Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Carol Marks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Carol Marks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Airports, Cold Cases, and AirTags

13:10
 
Share
 

Manage episode 514020511 series 2825113
Content provided by Carol Marks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Carol Marks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

TALK TO ME, TEXT IT

A loudspeaker blares propaganda through a busy terminal. Screens flash messages no one authorized. People freeze, look up, and wonder who’s actually in control. That’s where we begin—at the intersection of public trust, connected systems, and the unnerving ease of digital disruption.
We walk through the airport hacks in Harrisburg and Kelowna, unpacking how modern PA systems and flight information displays ride on cloud infrastructure and vendor chains that aren’t always built with real-world adversaries in mind. We talk impact beyond headlines: why even “no safety issue” incidents can fray confidence, how to communicate in a breach to keep crowds calm, and what layered defenses—network segmentation, credential hygiene, response drills—look like when the stakes are human, not just technical. If you travel, you’ll hear simple steps to verify information and stay oriented when the screens go sideways.
Then we pivot to a Long Island cold case that finally advances after 40 years. A suspect is arraigned through high-tech DNA testing while the story of three wrongfully convicted men reminds us that justice isn’t just about finding someone—it’s about finding the truth the right way. We dig into evidence integrity, lab standards, and the value of independent reviews that can admit uncertainty and correct course. It’s a sober look at how science can both fail and redeem, depending on how carefully we handle it.
Finally, we tackle the dark flip side of everyday tech: an alleged AirTag-enabled home invasion in Florida. We break down how trackers can be misused, what alert features and device scans can do, and how to layer practical security—from garage habits and alarms to what to do if you find an unknown tracker. It’s actionable without fear-mongering, aiming to make you a little safer at home and on the road. We close with a lighter prompt—a favorite potluck dish—because a good casserole and a shared laugh matter too.
If this mix of real-world cyber risk, forensic insight, and practical safety resonates, follow the show, share it with a friend, and leave a quick review to help others find us. Your notes and stories shape what we cover next—what should we dig into?

Buzzsprout - Let's get your podcast launched!
Start for FREE

Thanks for listening!

Liberty Line each week on Sunday, look for topics on my X file @americanistblog and submit your 1-3 audio opinions to [email protected] and you'll be featured on the podcast.

Buzzsprout - Let's get your podcast launched!
Start for FREE

Support the show

Tip Jar for coffee $ - Thanks

Music by Alehandro Vodnik from Pixabay

Blog - AnAmericanist.com
X - @americanistblog

  continue reading

Chapters

1. Opening, Plans, and Mood-Setter (00:00:00)

2. Airport Hack: PA Systems Hijacked (00:01:11)

3. How And Why The Breach Happened (00:03:34)

4. Wider Cyber Vulnerabilities In Transit (00:04:44)

5. Cold Case Breakthrough After 40 Years (00:05:49)

6. DNA, Wrongful Convictions, And Closure (00:08:24)

7. AirTags Used In Armed Home Invasion (00:10:49)

937 episodes

Artwork
iconShare
 
Manage episode 514020511 series 2825113
Content provided by Carol Marks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Carol Marks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

TALK TO ME, TEXT IT

A loudspeaker blares propaganda through a busy terminal. Screens flash messages no one authorized. People freeze, look up, and wonder who’s actually in control. That’s where we begin—at the intersection of public trust, connected systems, and the unnerving ease of digital disruption.
We walk through the airport hacks in Harrisburg and Kelowna, unpacking how modern PA systems and flight information displays ride on cloud infrastructure and vendor chains that aren’t always built with real-world adversaries in mind. We talk impact beyond headlines: why even “no safety issue” incidents can fray confidence, how to communicate in a breach to keep crowds calm, and what layered defenses—network segmentation, credential hygiene, response drills—look like when the stakes are human, not just technical. If you travel, you’ll hear simple steps to verify information and stay oriented when the screens go sideways.
Then we pivot to a Long Island cold case that finally advances after 40 years. A suspect is arraigned through high-tech DNA testing while the story of three wrongfully convicted men reminds us that justice isn’t just about finding someone—it’s about finding the truth the right way. We dig into evidence integrity, lab standards, and the value of independent reviews that can admit uncertainty and correct course. It’s a sober look at how science can both fail and redeem, depending on how carefully we handle it.
Finally, we tackle the dark flip side of everyday tech: an alleged AirTag-enabled home invasion in Florida. We break down how trackers can be misused, what alert features and device scans can do, and how to layer practical security—from garage habits and alarms to what to do if you find an unknown tracker. It’s actionable without fear-mongering, aiming to make you a little safer at home and on the road. We close with a lighter prompt—a favorite potluck dish—because a good casserole and a shared laugh matter too.
If this mix of real-world cyber risk, forensic insight, and practical safety resonates, follow the show, share it with a friend, and leave a quick review to help others find us. Your notes and stories shape what we cover next—what should we dig into?

Buzzsprout - Let's get your podcast launched!
Start for FREE

Thanks for listening!

Liberty Line each week on Sunday, look for topics on my X file @americanistblog and submit your 1-3 audio opinions to [email protected] and you'll be featured on the podcast.

Buzzsprout - Let's get your podcast launched!
Start for FREE

Support the show

Tip Jar for coffee $ - Thanks

Music by Alehandro Vodnik from Pixabay

Blog - AnAmericanist.com
X - @americanistblog

  continue reading

Chapters

1. Opening, Plans, and Mood-Setter (00:00:00)

2. Airport Hack: PA Systems Hijacked (00:01:11)

3. How And Why The Breach Happened (00:03:34)

4. Wider Cyber Vulnerabilities In Transit (00:04:44)

5. Cold Case Breakthrough After 40 Years (00:05:49)

6. DNA, Wrongful Convictions, And Closure (00:08:24)

7. AirTags Used In Armed Home Invasion (00:10:49)

937 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play