Stephan Sterns' defense claims it has 'confidential information; wants to delay upcoming court hearing
The Brief
Stephan Sterns, accused of raping and murdering 13-year-old Madeline Soto, is seeking to delay a scheduled suppression hearing, citing newly obtained "confidential information," according to court records.
The defense hopes to prevent jurors from seeing evidence from Sterns' phone and Google account, which they claim was unlawfully obtained, though prosecutors argue he gave consent.
A hearing to determine whether the delay will be granted is set for Tuesday.
ORLANDO, Fla. - Stephan Sterns, the man accused of sexually assaulting and killing 13-year-old Madeline Soto, is asking a judge to delay his upcoming court hearing due to "confidential information" his attorneys have recently obtained, according to new court records.
The defense claims they will not have time to prepare for an upcoming court appearing, citing the newly-obtained information, a recently-filed motion reads. State prosecutors have objected to the potential delay.
What we know
The suppression hearing scheduled for Wednesday comes after Sterns' public defender asked a judge to bar jurors from seeing the evidence collected from Sterns' phone and Google account, due to investigators allegedly unlawfully seizing and searching his phone.
However, the prosecution claims that Sterns gave consent and the evidence from both the phone and Google account were properly obtained.
Now Sterns and his attorneys hope to delay the suppression hearing due to this new "confidential information" they have related to the case.
In a new motion seeking a delay, Sterns' attorney wrote:
"Since filing [the suppression motions in February], the Defense has come into possession of confidential information that may impact the presentation of evidence at that hearing."
"The Defense will not have time to develop this evidence before the currently scheduled Motion to Suppress scheduled for hearing on April 23, 2025."
"As such, Defense is requesting to continue these hearings to be reset for a later date."
Click to open this PDF in a new window.
A hearing has been scheduled for Tuesday to determine if Wednesday's suppression hearing will be delayed.
According to court records, the prosecution objects the delay.
What we don't know
No details have been provided by Sterns' attorney regarding the "confidential information."
Watch: Stephan Sterns 2-hour interrogation amid Madeline Soto disappearance
Madeline Soto update: Will the media, public be banned from Stephan Sterns' pretrial court hearings?
Maddie Soto update: Stephen Sterns jailhouse calls released
Judge denies Stephan Sterns' motion to ban the press, public from his pre-trial hearings
Stephan Sterns was the boyfriend of Jennifer Soto, Madeline's mother.
According to court documents and law enforcement, Sterns lived with Jennifer, Madeline, and another roommate on and off. He would sometimes take Madeline Soto to school and would also sometimes sleep in the same bed as Madeline and Jennifer, court records said.
In Feb. 2024, he reportedly took Madeline Soto to school while the girl's mother stayed back at the house. Hours later when Madeline's mom went to pick her up from school, she was told Madeline never made it to school that day.
Sterns is charged with first-degree murder in the death of the girl. He is also charged in a separate case with some 60 counts of sexual abuse and possession of child sexual abuse material after thousands of graphic photos, some including Maddie, were found on his cell phone and saved to a Google Drive account, court records said.
He has pleaded not guilty to those charges.
His trial on the first-degree murder charge is currently scheduled to begin on Sept. 22, 2025.
Madeline "Maddie" Soto was a 13-year-old girl who was reported missing on Feb. 26, 2024. Maddie had just celebrated her 13th birthday on February 22, days before she was reported missing.
Madeline was a student at Hunter's Creek Middle School in Orlando. Though, she lived with her mom, Sterns, and an adult roommate in Kissimmee.
Her body was found in a grassy area in Osceola County on March 1.
