Posted on 07/20/2012 1:05:23 PM PDT by Ernest_at_the_Beach
Operation Cabin Q&As (from the Norfolk Police here PDF)
The following questions and answers are an abridged version of Norfolk Constabularys Operation Cabin media briefing held on Thursday 19 July 2012.
How do you know it was an external hack?
In outline terms, we know it came via the internet from a number of different IP addresses, in various countries, which may have been proxy servers.
The attack was, first of all, into the web server (CRUweb8) in the Climate Research Unit (CRU) at the UEA. From there, a link was established to a CRU back-up server (CRUback3).
Its fair to say, the university has to draw the right balance between giving access to information its an academic establishment and, as such, has a proportionate level of security which enables people to work remotely and access information to operate in that academic environment. As a consequence of the attack, the UEA has taken a number of measures and its ICT infrastructure now looks very different.
We identified that the attackers breached several password layers to get through and they got to a position where they employed different methodologies to return the data. We identified a significant quantity of data that was taken in this way, certainly in excess of that which was subsequently published in the two files in 2009 and 2011.
Weve used the expression sophisticated and thats because thats the view of our experts who conducted that side of the investigation for us. They identified that, as well as achieving the breach, they also took significant steps to conceal their tracks and lay false trails and change information available to us in order to frustrate the investigation. The conclusion was the person /s were highly competent in what they were doing.
That technical investigation was the primary line of investigation although we did cater for other possibilities, these were later ruled out.
Which specific countries were involved in the trail of proxy servers and which countries were either helpful or uncooperative in your investigations?
While we will not be confirming the names of the countries specifically, we can confirm there were a number across the majority of the continents.
We would underline that the use of a proxy server in any country is not necessarily evidence that the hack originated in that domain.
We worked with partners in these countries and the level of response and support we got varied from being excellent to being quite time consuming.
The logistics involved meant it was a complex picture with different legal jurisdictions and sovereignties. Sometimes its a procedural issue and sometimes its a political issue with a small or a big P.
Can you confirm that the US was helpful?
We will not confirm the identity of individual countries but we can say, in general terms, there is a healthy and productive relationship between law enforcement in the US and the UK.
Did you detect that any national government could be behind this?
No. The hypothesis was, and remains, that the person or persons responsible for this could be anyone on a spectrum from an individual right through to the other end of the spectrum, including commercial organisations and governments. It is obvious that some commercial organisations would have an interest in maintaining their commercial position; similarly there will be economies and governments which have an interest in protecting their position. To be clear, we did not get any indication as to who was responsible.
It is clear the person responsible has knowledge of this subject; did you interview all the bloggers that showed an interest?
We interviewed a number of people and the logistical issues involved meant that much of this work was carried out remotely because, physically travelling to countries, and the logistics involved in achieving that for the anticipated outcome would have not be proportionate.
Of course, the climate sceptic community would, in the main, give the appearance of welcoming the published data because it supports their view. Therefore, we were realistic about the prospect of them being helpful to our investigation.
Can you describe what investigations you undertook at the UEA and who you interviewed there?
The focus internally was on the IT infrastructure and working out from there. We also looked at people working at or with connections to the Climate Research Unit and, in simple terms, we were looking for anything obvious. All members of staff were interviewed. If someone had some obvious links or had an axe to grind, then that might have been a line of enquiry.
Generally speaking, it was a screening exercise which did not provide any positive lines of enquiry.
Whilst because we have not found the perpetrators we cannot say categorically that no-one at the UEA is involved, there is no evidence to suggest that there was. The nature and sophistication of the attack does not suggest that it was anyone at the UEA.
You say that the hacker had to go through a series of passwords; do you know that someone at the UEA would not have had access to these passwords?
Anyone with access to these passwords has been excluded as a suspect. Additionally, there was some evidence of work undertaken to break passwords.
It has been reported that the hacker accessed the server on three separate occasions, can you confirm if thats true and if there were any further attempts to access the server after climategate broke and have there been any recently?
