The Bert Show — Vault: The Terrifying Truth About What Hackers Can Do To Your Phone
Episode Date: April 13, 2026
Episode Overview
This episode explores the alarming ways hackers and stalkers can compromise your phone, exposing your privacy in ways most people have never imagined. The Bert Show team, joined by callers and IT experts, dives into real stories and news segments demonstrating the ease with which malicious actors can hack into phones — listening in, tracking locations, stealing data, and even hijacking devices while they’re turned off. The tone oscillates between disbelief, shock, and practical paranoia as the hosts process just how vulnerable our everyday devices make us.
Key Discussion Points & Insights
Introduction to the Issue
- Originates from a listener, Nikki, who was stalked online and sought tech-savvy help to retaliate (01:02).
- Conversation turns to all the methods hackers have for tracking people and breaking into their digital lives.
The Power and Vulnerability of Modern Smartphones
- IT expert surprises the cast:
“If I had access to either the email account or just got your attention on that phone for one minute, we can enable the phone to transmit anything you're saying, whether the phone is turned on and talking or just sitting on the desk ... We can track your GPS location, we can actually make it make calls for us and use your phone bills to pay for really anything that we want.” (01:27, IT Expert)
- The implication: Almost anyone with some technical know-how can exploit Bluetooth, internet, or weak digital safeguards to completely compromise a device.
Real-Life “Hacked” Scenarios
- Listener references viral stories about hackers controlling phones remotely — turning them on/off, hijacking webcams, and recording conversations (02:22, Caller/Listener).
- Chilling moment:
“...the hacker guy that she recruited ... was able to turn on dude's webcam, take a picture of him and take a picture.” (02:30, Caller/Listener)
- Cast responds with disbelief:
"Whoa." (02:57, Host 1)
"That's so creepy." (02:58, IT Expert)
Investigation Report—The NBC “Kuykendall” Case
- News segment details how one family, the Kuykendalls, endured months of threats and stalking after hackers took over their cell phones:
- “After four months of harassing phone calls, Heather and Courtney Kuykendall were afraid to answer their cell phones ... The graphic violent threats came at all hours, forcing the family to change their cell phone numbers. But even that didn't work.” (03:10–03:29, Narrator/Reporter)
- Hackers taunt victims with calls, voicemails using their own recordings, and threats announcing physical surveillance.
- Notable quote from stalker:
“You are so dead ... I will kill you. They said they were going to rape her.” (03:17, 03:29, IT Expert voice)
Spy Technology is Readily Available
- Reporter demonstrates installing spyware on a producer’s phone with consent:
- As the producer (Cindy) makes calls at home, the reporter listens in remotely.
“I'm outside on my cell phone listening to the whole conversation.” (05:22, Narrator/Reporter)
- Receives texts every time the phone is in use; can see all text messages, call logs, and tracks the exact location (05:36–05:38, Narrator/Reporter).
- Even when the phone is just lying idle, the reporter activates the mic from miles away:
“I can hear their conversation even though I'm four miles away ... I'm eavesdropping on them from the city's north side and I can hear every word.” (06:36–06:43, Narrator/Reporter)
What Experts Say
- Former intelligence officer warns:
“I think a lot of people think their cell phone calls are very secure. Our privacy isn't always what we think it is.” (04:47, Rick Mislen)
- Private investigator confirms:
“The technology is there. It's been there for a long time. It's accessible, it's done all the time.” (07:01, Private Investigator)
- Most clients are either trying to bug someone or worried about being bugged (07:17).
Takeaways and Advice
- True privacy is difficult, almost impossible to guarantee.
- Only real “offline” safety: Turn your phone off and remove the battery (07:27, 08:06).
- Host reacts:
“Take out the battery? You got to be that paranoid about it.” (08:06, Host 2)
- Listeners joke about the paradox of charging phones at night, realizing hackers could listen to everything in their bedrooms (08:19–08:23).
Notable Quotes & Memorable Moments
-
On Total Monitoring:
“We can enable the phone to transmit anything you're saying, whether the phone is turned on ... or just sitting on the desk ... we can track your GPS location ... make it make calls for us ... and use your phone bills ...”
— IT Expert (01:27)
-
On the Inescapability of Hacking:
“Your privacy isn't your privacy. It is exposed. It is exploited.”
— Security expert in news segment (07:27)
-
On Paranoia and Practicality:
“Take out the battery? You got to be that paranoid about it.”
— Host 2 (08:06)
-
Host Humor amidst Anxiety:
“Boom. So if somebody could call up and listen to everything going on in your bedroom. Hello. Oh, boy. Good morning.”
— Caller/Listener (08:23)
“Squeaky, squeaky, squeaky, squeaky.”
— Host 1 (08:30), joking about what hackers might hear at night
Important Timestamps
- 01:02 — Introduction to Nikki’s stalking story and segue to hacking discussion
- 01:27 — IT expert outlines terrifying phone hacking capabilities
- 02:22–02:30 — Listener and hosts react to the idea of hackers turning devices on remotely
- 03:10–04:01 — NBC’s “Kuykendall” hacking victim news segment
- 05:10–06:11 — Demonstration of remote spyware on a phone, listening in and tracking live
- 07:01–07:27 — PI and news experts confirm prevalence; advice for protection
- 08:06–08:30 — Hosts debate paranoia vs. safety, riff on the new, awkward reality
Summary
This episode delivers a gripping, sometimes unnerving look at the reality of cell phone vulnerability. Through firsthand stories, expert testimony, and chilling real-world news, The Bert Show vividly exposes how easily outsiders can hijack the devices most people consider essential and personal. The message: if you're connected, you're exposed, and modern privacy takes a lot more vigilance than anyone expects.