Nemo me impune lacessit

No one provokes me with impunity

____________________________________

No Title of Nobility shall be granted by the United States: And no Person holding any Office of Profit or Trust under them, shall, without the Consent of the Congress, accept of any present, Emolument, Office, or Title, of any kind whatever, from any King, Prince, or foreign State.

Article 1, Section 9, Constitution of the United States

If this is the law of the land...why in a republic (little r) and as republicans, do we allow mere POLITICIANS to the right to use a "title of office" for the rest of their lives as if it were de facto a patent of nobility. Because, as republicans, this should NOT be the case...just saying...

The Vail Spot's Amazon Store

Tuesday, November 24, 2009

Climategate: Expert Prognosis, Hack Was Inside Job

An excellent sysopsis of how a hack is done has been posted on "Its Tea Time" blog.

Hit the title to a link for a full read...and I suggest that you read "the whole thing" as Glenn Reynolds would say.
An often cited statistic above is "80% of hacks are from insiders". True, but it does depend on what manner of hack to stay within that statistic. Further, many hacks are simply not reported.
Will's conclusion is that the hack was conducted by someone on the inside who is angry that at FOIA request was denied. He concludes this from the date/time of some of the last emails, etc.:

Update: I found the following report from Steve McIntyre's blog (a prominent climate change critic) pointing out further evidence it may have been an insider, based partly on a very recent FOIA refusal from CRU.
Additionally, he concludes that, I am, personally still not ruling out the possibility of an outside, foreign intelligence agency being behind the hack. This is because of the monetary motive, the sophistication of the release, the history of intelligence based hacking against even human rights organizations, and the history of such attacks being generally something which comes "from the outside" when the logs are posted publicly. It should be noted that this would be an extremely dangerous, diplomatically attack to perform. So, in this case, the FOIA angle would be cover, or as they say, "plausible deniability". A red herring.

For me, this simply raises the probability this hack was performed "from the inside".

No comments: