Posted on 12/04/2009 11:47:21 AM PST by crescen7
I’m coming to you today as a scientist and engineer with an agnostic stand on global warming.
If you don’t know anything about “Climategate” (does anyone else hate that name?) Go ahead and read up on it before you check out this post, I’ll wait.
Back? Let’s get started.
First, let’s get this out of the way: Emails prove nothing. Sure, you can look like an unethical asshole who may have committed a felony using government funded money; but all email is, is talk, and talk is cheap.
Now, here is some actual proof that the CRU was deliberately tampering with their data. Unfortunately, for readability’s sake, this code was written in Interactive Data Language (IDL) and is a pain to go through.
NOTE: This is an actual snippet of code from the CRU contained in the source file: briffa_Sep98_d.pro
But the actual file looks like this:(screen shot from the file)
The analysis deals with a grossly edited file (or perhaps my original download was somehow corrupted) - in either case :
The article takes lines 32 through 39 and analyzes them as consecutive lines 1 through 8. It also ignores that there are at least 3 other versions of this single program - and that in this program the "fudge factor" doesn't plot when the program runs. In any case there are at least 2 versions of this same file circulating now, and this "smoking gun" may now be pointing in the other direction.
While the code in its entirety has not yet been explored, the author only claims that the array 'valadj' bears a striking resemblence to the hockey stick. He then notes that the data is interpolated with the 'valadj' array.
I've filed this one away as "curious". Not as proof of anything.
I think it's extrordinary that you think that this reverses things (????). It proves nothing.
“I think it’s extrordinary that you think that this reverses things (????). It proves nothing.”
Sorry, I didn’t mean to imply that this “reverses things” in a general sense. Only in the sense of this particular analysis.
It provides STRONG suspicion (in this case) that the “evidence” has been tampered with to provide a “smoking gun” against the CRU. But if the file is tampered with - then the only thing this proves is that someone is guilty of evidence tampering.
Hmmm.... are you sure you are looking are the ‘same’ programs?? I’m a total lame-man
Briffa- Harris-tree...matchs the original site:
http://di2.nu/foia/harris-tree/briffa_sep98_e.pro
Briffa - Osborn-tree matchs your post:
http://www.di2.nu/foia/osborn-tree6/briffa_sep98_d.pro
Again, I’m a total lame-mam, just peeking at the stuff
In this programmer’s experience, briffa_sep98_e.pro should be a revision of briffa_sep98_d.pro. While there is a lot of poor interpretation going on about what these guys were up to, the bottom line is that there isn’t just one fishy bit here but a lot of them. Avoiding legitimate FOIA requests, requests and threats to delete emails and data, admission that the models and proxies don’t model real temperaturs, and the whole harry_read_me.txt file that describes what a mess the CRU code is. And if I’m not mistaken, members of the press had this data well before it was released on the web, which strongly suggests it was a leak, not a hacking. This is a little game the left plays very well — break a forest issue down into a bunch of trees, pick one or two that are easy to chop down, chop them down and claim the forest doesn’t exist. I’m not playing.
Confusing??? AAAAHH!!!!
Stop me before I google again!!!!
osborn-tree6
http://sentinelgetfit.kore-net.com/documents/osborn-tree6/
Yes both of those links contain the file “briffa_sep98_d.pro” and they both look exactly like the “briffa_sep98_d.pro” that I posted a screen shot of - not like the file identified in the article.
I think it was sent to BBC a week before it went to the Russian server. BBC sat on it which is, I suspect, why it went to the Russian server.
What I think these programs do show (since they are timestamped as early as 1998) is that someone was playing around with applying adjustments and two more of the programs are called briffa_sep98_decline1.pro and briffa_sep98_decline2.pro, with the same timestamp as briffa_sep98_e.pro and an earlier timestamp than briffa_sep98_d.pro. Both d and e have the same valadj but in different places. I suspect that at some point, someone is going to run the data through them and we’ll know whether the adjustment was applied or not.
;legend,['Northern Hemisphere April-September instrumental temperature',$
; 'Northern Hemisphere MXD',$
; 'Northern Hemisphere MXD corrected for decline'],$
; colors=[22,21,20],thick=[3,3,3],margin=0.6,spacing=1.5
legend,['Northern Hemisphere April-September instrumental temperature',$
'Northern Hemisphere MXD'],$
I other words, this program was run in different ways with the legends 'Northern Hemisphere MXD', 'Northern Hemisphere MXD corrected for decline', and 'Northern Hemisphere April-September instrumental temperature'. We don't know which way was actually used.
So the problem with my analysis of briffa_sep98d.pro is that there is another program that wasn’t referenced in the article? Or that one can re-write the leaked code to run it a different way?
Both valid, if not obvious points, but neither mentioned in the original article that calls 8 lines of code a “smoking gun”.
Which again is the point of the post.
People need to be careful quoting “evidence” that they don’t understand. To put it bluntly, it’s possible that the original author of this article intended it as a “plant” to be rather easily discredited. One, the article alters the code (he changed the line numbers and omitted the 1st 32 lines of the program; and failed to mention the “artificial correction” was never applied.
Yes, a similar correction was applied in a different program that is in a different subdirectory. But why not quote that program then?
ps. I’m not following your take on the code quote. I’m no IDL expert (most of my work was in C, and that was some time ago); but it looks like a Legend title block being sent to the printer to me, and it doesn’t include the “corrected” for decline version. Or am I missing something?
I think you are correct that people need to be careful. However the comments suggest that the code was, at some point, run. And my overall point is that none of the programs mean anything unless we know they were actually used to process data and that should be clear if people start testing them.
As for the comments, my point is that someone also changed the legend, which suggests that the adjusted version was run at some point. Since the timestamp is after the “e” version, it’s possible that someone decided to undo the adjustments. Which set of data they actually used, if any, the adjusted or unadjusted or maybe this was just experimental code, can’t be known without comparing what they released against the original data. That’s the hard work step to really prove whether they did or didn’t do something wrong here. I think it’s also possible that the author of the blog entry meant to code the “e” version and wound up linking to the “d” version, instead. Your point about care is a good one. My point is that the the commenting still doesn’t entirely let them off the hook.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.