Palin hacker's IP address linked to Tenn. student's apartment
Proxy service operator confirms IP address of hacker belongs to ISP that provides service to apartment searched by FBI
Computerworld - The man who traced the IP address of the hacker who accessed Alaska Gov. Sarah Palin's e-mail account last week confirmed today that it belongs to an Illinois company that provides Internet service to the Knoxville, Tenn., apartment complex where the FBI served a search warrant early Sunday.
Gabriel Ramuglia, the webmaster of Ctunnel, an Athens, Ga.-based proxy service used by the hacker to mask his or her identity, acknowledged that the IP address he found in his server logs belongs to Pavlov Media, an Internet service provider based in Champaign, Ill.
According to its Web site, Pavlov Media provides Internet, television and phone services to The Commons at Knoxville, a complex that specializes in apartments for students of the University of Tennessee-Knoxville.
Early Sunday, WBIR, Knoxville's NBC affiliate, reported that FBI agents had searched the apartment of David Kernell, 20, at The Commons. David Kernell is the son of Mike Kernell, a longtime Democratic state legislator from Memphis.
Last week, David Kernell was linked to the hack of Palin's e-mail account on blogs and message boards after someone identified only as "Rubico" claimed to have accessed Palin's account by using Yahoo Inc.'s password reset feature. Others subsequently connected the Rubico handle to the e-mail address email@example.com, which was in turn linked to Kernell through Internet searches that uncovered connections between him, the username and the e-mail address on sites such as YouTube.
Rubico claimed that the online research needed to reset Palin's password took just 45 minutes.
Ramuglia said Sunday that the IP address he found in the proxy service logs didn't "look consistent" with reports identifying Kernell. By today, however, he had changed his mind.
"It became clear that the ISP, in addition to serving Illinois, also serves Tennessee, which means that the IP address could actually be consistent with the news reports," Ramuglia said today.
Ramuglia had been asked by the FBI to save the proxy service's log -- logs are usually purged after seven days -- and to search for a specific IP address that authorities provided. The IP address was one in a block assigned to Pavlov Media.
Before the account break-in, Palin, the Republican nominee for vice president, had come under fire for using private e-mail accounts to conduct state business. Some critics had accused her and others in her administration of using private accounts rather than state-provided ones to skirt message-retention and public-records laws.
Palin e-mail hack
- Federal grand jury meets on Palin hacking case
- Yahoo, Hotmail, Gmail all vulnerable to Palin-style password-reset hack
- FBI searches Tenn. student's apartment in Palin hacking case
- Web proxy firm working with FBI to trace Palin e-mail hacker
- IT Blogwatch: Sarah Palin e-mail hacker drops anchor, arrr!
- Security researchers ponder possible Palin hacks
- Update: Hackers claim to break into Palin's Yahoo Mail account
- Sharon Machlis: Yahoo users: Like Sarah Palin, you may be vulnerable to an e-mail hack
- Douglas Schweitzer: How safe is your e-mail correspondence?
- Global News Update: Thursday, September 18, 2008
Read more about Networking in Computerworld's Networking Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts