Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Hacking into the mind of the CRU climate change hacker ( how did climategate happen?)
Guardian (UK) ^ | Friday 5 February 2010 07.30 GMT | Charles Arthur

Posted on 02/05/2010 9:05:54 AM PST by Ernest_at_the_Beach

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-28 last
To: cripplecreek
Hacker in staged photograph surrounded by computers.

That is indeed a silly photo; staged to make it look like a prototypical nerd hiding in a dark basement. A hacker could just as well be sitting in a local coffee shop with a laptop taking advantage of the free WiFi. More likely, in fact, because the local coffee shop's WiFi is likely open access.

21 posted on 02/05/2010 9:32:57 AM PST by 6SJ7 (atlasShruggedInd = TRUE)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ReneeLynn; NormsRevenge; SunkenCiv

ROFL!

No sign of a simple laptop in there....gotta have raw compute power for the big jobs....


22 posted on 02/05/2010 9:35:56 AM PST by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Ernest_at_the_Beach

He probably runs them off a gasoline generator too.


23 posted on 02/05/2010 9:38:23 AM PST by cripplecreek (Seniors, the new shovel ready project under socialized medicine.)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Ernest_at_the_Beach; meyer; WL-law; Para-Ord.45; Desdemona; Little Bill; IrishCatholic; mmanager; ..
Thanx !

 


Beam me to Planet Gore !

24 posted on 02/05/2010 10:19:59 AM PST by steelyourfaith (FReepers were opposed to Obama even before it was cool to be against Obama.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Ernest_at_the_Beach
Analysis by the Guardian and digital forensics experts suggests that an outside hacker gained access to a server at the UEA which held backups of CRU emails and a collection of staff documents.

Or that an internal whistleblower was smart enough to do the expose from an external computer.

25 posted on 02/05/2010 11:02:07 AM PST by a fool in paradise ("like it or not, we have to have a financial system that is healthy and functioning" Obama 2/4/2010)
[ Post Reply | Private Reply | To 1 | View Replies]

To: cripplecreek

The photo is racist. It suggests that white Westerners are hackers. The Chi-coms have hackers on staff.


26 posted on 02/05/2010 11:03:29 AM PST by a fool in paradise ("like it or not, we have to have a financial system that is healthy and functioning" Obama 2/4/2010)
[ Post Reply | Private Reply | To 4 | View Replies]

To: NMEwithin
Meanwhile MSNBC is only looking at the emails they want to examine:

Palin e-mails reveal a powerful ‘first dude’ (MSNBC.com ^ | February 4, 2010 | By Bill Dedman)

27 posted on 02/05/2010 11:06:34 AM PST by a fool in paradise ("like it or not, we have to have a financial system that is healthy and functioning" Obama 2/4/2010)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Ernest_at_the_Beach
I believe the files where not ftp'ed or downloaded by other means from the CRU servers to another system but that someone working at CRU with root privileges set, perhaps an administrator, and or an actual root user level (they can get at anything on a system ... they own the system by default) assemble a number of files such as the emails for each user's email, copied into own directory space, then carefully gziped them then sent them out to a few individuals elsewhere with the notice they all had some 48 hours or whatever to do what they wanted to do.
As a root user on any UNIX system or Linux system I can view ,modify, delete, copy any file on the entire system if I so please to. And that of course holds true for the other UNIX variants as well as Sun Solaris systems.
An outsider would have had to gain root privilege in order to view the individual email users directories and stored emails as well as files used for the modeling etc..
Of course an insider who had root user level could have had an agreement with someone on the outside of the server(s) to during a brief period of time be granted what we call super user (su command in UNIX). The insider would have granted them SU privileges. Then once the access was complete, files copied by various means, removed the SU privilege. They then could have doctored the file that stores SU access to obliterate any reference to the so called hackers login name.
In the past I had given certain individuals su level access to do something on a given UNIX system I maintained. Very easy stuff to do when one is root user.
28 posted on 02/05/2010 5:24:47 PM PST by Marine_Uncle (Honor must be earned....)
[ Post Reply | Private Reply | To 10 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-28 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson