ID - 4 Univ of Idaho Students Murdered - Bryan Kohberger Arrested - Moscow # 65

Status
Not open for further replies.
How do we know he did not purchase anything?

That's what the person at the drive-through said. Perhaps that's not enough for some to call it knowledge. However, the pings show him there and they have supplied their video to LE, so I would assume they know what's on their video and that every worker at that place has looked at the video and marveled that he was there.

He went into Albertson's, where he was caught on camera in various aisles and at the check-out. Next step would be Albertson's locating the receipt from the cash register for the timestamp at which he passed through it. So LE knows what he did purchase there.
 
Yeah - i thought i was the other way around. if my cell was constantly doing that it would go flat. So it's the router that is sending packets out constantly to devices near by. Most consumer routers have those alerts turned off but your isp collects that data.
I'm not sure my ISP would have the resources or incentive to log the IP or MAC address of every cell phone that ever passes within range of my router without connecting and to store that information long-term. I, alone, live near a large apartment complex. I have no doubt that in an average day over 1000 cell phones pass within range of my mesh network. And I'm just one of literally millions of people using my ISP.

Like I said, I don't even see what incentive an ISP would have to collect such useless information, but I suppose anything's possible.
 
Agree -- it's especially challenging when department's ask or require first year students to TA or teach if they don't have experience. Luckily I had teaching experience when I began my PhD, but there were a lot of rough moments even with some experience. You're absolutely right and, IMO, BK was probably struggling with his perceived self image in response to how poorly TAing was going (at least according to some of his unsatisfied students).

Also, was BK's MA online? Or at least partially online? I wonder if he was having a difficult time adjusting to in person classes and socializing, especially at the PhD level. We know from some of his peers that he made comments that bothered them.

It was mostly online, during COVID. He was in a BA/MA co-terminal program, subsequent to gaining an AA in psychology at a community college, so it would have been about 2.5-3 years (probably 2.5). His course with Dr Ramsland was apparently in person, though. IMO.

The prof who wrote his doctoral recommendation had never met him.

His Anti-LGBQT statements would put him in the doghouse for a lot of educated people from the Pacific NW. Just saying.


(It's in the second half of that article about the LGBQT statements and it's in other MSM as well - it was said in the classroom, a graduate classroom in a behavioral science in 2022).
 
MOD NOTE:

We are aware of the article released today that focuses on the "incel complex". The discussion topic remains off-limits until/unless @Sillybilly states otherwise. Please do not post the link to the article or discuss its content.

ADMIN NOTE:

Move on from the incel discussion folks. It is strictly speculation not based on any known fact and other members and guests don't come here to read the same discussion/debate over and over again.

Thank you.
 
I'm not sure my ISP would have the resources or incentive to log the IP or MAC address of every cell phone that ever passes within range of my router without connecting and to store that information long-term. I, alone, live near a large apartment complex. I have no doubt that in an average day over 1000 cell phones pass within range of my mesh network. And I'm just one of literally millions of people using my ISP.

Like I said, I don't even see what incentive an ISP would have to collect such useless information, but I suppose anything's possible.

It won't, not unless someone tries to join your network. Then it will.

It's stored in the router, not at your ISP, is my understanding. We could use an expert. LE certainly has them. Most of what I know is coming from LEO's and college IT security people I know. It's not useless. If we didn't have that capacity, Bad Guys would be hacking into routers with impunity. You can go google just how many people never change the manufacturer's default name and password.

I am passing this info on because I think everyone should know that their router will record any stranger attempts to pass through your network. At least, modern routers will. I don't know for how long, but it shouldn't be a whole heckuva a lot of people.

It's very useful for catching pedophiles and child pornographers, btw.

A guy who was using a hospital based network (but parked near our house which backed onto the hospital) was captured in just this way. It was his proximity to a school that caused more than one person to call him into local PD as a possible nuisance (there every afternoon). He was using the hospital connection to upload child *advertiser censored* (not made at the school, and no pictures of local children were found). They identified him by his device number, stored in the hospital's system via router. He had not, apparently, tried to use our network, thankfully.

Apparently big institutions pay attention to traffic that is directed toward the dark web (although I don't think the provisions in place are able to keep up with the way that perps find to get around them).

SG's statements in this case state that LE told him that the girls' router was "touched" by BK's phone. That's the main point (not passing through, just "touching"). And I believe SG is accurate and I believe LE would have looked at that. For sure.


