Jump to content
scorpion

Hacking Gov Palin's Email Account

Recommended Posts

http://www.theregister.co.uk/2008/10/08/palin_email_hijack_indictment/

 

http://www.usdoj.gov/opa/documents/indictment.pdf

 

http://en.wikipedia.org/wiki/4chan

 

http://en.wikipedia.org/wiki/Wikileaks

 

http://www.ctunnel.com/

 

http://www.theregister.co.uk/2008/09/18/palin_email_investigation/

 

 

 

 

1. Defendant DAVID C. KERNELL was a resident of Knoxville, Tennessee. He occasionally used the nicknames "rubico" and "rubico10", among others, on the Internet .

 

2. Yahoo! was an Electronic Communications Service Provider providing e-mail and other services to the public in the United States and abroad, and its e-mail computers and servers for the yahoo.com domain are located in California.

 

3. Sarah Palin was Governor of the State of Alaska and the Republican nominee for Vice President of the United States.

 

4. Governor Palin maintained and used the e-mail account gov.palin@yahoo.com. On or about September 10,2008, the existence of this e-mail account was disclosed to the public by several news sources.

 

5. On or about September 16, 2008, while residing in Tennessee, defendant Kemell gained unauthorized access to the e-mail account gov.palin@yahoo,com, by resetting the password using Yahoo's password-recovery tool. Specifically, he reset the password to "popcorn" by researching and correctly answering a series of personal security questions.

 

6. Once defendant Kernell established control over the e-mail account by changing the password, he read the contents and made screenshots of the e-mail directory, e-mail content, and other personal infomiation, The personal information included, and was not limited to, other e-mail addresses of family members, pictures of family members, at least one cell phone number of a family member, the dates of birth of Governor Palin and another family member, and Governor Palin's address book for her Yahoo e-mail account. The screenshots of personal information obtained from the gov.palin@yahoo.com account were posted to a public website on the Internet known as http://www-4CHAN.org. Defendant Kernell posted the reset password, thus providing the means of access to the e-mail account to others.

 

7. At least one other individual successfully used the reset password to access Governor Palin's e-mail account.

 

8. After posting the new password to http://www,4CHAN.org, and in contemplation of an investigation by law enforcement authorities, defendant Kernell, removed, altered, concealed and covered up files on his laptop computer.

Share this post


Link to post
Share on other sites

It's not new. There wasn't a lot of interesting stuff in there except that she uses a personal e-mail account for some official business.

Share this post


Link to post
Share on other sites

True. Only the identification of the offender is new in the news.

 

I just find it interesting that he is using non login websites, but is brought down by a proxy.

 

He went through all of this trouble to remain "anonymous" and it did not work!!

Share this post


Link to post
Share on other sites
True. Only the identification of the offender is new in the news.

 

I just find it interesting that he is using non login websites, but is brought down by a proxy.

 

He went through all of this trouble to remain "anonymous" and it did not work!!

 

He didn't even do a good job at that. 4chan seemed to know who did it well before the feds did.

Share this post


Link to post
Share on other sites

I hope he gets some jail time.

 

No matter what your politics are, that's not right... and in the middle of an election?

 

He needs to burn.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×