Attacks/Breaches
10/8/2008
12:51 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Sarah Palin E-mail Hack Suspect Indicted

A Tennessee Democratic state representative's son faces a maximum of five years in prison, a $250,000 fine, and three years of supervised release if convicted.

The U.S. Department of Justice on Wednesday said that David C. Kernell, 20, the University of Tennessee student tied by Internet sleuths to the hacking of Alaska governor Sarah Palin's Yahoo Mail account, has been indicted.

A federal grand jury in Knoxville, Tenn., indicted Kernell on Tuesday for intentionally accessing Palin's e-mail account without authorization. The indictment alleges that Kernell reset the account's password by answering several password recovery security questions, that he read Palin's e-mail, made screenshots, and that he posted that information and the account's password on a public Web site.

Kernell, the son of Tennessee State Rep. Mike Kernell, a Democrat, faces a maximum of five years in prison, a $250,000 fine, and three years of supervised release if convicted.

In contrast to the recent "failure of citizen journalism," when an Internet user's false report that Apple CEO Steve Jobs had suffered a heart attack led to a decline in Apple's stock, citizen forensics pointed to Kernell's possible involvement in the Palin e-mail hack long before the legal system reached the same conclusion.

Days after the breach was disclosed in mid-September, bloggers had identified an association between the alias "rubico" and Kernell. The indictment alleges that Kernell used the online nicknames "rubico" and "rubico10."

According to The Tennessean, Kernell was arraigned on Wednesday, arriving at the courthouse in shackles and handcuffs. He was released without bond. Under the terms of his release: he cannot leave the Eastern District of Tennessee without permission; he cannot have a computer, though he can access e-mail and the Internet for class work; and he cannot have any contact with Governor Palin or her family.

The trial date is scheduled for December 16.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6856
Published: 2014-10-02
The AHRAH (aka com.vet2pet.aid219426) application 219426 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6857
Published: 2014-10-02
The Car Wallpapers HD (aka com.arab4x4.gallery.app) application 1.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6858
Published: 2014-10-02
The Mostafa Shemeas (aka com.mostafa.shemeas.website) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6859
Published: 2014-10-02
The Daum Maps - Subway (aka net.daum.android.map) application 3.9.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6860
Published: 2014-10-02
The Trial Tracker (aka com.etcweb.android.trial_tracker) application 1.1.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.