Podcasts about Cellebrite

  • 167PODCASTS
  • 261EPISODES
  • 50mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 28, 2025LATEST
Cellebrite

POPULARITY

20172018201920202021202220232024


Best podcasts about Cellebrite

Latest podcast episodes about Cellebrite

Dark Side of Wikipedia | True Crime & Dark History
The Big Breakdown: Bryan Kohberger's Mind, Mistakes & The Evidence Closing In

Dark Side of Wikipedia | True Crime & Dark History

Play Episode Listen Later May 28, 2025 81:52


The Big Breakdown: Bryan Kohberger's Mind, Mistakes & The Evidence Closing In In this full-case breakdown of Bryan Kohberger and the Idaho student murders, we're connecting all the key pieces—courtroom rulings, digital evidence, forensic analysis, and behavioral insights—to paint the clearest picture yet of what's really unfolding behind the headlines. You'll hear everything that matters from the latest court rulings: The judge denying the defense's attempt to remove the death penalty due to Kohberger's autism diagnosis Admissibility of text messages from a surviving roommate during the actual time of the murders A heavily scrutinized 911 call that will now be allowed in court with redactions We also take you into the technical forensics that could seal Kohberger's fate—cell tower mapping by FBI CAST, strange gaps in digital activity flagged by Cellebrite analysts, and how a single trace of touch DNA could override an otherwise meticulous plan. Then it gets psychological: Why would someone so “intelligent” fail to plan for failure? Former FBI agent Robin Dreeke offers insight into Kohberger's stubborn refusal to provide an alibi, his possible behavioral mimicry of infamous killers like BTK, and how his own mother may be reinforcing his self-destructive belief system. And then there's the digital echo of “Papa Rogers”—a Reddit persona eerily aligned with Kohberger's profile and knowledge. Was this his way of taunting the investigation? With analysis from retired FBI Special Agent Jennifer Coffindaffer, we cover what may have looked calculated on the surface—but now appears to be collapsing under the weight of ego, outdated planning, and damning forensic science. This isn't just a true crime case. It's a study in how arrogance, obsession, and digital forensics collide. #BryanKohberger #Idaho4 #KohbergerTrial #UniversityOfIdahoMurders #TrueCrimePodcast #ForensicEvidence #TouchDNA #DigitalForensics #PapaRogers #FBIAnalysis Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872

Get Legit Law & Sh!t
200 Phone Calls? "Jen McCabe, It's me or her!" Clip. New Proctor Testimony | Case Brief

Get Legit Law & Sh!t

Play Episode Listen Later May 8, 2025 29:07


Watch the full coverage of the live stream on The Emily D Baker YouTube channel: https://youtube.com/live/QZlJIBMCSsMDay 11 of the Karen Read Retrial happened on May 7, 2025. It feels like Deja Vu for Emily because it is her birthday and last year she was covering Day 6 of the first Karen Read trial! The Prosecution's case said it would take 3 weeks and half to present their case and they are more than halfway through, but several key witnesses, such as Former Trooper Michael Proctor, have not yet been called.Trooper Connor Keefe took the stand and displayed physical evidence, including pieces of tail light and a shoe, was shown to the jury. There was an issue with the evidence bag containing tail light pieces being marked as "two pieces" when there were actually three. Defense Attorney David Yanetti had an effective Cross Examination and Keefe tried to distance himself from Former Trooper Proctor or even say that he does good work. Yanetti pointed out that Keefe is a junior detective, and he was the only person who attended John O'Keefe's autopsy. It is usually the Lead Investigator that attends the autopsy and the fact that his partner, Trooper Bukhenik, didn't attend either is also strange. The fact that a fallen officer, John O'Keefe, was not treated with respect is baffling. Jessica Hyde, the Digital Forensics Examiner, took the stand to take about the Cellebrite data of Jen McCabe and John O'Keefe's phone. She talked about the various tools she used to decipher the information and her opinion on the "Hos long to die in cold" Google Search began at 6:23:49am because that is when Apple Suggested Term gave her, "How long does it take to digest food." After that, is when other variations of search happens like "how long ti die in cikd" at 6:23:51am, 6:23:57am, 6:24:18am, & 6:24:47am. Hyde also explained that a browser tab cannot be deleted and that Jen McCabe didn't manually delete any calls from her log. The phone has a limitation that it only stores 200 calls records and from Jan 29 to February 1st, when her phone was imaged, she must have made over 200 calls because the older calls were being erased from the phone in order to store new incoming calls. This is believable because we've heard her make 5 calls in 10 mins when the FBI unexpectedly showed up at her house for questing. Another notable instance is that Jessica Hyde noted in her report that John's phone interaction is at 12:20am but Ian Whiffin's report showed that the phone was locked with a button at 12:32am. In Jessica Hyde's testimony indicated that John O'Keefe's phone did not appear to have been secured in a Faraday bag or placed in airplane mode, as evidenced by the fact that SMS messages and ring notifications were still being received on the phone. This raised concerns about whether the phone was properly handled and secured by law enforcement, as new information could potentially still be added to the device.Special Prosecutor Hank Brennan played a clip from ID Docuseries, April 30, 2024, where Karen Read says, "Jen McCabe- It's me or her. Either I'm going down, Jen, or you are!” The implications of these statements and how the jury might interpret them are considered. The Prosecution can infer that Karen is using Jen as a scapegoat and with more videos he will use at his disposal, make it to where she has no choice to take the stand to clarify her statements.The Prosecution is presenting a stronger case in this retrial compared to the previous trial. However, concerns are raised about upcoming testimonies, such as the accident reconstructionist and medical experts.RESOURCESDay 6 of the first Karen Read Trial -

Forensic Focus
Cellebrite's 2025 DFIR Industry Trends Survey - Key Insights

Forensic Focus

Play Episode Listen Later May 6, 2025 52:37


Heather Barnhart and Paul Lorenz join the Forensic Focus Podcast to discuss key insights from Cellebrite's 2025 DFIR Industry Trends Survey. They dive into the challenges facing digital forensics today - from locked devices and encrypted applications to overwhelming case backlogs. The survey, which gathered responses from over 2,100 professionals across 95 countries, reveals notable trends: 98% of prosecutors consider digital evidence critical to their cases, and 80% of respondents believe AI can enhance investigation effectiveness. The discussion delves into the growing acceptance of cloud storage in forensics, the cautious adoption of AI in investigations, and the preference for in-person training despite the convenience of online options. The guests also discuss cognitive bias in investigations and the importance of maintaining forensic integrity when presenting digital evidence. #digitalforensics #dfir 00:00 Welcome and Introductions 00:56 Paul Lorenz's Journey into Forensics 03:19 Challenges in Digital Forensics 04:36 Industry Trends and Survey Insights 06:37 Mental Health and Community Support 17:19 AI in Digital Investigations 22:57 Case Studies and Real-World Examples 27:37 Diverse Paths in Investigations 28:07 Challenges of Bias in Forensic Cases 30:33 The Complexity of Cloud Storage 37:45 Generational Shifts in Technology Adoption 41:30 The Importance of Training in Forensics 43:19 In-Person vs. Online Training Preferences 50:12 Concluding Thoughts and Future Trends Show Notes 2025 Industry Trends Survey - https://cellebrite.com/en/industry-trends-survey-2025 Cellebrite - https://cellebrite.com/en/home  

Dark Side of Wikipedia | True Crime & Dark History
Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6-PART 2

Dark Side of Wikipedia | True Crime & Dark History

Play Episode Listen Later May 1, 2025 89:11


Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6 In this high-stakes courtroom audio from Day 6 of the Karen Read trial, digital forensics expert Ian Loughran takes the stand—and immediately comes under fire during cross-examination. Loughran, a Cellebrite specialist who analyzed Karen Read's phone and text data, is questioned about his methods, missing data, and how key message timelines were interpreted. The defense pushes hard on what was found—and more importantly, what wasn't. Did the digital timeline line up with the physical evidence? Were any texts deleted, altered, or misrepresented? And why did some data show inconsistencies in timestamps and Google activity? This full audio segment pulls you directly into the courtroom as the defense challenges the backbone of the Commonwealth's digital narrative. Subscribe for unfiltered trial coverage and forensic deep dives. Topics covered: – Cellebrite data extraction methods – Timing of Karen Read's texts and calls – Controversial 2:27 a.m. Google search – Data integrity questions – Defense implications of data manipulation or selective interpretation Full cross-exam audio. No edits. You decide what's credible. #KarenReadTrial #Cellebrite #DigitalForensics #IanLoughran #TextMessageEvidence #PhoneData #CrossExamination #TrueCrimePodcast #HiddenKillersPodcast #IHitHimSearch   Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872

Dark Side of Wikipedia | True Crime & Dark History
Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6 PART 1

Dark Side of Wikipedia | True Crime & Dark History

Play Episode Listen Later May 1, 2025 101:02


Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6 PART 1 In this high-stakes courtroom audio from Day 6 of the Karen Read trial, digital forensics expert Ian Loughran takes the stand—and immediately comes under fire during cross-examination. Loughran, a Cellebrite specialist who analyzed Karen Read's phone and text data, is questioned about his methods, missing data, and how key message timelines were interpreted. The defense pushes hard on what was found—and more importantly, what wasn't. Did the digital timeline line up with the physical evidence? Were any texts deleted, altered, or misrepresented? And why did some data show inconsistencies in timestamps and Google activity? This full audio segment pulls you directly into the courtroom as the defense challenges the backbone of the Commonwealth's digital narrative. Subscribe for unfiltered trial coverage and forensic deep dives. Topics covered: – Cellebrite data extraction methods – Timing of Karen Read's texts and calls – Controversial 2:27 a.m. Google search – Data integrity questions – Defense implications of data manipulation or selective interpretation Full cross-exam audio. No edits. You decide what's credible. #KarenReadTrial #Cellebrite #DigitalForensics #IanLoughran #TextMessageEvidence #PhoneData #CrossExamination #TrueCrimePodcast #HiddenKillersPodcast #IHitHimSearch   Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872

Hidden Killers With Tony Brueski | True Crime News & Commentary
Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6-PART 2

