It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The Saskatoon, Saskatchewan-based Levsen re-created the e-mail distribution system at UAE over the last ten years, capturing system changes by the university’s e-mail administrators during that time. Using information contained within the files that constitute the e-mails, as well as the filenames themselves, his modeling concludes and identifies the source for the leaked documents as an internal source within the University of East Anglia. The alleged “hacker”, Levson conludes, must have been someone with administrative, or “root” privileges, to UEA’s secure computer systems.
Levsen writes that the email files were stored on a single server, as indicated by their respective filenames. The sequential, but not consecutive, numbering is actually not random, as first appears, and has been reported. The filenames are actually UNIX epoch timestamps, which create a filename based on the number of seconds since midnight, 1 January, 1970. What this means is that the files were originally saved on an archiving UNIX e-mail server, at East Anglia.
-----------------------------------------------
This being the case, Levsen concludes:
“For the hacker to have collected all of this information s/he would have required extraordinary capabilities. The hacker would have to crack an Administrative file server to get to the emails and crack numerous workstations, desktops, and servers to get the documents. The hacker would have to map the complete UEA network to find out who was at what station and what services that station offered. S/he would have had to develop or implement exploits for each machine and operating system without knowing beforehand whether there was anything good on the machine worth collecting.”
In short, Levsen’s conclusion is that the e-mail and data leaks were not the result of an intrusion, they were an internal leak. Climategate was not precipitated by a hacker, but by a whistle-blower.
Originally posted by FritosBBQTwist
If global warming and the agenda pushing it was true, then we would NOT be going through all of this crap.