Feeds

Wrecking CRU: hackers cause massive climate data breach

Secretive scientists' source code goes walkabout

The smart choice: opportunity from uncertainty

The University of East Anglia has confirmed that a data breach has put a large quantity of emails and other documents from staff at its Climate Research Unit online. CRU is one of the three leading climate research centres in the UK, and a globally acknowledged authority on temperature reconstructions.

CRU declined to say whether it would attempt to halt the data breach. In a statement a spokesman told us:

We are aware that information from a server used for research information in one area of the university has been made available on public websites. Because of the volume of this information we cannot currently confirm that all of this material is genuine.

A 61MB ZIP file was posted on a Russian FTP server late last night, local time. It contains over a thousand emails, and around three thousand other items including source code and data files. Emails are peppered with disparaging remarks and a crude cartoon of sceptical scientists is also included in the archive - suggesting the hacker roamed wide across the University's servers.

A spokesman confirmed there had been a hack, and that staff documents had been published, but declined to say whether the University would be seeking to halt further dissemination of the data.

This information has been obtained and published without our permission and we took immediate action to remove the server in question from operation. We are undertaking a thorough internal investigation and we have involved the police in this enquiry.

CRU has been the centre of controversy for its roles in creating global temperature reconstructions, and maintaining the archive of temperature data. Recent temperature reconstructions characterise post 1980 temperatures as unprecedentedly warm, and downplay historical periods of warm weather. This is the so called "Hockey Stick" controversy, and many (but far from all) of these reconstructions involve key CRU staff.

In August, Phil Jones admitted CRU had failed to keep the raw data, which would permit outside parties to create their own temperature reconstructions. More recently, CRU dendroclimatologist Keith Briffa defended his sampling methodology which saw the inclusion of one tree core from the Yamal Peninsula create a Hockey Stick shaped graph, dubbed the "hottest tree in the world".

The documents also appear to highlight a chummy relationship between sympathetic journalists - particularly the New York Times Andrew Revkin - and activist scientists.

They're being discussed at Steve McIntyre's Climate Audit here - but there's no reaction yet at the blog frequented by the participants of "Hockey Team", as they have styled themselves, RealClimate.

It would be premature to comment further on the contents of the archive without establishing its authenticity. Some emails contain curious idioms and spelling - but perhaps that's what years of dendroclimatology do to the brain.

®

Eight steps to building an HP BladeSystem

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
MARS NEEDS OCEANS to support life - and so do exoplanets
Just being in the Goldilocks zone doesn't mean there'll be anyone to eat the porridge
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Diary note: Pluto's close-up is a year from … now!
New Horizons is less than a year from the dwarf planet
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.