Hidden Killers With Tony Brueski | True Crime News & Commentary

Play Episode Listen Later May 1, 2025 101:02


Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6 PART 2 In this high-stakes courtroom audio from Day 6 of the Karen Read trial, digital forensics expert Ian Loughran takes the stand—and immediately comes under fire during cross-examination. Loughran, a Cellebrite specialist who analyzed Karen Read's phone and text data, is questioned about his methods, missing data, and how key message timelines were interpreted. The defense pushes hard on what was found—and more importantly, what wasn't. Did the digital timeline line up with the physical evidence? Were any texts deleted, altered, or misrepresented? And why did some data show inconsistencies in timestamps and Google activity? This full audio segment pulls you directly into the courtroom as the defense challenges the backbone of the Commonwealth's digital narrative. Subscribe for unfiltered trial coverage and forensic deep dives. Topics covered: – Cellebrite data extraction methods – Timing of Karen Read's texts and calls – Controversial 2:27 a.m. Google search – Data integrity questions – Defense implications of data manipulation or selective interpretation Full cross-exam audio. No edits. You decide what's credible. #KarenReadTrial #Cellebrite #DigitalForensics #IanLoughran #TextMessageEvidence #PhoneData #CrossExamination #TrueCrimePodcast #HiddenKillersPodcast #IHitHimSearch   Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872

Hidden Killers With Tony Brueski | True Crime News & Commentary
Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6 PART 1

Hidden Killers With Tony Brueski | True Crime News & Commentary

Play Episode Listen Later May 1, 2025 101:02


Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6 PART 1 In this high-stakes courtroom audio from Day 6 of the Karen Read trial, digital forensics expert Ian Loughran takes the stand—and immediately comes under fire during cross-examination. Loughran, a Cellebrite specialist who analyzed Karen Read's phone and text data, is questioned about his methods, missing data, and how key message timelines were interpreted. The defense pushes hard on what was found—and more importantly, what wasn't. Did the digital timeline line up with the physical evidence? Were any texts deleted, altered, or misrepresented? And why did some data show inconsistencies in timestamps and Google activity? This full audio segment pulls you directly into the courtroom as the defense challenges the backbone of the Commonwealth's digital narrative. Subscribe for unfiltered trial coverage and forensic deep dives. Topics covered: – Cellebrite data extraction methods – Timing of Karen Read's texts and calls – Controversial 2:27 a.m. Google search – Data integrity questions – Defense implications of data manipulation or selective interpretation Full cross-exam audio. No edits. You decide what's credible. #KarenReadTrial #Cellebrite #DigitalForensics #IanLoughran #TextMessageEvidence #PhoneData #CrossExamination #TrueCrimePodcast #HiddenKillersPodcast #IHitHimSearch   Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872

The Trial Of Karen Read | Justice For John O'Keefe
Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6-PART 2

The Trial Of Karen Read | Justice For John O'Keefe

Play Episode Listen Later May 1, 2025 89:11


Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6 In this high-stakes courtroom audio from Day 6 of the Karen Read trial, digital forensics expert Ian Loughran takes the stand—and immediately comes under fire during cross-examination. Loughran, a Cellebrite specialist who analyzed Karen Read's phone and text data, is questioned about his methods, missing data, and how key message timelines were interpreted. The defense pushes hard on what was found—and more importantly, what wasn't. Did the digital timeline line up with the physical evidence? Were any texts deleted, altered, or misrepresented? And why did some data show inconsistencies in timestamps and Google activity? This full audio segment pulls you directly into the courtroom as the defense challenges the backbone of the Commonwealth's digital narrative. Subscribe for unfiltered trial coverage and forensic deep dives. Topics covered: – Cellebrite data extraction methods – Timing of Karen Read's texts and calls – Controversial 2:27 a.m. Google search – Data integrity questions – Defense implications of data manipulation or selective interpretation Full cross-exam audio. No edits. You decide what's credible. #KarenReadTrial #Cellebrite #DigitalForensics #IanLoughran #TextMessageEvidence #PhoneData #CrossExamination #TrueCrimePodcast #HiddenKillersPodcast #IHitHimSearch   Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872

The Trial Of Karen Read | Justice For John O'Keefe
Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6 PART 1

The Trial Of Karen Read | Justice For John O'Keefe

Play Episode Listen Later May 1, 2025 101:02


Phone Data Cracks or Cover-Up? Cellebrite Expert Ian Loughran Pressed HARD | Karen Read Trial Day 6 PART 1 In this high-stakes courtroom audio from Day 6 of the Karen Read trial, digital forensics expert Ian Loughran takes the stand—and immediately comes under fire during cross-examination. Loughran, a Cellebrite specialist who analyzed Karen Read's phone and text data, is questioned about his methods, missing data, and how key message timelines were interpreted. The defense pushes hard on what was found—and more importantly, what wasn't. Did the digital timeline line up with the physical evidence? Were any texts deleted, altered, or misrepresented? And why did some data show inconsistencies in timestamps and Google activity? This full audio segment pulls you directly into the courtroom as the defense challenges the backbone of the Commonwealth's digital narrative. Subscribe for unfiltered trial coverage and forensic deep dives. Topics covered: – Cellebrite data extraction methods – Timing of Karen Read's texts and calls – Controversial 2:27 a.m. Google search – Data integrity questions – Defense implications of data manipulation or selective interpretation Full cross-exam audio. No edits. You decide what's credible. #KarenReadTrial #Cellebrite #DigitalForensics #IanLoughran #TextMessageEvidence #PhoneData #CrossExamination #TrueCrimePodcast #HiddenKillersPodcast #IHitHimSearch   Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872

Dark Side of Wikipedia | True Crime & Dark History
Karen Read Trial Day 6 - She Knew Before They Found Him; Karen's Body Discovery Timeline

Dark Side of Wikipedia | True Crime & Dark History

Play Episode Listen Later Apr 30, 2025 39:11


In today's explosive update from the Karen Read murder trial, Tony Brueski dives deep into the digital forensic battle surrounding Jennifer McCabe's infamous Google search: “how long to die in cold.” Did she search it before John O'Keefe's body was found, or afterward? Expert witness Ian Whiffin took the stand and showed how Cellebrite's forensic data software debunks the 2:27 a.m. theory—but the defense wasn't having it. They fired back with conflicting timestamps from Magnet Forensics and accused the software update of burying key evidence. We also break down the courtroom fireworks as Judge Beverly Cannone scolds the defense for discovery violations but still allows their expert crash analysts to testify—keeping the third-party suspect theory alive. With conflicting tech tools, accusations of manipulation, and critical expert testimony on the line, today's hearing could dramatically reshape the trajectory of the trial. If you're following the Karen Read trial, this is the episode you cannot miss. #KarenRead #JenniferMcCabe #JohnOKeefe #CantonMA #TrueCrime #GoogleSearchEvidence #DigitalForensics #ColdCaseTwist #Cellebrite #MagnetForensics Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872

Hidden Killers With Tony Brueski | True Crime News & Commentary
Karen Read Trial Day 6 - She Knew Before They Found Him; Karen's Body Discovery Timeline

Hidden Killers With Tony Brueski | True Crime News & Commentary

Play Episode Listen Later Apr 30, 2025 39:11


In today's explosive update from the Karen Read murder trial, Tony Brueski dives deep into the digital forensic battle surrounding Jennifer McCabe's infamous Google search: “how long to die in cold.” Did she search it before John O'Keefe's body was found, or afterward? Expert witness Ian Whiffin took the stand and showed how Cellebrite's forensic data software debunks the 2:27 a.m. theory—but the defense wasn't having it. They fired back with conflicting timestamps from Magnet Forensics and accused the software update of burying key evidence. We also break down the courtroom fireworks as Judge Beverly Cannone scolds the defense for discovery violations but still allows their expert crash analysts to testify—keeping the third-party suspect theory alive. With conflicting tech tools, accusations of manipulation, and critical expert testimony on the line, today's hearing could dramatically reshape the trajectory of the trial. If you're following the Karen Read trial, this is the episode you cannot miss. #KarenRead #JenniferMcCabe #JohnOKeefe #CantonMA #TrueCrime #GoogleSearchEvidence #DigitalForensics #ColdCaseTwist #Cellebrite #MagnetForensics Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872

The Trial Of Karen Read | Justice For John O'Keefe
Karen Read Trial Day 6 - She Knew Before They Found Him; Karen's Body Discovery Timeline

The Trial Of Karen Read | Justice For John O'Keefe

Play Episode Listen Later Apr 30, 2025 39:11


In today's explosive update from the Karen Read murder trial, Tony Brueski dives deep into the digital forensic battle surrounding Jennifer McCabe's infamous Google search: “how long to die in cold.” Did she search it before John O'Keefe's body was found, or afterward? Expert witness Ian Whiffin took the stand and showed how Cellebrite's forensic data software debunks the 2:27 a.m. theory—but the defense wasn't having it. They fired back with conflicting timestamps from Magnet Forensics and accused the software update of burying key evidence. We also break down the courtroom fireworks as Judge Beverly Cannone scolds the defense for discovery violations but still allows their expert crash analysts to testify—keeping the third-party suspect theory alive. With conflicting tech tools, accusations of manipulation, and critical expert testimony on the line, today's hearing could dramatically reshape the trajectory of the trial. If you're following the Karen Read trial, this is the episode you cannot miss. #KarenRead #JenniferMcCabe #JohnOKeefe #CantonMA #TrueCrime #GoogleSearchEvidence #DigitalForensics #ColdCaseTwist #Cellebrite #MagnetForensics Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872

Get Legit Law & Sh!t
Brennan Goes Off on ARCCA. John O'Keefe Cellphone Timeline.

Get Legit Law & Sh!t

Play Episode Listen Later Apr 29, 2025 43:33


Watch the full coverage of the live stream on The Emily D Baker YouTube channel: https://youtube.com/live/OaPz08BtHZcDay 5 of the Karen Read Retrial happened on April 28, 2025. It began with testimony from Ian Whiffin of Cellebrite. He was approached by the Public Relations department to figure out why there is such confusion with the information from Jen McCabe's phone from the first trial. This new strategy from the Prosecution getting ahead of Jen McCabe's Google search for, "Hos long to die in cold," is smart and might take the string from that revelation when it is presented to the jury. Mr. Whiffin created a Timeline, combining health data, temperature, call/text logs, and location data from O'Keefe's phone. Cross-examination was conducted by Robert Alessi by confirming points on the timeline and highlighting what was included or left out. The Cross Examination was cut short due to the jury having a half day so that the Voir Dire of the ARCCA witnesses could be done.Hank Brennan did not use his time wisely when questioning the first ARCCA witness, Dr. Daniel Wolfe. Brennan accused Dr. Wolfe of being biased and assisting the defense with their case. Brennan yelled at Dr. Wolfe and didn't stop when the Judge asked him to. Judge Cannone eventually coaxed Brennan to move on and tighten his questioning with the next witness. The second ARCCA witness, Dr. Andrew Rentschler, admitted to having an uncomfortable lunch with Karen Read after he testified in court of the first trial. Judge Cannone requested ARCCA to send their report by May 7th. The Voir Dire is not done yet because the Prosecution and the Defense need to present their oral arguments. When will this happen? Stay tuned!RESOURCESDay 2 - https://www.youtube.com/watch?v=3Rj_yLDmgIUWhat You Need to Know About the Retrial - https://youtu.be/89Jpa8vz1RQ Karen Read Retrial Playlist - https://www.youtube.com/playlist?list=PLsbUyvZas7gKOJlfL__9F027hlETVU-vo Karen Read Trial - 2024 - https://www.youtube.com/playlist?list=PLsbUyvZas7gKUeCUzApgsEuQRXu5IXeTSThis podcast uses the following third-party services for analysis: Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/Podscribe - https://podscribe.com/privacy

Nightside With Dan Rea
The Latest in the Karen Read Trial - Part 3

Nightside With Dan Rea

Play Episode Listen Later Apr 29, 2025 41:04 Transcription Available


Read's second trial for the murder of her boyfriend, former police officer John O'Keefe, began last week. Monday, a Cellebrite digital intelligence expert, Ian Whiffen, took the stand and testified that John O'Keefe's phone stopped moving after he was dropped off at the Albert's Canton home, that at “12:32 a.m., the device was unlocked and locked a final time, and there was no more activity on the phone until shortly after 6 a.m.” Whiffen went on to say that the temperature of O'Keefe's phone battery dropped steadily throughout the night. We discussed the latest from the trial and how today's testimony might impact the defense's argument.Listen to WBZ NewsRadio on the NEW iHeart Radio app and be sure to set WBZ NewsRadio as your #1 preset!

