The UK Column is an independent news organisation analysing the information war. Operating without financial backing or external investment, we remain free from advertisers, foundations, and political parties, relying solely on support from our audience through memberships and donations.
…
continue reading
Content provided by Audioboom and True Crime Today. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Audioboom and True Crime Today or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Kohberger Phone Pings Put Him Face To Face With Victims At Mad Greek, Before Attack!
MP3•Episode home
Manage episode 500117156 series 3418589
Content provided by Audioboom and True Crime Today. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Audioboom and True Crime Today or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Kohberger Phone Pings Put Him Face To Face With Victims At Mad Greek, Before Attack!
When Cellebrite forensic specialists dug into Bryan Kohberger’s phone and school computer, they weren’t looking for rumors — they were looking for data. What they found was chilling: “abnormal gaps” in his digital history surrounding the murders of four University of Idaho students, and a small but telling oversight — his phone had passively logged the Wi-Fi network for The Mad Greek, the Moscow restaurant where two of the victims worked.
The experts, Heather and Jared Barnhart, told the court these data gaps could be consistent with cleanup or anti-forensic techniques. On his WSU computer, Windows event logs and SRUM data went dark between November 11 and 16 — a normal school week that should’ve been full of routine activity. Chrome history showed blank stretches exactly when downloads occurred.
On his phone, they saw more “abnormal gaps” — including a complete communications blackout from 2:54 a.m. to 4:48 a.m. on the night of the murders. Earlier that night, at 12:26 a.m., he had searched for the local police dispatch feed. But somewhere in the weeks or months before, his device had been close enough to The Mad Greek’s router to recognize, and possibly join, its network. That’s not speculation — that’s a digital artifact.
Phones don’t save networks by magic. At some point, he was close enough for that handshake. Whether he was inside or just outside isn’t something the data can prove — but in a case built on connecting small dots, this one matters. It survived where other traces were wiped. And when you line it up with the rest of his digital behavior — the late-night drives, the wiped logs, the scanner search — it fits the architecture of a larger plan.
This isn’t about proving a relationship. It’s about proving familiarity. And in this case, familiarity is one more brick in the wall.
#BryanKohberger #Idaho4 #MadGreek #TrueCrime #Cellebrite #DigitalForensics #HiddenKillers #CrimeNews #UniversityOfIdaho #IdahoMurders
Want to comment and watch this podcast as a video?
Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod
Instagram https://www.instagram.com/hiddenkillerspod/
Facebook https://www.facebook.com/hiddenkillerspod/
Tik-Tok https://www.tiktok.com/@hiddenkillerspod
X Twitter https://x.com/tonybpod
Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
When Cellebrite forensic specialists dug into Bryan Kohberger’s phone and school computer, they weren’t looking for rumors — they were looking for data. What they found was chilling: “abnormal gaps” in his digital history surrounding the murders of four University of Idaho students, and a small but telling oversight — his phone had passively logged the Wi-Fi network for The Mad Greek, the Moscow restaurant where two of the victims worked.
The experts, Heather and Jared Barnhart, told the court these data gaps could be consistent with cleanup or anti-forensic techniques. On his WSU computer, Windows event logs and SRUM data went dark between November 11 and 16 — a normal school week that should’ve been full of routine activity. Chrome history showed blank stretches exactly when downloads occurred.
On his phone, they saw more “abnormal gaps” — including a complete communications blackout from 2:54 a.m. to 4:48 a.m. on the night of the murders. Earlier that night, at 12:26 a.m., he had searched for the local police dispatch feed. But somewhere in the weeks or months before, his device had been close enough to The Mad Greek’s router to recognize, and possibly join, its network. That’s not speculation — that’s a digital artifact.
Phones don’t save networks by magic. At some point, he was close enough for that handshake. Whether he was inside or just outside isn’t something the data can prove — but in a case built on connecting small dots, this one matters. It survived where other traces were wiped. And when you line it up with the rest of his digital behavior — the late-night drives, the wiped logs, the scanner search — it fits the architecture of a larger plan.
This isn’t about proving a relationship. It’s about proving familiarity. And in this case, familiarity is one more brick in the wall.
#BryanKohberger #Idaho4 #MadGreek #TrueCrime #Cellebrite #DigitalForensics #HiddenKillers #CrimeNews #UniversityOfIdaho #IdahoMurders
Want to comment and watch this podcast as a video?
Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod
Instagram https://www.instagram.com/hiddenkillerspod/
Facebook https://www.facebook.com/hiddenkillerspod/
Tik-Tok https://www.tiktok.com/@hiddenkillerspod
X Twitter https://x.com/tonybpod
Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
9836 episodes
Kohberger Phone Pings Put Him Face To Face With Victims At Mad Greek, Before Attack!
Hidden Killers With Tony Brueski | True Crime News & Commentary
MP3•Episode home
Manage episode 500117156 series 3418589
Content provided by Audioboom and True Crime Today. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Audioboom and True Crime Today or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Kohberger Phone Pings Put Him Face To Face With Victims At Mad Greek, Before Attack!
When Cellebrite forensic specialists dug into Bryan Kohberger’s phone and school computer, they weren’t looking for rumors — they were looking for data. What they found was chilling: “abnormal gaps” in his digital history surrounding the murders of four University of Idaho students, and a small but telling oversight — his phone had passively logged the Wi-Fi network for The Mad Greek, the Moscow restaurant where two of the victims worked.
The experts, Heather and Jared Barnhart, told the court these data gaps could be consistent with cleanup or anti-forensic techniques. On his WSU computer, Windows event logs and SRUM data went dark between November 11 and 16 — a normal school week that should’ve been full of routine activity. Chrome history showed blank stretches exactly when downloads occurred.
On his phone, they saw more “abnormal gaps” — including a complete communications blackout from 2:54 a.m. to 4:48 a.m. on the night of the murders. Earlier that night, at 12:26 a.m., he had searched for the local police dispatch feed. But somewhere in the weeks or months before, his device had been close enough to The Mad Greek’s router to recognize, and possibly join, its network. That’s not speculation — that’s a digital artifact.
Phones don’t save networks by magic. At some point, he was close enough for that handshake. Whether he was inside or just outside isn’t something the data can prove — but in a case built on connecting small dots, this one matters. It survived where other traces were wiped. And when you line it up with the rest of his digital behavior — the late-night drives, the wiped logs, the scanner search — it fits the architecture of a larger plan.
This isn’t about proving a relationship. It’s about proving familiarity. And in this case, familiarity is one more brick in the wall.
#BryanKohberger #Idaho4 #MadGreek #TrueCrime #Cellebrite #DigitalForensics #HiddenKillers #CrimeNews #UniversityOfIdaho #IdahoMurders
Want to comment and watch this podcast as a video?
Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod
Instagram https://www.instagram.com/hiddenkillerspod/
Facebook https://www.facebook.com/hiddenkillerspod/
Tik-Tok https://www.tiktok.com/@hiddenkillerspod
X Twitter https://x.com/tonybpod
Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
When Cellebrite forensic specialists dug into Bryan Kohberger’s phone and school computer, they weren’t looking for rumors — they were looking for data. What they found was chilling: “abnormal gaps” in his digital history surrounding the murders of four University of Idaho students, and a small but telling oversight — his phone had passively logged the Wi-Fi network for The Mad Greek, the Moscow restaurant where two of the victims worked.
The experts, Heather and Jared Barnhart, told the court these data gaps could be consistent with cleanup or anti-forensic techniques. On his WSU computer, Windows event logs and SRUM data went dark between November 11 and 16 — a normal school week that should’ve been full of routine activity. Chrome history showed blank stretches exactly when downloads occurred.
On his phone, they saw more “abnormal gaps” — including a complete communications blackout from 2:54 a.m. to 4:48 a.m. on the night of the murders. Earlier that night, at 12:26 a.m., he had searched for the local police dispatch feed. But somewhere in the weeks or months before, his device had been close enough to The Mad Greek’s router to recognize, and possibly join, its network. That’s not speculation — that’s a digital artifact.
Phones don’t save networks by magic. At some point, he was close enough for that handshake. Whether he was inside or just outside isn’t something the data can prove — but in a case built on connecting small dots, this one matters. It survived where other traces were wiped. And when you line it up with the rest of his digital behavior — the late-night drives, the wiped logs, the scanner search — it fits the architecture of a larger plan.
This isn’t about proving a relationship. It’s about proving familiarity. And in this case, familiarity is one more brick in the wall.
#BryanKohberger #Idaho4 #MadGreek #TrueCrime #Cellebrite #DigitalForensics #HiddenKillers #CrimeNews #UniversityOfIdaho #IdahoMurders
Want to comment and watch this podcast as a video?
Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod
Instagram https://www.instagram.com/hiddenkillerspod/
Facebook https://www.facebook.com/hiddenkillerspod/
Tik-Tok https://www.tiktok.com/@hiddenkillerspod
X Twitter https://x.com/tonybpod
Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
9836 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.