Connecticut shooter left little for investigators to trace
What do police do now?
- Duration 8:38
- Date Dec 20, 2012
What do police do now?
Also in this playlist...
This transcript is automatically generated
Nearly a week.
Intense investigation following the massacre at a Connecticut elementary school.
Police have reportedly turned up very little evidence of what motivated out of -- had to kill.
He destroyed his computer hard drive we are told or at least made a good attempt to.
He lacked accounts on social media sites like FaceBook and Twitter.
And so far there are no notes calls or texts.
That hadn't have helped the police in their search.
So now what.
-- out -- Brosnan he CEO of -- and risk consultants and former and wipe out PD detective.
And -- straws -- computer forensic and investigation expert and he is co president of straws reaper -- welcomed Cuba.
Thank you are right so let's start with the investigation for we get to hard drives and Ed has brought some examples that we're gonna show that the viewers in a minute -- -- start with you on -- -- If that's the case the police haven't come up with texts or cell phone records.
Give us any clue he didn't even know -- starts try to find motive.
Well that that's unusual because today journal -- texts and emails instant messages and so forth.
But there's no way on the planet that this twenty year old in the last couple of years hasn't communicated with other human beings.
We need to find out who those human beings are now they may be in the gaming arena in the gaming world which by the way I learned.
When the game and around the world from his living room right.
He can communicate verbally.
With those individuals that he's game yet say it's like a visual phone call precisely and also a narrative phone call it would be communication with them.
I would identify who those people -- I would term upside down and shake all the information out.
Do you think there really is going to be -- it is they talk so much about how isolated he was.
-- like to be touched -- extremely shy there have been some reports of some friends over the years there's a friend someone as friends is a friend somewhere.
There's a friend this multiple friends as friends of friends -- people that he spoke to at some point.
But more importantly and at the very top of the pile is his brother.
His brother has to be absolutely interrogated.
Every drop of data every inference every information every suggestion every statement -- sucked out of his mind.
And put into filing cobble together to get to that most elusive on -- case of wall things then motivation they say the brother hadn't.
He claims he had spoken with him in two years but that that leaves us with eighteen years to -- where -- claims it's an -- -- right.
What we're trusting me in the eighteen to seventeen to sixteen the -- it's not just yesterday or the day before it started.
And then and then obviously the father is still alive and and they'll tell want to Tim I get to that the minute -- for selling it to you -- they say this so far I mean the kid was reportedly genius.
And spent a lot of time on computers they cities that -- -- time in his mother's basement.
On -- and gaining that and that is what they said.
But they said he was Smart enough to destroy the hard drive of his computers and so when the cops got their -- to see him before it's gonna go commit this massacre.
Destroying the hard drive knowing what he was about to do in knowing the next person to see the -- it was going to be law enforcement.
Is anything retrievable from -- destroyed hard drive.
It depends how badly destroyed it is that we haven't seen it by their hard drive is by nature -- very delicate object.
And as you point out there was a reason why he took the time to attack the hard drive and try to physically disable it.
If a hard drive is dropped and damaged a lot of times it can be -- well enough so that you can analyze it.
But if somebody severely.
Attacks the hard drive with a hammer -- shoots it.
Four hits and -- with -- -- did make it to the point where the degree of damage is something I've never seen main function.
That in the early reports is not yet confirmed the -- reports word that he had taken something that looked like maybe a screwdriver to it you know sort of hammering away at it -- and and I hadn't heard that he had attempted to shoot it.
But you've got some examples of.
Of hard drives that were attempted to be destroyed what -- they show us show you the -- -- Muppet show us and give you an example here's a hard drive in its normal state.
If we we're took a hard drive and your computer.
Took the housing off the cover this is what you would -- you see this is sort of beautiful.
Near like surface of a hard drives platter.
That platters where the data is stored in this little arms slides out of cross it.
These are Mike response -- microscopic.
Tolerances of mechanical.
Very very delicate if you drop this on the floor it becomes a problem.
For recovering data from it but many times these disks this platter.
Can be taken out of this device -- mountain in another spun up like a record and information extracted from -- but let me just show you what -- -- hard -- Was actually.
Damage to the point where it looks like this while.
Now in in this example you're talking about severe strong impacts.
You cannot take this kind of hard drive with these platters.
-- -- them -- get them to spend and so now that was done he wouldn't get any information that I've never seen any information gotten off something like this -- Him on the other hand we do have an example of somebody shot -- and you've -- the same sort of effect well I live I mean.
You know one would guess in his would look something akin to this if they're saying it looks like he took a screwdriver to it you know hammering I think until it I think he talked about physical impact with -- -- implement its going to be somewhere -- silent when it had been shot again to absolutely.
-- he's got some.
Several holes and you know and so that's the challenge at the investigators have -- because it analysis of computers have -- has become so important.
In modern day -- were brought back get back in the day.
And I know you worked back in the day before we had a lot of computer analysis and cell -- analysis I think I wasn't too long ago we didn't have any of that stuff to look at when there was a crime like this sort of.
So right -- the fact is they've always been kind of gifts for us because didn't exist before so now you have these tangible records -- can be analyzed.
Meticulously reconstructed as -- points out.
And -- and how about the father and in doing sort of the old fat fashion shoe leather precise location.
-- how helpful could he be same as the sun.
Same as the brother.
Want to know every single thing that Adam ever sent to his father and everything everything he suggests that everything he and for every statement.
Every action because all of them have potential value and its totality they could have extreme value in terms of moving toward what made him tick and what made him tick -- -- -- motive.
Another question to bring -- to -- could could the cops go to their pastor because there about pastor's son spoke to foxnews.com.
And the -- -- to dial back from what the sunset but can you go do a pastor and say what it the mother Nancy Lanza -- you sure.
Why not -- they talk depends his son speaks.
It's just thought why not risk everybody would work everybody but they can assert you know.
Privilege perhaps it said to them in net in the confessional to send them in private perhaps but -- assuming it was information that he doesn't realize is relevant that's the trick.
And what about so called clouds in the computer industry now we have -- on and I iPhone if I take a picture.
I got -- my iPhone but it's also goes up it's called -- note -- it can be retrieved.
Even if this thing gets destroyed from the cloud that's up there with the information might some of the hard drive information -- -- a cloud someplace.
You touched on something very important.
If you are dealing with the Internet.
The Internet is often represented on maps as the clouds and that's where that term comes from so if you're dealing with anything on the Internet which is a storage location.
Email for your browser like Gmail or Yahoo!.
-- just a place to back up your data you're putting data on the cloud so even though the hard drive may be lost to us.
The hard drive could have been used to connect to the Internet through service provider and store data on the club.
The thing is we just can't start to find that information from a -- -- -- business badly damaged.
And I didn't like the FBI has -- ability to analyze hard drives that are in that condition and nobody does.
They're always getting better I didn't I never want to say never but I can -- I've never seen -- hard drive in this kind of condition.
Analyze that way.
So it's unlikely but possible but the good the cloud is a very important location and I think the points about interviews.
There is that he was using the computer or something and as you pointed out there was a reason why he destroyed it I think there are leads back to the cloud back to the Internet that are going to be very important is communicating with someone before.
He was communicating -- if services on the Internet that he felt comfortable communicating with -- And that -- now that the attorney general himself is going -- you gotta measure that would have the full force the federal government's resources.
Helping them look into this guys thank you both so much -- eruption it.