After 31 years and 100,000 man-hours of conventional research, the famous case of the BTK killer was cracked with 15 minutes of work by a modern digital detective. The new breed of gumshoe is trained to study bytes the way old-school G-men studied fingerprints. And it's paying off.
The night Cindy M.* disappeared, she ate dinner with her parents
and older brother in the family's two-story suburban Pittsburgh home,
then went to her room and promised to come back for apple-walnut pie.
The pretty 13-year-old with dark blond hair and blue-green eyes never
returned. When her parents checked her room, they found neither a note
nor a sign of forced entry. It was New Year's Day, 2002, and their
daughter was simply gone.
Pittsburgh police spent almost two days interviewing Cindy's friends and
family, while neighbors scoured nearby fields and gullies, but everyone
came up empty. When FBI special agent Denise Holtz took over the case,
late on Jan. 2, the investigation had barely moved beyond square one.
This is what Holtz knew: Cindy was a shy child who wrote poetry and
frequently made the honor roll. She was rarely in trouble. She could
have run away, but she left her coat hanging in the closet on one of the
coldest nights of the year. Only one tidbit seemed promising: Friends
said Cindy frequented Internet chat rooms.
A six-year veteran of the Crimes Against Children Task Force, Holtz
suspected the answer to Cindy's disappearance was hidden within the
girl's upstairs computer. She also knew that it might already be too
late. If Cindy had fallen into the hands of a killer, the statistics
were grim: 74 percent of abducted children who are murdered are dead
within 3 hours.
* Not her real name
When Andy Spruill, a computer forensics
examiner at Guidance Software, looks into a hard drive, he sees
everything about its owner. "It's like looking into his mind," he says.
Here's how he and other computer sleuths find their clues.
Step 1 |
• Computer drives that may
contain evidence are attached to a write-blocking device that allows
examiners to read from them without changing the contents.
|
Step 2 |
• Software, such as Guidance's
EnCase, creates a forensic image of the hard drive--which Spruill
compares to a "digital evidence bag."
|
Step 3 |
• The forensics software analyzes
the image, uncovering hidden and deleted files as well as partially
deleted "file remnants," and displays them in a hierarchical format.
|
Results |
Photos, Microsoft Office documents, e-mails
and MP3 files can hide incriminating meta-data, and the Internet cache
stores records of a suspect's Web travels that can be recovered even
after they are deleted.
|
"We knew that time was ticking and we couldn't sleep until we found
her," Holtz says. She turned to FBI forensic examiner Tony Pallone, one
of the bureau's computer specialists, and asked him to drop all other
projects until he found something in the machine that could lead them to
the missing girl.
Pallone made a forensic image of Cindy's computer hard drive and settled
in for a long night. He then ran a program that analyzed the
image--yielding thousands upon thousands of numbers and letters
scrambled together, amounting to little more than gibberish to the
untrained eye.
From Cindy's personal Web page, Pallone knew she called herself
"goddessofall" and listed among her interests witchcraft, hypnosis and
mythology, so he searched the data for snippets of those words hoping to
discover other clues amid the jumble of characters. He found some
troubling information: "File residue" logs showing the computer's recent
activities revealed that Cindy visited chat rooms dedicated to
sadomasochism. Potentially worse, Pallone deduced from the gibberish
that she chatted frequently with someone going by the ominous screen
name of "dcsadist." Pallone searched the Internet for references to
anyone using that name but nothing surfaced.
By the evening of Jan. 3, Cindy's parents began to lose hope that she
would be found alive. "You know the statistics," the girl's mother later
told Newark, N.J.'s
Star-Ledger. "It's a one-in-a-million shot to see your child again."
PALLONE is an examiner in the
Pittsburgh FBI office's computer forensics lab. The operation is a
small-scale version of the FBI's 10 multiagency Regional Computer
Forensics Laboratories (RCFLs); two more are slated to open this year.
The FBI provides the RCFL startup costs--about $3 million per lab--and
state and local agencies contribute staffers certified in computer
forensics. As cases come in, examiners pitch in on those with the
highest priority, regardless
of which agency owns jurisdiction.
All told, 200-plus examiners at RCFLs and other FBI teams across the
country analyzed more than 1400 terabytes of data in 2005--equal to a
stack of paper 47,000 miles high. This new breed of gumshoe, trained to
study bytes the way old-school G-men studied fingerprints, snares a
predictable cast of hackers and insider traders but also a surprising
number of violent criminals.
