UEA’s primary MTA. It uses a 3-part message-ID field. First part is when the MTA started receving the message in epoch time, next is PID, then another timestamp. Main aim is to create a unique message-ID for the file system to manage. I think that works for sent and recieved mail by the UEA’s MTA, so could be more useful to authenticate mails as being UEA’s rather than faked.
Searching the leaked mails by message-ID wouldn’t necessarily reveal much that’s not already known given much of the mail header data has been redacted for some reason. I think that’s odd for a hacker, less odd for an insider.
The file names do show an oddity, eg 1236958090.txt is dated in the message as Fri Mar 13 11:28:10 2009, but in epoch time that’s Fri, 13 Mar 2009 15:28:10 GMT. The offset’s lead to the ‘east coast connection’ theory, but isn’t always consistent. 0938018124.txt is Wed, 22 Sep 1999 12:35:24 -0400 in the message, but Wed, 22 Sep 1999 16:35:24 GMT in epoch so no offset. I’ve not checked all the mails, but assuming someone with better text munging skills than I may have.
For FOI, I think people have already asked the right questions, but the leak allows follow-on questions based on the content. Recipients and subjects are probably more useful for those. What can’t easily be examined by outsiders and should have been is whether the archives show attempts to delete contentious emails. That would need access to the archives and is something that none of the previous inquiries has done. All they did is ask polite questions, and seemingly accept the answer.
ClimateGate: the gift that keeps on giving.
(h/t, don’t remember who originally said this some months ago, but i like it 🙂 )
Why would they be so foolish as to label the “dump” file for emails (that appear to be targetted for discussion/preparation/deletion) something as “obvious” as FOIA>>>?
Are they truly that much of the ivory-towered professors?
As i’ve commented over at Lord Bish. This is Quantity not quality.
There were three official investigations of this incident. None were meant to conclude anything other than all were innocent of the charges levelled against them. It’s what happens in official channels provided a politician somewhere is able to escape criticism, whether they be bureaucratic or scientific politicans. The UK is famous for it, a la Sir Humphrey Appleby, “never hold a public enquiry unless you know the outcome before hand!”, etc. Take the Iraq War enquiry for example, which was taken seriously, but the terms of reference were deliberaltey set so as not to embarrass the government as crucial questions could not be asked as they were outside those terms of reference. It’s very easy really. These climategate enquiries were just for show, no body actually seriously probed anything at all, all passed the buck, claiming it was someone elses fault/remit & not theirs, etc. It was pathetic & embarrassing quite frankly but sadly rather typical & expected, considering so much money was involved in funding, reputation, & policy! I ask you, one asks an accused if he did something wrong, he says no, & it is accepted without further question! Pathetic!
The three ‘enquiries’ in the UK are a wonderful example of the mind-bending arrogance and contempt the ruling elites common to most nations holds what they view as the hoi polloi in. They are not even wonderfully intelligent, just contemtuous of those of us who do not happen to be members of their club. Our role is obviously to merely pay up and keep the tax monies flowing[,] to shut up, but the current members of the establishment have no idea of the power of the internet and its ruthlessly democratic mechanisms. The truth will emerge and justice will be done. Eventually.
Sorry, mods, but I omitted a comma after ‘flowing’, which wrecks the sense of what I was attempting to express. Could you insert the comma for, please?
Thanks in anticipation.
However, if you send an email with an attachment. The attachment is on the server and it is usually stored (at least in a temp dir) on the receiving parties hard drive if the receiver opens the attachment. So in fact, many things, in many places had to have been deleted for the attachments to have disappeared.
I distinctly heard Acton saying the emails were still there, so how come the FOI was refused?
Can’t Actons testimony to the S&TC be used to show they have them, and appeal the original FOIR based on Actons own words?
There are three kinds of white-wash. There is the sophisticated white-wash, that you have to read three times before you get it. There is the thinly veiled white-wash that sounds nice until you think about it. Then there is the blatant white-wash that does not pretend to be anything but a white-wash ie. PSU-Michael Mann.
Alexander K says:
Alexander K says:
In fact I’ve long thought that their attitude toward us was similar to the attitude of medieval lords toward their “serfs’.
There are three kinds of white-wash. There is the sophisticated white-wash, that you have to read three times before you get it. There is the thinly veiled white-wash that sounds nice until you think about it. Then there is the blatant white-wash that does not pretend to be anything but a white-wash ie. PSU-Michael Mann.
“PS I’m getting hassled by a couple of people to release the CRU station temperature data. Don’t any of you three tell anybody that the UK has a Freedom of Information Act !”
-Professor Phil Jones, in charge of climate research at the CRU
http://www.eastangliaemails.com/emails.php?eid=498&filename=1109021312.txt
PS sorry I messed up the block quote before.
Paddy says:
———-
No thanks for giving lawyer bashers more ammunition to disparage us.
———-
No danger of that, I already have enough ammunition.
But while I am here I would like to run a scenario past a couple of lawyers.
A client comes to you because he is being sued to collect a debt. He has a long list of about a dozen reasons why he does not have to pay. They range through claims that the suer provided services incompetently, breach of contract, refusal to accept reduced rates of payment and multiple instances of fraud. There is an implicit promise that if these reasons are not enough, more can be found. There are even daily progress report emails which your client spins as evidence of incompetence.
What do you reckon is the probability that your client has commissioned services from the suer, but had no money to pay for them? In other words which party is likely to be the crook and who is the victim?
Eric Dailey says:
———–
THE central question remains: why don’t we know who leaked?
———–
An interesting question!
I was struck recently by a newspaper story which described how a fox uk news
reporter was gaoled for hacking into mobile phones, most particularly of the Royal family. Fox denied that this was common habit but the story indicated that it was widespread.
The police investigation had a very narrow focus and it was insinuated that this was because the police wanted to keep fox on side. Resourcing constraints due to terrorism investigations is the official position. This got me thinking about the hacker in climategate. Was the hacker a hostile journalist?
Eric Dailey says:
October 27, 2010 at 1:45 pm
THE central question remains: why don’t we know who leaked?
________________________________
Can’t resist –
We all leak, it’s just a natural function found in all life forms. Western sensitivities being what they are, is there little wonder then that we still do not know who leaked? (I should add, Eastern sensitivities are also such that they rarely, intentionally reveal who leaks.) But, the question of ‘Who?’ in this case, is one that I’m sure the folks at CSI, CSI-NY, and CSI-Miami are all working on as we speak. Whoever it was doesn’t stand a chance.