« Wrong number | Main | The Knucklehead of the Day award »

Hey, Secret Service...

If you want to catch the criminals who hacked into Sarah Palin's email, check here first.

Memo to law enforcement investigators tracking down who broke into Sarah Palin's Yahoo email account: Gabriel Ramuglia might be a good place to start.

The 25-year-old webmaster and entrepreneur is the operator of Ctunnel.com, the browsing proxy service used by the group that hacked into the vice presidential candidate's personal email account and exposed its contents to the world. While he has yet to examine his logs, he says there's a good chance they will lead to those responsible, thanks to some carelessness on their part.

"Usually, this sort of thing would be hard to track down because it's Yahoo email, and a lot of people use my service for that," he told El Reg in a phone interview. "Since they were dumb enough to post a full screenshot that showed most of the [Ctunnel.com] URL, I should be able to find that in my log."

[...]

Ramuglia said if he is contacted by law enforcement officials he will probably give them the information they seek. At time of writing, he's received no inquiries from any law enforcement agencies, he said.

The breach of Palin's account "is pretty clearly against my terms of service," he said. "As exciting as it is to be in the news, this is not the type of activity I can encourage by any means."

Hat tip: Hot Air

Unlike the Associated Press, this guy understands the difference between right and wrong. But the AP is also motivated by politics. Since they're in the tank for Obama, they're not going to do anything that will help Sarah Palin.


TrackBack

TrackBack URL for this entry:
/cgi-bin/mt-tb.cgi/31688.

Comments (13)

You can bet your bippy ther... (Below threshold)
Gmac:

You can bet your bippy there's someone enjoying their last few hours of freedom quaking in fear at this very moment because they were stupid enough to post that information.

The act they committed is a felony. They made the choice to give up a wide variety of things like any chance to be federally employed, own a firearm for self defense, hold a security clearance, vote, etc...

I do kind of like the fact that they'll loose their ability to vote though, one less Democrat id10t at the polls.

Was the hack real? The ema... (Below threshold)
cstmbuild:

Was the hack real? The email I saw referenced "God and Pray for me" too many times. I don't care how religious you are this one just seemed set up. I think out of 5 or 6 sentences God and praying was mentioned in all but one.(?)

Maybe the hack was real and they altered or made up that particular email, but.....

Did they think the main topic would be the email with so many uses of God and praying?

You know they won't throw the book at them like they should. The media has not gotten the public riled up about it. I bet that those of us who read blogs are the only ones that now about it. I'm sure it will be sent out in liberal emails and we'll be hearing Damon or Babbs quoting the "offending passages" (READ: any reference to God) as the TRUTH.

Just my $0.02

(AP)Obama tried to antic... (Below threshold)

(AP)Obama tried to anticipate his critics and called on the crowd of about 1,500 to sharpen their elbows, too.

"I need you to go out and talk to your friends and talk to your neighbors. I want you to talk to them whether they are independent or whether they are Republican. I want you to argue with them and get in their face," he said.

In their face and, apparently, their personal email accounts. After all (from the same piece): Obama has tried to assure donors and voters that he's been schooled by Chicago politics.

"I'm skinny but I'm tough," he says.

Is any of this starting to sink in, Obama supporters? Want to go back to finding unqualified thugs with an officeful of classified FBI files at the behest of your President? Want some sort of paramilitary youth corps 'in your face' arguing with you if you disagree with Great Leader? You do realize that's pretty much what your candidate was teaching during his 'community organizer' days.

oh for pete's sake. what E... (Below threshold)

oh for pete's sake. what EXACTLY is the issue with the template wizbang uses, where the preview does not match the post and where formatting can not be carried past a carriage return? And can it be fixed?

You can tell where additional italicizing should fit in that last post...

"But the AP is also motivat... (Below threshold)
jp2:

"But the AP is also motivated by politics. Since they're in the tank for Obama, they're not going to do anything that will help Sarah Palin."

Yes, having Murdoch and Fournier leading the way really sells your case, Kim.

Anyways, it's quite refreshing to see the right wing care about privacy issues again. Welcome back.

Privacy for citizens mindin... (Below threshold)

Privacy for citizens minding their own business, yes. Privacy for terrorists, no. That's the difference between the right and the left wing.

Jonathan Martin of... (Below threshold)
Jonathan Martin of The Politico is on Greta and his focus isn't on the invasion of privacy but on "what else could be out there," meaning that he's hoping that she gets caught breaking the law.

The media meme in action! Since it's a Republican's email, the issue is about the contents of the leaked material. If it had been a Democrat's email, Martin would have been harumphing about the illegality of the leak and the necessity of catching and prosecuting the leakers.

