Geoscience Reference
In-Depth Information
what was known about another incident earlier that year, led the
Guardian
journalist to question
denied. Saudi Web servers were among the first used to post the stolen materials,
5
and Saudi Arabia
was the first country to call for an investigation of climate scientists in what came to be known as
climategate,
6
leading some to suggest that Saudi Arabia—the world's single largest exporter of oil—
Sabban, was quick to use the manufactured scandal to help block progress at the Copenhagen summit.
The e-mails would have a “huge impact” on the negotiations, he had predicted, and he went on to
make the jaw-dropping claim that “it appears from the details of the scandal that there is no
relationship whatsoever between human activities and climate change.”
8
Although we had intercepted the hacker before our site could be used to complete the mission, it
was clear that the point of no return had been passed. The same content would be uploaded two days
later to a Russian FTP server
9
and then onto many other Web sites, including the Wikileaks site. Soon
enough, this trove of stolen e-mail messages would be released to the world. What ensued in the
hackers appear to have had access to the materials for months, the release was clearly timed for the
run-up to Copenhagen.
The Distortions
As soon as the e-mails were leaked, climate change deniers claimed that they provided a “smoking
revealed that climate scientists had been fabricating and hiding data, subverting the peer review
system, and evading requests for their data. Is it possible they were right?
It would indeed have been surprising if those looking to make mischief could not find some e-
mail excerpts that could be made to appear damning, given the opportunity of searching thousands of
e-mails for phrases to take out of context. To show how easy this was to do, one commentator mined
the personal correspondence of Sir Isaac Newton and found phrasing that, taken out of context, could
be interpreted to suggest (in modern terms) “conspiring to avoid public scrutiny,” (2) “insulting
dissenting scientists,” (3) “manipulation of evidence,” (4) “suppression of evidence,” (5) “abusing
the peer review system,” and (6) “insulting [his] critics.”
12
Imagine how unpleasant it might be to have your private e-mails, text messages, or phone
conversations mined by your worst enemy for anything that, taken out of context, could be used to
make you look bad. Then imagine what it would be like to be expected to defend each and every
instance of sloppy word choice or ambiguous phrasing that could be found. This is the position in
which climate scientists whose e-mails had been hacked found themselves.
One e-mail Phil Jones of CRU sent to my coauthors and me in early 1999 has received more
attention than any other. In it, Jones both made reference to “Mike's
Nature
trick” and used the phrase
“to hide the decline” in describing a figure he had been asked to prepare for the World
Meteorological Organization (WMO) comparing different proxy temperature reconstructions. Here