Computer forensics is not only crucial to law enforcement, it is
critical to the business world, where digital evidence-gathering tools
are used for everything from fraud investigations to employee
monitoring. And government computer investigators buy much of their
software from the same commercial vendors that supply big business. The
dominant player in the field is Pasadena, Calif.-based Guidance
Software, makers of EnCase, a widely used suite of programs that can dig
deep into the memory of everything from computer hard drives to MP3
players. The next generation should even be able to search cellphones.
Through its consulting arm, the company also trains more than 3500 law
enforcement officers each year.
"A computer is no different than a tape recorder--it records everything
you do," says Andy Spruill, who oversees the consulting division and
works as a lead investigator with the Westminster, Calif., police
department's computer forensics unit. "Right now [computer forensics] is
still a specialty, with few people having the skills and resources to
do it," he says. "Think about where DNA was 10 years ago. Most cops
didn't even know about it. Now most patrol officers carry DNA swabs.
That is where [computer forensics] is going to go, to the patrol level."
"It is unusual today to have a case that doesn't involve computers,"
explains Mary Beth Buchanan, U.S. attorney for the Western District of
Pennsylvania. She adds that computers are not just a source of evidence,
but a source of better evidence. "Through the use of computers, people
store information they might not otherwise. They might not even know it
is being stored," Buchanan says. "The value [of the evidence] is also
greater because that information is stored in an organized manner and
the computer leaves footprints of an individual's every action."
In 2003 Kansas State University English professor Thomas Murray's
computer turned into a witness against him. For more than a year, local
police suspected Murray in his ex-wife's stabbing death, but it was not
until examiners in the Kansas City, Mo., RCFL searched his office
computer that they found damning evidence. In the months before his
wife's death, Murray had used such Internet search terms as "how to kill
someone quietly and quickly" and "murder for hire." A jury rejected
Murray's defense that he was researching script ideas for a television
show such as CSI and sentenced him to life in prison.
The new breed of gumshoe is trained to study bytes the way old-school G-men studied fingerprints.
Digital evidence helped the FBI
find Dennis Rader, aka the BTK killer (left), and Scott William Tyree
(right). (Photographs by AP/World Wide Photo [Rader], Matt Freed
[Tyree])
The most famous case cracked using the skills of computer forensics
investigators is last year's capture of the serial killer known as BTK,
short for "Bind, Torture and Kill."
Responsible for 10 murders around Wichita, Kan., between 1974 and 1991,
BTK taunted police with letters that boasted of his deeds but yielded
few clues to his identity. He resurfaced in 2004 with a letter to a
local newspaper hinting that he might be plotting more murders.
In February 2005, Wichita television station KSAS received a
translucent, purple floppy disk accompanied by a 3 x 5 index card with a
message from BTK: "Any Communications will have a # assigned from now
on, encase [sic] one is lost or not found."
The BTK task force enlisted the expertise of Randy Stone, a 39-year-old
Desert Storm vet who started in the Wichita police department's Forensic
Computer Crime Unit in 1998. When Stone checked the disk, it contained
only one file, named "Test A.rtf." The text of the file instructed
investigators to read the index card. No clues there.
Stone checked the disk properties to see the previous user: someone
named Dennis. Then he checked to see where the disk was last used:
Wichita's Christ Lutheran Church. On the church Web site's list of
officers, there was one Dennis, a man named Dennis Rader.
The police used DNA evidence to link Rader to the crime scenes and in
August 2005 he was given 10 consecutive life sentences. After more than
31 years and 100,000 man-hours, Stone's digital detective work cracked
the BTK case within 15 minutes of receiving the disk.
"On a scale of one to 10, it was about a three in terms of computer
forensics," Stone says. "As simple as that was, the sad thing is 95
percent of law enforcement in the U.S. could not have done something
like that."
Late on Jan. 3, 2002, as Pallone toiled away in his lab,
investigators looking for Cindy finally caught a break. An anonymous
Tampa man contacted the FBI and said he might know something about the
girl he'd seen in a missing child photo on the
Pittsburgh Post-Gazette
Web site. The tipster said he met a man in a bondage group online
claiming to have captured a teenager. "I think I got one," the man wrote
the tipster in a message, showing video of a girl chained to a wall,
crying. The tipster thought the man lived in northern Virginia and used
the screen name "master for teen slave girls."
