Also in this playlist...
This transcript is automatically generated
-- our top story now the Connecticut school massacre and as we await the first funerals for those two.
Young children killed in the Rampage investigators are poring over computer evidence to try to figure out how the murderer -- Lanza.
Plans his killing spree.
Joining us now Roberts is -- Leon you know he's a McAfee online security expert and robbery -- forensic.
Investigations before where do you start.
Well first just need to please acknowledge the families and the victims.
My deepest sympathies.
So our digital lives are a window into our minds and by discovering.
A -- Digital Life you essentially.
I can map out their life's past and future intentions.
And the point of additional discovery essentially is to.
Find out what happened and essentially how to prevent this in the future as well.
So where are already start with the material that you might have been a typical case.
Easily very simply as you would with your own device.
From the desktop in -- -- the hard drive.
Looking through all different document folder is looking at all the different files and folders the names of them the different documents with in.
And then going through web history's.
Web history can determine what web sites they visited.
Also a by.
However how are acting can you go Robert we talk about some of those those history that you can look through.
For summoned and that's twenty years old for example we we understand that there is some evidence that the mother's house spent -- -- have been very tight lipped about it.
How far back would would would any device -- typical divisive family's home.
Provide you how many years and would have months weeks what kind of time line.
-- the great question did they give your own digital devices for example within my own home and office I have devices as old as ten.
To twelve years old and all of those -- history of web traffic and email communications.
And she can go back as long as the device is old.
And if there has -- any a transfer of data from an even older device then all that history remains and so.
It it and then if the person was proficient at clearing their history then there's less information can be found.
But again dependent on the operating system.
In different partitions that might be set up a lot of data can be discovered -- With the right technology.
Had -- -- again have been very tight lipped about the evidence that they have we have some initial reports.
And again we don't know if these reports are real or not that that dead the murderer.
Might have destroyed.
Some of the computer it pointed at the initial reports that -- hard drive again we don't know if this is true if that's the case though that's -- scenario you're dealing with does that limit you.
In any way.
Well -- certainly does.
And and the ability of the -- error or are the two essentially destroy that device.
Vs the ability of say a forensics expert to discover it.
May vary the a good forensics expert with the right technology.
Can get deleted or even destroyed -- -- depending on you know again you know it's a it's a cat and mouse game.
So you -- likely you know based on what they're already finding and and what they will find.
They'll be able to determine whether or not this individual had conspired with others.
And and they will more than likely find what his trigger point might abandon in order to.
Basically devised this plan and and -- It at at the news conference on Saturday a day officials scenes.
Hopeful about the evidence that they found at the mother's house will wait to see what exactly that produces and what answers maybe.
Maybe it provides -- case like this Robert great to see you thank you for your expertise today.
Filter by section