The report is inaccurate. The attack was conducted over a period of time and access would have occurred on a number of occasions and certainly more than three. Of course, we only know what we know. I have already described it was a sophisticated attack; we have established a substantial amount of what happened. What I cant say is whether we have established everything that happened.
There were no further data breaches once the story had broken in November 2009, not least because we had taken possession of Cruback3 and it wasnt available to be accessed.
Do you know when the attacks began?
Theres a timeline of events and there has been speculation, in the media and the blogs,
that there may have been an orchestrated campaign of Freedom of Information requests to the University in the summer of 2009. It appears the attacks were undertaken late in that summer, early autumn, through to November. The first tactic that we were aware of was in September 2009.
There was news that some other institutions, including in Canada, that may have come under a similar attack at that time. Are there any other institutions that you have found that were attacked at this time?
We did have some dialogue and there were one or two that had been attacked and we did have a preliminary examination but they did not give us any indication or cause to suspect that it was in any way linked to the UEA.
What happens to Cruback3 now?
It has been returned to the University of East Anglia, having been retained as an exhibit through the course of the investigation. It was necessary to retain the actual server for this time. It contained a massive amount of data, something in the region of five terabytes.
When the second batch of e-mails was released, there was the note that came with them. Did you or your colleagues contemplate doing structural linguistics or analysis to try and trace it to a particular location in the world?
It was speculated on and it was something we did consider. Our conclusion was that it would be unlikely to take the investigation anywhere and, in fact, if you are trying to conceal your tracks it could have been constructed to mislead.
You have been restricted by the statute of limitations, would you have continued with this investigation otherwise?
The decision to close the case was a combination of the time limit and an acknowledgement that we had pursued this as far as we reasonably can.
Did you consider prosecuting people dealing in the information that was clearly stolen?
In terms of offences committed, it becomes a much greyer area. The same challenges exist in terms of identifying those individuals. An operational decision was made not to pursue this.
<Ends>
And so it goes.....
73 Responses to Media Questions and Answers from the Norfolk Police regarding the closing of Climategate
**************************************EXCERPT*****************************************
July 19, 2012 at 10:34 pm
What happens to Cruback3 now?
It has been returned to the University of East Anglia, having been retained as an exhibit through the course of the investigation. It was necessary to retain the actual server for this time. It contained a massive amount of data, something in the region of five terabytes.
===============================================================
Lets hope relevant FOIs can still proceed unless CRU is able to get away with stalling forever and/or wiping the server.
re: 5 terabytes, does that suggest there was a lot more docs and/or emails than what may be in the still encrypted zip file from FOIA?? I dont know the details such as the size of the zip file still out there
just wondering if the 5 terabytes on that server suggests anything, about how much selection and culling FOIA must have done (and why)???
***************************************EXCERPT*********************************
Carl Brannen says:
Of course, the climate sceptic community would, in the main, give the appearance of welcoming the published data because it supports their view. Therefore, we were realistic about the prospect of them being helpful to our investigation.
Hes saying that the emails support the skeptic community. Note he didnt say deniers.
Bump
***************************************EXCERPT**********************************
ken Methven says:
We identified a significant quantity of data that was taken in this way, certainly in excess of that which was subsequently published in the two files in 2009 and 2011.
WOW
more to come FOIA?
**************************************EXCERPT***********************************
************************************EXCERPT**************************************
David Ross says:
Of course, the climate sceptic community would, in the main, give the appearance of welcoming the published data because it supports their view.
Of course any honest person who actually read the emails would come to the same conclusion. I dont suppose this particualr statement by an investigating police officer will receive much coverage in the mainstream media. But it should. Again, why was there no police investigation based on the content of the emails rather than their hacking?
=======================================================================
Let me take a crack at that:
****************
Becaause this Global Warming Scam has FRIENDS IN HIGH PLACES
Nice investigation they got going on there.
