Feeds

Student found guilty of obstruction in Sarah Palin email trial

Faces 20 years

SANS - Survey on application security programs

The college student who used publicly available information to break in to the Yahoo! Mail account of then-vice presidential candidate Sarah Palin has been found guilty on two of the four charges filed against him.

David C. Kernell was convicted of felony obstruction of justice and a misdemeanor count of unauthorized access to a computer, according to news reports. He was acquitted of wire fraud and the jury hearing the case deadlocked on a charge of identity theft.

Federal prosecutors haven't said whether they will retry Kernell, who is the son of a Democratic Tennessee lawmaker, on that last charge.

Kernel faces a maximum of 20 years on the conviction of obstruction of justice, which was brought because he deleted evidence from his hard drive. He faces an additional year on the misdemeanor.

His defense attorney characterized the breach as a college prank that had no criminal intent. He was a student at the University of Tennessee who chronicled the stunt on the 4chan website. But federal prosecutors said it was a serious effort to derail Palin's bid for vice president during the 2008 campaign.

In a Facebook post that compared the breach to the Watergate burglaries, Palin appeared to agree with the prosecution.

"Besides the obvious invasion of privacy and security concerns surrounding this issue, many of us are concerned about the integrity of our country’s political elections," she wrote. "America’s elections depend upon fair competition. Violating the law, or simply invading someone’s privacy for political gain, has long been repugnant to Americans’ sense of fair play."

According to testimony in the trial, Kernell spent about 20 minutes online to compile information needed to reset the password for Palin's Yahoo Mail account. At the time, several published reports questioned whether the then-Alaska governor was improperly using it to conduct official state business.

Kernell said he didn't find anything incriminating and posted a handful of messages and pictures online.

He is free on bail. A sentencing hearing has not been set. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.