Nightside With Dan Rea
The Latest in the Karen Read Trial - Part 2

Nightside With Dan Rea

Play Episode Listen Later Apr 29, 2025 41:09 Transcription Available


Read's second trial for the murder of her boyfriend, former police officer John O'Keefe, began last week. Monday, a Cellebrite digital intelligence expert, Ian Whiffen, took the stand and testified that John O'Keefe's phone stopped moving after he was dropped off at the Albert's Canton home, that at “12:32 a.m., the device was unlocked and locked a final time, and there was no more activity on the phone until shortly after 6 a.m.” Whiffen went on to say that the temperature of O'Keefe's phone battery dropped steadily throughout the night. We discussed the latest from the trial and how today's testimony might impact the defense's argument.Listen to WBZ NewsRadio on the NEW iHeart Radio app and be sure to set WBZ NewsRadio as your #1 preset!

Nightside With Dan Rea
The Latest in the Karen Read Trial - Part 1

Nightside With Dan Rea

Play Episode Listen Later Apr 29, 2025 38:15 Transcription Available


Read's second trial for the murder of her boyfriend, former police officer John O'Keefe, began last week. Monday, a Cellebrite digital intelligence expert, Ian Whiffen, took the stand and testified that John O'Keefe's phone stopped moving after he was dropped off at the Albert's Canton home, that at “12:32 a.m., the device was unlocked and locked a final time, and there was no more activity on the phone until shortly after 6 a.m.” Whiffen went on to say that the temperature of O'Keefe's phone battery dropped steadily throughout the night. We discussed the latest from the trial and how today's testimony might impact the defense's argument.Listen to WBZ NewsRadio on the NEW iHeart Radio app and be sure to set WBZ NewsRadio as your #1 preset!

Roberta Glass True Crime Report
What Are They Hiding?! Karen Read's ARCCA Defense Witnesses Talked to Defense on Encrypted App!

Roberta Glass True Crime Report

Play Episode Listen Later Apr 28, 2025 92:32


Karen Read's trial got lit on Monday, when Karen Read's accident reconstructionist, Daniel Wolfe took the stand in yet another voire dire in which he came empty handed. Wolfe testified unbelievably that he couldn't retrieve his text messages exchanges with the defense. He said he switched carriers, talked on the encrypted app Signal (Karen Read's preferred method of communication with her defense atorneys and Aidan Kearney). Signal has a feature that auto-deletes their texts. Wolfe was also struck with sudden onset amnesia at other times, answering “I don't recall” to a majority of Mr Brennan's questions. Also, Ian Whiffen from Cellebrite took the stand. Testifying that Jen McCabe's “Hos long to die in the cold” took place at 6:23 & 6:24 am. Whiffen also testified that John O'Keefe's body never left the flag pole area and his phone was unlocked for the last time after he looked at a text message from Jen McCabe shortly before being struck by Karen Read's vehicle.Get access to exclusive content & support the podcast by becoming a Patron today! https://patreon.com/robertaglasstruecrimereport Throw a tip in the tip jar! https://buymeacoffee.com/robertaglassSupport Roberta by sending a donation via Venmo. https://venmo.com/robertaglassShow Notes: Roberta Glass True Crime Report "Karen Read Retrial Day 5" https://www.youtube.com/live/Z1AsLbfxJMs?si=Fgf0Y8dvu3wdXPE_Thank you Patrons! Hannna, Christy, Jen Buell, Elle Solari, Carol Cardella, Jennifer Harmon, DoxieMama65, Carol Holderman, Joan Mahon, Marcie Denton, Rosanne Aponte, Johnny Jay, Jude Barnes, JenTheRN, Victoria Devenish, Jeri Falk, Kimberly Lovelace, Penni Miller, Jil, Janet Gardner, Jayne Wallace (JaynesWhirled), Pat Brooks, Jennifer Klearman, Judy Brown, Linda Lazzaro, Suzanne Kniffin, Susan Hicks, Jeff Meadors, D Samlam, Pat Brooks, Cythnia, Bonnie Schoeneman-Dilley, Diane Larsen, Mary, Kimberly Philipson, Cat Stewart, Cindy Pochesci, Kevin Crecy, Renee Chavez, Melba Pourteau, Julie K Thomas, Mia Wallace, Stark Stuff, Kayce Taylor, Alice, Dean, GiGi5, Jennifer Crum, Dana Natale, Bewildered Beauty, Pepper, Joan Chakonas, Blythe, Pat Dell, Lorraine Reid, T.B., Melissa, Victoria Gray Bross, Toni Woodland, Danbrit, Kenny Haines and Toni Natalie

Dark Side of Wikipedia | True Crime & Dark History
Ten Game-Changing Rulings in the Bryan Kohberger Trial You Need to Know

Dark Side of Wikipedia | True Crime & Dark History

Play Episode Listen Later Apr 25, 2025 34:08


Ten Game-Changing Rulings in the Bryan Kohberger Trial You Need to Know In a pivotal moment for the State of Idaho vs. Bryan Kohberger, the court has officially ruled on a wave of major motions that will shape the upcoming trial over the brutal University of Idaho student murders. In this deep-dive video, we break down exactly what evidence the jury will hear, including explosive expert testimony, digital forensic analysis, and never-before-heard communications from the surviving roommates inside the King Road house on the night of the killings. One of the biggest developments? Bryan Kohberger's defense team attempted to remove the death penalty, arguing that his diagnosis of Autism Spectrum Disorder (ASD) made capital punishment unconstitutional in his case. The judge denied that motion, making it clear that ASD does not qualify for the same legal protections as intellectual disability under Atkins v. Virginia—a precedent-setting move in Idaho. Meanwhile, the court approved a wide range of expert witnesses for the prosecution, despite objections from the defense. The jury is now expected to hear testimony from: FBI CAST Agent Nicholas Ballance, who analyzed Kohberger's cell phone tower data and drive testing results to place him near the scene before and after the crime. Cellebrite forensic specialists Heather and Jared Barnhart, who uncovered abnormal gaps in Kohberger's digital activity, potentially suggesting deleted data or anti-forensic behavior. FBI forensic accountant Michael Douglass, who tracked shifts in Kohberger's financial behavior, including his sudden switch from debit card usage to cash withdrawals. ISP detective Darren Gilbertson, who conducted physical timed walkthroughs of 1122 King Road, proving one person could allegedly carry out the crimes in under four minutes. Toxicology expert Dr. Gary Dawson, who challenges the multiple-attacker theory by analyzing the victims' level of intoxication during the homicides. But perhaps the most emotionally impactful ruling relates to what the jury will now hear from D.M. and B.F., the two surviving roommates. The court ruled that text messages sent between 4:22 a.m. and 4:26 a.m.—in which D.M. described a man in a ski mask and her intense fear—are admissible under hearsay exceptions. These messages, sent in real time during the murders, offer a raw glimpse into the trauma unfolding inside the house before the bodies were discovered. We also cover the 911 call made nearly 8 hours later, which has been under intense public scrutiny. The court has ruled that most of the call is admissible, and the transcript will be shown alongside the audio in court—but with a few redactions, pending further evidentiary foundation. This detailed breakdown offers everything you need to know about the latest legal developments in the Bryan Kohberger case, including how forensic science, digital evidence, psychological defenses, and real-time trauma responses are converging to form the core of this historic and chilling true crime trial. If you're following the University of Idaho murder trial, the Kohberger defense strategy, or how courts weigh psychological disorders in capital cases, this video provides the clearest and most comprehensive analysis available. #BryanKohberger #IdahoMurders #KohbergerTrial #UniversityOfIdaho #KohbergerEvidence #ForensicAnalysis #ExpertWitnesses #911Call #RoommateTestimony #TrueCrime    Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872 

Hidden Killers With Tony Brueski | True Crime News & Commentary
Ten Game-Changing Rulings in the Bryan Kohberger Trial You Need to Know

Hidden Killers With Tony Brueski | True Crime News & Commentary

Play Episode Listen Later Apr 25, 2025 34:08


Ten Game-Changing Rulings in the Bryan Kohberger Trial You Need to Know In a pivotal moment for the State of Idaho vs. Bryan Kohberger, the court has officially ruled on a wave of major motions that will shape the upcoming trial over the brutal University of Idaho student murders. In this deep-dive video, we break down exactly what evidence the jury will hear, including explosive expert testimony, digital forensic analysis, and never-before-heard communications from the surviving roommates inside the King Road house on the night of the killings. One of the biggest developments? Bryan Kohberger's defense team attempted to remove the death penalty, arguing that his diagnosis of Autism Spectrum Disorder (ASD) made capital punishment unconstitutional in his case. The judge denied that motion, making it clear that ASD does not qualify for the same legal protections as intellectual disability under Atkins v. Virginia—a precedent-setting move in Idaho. Meanwhile, the court approved a wide range of expert witnesses for the prosecution, despite objections from the defense. The jury is now expected to hear testimony from: FBI CAST Agent Nicholas Ballance, who analyzed Kohberger's cell phone tower data and drive testing results to place him near the scene before and after the crime. Cellebrite forensic specialists Heather and Jared Barnhart, who uncovered abnormal gaps in Kohberger's digital activity, potentially suggesting deleted data or anti-forensic behavior. FBI forensic accountant Michael Douglass, who tracked shifts in Kohberger's financial behavior, including his sudden switch from debit card usage to cash withdrawals. ISP detective Darren Gilbertson, who conducted physical timed walkthroughs of 1122 King Road, proving one person could allegedly carry out the crimes in under four minutes. Toxicology expert Dr. Gary Dawson, who challenges the multiple-attacker theory by analyzing the victims' level of intoxication during the homicides. But perhaps the most emotionally impactful ruling relates to what the jury will now hear from D.M. and B.F., the two surviving roommates. The court ruled that text messages sent between 4:22 a.m. and 4:26 a.m.—in which D.M. described a man in a ski mask and her intense fear—are admissible under hearsay exceptions. These messages, sent in real time during the murders, offer a raw glimpse into the trauma unfolding inside the house before the bodies were discovered. We also cover the 911 call made nearly 8 hours later, which has been under intense public scrutiny. The court has ruled that most of the call is admissible, and the transcript will be shown alongside the audio in court—but with a few redactions, pending further evidentiary foundation. This detailed breakdown offers everything you need to know about the latest legal developments in the Bryan Kohberger case, including how forensic science, digital evidence, psychological defenses, and real-time trauma responses are converging to form the core of this historic and chilling true crime trial. If you're following the University of Idaho murder trial, the Kohberger defense strategy, or how courts weigh psychological disorders in capital cases, this video provides the clearest and most comprehensive analysis available. #BryanKohberger #IdahoMurders #KohbergerTrial #UniversityOfIdaho #KohbergerEvidence #ForensicAnalysis #ExpertWitnesses #911Call #RoommateTestimony #TrueCrime    Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872 

The Idaho Murders | The Case Against Bryan Kohberger
Ten Game-Changing Rulings in the Bryan Kohberger Trial You Need to Know

The Idaho Murders | The Case Against Bryan Kohberger

Play Episode Listen Later Apr 25, 2025 34:08


Ten Game-Changing Rulings in the Bryan Kohberger Trial You Need to Know In a pivotal moment for the State of Idaho vs. Bryan Kohberger, the court has officially ruled on a wave of major motions that will shape the upcoming trial over the brutal University of Idaho student murders. In this deep-dive video, we break down exactly what evidence the jury will hear, including explosive expert testimony, digital forensic analysis, and never-before-heard communications from the surviving roommates inside the King Road house on the night of the killings. One of the biggest developments? Bryan Kohberger's defense team attempted to remove the death penalty, arguing that his diagnosis of Autism Spectrum Disorder (ASD) made capital punishment unconstitutional in his case. The judge denied that motion, making it clear that ASD does not qualify for the same legal protections as intellectual disability under Atkins v. Virginia—a precedent-setting move in Idaho. Meanwhile, the court approved a wide range of expert witnesses for the prosecution, despite objections from the defense. The jury is now expected to hear testimony from: FBI CAST Agent Nicholas Ballance, who analyzed Kohberger's cell phone tower data and drive testing results to place him near the scene before and after the crime. Cellebrite forensic specialists Heather and Jared Barnhart, who uncovered abnormal gaps in Kohberger's digital activity, potentially suggesting deleted data or anti-forensic behavior. FBI forensic accountant Michael Douglass, who tracked shifts in Kohberger's financial behavior, including his sudden switch from debit card usage to cash withdrawals. ISP detective Darren Gilbertson, who conducted physical timed walkthroughs of 1122 King Road, proving one person could allegedly carry out the crimes in under four minutes. Toxicology expert Dr. Gary Dawson, who challenges the multiple-attacker theory by analyzing the victims' level of intoxication during the homicides. But perhaps the most emotionally impactful ruling relates to what the jury will now hear from D.M. and B.F., the two surviving roommates. The court ruled that text messages sent between 4:22 a.m. and 4:26 a.m.—in which D.M. described a man in a ski mask and her intense fear—are admissible under hearsay exceptions. These messages, sent in real time during the murders, offer a raw glimpse into the trauma unfolding inside the house before the bodies were discovered. We also cover the 911 call made nearly 8 hours later, which has been under intense public scrutiny. The court has ruled that most of the call is admissible, and the transcript will be shown alongside the audio in court—but with a few redactions, pending further evidentiary foundation. This detailed breakdown offers everything you need to know about the latest legal developments in the Bryan Kohberger case, including how forensic science, digital evidence, psychological defenses, and real-time trauma responses are converging to form the core of this historic and chilling true crime trial. If you're following the University of Idaho murder trial, the Kohberger defense strategy, or how courts weigh psychological disorders in capital cases, this video provides the clearest and most comprehensive analysis available. #BryanKohberger #IdahoMurders #KohbergerTrial #UniversityOfIdaho #KohbergerEvidence #ForensicAnalysis #ExpertWitnesses #911Call #RoommateTestimony #TrueCrime    Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872 

Digital Forensics Now
The "Bear" Essentials of Digital Forensics

Digital Forensics Now

Play Episode Listen Later Apr 11, 2025 73:55 Transcription Available


Send us a textThe digital forensics world isn't slowing down — and neither are we. In this episode, we celebrate Heather's well-deserved recognition as Cellebrite's Mentor of the Year 2025. Naturally, there were a few speech mishaps and, somehow, a bear raiding Heather's bird feeder (yes, actual wildlife). But between the chaos, we get serious about the fast-changing landscape of digital evidence collection.We dig into Amazon's decision to remove the "do not send voice recordings" setting from Echo devices — meaning all voice requests now head straight to the cloud for AI training. It's part of a growing industry trend, raising huge privacy red flags. We also unpack a study showing AI search engines misattribute sources at rates over 60%, and discuss how leaning too hard on generative AI risks dulling the critical thinking that digital forensics demands.On the technical front, Christian Peter reveals that some forensic tools alter or delete unified logs during extraction — a serious concern for evidence integrity that can compromise investigations before they even begin. We also walk through a deep dive into Snapchat artifacts, showing how to connect media files to user actions and locations by following database breadcrumbs that automated tools tend to overlook.Through it all, one theme stays clear: while technology keeps racing ahead, the responsibility for getting it right stays firmly with the examiner. As one guest bluntly put it, "We might be the last generation of cognitive thinkers."Tune in for a sharp, insightful, and slightly unpredictable conversation at the intersection of bears, bytes, and the future of digital evidence.Notes:Mobile Forensics Are you nerd enough?https://www.msab.com/events-webinars/webinar-are-you-nerd-enough/New Podcasts!https://osintcocktail.com/https://www.youtube.com/@hexordiaAmazon "Do Not Send Voice Recordings" Privacy Featurehttps://www.usatoday.com/story/tech/2025/03/17/amazon-echo-alexa-reporting-privacy/82503576007/https://www.thesun.co.uk/tech/33907850/amazon-alexa-echo-do-not-send-voice-recordingsAI search engines cite incorrect news sources at an alarming 60% rate, study sayshttps://arstechnica.com/ai/2025/03/ai-search-engines-give-incorrect-answers-at-an-alarming-60-rate-study-says/The Slow Collapse of Critical Thinking in OSINT due to AIhttps://www.dutchosintguy.com/post/the-slow-collapse-of-critical-thinking-in-osint-due-to-aiNISThttps://www.nist.gov/news-events/news/2025/01/updated-guidelines-managing-misuse-risk-dual-use-foundation-modelsDon't lose your logbookhttps://www.linkedin.com/pulse/dont-lose-your-logbook-christian-peter-ebcjeNot All Encryption is created equalhttps://www.s-rminform.com/latest-thinking/cracking-the-vault-exposing-the-weaknesses-of-encrypted-apps

Passwort - der Podcast von heise security
Security-News und Feedback von Oracle bis Web-PKI

Passwort - der Podcast von heise security

Play Episode Listen Later Apr 9, 2025 116:51


Achtung, die Blutdruckpillen werden ausgepackt! Christopher und Sylvester ärgern sich über laxe Sicherheitspraktiken bei Konzernen und deren undurchsichtige Krisen-PR. Sie freuen sich hingegen über reichlich Hörer-Feedback zu vergangenen Folgen und diskutieren über Neuerungen im Zertifikats-Ökosystem. Und auch eine sehr prominente, aber vorbildlich gemeisterte Phishing-Attacke wird zum Thema - die Hosts erklären, warum sich wirklich niemand schämen sollte, Opfer geworden zu sein. - https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN - https://github.com/wesaphzt/privatelock - https://eylenburg.github.io/android_comparison.htm - https://samwho.dev/bloom-filters/ - https://github.com/mozilla/clubcard Mitglieder unserer Security Community auf heise security PRO hören alle Folgen bereits zwei Tage früher. Mehr Infos: https://pro.heise.de/passwort

Passwort - der Podcast von heise security
Smartphonedurchsuchung wider Willen

Passwort - der Podcast von heise security

Play Episode Listen Later Mar 26, 2025 117:23


In dieser Folge geht es wieder um Staaten, die ihre Bürger bespitzeln. Diesmal allerdings nicht durch Spyware (siehe Folge 25) sondern mittels spezieller Geräte, die möglichst viele Daten auch von gesperrten Telefonen extrahieren. Im Podcast ist Viktor Schlüter zu Gast, der bei Reporter ohne Grenzen das Digital Security Lab leitet. Er kennt sich bestens mit solchen Smartphone-Durchsuchungen aus, die immer wieder auch illegitim eingesetzt werden und sich beispielsweise gegen Journalisten richten. Zusammen mit Viktor sehen sich Christopher und Sylvester an, wie solche Durchsuchungen funktionieren, wer solche Geräte herstellt, wer sie einsetzt und wie man sich davor schützen kann. - Digital Security Lab von Reporter ohne Grenzen: https://www.reporter-ohne-grenzen.de/hilfe/digital-security-lab - Aktuelle Fallanalyse von Amnesty International: https://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/ - Cellebrite UFEDs auf eBay: https://www.ebay.de/itm/305957265144 https://www.ebay.com/itm/204207137842

ohmTown
Charged in 5, Taco Bell AI, Riddle of Theft, Paid Streams, and more.

ohmTown

Play Episode Listen Later Mar 18, 2025 33:09


Welcome to ohmTown. The Non Sequitur News Show is held live via Twitch and Youtube every day. We, Mayor Watt and the AI that runs ohmTown, cover a selection of aggregated news articles and discuss them briefly with a perspective merging Science, Technology, and Society. You can visit https://www.youtube.com/ohmtown for the complete history since 2022.Articles Discussed:Charged in 5 Minuteshttps://www.ohmtown.com/groups/nonsequiturnews/f/d/tesla-competitor-reveals-electric-car-that-can-charge-in-five-minutes/Taco Bell AIhttps://www.ohmtown.com/groups/nonsequiturnews/f/d/nvidias-partnership-with-taco-bell-means-ai-could-soon-do-more-than-take-your-drive-thru-order/Free Airtags for Denver Drivershttps://www.ohmtown.com/groups/smacktalk/f/d/denver-drivers-get-free-airtags-to-cut-auto-thefts/AstroNOTshttps://www.ohmtown.com/groups/four-wheel-tech/f/d/boeings-stranded-astronauts-are-finally-flying-home-after-nine-months-in-space/Starlink Competitor that won't trash Spacehttps://www.ohmtown.com/groups/four-wheel-tech/f/d/googles-starlink-competitor-wont-trash-space-with-thousands-of-satellites/High Winds Disrupt Landing, twicehttps://www.ohmtown.com/groups/nonsequiturnews/f/d/120-passengers-endured-an-8-hour-flight-to-nowhere-after-high-winds-prevented-2-attempts-at-landing/Frontier goes where Southwest has Gone Beforehttps://www.ohmtown.com/groups/nonsequiturnews/f/d/frontier-is-offering-free-bags-to-entice-angry-southwest-flyers/Cellebrite puts AI into Forensic Toolhttps://www.ohmtown.com/groups/nonsequiturnews/f/d/cellebrite-dumps-ai-into-its-cell-phone-scraping-tool-so-cops-can-hallucinate-evidence/The Riddle of a Thefthttps://www.ohmtown.com/groups/mobble/f/d/art-historian-solves-riddle-behind-theft-of-famous-portrait/100 Million Paid Stream Subscribers

Bitcoin.Review
BR093 - ECDSA Key Extraction, ESP32 Security Concerns, COLDCARD, Cove Wallet, Krux, Nunchuk, Invalid Mining Jobs, Javascript Injection Attack, CTV Back on the table? + MORE ft. Rob & Vivek

Bitcoin.Review

Play Episode Listen Later Mar 13, 2025 88:17 Transcription Available


I'm joined by guests Rob Hamilton & Vivek to go through the list.Housekeeping (00:01:18) Unleashed.chat rebrands to dataMachineUrgent Vulnerability Disclosures (00:01:52) Private key leak via malformed ECDSA input (00:09:12) ESP32 Security Concerns (00:21:32) Coinos revokes NWC connection secretsVivek's Corner (00:22:51) Invalid mining jobs by AntPool & friends during forksBitcoin • Software Releases & Project Updates (00:37:44) COLDCARD (00:52:47) Sparrow Wallet (00:54:33) Lark (00:55:03) Krux (00:56:37) Cove Wallet (00:59:09) Nunchuk Desktop (01:00:32) BTCPayServer (01:00:44) Bitcoin Keeper (01:01:25) BlueWallet (01:02:08) Bitcoin Safe (01:03:15) Bitkey App (01:04:05) libwally-core (01:06:00) Bisq2 (01:06:04) RoboSats (01:06:08) Boltz Exchange (01:06:10) Zaprite (01:06:13) Blockstream Explorer API (01:07:22) Mempal (01:07:29) Iris Wallet desktop (01:07:31) Utreexo (01:07:34) ESP Miner• Project Spotlight (01:07:38) Reorg Calculator (01:07:51) Bitcoin Core Config Generator (01:09:05) Bitcoin Core Snapshots (01:09:11) Boot Protocol (01:09:18) multisig-backup (01:09:58) Wallet backup (01:10:04) regtest-in-a-podVulnerability Disclosures (01:11:56) JavaScript injection attack (01:15:05) Malicious PyPI package 'set-utils' steals Ethereum private keys (01:16:57) OpenSSH vulnerabilities expose clients and servers to attacks (01:17:05) USB side-channel attacks (01:17:37) Cellebrite (01:17:49) Messengers vulnerabilities (01:17:56) GitVenom (01:18:10) Stablecoin payment firm Infini loses $50M in exploit (01:18:18) Five dollar wrench attacksAudience Questions (01:20:00) Comment on a flaw in Bitcoin Core regarding mining pools and their vulnerability against block withholding attacksNostr • Project spotlight (01:22:32) 24242.io (01:22:49) nostr.media (01:22:58) Frostr (01:23:33) nostr-double-ratchet (01:23:44) DVMCP (01:23:53) Samiz (01:24:00) Welshman (01:24:09) Norma (01:24:20) Wallet Relay (01:24:27) Nostr0 (01:24:35) nAuth Protocol (01:24:43) HostrBoosts (01:25:36) Shoutout to top boosters @sean, @pink monkey, @Anonymous, @martinbarilik, @Momo Tahmasbi & @jespada.Links & Contacts:Website: https://bitcoin.review/Substack: https://substack.bitcoin.review/Twitter: https://twitter.com/bitcoinreviewhqNVK Twitter: https://twitter.com/nvkTelegram: https://t.me/BitcoinReviewPodEmail: producer@coinkite.comNostr & LN: ⚡nvk@nvk.org (not an email!)Full show notes: https://bitcoin.review/podcast/episode-93

Day[0] - Zero Days for Day Zero
Exploiting Xbox 360 Hypervisor and Microcode Hacking

Day[0] - Zero Days for Day Zero

Play Episode Listen Later Mar 12, 2025 79:05


A very technical episode this week, featuring some posts on hacking the xbox 360 hypervisor as well as AMD microcode hacking.Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/276.html[00:00:00] Introduction[00:00:15] Reversing Samsung's H-Arx Hypervisor Framework - Part 1[00:10:34] Hacking the Xbox 360 Hypervisor Part 1: System Overview[00:21:18] Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit[00:30:48] Zen and the Art of Microcode Hacking[00:41:51] A very fancy way to obtain RCE on a Solr server[01:03:49] Cellebrite zero-day exploit used to target phone of Serbian student activist[01:16:03] When NULL isn't null: mapping memory at 0x0 on LinuxPodcast episodes are available on the usual podcast platforms: -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz -- Other audio platforms can be found at https://anchor.fm/dayzerosecYou can also join our discord: https://discord.gg/daTxTK9

Paul's Security Weekly
Don't Hack Russia - PSW #864

Paul's Security Weekly

Play Episode Listen Later Mar 6, 2025 124:54


Hacking your mattress, Taylor Swift all the time, DNS sinkholes, throwing parties at rental properties, detect jamming, it took 18 years to hack, airtag hacks, undetectable weapons, RIP Skype, Cellebrite targets, upgrade ALL the things, Kali, Raspberry PIs, and M.2 hats, pirating music through a supply chain attack, Cisco small business and why you shouldn't use it, stop hacking Russia, Badbox is back, but it likely never left, and AI still Hallucinates! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-864

Paul's Security Weekly TV
Don't Hack Russia - PSW #864

Paul's Security Weekly TV

Play Episode Listen Later Mar 6, 2025 124:54


Hacking your mattress, Taylor Swift all the time, DNS sinkholes, throwing parties at rental properties, detect jamming, it took 18 years to hack, airtag hacks, undetectable weapons, RIP Skype, Cellebrite targets, upgrade ALL the things, Kali, Raspberry PIs, and M.2 hats, pirating music through a supply chain attack, Cisco small business and why you shouldn't use it, stop hacking Russia, Badbox is back, but it likely never left, and AI still Hallucinates! Show Notes: https://securityweekly.com/psw-864

Paul's Security Weekly (Podcast-Only)
Don't Hack Russia - PSW #864

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Mar 6, 2025 124:54


Hacking your mattress, Taylor Swift all the time, DNS sinkholes, throwing parties at rental properties, detect jamming, it took 18 years to hack, airtag hacks, undetectable weapons, RIP Skype, Cellebrite targets, upgrade ALL the things, Kali, Raspberry PIs, and M.2 hats, pirating music through a supply chain attack, Cisco small business and why you shouldn't use it, stop hacking Russia, Badbox is back, but it likely never left, and AI still Hallucinates! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-864

IT Privacy and Security Weekly update.
EP 232.5 Deep Dive - See for Miles and Miles with The IT Privacy and Security Weekly Update for the Week Ending March 4th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 6, 2025 18:56


How did Microsoft's Copilot expose private GitHub repositories, and what are the risks?Copilot accessed over 20,000 private GitHub repositories due to cached data from when they were public. Even after repos were made private, Copilot could still generate responses using this cached data, risking exposure of sensitive information like credentials and corporate secrets.What is the "nRootTag" exploit in Apple's Find My network?The "nRootTag" exploit allows attackers to track Bluetooth devices like AirTags without owners knowing. While AirTags use cryptographic keys to change Bluetooth addresses, attackers can rapidly compute these keys using GPUs, achieving a 90% tracking success rate.Why is the UK demanding an iCloud backdoor, and how has Apple responded?The UK wants access to encrypted iCloud data for law enforcement, but Apple opposes it, withdrawing its Advanced Data Protection from the UK. The US has also criticized the demand as a privacy and legal overreach.Why is Signal withdrawing from Sweden?Signal is leaving Sweden over proposed laws requiring backdoor access to encrypted chats. The company refuses to weaken encryption, emphasizing its commitment to user privacy.Why has the US reportedly halted offensive cyber operations against Russia?The US Cyber Command, under Defense Secretary orders, has paused cyber attacks on Russia, possibly for diplomatic reasons. Supporters see it as de-escalation; critics worry it weakens deterrence against Russian cyber threats.Why has Australia banned Kaspersky Lab products?Australia banned Kaspersky from government systems, citing espionage and foreign interference risks. The move signals concerns over antivirus software's deep system access and the company's Russian ties.How was a Cellebrite exploit used to hack a Serbian student's phone?A Cellebrite zero-day targeting Android's Linux kernel USB drivers allowed attackers with physical access to bypass the lock screen. This raises concerns over surveillance tools being misused against activists.What changes did Mozilla make to Firefox Terms of Use, and why was there backlash?Mozilla initially claimed broad rights over user-submitted content, sparking fears of data monetization. After criticism, they revised the terms, clarifying user ownership and denying AI data harvesting.

Paul's Security Weekly (Video-Only)
Don't Hack Russia - PSW #864

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Mar 6, 2025 124:54


Hacking your mattress, Taylor Swift all the time, DNS sinkholes, throwing parties at rental properties, detect jamming, it took 18 years to hack, airtag hacks, undetectable weapons, RIP Skype, Cellebrite targets, upgrade ALL the things, Kali, Raspberry PIs, and M.2 hats, pirating music through a supply chain attack, Cisco small business and why you shouldn't use it, stop hacking Russia, Badbox is back, but it likely never left, and AI still Hallucinates! Show Notes: https://securityweekly.com/psw-864

Risky Business
Risky Business #782 -- Are the USA and Russia cyber friends now?

Risky Business

Play Episode Listen Later Mar 5, 2025 50:12


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Did the US decide to stop caring about Russian cyber, or not? Adam stans hard for North Korea's massive ByBit crypto-theft Cellebrite firing Serbia is an example of the system working Starlink keeps scam compounds in Myanmar running Biggest DDoS botnet yet pushes over 6Tbps This week's episode is sponsored by network visibility company Corelight. Vincent Stoffer, field CTO at Corelight joins to talk through where eyes on your network can spot attackers like Salt and Volt Typhoon. This episode is also available on Youtube. Show notes Sygnia Preliminary Bybit Investigation Report Verichains Bybit Incident Investigation Preliminary Report North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit | The Record from Recorded Future News Risky Bulletin: Trump administration stops treating Russian hackers as a threat - Risky Business Did Trump Admin Order U.S. Cyber Command and CISA to Stand Down on Russia? (Story updated) Russia to redeploy resources freed up by end of war in Ukraine, warns Finnish intelligence | The Record from Recorded Future News FBI urges crypto community to avoid laundering funds from Bybit hack | The Record from Recorded Future News Risky Bulletin: Cellebrite bans bad boy Serbia - Risky Business Belgium probes suspected Chinese hack of state security service | The Record from Recorded Future News Gabbard: UK demand to Apple for backdoor access is 'grave concern' to US | The Record from Recorded Future News Elon Musk's Starlink Is Keeping Modern Slavery Compounds Online | WIRED U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” – Krebs on Security Google Password Manager finally syncs to iOS—here's how - Ars Technica Gmail Security Alert: Google To Ditch SMS Codes For Billions Of Users Massive Iran-linked botnet launches DDoS attacks against telecom, gaming platforms | Cybersecurity Dive Microsoft-signed driver used in ransomware attacks | Cybersecurity Dive London member of ‘Com' network convicted of making indecent images of children | The Record from Recorded Future News Volt Typhoon & Salt Typhoon Attackers Are Evading EDR: What Can You Do? | Corelight

IT Privacy and Security Weekly update.
EP 232 You can see for Miles and Miles with The IT Privacy and Security Weekly Update for the Week Ending March 4th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 5, 2025 16:48


This week:  Microsoft's Copilot is living up to its name—because apparently, once it gets a glimpse of your code, it just can't unsee it.Hackers just turned every Bluetooth device into an involuntary AirTag—so congrats, your wireless headphones are now a tracking device.The UK wants a backdoor to look into iCloud, and the US just responded with a very diplomatic “absolutely not.”Sweden wanted a backdoor, but Signal ghosted them instead—because encryption doesn't do toxic relationships.The US was cyber-attacking Russia? Shocking!  Next you'll tell us we need stronger glasses.Australia finally decided that letting Russian software protect their government computers was like asking an elephant to deliver eggs.Cellebrite's phone exploits are so good, even governments can't resist misusing them.Mozilla accidentally claimed ownership of everything you type into Firefox, then backtracked faster than a politician caught on a hot mic.We can see for miles and miles.  Come on, let's focus in for a better look.Find the full transcript to this week's podcast here.

The CyberWire
Is it cyber peace or just a buffer?

The CyberWire

Play Episode Listen Later Mar 3, 2025 24:35


Cyber Command ordered to halt offensive operations against Russia during Ukraine negotiations. Ransomware actors exploit Paragon Partition Manager vulnerability. Amnesty International publishes analysis of Cellebrite exploit chain. California orders data broker to shut down for violating the Delete Act. On our Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." And it's the end of an era. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Afternoon Cyber Tea segment. On our monthly Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." Ann and Igor share an engaging conversation on the challenges and optimism driving the fight against cyber threats. To hear the full conversation on Ann's show, check out the episode here. You can catch new episodes of Afternoon Cyber Tea every other Tuesday on N2K CyberWire network and on your favorite podcast app.  Selected Reading Exclusive: Hegseth orders Cyber Command to stand down on Russia planning (The Record)  As Trump warms to Putin, U.S. halts offensive cyber operations against Moscow (The Washington Post)  Hegseth Orders Pentagon to Stop Offensive Cyberoperations Against Russia (The New York Times)  Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks (Bleeping Computer) VU#726882 - Paragon Partition Manager contains five memory vulnerabilities within its BioNTdrv.sys driver that allow for privilege escalation and denial-of-service (DoS) attacks (Carnegie Mellon University Software Engineering Institute CERT Coordination Center) Cellebrite zero-day exploit used to target phone of Serbian student activist (Amnesty International Security Lab) California shuts down data broker for failing to register (The Record)   Research finds 12,000 ‘Live' API Keys and Passwords in DeepSeek's Training Data (Truffle Security)  Cyberattack detected at Polish space agency, minister says (Reuters) Polish space agency confirms cyberattack (The Register) As Skype shuts down, its legacy is end-to-end encryption for the masses (TechCrunch)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Risky Business News
Risky Bulletin: Trump admin halts Russia cyber operations

Risky Business News

Play Episode Listen Later Mar 3, 2025 7:33


The Trump administration stops treating Russian hackers as a threat, Meta seeks a permanent NSO injunction, new Cellebrite zero-days come to light, and big name Russian cyber criminals get … home detention. Show notes

Security Conversations
Lazarus ByBit $1.4B heist was supply chain attack on developer

Security Conversations

Play Episode Listen Later Mar 1, 2025 113:22


Three Buddy Problem - Episode 36: Ryan and Juanito join the show from the RE//verse conference with discussion on Natalie Silvanovic's keynote on hunting for bugs in mobile messengers, the thrill of looking at exposed attack surfaces and the grueling “losses” bug hunters endure before a breakthrough. We also cover the latest on the $1.4 billion ByBit hack pinned on the Lazarus Group and the malicious JavaScript supply chain attack at the center of the cryptocurrency heist. Plus, the ethical gray zones of tethered exploits via Cellebrite, the whiplash of AI-driven threat intel, and the looming pivot in U.S. cyber policy signaling a stand-down on Russia-focused ops. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

Risky Business News
Risky Bulletin: Cellebrite fires Serbia as a customer

Risky Business News

Play Episode Listen Later Feb 28, 2025 6:44


Cellebrite bans Serbia from using its products, Chinese hackers breached the Belgian security service, the Republican National Committee hid a Chinese hack and Microsoft removes malicious extensions from the VSCode Marketplace. Show notes

The CyberWire
The masterminds behind a $1.5 billion heist.

The CyberWire

Play Episode Listen Later Feb 27, 2025 33:08


FBI attributes $1.5 billion Bybit hack to DPRK hackers. Cellebrite suspends services in Serbia following allegations of misuse. A Belgium spy agency is hacked. New groups, bigger attacks. Sticky Werewolf strikes again. US DNI orders legal review of UK's request for iCloud backdoor. A cybersecurity veteran takes CISA's lead. DOGE accesses sensitive HUD data. Cleveland Municipal Court remains closed following cyber incident. Our guest today is an excerpt from our Caveat podcast. Adam Marré, Arctic Wolf CISO and former FBI special agent, joins Dave to discuss banning TikTok and increasing regulations for social media companies. And can hacking be treason? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is an excerpt from our Caveat podcast. Adam Marré, Arctic Wolf CISO and former FBI special agent, joins Dave to discuss banning TikTok and increasing regulations for social media companies. You can hear Adam and Dave's full discussion on today's Caveat episode. Listen to Dave and co-host Ben Yelin discuss the issue following the interview on Caveat.  Selected Reading FBI confirms Lazarus hackers were behind $1.5B Bybit crypto heist (Bleeping Computer) Cellebrite suspends Serbia as customer after claims police used firm's tech to plant spyware (TechCrunch) Belgium probes suspected Chinese hack of state security service (The Record) It's not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills (CyberScoop)  Angry Likho APT Resurfaces with Lumma Stealer Attacks Against Russia (Hackread)  Gabbard: UK demand to Apple for backdoor access is 'grave concern' to US (The Record) Karen Evans steps into a leading federal cyber position: executive assistant director for cybersecurity at CISA (CyberScoop) DOGE Gains Access to Confidential Records on Housing Discrimination, Medical Details — Even Domestic Violence (ProPublica) ‘Cyber incident' shuts down Cleveland Municipal Court for third straight day (The Record) Cyber threat shuts down Cleveland Municipal Court for second day (News5 Cleveland)  U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” (Krebs on Security) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

CISSP Cyber Training Podcast - CISSP Training Program
CCT 221: Malicious QR Codes and Advanced Digital Forensics Techniques for CISSP (D7.1)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Feb 20, 2025 25:48 Transcription Available


Send us a textCurious about the latest tactics cybercriminals are using to exploit vulnerabilities in messaging apps? Join me, Shon Gerber, on the CISSP Cyber Training Podcast as we unravel how Russian hackers are leveraging malicious QR codes to breach platforms like Signal, Telegram, and WhatsApp. We'll dissect this alarming trend that targets high-profile individuals including politicians and journalists, and underscore the importance of staying vigilant when interacting with QR codes. Despite fighting off a cold, I share a heartening story of collaboration with a student who helped correct errors in our study materials, reminding us all of the power of continuous learning and positive contributions to the cybersecurity community.Ever wondered how digital forensics can help you get ahead of potential cybersecurity incidents? Discover essential techniques for conducting thorough investigations as we unpack the art of digital forensics and incident response. From using static analysis to safely examine suspicious files, crafting incident reports with precision, to tackling insider threats with comprehensive artifact collection, this episode covers it all. Learn about the role of tools like Cellebrite in mobile device analysis and the critical importance of maintaining a chain of custody to safeguard evidence integrity. We also highlight root cause analysis as a key strategy for dissecting malware outbreaks and fortifying your organization's defenses.Looking to deepen your cybersecurity expertise? We've got you covered with a treasure trove of resources, including video content on our CISSP Cyber Training blog and consulting services through partnerships like NextPeak. Whether you're a seasoned expert or just beginning your journey, these tools are designed to enhance your skills and provide specialized guidance. Explore how anomaly-based detection aids in spotting malicious network activity and why clear, jargon-free reporting is crucial in post-incident reviews. This episode promises to equip you with the insights needed to navigate the evolving landscape of cybersecurity challenges and opportunities.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

That Tech Pod
Remote Mobile Collection: the Future of Forensic Investigations is Now with Matthew Rasmussen

That Tech Pod

Play Episode Listen Later Feb 4, 2025 31:31


Today Laura and Kevin are joined by Matthew Rasmussen, founder of ModeOne, a trailblazer in the legal tech and eDiscovery space, to explore how his innovative solutions are reshaping digital forensics. Matt shares his insights on the challenges and opportunities in mobile data collection and forensic investigations. We talk about the genesis of ModeOne and how its remote smartphone collection solution disrupts traditional forensic practices, offering a scalable, targeted, and cost-effective approach. Matt explains how innovations like these are leveling the playing field in a sector traditionally dominated by giants like Cellebrite. We discuss the balance between privacy rights and forensic needs in the age of remote work and encrypted communications and the future of forensic investigations with emerging technologies like IoT devices, wearables, autonomous vehicles, and drones. We also cover the challenges of detecting manipulated digital evidence and how forensic tools are evolving to address these issues and the pivotal role of platforms like Signal and WhatsApp in secure communications, contrasted with the vulnerabilities of less secure options. Matt also offers his perspective on high-profile cases like the Blake Lively/Justin Baldoni case and the Alex Jones trial, shedding light on how digital evidence plays a crucial role in litigation today. Finally, Matt shares advice for aspiring innovators in the legal tech space, predictions for the next decade in eDiscovery, and why he believes the best is yet to come for the industry.Matthew is a seasoned leader with over two decades of eDiscovery experience transforming how Fortune 500 companies, AmLaw 200 law firms, and litigation service providers approach complex, high-stakes legal matters. He has held key roles at prestigious organizations like O'Melveny & Myers and Bingham McCutchen, building a reputation for innovation in eDiscovery lifecycle management and legal technology.As the founder of ModeOne, Matthew pioneered the first remote smartphone collection solution designed for targeted, cost-effective data extraction, revolutionizing modern evidence management. Known for his collaborative approach and passion for solving industry challenges, he thrives on delivering new technology to the market that redefine what's possible in the legal tech space.

