EXCLUSIVE: Stephen King Hacked!

Stephen King
Stephen King’s email has been hacked.

An anonymous hacker has contacted ha.ckerne.ws with information and emails that confirm: Stephen King has a staff of writers who have been writing his books for the last nineteen years.

The hundreds of emails between Stephen King and his various business and personal contacts have revealed years of books written by a veritable army of ghost writers, which King and Verrill alternately call the “writers workshop,” the “sweat shop,” or the “writing team.”

While it has long been suspected that no author could be as prolific as Stephen King, this is the first time any evidence has been found to prove that King no longer writes his own work. As alluded to in one email with Verrill, this “sweat shop” has been responsible for every one of King’s works of the last 19 years.

Photos from the “sweat shop” were also found within the emails.

Here is the most recent email chain between King and Verrill, in which they discuss plans for King’s next book: (skip headers)

Delivered-To: steveking207@gmail.com
Received: by 10.42.33.72 with SMTP id h8csp29317icd; Sat, 30 Mar 2013 15:24:24 -0700 (PDT)
Return-Path: <chuckverrillnyc@gmail.com>
Received-SPF: pass (google.com: domain of chuckverrillnyc@gmail.com designates 10.50.209.4 as permitted sender) client-ip=10.50.209.4
Authentication-Results: mr.google.com; spf=pass (google.com: domain of chuckverrillnyc@gmail.com designates 10.50.209.4 as permitted sender) smtp.mail=chuckverrillnyc@gmail.com; dkim=pass header.i=@gmail.com
X-Received: from mr.google.com ([10.50.209.4]) by 10.50.209.4 with SMTP id mi4mr1509151igc.40.1364682264047 (num_hops = 1); Sat, 30 Mar 2013 15:24:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id:subject:from:to:content-type; bh=axVFhdRKb/z3gzURhnOgcnX3GP+7DtCocGw/KXeQsNU=; b=RWowznx/40X+gUIrG8WF1jB4D2f6/Rxhp/HYLhLW4+u3U6yhL3r1YPjVuqhC1IvU94s3bJRukmhHAClPZo2iUUNwtvO9
+pONBBgxoqlB9bPo/O+yvboHOTLsyVm3cNj8uNZeLDRl78YK92GDgR2wnbb+0+Oj7GrtuvMFnx3u/kgCPOLgCFHygIkSUFkYv1nMe96HOUg1z9lAkIkPxgCT3JiJbAGSJ0btdkyP1UriFiG/80gCmtkTmpRQFvYSdYXns7PpMJPMQfsGPk6X2c0CY1+mnSfZUq/MnsR1cbIGcnyWXfdw/RUdE0Y+Qm1eWT/VvhcfsSEpXkNOU5VR/ZyHXQ==
MIME-Version: 1.0
X-Received: by 10.50.209.4 with SMTP id mi4mr1509151igc.40.1364682264042; Sat,30 Mar 2013 15:24:24 -0700 (PDT)
Received: by 10.64.65.102 with HTTP; Sat, 30 Mar 2013 15:24:23 -0700 (PDT)
In-Reply-To: <CAC13a4HTpLCFsxfnSEPjgp6CYcyB99uj1VEmvci2W7mn9sLO-w@mail.gmail.com>
References: <CAC13a4FiL9ctwY=fe113ExRWkZkOPMouaN0LKF3y5r14bFFSPQ@mail.gmail.com><CAHqWToPg+Y2UX5-Bn=T3eSo+R9MMhGoVLYWwT1iGB0-A0k=iGA@mail.gmail.com><CAC13a4HTpLCFsxfnSEPjgp6CYcyB99uj1VEmvci2W7mn9sLO-w@mail.gmail.com>
Date: Sat, 30 Mar 2013 18:24:23 -0400
Message-ID: <CAHqWToPLqjvWNKVFZGNOuUFPLNi5BQXnvXYq8Wgp+8bZzUSYw@mail.gmail.com>
Subject: Re: Sequel Time?
From: Chuck Verrill <chuckverrillnyc@gmail.com>
To: Stephen King <steveking207@gmail.com>
Content-Type: multipart/alternative; boundary=14dae93404ab9460f304d92bd9a1–14dae93404ab9460f304d92bd9a1
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

You got it, amigo. More soon.

C

On Sat, Mar 30, 2013 at 5:26 PM, Stephen King <steveking207@gmail.com> wrote:

> Just see what the team thinks, Chuck. It’s why we have a team.
>
> S
>
>

> On Sat, Mar 30, 2013 at 4:31 PM, Chuck Verrill <chuckverrillnyc@gmail.com> wrote:
>
>> Steve,
>>
>> Sure thing. I’ll have Mick get the gang working on a basic plot line for
>> your review. Susan can flesh out some character bios to go along with
>> it–help you get the vibe of what they’re going for. How about they get
>> back to you within the next few days? I still feel bad about that DOCTOR
>> SLEEP delay (although it was worth the wait, don’t you think?), and I’m
>> sure they can roll out CHRISTINE II on whatever deadline you propose. I’ve
>> got some ideas about where to go with it.
>>
>> Chuck
>>
>>

>> On Sat, Mar 30, 2013 at 4:25 PM, Stephen King <steveking207@gmail.com> wrote:
>>
>>> Hey, Chuck,
>>>
>>> I’ve been thinking about that idea I ran by you last month to do another
>>> sequel. Marsha tells me Christine is one of the top books in the sequel
>>> request line over at sk.com. Can you have the team put their thinking
>>> caps on and bring back some ideas? This might be the time to roll that
>>> odometer back again one more time.
>>>
>>> Steve
>>>
>>
>>
>–14dae93404ab9460f304d92bd9a1–

 

Here are some of the photos of the “writing team”:

ss_thumb_02 ss_thumb_01

Update

After repeated calls and emails to Stephen King’s Bangor office, we still have yet to get a reply.

*** Click here to see all of the emails and photos ***

Raspberry Pi Goes On Sale In US, Sells Out

Easter has brought some good news for Raspberry Pi fans in the US as the $25 Model A of the credit card sized computer is now available in the United States. Texas based Allied Electronics is the first local retailer selling the Raspberry Pi in the U.S. and has been selling the Pi through its online store. (There were companies selling the Raspberry Pi over eBay to U.S. users for a higher price tag earlier.) The Model A has sold out completely and as of this writing there is zero availability.

Read more

Oracle Clings To Java API Copyrights

You could hear a collective sigh of relief from the software developer world when Judge William Alsup issued his ruling in the Oracle-Google lawsuit. Oracle lost on pretty much every point, but the thing that must have stuck most firmly in Oracle’s throat was this: ‘So long as the specific code used to implement a method is different, anyone is free under the Copyright Act to write his or her own code to carry out exactly the same function or specification of any methods used in the Java API. It does not matter that the declaration or method header lines are identical. Under the rules of Java, they must be identical to declare a method specifying the same functionality — even when the implementation is different. When there is only one way to express an idea or function, then everyone is free to do so and no one can monopolize that expression. And, while the Android method and class names could have been different from the names of their counterparts in Java and still have worked, copyright protection never extends to names or short phrases as a matter of law.’ Read more

Cooperative development authority of Philippines website hacked

The official website belongs to the Cooperative development authority of Philippines has been attacked by a hacker team with the name of Al-Qaeda militant.

The team earlier today sent notification to EHN in Twitter “@EHackerNews Official Website of the Provincial Government of Camiguin, Philippines #Hacked www.camiguin.gov.ph”.

They defaced the main webpage of the site with a text “Hacked by Bin Laden hacker”. The hackers also defaced the Official Website of the Provincial Government of Camiguin, Philippines(www.camiguin.gov.ph).

“The reason is that we against the Goverment We do it for Osama Bin Laden :)” The hacker stated as a reason for the attack .

At the time of writing, both sites show Forbidden error message “You don’t have permission to access / on this server. Additionally, a 403 Forbidden error was encountered while trying to use an ErrorDocument to handle the request.” It seems like the admin is investigating the issue and trying to patch the vulnerability.

The mirror :
http://www.zone-h.org/mirror/id/19570687 Read more

NetWare 3.12 Server Taken Down After 16 Years of Continuos Duty

Ars Technica’s Peter Bright reports on a Netware 3.12 server that has been decommissioned after over 16 years of continuous operation. The plug was pulled when noise from the server’s hard drives become intolerable. From the article: ‘It’s September 23, 1996. It’s a Monday. The Macarena is pumping out of the office radio, mid-way through its 14 week run at the top of the Billboard Hot 100, doing little to improve the usual Monday gloom…Sixteen and a half years later, INTEL’s hard disks—a pair of full height 5.25 inch 800 MB Quantum SCSI devices—are making some disconcerting noises from their bearings, and you’re tired of the complaints. It’s time to turn off the old warhorse.’

Read more

Multiple Thailand Government and Educational sites defaced by Algerian To The Corn

Defacement

They also targeted the Mexican Eductational websites and altered the main page of those websites : Andersen Institute(andersen.edu.mx), Center for Advanced Studies in Forensic Science and Legal Expert (ceesacif.edu.mx), University of Sotavento(www.us.edu.mx), est84etla.edu.mx.

The full list of hacked sites with mirror can be found here : http://pastebin.com/SprFscYS Read more

Does Apple Need To Get Serious About Security?

An article at The Verge makes the case that Apple’s development of its cloud services hasn’t been accompanied by the necessary effort to ramp up security to match users’ increasing levels of risk. As evidence, they use a recent (and very simple) security hole that allowed anyone to reset an Apple ID password with just a user’s email address and birth date. Apple’s initial response failed to fully stop the exploit, and then it took several days for them to fix the issue. ‘A server-side attack on Apple’s cloud could get customers’ credit card numbers and addresses, device backups with their encryption keys — as well as contacts and Apple IDs — anonymously and in bulk. Those systems may be defended like a castle, but bandits have plenty of places to chip away at private information at the periphery: intercepting wireless location data, cracking the still-private protocols for services like FaceTime or iMessage, or imitating iTunes updates to install to take over a user’s phone. There’s nothing sexy about securing these systems. None of them contribute directly to Apple’s bottom line. And when it came to securing a business netting it an estimated $2 billion each year, Apple locked the screen door and left the front door open, without asking anyone else to check that the house was safe.’ The article also points out that many other cloud service providers have detailed privacy and security policies, and actively participate in developing best practices, whereas Apple’s procedures are shrouded in the company’s typical secrecy. The article comes alongside reports of a way for people to DDoS other users’ iMessage box.

Read more