Emergent constraints on climate sensitivity in global models. Part III

Climate Etc.

by Nic Lewis

The two strongest potentially credible constraints, and conclusions.

View original post 3,464 more words

Advertisements

Another Endangered Species?

Watts Up With That?

Guest essay by Viv Forbes Washpool   Qld Australia

Earth is a dangerous place. Of all the species that have ever lived, over 95% have already been extinguished by natural disasters.

Ice, not global warming, is the big killer and this recurring calamity often strikes quickly. Thousands of mammoths and other animals were killed by ice storms and their snap-frozen bodies are still entombed in ice around the Arctic. Just 15,000 years ago great ice sheets smothered the northern hemisphere as far south as Chicago, Moscow and London and all life had migrated towards the equator. This deadly ice had gripped Earth for about 50,000 years.

Ice ages are also times of dry winds and drought as cold oceans and cold dry atmospheres produce little evaporation or precipitation. Great deserts like the Sahara and the Gobi expand, and wind-blown dust fills the skies and rivers.

Adding to Ice Age woes, cold…

View original post 485 more words

Attribution of 2015-6 Phishing to APT28

Climate Audit

In two influential articles in June 2016, immediately following the Crowdstrike announcement, SecureWorks (June 16 here and June 26 here) purported to connect the DNC hack to a 2015-6 phishing campaign which they attributed to APT28.  SecureWorks identified two malicious domains in their article. In today’s article, I’ll show that infrastructure from one domain are connected to domains identified as APT28 in early literature, while infrastructure from the other domain leads in an unexpected direction.

View original post 1,043 more words

Russian agents attempted to undermine US shale gas, says official report

Tallbloke's Talkshop

Credit: Wikipedia
This only confirms in greater detail what has been fairly well-known for quite a long time anyway.
H/T The GWPF

For months, House Committees and a Special Counsel have been investigating Russian attempts to influence the 2016 presidential election, reports Inside Sources.

Even as these investigations continue to make headlines, interference in American energy markets, which was likely even more successful, has received relatively little attention.

According to new findings from the House Committee on Space, Science, and Technology, Russian agents worked to manipulate specific groups inside the U.S. in order to “disrupt domestic energy markets, suppress research and development of fossil fuels, and stymie efforts to expand the use of natural gas.”

View original post 247 more words

Arrest of the “Lurk” Banking Trojan Gang

Climate Audit

On June 2, 2016, in a major police operation in Russia, 50 hackers from the Lurk banking trojan gang were arrested following 86 raids (Security Week here). Their malware was used for bank fraud (especially in Russia) and ransomware all over the world. The full extent of their activities became clear only after their arrest. In today’s post, I’m going to look back at U.S. computer security analysis (especially by Cisco Talos) prior to the arrests by Russia.  The post contains an Easter egg relating to attribution of the DNC hack, but that will be a story for a different day.

View original post 2,297 more words