Dark Side of Wikipedia | True Crime & Dark History
Why Is There Debate Over Karen Read Cell Phone Data?

Dark Side of Wikipedia | True Crime & Dark History

Play Episode Listen Later Jan 14, 2025 14:04


Why Is There Debate Over Karen Read Cell Phone Data? What happens when the “facts” depend on who's reading them? In the Karen Read case, a heated debate rages over alleged discrepancies in Cellebrite data. Was a critical Google search made at 2 a.m. or 6 a.m.? The answer could be the linchpin of the entire case. While the defense and prosecution clash over expert testimonies, questions arise about how much weight jurors give to official sources versus independent experts. Can a judge rule definitively on such contested tech evidence, or is it up to the jury to decide who to trust? And what happens when a defense expert is accused of tossing around a "word salad" rather than offering solid science? It's a fascinating look at the intersection of tech, law, and perception. Do experts hold the final say, or do we all just think we're as smart as the professionals? #TrueCrime #KarenReadCase #ExpertTestimony #CellbriteData #ReasonableDoubt #DefenseDiaries #HiddenKillersPodcast Want to listen to ALL of our podcasts AD-FREE? Subscribe through APPLE PODCASTS, and try it for three days free: https://tinyurl.com/ycw626tj Follow Our Other Cases: https://www.truecrimetodaypod.com The latest on The Downfall of Diddy, The Trial of Karen Read, The Murder Of Maddie Soto, Catching the Long Island Serial Killer, Awaiting Admission: BTK's Unconfessed Crimes, Delphi Murders: Inside the Crime, Chad & Lori Daybell, The Murder of Ana Walshe, Alex Murdaugh, Bryan Kohberger, Lucy Letby, Kouri Richins, Malevolent Mormon Mommys, The Menendez Brothers: Quest For Justice, The Murder of Stephen Smith, The Murder of Madeline Kingsbury, The Murder Of Sandra Birchmore, and much more! Listen at https://www.truecrimetodaypod.com

Dark Side of Wikipedia | True Crime & Dark History
Ret. FBI Jennifer Coffindaffer Gives Her Insight On Karen Read's Dog & Cellebrite Data Hearing

Dark Side of Wikipedia | True Crime & Dark History

Play Episode Listen Later Jan 14, 2025 26:21


What really happened to John O'Keefe? Was it a tragic accident, a violent altercation, or something much darker? Dive into the controversial courtroom drama surrounding Karen Read's alleged involvement, with a special focus on the bizarre forensic rabbit holes. From a disputed “dog bite expert” with questionable credentials to a heated debate over cell phone data that could unravel the timeline, this case is riddled with twists. Why are defense experts doubling down on theories that seem to crumble under scrutiny? And is road rash really being mistaken for canine attacks? Join Tony Brueski and retired FBI Special Agent Jennifer Coffindaffer as they untangle the evidence and dissect the courtroom chaos. If the experts can't even agree, how can anyone be sure of the truth? What's the real story behind the marks on O'Keefe's body, and how does this all fit into the defense's narrative? #TrueCrimeToday #HiddenKillersPodcast #KarenReadTrial #ForensicFails #DogBiteDrama #CellPhoneForensics #JusticeForJohnOKeefe Want to listen to ALL of our podcasts AD-FREE? Subscribe through APPLE PODCASTS, and try it for three days free: https://tinyurl.com/ycw626tj Follow Our Other Cases: https://www.truecrimetodaypod.com The latest on The Downfall of Diddy, The Trial of Karen Read, The Murder Of Maddie Soto, Catching the Long Island Serial Killer, Awaiting Admission: BTK's Unconfessed Crimes, Delphi Murders: Inside the Crime, Chad & Lori Daybell, The Murder of Ana Walshe, Alex Murdaugh, Bryan Kohberger, Lucy Letby, Kouri Richins, Malevolent Mormon Mommys, The Menendez Brothers: Quest For Justice, The Murder of Stephen Smith, The Murder of Madeline Kingsbury, The Murder Of Sandra Birchmore, and much more! Listen at https://www.truecrimetodaypod.com

Hidden Killers With Tony Brueski | True Crime News & Commentary
Why Is There Debate Over Karen Read Cell Phone Data?

Hidden Killers With Tony Brueski | True Crime News & Commentary

Play Episode Listen Later Jan 14, 2025 14:04


What happens when the “facts” depend on who's reading them? In the Karen Read case, a heated debate rages over alleged discrepancies in Cellebrite data. Was a critical Google search made at 2 a.m. or 6 a.m.? The answer could be the linchpin of the entire case. While the defense and prosecution clash over expert testimonies, questions arise about how much weight jurors give to official sources versus independent experts. Can a judge rule definitively on such contested tech evidence, or is it up to the jury to decide who to trust? And what happens when a defense expert is accused of tossing around a "word salad" rather than offering solid science? It's a fascinating look at the intersection of tech, law, and perception. Do experts hold the final say, or do we all just think we're as smart as the professionals? #TrueCrime #KarenReadCase #ExpertTestimony #CellbriteData #ReasonableDoubt #DefenseDiaries #HiddenKillersPodcast Want to listen to ALL of our podcasts AD-FREE? Subscribe through APPLE PODCASTS, and try it for three days free: https://tinyurl.com/ycw626tj Follow Our Other Cases: https://www.truecrimetodaypod.com The latest on The Downfall of Diddy, The Trial of Karen Read, The Murder Of Maddie Soto, Catching the Long Island Serial Killer, Awaiting Admission: BTK's Unconfessed Crimes, Delphi Murders: Inside the Crime, Chad & Lori Daybell, The Murder of Ana Walshe, Alex Murdaugh, Bryan Kohberger, Lucy Letby, Kouri Richins, Malevolent Mormon Mommys, The Menendez Brothers: Quest For Justice, The Murder of Stephen Smith, The Murder of Madeline Kingsbury, The Murder Of Sandra Birchmore, and much more! Listen at https://www.truecrimetodaypod.com

Hidden Killers With Tony Brueski | True Crime News & Commentary
Ret. FBI Jennifer Coffindaffer Gives Her Insight On Karen Read's Dog & Cellebrite Data Hearing

Hidden Killers With Tony Brueski | True Crime News & Commentary

Play Episode Listen Later Jan 14, 2025 26:21


What really happened to John O'Keefe? Was it a tragic accident, a violent altercation, or something much darker? Dive into the controversial courtroom drama surrounding Karen Read's alleged involvement, with a special focus on the bizarre forensic rabbit holes. From a disputed “dog bite expert” with questionable credentials to a heated debate over cell phone data that could unravel the timeline, this case is riddled with twists. Why are defense experts doubling down on theories that seem to crumble under scrutiny? And is road rash really being mistaken for canine attacks? Join Tony Brueski and retired FBI Special Agent Jennifer Coffindaffer as they untangle the evidence and dissect the courtroom chaos. If the experts can't even agree, how can anyone be sure of the truth? What's the real story behind the marks on O'Keefe's body, and how does this all fit into the defense's narrative? #TrueCrimeToday #HiddenKillersPodcast #KarenReadTrial #ForensicFails #DogBiteDrama #CellPhoneForensics #JusticeForJohnOKeefe Want to listen to ALL of our podcasts AD-FREE? Subscribe through APPLE PODCASTS, and try it for three days free: https://tinyurl.com/ycw626tj Follow Our Other Cases: https://www.truecrimetodaypod.com The latest on The Downfall of Diddy, The Trial of Karen Read, The Murder Of Maddie Soto, Catching the Long Island Serial Killer, Awaiting Admission: BTK's Unconfessed Crimes, Delphi Murders: Inside the Crime, Chad & Lori Daybell, The Murder of Ana Walshe, Alex Murdaugh, Bryan Kohberger, Lucy Letby, Kouri Richins, Malevolent Mormon Mommys, The Menendez Brothers: Quest For Justice, The Murder of Stephen Smith, The Murder of Madeline Kingsbury, The Murder Of Sandra Birchmore, and much more! Listen at https://www.truecrimetodaypod.com

Dark Side of Wikipedia | True Crime & Dark History
Court Decision Upholds Use of Cellebrite Testimony Amid High-Profile Case Debate-What Does That Mean for Karen Read?

