Palin hacker's IP address linked to Tenn. student's apartment
Proxy service operator confirms IP address of hacker belongs to ISP that provides service to apartment searched by FBI
Computerworld - The man who traced the IP address of the hacker who accessed Alaska Gov. Sarah Palin's e-mail account last week confirmed today that it belongs to an Illinois company that provides Internet service to the Knoxville, Tenn., apartment complex where the FBI served a search warrant early Sunday.
Gabriel Ramuglia, the webmaster of Ctunnel, an Athens, Ga.-based proxy service used by the hacker to mask his or her identity, acknowledged that the IP address he found in his server logs belongs to Pavlov Media, an Internet service provider based in Champaign, Ill.
According to its Web site, Pavlov Media provides Internet, television and phone services to The Commons at Knoxville, a complex that specializes in apartments for students of the University of Tennessee-Knoxville.
Early Sunday, WBIR, Knoxville's NBC affiliate, reported that FBI agents had searched the apartment of David Kernell, 20, at The Commons. David Kernell is the son of Mike Kernell, a longtime Democratic state legislator from Memphis.
Last week, David Kernell was linked to the hack of Palin's e-mail account on blogs and message boards after someone identified only as "Rubico" claimed to have accessed Palin's account by using Yahoo Inc.'s password reset feature. Others subsequently connected the Rubico handle to the e-mail address email@example.com, which was in turn linked to Kernell through Internet searches that uncovered connections between him, the username and the e-mail address on sites such as YouTube.
Rubico claimed that the online research needed to reset Palin's password took just 45 minutes.
Ramuglia said Sunday that the IP address he found in the proxy service logs didn't "look consistent" with reports identifying Kernell. By today, however, he had changed his mind.
"It became clear that the ISP, in addition to serving Illinois, also serves Tennessee, which means that the IP address could actually be consistent with the news reports," Ramuglia said today.
Ramuglia had been asked by the FBI to save the proxy service's log -- logs are usually purged after seven days -- and to search for a specific IP address that authorities provided. The IP address was one in a block assigned to Pavlov Media.
Before the account break-in, Palin, the Republican nominee for vice president, had come under fire for using private e-mail accounts to conduct state business. Some critics had accused her and others in her administration of using private accounts rather than state-provided ones to skirt message-retention and public-records laws.
Palin e-mail hack
- Federal grand jury meets on Palin hacking case
- Yahoo, Hotmail, Gmail all vulnerable to Palin-style password-reset hack
- FBI searches Tenn. student's apartment in Palin hacking case
- Web proxy firm working with FBI to trace Palin e-mail hacker
- IT Blogwatch: Sarah Palin e-mail hacker drops anchor, arrr!
- Security researchers ponder possible Palin hacks
- Update: Hackers claim to break into Palin's Yahoo Mail account
- Sharon Machlis: Yahoo users: Like Sarah Palin, you may be vulnerable to an e-mail hack
- Douglas Schweitzer: How safe is your e-mail correspondence?
- Global News Update: Thursday, September 18, 2008
Read more about Networking in Computerworld's Networking Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts