TLP - The Digital Forensics Podcast cover art

TLP - The Digital Forensics Podcast

TLP - The Digital Forensics Podcast

Written by: Clint Marsden
Listen for free

About this listen

Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast.

In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn about new attack chains.

© 2025 TLP - The Digital Forensics Podcast
Episodes
  • Episode 24: Voice AI Under Attack: Hackers Exploit AI Call Agents | Traffic Light Protocol Podcast
    Sep 16 2025

    Send us a text

    Voice AI is moving fast — but so are the attackers.

    In this episode of the Traffic Light Protocol Podcast, Clint and Myles break down how scammers are exploiting Voice AI platforms with the same tricks that wrecked email and telecom decades ago:

    • Premium-rate fraud dressed up in AI clothing
    • Bot-driven spam that floods calendars and burns ops teams
    • Consent loopholes where “user input” becomes an attacker’s best weapon

    This isn’t FUD. It’s happening right now, and the industry risks walking into the same “secure it later” trap we’ve seen before.

    We dig into why this matters for anyone deploying AI into customer-facing systems, what patterns connect it to broader cybercrime trends, and the hard questions leaders should be asking before they put an AI agent on the phone network.

    If you care about AI, fraud, and the future of secure automation then this one’s for you.

    Join the AI Cyber Security Skool Group
    Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.
    https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea

    Show More Show Less
    55 mins
  • Episode 23:AI Voice Agent Security: Voice AI Under Siege: SIP Spoofing, Cost Drain, and How to Fight Back
    Sep 5 2025

    Send us a text

    In this episode of Traffic Light Protocol, we kick off our AI series with a hard look at how voice AI agents are being targeted; and how fast small businesses and startups can rack up serious bills overnight.

    Guest Myles Agnew returns to unpack how old-school telecom tricks are being repurposed in the age of SIP/VoIP and AI: caller ID spoofing, open SIP trunks, and automated call loops that tie up your agents and quietly burn cash. We break down how easy it is to spin up a low-cost PABX, why authentication is weak in SIP land, and what practical controls you can turn on today to reduce fraud and noise.

    What we cover:

    • How SIP (Session Initiation Protocol) is abused to hit voice AI agents
    • Why caller ID “verification” often isn’t verification at all
    • The $5–$10/month attacker vs. your $/minute billing problem
    • Channels/lines, trunk limits, and how attackers amplify cost
    • Geo-fencing, call gating, and rate limits that actually help
    • “Stop loss” ideas for web and voice agents
    • How provider security maturity (and defaults) drives your risk
    • Where laws and policies are heading (AU, US) and what to watch

    If you’re building or buying voice AI, this is a must-listen before you scale.

    Free course (limited time): The AI Cybersecurity Starter Pack


    Get practical checklists, templates (incident response, HIPAA/GDPR/APPs), and step-by-step hardening for AI apps and AI voice agents.

    Join the Skool community and learn how to protect your voice AI from abuse.

    https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea

    Join the AI Cyber Security Skool Group
    Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.
    https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea

    Show More Show Less
    34 mins
  • Episode 22:AI Chat Forensics: How to Find, Investigate, and Analyse Evidence from ChatGPT, Claude & Gemini
    Jun 22 2025

    Send us a text

    Unlock the secrets behind digital forensic investigations into AI chat platforms like ChatGPT, Claude, and Google's Gemini in this insightful episode. Learn the precise methods for discovering, extracting, and interpreting digital evidence across Windows, Mac, and Linux environments, whether it's browser caches, memory forensics, network logs, or cloud-based data exports.

    From identifying subtle signs of malicious AI usage and attempts to evade security controls, to piecing together forensic timelines, this podcast provides practical, hands-on guidance tailored for cybersecurity professionals, forensic analysts, and IT investigators. Tune in now and boost your expertise in this emerging field of AI-driven digital forensics.

    You'll learn:

    AI Chat Evidence Locations
    Discover exactly where to find critical forensic evidence from ChatGPT, Claude, and Gemini across Windows, Mac, and Linux systems.

    Extracting and Analyzing Chat Data
    Learn practical techniques to extract, review, and interpret digital artifacts, including browser caches, local storage, memory dumps, and network logs.

    Identifying AI Jailbreaking and Misuse
    Understand how to spot attempts to bypass AI guardrails and recognize malicious prompts or suspicious activity within chat logs.

    Cloud vs Local Forensic Challenges
    Explore unique challenges associated with investigating cloud-based AI platforms versus local installations, and how to overcome them.

    Building Effective Forensic Timelines
    Master the art of assembling comprehensive forensic timelines by integrating timestamps, metadata, network traffic, and other key sources of digital evidence.


    Links and references

    https://help.openai.com/en/articles/7260999-how-do-i-export-my-chatgpt-history-and-data

    https://pvieito.com/2024/07/chatgpt-unprotected-conversations

    https://www.scribd.com/document/818273058/Conversational-AI-forensics#:~:text=of%20Gemini%20are%20stored%20in,based%20mobile%20app

    https://ar5iv.labs.arxiv.org/html/2505.23938v1#:~:text=source%20for%20corroborating%20evidence,of%20the%20NationalSecureBank%20phishing%20email

    aletheia.medium.com

    Join the AI Cyber Security Skool Group
    Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.
    https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea

    Show More Show Less
    42 mins
No reviews yet