Sunday, Feb. 25: Madeline Soto's 13th birthday celebration
Monday, Feb. 26: Madeline Soto was last seen at 8:30 a.m., didn't make it to school
Tuesday, Feb. 27: Madeline Soto's missing poster was released, officials begin search
Tuesday night, Feb. 27: Madeline Soto's mom, Jenn Soto, speaks with FOX 35; would-be suspect appears in background
Wednesday afternoon, Feb. 28: Orange County Sheriff John Mina hosts press conference about ongoing search
Wednesday night, Feb. 28: Mom's boyfriend Stephan Sterns arrested on unrelated charges, named 'prime suspect' in Madeline Soto case
Thursday, Feb. 29: Kissimmee Police Department releases Stephan Sterns' arrest affidavit
Thursday, Feb. 29: Body language expert assesses Stephan Sterns' body language in Zoom interview with Jenn Soto
Friday morning, March 1: Stephan Sterns dodges questions from FOX 35 while being transferred from Orange County to Osceola County
Friday afternoon, March 1: Officials say they're 'confident' that Madeline Soto is dead
Friday afternoon, March 1: Multi-agency search for Madeline Soto near area where Stephen Sterns was last seen
Friday afternoon, March 1: Body found amid search for Madeline Soto
Saturday morning, March 2: Stephan Sterns waives first appearance in court
Wednesday, March 6: New court documents allege Stephan Sterns may have abused Madeline Soto years before her disappearance, death
Tuesday, March 12: State Attorney's Office files 60 additional charges against Stephan Sterns
Thursday, March 21: Kissimmee Police Chief holds press conference with updates about investigation
Wednesday, April 4: State Attorney Andrew Bain explains why more information has not been released into the Madeline Soto death investigation
Wednesday, April 4: FOX 35 obtained the 911 calls from the morning 13-year-old Madeline Soto went missing from Orange County
Saturday, April 15: Maddie Soto's family and community members gathered at a vigil Saturday to remember the 13-year-old who was found dead days after she was reported missing in February.
Wednesday, April 24: An Osceola County judge granted a motion to continue the pretrial for Stephan Sterns.
Wednesday, April 24: A new trial date has been set for Stephan Sterns after an Osceola County judge granted the defense's motion for more time during a pretrial hearing.
Thursday, April 25: Stephan Sterns has been charged with first-degree murder in the death of 13-year-old Florida girl Madeline Soto.
Monday, June 10: The State Attorney's Office intends to seek the death penalty against Stephan Sterns, the man accused of killing his girlfriend's daughter, 13-year-old Madeline "Maddie" Soto, according to court records – should he be convicted.
Wednesday, July 10: Attorneys for Stephan Sterns, who was charged for the murder of 13-year-old Madeline Soto, have filed motions to continue both trials.
Thursday, August 22: New police interviews with Stephan Sterns, Jennifer Soto from hours after teen went 'missing'
Friday, August 23: New documents obtained by FOX 35 this week show that the teen's mother may have known about that alleged abuse.
Monday, August 26: Madeline Soto's mom admits to knowing Stephan Sterns was 'grooming and abusing' her daughter, documents show.
Monday, August 26: New documents shed light on how Madeline Soto's body got to the rural location it was eventually found at, and, ultimately, how she died.
Monday, October 14: Trial date set for Stephan Sterns
Wednesday, October 23: Kissimmee police revealed new information in the ongoing investigation. Alleged killer Stephan Sterns secretly filmed naked roommate, officials say.
Friday, October 25: "I didn't start it" Those are the words Stephen Sterns told his parents in a recorded call from jail, audio which was released to FOX 35 Orlando.
Thursday, February 6: Stephan Sterns and his attorney file dozens of motions ahead of his murder trial set to begin in September. Asking to strike the death penalty and to have all physical restraint devices removed from Sterns during trial proceedings.
Wednesday, February 12: Stephan Sterns wants phone evidence tossed ahead of child sex crimes trial.
Wednesday, February 19: Stephan Sterns asks judge to ban public, press from court hearing.
Wednesday, February 26: Remembering the 13-year-old one year later; accused killer preps for trial.
Tuesday, March 4: New details released in the death of Madeline Soto, one year since the initial report
Wednesday, March 5: Watch: Stephan Sterns 2-hour interrogation amid Madeline Soto disappearance
Thursday, March 20: Madeline Soto update: Will the media, public be banned from Stephan Sterns' pretrial court hearings?
