Attacks/Breaches
10/8/2008
12:51 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Sarah Palin E-mail Hack Suspect Indicted

A Tennessee Democratic state representative's son faces a maximum of five years in prison, a $250,000 fine, and three years of supervised release if convicted.

The U.S. Department of Justice on Wednesday said that David C. Kernell, 20, the University of Tennessee student tied by Internet sleuths to the hacking of Alaska governor Sarah Palin's Yahoo Mail account, has been indicted.

A federal grand jury in Knoxville, Tenn., indicted Kernell on Tuesday for intentionally accessing Palin's e-mail account without authorization. The indictment alleges that Kernell reset the account's password by answering several password recovery security questions, that he read Palin's e-mail, made screenshots, and that he posted that information and the account's password on a public Web site.

Kernell, the son of Tennessee State Rep. Mike Kernell, a Democrat, faces a maximum of five years in prison, a $250,000 fine, and three years of supervised release if convicted.

In contrast to the recent "failure of citizen journalism," when an Internet user's false report that Apple CEO Steve Jobs had suffered a heart attack led to a decline in Apple's stock, citizen forensics pointed to Kernell's possible involvement in the Palin e-mail hack long before the legal system reached the same conclusion.

Days after the breach was disclosed in mid-September, bloggers had identified an association between the alias "rubico" and Kernell. The indictment alleges that Kernell used the online nicknames "rubico" and "rubico10."

According to The Tennessean, Kernell was arraigned on Wednesday, arriving at the courthouse in shackles and handcuffs. He was released without bond. Under the terms of his release: he cannot leave the Eastern District of Tennessee without permission; he cannot have a computer, though he can access e-mail and the Internet for class work; and he cannot have any contact with Governor Palin or her family.

The trial date is scheduled for December 16.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0656
Published: 2015-03-03
Cross-site scripting (XSS) vulnerability in the login page in Cisco Network Analysis Module (NAM) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCum81269.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.