Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Judge Charges TV Station for Stealing Her E-mail

In the fourth week of February 2008, the trial case of Kevin Underwood, who is charged of killing a girl in Purcell, took a unique turn in Cleveland Country District Court after Candace Blalock, the presiding judge, charged a local Television station for hiring hackers to hack her computer and leak her e-mails, as reported by The Norman Transcript on February 23, 2008.

It's said that the whole controversy revolving around the case came into light after TV station, KWTV-9, at Oklahoma City, posted a story on February 11, 2008 on their site. Reports claim that the posted story disclosed the information that was supposed to be a completely "sealed" decision taken by Judge Candace Blalock, a decision which enabled some statements to be taken as evidence.

By showing the decision of judge on the TV station's site, a debate took off between the prosecutors and defense attorneys. Both the parties got engaged in fury and anger. The defense attorneys are putting blame on prosecutors for revealing the story to media while the prosecutors are blaming defense attorneys for leak. Interestingly, the judge has her own views about the leakage of the mail.

The judge said that she mailed a copy of secret decision to home system. Immediately after that, the KWTV-9 telecasted the story, as reported by the Register on February 26, 2008.

Accusing the TV station, the judge also claims that undoubtedly, they hired someone to hack her system. Blalock also added that she is saying this because she trusts the lawyers completely and believe that they will not distort the confidential ruling to anyone, as per the reports of the Register on February 26, 2008.

But after the news of the disappearance of ruling came out, experts said that there are many methods of hacking one's password. The experts also added that the other methods of hacking into someone's e-mails are operating system exploits, packet analyzing, network snooping, Trojan/Keylogger installation, packet sniffing, software exploits, password decryption, browser exploits, and others, and these ask for some skills to start off.

Related article: Judge Prolongs Operation, Massive DNSChanger Infections to Continue

ยป SPAMfighter News - 3/5/2008

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page