Dark Side of Wikipedia | True Crime & Dark History

Play Episode Listen Later Jan 10, 2025 7:56


The Massachusetts Supreme Judicial Court's recent decision has far-reaching implications for the Karen Read case and similar trials involving digital evidence. The court upheld David Cronin Jr.'s conviction for possession of child sex abuse materials, affirming that testimony on data extracted with Cellebrite software could be admitted without the witness being an expert. Cronin's appeal rested on claims that Police Officer Michael McLaughlin, who testified on the Cellebrite report from Cronin's phone, was not qualified to do so as an expert. McLaughlin admitted he lacked technical expertise but explained that Cellebrite's software presented data in a layperson-friendly format. The court concluded that McLaughlin's testimony “required no scientific, technical, or specialized knowledge,” making it admissible as lay testimony. However, the court also found parts of his testimony, such as claims about Cellebrite's reliability, ventured into expert territory but ruled that this did not unfairly influence the trial's outcome. This decision is particularly relevant to the Karen Read case, where Cellebrite plays a pivotal role. Read, accused of causing the death of her boyfriend, John O'Keefe, is building her defense around allegations that a prosecution witness, Jennifer McCabe, conducted suspicious Google searches. According to Read's expert, Richard Green, McCabe searched phrases like “how long to die in cold” at 2:27 a.m., hours before O'Keefe's body was found. Green, who reviewed Cellebrite data from McCabe's phone, testified that the searches were in a “deleted state” and that several phone calls had been erased. However, prosecutors argue Green's findings are flawed, citing their own Cellebrite expert, Ian Whiffin, who found no evidence of such searches or deletions. Additionally, Cellebrite software updates introduced after Read's initial trial have reportedly invalidated the 2:27 a.m. timestamp central to Green's claims. Prosecutors noted that Cellebrite's new software update prevents manipulation of timestamp data and removes unreliable timestamps from Safari searches. When McCabe's phone was re-analyzed with the updated version, the searches were shown to have occurred at 6:24 a.m., closer to when O'Keefe was found, and without evidence of deletion. The defense's reliance on Green's earlier analysis has led prosecutors to file a motion to bar him from testifying, asserting that his opinions are “completely discredited” by both Cellebrite and their own expert. They argue that presenting Green's findings in court risks confusing jurors with inaccurate information. A hearing to determine the admissibility of Green's testimony is scheduled for Jan. 31, a critical juncture in Read's case as her team seeks to challenge the prosecution's narrative. This latest legal development underscores the complexities of using Cellebrite software in criminal cases. As digital forensics evolves, courts continue to grapple with how best to evaluate and admit such evidence, setting significant precedents for future trials. #DigitalForensics #KarenReadCase #Cellebrite #LegalPrecedent #Massachusetts #CourtRuling #ExpertTestimony Want to listen to ALL of our podcasts AD-FREE? Subscribe through APPLE PODCASTS, and try it for three days free: https://tinyurl.com/ycw626tj Follow Our Other Cases: https://www.truecrimetodaypod.com The latest on The Downfall of Diddy, The Trial of Karen Read, The Murder Of Maddie Soto, Catching the Long Island Serial Killer, Awaiting Admission: BTK's Unconfessed Crimes, Delphi Murders: Inside the Crime, Chad & Lori Daybell, The Murder of Ana Walshe, Alex Murdaugh, Bryan Kohberger, Lucy Letby, Kouri Richins, Malevolent Mormon Mommys, The Menendez Brothers: Quest For Justice, The Murder of Stephen Smith, The Murder of Madeline Kingsbury, The Murder Of Sandra Birchmore, and much more! Listen at https://www.truecrimetodaypod.com

Hidden Killers With Tony Brueski | True Crime News & Commentary
Court Decision Upholds Use of Cellebrite Testimony Amid High-Profile Case Debate-What Does That Mean for Karen Read?

Hidden Killers With Tony Brueski | True Crime News & Commentary

Play Episode Listen Later Jan 10, 2025 7:56


The Massachusetts Supreme Judicial Court's recent decision has far-reaching implications for the Karen Read case and similar trials involving digital evidence. The court upheld David Cronin Jr.'s conviction for possession of child sex abuse materials, affirming that testimony on data extracted with Cellebrite software could be admitted without the witness being an expert. Cronin's appeal rested on claims that Police Officer Michael McLaughlin, who testified on the Cellebrite report from Cronin's phone, was not qualified to do so as an expert. McLaughlin admitted he lacked technical expertise but explained that Cellebrite's software presented data in a layperson-friendly format. The court concluded that McLaughlin's testimony “required no scientific, technical, or specialized knowledge,” making it admissible as lay testimony. However, the court also found parts of his testimony, such as claims about Cellebrite's reliability, ventured into expert territory but ruled that this did not unfairly influence the trial's outcome. This decision is particularly relevant to the Karen Read case, where Cellebrite plays a pivotal role. Read, accused of causing the death of her boyfriend, John O'Keefe, is building her defense around allegations that a prosecution witness, Jennifer McCabe, conducted suspicious Google searches. According to Read's expert, Richard Green, McCabe searched phrases like “how long to die in cold” at 2:27 a.m., hours before O'Keefe's body was found. Green, who reviewed Cellebrite data from McCabe's phone, testified that the searches were in a “deleted state” and that several phone calls had been erased. However, prosecutors argue Green's findings are flawed, citing their own Cellebrite expert, Ian Whiffin, who found no evidence of such searches or deletions. Additionally, Cellebrite software updates introduced after Read's initial trial have reportedly invalidated the 2:27 a.m. timestamp central to Green's claims. Prosecutors noted that Cellebrite's new software update prevents manipulation of timestamp data and removes unreliable timestamps from Safari searches. When McCabe's phone was re-analyzed with the updated version, the searches were shown to have occurred at 6:24 a.m., closer to when O'Keefe was found, and without evidence of deletion. The defense's reliance on Green's earlier analysis has led prosecutors to file a motion to bar him from testifying, asserting that his opinions are “completely discredited” by both Cellebrite and their own expert. They argue that presenting Green's findings in court risks confusing jurors with inaccurate information. A hearing to determine the admissibility of Green's testimony is scheduled for Jan. 31, a critical juncture in Read's case as her team seeks to challenge the prosecution's narrative. This latest legal development underscores the complexities of using Cellebrite software in criminal cases. As digital forensics evolves, courts continue to grapple with how best to evaluate and admit such evidence, setting significant precedents for future trials. #DigitalForensics #KarenReadCase #Cellebrite #LegalPrecedent #Massachusetts #CourtRuling #ExpertTestimony Want to listen to ALL of our podcasts AD-FREE? Subscribe through APPLE PODCASTS, and try it for three days free: https://tinyurl.com/ycw626tj Follow Our Other Cases: https://www.truecrimetodaypod.com The latest on The Downfall of Diddy, The Trial of Karen Read, The Murder Of Maddie Soto, Catching the Long Island Serial Killer, Awaiting Admission: BTK's Unconfessed Crimes, Delphi Murders: Inside the Crime, Chad & Lori Daybell, The Murder of Ana Walshe, Alex Murdaugh, Bryan Kohberger, Lucy Letby, Kouri Richins, Malevolent Mormon Mommys, The Menendez Brothers: Quest For Justice, The Murder of Stephen Smith, The Murder of Madeline Kingsbury, The Murder Of Sandra Birchmore, and much more! Listen at https://www.truecrimetodaypod.com

My Crazy Family | A Podcast of Crazy Family Stories
Court Decision Upholds Use of Cellebrite Testimony Amid High-Profile Case Debate-What Does That Mean for Karen Read?

My Crazy Family | A Podcast of Crazy Family Stories

Play Episode Listen Later Jan 10, 2025 7:56


The Massachusetts Supreme Judicial Court's recent decision has far-reaching implications for the Karen Read case and similar trials involving digital evidence. The court upheld David Cronin Jr.'s conviction for possession of child sex abuse materials, affirming that testimony on data extracted with Cellebrite software could be admitted without the witness being an expert. Cronin's appeal rested on claims that Police Officer Michael McLaughlin, who testified on the Cellebrite report from Cronin's phone, was not qualified to do so as an expert. McLaughlin admitted he lacked technical expertise but explained that Cellebrite's software presented data in a layperson-friendly format. The court concluded that McLaughlin's testimony “required no scientific, technical, or specialized knowledge,” making it admissible as lay testimony. However, the court also found parts of his testimony, such as claims about Cellebrite's reliability, ventured into expert territory but ruled that this did not unfairly influence the trial's outcome. This decision is particularly relevant to the Karen Read case, where Cellebrite plays a pivotal role. Read, accused of causing the death of her boyfriend, John O'Keefe, is building her defense around allegations that a prosecution witness, Jennifer McCabe, conducted suspicious Google searches. According to Read's expert, Richard Green, McCabe searched phrases like “how long to die in cold” at 2:27 a.m., hours before O'Keefe's body was found. Green, who reviewed Cellebrite data from McCabe's phone, testified that the searches were in a “deleted state” and that several phone calls had been erased. However, prosecutors argue Green's findings are flawed, citing their own Cellebrite expert, Ian Whiffin, who found no evidence of such searches or deletions. Additionally, Cellebrite software updates introduced after Read's initial trial have reportedly invalidated the 2:27 a.m. timestamp central to Green's claims. Prosecutors noted that Cellebrite's new software update prevents manipulation of timestamp data and removes unreliable timestamps from Safari searches. When McCabe's phone was re-analyzed with the updated version, the searches were shown to have occurred at 6:24 a.m., closer to when O'Keefe was found, and without evidence of deletion. The defense's reliance on Green's earlier analysis has led prosecutors to file a motion to bar him from testifying, asserting that his opinions are “completely discredited” by both Cellebrite and their own expert. They argue that presenting Green's findings in court risks confusing jurors with inaccurate information. A hearing to determine the admissibility of Green's testimony is scheduled for Jan. 31, a critical juncture in Read's case as her team seeks to challenge the prosecution's narrative. This latest legal development underscores the complexities of using Cellebrite software in criminal cases. As digital forensics evolves, courts continue to grapple with how best to evaluate and admit such evidence, setting significant precedents for future trials. #DigitalForensics #KarenReadCase #Cellebrite #LegalPrecedent #Massachusetts #CourtRuling #ExpertTestimony Want to listen to ALL of our podcasts AD-FREE? Subscribe through APPLE PODCASTS, and try it for three days free: https://tinyurl.com/ycw626tj Follow Our Other Cases: https://www.truecrimetodaypod.com The latest on The Downfall of Diddy, The Trial of Karen Read, The Murder Of Maddie Soto, Catching the Long Island Serial Killer, Awaiting Admission: BTK's Unconfessed Crimes, Delphi Murders: Inside the Crime, Chad & Lori Daybell, The Murder of Ana Walshe, Alex Murdaugh, Bryan Kohberger, Lucy Letby, Kouri Richins, Malevolent Mormon Mommys, The Menendez Brothers: Quest For Justice, The Murder of Stephen Smith, The Murder of Madeline Kingsbury, The Murder Of Sandra Birchmore, and much more! Listen at https://www.truecrimetodaypod.com

Surveillance Report
A Common Privacy Mistake, Chrome Increasing User Tracking, And Government-Planted Malware.

Surveillance Report

Play Episode Listen Later Dec 31, 2024 43:15


Episode 207: Many people are making a serious mistake when selling their phones, Chrome is about to user tracking into the express lane, a government not only unlocked a journalist's phone with Cellebrite but also planted malware on it, and much more.Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news.❤️ Support us on Patreon: https://www.patreon.com/surveillancepod

Paul's Security Weekly
Vogons, Task Scams, HiatusRat, Cellebrite, Deloitte, Quantum, Aaran Leyland, and More - SWN #438

Paul's Security Weekly

Play Episode Listen Later Dec 17, 2024 40:02


Vogons, Task Scams, HiatusRat, Cellebrite, Deloitte, Quantum, WordPress, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-438