Here are my thoughts on this afternoon's testimony, which is the first of the trial that I have listened to.
- I think it's safe to assume that there won't be smoking gun evidence on the computers or elsewhere to prove that he spoofed the call. The prosecution kind of tossed out a grab bag of possible ways that it could be done, much of which would probably be overwhelming for non-technical jurors. If they have definite evidence that proves that he spoofed the call, then they know how he did it and they [hopefully] would have limited the testimony to that one way instead of opening the fire hose on the jurors.
- It was puzzling why they discussed some of the options when, from what I've heard of other testimony, those options are impossible. And I also don't know why the defense didn't point that out in cross. E.g., they were discussing things like click-to-call, telnet, and various other things being done from his Blackjack. If any of those were done, there would be data access at 6:40 in the AT&T logs. It is my understanding that there were no data calls at that time, but that is just what I've read here. So, it seems that you can toss out all of the possibilities that require data access from the Blackjack at the time of the possibly spoofed calls.
- The discussion about the wireless VoIP phones seemed like a red herring too. The prosecution was careful in the way that he asked the question. He asked if those phones could be used "remotely" and Paul said "yes". But, he didn't ask anything about distance. The maximum range for 802.11g is measured in hundreds of feet, not miles. If the access point were outside and the phone outside, the best case distance is probably around 300ft. With the AP inside and the phone outside, less that that. Probably 150-200ft. So, Brad would have had to be within a football field distance from home to have used those phones to do it. Again, I don't know why the defense didn't point that out unless they are saving that kind of ammo for later or something.
- The voicemail stuff actually became less suspicious for me. When they started down that path and were talking about individual keys pressed, etc, I thought we were about to get something meaty. Like he wasn't really checking voicemail but was instead using some other fancy features of the system. But, when all was said and done, the keys pressed show that he was just checking and deleting voicemail and sending himself a test message.
Of course the 6 voicmail calls in 20 mins and the fact that he was doing it at that hour is suspicious in and of itself, but I was just surprised to find that as far as the Cisco access at least, he was in fact checking voicemail.