12:25 PM
Bob Evans
Bob Evans

Global CIO: Greenpeace Shakedown Targets Google, Microsoft, And IBM

Greenpeace is mounting a major assault on the business practices of not just those three companies but the entire IT industry. They will lie to get what they want--and here's the proof.

If you think I'm exaggerating, take a look at the very words spoken a few months ago by Geir Leipold, Dear Leader of Greenpeace at the time, about the group's assertions and his own assertions that the Greenland Ice Sheet would be gone by 2030, just 20 years from now. This exchange came in an interview with the BBC, and I'm sure Leipold and his fellow travelers were drooling at the thought of being able to pump out their dishonest propaganda through the usually fawning BBC outlet.

Unfortunately for Leipold—and fortunately for the rest of us—the BBC reporter was armed with facts and undeterred by dogma. And again I point this out in the context of Greenpeace's current effort to use its velvet-glove name to hide its brass-knuckles attack on the IT industry. Here's the second half of the exchange (and at the bottom of this column I've provided links to the 100-second clip plus a few other goodies):

Leipold: "That we, as a pressure group, have to emotionalize issues—we're not ashamed of emotionalizing issues. I think it's a fact—"

BBC reporter Stephen Sackur: "You call it emotionalizing, others would call it scare tactics. Will you sit here now and tell me that you in all honesty do not believe that the Greenland Ice Sheet is going to melt by 2030?"

Leipold: "I don't know—I don't think it will be melting by 2030."

BBC: "So in fact would you say that it was a mistake for your organization to put that out?"

Leipold: "That may have been a mistake—I don't know this specific press release—I do not check every press release."

Oh my. So the Dear Leader goes from saying the Greenland Ice Sheet will be gone by 2030, to saying that he doesn't know after all, to saying that he doesn't think it will be melting by then, to saying that it might have been a mistake for his fellow shakedowners to put out the press release making those preposterous claims, to washing his hands of it by saying he's too busy to check what "emotionalizing" claims his "pressure group" is making.

So think of that when you see the attempts by Greenpeace to smear IBM, Microsoft, and Google, three magnificent private enterprises with superb environmental track records and philanthropic missions. Because to the shakedown artists, none of that matters—their goal is control, influence, and power to undercut free enterprise and force this country and then other industrial powers to take a few steps back toward the Stone Age.

Don't be fooled by the name. And to IBM, Google, and Microsoft: continue to stand up for yourselves and your excellent principles, and don't be fooled into thinking that if you acquiesce to this latest round of nonsense from the screechers, that they'll let you go next time. No, it'll be quite the opposite: if you give in now, they'll know that you'll give in next time, and they won't stop until they've done enormous damage to you, your shareholders, your employees, and others in the IT industry with the unmitigated gall to oppose their sacrosanct vision for how everyone else should behave.

Don't be fooled by the name.

Recommended Resources:

100-second clip with Leipold and BBC

full interview with Leipold and BBC

Some compelling counterbalance to Greenpeace lunacy

Don't believe the name

2 of 2
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio