no one made it look like CPH called MG, CPH has already admitted to the calls in a typed up and signed letter to 48 hrs, we also have the police saying they have record of the calls.
How do we know this for sure? 48 Hours never offered any information in the programs as to how they authenticated the letter's provenance or how they authenticated the doctor's signature. I have written 48 Hours asking them for details on what method/process they used to authenticate the letters and signature but, have not heard back from them yet. Furthermore, 48 Hours did not elaborate on How they received the letter. Was it received via fax, conventional mail, email, hand delivery, messenger service etc.?
In regards to Commissioner Dormer's confirmation that the doctor made a call to Mari Gilbert, his quote was, yeah our information is that he did. He did not elaborate on the details of the call or on what information he had.
http://www.cbsnews.com/2100-18559_162-20078763.html?pageNum=2
Aside from breaking into CPH's house and making that first phone call, the rehab call, there isn't any real possibility of someone synthesizing that phone call and having it come up in two different peoples phone records.
There are a number of ways this could have been accomplished If the perp did indeed fake the calls and forge a letter with the doctor's signature without physically breaking into the doctor's house. Yes, it involves hacking/cracking into the doctors computer system, cell phone and land-line.
For Example, could the perp have done any of the following:
1. Physically hacked into the doctor's land-line? All the perp would need to exploit landlines are a yellow hat (to blend in), 2 alligator clips connected to the correct wires, a cheap plastic phone and maybe directions from the internet on how to phreak landlines. The perp makes the call while connected to the doctor's line and said call is reflected on the phone bill.
http://www.phonelosers.org/article/recording_telephone_calls/
2. Could the perp have hacked/cracked into the doctor's cell-phone? Here are some links into the Possible methods the perp Might have used If he hacked/cracked into the doctor's cell-phone to make any of the calls. There is also information about Caller ID Spoofing in these links:
http://www.wired.com/wired/archive/12.12/phreakers.html
http://www.itworld.com/security/181313/how-hack-cell-phone-voice-mail-better-news-world
http://www.pbs.org/wnet/nee-to-know/culture/just-how-easy-is-phone-hacking/10407
This link includes information on how landlines can be remotely hacked:
http://inspirachel.com/bluetooth/how-to-hack-mobile-phones-with-bluetooth-link-included/
3. If the perp hacked into the doctor's cell-phone this conceivably would give the perp access to his email as well. Perhaps the doctor keeps an electronic signature handy within his email? The perp could then create a document such as a letter and send that letter via email or fax.
4. What if the perp gained remote access to the doctor's desktop computer to send a letter to 48 Hours? How could the perp have accomplished that? There are a few ways:
Maybe the perp took a "man in the middle" attack/arp spoofing- like when you went to your local coffee shop and checked your bank account, but didn't notice the SSL cert was changed?
Maybe the perp attacked the web browser with malicious script that runs in the browser and then delivers a payload?
Maybe the perp simply guessed the password to the doctor's WI-fi?
Maybe the perp noticed the doctor didn't change the factory user name and password of his WI-fi router, looked up the router's manufacturer information online and found the corresponding user name and password also available online?
Maybe the perp installed a back door program on the doctor's computer, such as a root-kit, virus, Trojan etc.? There are a lot of scripts available on the internet to accomplish this task but the more sophisticated hacker/crackers make their own viruses, Trojans etc. using C++ or C#. This would give the perp unlimited access to the doctor's computer. He could send any correspondence, document etc. via fax and or/email. The perp could do this from anywhere. This would also mean that the perp need not break into the doctor's house to send a forged letter although that is possible.
How could the perp have avoided detection If he did hack into the doctor's computer? Again, there are a few ways:
Maybe he used a root-kit to hide the program to normal diagnostic tools?
Maybe the perp wiped the system logs on the local system?
Maybe the perp ran the tools directly in memory?
Maybe the perp killed any anti-virus software installed on the computer? This can be done in such a way as to make it appear that the anti-virus software is still available and functional.
5. Finally, yes the perp would need to use proxy servers and/or a free down loadable program to render his digital identity untraceable. That is, of course, If he did any of the above at all.
And if people don't think that first phone call was indeed made from CPH's land line, you should know that BH is claiming that flukeyou breaks into peoples houses in oak beach and uses their phone....holy denial!!!! That statement tells me she knows the first phone call was indeed made from her house, but is understandably in deep denial.
Who is BH and how could anybody possibly confirm the identity of flukeyou?
I am not quite sure if I understand what you mean in that last portion quoted.