UEA on Climate Hack Sequel: Same Old Same Old
November 22, 2011
While we have had only a limited opportunity to look at this latest post of 5,000 emails, we have no evidence of a recent breach of our systems. If genuine, (the sheer volume of material makes it impossible to confirm at present that they are all genuine) these emails have the appearance of having been held back after the theft of data and emails in 2009 to be released at a time designed to cause maximum disruption to the imminent international climate talks.
This appears to be a carefully-timed attempt to reignite controversy over the science behind climate change when that science has been vindicated by three separate independent inquiries and number of studies – including, most recently, the Berkeley Earth Surface Temperature group.
As in 2009, extracts from emails have been taken completely out of context. Following the previous release of emails scientists highlighted by the controversy have been vindicated by independent review, and claims that their science cannot or should not be trusted are entirely unsupported. They, the University and the wider research community have stood by the science throughout, and continue to do so.
“Even my “climategate” obsessed editors are cool on this. Lets hope it doesn’t become thanksgiving tradition…if they really do have 220 thousand more we could be eating the leftovers for another 80 years at this rate”
The unauthorised publication is an apparent attempt to repeat the impact of a similar release of emails on the eve of theCopenhagen climate summit in late 2009.
The initial email dump was apparently timed to disrupt the Copenhagen climate talks. It prompted three official inquiries in the UK and two in the US into the working practices of climate scientists. Although these were critical of the scientists’ handling of Freedom of Information Act requests and lack of openness they did not find fault with the climate change science they had produced.
Norfolk police have said the new set of emails is “of interest” to their investigation to find the perpetrator of the initial email release who has not yet been identified.