The left has no moral compa... (Below threshold)
WildWillie:

The left has no moral compass. All is fair even if it destroys a family. ww

"Anyways, it's quite ref... (Below threshold)

"Anyways, it's quite refreshing to see the right wing care about privacy issues again."

Yeah, because, I mean, you expressed your own concern about it here in no uncertain terms, right?

jp2 - "Anyways, it's qu... (Below threshold)
marc:

jp2 - "Anyways, it's quite refreshing to see the right wing care about privacy issues again. Welcome back."

Funny jp2, but let me propose a scenario for ya, and with this background, the liberal loons have slithered out of the woodwork making the claim Palin's private emails are fair game ( and don't attempt to say they haven't it would only show tou to be the fool):

Let's say Palin was exchanging emails with what the FBI and CIA discovered were known terrorists in some far-flung dot on the globe.

The chances of the the same loons noted above screaming Bush was violating Palin's 4th amendment rights were violated are pretty G-Damn high.

But the loons would NEVER admit that as a remote possibility.

jp2~You're a big p... (Below threshold)
LaMedusa:

jp2~

You're a big phony. Stop trying to act like you're on top of it all. "It should be said" without proof regarding McCain supposedly taking the most contributions doesn't make your statement more reliable. Also, stop acting like you care about protecting anyone's privacy except your own. Baloney!

Barracuda refused to turn o... (Below threshold)
meguys:

Barracuda refused to turn over 1100 emails in a F.O.I.A. Stating they are of a personal nature, when they are not. That's a federal crime. It's a pre-meditated crime,which to commit the crime of illegally shielding government documents is why she was using the account in the first place. Moreover the Attorney Generals Office of the great state of Alaska just issued an opinion that if government documents are in a private e-mail account,the State has the right to review them, that they must be saved for three years, and that to destroy (delete) them is a crime.In my opinion, Palin or someone in her employment (McCorkell? Having a P.I. Background & couldn't resist giving herself 2 min. of fame)done this as an excuse to delete and/or discredit the account.I believe the trail will lead back to them if it's followed in a prudent manner. Everyone so smart call this hacker so dumb.Do we have a sloppy hacker or a smart and devious hacker framing the kid?don't say no or act like you're so smart if you haven't considered it.If the I.P. Addy matches the kid in question yet it still doesn't add up a then programs like netbus or back orifice with a built in wiping routine should be considered. These are common names for a trojan jacker that a hacker can take over your computer use it without you knowing it,then attack others with your computer address.It turns your computer into a proxy..after the deed is done it can erase itself and fill in where it was with random bytes. Anyone can download these programs off the net in a matter of three minutes..Remember M.O.M. (means,opportunity,& motive)Who really has all three? Palin...Let us not forget the bug Karl Rove found in his Texas office and the WHOLE story behind that!! What, you don't know what I'm talking about? Well then just nevermind

"Barracuda refused to turn ... (Below threshold)
LaMedusa:

"Barracuda refused to turn over 1100 emails in a F.O.I.A. Stating they are of a personal nature, when they are not."

No sources, just bather.




Advertisements









rightads.gif

beltwaybloggers.gif

insiderslogo.jpg

mba_blue.gif

Follow Wizbang

Follow Wizbang on FacebookFollow Wizbang on TwitterSubscribe to Wizbang feedWizbang Mobile

Contact

Send e-mail tips to us:

[email protected]

Fresh Links

Credits

Section Editor: Maggie Whitton

Editors: Jay Tea, Lorie Byrd, Kim Priestap, DJ Drummond, Michael Laprarie, Baron Von Ottomatic, Shawn Mallow, Rick, Dan Karipides, Michael Avitablile, Charlie Quidnunc, Steve Schippert

Emeritus: Paul, Mary Katherine Ham, Jim Addison, Alexander K. McClure, Cassy Fiano, Bill Jempty, John Stansbury, Rob Port

In Memorium: HughS

All original content copyright © 2003-2010 by Wizbang®, LLC. All rights reserved. Wizbang® is a registered service mark.

Powered by Movable Type Pro 4.361

Hosting by ServInt

Ratings on this site are powered by the Ajax Ratings Pro plugin for Movable Type.

Search on this site is powered by the FastSearch plugin for Movable Type.

Blogrolls on this site are powered by the MT-Blogroll.

Temporary site design is based on Cutline and Cutline for MT. Graphics by Apothegm Designs.

Author Login



Terms Of Service

DCMA Compliance Notice

Privacy Policy