Feeds

Climategate: Why it matters

The scandal we see and the scandal we don't

  • alert
  • submit to reddit

High performance access to file storage

Analysis Reading the Climategate archive is a bit like discovering that Professional Wrestling is rigged. You mean, it is? Really?

The archive - a carefully curated 160MB collection of source code, emails and other documents from the internal network of the Climatic Research Unit at the University of East Anglia - provides grim confirmation for critics of climate science. But it also raises far more troubling questions.

Perhaps the real scandal is the dependence of media and politicians on their academics' work - an ask-no-questions approach that saw them surrender much of their power, and ultimately authority. This doesn't absolve the CRU crew of the charges, but might put it into a better context.

After a week of scrutiny of the emails, attention is now turning to the programming source code. Three quarters of the material released is the work of the academics, much of which they had jealously guarded. This includes a version of the world's most cited and respected temperature record - HADCRUT - and a number of surveys which featured prominently in the reports of the UN's climate change panel, the IPCC. The actors here shaped the UN reports, and ultimately - because no politician dare contradict the 'science' - shaped global policy.

The allegations over the past week are fourfold: that climate scientists controlled the publishing process to discredit opposing views and further their own theory; they manipulated data to make recent temperature trends look anomalous; they withheld and destroyed data they should have released as good scientific practice, and they were generally beastly about people who criticised their work. (You’ll note that one of these is far less serious than the others.)

But why should this be a surprise?

The secretive Jones is no secret

The secretive approach of CRU director Jones and his colleagues, particularly in the paleoclimatology field, is not a secret. Distinguished scientists have testified to this throughout from the early 1990s onwards. A report specifically commissioned four years ago by Congress, the Wegman Report, identified many of the failings discussed in the past week.

Failings are understandable, climatology is in its infancy, and the man-made greenhouse gas theory is a recent development. However no action was taken. A little like Goldman Sachs, the group that includes the CRU Crew was deemed to be too important to fail - or even have the semblance of fallibility.

A lightning recap of what CRU is, and what role it plays, helps bring the puzzle out of the shadows.

High performance access to file storage

More from The Register

next story
IBM Hursley Park: Where Big Blue buries the past, polishes family jewels
How the internet of things has deep roots in the English countryside
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Honeybee boffin STINGS OWN WEDDING TACKLE... for SCIENCE
Not the worst place to be stung, says one man
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.