By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    AML & KYC: Addressing Key Challenges for 2023 and Beyond
    20 March 2023
    News Roundup: Confidence in AML Lags, but So Do Budgets
    28 April 2024
    Tax Nexus, Reciprocity & More: Navigating Multistate Payroll Tax Withholding Compliance
    6 November 2024
    Latest News
    How 2025 Redefined Telemarketing Compliance
    1 December 2025
    Advice for the AI Boom: Use the Tools, Not Too Much, Stay in Charge
    25 November 2025
    Strange Bedfellows: How a Supreme Court Ruling Found Its Perfect Match in the Trump Administration
    19 November 2025
    Where in the Loop? Testing AI Across 120 Compliance Tasks to Find Out Where Humans Are Most Needed
    13 November 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks
    17 March 2023
    2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks
    23 March 2023
    Smart Mobility has a Blindspot When it Comes to API Security
    29 March 2023
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    ‘Quordle’ today: See each ‘Quordle’ answer and hints for April 15
    15 April 2023
    Soundcore’s Already Affordable Headphones Cost Even Less at Amazon Today
    24 April 2023
    Best MagSafe chargers 2023: the top magnetic chargers for your iPhone
    3 May 2023
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Neil Young begrudgingly returns to Spotify
    13 March 2024
    White House will ‘wait and see’ on Iran response after Israel attack
    14 April 2024
    US Supreme Court rejects challenge to top consumer finance agency
    16 May 2024
    Latest News
    AI labs like Meta, Deepseek, and Xai earned worst grades possible on an existential safety index
    6 December 2025
    Visa is moving its European headquarters to London’s Canary Wharf, FT reports
    5 December 2025
    Client Challenge
    4 December 2025
    Binance names cofounder Yi He as new co-CEO
    3 December 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Consumer Security. What Is ChatGPT? Burton Kelso, The Technology Expert.
    11 April 2023
    Stream episode Cybercrime Wire For Apr. 19, 2023. School District Left Teachers in the Dark. WCYB Digital Radio. by Cybercrime Magazine podcast
    20 April 2023
    Cybercrime News For Apr. 26, 2023. Truman State University Suffers Cyberattack. WCYB Digital Radio
    28 April 2023
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: Las Vegas police release ChatGPT logs from the suspect in the Cybertruck explosion
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Technology > Las Vegas police release ChatGPT logs from the suspect in the Cybertruck explosion
Technology

Las Vegas police release ChatGPT logs from the suspect in the Cybertruck explosion

webmaster
Last updated: 2025/01/08 at 10:09 AM
webmaster
Share
3 Min Read
SHARE

They confirmed that the suspect, an active duty soldier in the US Army named Matthew Livelsberger, had a “possible manifesto” saved on his phone, in addition to an email to a podcaster and other letters. They also showed video evidence of him preparing for the explosion by pouring fuel onto the truck while stopped before driving to the hotel. He’d also kept a log of supposed surveillance, although the officials said he did not have a criminal record and was not being surveilled or investigated.

The Las Vegas Metro Police also released several slides showing questions he’d posed to ChatGPT several days before the explosion, asking about explosives, how to detonate them, and how to detonate them with a gunshot, as well as information about where to buy guns, explosive material, and fireworks legally along his route.

Asked about the queries, OpenAI spokesperson Liz Bourgeois said:

We are saddened by this incident and committed to seeing AI tools used responsibly. Our models are designed to refuse harmful instructions and minimize harmful content. In this case, ChatGPT responded with information already publicly available on the internet and provided warnings against harmful or illegal activities. We’re working with law enforcement to support their investigation.

The officials say they are still examining possible sources for the explosion, described as a deflagration that traveled rather slowly as opposed to a high explosives detonation that would’ve moved faster and caused more damage. While investigators say they haven’t ruled out other possibilities like an electrical short yet, an explanation that matches some of the queries and the available evidence is that the muzzle flash of a gunshot ignited fuel vapor/fireworks fuses inside the truck, which then caused a larger explosion of fireworks and other explosive materials.

Trying the queries in ChatGPT today still works, however, the information he requested doesn’t appear to be restricted and could be obtained by most search methods. Still, the suspect’s use of a generative AI tool and the investigators’ ability to track those requests and present them as evidence take questions about AI chatbot guardrails, safety, and privacy out of the hypothetical realm and into our reality.

You Might Also Like

Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog

Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog

Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog

postMessaged and Compromised | MSRC Blog

Microsoft Bounty Program year in review: $17 million in rewards | MSRC Blog

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article Uncover the risks associated with Google’s Willow
Next Article Microsoft 365 Copilot Generated Images Accessible Without Authentication — Fixed! · Embrace The Red
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 6 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 6 December 2025
Ways to Tell if a Website Is Fake
network vulnerability 6 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 6 December 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?