Risk
10/28/2009
12:25 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: Greenpeace Shakedown Targets Google, Microsoft, And IBM

Greenpeace is mounting a major assault on the business practices of not just those three companies but the entire IT industry. They will lie to get what they want--and here's the proof.

If you think I'm exaggerating, take a look at the very words spoken a few months ago by Geir Leipold, Dear Leader of Greenpeace at the time, about the group's assertions and his own assertions that the Greenland Ice Sheet would be gone by 2030, just 20 years from now. This exchange came in an interview with the BBC, and I'm sure Leipold and his fellow travelers were drooling at the thought of being able to pump out their dishonest propaganda through the usually fawning BBC outlet.

Unfortunately for Leipold—and fortunately for the rest of us—the BBC reporter was armed with facts and undeterred by dogma. And again I point this out in the context of Greenpeace's current effort to use its velvet-glove name to hide its brass-knuckles attack on the IT industry. Here's the second half of the exchange (and at the bottom of this column I've provided links to the 100-second clip plus a few other goodies):

Leipold: "That we, as a pressure group, have to emotionalize issues—we're not ashamed of emotionalizing issues. I think it's a fact—"

BBC reporter Stephen Sackur: "You call it emotionalizing, others would call it scare tactics. Will you sit here now and tell me that you in all honesty do not believe that the Greenland Ice Sheet is going to melt by 2030?"

Leipold: "I don't know—I don't think it will be melting by 2030."

BBC: "So in fact would you say that it was a mistake for your organization to put that out?"

Leipold: "That may have been a mistake—I don't know this specific press release—I do not check every press release."

Oh my. So the Dear Leader goes from saying the Greenland Ice Sheet will be gone by 2030, to saying that he doesn't know after all, to saying that he doesn't think it will be melting by then, to saying that it might have been a mistake for his fellow shakedowners to put out the press release making those preposterous claims, to washing his hands of it by saying he's too busy to check what "emotionalizing" claims his "pressure group" is making.

So think of that when you see the attempts by Greenpeace to smear IBM, Microsoft, and Google, three magnificent private enterprises with superb environmental track records and philanthropic missions. Because to the shakedown artists, none of that matters—their goal is control, influence, and power to undercut free enterprise and force this country and then other industrial powers to take a few steps back toward the Stone Age.

Don't be fooled by the name. And to IBM, Google, and Microsoft: continue to stand up for yourselves and your excellent principles, and don't be fooled into thinking that if you acquiesce to this latest round of nonsense from the screechers, that they'll let you go next time. No, it'll be quite the opposite: if you give in now, they'll know that you'll give in next time, and they won't stop until they've done enormous damage to you, your shareholders, your employees, and others in the IT industry with the unmitigated gall to oppose their sacrosanct vision for how everyone else should behave.

Don't be fooled by the name.

Recommended Resources:

100-second clip with Leipold and BBC

full interview with Leipold and BBC

Some compelling counterbalance to Greenpeace lunacy

Don't believe the name

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1701
Published: 2015-04-21
Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2015.

CVE-2015-2041
Published: 2015-04-21
net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

CVE-2015-2042
Published: 2015-04-21
net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

CVE-2015-0702
Published: 2015-04-20
Unrestricted file upload vulnerability in the Custom Prompts upload implementation in Cisco Unified MeetingPlace 8.6(1.9) allows remote authenticated users to execute arbitrary code by using the languageShortName parameter to upload a file that provides shell access, aka Bug ID CSCus95712.

CVE-2015-0703
Published: 2015-04-20
Cross-site scripting (XSS) vulnerability in the administrative web interface in Cisco Unified MeetingPlace 8.6(1.9) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCus95857.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.