05:37 PM
Connect Directly

Sarah Palin E-Mail Hacker Tied To Tennessee Democrat

Department of Justice investigators have declined to comment on the status of the Palin e-mail investigation.

David Kernell, 20, son of Tennessee Democratic state Rep. Mike Kernell, may soon be speaking with the FBI and the Secret Service about whether he played a role in the hacking of Republican vice presidential candidate Sarah Palin's Yahoo Mail account.

According to The Tennessean, the elder Kernell has confirmed that his son, a University of Tennessee-Knoxville student, is "the person who was the subject of speculation on blogs on the subject."

What the bloggers have been speculating about is that the younger Kernell owns the e-mail address rubico10@yahoo.com. The "Rubico" address has been linked to an apparent confession in the Palin hacking incident that was posted initially on the 4chan.org forum and later on various news sites and blogs.

"Rubico's" purported confession described how easy it was to reset the password of Sarah Palin's Yahoo Mail account and to hijack it.

Palin has been criticized for using a nongovernment e-mail account as a way to avoid accountability for official communications.

Alaska lawmakers are investigating accusations that she fired the state's public-safety commissioner because he wouldn't fire her ex-brother-in-law, a state trooper.

A report on Memphis CBS affiliate WREG-TV said that the FBI's Anchorage, Alaska, office has been in contact with the FBI in Memphis in conjunction with the Palin e-mail investigation. The FBI and Secret Service began looking into the incident Wednesday.

A Department of Justice spokeswoman declined to comment on the status of the Palin e-mail investigation.

According to the Electronic Frontier Foundation, the Justice Department "may be hamstrung in any prosecution of [the Palin e-mail hack] by its restrictive view of 'electronic storage.' "

The Justice Department, in its Prosecuting Computer Crimes Manual, argues that e-mail, once it has been read, is neither stored nor backed up under the terms of the Stored Communications Act. Such messages thus do not qualify for protection under the act.

There are, however, other computer crime statues that could be brought to bear. In a blog post, Andrew Grossman, senior legal policy analyst at the Heritage Foundation, suggests computer fraud charges could be filed.

The Justice Department spokeswoman declined to comment about possible charges.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-08
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

Published: 2015-10-08
Cybozu Garoon 3.x through 3.7.5 and 4.x through 4.0.3 mishandles authentication requests, which allows remote authenticated users to conduct LDAP injection attacks, and consequently bypass intended login restrictions or obtain sensitive information, by leveraging certain group-administration privile...

Published: 2015-10-08
The REST interface in Cisco Unified Communications Manager IM and Presence Service 11.5(1) allows remote attackers to cause a denial of service (SIP proxy service restart) via a crafted HTTP request, aka Bug ID CSCuw31632.

Published: 2015-10-08
Cisco Wireless LAN Controller (WLC) devices with software 7.0(240.0), 7.3(101.0), and 7.4(1.19) allow remote attackers to cause a denial of service (device outage) by sending malformed 802.11i management data to a managed access point, aka Bug ID CSCub65236.

Published: 2015-10-06
libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 21335999.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.