Attacks/Breaches
10/8/2008
12:51 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Sarah Palin E-mail Hack Suspect Indicted

A Tennessee Democratic state representative's son faces a maximum of five years in prison, a $250,000 fine, and three years of supervised release if convicted.

The U.S. Department of Justice on Wednesday said that David C. Kernell, 20, the University of Tennessee student tied by Internet sleuths to the hacking of Alaska governor Sarah Palin's Yahoo Mail account, has been indicted.

A federal grand jury in Knoxville, Tenn., indicted Kernell on Tuesday for intentionally accessing Palin's e-mail account without authorization. The indictment alleges that Kernell reset the account's password by answering several password recovery security questions, that he read Palin's e-mail, made screenshots, and that he posted that information and the account's password on a public Web site.

Kernell, the son of Tennessee State Rep. Mike Kernell, a Democrat, faces a maximum of five years in prison, a $250,000 fine, and three years of supervised release if convicted.

In contrast to the recent "failure of citizen journalism," when an Internet user's false report that Apple CEO Steve Jobs had suffered a heart attack led to a decline in Apple's stock, citizen forensics pointed to Kernell's possible involvement in the Palin e-mail hack long before the legal system reached the same conclusion.

Days after the breach was disclosed in mid-September, bloggers had identified an association between the alias "rubico" and Kernell. The indictment alleges that Kernell used the online nicknames "rubico" and "rubico10."

According to The Tennessean, Kernell was arraigned on Wednesday, arriving at the courthouse in shackles and handcuffs. He was released without bond. Under the terms of his release: he cannot leave the Eastern District of Tennessee without permission; he cannot have a computer, though he can access e-mail and the Internet for class work; and he cannot have any contact with Governor Palin or her family.

The trial date is scheduled for December 16.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3580
Published: 2014-12-18
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.

CVE-2014-4801
Published: 2014-12-18
Cross-site scripting (XSS) vulnerability in IBM Rational Quality Manager 2.x through 2.0.1.1, 3.x before 3.0.1.6 iFix 4, 4.x before 4.0.7 iFix 2, and 5.x before 5.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-6076
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allow remote attackers to conduct clickjacking attacks via a crafted web site.

CVE-2014-6077
Published: 2014-12-18
Cross-site request forgery (CSRF) vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2014-6078
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 do not have a lockout period after invalid login attempts, which makes it easier for remote attackers to obtain admin access via a brute-force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.