Preview

Adam Lanza's Smashed Hard Drive Doesn't Erase His Digital Footprint, Experts Say

Good Essays
Open Document
Open Document
596 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Adam Lanza's Smashed Hard Drive Doesn't Erase His Digital Footprint, Experts Say
Adam Lanza's Smashed Hard Drive Doesn't Erase His Digital Footprint, Experts Say
Before going on a murderous rampage last week, Adam Lanza reportedly took a dramatic step to erase his digital history: He removed the hard drive from his computer and smashed it with either a hammer or screwdriver.

By doing so, he may have destroyed valuable evidence that would help investigators understand his motives for killing his mother, 20 first-graders and six school employees at a Sandy Hook Elementary School in Connecticut Friday.

But in the age of cloud computing and multiple Internet-connected devices, authorities have no shortage of ways to follow his online footprints for clues, from acquiring his emails and search history to obtaining his online correspondence while he reportedly played "Call of Duty" on Xbox, experts said.
"Your Internet history is very telling," said Monique Ferraro, an attorney and digital forensics expert. "Even without a hard drive, if he was on the Internet, and most people are, investigators will be able to tell quite a bit about what he was doing, where he was going and what he was thinking."

Lanza, 20, was reportedly adept at computers, belonging to a technology club at his high school, according to the Associated Press. Yet he also left investigators with a relatively light digital trail to follow. In addition to destroying his hard drive, hereportedly did not have a Facebook or Twitter account.

Lanza's hard drive would have been valuable because it likely stored documents and records of his Web browsing history, said Jeff Pederson, the company's manager of data recovery operations Kroll Ontrack.

Kroll Ontrack, which specializes in data recovery, has retrieved evidence from hard drives damaged by floods, fires, and even a melted disk drive from the space shuttle Columbia, which was destroyed in 2003. Whether or not a hard drive can be salvaged depends on the extent of damage to what are called "platters," the small discs where the data is

You May Also Find These Documents Helpful

  • Good Essays

    Ray Gricar Case Study

    • 745 Words
    • 3 Pages

    Gricar was well-known during his late career for letting Jerry Sandusky off due to “…lack of evidence….” in 1998. Sandusky was, initially, accused of abusing boys he was coaching at Penn State (Ganim). Later, Sandusky was indicted for sexual crimes in 2011. Gricar was blamed, by many, for letting Sandusky off in 1998. Also, in 2009, the police was able to collect Internet Google search of how to destroy hard drives from the hard drive. The key wording that were utilized were “how to wreck a hard drive”, “how to fry a hard drive”, and “water damage to a hard drive.” (Ganim) However, when looking into this possibility, there was no evidence to support the theory…

    • 745 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    1. Why is the unallocated space of a Windows system so important to a forensic…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    As it turns out, Austin bomber Mark Anthony Conditt left a 25-minute recorded confession for Austin Police on his cell phone after he blew himself up with the seventh device earlier this week in Texas.…

    • 800 Words
    • 4 Pages
    Good Essays
  • Better Essays

    “This is the grand finale of a life poorly sent and the end result is just overwhelmingly depressing…..a sick pathetic, miserable life story, that’s all it is.” (Dahmer) On November 28, 1994 Jeffrey Lionel Dahmer was murdered by 25-year-old Christopher Scarver with an iron bar from an exercise machine while cleaning the bathroom, which was adjacent from the prison gym. The blow to his skull killed him instantly.…

    • 1287 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Toshi, thrilled off of hacking through cyberspace, finally met his match when the RIAA hired him to work for their…

    • 605 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Case Study: Scavenger Hunt

    • 1257 Words
    • 6 Pages

    1. (2011 - 2012) Set the foundation for electronic data recovery and the sharing of…

    • 1257 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Timothy McVeigh was sentenced to death. Terry Nichols was sentenced to life in prison. All the evidence that was gathered together was used to prove that Timothy McVeigh and Terry Nichols guilty. For example the searching of the debris helped put the lives of hundreds to justice. This proves that forensic science helped solve crimes and bring justice to many families who lost loved ones.…

    • 381 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ethics Of Dumpster Diving

    • 396 Words
    • 2 Pages

    Based on the nature of the disposal, a computer hacker may acquire an array of details and information from improperly disposed materials and equipment, such as electronic equipment and computers. For example, if a computer is not properly wiped and securely disposed of, computer hackers who obtain such may be able to recover any and/or all data…

    • 396 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In the New York Times article, “The Web Means the End of Forgetting,” author Jeffrey Rosen recounts that the modern day Internet is nothing short of a permanent record of everything you and anyone else has ever posted. Unlike real life where many people forget what happens in their lives or in the world over time, the Internet serves as a way to keep up with everything that has ever been made public; there are no deletions therefore there are never any forgets.…

    • 950 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    My first evidence I have is some parents use spyware to see what their kids are doing on their electronic device. In the article “The Undercover Parent” it states that “if you put spyware on your computer,you have the ability to log every keystroke your child make and thus a good portion of his…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    With the use of the Web, he’s able to do his work anyplace. Planes are especially favored…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Have you ever heard of a digital footprint? How about, did you know that using the internet can cause some serious problems in your life, weather you know of it or not? A digital footprint is a trail that keeps up with everything you do on the internet. This could be a good or bad thing. Some people could even agree or disagree with it. From my point of view a digital footprint is a bad thing because it keeps up with everything you do, it never goes away, and it could cause problems. Would you want anyone to know ALL of what you do? It’s a negative thing for several reasons beyond what was stated also.…

    • 946 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The Deep Web Outline

    • 514 Words
    • 3 Pages

    1.1 attention step: did you know that everything you can search in google is only the tip of the iceberg? Majorty of the data in the internet are kept from society, but there are ways to reach them. Did you know that there is a place on the internet where everything illegal goes? From Black markets to hitman contracts…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The Cyber Manhunt

    • 887 Words
    • 4 Pages

    Cyber Manhunt, also known as Human Flesh Search or Internet Mass Hunting is primarily a Chinese Internet phenomenon of massive searching in which numerous Internet users participate to filter the search results and assists users in clarifying their search request. It literally means to uncover the true identity of a particular person with the connected efforts of all netizens. Because of the convenient and efficient nature of information sharing on the cyberspace, the Human Flesh Search is often used to acquire information usually difficult or impossible to find by other conventional means (such as library or Google). Such information, once available, can be rapidly distributed to hundreds of websites, making it an extremely powerful mass media. The purposes of human flesh search vary from providing technical/professional question&answer support to revealing private/classified information about specific individuals or organizations. Because personal knowledge or unofficial (sometimes illegal) access are frequently depended upon to acquire these information, the reliability and accuracy of such searches often vary. Netizens usually use Internet media such as blogs and forums to identify and expose information of individuals to public. It is based on massive human collaboration. The name refers both to the use of knowledge contributed by human beings through social networking, as well as the fact that the searches are usually dedicated to finding the identity of a human being who has committed some sort of offense or social breach online.…

    • 887 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Essay On Lucid Dreams

    • 519 Words
    • 3 Pages

    The main motivation behind this topic is to explore the existing research and put in front the data and knowledge which is gathered by experts to comprehend the limits of the human mind and to understand what can and cannot be archived.…

    • 519 Words
    • 3 Pages
    Good Essays