Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Attorneys for Palin email hacker: 'Don't call him hacker'
The Register ^ | 13th November 2008 | Dan Goodin

Posted on 11/13/2008 3:23:04 PM PST by nickcarraway

Attorneys for the University of Tennessee student accused of breaking into Alaska Governor Sarah Palin's email account have filed a small forest's worth of court documents in defense of the high-profile suspect. Among them is a motion to prohibit prosecutors from referring to their client as a hacker.

The terms "hacker" and "hacking" have no basis under the statute Kernell is accused of violating, a motion filed in US District Court in Knoxville argues. It goes on to seek an order forbidding prosecutors and their witnesses from using those words when referring to the case.

"Because of the negative connotations evoked by these terms, there is a significant danger of unfair prejudice, confusion of the issues, and misleading the jury," the motion states. "Hackers are commonly portrayed as dangerous criminals who are involved in malicious conduct such as credit card fraud, stealing, intentional disruption of legitimate activities and causing economic damages."

According to accounts provided in court documents and a narrative taken from the 4chan website, Kernell accessed Palin's Yahoo email account by correctly guessing three password-reset questions using information that was readily available online.

"'Hacking,' which implies the use of sophisticated means or specialized computer skills, is not applicable to the alleged conduct," attorneys for Kernell wrote.

They aren't the first people to quibble with use of such terms in describing the acts Kernell allegedly carried out. Some seasoned security experts have also taken issue with use of the word "hack" to be synonymous with "electronic intrusion."

"It doesn't constitute what we would label as advanced hacking," Rob Graham, CEO of consultancy firm Errata Security, said of the acts alleged in the indictment. "It's something that a teen can figure out, rather than an advanced professional."

The document is one of three defense motions filed since Kernell was indicted in early October for intentionally accessing a protected computer without authorization. The barrage suggests attorneys for Kernell, the son of a a Democratic Tennessee state lawmaker, intend to mount a defense that is considerably more vigorous than many in computer crime cases.

One motion argues that prosecutors improperly charged Kernell with a felony instead of a misdemeanor, as the statute in the case calls for. Under the law, the unauthorized access of a protected computer should be classified as a misdemeanor except when it is used to further a separate crime. In Kernell's indictment, that other crime is the unauthorized access of Palin's email account.

The indictment "is very strangely pled and circular," said Jennifer Granick, a staff attorney for the Electronic Frontier Foundation. "It's not surprising given the nature of the charges and given the quality of the indictment that the defendant would see a real opportunity here to make some points in favor of the defendant."

A separate motion jointly filed by the prosecution and defense seeks to delay the trial date, which is currently set for December 16. The judge in the case has yet to rule on any of the motions. Don't expect this case to be settled anytime soon.


TOPICS: Crime/Corruption; Extended News; News/Current Events; Politics/Elections; US: Tennessee
KEYWORDS: corruptdems; cracker; eff; erratasecurity; hacker; jennifergranick; kernell; palin; palinemail; robgraham
Navigation: use the links below to view more comments.
first 1-2021-4041-58 next last

1 posted on 11/13/2008 3:23:04 PM PST by nickcarraway
[ Post Reply | Private Reply | View Replies]

To: nickcarraway

A Hacker is a hacker is a hacker . . .


2 posted on 11/13/2008 3:26:53 PM PST by YHAOS
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway
"'Hacking,' which implies the use of sophisticated means or specialized computer skills, is not applicable to the alleged conduct," attorneys for Kernell wrote.

Bingo. He used the password recovery feature of a free email service.

No 2600 t-shirt for him.

3 posted on 11/13/2008 3:26:56 PM PST by CE2949BB (Fight.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

What name does he prefer—”d*****bag”?


4 posted on 11/13/2008 3:27:06 PM PST by randog (What the...?!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway
Okay, how about we simplify and just call him the low life excretement that he is?



Many more designs here.

