There’s an embedded archive file called all.7z which contains thousands of additional emails and files.
The 7zip archiver in which this is stored uses 256 bit AES encryption. It’s a tough nut to crack.
“FOIA” chose this most likely because there are no effective tools for 7zip, while there seem to be many for standard .zip and .RAR files.
From their website: http://www.7-zip.org/7z.html
“7-Zip also supports encryption with AES-256 algorithm. This algorithm uses cipher key with length of 256 bits. To create that key 7-Zip uses derivation function based on SHA-256 hash algorithm. A key derivation function produces a derived key from text password defined by user. For increasing the cost of exhaustive search for passwords 7-Zip uses big number of iterations to produce cipher key from text password.”
The password can be 2047 or 8191 characters long, depending on your operating system.
I’m doubtful this password will be cracked anytime soon, maybe DoD could do it. Chances are that “FOIA” chose a very long password, that could take years to crack by a brute force attack.
“FOIA” is holding this in reserve, making it known that it is there, ready to pull the firing pin. I expect we’ll see it sooner than later as the reaction so far from RC and the Team is continued arrogance.
Julian Williams in Wales has an interesting take:
Maybe the passphrase is so complex to be uncrackable; is that possible? Surely after having sat on this material for two years FOIA would have made a decision how he is going to play this, and it just makes no sense to put most of the material behind a crackable passphrase.
But supposing he then sent the passphrase to Phil Jones and M Mann with a threat; Resign now, get the hell out, otherwise this passphrase goes online to the general public. That is a strategy that might push FOIA’s enemies out without completely disgracing the “scientific community”
Just another way of looking at what might motivate FOIA.
Nearly got it. Give me another five minutes
“Option3 ?”
Insurance against the person controlling the files being arrested or otherwise forcibly silenced. The key would be in the hands of a third party with instructions to post it should anything happen to the person controlling the file release.
Maybe life insurance.
Has anyone tried downloading the 7-zip password cracker that is used when you forget the password to your 7-zip archive?
Jeff in Calgary says:
November 22, 2011 at 6:08 pm
Someone needs to setup a website that will allow you to enter your guess, and the page will try the password to see if it works. I would give it a few tries.
I’ve already got a few entries above.
Maybe also:
“Wedontneednostinkingpassword”
“Itisatreeringcircus”
Remember that this could be a more general email archive and that the files released to date are mostly on the subject of climate but there could be a lot more. One might gain an idea of how much more by looking at the size of the previous email dump plus the size of this batch of unencrypted email and getting an idea of how much more remains by seeing how much larger the encrypted blob is (assuming the encrypted bunch is a superset of what has been released to date).
For example, lets say there is email in there about a relationship infidelity or shady financial dealings. Maybe one might not want that archive to see the light of day. The point is, that there could be email in there on nearly any subject.
Does FOIA stand for Freedom of Information Act? – that is an interesting idea because that phase can have two meanings in English.
1 – “The Freedom of Information Act” was passed into law in the British Parliament in 2000 – the law Phil Jones despises
2 freedom of information act 2011 – an act for freedom in 2011 – which maybe what they are doing – Liberating science from the yolk of corruption and conspiracy.
Clever? Does anyone think this is why this appellation was chosen
This needs to be crowd sourced. Have multiple people brute forcing with various start points and lengths of digits.
Is it possible that whoever “obtained” the file received it in it’s present form and does not know the password?
freedom of information act 2011 – good passphrase
I suspect it has been designed to be cracked and the READ ME text contains the passphrase; that way when unlocked there is deniability by the people who set it up.
I cannot but note that many have commented on the unusual punctuation. Perhaps the correct punctuation is the key here.
“Cardin Drake says:
November 22, 2011 at 6:37 pm
Is it possible that whoever “obtained” the file received it in it’s present form and does not know the password?”
If the file was downloaded from a “secure server” it is unlikely that the users would have wanted to use a 8000 digit password. Such a longwinded papsword would be hell to use and only useful if it is protecting files in teh direct line of fire. (which appears to be why it has been chosen – that points to FOIA2011 putting the lock on)
Power and control is lost when the levers are released. FOIA retains control so long as it retains some emails even if the emails contain no damming content. FOIA wishes to retain control. The power to move the discourse from the climate-IPCC narrative to the narrative of conspiracy by the climate scientists serves EVERYONE except the climate science liars. This is done by holding back ostensibly blockbuster information.
I hope many of the emails are never released. It is due to the tantalizing nature of the email, the press is turning to the salacious nature of the back story. I blame Mann and Jones et al for creating the Peyton Place in the first place. They created this media monster and I want it kept alive…. eventually all we will have left is monster and people will equate the word climate to sleeze and forget about AGW..
Thank-you so much. Did you try the phrase? I still don’t have the zip to try it? GK
Why all the hurry to get at the remaining e-mails? Why not just let us enjoy this second batch first and give them a good going over. And then we can get on to the other 200,000 or so.
I am glad he/she did this.
We know this many headed monster just won’t die so there is now more ammo in reserve. We certainly needed Climategate II at this time.
Has anyone tried 1234?
That is a great idea. A large number of people trying phrases would represent a new form of “brute force” cracking.
Some organization offering a splashy prize could also be effective. What fun! GK
I think I have it:
Youknowwhathappenedbeforecoenhagenandnowyouseewhatscomebeforesouthafrica,doyoureallywanttoplananymoreofthesebigwarmistmeetings? Really?
“But supposing he then sent the passphrase to Phil Jones and M Mann”
It might show up in an email FOIA response. 🙂
8191 or 8192? I notice that one email is exactly 8192 characters in length. Wonder if that is the key for the rest: 3683.txt
Hi Anthony,
I don’t usually comment here, just read. I’m not a scientist, but I’m also not an absolute idiot who forgot my Biology 101 when I was a kid… so yeah, I don’t believe any of this AGW stuff.
Anyway, I am vastly experienced in the ‘Dark Arts’ (lol) of computer science. This might be my opportunity to contribute to the struggle and out this scam.
Can’t promise anything as I will need to examine the said zip file.
Thanks
Too funny. I am immediately reminded of Ghost Busters and the Key.
Ooooh this FOIA guy is a sly one. I think I just figured out his game.
Question: Who is sweating bullets right now trying to figure out what else is in those encrypted files and how bad it might be?
Answer: The Team
Question: How do you systematically break an encryption key?
Answer: A brute force attack which requires…supercomputers.
Question: Who has lotsa supercomputers at their disposal?
Answer: The Team
I’m betting the WE are going to be up all night reading the dirty slimeballs’ emails and mocking the feeble attempts of trolls to defend them. THEY are going to be up all night trying to break that encryption key.
I wonder if it actually is more emails? Or just an obscene taunt?
Speak Friend and Enter!
G. Karst A miracle has happened. Tried and and confirmed, also independently by Lucy Skywalker. A miracle has happened indeed.
Extracting now …