Attacks/Breaches
10/8/2008
12:51 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Sarah Palin E-mail Hack Suspect Indicted

A Tennessee Democratic state representative's son faces a maximum of five years in prison, a $250,000 fine, and three years of supervised release if convicted.

The U.S. Department of Justice on Wednesday said that David C. Kernell, 20, the University of Tennessee student tied by Internet sleuths to the hacking of Alaska governor Sarah Palin's Yahoo Mail account, has been indicted.

A federal grand jury in Knoxville, Tenn., indicted Kernell on Tuesday for intentionally accessing Palin's e-mail account without authorization. The indictment alleges that Kernell reset the account's password by answering several password recovery security questions, that he read Palin's e-mail, made screenshots, and that he posted that information and the account's password on a public Web site.

Kernell, the son of Tennessee State Rep. Mike Kernell, a Democrat, faces a maximum of five years in prison, a $250,000 fine, and three years of supervised release if convicted.

In contrast to the recent "failure of citizen journalism," when an Internet user's false report that Apple CEO Steve Jobs had suffered a heart attack led to a decline in Apple's stock, citizen forensics pointed to Kernell's possible involvement in the Palin e-mail hack long before the legal system reached the same conclusion.

Days after the breach was disclosed in mid-September, bloggers had identified an association between the alias "rubico" and Kernell. The indictment alleges that Kernell used the online nicknames "rubico" and "rubico10."

According to The Tennessean, Kernell was arraigned on Wednesday, arriving at the courthouse in shackles and handcuffs. He was released without bond. Under the terms of his release: he cannot leave the Eastern District of Tennessee without permission; he cannot have a computer, though he can access e-mail and the Internet for class work; and he cannot have any contact with Governor Palin or her family.

The trial date is scheduled for December 16.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.