5 posted on 11/13/2008 3:27:06 PM PST by Jeff Head (Freedom is not free...never has been, never will be. (www.dragonsfuryseries.com))
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

Hacker! Hacker! Hacker! Hacker! Hacker! Hacker! Hacker!


6 posted on 11/13/2008 3:27:53 PM PST by austinaero
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

Why is Kernell still referred to as a student at the University of Tennessee? Hasn’t he been expelled?


7 posted on 11/13/2008 3:29:45 PM PST by xtinct (Any man may easily do harm, but not every man can do good to another. Plato)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

cretin fits.


8 posted on 11/13/2008 3:30:45 PM PST by NonValueAdded (Jimmah Carter cubed. Obama, the only man in America who can make Hillary Clinton look good.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

OK they can just call him Stalker.


9 posted on 11/13/2008 3:31:35 PM PST by NutCrackerBoy
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

David Kernell is a Slacker Hacker. You know, the kind of hacker that doesn’t write a line of code to get what he wants.


10 posted on 11/13/2008 3:32:15 PM PST by AmericanGirlRising (HOPE is not a strategy just like CHANGE is not a destination.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

Just because he didn’t employ particularly sophisticated techniques, he did maliciously hack into someones account, and bragged about it. He employed identity masking techniques to cover his tracks. He deserves to have the book thrown at him to wipe the punk smile off his mug. And his daddy too.


11 posted on 11/13/2008 3:33:12 PM PST by bitterohiogunclinger (America held hostage - day 9)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

“Attorneys for Palin email hacker: ‘Don’t call him hacker’”

Call him what they will call him in jail; MARY.


12 posted on 11/13/2008 3:33:37 PM PST by jessduntno (Barack - Swahili for "High Wind, Big Thunder, No Rain")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jeff Head
Now there's a bumper sticker, when is it too early to start campaigning for her?
13 posted on 11/13/2008 3:33:44 PM PST by DelphiUser ("You can lead a man to knowledge, but you can't make him think")
[ Post Reply | Private Reply | To 5 | View Replies]

To: nickcarraway

OK we’ll just call him the son of an ass. How’s that?


14 posted on 11/13/2008 3:34:23 PM PST by fkabuckeyesrule (I still love Sarah!!!!!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

I’m sure they dont want a felony charge for kernal. He is probably on obama’s short list for chief technology officer.


15 posted on 11/13/2008 3:35:11 PM PST by mouse1 (I will fight for my America.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: YHAOS

He’s not a hacker. It’s an insult to hackers to call what this punk did hacking. They are jerks and slime, but at least what they do takes some knowledge. What he did takes none.


16 posted on 11/13/2008 3:35:47 PM PST by SlapHappyPappy
[ Post Reply | Private Reply | To 2 | View Replies]

To: nickcarraway

Okay, just call him a criminal....after all, it was criminal activity.


17 posted on 11/13/2008 3:36:14 PM PST by anniegetyourgun
[ Post Reply | Private Reply | To 1 | View Replies]

To: CE2949BB

Is it possible he’s actually claiming to have used the password recovery feature to cover up a more sophisticated method?


18 posted on 11/13/2008 3:37:25 PM PST by nickcarraway (Are the Good Times Really Over?)
[ Post Reply | Private Reply | To 3 | View Replies]

To: nickcarraway

“Negative connotations”?

It was a pretty negative act. There was no good-will at all in its execution.

In a murder trial, is the term “murder” no longer permitted to be spoken? How does the prosecuter describe the crime with which the perpetrator is charged?


19 posted on 11/13/2008 3:38:30 PM PST by alloysteel (Molon labe! Roughly translated, "Come and take them!" referring to personal weapons.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

I agree … don’t call him a hacker. A real hacker would not have been caught. ;-)


20 posted on 11/13/2008 3:38:41 PM PST by doc1019 (We are now an Obamanation. Palin 2012)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-58 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson