Preview

The BTK Killer

Good Essays
Open Document
Open Document
654 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The BTK Killer
The BTK Killer
“The floppy did me in.” Words from notorious serial killer Dennis Rader, also known as the BTK killer. Rader’s spree of violence lasted nearly 30 years and included 10 victims. Raider’s actions were strange, in the way that he communicated to the police. He truly enjoyed taunting the police and gloating about his crimes. His usual way of communicating with the police was through letters or 3x5 cards that he would send to the police directly or to the local television station. In one communication to the police department Raider stated “Would it be secure for the murderer to communicate with police via a floppy disk?” Knowing that having a different form of evidence to analyze the police told Dennis Raider that would
…show more content…
In the case of the BTK killer the metadata that the forensic examiner was able to uncover was the fact that the user account of the computer being used was named “Dennis” and it gave specific details about the location of the computer. The computers that were used were identified as one at public library and a computer at the church. All of this information was located in the “properties” section of the document. The details the metadata provided about the church then prompted the investigators to conduct an internet search on church and found that there was a Dennis Raider on staff. Additionally the metadata was able to provide the date the file was created, the date that the file was modified, and the date that the file was printed. Metadata is used in all forms of digital media to include documents, web pages, videos, images and much more. The metadata in this case was created automatically by the Microsoft Office application and was saved even though Dennis Raider deleted the file from the disk.
The details that digital forensics provided about the killer’s identity were essential in identifying Dennis Raider as the BTK killer. It took a digital forensic analyst 30 minutes to do what investigators took 30 years to do. Two forms of digital forensics were used to identify the killer, the internet search and the analysis of the metadata. Undoubtedly digital media leaves a trail of data behind and thanks to solid police work and the understanding of evidence types led to the identification of this notorious killer and eventually his

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    The factors that have limited local law enforcement’s efforts against digital crime are lack of training, lack of diagnostic equipment, lack of management level recognition and support, and a lack of specialized personnel. First off, training is a paramount need for local law enforcement. Many of the officers appointed to computer crimes at the local level do not have the requisite knowledge to deal with these types of crimes. Some of these officers are even put into these roles when they don’t even want to. Also, the lack of training to patrol officers could lead to valuable evidence being inadvertently destroyed. Most local agencies lack the equipment necessary to conduct digital forensics. Many local experts have even been reported to have purchased their own equipment to do their job (Taylor, et. al., 2011). The lack of management support and recognition of computer crime analysis has led to the lack of funding for these local cyber units. With a lack of funding comes a lack of equipment, training, and the ability for personnel to specialize in digital forensics.…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    BTK Story

    • 1200 Words
    • 4 Pages

    Dennis Lynn Rader was born to Dorothea Mae and William Elvin Rader on March 9, 1945. Otero was found murdered in his home alongside three of his family members. Joseph Otero 's wife was beaten, choked and bound before Rader killed her. Rader 's next "BTK" victim was a 21-year-old named Kathryn Bright.

Similarly to Rader 's first set of victims, she had been bound with a cord, somewhat clothed and had been choked and stabbed numerous times.

Rader 's last two victims were 28-year-old Vicki Wegerle, and 62 year old Dolores Davis.

Rader 's killing spree had come to a halt shortly after his last two victims, Vicki Wegerle, and Dolores Davis.

In 2004 the investigation became interesting after Rader sent an anonymous letter to the authorities, declaring accountability for a killing that had not formerly been recognized as the work of the "BTK" killer.

The working authorities kept a line of communication open with the BTK Killer also known as Rader, with determination to gain his trust and assurance.

In summary, there was strong evidence working against Rader, placing him as a top suspect in the BTK killings.

