Risk
10/28/2009
12:25 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: Greenpeace Shakedown Targets Google, Microsoft, And IBM

Greenpeace is mounting a major assault on the business practices of not just those three companies but the entire IT industry. They will lie to get what they want--and here's the proof.

If you think I'm exaggerating, take a look at the very words spoken a few months ago by Geir Leipold, Dear Leader of Greenpeace at the time, about the group's assertions and his own assertions that the Greenland Ice Sheet would be gone by 2030, just 20 years from now. This exchange came in an interview with the BBC, and I'm sure Leipold and his fellow travelers were drooling at the thought of being able to pump out their dishonest propaganda through the usually fawning BBC outlet.

Unfortunately for Leipold—and fortunately for the rest of us—the BBC reporter was armed with facts and undeterred by dogma. And again I point this out in the context of Greenpeace's current effort to use its velvet-glove name to hide its brass-knuckles attack on the IT industry. Here's the second half of the exchange (and at the bottom of this column I've provided links to the 100-second clip plus a few other goodies):

Leipold: "That we, as a pressure group, have to emotionalize issues—we're not ashamed of emotionalizing issues. I think it's a fact—"

BBC reporter Stephen Sackur: "You call it emotionalizing, others would call it scare tactics. Will you sit here now and tell me that you in all honesty do not believe that the Greenland Ice Sheet is going to melt by 2030?"

Leipold: "I don't know—I don't think it will be melting by 2030."

BBC: "So in fact would you say that it was a mistake for your organization to put that out?"

Leipold: "That may have been a mistake—I don't know this specific press release—I do not check every press release."

Oh my. So the Dear Leader goes from saying the Greenland Ice Sheet will be gone by 2030, to saying that he doesn't know after all, to saying that he doesn't think it will be melting by then, to saying that it might have been a mistake for his fellow shakedowners to put out the press release making those preposterous claims, to washing his hands of it by saying he's too busy to check what "emotionalizing" claims his "pressure group" is making.

So think of that when you see the attempts by Greenpeace to smear IBM, Microsoft, and Google, three magnificent private enterprises with superb environmental track records and philanthropic missions. Because to the shakedown artists, none of that matters—their goal is control, influence, and power to undercut free enterprise and force this country and then other industrial powers to take a few steps back toward the Stone Age.

Don't be fooled by the name. And to IBM, Google, and Microsoft: continue to stand up for yourselves and your excellent principles, and don't be fooled into thinking that if you acquiesce to this latest round of nonsense from the screechers, that they'll let you go next time. No, it'll be quite the opposite: if you give in now, they'll know that you'll give in next time, and they won't stop until they've done enormous damage to you, your shareholders, your employees, and others in the IT industry with the unmitigated gall to oppose their sacrosanct vision for how everyone else should behave.

Don't be fooled by the name.

Recommended Resources:

100-second clip with Leipold and BBC

full interview with Leipold and BBC

Some compelling counterbalance to Greenpeace lunacy

Don't believe the name

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-1157
Published: 2015-05-27
CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic characters in (1) an SMS message or (2)...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?