//Routers constantly broadcast something called a beacon frame, which is a transmission that contains information about the network. It includes the SSID and is meant to announce that this network exists.//

(From that article - so everyone can ponder how much they want the world to know about their own router). Emphasis is not mine, it's in the article. You can use this term to look up how it works. Here's the first result:

 
Well spotted!

@Sjöberg Maybe HVAC guy is just there to maintain heating level for purposes of preserving biological forensic evidence at the scene, for further investigation?
Possibly, but in November in Idaho, wouldn't that just be shutting off the thermostat? Generally when people rent an entire house (not an apartment that is within the house), they are responsible for all utilities as opposed to it being "utilities included". If this is in fact the case, they would have control of the thermostat. I have said over and over that I think there is something more to the HVAC van being there. Could it be nothing? Sure. But IMO, the HAVAC specialist was needed for something more. MOO
 
That's what the person at the drive-through said. Perhaps that's not enough for some to call it knowledge. However, the pings show him there and they have supplied their video to LE, so I would assume they know what's on their video and that every worker at that place has looked at the video and marveled that he was there.

He went into Albertson's, where he was caught on camera in various aisles and at the check-out. Next step would be Albertson's locating the receipt from the cash register for the timestamp at which he passed through it. So LE knows what he did purchase there.
Thank you. I’d only read that he went through the drive thru and assumed he ordered coffee, never saw any statement that he didn’t.
 
I'm not sure my ISP would have the resources or incentive to log the IP or MAC address of every cell phone that ever passes within range of my router without connecting and to store that information long-term. I, alone, live near a large apartment complex. I have no doubt that in an average day over 1000 cell phones pass within range of my mesh network. And I'm just one of literally millions of people using my ISP.

Like I said, I don't even see what incentive an ISP would have to collect such useless information, but I suppose anything's possible.
That's what I was thinking. Modems log IP addresses, not phone #. So perhaps Mr. G had BK's IP addy? Also, can you imagine the modem log from a party of 150 attendees?! I use a Linksys modem. It says it's "router can only store up to 200 Kb of log information. Once it reaches this limit, the older logs will be replaced by new entries". Example:

1673821685701.png

 
How do we know he did not purchase anything?
After the Affidavit’s release, where it talks about his car being on surveillance video Pages 16/17 driving past the coffee place a local newspaper interviewed an employee:


The white Elantra was also seen in the parking lot of the Chef’s Store at 820 Port Drive and passing by Kate’s Cup of Joe, which is on the same street. An employee at the coffee stand said the car was spotted in the drive-through, but the driver did not stop and order anything.
 
It won't, not unless someone tries to join your network. Then it will.

It's stored in the router, not at your ISP, is my understanding. We could use an expert. LE certainly has them. Most of what I know is coming from LEO's and college IT security people I know. It's not useless. If we didn't have that capacity, Bad Guys would be hacking into routers with impunity. You can go google just how many people never change the manufacturer's default name and password.

I am passing this info on because I think everyone should know that their router will record any stranger attempts to pass through your network. At least, modern routers will. I don't know for how long, but it shouldn't be a whole heckuva a lot of people.

It's very useful for catching pedophiles and child pornographers, btw.

A guy who was using a hospital based network (but parked near our house which backed onto the hospital) was captured in just this way. It was his proximity to a school that caused more than one person to call him into local PD as a possible nuisance (there every afternoon). He was using the hospital connection to upload child *advertiser censored* (not made at the school, and no pictures of local children were found). They identified him by his device number, stored in the hospital's system via router. He had not, apparently, tried to use our network, thankfully.

Apparently big institutions pay attention to traffic that is directed toward the dark web (although I don't think the provisions in place are able to keep up with the way that perps find to get around them).

SG's statements in this case state that LE told him that the girls' router was "touched" by BK's phone. That's the main point (not passing through, just "touching"). And I believe SG is accurate and I believe LE would have looked at that. For sure.


//Routers constantly broadcast something called a beacon frame, which is a transmission that contains information about the network. It includes the SSID and is meant to announce that this network exists.//

(From that article - so everyone can ponder how much they want the world to know about their own router). Emphasis is not mine, it's in the article. You can use this term to look up how it works. Here's the first result:

After someone asked what SG was talking about when he said that BK's phone "touched" their wifi" I myself posted the proposition that routers do, or at least could be set to, log that data. After I posted that, someone asked me if I know of any routers that actually do this.