Friday, March 21: Maddie Soto update: Stephen Sterns jailhouse calls released
Thursday, March 27:Judge denies Stephan Sterns' motion to ban the press, public from his pre-trial hearings
The Source
The information in this article comes from the Orange County Sheriff's Office, the North Port Police Department, documents from the Orange County Clerk of Courts and Osceola County Clerk of Courts.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Los Angeles Times
an hour ago
- Los Angeles Times
Feds vow to continue immigration enforcement ‘every day in L.A.' Here are your rights
As the number of immigration raids has increased across Southern California over the last week, there are more questions than ever about how to handle an interaction with federal agents. Agents with Immigration and Customs Enforcement made arrests in the Garment District, specifically at Ambiance Apparel, where immigration authorities detained employees inside the clothing wholesaler, and other locations on Friday. Protests followed into the weekend, prompting the deployment of National Guard troops in downtown Los Angeles by the Trump administration. The raids are the latest in a string of high-profile immigration enforcement actions over the last week, part of President Trump's promised deportation crackdown. A few days ago, immigration agents raided a popular San Diego restaurant and made arrests, sparking a standoff with outraged residents. Agents also arrested Chinese and Taiwanese nationals at an underground nightclub in the Los Angeles area. Officials suggest many more raids are coming. 'I'm telling you what, we're going to keep enforcing law every day in L.A.,' Trum's 'border czar,' Tom Homan, told NBC News. 'Every day in L.A., we're going to enforce immigration law. I don't care if they like it or not.' Officials have not said how long the raids will last or described the larger operation. But in the deployment memo sending the National Guard to L.A., officials said 'the duration of duty shall be for 60 days or at the discretion of the Secretary of Defense. In addition, the Secretary of Defense may employ any other members of the regular Armed Forces as necessary to augment and support the protection of Federal functions and property in any number determined appropriate in his discretion.' Over the last few months, The Times has asked experts for guidance for employees and employers who find themselves in the cross-hairs. Here is a summary of what we found: If you're home alone or with family members and you hear a knock at the door, check the window, security camera or peephole so you can identify whether ICE agents are outside. When you find yourself in this situation, the first step is to keep your door closed and locked, advised advocacy groups and legal experts. You must open your door and allow agents inside your home if they present a valid search warrant. Advocates say agents must identify themselves and show you the warrant by putting it against the window or slipping it under your door. A valid warrant must be: This can be an overwhelming and scary situation. All those emotions are valid, said Pedro Trujillo, director of organizing for the Coalition for Humane Immigrant Rights. Take a moment to gather yourself, he suggests, because there isn't a time limit on the visit. If you need help verbalizing your rights, show the agent a Red Card that helps explain your rights. Red Cards can be downloaded from the website for the Immigration Legal Resource Center. By showing this card, you're affirming that you want to remain silent and wish to speak to a lawyer. The card states that the person ICE agents are inquiring about has the right to decline answering questions and signing or handing over documents based on their 5th Amendment rights under the U.S. Constitution. You can present this card to agents, whether it's a physical copy or a photo on your phone, by displaying it through the window. If ICE agents enter your home without consent, you have the right to say: 'I do not consent to this entry or search,' according to advocates. Don't physically resist. Instead, you have the right to document what happens, including: After agents have left, you have the right to reach out to and consult with a legal representative. You have the right to remain silent. For example, if you're asked about your immigration status, where you were born or how you entered the United States, you may refuse to answer or remain silent, according to the National Immigration Law Center. You can simply say, 'I want to remain silent' or 'I am exercising my right to remain silent.' Experts advise that you are not required to sign documents or provide personal information. If ICE agents are present when you're on public transportation: If ICE agents approach you while you're in the car: If you are detained or taken into custody, you have the right to reach out to an attorney and receive a phone call from an attorney. You can prove you have a lawyer by giving the officer your signed Form G-28, a federal document that details your lawyer's information and your consent to their legal representation. Don't have a lawyer? You can ask the ICE official for a list of pro-bono lawyers. You can also ask to contact the