*********************************EXCERPT***************************************
People persist in assuming that the police are stupid in this case. Its likely that they are not at all stupid, but clever enough to see nothing would be gained by pursuing this to the bitter end and actually finding the hero I mean, the dastardly culprit. The Norfolk police, like all the rest of us, are victims of the AGW fraudhigher taxes, higher gas, oil, petrol, electricity, and water prices. By blaming Climategate on the largest possible number of suspects, they close the investigation forever, like the Ark of the Covenant being carried on a fork truck down endless rows of a vast government warehouse, never to be seen again.
*******************************EXCERPT**************************************
Truthseeker says:
July 19, 2012 at 10:48 pm
They could have just gone to this excellent analysis and achieved a greater understanding than they seem to have arrived at on their own.
http://thepointman.wordpress.com/2010/12/17/why-climategate-was-not-a-computer-hack/
Pointman hits the bullseye again.
He does.
It is an expansion of the same point I made on another thread. The work factor involved for potentially nothing of interest and definitely nothing of interest to a great white. Remember back to the first release. The total shock at the content of the emails and the dreadfully inept poor quality software (as in Harry readme). Someone had to know the dirty washing was there and understand it was dirty washing and that the world would be aghast when it was released. Would a great white hacker with lots of computer knowledge also understand the importance of the emails and the development software?
***************************************EXCERPT*************************************
Ive read several comments where people still believe that Climategate was done by a whistleblowe. If you want to be sceptic, you need to be sceptic about everything. Especially about your own beliefs.
After reading this news, its not likely that it was an internal leak. Before all this information I thought that an internal leak was probable. Pointman wrote in his blog good reasons for that. However, this police Q&A states a number of facts, that make is unlikely that it was an internal leak. So FOIA is probably a computer whiz who knows how to exploit vulnerablilities and crack systems without being caught. People like those are not climate scientists, who would do a lousy job like Peter Gleick did.
So who is FOIA? Its certainly someone who dislikes the climate science shenanigans as much as any of us. I dont think that its a company (like Big Oil) or a country (like China). FOIA is an individual or at most a small group of people. And if I would have to bet, Id put my money on FOIA being a student at the UEA. One, who does not study climate science or arts or social sciences but real science. They do have a Faculty of Science there and also teach computer science, mathematics and engineering. They do have students with necessary skills and the students would have a better chance of knowing more about UEAs computer network.
I dont think it is wise to remain convinced, that it was a leak. We critisize climate scientists, that they discard unwanted information to remain convinced about AGW. How can we critisize them if we discard all this information and stubbornly claim that it was a leak? It makes no sense. It probably was a hack, but it doesnt diminish the seriousness of the hacked material.
Probably the first time I have ever applauded someone for committing a criminal offense. Their cause was surely right in these two particular cases.
**********************************EXCERPT***********************************
David, UK says:
Of course, the climate sceptic community would, in the main, give the appearance of welcoming the published data because it supports their view.
Hang on. I dont think theyre really admitting that the emails support the sceptic view, although admittedly that would be the first obvious interpretation. However, if they really believed that then theyd be bound to investigate the real criminals (i.e. the anti-scientists at CRU) not the whistle blower. Therefore, I suspect it means something else and has just been clumsily worded. Read it again: [sceptics would] give the appearance of welcoming-the-published-data-because-it-supports-their-view.
So, it looks to me like theyre meaning to say that the actual because-it-supports-their-view reason is meant from the sceptics perspective, not the polices. And as an aside: why couldnt they simply say that we sceptics, in the main, welcomed the published data, instead of stating that we gave the appearance of welcoming the published data? No one else find that statement quite strange?
Absolutely.....I would like to see the rest of the emails that were pulled off of that server.
I think the Cabal all the way up to the United Nations IPCC was the CRIMAL ACT!!
Thus the revelation of the emails is an act in the furtherance of revealing the EXTENT OF THE GLOBAL GOVERNANCE CONSPIRACY!!!!
Of course your rationalization is acceptable. I hold the same sentiments, opinions on that score. But hacking into private property or sharing privileged information is a crime. I do hope the hacker(s) are never caught. They did the world a special service, for the good, obviously.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.