US man indicted for hacking Palin's e-mail account
- 09 October, 2008 11:00
A 20-year-old Tennessee man has been indicted for hacking into an e-mail account of U.S. vice presidential candidate Sarah Palin, according to court records.
David C. Kernell was indicted Tuesday on a single charge of accessing a protected computer by a grand jury in U.S. District Court for the Eastern District of Tennessee in Knoxville. The indictment, which carries a maximum sentence of five years in prison and a US$250,000 fine, was unsealed Wednesday, the U.S. Department of Justice said.
Kernell, from Knoxville, turned himself into law enforcement authorities on Wednesday and was released the same day after pleading not guilty at his arraignment. His trial is set for Dec. 16, according to a statement from his attorney, Wade Davies.
David Kernell is the son of Mike Kernell, a Democratic state representative from Memphis.
The three-page indictment alleges that Kernell gained access to a Yahoo e-mail account used by Palin, the Republican governor of Alaska, on about Sept. 16. Palin was named Senator John McCain's vice-presidential running mate in August.
The next day, Wikileaks.org published several screen shots of Yahoo e-mail messages, e-mail addresses of Palin family members and associates, and other data that hackers claimed to have obtained from Palin's private account.
A hacking group known as Anonymous claimed to have gained access to Palin's firstname.lastname@example.org account and sent the information to Wikileaks, which acts as an anonymous clearinghouse for leaked documents.
"Governor Palin has come under criticism for using private email accounts to conduct government business and in the process avoid transparency laws," Wikileaks wrote in a note accompanying the material. "The list of correspondence, together with the account name, appears to re-enforce the criticism."
Bloggers had fingered Kernell as a suspect after linking him to the online name "rubico," used by the hacker who claimed to have accessed Palin's Yahoo account. Rubico claimed to have accessed the account by using Yahoo's password reset feature and answering security questions with publicly available information, and the indictment supports that claim. He guessed correctly that Palin had met her husband at Wasilla High.
The indictment alleges that Kernell posted screenshots of Palin's e-mail messages, e-mail addresses of her family members, pictures of her family and at least one mobile phone number to the 4chan.org Web site. It's unclear in the indictment how the information came to Wikileaks from 4chan.org, an image-based bulletin board.
Another person also reset the account's password and was able to access Palin's e-mail account, the indictment said.
According to a report in the Knoxville News Sentinel, Kernell was released on the condition that he stay away from computers. He is also barred from leaving east Tennessee without the permission of his parole officer.
When U.S. Magistrate Judge C. Clifford Shirley told him not to discuss the case with any potential witnesses, Kernell asked if that included his girlfriend too.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Backup and Recovery: Will Virtualisation Work?
- Securing the Road to Virtualization and Beyond
- Unified Recovery Management - Reducing Risk and Cost by Simplifying the Recovery Infrastructure
- Easing The Transition To A Virtual Endpoint Infrastructure
- Endpoint Security Performance in Desktop Virtualisation Environments
- HTC unveils new Butterfly s phone that packs more battery life
- Google Glass apps for enterprises coming by early 2014
- iPad 5 rumour rollup for the week ending June 18
- Say 'cheese', Earthlings! Spacecraft to snap home planet pic from deep space
- Social media adds spice to financial services, say banks
Samsung Galaxy S4 vs. HTC One: 5 Reasons to Choose the GS4
High school students still see ICT as ‘sitting at a computer all day’: survey
Does encryption really shield you from government's prying eyes?
Solving the skills conundrum – part 1
"How many of the Fortune 500 companies have access to PRISM? https://en.wikipedia.org/wiki/Industrial_espionage ..."Australia suspected to have PRISM data: Ludlam
How Web Security Improves Productivity and Compliance
In this white paper, we will look at how secure web gateways, one type of information security technology, can provide benefits to many departments within any business or government agency. Download now.
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
Enterprises and government agencies are under virtually constant attack today. It is clear that the cybercriminals, nation-states, and hacker activists waging these attacks are growing increasingly sophisticated and more effective in their efforts to steal and sabotage. Why are today’s security defenses failing? In this battle, your security teams are using outdated arsenal - download now to learn more.
The Foundation for Cloud Management
For businesses looking to provide real-time business solutions to employees and customers alike, you need to have a comprehensive network management strategy. The network is the foundation of all successful cloud services; it must be robust to meet traffic, efficiency, and performance demands. Download today the four steps to get your network operations cloud-ready.