Category Archives: Uncategorized

A Russian Spearphishing Domain Is Now Hosted in New York City

Central to the Mueller indictment is attribution to Russia of a spearphishing campaign from domains then located in Romania. It is therefore more than a little surprising that one of these spearphishing domains is not only still in operation in May 2018, but hosted in New York City.

WHO on Douma

Jordan Peterson, a fellow Torontonian who is obviously not shy about challenging authority, recently cited the World Health Organization (WHO) on Douma chemical attacks as follows: WHO says: “Bombs were dropped at two locations in Douma. Within hours, more than 500 people were exhibiting symptoms consistent with suffocation by poison gas.” On such a controversial issue, it […]

Douma Videos and Photos

In this post, I will provide a timeline of original appearances of videos and photos of the Douma chemical incident. There were two locations for these videos: (1) the emergency ward of the Douma hospital; (2) a small apartment building about 10 blocks from the hospital, where dead bodies were found on two floors and […]

The impact of recent forcing and ocean heat uptake data on estimates of climate sensitivity

A guest post by Nic Lewis Judith Curry and I have now updated the LC15 paper with a new paper that has been published in the Journal of Climate There has been considerable scientific investigation of the magnitude of the warming of Earth’s climate by changes in atmospheric carbon dioxide (CO2) concentration. Two standard metrics […]

Emergent constraints on climate sensitivity in global climate models, Part 3

The two strongest potentially credible constraints, and conclusions A guest post by Nic Lewis In Part 1 of this article the nature and validity of emergent constraints[1] on equilibrium climate sensitivity (ECS) in GCMs were discussed, drawing mainly on the analysis and assessment of 19 such constraints in Caldwell et al. (2018),[2] who concluded that […]

Attribution of 2015-6 Phishing to APT28

In two influential articles in June 2016, immediately following the Crowdstrike announcement, SecureWorks (June 16 here and June 26 here) purported to connect the DNC hack to a 2015-6 phishing campaign which they attributed to APT28.  SecureWorks identified two malicious domains in their article. In today’s article, I’ll show that infrastructure from one domain are connected […]

Emergent constraints on climate sensitivity in global climate models, Part 2

The four constraints that Caldwell assessed as credible A guest post by Nic Lewis In Part 1 of this article the nature and validity of emergent constraints[i] on equilibrium climate sensitivity (ECS) in GCMs were discussed, drawing mainly on the analysis and assessment of 19 such constraints in Caldwell et al (2018; henceforth Caldwell),[ii] who […]

DNC Hack due to Gmail Phishing??

In two influential articles in June 2016 (June 16 here and June 26 here), SecureWorks purported to link the then recently revealed DNC hack to Russia via a gmail phishing campaign which they had been monitoring since 2015 and which they attributed to APT28 (Fancy Bear). They had observed multiple phishing targets at hillaryclinton.com, dnc.org […]

Emergent constraints on climate sensitivity in global climate models, Part 1

Their nature and assessment of their validity A guest post by Nic Lewis There have been quite a number of papers published in recent years concerning “emergent constraints” on equilibrium climate sensitivity (ECS) in comprehensive global climate models (GCMs), of both the current (CMIP5) and previous (CMIP3) generations. The range of ECS values in GCMs […]

Arrest of the “Lurk” Banking Trojan Gang

On June 2, 2016, in a major police operation in Russia, 50 hackers from the Lurk banking trojan gang were arrested following 86 raids (Security Week here). Their malware was used for bank fraud (especially in Russia) and ransomware all over the world. The full extent of their activities became clear only after their arrest. In […]