20.03.2013 Views

Inside the Mind of BTK

Inside the Mind of BTK

Inside the Mind of BTK

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The Capture and Arrest <strong>of</strong> <strong>BTK</strong> 251<br />

Ken Landwehr pushed open <strong>the</strong> metal door <strong>of</strong> my hotel room and<br />

walked inside. He took <strong>of</strong>f his suit coat, carefully draped it over <strong>the</strong><br />

one chair in <strong>the</strong> room, and took a seat on <strong>the</strong> bed. A few minutes earlier,<br />

I had assumed my usual perch beside <strong>the</strong> desk, basking in <strong>the</strong> glow<br />

<strong>of</strong> my computer screen.<br />

“So how’d it go down?” I asked him. “Walk me through those final<br />

days before you put <strong>the</strong> cuffs on him.”<br />

Landwehr explained that after Rader met with Clark, he returned<br />

home, placed <strong>the</strong> disk into his computer, deleted <strong>the</strong> agenda for <strong>the</strong><br />

upcoming church council meeting and made <strong>the</strong> biggest mistake <strong>of</strong><br />

his life—besides being born. He typed out <strong>the</strong> next installment <strong>of</strong> his<br />

message to police.<br />

On February 16, a padded envelope arrived at <strong>the</strong> studios <strong>of</strong><br />

KAKE-TV. <strong>Inside</strong> was <strong>the</strong> usual assortment <strong>of</strong> index cards, along with<br />

a locket attached to a gold chain, no doubt pilfered from one <strong>of</strong> his<br />

victims. But <strong>the</strong> envelope also contained something else—a purple<br />

computer disk. The communiqué was quickly turned over to <strong>the</strong> task<br />

force.<br />

The moment Landwehr spotted <strong>the</strong> disk, he dialed <strong>the</strong> extension<br />

for Det. Randy Stone, <strong>the</strong> department’s computer crimes sleuth.<br />

Within minutes, Stone had popped <strong>the</strong> disk into a PC and began clicking<br />

his way inside it.<br />

“There were seven <strong>of</strong> us <strong>the</strong>re,” recalled Landwehr. “We were all<br />

staring over his shoulder, watching what he was doing, and he was<br />

walking us through every step he took.”<br />

Stone quickly saw that <strong>the</strong> disk held only one file, which was titled<br />

“TestA.rtf.” He clicked it open and read <strong>the</strong> message left by <strong>the</strong> killer:<br />

“This is a test. See 3 x 5 Card for details on Communication with me<br />

in <strong>the</strong> newspaper.” Stone asked to see <strong>the</strong> index card and moaned after<br />

reading <strong>the</strong> message: “Any communications will have a # assigned<br />

from now on, encase one is lost or not found.”<br />

Landwehr explained to me that it was Rader’s use <strong>of</strong> <strong>the</strong> word<br />

“encase” that put everybody in <strong>the</strong> room on alert. It turned out that<br />

Encase is <strong>the</strong> proprietary name for a sophisticated type <strong>of</strong> s<strong>of</strong>tware<br />

used in forensic computer investigations. “With it, you can literally<br />

strip <strong>of</strong>f all <strong>the</strong> identifying information we were hoping to find,”<br />

Landwehr explained. “Randy said that it looked like it could be a setup,<br />

and his use <strong>of</strong> <strong>the</strong> word was some sort <strong>of</strong> clue he’d left for us.”<br />

Landwehr had begun to wonder <strong>the</strong> same thing.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!