The hacker who obtained Sarah Palin's personal email covered his tracks using proxy servers from CTunnel.com. Some of the screenshots he posted show Web address starting with CTunnel.com and ending with codes that could ultimately get him caught. That scenario seems particularly likely given that the webmaster behind the proxy servers is all but begging law-enforcement authorities to request his records, since he believes the Palin hacker abused his service. As quoted in the Register, the webmaster practically draws the Feds a map:
To prevent abuse of the service - such as the occasional bomb threat or other illegal act that's been known to happen - [webmatser Gabriel] Ramuglia logs each user's IP address, along with the time and web destination. That often isn't enough to track down people who access extremely popular websites. But in this case, the perpetrators included a whole string of random-looking characters when posting screenshots of Palin's hacked account. That will probably be enough for him to pinpoint the proverbial needle in the haystack.
"...I should be able to find that in my log."
This will only help catch the hacker if he didn't do something else to mask his identity, like use a second anonymizing service. And if the hacker really is from the relatively experienced Church of Scientology antagonists at Anonymous, it seems unlikely he was that sloppy.