That led me on a mission of discovery. First, I checked all my own router logs. They definitely record any attempts to log in, but there is nothing about all the phones that pass within range but never try. Then I set about trying to find if there is a setting to enable such a thing. There is not. Then I started searching the internet for information on the subject. I was never able to find any model of consumer modem/router that has that capability.

I welcome others to try. :)
 
Last edited:
After someone asked what SG was talking about when he said that BK's phone "touched" their wifi" I myself posted the proposition that routers do, or at least could be set to, log that data. After I posted that, someone asked me if I know of any routers that actually do this.

That led me on a mission of discovery. First, I checked all my own router logs. They definitely record any attempts to log in, but there is nothing about all the phones that pass within range but never try. Then I set about trying to find if there is a setting to enable such a thing. There is not. Then I started searching the internet for information on the subject. I was never able to find any model of consumer modem that has that capability.

I welcome others to try. :)

I'm not sure an ordinary citizen can do it, frankly.

The topic would be "beacon scanning," I believe. Consumer features in routers are not the same, IME, as FBI investigations into what a router actually "knows."

Also, keep in mind that FBI/LE has the other component of this equation in its grasp (BK's actual phone records). I have no clue what his phone might be or what it stores. Just that I believe SG.

I do know that there's technical software available to make sense of who has 'touched' a beacon frame (it looks like it takes about 3 book chapters to explain it);

 
From the affidavit;

At approximately 12:36 p.m., the 8458 Phone utilized cellular resources that would provide coverage to Kate's Cup of Joe coffee stand located at 810 Port Drive, Clarkston, WA. Surveillance footage from the US Chef’s Store located at 820 Port Drive, Clarkston, WA and adjacent to Kate’s Cup of Joe showed a white Elantra, consistent with Suspect Vehicle 1, drive past Kate’s Cup of Joe at a time consistent with the cellular data at the 8458 Phone.

 
Maybe consider this when we wonder how BK might have incapacitated the victims. BK was a boxer. Could he have slugged them first and knocked them out or rendered them helpless? If it was immediately before the deed, it would not develop into a bruise once heart stopped pumping blood. Just a thought
They were most likely asleep (most of them, anyway). Perhaps he used chlorofom to incapacitate them.
 
After someone asked what SG was talking about when he said that BK's phone "touched" their wifi" I myself posted the proposition that routers do, or at least could be set to, log that data. After I posted that, someone asked me if I know of any routers that actually do this.

That led me on a mission of discovery. First, I checked all my own router logs. They definitely record any attempts to log in, but there is nothing about all the phones that pass within range but never try. Then I set about trying to find if there is a setting to enable such a thing. There is not. Then I started searching the internet for information on the subject. I was never able to find any model of consumer modem that has that capability.

I welcome others to try. :)
I will trust your judgment..LOL
Sometimes I need to get into my router settings after losing internet access. Sometimes, it requires a call to my ISP due to a crazy password. So, I will pass.
 
I'm not sure an ordinary citizen can do it, frankly.

The topic would be "beacon scanning," I believe. Consumer features in routers are not the same, IME, as FBI investigations into what a router actually "knows."

Also, keep in mind that FBI/LE has the other component of this equation in its grasp (BK's actual phone records). I have no clue what his phone might be or what it stores. Just that I believe SG.

I do know that there's technical software available to make sense of who has 'touched' a beacon frame (it looks like it takes about 3 book chapters to explain it);

But how does SG know about this? Who told him? LE has a gag order.

I know SG has picked up stuff from SM then repeated it as fact, so I'm little skeptical.

This isn't in the PCA

How would SG have access to the router? Did he own it?
 
From the affidavit;

At approximately 12:36 p.m., the 8458 Phone utilized cellular resources that would provide coverage to Kate's Cup of Joe coffee stand located at 810 Port Drive, Clarkston, WA. Surveillance footage from the US Chef’s Store located at 820 Port Drive, Clarkston, WA and adjacent to Kate’s Cup of Joe showed a white Elantra, consistent with Suspect Vehicle 1, drive past Kate’s Cup of Joe at a time consistent with the cellular data at the 8458 Phone.

Why didn't he get a coffee?

Where did he go next, the Snake River? Seems fairly close.
 
Status
Not open for further replies.

Staff online

Members online

Online statistics

Members online
102
Guests online
3,892
Total visitors
3,994

Forum statistics

Threads
592,905
Messages
17,977,206
Members
228,940
Latest member
Kaleyilene01
Back
Top