Most high school papers wouldn't touch sources like these. But in November 2016, both the president-elect of the United States and the Washington Post are equally at ease with this sort of sourcing.
Even worse, the Post apparently never contacted any of the outlets on the "list" before they ran their story. Yves Smith at Naked Capitalism says she was never contacted. Chris Hedges of Truthdig, who was part of a group that won the Pulitzer Prize for The New York Times once upon a time, said the same. "We were named," he tells me. "I was not contacted."
Hedges says the Post piece was an "updated form of Red-Baiting."
"This attack signals an open war on the independent press," he says. "Those who do not spew the official line will be increasingly demonized in corporate echo chambers such as the Post or CNN as useful idiots or fifth columnists."
...the article is rife with obviously reckless and unproven allegations, and fundamentally shaped by shoddy, slothful journalistic tactics. It was not surprising to learn that, as BuzzFeed’s Sheera Frenkel noted, “a lot of reporters passed on this story.” Its huge flaws are self-evident. But the Post gleefully ran with it and then promoted it aggressively, led by its Executive Editor Marty Baron...
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies. As I’ve already said, their software is of poor quality, with many holes and vulnerabilities. I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly. I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
"It is most likely that the FOI Officer at the University put it on an anonymous ftp server or that it resided on a shared folder that many people had access to and some curious individual looked at it.
If as some say, this was a targeted crack, then the cracker would have had to have back-doors and access to every machine at UEA and not just the CRU. It simply isn't reasonable for the FOI Officer to have kept the collection on a CRU system where CRU people had access, but rather used a UEA system.
Occam's razor concludes that "the simplest explanation or strategy tends to be the best one". The simplest explanation in this case is that someone at UEA found it and released it to the wild and the release of FOIA2009.zip wasn't because of some hacker, but because of a leak from UEA by a person with scruples."
The significance being that a leak indicates a worker unhappy with the integrity of the organization. Or someone who likes ot make big messes.
The best things in life go on sale sooner or later.