consulate, which may be able to assist you in finding a lawyer. Get familiar with the rules of the detention center you've been placed in. You can do so by asking for a copy of the Detainee Handbook to understand the detention center's rules, your rights and how you can communicate with loved ones. The book is available in 19 languages, including English, Spanish, Arabic, Bengali, French, Haitian Creole, Hindi, K'iche' (Quiché)/Kxlantzij, Mam, Portuguese, Pulaar, Punjabi, Q'eqchi' (Kekchí), Romanian, Russian, Simplified Chinese, Turkish, Vietnamese and Wolof. A raid is when ICE agents arrive at a work site without warning the employer. They can be accompanied by other agencies or appear in large numbers, according to the California Employers Assn. ICE agents can go to a business to try to find a particular person, or people, according to the National Immigration Law Center. The California Employers Assn. recommends creating a four-step response plan that should address the following: Who should be alerted: Alerting management and employee/union representatives within an organization can help reduce workplace disruption and keep employees calm, said Giuliana Gabriel, vice president of human resources at the California Employers Assn. 'Rumors and misinformation tend to create panic amongst a workforce, and some employees may even try to flee or confront agents,' she said. 'Running could give the agents reason to detain or arrest someone, so having an employee representative or member of management to maintain order and keep employees calm is advisable.' Legal counsel should immediately be notified when ICE shows up because they can help 'protect your organization and your employees from agents overstepping their boundaries or taking liberties as far as what they are authorized to do at your workplace,' she added. Authorized speakers: Examples of people who can be designated to speak with agents include the business owner or a member of the management team, such as a general manager or human resources representative. 'Ideally it would be someone familiar with your response plan, if you have one, and authorized to speak on behalf of the company,' Gabriel said. The identified person or people should be able to communicate confidently, clearly and remain composed 'while protecting the privacy of your organization and its employees,' she said. Gathering ICE agent information: You have the right to ask immigration officials which agency they represent as well as for their names, badge numbers and business cards. 'There have been reports of citizens impersonating ICE agents to target, detain and harass others,' Gabriel said. Designated waiting area: Find a conference room or office where agents can wait. This can limit workplace disruptions. Businesses should enact their response plan immediately when immigration officials arrive. Before ICE agents can enter private areas of your business (public areas are parking lots or lobbies), they must present a valid warrant to conduct their search. As when a warrant is presented at a private home, at the workplace a valid warrant must be issued by a court, have the correct name and address of the person being seized and be signed by a judge or magistrate judge. Businesses should ensure that employees know their rights and that they should refrain from engaging with ICE officials, according to the National Employment Law Project. If ICE agents have questions or requests, workers should not respond and instead direct the officials to speak with their employer.


Boston Globe
2 hours ago
- Boston Globe
Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis'
Foreign hackers have increasingly identified smartphones, other mobile devices, and the apps they use as a weak link in US cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. Get Starting Point A guide through the most important stories of the morning, delivered Monday through Friday. Enter Email Sign Up It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. Advertisement 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity specialist at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' US authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real-time and able to read text messages,' said Representative Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Advertisement Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. US intelligence officials have said China poses a significant, persistent threat to US economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' US Representative John Moolenaar, Republican of Michigan and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their US operations. Advertisement Mobile devices can buy stocks, launch drones, and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords, and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators, and business leaders with texts and phone calls. It's unclear how the person obtained Wiles's connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles's number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information, or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Advertisement Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. 'We just can't share things willy-nilly.'


