Skip to main content

Zimmerman trial interrupted by comical barrage of Skype callers

zimmerman-skype-callers
Image used with permission by copyright holder

Detailed by CBS News yesterday, the George Zimmerman murder trial was disrupted on Wednesday when several Internet pranksters tried to Skype call Rich Mantei, the prosecutor of the case. At the time, a former criminal justice professor that taught Zimmerman, Gordon Scott Pleasants, was giving video testimony over Skype. It was extremely easy to get both Skype usernames since national news networks were broadcasting live coverage of the trial and the attorneys left both Skype names visible on the television screen rather than using full screen video mode to hide all contact information. 

skype-optionsPleasants, who clearly started to get a smile on his face when the onslaught of on-screen notifications popped up on his computer monitor, immediately figured out what was going on. Defense attorney Mark O’Mara also quickly figured it out and told the judge “There’s now a really good chance that we’re being toyed with.”

Recommended Videos

All the notifications on the courtroom’s end were popping up all over the television screen, thus hiding the face of Pleasants while he was attempting to provide testimony. The attorneys scrambled to close the Skype notifications while the exasperated judge requested another form of communication for the testimony.

If the attorneys had taken a couple minutes to familiarize themselves with the Skype settings prior to the start of the testimony, they would have found an option to limit calls from people in their Contact list only in addition to options for turning off all notifications as well as muting all sounds played by the notifications. In fact, they didn’t even need the audio on the computer turned on since Pleasants was communicating over a regular phone. 

Regarding alternatives to Skype, going with a Google+ hangout for the video feed could have avoided this issue. It’s definitely clear that the Zimmerman case will be used as an example of what not to do in the future when video chatting tools like Skype are combined with a national audience of television viewers.

Topics
Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more