Pallone's co-worker, Tim Huff, arrived at the office around 8 am, just
as the tipster gave up the screen name. Of his six years as a field
agent, Huff has spent five working in computer forensics. "I like
putting bad guys in jail, that's why I got into the bureau," Huff says.
"I got into computer forensics because I like solving puzzles."
Four others in the lab were pulled onto the case to join Pallone in
searching chat groups and elsewhere around the Web for anyone using that
screen name. Even with the new information, they were still searching
90 minutes later.
Maybe, Huff thought, the name was not "master for teen slave girls," as
the original agent wrote it down, but some derivative using Web
shorthand. Team members began to search for variations on the name and,
within minutes, one of the examiners found a Yahoo Chat profile for a
suspect using the handle "master4teen_slavegirls." In his profile, the
man listed other online aliases, including "dcsadist."
It was a huge breakthrough--they quickly matched the information from
the girl's computer with the tipster's information, making it a near
certainty this was the guy holding Cindy. But the profile didn't say
where he lived.
Holtz tried to contact Yahoo to get the Internet protocol (IP) address
of the profile, but it was 6:30 am at the Yahoo corporate offices on the
West Coast and she couldn't get anyone on the phone. Eventually, an
agent in Sacramento, Calif., was reached, who called a contact at Yahoo.
Minutes later, Holtz faxed a letter to Yahoo asking for the IP address,
citing Section 212 of the Patriot Act.
Prior to the Patriot Act, which was passed in October 2001, many
corporations required search warrants or subpoenas before granting
government requests for customer information, mainly to shield
themselves from lawsuits. But Section 212 releases companies from civil
liability in cases where someone is at risk of "immediate danger of
death or serious physical injury." This case was one of the first times
the provision was used.
Cyber sleuths: FBI
computer forensic examiners Tim Huff (left) and Tony Pallone unlock the
secrets inside hundreds of computers each year. (Photograph by Brian
Berman)
Around 11 am, Yahoo faxed the Pittsburgh lab the IP address. A quick
search identified Verizon as the service provider. Thirty minutes later,
Verizon told Holtz the name and address of the customer registered to
the account, a 38-year-old Herndon, Va., man named Scott William Tyree.
With Tyree's address confirmed, Holtz contacted the Washington, D.C.,
field office, which dispatched a team of agents to Tyree's home. Cindy
had been missing for almost three days; now Holtz, Huff and the rest of
the Pittsburgh office could only wait nervously for word of her fate.
At Tyree's suburban townhouse, agents burst through the front door with
guns drawn. The house appeared to be empty until they found Cindy in an
upstairs bedroom, collared and chained to a bolt in the floor. The chain
was just long enough to allow her to go to the bathroom. Tyree, it
turned out, had reported to work at a nearby office of Computer
Associates, but not before warning Cindy that he would hurt her if she
tried to escape.
By 3:30 pm, the investigators at the Pittsburgh RCFL received word:
Cindy was safe. Holtz, a six-year veteran of the bureau, didn't try to
hold back her tears. Still sniffling, she walked to a nearby conference
room to give Cindy's family the good news.
Tyree was picked up less than an hour later at his office. He had no
criminal record and exhibited few previous signs of being a sexual
predator. He was twice divorced and maintained a good relationship with
his only child, a 12-year-old girl who lived with her mother in
California. Tyree's daughter had reportedly stayed with him for most of
December during school break, returning home on New Year's Day--the same
day Cindy disappeared.
In subsequent interviews, investigators determined Cindy was like many
teenagers who get involved in dangerous role-playing on the Web and draw
the attention of predators like Tyree. On New Year's Day, she sneaked
out of the house and met Tyree a few blocks away. By the time Cindy
realized the true intentions of her captor, it was too late to escape.
She now speaks to student groups about the
dangers of the Internet.
Buchanan, the lead prosecutor, says further evidence obtained from
Tyree's computer by Huff and his staff was instrumental in building her
case and forcing Tyree to plead guilty. In March 2003, he was sentenced
to nearly 20 years in federal prison.
More than three years later, Huff says it remains one of his most
rewarding cases. "There is very little that I have experienced that
makes you feel
as good as knowing you made a child safe," he says.