Posted on 09/19/2008 11:41:14 AM PDT by jessduntno
The guy who hacked into would-be VP Sarah Palins Yahoo email account is none other than the son of a Democratic state representative from Tennessee, posits GatwayPundit. A convincing amount of evidence suggests the hacker (perhaps a status he doenst deserve) is David Kernell, son of Tennessee representative Mike Kernell.
(Excerpt) Read more at government.zdnet.com ...
1. The guy who has the proxy he went through to hide his tracks will sift through the logs to find the IP address he came from. Luckily this idiot posted the exact URL he used, so that will be easy.
2. The feds will serve a warrant or subpoena to the ISP or university that owns that IP address, demanding the logs of all connections to that proxy server. That will produce a local IP address.
3. Then they’ll either look up what account that’s assigned to if static addresses are used, or look in the DHCP log if dynamic (you get a different one most of the time you log on) addresses are used.
4. Match account to the person.
5. Visit by the guys in suits.
The idiot used a domestic proxy with a clear “no illegal stuff” policy so I doubt he’s smart enough to cover his tracks to evade steps 2-4.
-PJ
I have a real appreciation for a guy who can put his sworn duty above all else and actually protect slime like Clinton.
I honestly doubt that is true. If, however, they did, the old man should be prosecuted to the fullest, and then some.
As far as the son of the Democrat politician being the suspected hacker, that's on local TV news channels in TN--take a look at the NewsChannel5.com website from Nashville or the www.volunteertv.com website from Knoxville and you will see that they have the story prominently listed.
I would say that interrupting your parents 25th wedding anniversary trip would have consequences of its own.
Mike Kernell, a longtime Tennessee state assemblyman from Memphis and a technology enthusiast, is concerned about future elections because the new machines are harder to get a look at. ‘’We used to be able to check the machines and see if they’d been tampered with,’’ he said. ‘’It is now almost impossible.’’ Mr. Kernell wonders whether he will have to hire a computer programmer in his next race to make sure the machines are working smoothly and haven’t been tampered with. ‘’We’ve hit a brick wall,’’ he said.
Thanks. 2 other posters on this thread pointed-out that Kernel admitted his actions. I’m sure that the investigators will still follow his tracks in making their case. I was curious how this type of thing gets done.
I’m a little familiar with networks & the differences between static & dynamic addressing. But if anybody else has access to the computer used in this crime it could be tough to make a case. A more sophisticated hacker might have used a “public computer”, like one at an internet cafe.
Care to produce a quote where I "defended the smasher's rights", or will you admit that you're just being an ass?
((I bet this kid is on some major meds.....))
“That Palin’s e-mail account was hacked into got wider coverage, since the liberals wanted to use it to accuse her of using a private email for government business to shield her messages from a potential subpoena. Gloria Allred was on Greta on Wed. evening spouting that line.”
How much coverage will *this* get?
“I really wanted to get something incriminating which I was sure there would be,” the e-mails said. “I read though the e-mails ALL OF THEM before I posted, and what I concluded was anticlimactic, there was nothing there, nothing incriminating, nothing that would derail her campaign as I had hoped, all I saw was personal stuff, some clerical stuff from when she was governor and pictures of her family.”
“Let’s see now, if it is Democrat Mike Kernell fault that his son did the hack, is it also Sarah Palins fault that her daughter got pregnant.”
I’d say it is likely his Dad helped with the hack. What will your next silly question be?
The easy thing to do is drive around town with a wireless sniffer (actually, even an iPod Touch will act as one in this case) to find an open wireless network at a place where loitering won't be noticed and there are no cameras. Then either park or sit on a bench nearby and do your business. Preferably don't do this in your own town.
A more sophisticated hacker might use a mix of intentional public proxies (like this one), accidentally left open proxies (a lot of idiots do that), anonmyous proxies (that don't keep logs) and computers he's compromised all over the world. String them all together and go for it.
Anybody who calls this kid a hacker is insulting hackers.
“((I bet this kid is on some major meds.....)) “
No doubt.
Here is a website created by someone who has worked with Sarah Palin on corruption in Alaska. It’s worth a look for some reference material.
http://www.palinfightscorruption.com/palin/
[snip]Sarahs entry onto the scene was out-of-the box, to put it mildly. She displaced former U.S. Senator Frank Murkowski from the Governors mansion and immediately set out to reverse years of preferential oil company policies. She rejected the oil companies gas pipeline plan in favor of an open, competitive process that resulted in the first concrete steps to significant gas production in Alaska. When one of the oil companies failed to develop a gas and oil lease that it had held for decades, she began forfeiture proceedings against it.
But more importantly, she wanted to clean up politics in Alaska. With total disregard for her own political future, she boldly took on her own party, holding it accountable for its ties to an oil contracting company that has since been connected with the bribery of several Alaskan legislators. This angered the state GOP leadership and long-time party activists who benefited from significant campaign contributions from oil.
As recently as this past spring, during the Alaska GOP state convention, she asked GOP delegates to turn their back on corruption and choose new party leadership independent of oil lobbyists. But using blatantly illegal parliamentary tactics, and creating an exodus of disgruntled delegates in the process, the party avoided that change by the thinnest of margins.
Frankly, that explains the current intrastate campaign against the governor. When the Alaska state senate president attacks Sarah for lack of experience, one need only investigate that GOP senators deep and unseemly connections to the oil industry. Even on the other side of the aisle, internal attacks are explained by connections to oil or, in the case of the legislator purporting to investigate her for ethical lapses, gubernatorial aspirations.
So what about the people who know her, her constituents? Unlike the disgruntled political adversaries and oil company lobbyists, real Alaskans from all political stripes endorse her with a resounding 80% approval rating, the highest of any governor nationwide. Why? Because they know shell never sell out. Pundits concerned about her advancement to the Oval Office should take some comfort in that.
The writer is an attorney in Fairbanks. He is a former U.S. Magistrate Judge, state judicial officer, and decorated Gulf War Veteran (B.S., United States Military Academy; J.D., Yale Law School; M.S., Resource Economics, University of Alaska).
©Joseph W. Miller
He suffers from “acute depression” and has been institutionalized twice. He will plead insanity.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.