Feeds

Hack suspect challenges privacy of Palin emails

Kernell lawyers mount maverick left field legal defence

Designing a Defense for Mobile Applications

Defence lawyers in the Sarah Palin webmail account hack case intend to claim the Alaskan governor's emails were a matter of public record and therefore enjoyed no expectation of privacy. The novel legal tactic is designed to reduce the seriousness of the charges against their client, David Kernell.

Citing an Alaskan court's decision that Palin's private webmail account, allegedly used for government business, ought to be preserved pending the resolution of a lawsuit, lawyers for hack trial defendant Kernell argue that hacking charges against the 20 year-old ought to be dropped or reduced to less serious misdemeanour offences.

Kernell's attorney Wade Davies reasons that since mails sent through Palin's webmail account were a matter of public record, there ought to be no expectation of privacy and therefore no violation of privacy in exposing these emails to public scrutiny.

The surprise legal manoeuvre by the defence in the closely-watched case is designed to thwart the main charges against Kernell, the 20 year-old student son of a Tennessee Democrat politician, Wired reports.

"He’s not suggesting that email can’t be private," Mark Rasch, a former Justice Department cybercrime prosecutor, told Wired. "He’s saying this particular email was not private or personal because of who she is and because it wasn’t intimate communication."

"He’s also saying that what was in the e-mails would ultimately have been revealed [under litigation], therefore she had no expectation of privacy in it," Rasch added.

Photos that Kernell allegedly obtained after hacking into Palin's email account aren't private either, because the former Republican vice-president candidate and her family were participants in innumerable photo-ops, defence lawyers further argued.

A hacker obtained access to Palin's Yahoo email account - gov.palin@yahoo.com - last September, after resetting its password using Yahoo's password resetting information and publicly available information. Screenshots taken from the account were posted onto the 4chan image board by a user called "Rubico", who informed denizens that the password had been changed to "popcorn".

Investigators traced these original posts back to machines used by Kernell, leading to computer hacking and later identity theft and fraud charges. Davies intends to defend his client against the fraud charges by arguing he accessed Palin's account out of curiosity rather than an intention to defraud, Wired adds.

Kernell’s trial is due to begin on 27 October. ®

Application security programs and practises

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.