Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Memo to US Secret Service: Net proxy may pinpoint Palin email hackers

Not quite Anonymous


Updated Memo to law enforcement investigators tracking down who broke into Sarah Palin's Yahoo email account: Gabriel Ramuglia might be a good place to start.

The 25-year-old webmaster and entrepreneur is the operator of Ctunnel.com, the browsing proxy service used by the group that hacked into the vice presidential candidate's personal email account and exposed its contents to the world. While he has yet to examine his logs, he says there's a good chance they will lead to those responsible, thanks to some carelessness on their part.

"Usually, this sort of thing would be hard to track down because it's Yahoo email, and a lot of people use my service for that," he told El Reg in a phone interview. "Since they were dumb enough to post a full screenshot that showed most of the [Ctunnel.com] URL, I should be able to find that in my log."

Ramuglia got into the proxy business a few years ago, after schools began blocking access to an online game site he used to co-own. Pretty soon, people began using the proxy service to access YouTube, Gmail, MySpace, and dozens of other sites that are routinely blocked by IT departments.

To prevent abuse of the service - such as the occasional bomb threat or other illegal act that's been known to happen - Ramuglia logs each user's IP address, along with the time and web destination. That often isn't enough to track down people who access extremely popular websites. But in this case, the perpetrators included a whole string of random-looking characters when posting screenshots of Palin's hacked account. That will probably be enough for him to pinpoint the proverbial needle in the haystack.

The information at the moment is on a server at a Chicago colocation site owned by FDC Servers. Logs are automatically flushed after seven days, so the clock is ticking for law enforcement, who presumably are under intense pressure to protect the privacy of a candidate for the White House. Of course, there's always the possibility that Ctunnel.com was only one of multiple anonymization services the email hackers used to cover their tracks, but there's only one way to find out.

Ramuglia said if he is contacted by law enforcement officials he will probably give them the information they seek. At time of writing, he's received no inquiries from any law enforcement agencies, he said.

The breach of Palin's account "is pretty clearly against my terms of service," he said. "As exciting as it is to be in the news, this is not the type of activity I can encourage by any means."

Update

Within hours of this story posting, Ramuglia received a phone call from an FBI special agent from the Anchorage, Alaska, field office.

"He just wanted to make sure I wasn't losing the logs," Ramuglia said, referring to the special agent. The two are scheduled to speak again soon to coordinate the turning over the logged information.

What's more, Wired.com has a story here detailing a now-removed post to the 4chan website in which a person claiming to the hacker who accessed Palin's email "used only a single proxy service to hide his IP address." Oops. ®

Broader topics


Other stories you might like

  • SpaceX launches first totally private mission to the International Space Station
    Saturday rendezvous planned for historic commercial orbit ride

    A retired NASA astronaut and three space tourists are right now tucked inside a SpaceX Dragon capsule above Earth for the first-ever purely commercial mission to the International Space Station.

    Flames billowed from the sky as the four-person crew were carried into space by a Falcon 9 rocket lifting off from NASA's Kennedy Space Center in Florida on April 8 at 1117 ET (1517 UTC). They are expected to arrive at their destination on Saturday at 1054 ET (1454 UTC) if all goes to plan.

    Michael Lopéz-Alegría, vice president of business development at Axiom Space and a former NASA astronaut, is flying on the first private flight. He is accompanied by Larry Connor, an American real estate magnate; Eytan Stibbe, an Israeli businessman and former fighter pilot; and Mark Pathy, Canadian CEO of investment firm Maverick.

    Continue reading
  • Google to sell replacement Pixel phone parts via iFixit
    Batteries, displays, cameras and more, apparently

    In a nod to right-to-repair efforts, Google is partnering with iFixit to offer spare parts for its Pixel smartphones dating all the way back to 2017.

    Genuine Pixel parts will be in stock for iFixit customers in the US, UK, Canada, Australia, and EU countries that sell Pixels "later this year." Parts will be available for devices as old as the Pixel 2 through 2021's Pixel 6 Pro, "as well as future Pixel models," Google said today. 

    Available parts include "everything you need for the most common Google Pixel Repairs – batteries, displays, cameras and more," iFixit said. The repair howto site will be selling parts individually, and as part of its Fix Kits that include necessary pieces and tools needed to perform specific repair processes. 

    Continue reading
  • Apple iOS privacy clampdown 'did little' to reduce tracking
    Double-standard rules have strengthened iGiant's gatekeeper power

    Apple's ramp up in iOS privacy measures has affected small data brokers, yet apps can still collect group-oriented data and identify users via device fingerprinting, according to a study out of Oxford.

    What's more, the researchers claim, Apple itself engages in and allows some forms of tracking, which serve to strengthen its control over the iOS market.

    In a paper titled, "Goodbye Tracking? Impact of iOS App Tracking Transparency and Privacy Labels," due to be published in June for the ACM Conference on Fairness, Accountability, and Transparency 2022, Oxford academics Konrad Kollnig, Max Van Kleek, Reuben Binns, and Nigel Shadbolt, with independent US-based researcher Anastasia Shuba, describe what they found after analyzing 1,759 iOS apps from the UK App Store, both before and after the introduction of iOS 14.

    Continue reading
  • Microsoft dogs Strontium domains to stop attacks on Ukraine
    Software giant sinkholes systems used by Russian gang

    Microsoft this week seized seven internet domains run by Russia-linked threat group Strontium, which was using the infrastructure to target Ukrainian institutions as well as think tanks in the US and EU, apparently to support Russian's invasion of its neighbor.

    The seizure is also part of a long-running legal and technical hunt by Microsoft to disrupt the work of Strontium – aka APT28 and FancyBear, among other names – via an expedited court process that enables the company to quickly get judicial approval for such actions, according to Tom Burt, corporate vice president of customer security and trust at Microsoft.

    Before the latest seizures, Microsoft had used this process 15 times to take over more than 100 domains controlled by Strontium, which is thought to be run by the GRU, Russia's foreign military intelligence agency. Microsoft obtained a court order for the most recent operation on April 6 and acted immediately.

    Continue reading
  • Newly released Space Force data could save life on Earth
    Goodness, gracious, lots of insights on great balls of fire

    The US Space Force is publicly releasing nearly 30 years of data on fireball meteors in the hopes it can improve the detection and impact prediction of near-Earth objects (NEOs).

    The data contains information on bolides, classified as any meteor that has enough mass to become a fireball but not enough to cause a ground impact, several dozen of which happen each year.

    Data from NASA on bolides is publicly available, but the Space Force is adding light curve data to the mix, which the agency said has been greatly sought by the scientific community.

    Continue reading
  • Direct lithium extraction technique for greener batteries gains traction
    Special method for production gets cash injection from govt, vendors

    New techniques for producing lithium could play a vital part in making batteries for applications ranging from smartphones to electric vehicles that are more environmentally friendly than current methods of extraction.

    According to a Reuters report, car makers, mining companies and investors including the US Energy Department are pouring money into direct lithium extraction (DLE) technologies that hold out the promise of boosting global lithium production, which is mostly sourced from just a handful of countries today.

    There are a number of DLE technologies which all revolve around extracting the metal from brine in various ways, such as using filters, membranes, or ceramic beads. These are touted as more sustainable solutions than existing ways of obtaining lithium, such as pumping lithium-containing saltwater from underground lakes to the surface in desert areas of Chile or Argentina, and extracting it through evaporation in large basins.

    Continue reading

Biting the hand that feeds IT © 1998–2022