Fox News
9 hours ago
- Fox News
How to tell if a login alert is real or a scam
Online scams thrive on the urgency and fear of their victims. If you've ever been a victim of a scam, you'd know that bad actors often try to rush you into taking action by creating a sense of fear. A scammer may call you impersonating a government agency and claim your Social Security number has been linked to drug trafficking. A phishing email might ask you to update your tax details or claim you've won a lottery or a free product, all to get you to click a malicious link. A more effective tactic scammers use is sending fake login alerts. These are warnings that someone has logged into your account, prompting you to take immediate action. This method works well because legitimate services like Google, Apple, Netflix and Facebook also send these types of notifications when someone, including you, logs in from a new device. It can be tricky to tell the difference. As Robert from Danville asks, "I constantly get in my spam junk folder emails saying 'someone has logged into your account.' Is this spam? legitimate? concerning? How do I know? How to avoid wasting time checking? How do I check?" Thanks for writing to us, Robert. I completely understand how tricky it can be to figure out whether these messages are legitimate or just another scam attempt. Let's break down what these urgent warnings usually look like and go over a few ways you can stay safe. Scammers often pose as login alerts from Google, Apple, Meta or even your bank, complete with official-looking logos, because fear is effective. But not every alert is a scam. In many cases, these notifications are legitimate and can help you detect unauthorized access to your accounts. Let's focus on the scam side first. Login alert scams have been around for a while. Early reports date back to 2021, and the trend has persisted since then. In 2022, reports surfaced that scammers were impersonating Meta and sending phishing emails to users. One such email used a clean layout with minimal text. It avoided the usual scare tactics and stuck to a simple message. But that is not always the case. A common red flag in phishing attempts is the tendency to overload the email with unnecessary details. These messages often include cluttered formatting, excessive explanations and an increasing number of typos or design errors. One phishing email simply gets to the point: Someone tried to Iog into Your Account, User lD A user just logged into your Facebook account from a new device Samsung S21. We are sending you this email to verify it's really you. Thanks, The Facebook Team What's concerning now is that poor grammar is no longer a reliable sign of a scam. Thanks to AI, even those with limited English skills can write emails that sound polished and professional. As a result, many phishing messages today read just like legitimate emails from trusted companies. Receiving a phishing email is not the real issue. The real problem starts when you click on it. Most of these emails contain links that lead to fake login pages, designed to look exactly like platforms such as Facebook, Google or your bank. If you enter your credentials there, they go directly to the scammer. In some cases, simply clicking the link can trigger a malware download, especially if your browser is outdated or your device lacks proper security. Once inside, attackers can steal personal information, monitor your activity or take control of your accounts. Real login notifications do exist; they're just much less scary. A genuine alert from Google, Apple or Microsoft will come from an official address (for example, no-reply@ or security@ and use consistent branding. The tone is factual and helpful. For instance, a legit Google security alert might say, "We detected a login from a new sign-in to your Google Account on a Pixel 6 Pro device. If this was you, you don't need to do anything. If not, we'll help you secure your account." It may include a "Check activity" button, but that link always redirects to a address, and it won't prompt you to reenter your password via the email link. Similarly, Apple notes it will never ask for passwords or verification codes via email. 1. Don't click any links or attachments and use strong antivirus software: Instead, manually log in to the real site (or open the official app) by typing the URL or using a bookmarked link. This guarantees you're not walking into a scammer's trap. The FTC recommends this: if you have an account with that company, contact them via the website or phone number you know is real, not the info in the email. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 2. Remove your data from the internet: Scammers are able to send you targeted messages because your data, like your email address or phone number, is already out there. This often happens due to past data breaches and shady data brokers. A data removal service can help clean up your digital trail by removing your information from public databases and people-search sites. It's not a quick fix, but over time, it reduces how easily scammers can find and target you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web. 3. Check your account activity: Go to your account's security or sign-in page. Services like Gmail, iCloud or your bank let you review recent logins and devices. If you see nothing unusual, you're safe. If you do find a strange login, follow the site's process (usually changing your password and logging out all devices). Even if you don't find anything odd, change your password as a precaution. Do it through the official site or app, not the email. Consider using a password manager to generate and store complex passwords. 4. Enable two-factor authentication (2FA): This is your best backup. With 2FA enabled, even if someone has your password, they can't gain access without your phone and an additional second factor. Both Google and Apple make 2FA easy and say it "makes it harder for scammers" to hijack your account. 5. Report suspicious emails: If you receive a suspicious email claiming to be from a specific organization, report it to that organization's official support or security team so they can take appropriate action. You shouldn't have to vet every sketchy email. In fact, your email's spam filters catch most phishing attempts for you. Keep them enabled, and make sure your software is up to date so that malicious sites and attachments are blocked. Still, the most powerful filter is your own awareness. You're definitely not alone in this. People receive these spammy login scares every day. By keeping a cool head and following the steps above, you're already ahead of the game. Have you ever encountered a suspicious email or phishing attempt? How did you handle it, and what did you learn from the experience? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels Answers to the most asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.