The most recent large-scale compilation of proxy records over the past two millennia is PAGES (2017). They made a concerted effort to archive data (to the credit of Julien Emile-Geay), archiving 692 series, but they perpetuated most other sins within the field. Rather than abjuring ex post screening, it carried ex post screening to extremes never […]
Central to the Mueller indictment is attribution to Russia of a spearphishing campaign from domains then located in Romania. It is therefore more than a little surprising that one of these spearphishing domains is not only still in operation in May 2018, but hosted in New York City.
Jordan Peterson, a fellow Torontonian who is obviously not shy about challenging authority, recently cited the World Health Organization (WHO) on Douma chemical attacks as follows: WHO says: “Bombs were dropped at two locations in Douma. Within hours, more than 500 people were exhibiting symptoms consistent with suffocation by poison gas.” On such a controversial issue, it […]
In this post, I will provide a timeline of original appearances of videos and photos of the Douma chemical incident. There were two locations for these videos: (1) the emergency ward of the Douma hospital; (2) a small apartment building about 10 blocks from the hospital, where dead bodies were found on two floors and […]
A guest post by Nic Lewis Judith Curry and I have now updated the LC15 paper with a new paper that has been published in the Journal of Climate There has been considerable scientific investigation of the magnitude of the warming of Earth’s climate by changes in atmospheric carbon dioxide (CO2) concentration. Two standard metrics […]
The two strongest potentially credible constraints, and conclusions A guest post by Nic Lewis In Part 1 of this article the nature and validity of emergent constraints[1] on equilibrium climate sensitivity (ECS) in GCMs were discussed, drawing mainly on the analysis and assessment of 19 such constraints in Caldwell et al. (2018),[2] who concluded that […]
In two influential articles in June 2016, immediately following the Crowdstrike announcement, SecureWorks (June 16 here and June 26 here) purported to connect the DNC hack to a 2015-6 phishing campaign which they attributed to APT28. SecureWorks identified two malicious domains in their article. In today’s article, I’ll show that infrastructure from one domain are connected […]
The four constraints that Caldwell assessed as credible A guest post by Nic Lewis In Part 1 of this article the nature and validity of emergent constraints[i] on equilibrium climate sensitivity (ECS) in GCMs were discussed, drawing mainly on the analysis and assessment of 19 such constraints in Caldwell et al (2018; henceforth Caldwell),[ii] who […]
In two influential articles in June 2016 (June 16 here and June 26 here), SecureWorks purported to link the then recently revealed DNC hack to Russia via a gmail phishing campaign which they had been monitoring since 2015 and which they attributed to APT28 (Fancy Bear). They had observed multiple phishing targets at hillaryclinton.com, dnc.org […]
Their nature and assessment of their validity A guest post by Nic Lewis There have been quite a number of papers published in recent years concerning “emergent constraints” on equilibrium climate sensitivity (ECS) in comprehensive global climate models (GCMs), of both the current (CMIP5) and previous (CMIP3) generations. The range of ECS values in GCMs […]