In February of 2005, Rader was incarcerated in Park City, Kansas, and charged of the BTK killings.…

    • 1200 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Dennis Rader was a Christian man that lived his life as a normal person to everyone’s eyes, with a wife and children but on the inside he was a psychotic man. He had 10 known victims in a span of 25 years before the silence was broken and brought to justice.…

    • 1601 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    1. Why is the unallocated space of a Windows system so important to a forensic…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    We attempt Earth-place discipline in initiative investigations, e-exploration, information processing system protection incident answer, and digital forensics, and have cars over 50,000 digital investigators cosmopolitan. Some of our most epidemic courses end: EnCase ® v7 Transition Designed for EnCase Forensic users who are upgrading from a previous version to Version 7, the EnCase v7 Transition course details the unaccustomed features of Version 7, spotlight specifically the areas of the fruit that differ significantly from anterior versions. To chronicle for this passage, a use must have accomplished Computer Forensics II or hold an EnCE ®certification. EnCase Computer Forensics I Practical exercises and real-life simulations stipulate participants with an understanding of proper handling of digital eveidence from hold to acquirement, to the analysis and archiving of the data. EnCase Computer Forensics II Designed for investigators with muscular electronic computer discrimination, prior rhetorical training, and experience second-hand EnCase Forensic. EnCase Startup Training Encase® Start Up on-imposition result training to let you spring-in and rapidly get empty with your new software. EnCase® Start Up is convenient for cull Guidance Software products at no cost. You can refer to it whenever you indigence it; brush-up on shape and secant, or import a new abound…

    • 1310 Words
    • 6 Pages
    Better Essays
  • Best Essays

    Page, M., Taylor, J., & Blenkin, M. (2011). Uniqueness in the forensic identification sciences Fact or fiction? Forensic Science International, 206(1), 12-18.…

    • 2085 Words
    • 9 Pages
    Best Essays
  • Better Essays

    Kuklinski Serial Killer

    • 1881 Words
    • 8 Pages

    Richard Kuklinski was a contract killer, or hitman, for several families of the American Mafia. After his arrest in 1986, Kuklinski readily admitted to murdering more than 200 men; however, he contends he was just a hit man, not a serial killer. There is some debate regarding whether or not Kuklinski should be considered a hit man or serial killer. Overwhelming evidence proves that Richard Kuklinski’s was undoubtedly a serial killer.…

    • 1881 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Good Essays

    man who killed

    • 1219 Words
    • 4 Pages

    Who are you going to believe me, or your lying eyes?'" claims Richard Pryor in Henry Louis Gates' Thirteen Ways of Looking at a Black Man (247). This statement emphasizes the difficulties of "double-consciousness" in American society today (Du Bois 615). The image of self is a complex mix of the way in which individuals evaluate themselves and the views that society maintains for each person. This confusing "double-consciousness" forces individuals to decide which perspective is correct, their own self-evaluation or the perception of society's blind eye. Many black American writers confront this problem through literary works that analyze double-consciousness and chart its progression and effects on individuals. First, they create a metaphor to explain the existence of a boundary between the social and personal views of an individual. Secondly, they describe the effects that this double-consciousness has on characters. Finally, authors propose ways to reconcile individuals' "warring ideals" (Du Bois 3). One example of this analysis of double-consciousness occurs in Richard Wright's The Man Who Killed a Shadow, where the character of Saul Sanders is used to symbolize the effects of "second-sight" on an individual (Du Bois 615).…

    • 1219 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    craigslist killer

    • 348 Words
    • 2 Pages

    As America shifts into a technological age, practically every aspect of our daily lives is influenced by technology. This influence has extended to the way crimes are committed, as evidenced clearly by a murderer known as “The Craigslist Killer”. A medical student at Boston University named Philip Markoff is alleged to have committed the crimes attributed to this killer.…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Biological Criminal Behavior of Dennis Rader, known as the "BTK Killer" which stands for "bind, torture, and kill". Dennis Rader terrorized the Witchita, Kansas, area from the 1970s to the '90s. Over time, today’s society reflects that genetic and biological factors play an equal role in crimes committed in the criminal justice system ("Bio.", 2014). It is believed that an individual’s environment and state of mind contributed to his or her behavior pattern. According to J. Reid Meloy, antisocial personality disorder affects around 2 percent to 5 percent of the population. Only about 1 percent of the population can be described as having psychopathic…

    • 1458 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    "Computer forensics is the specialized practice of investigating computer media for the purpose of discovering and analyzing available, deleted, or "hidden" information that may serve as useful evidence in a legal matter. " (Steen, Hassell 2004)…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Forensic Photography

    • 1670 Words
    • 7 Pages

    Garrett, R.J. (2003). A primer on the tools of crime scene analysis. Journal of Forensic Identification, 53 (6). Retrieved April 26, 2010, from ProQuest Database.…

    • 1670 Words
    • 7 Pages
    Better Essays

Related Topics