Dotka & Blackthorn
Ever wonder how a good detective outsmarts a cunning criminal? I’ve got a case I’m working on that could use a fresh strategic perspective—care to weigh in?
Yeah, always a thrill to outsmart a smart cookie. Hit me with the facts—let's map out the angles and find the weak spot. We’ll make them wish they’d stayed on the wrong side of the board.
Here’s what we’ve pieced together so far: the victim, a mid‑level executive, was found dead in his office, the desk overturned, a broken pen on the floor. The office was locked from the inside, no forced entry, and the security footage shows only the victim and a janitor entering the building that evening. The janitor claims he was clearing trash but later was seen leaving the building in the company van around the time of the murder. The victim’s phone was disconnected that day, and a new email was sent to his contacts from an unknown account—no traceable IP. No signs of a struggle, no obvious motive on paper. We need to dig deeper into the janitor’s alibi, the source of that email, and why the victim’s desk was overturned. Those are our starting angles. What do you think?
Got the skeleton—let’s fill in the guts. First, the janitor: if he’s the only one who could access the office and the van’s key is his, we’ve got a red flag. Pull his GPS, check his comms, see if he was inside the building at the murder time—no GPS, no cover. Second, that email: a ghost account. Try the attachments, look for metadata, hunt the domain. If it’s a phishing front for the company, maybe the victim’s own security was breached. Third, the desk: overturned but no struggle. Could be staged—maybe the victim pushed his chair to block the lock, then slipped. Or someone set it up to look like a spill. Look for fingerprints on the desk, on the broken pen, and on the lock. And the phone: disconnected—did someone cut the line or just kill the device? Whoever had motive to silence this exec and knew how to lock it from the inside is likely someone in the inner circle. Start with the janitor’s alibi, then sweep the victim’s recent contacts for a threat. And remember: whoever’s watching the van, that’s the next move. You ready to dive in?
Sounds solid. Let’s pull the van logs first—get the timestamps, the keycard swipe data, and the GPS trail for the driver. If the janitor’s device is still in the system, we can trace his comms from the night of the murder. Next, dig into that email: pull the raw headers, check the attachment for any hidden metadata, and see if the domain maps to any known phishing operations. For the desk, a quick forensic sweep for fingerprints on the broken pen and the lock will tell us who handled what. And we’ll double‑check the phone’s disconnect—was it a service outage or a deliberate cut? Once we have that data, we can start piecing the timeline together. Ready to get the data?
Yeah, let’s lock it down—van logs, keycard, GPS, comms. Pull the headers, scan for any sneaky metadata, trace the domain. Do a fingerprint sweep on that pen and lock, check the phone outage. I want the timeline crystal clear so we can nail the killer before they think they’re safe. Ready to hit the data streams. Let's crush this.