How a Deleted File's Metadata Ended a Serial Killer's 30-Year Spree

For thirty years, the man who called himself BTK — Bind, Torture, Kill — terrorized a mid-sized Kansas city. He killed ten people between 1974 and 1991, sending letters to police and newspapers that included details only the killer could know. Then he went silent. For over a decade, nothing. The case went cold. Investigators retired. Witnesses aged. The city moved on.
Then, in January 2004, a letter arrived at the local newspaper. It contained a photocopy of a missing person's driver's license and photos that had never been released. BTK was back. And this time, he wanted to talk.
The Cat and the Mouse
Over the next year, BTK sent eleven communications — packages, letters, postcards. He dropped them in library book returns, taped them to stop signs, left them in the beds of pickup trucks in store parking lots. Each one contained clues, puzzles, a serial killer's version of a chess game with local police. He sent word puzzles. Bound dolls posed in sexual positions. A cereal box with the words “BTK Killer” written on it. He was performing.
The police played their part. They published his messages. They responded to him through the media. They treated him like the genius he believed himself to be. And they waited for him to make a mistake.
The Question
In early 2005, BTK sent a message to a local television station. It was not a taunt this time. It was a question. A surprisingly practical one.
“Can I communicate with Floppy and not be traced to a computer? Be honest.”
The killer wanted to know if sending a floppy disk was safe. If the police could pull information from it that would lead back to him. He was asking his hunters for permission to hand them evidence.
Investigators did not hesitate. Through the station, they placed an ad in the local newspaper's classified section, answering him directly. The response was simple, reassuring, and deliberately false: “Rex, it will be OK.”
The Disk
On February 16, 2005, a purple 1.44-megabyte floppy disk arrived at the television station inside a padded manila envelope. On the disk was a single file: a Microsoft Word document titled “Test A.RTF.” The document itself was mundane — a short note about the next communication, nothing earth-shattering.
But BTK had tried to be careful. He had deleted another file from the disk before sending it. He thought deletion meant destruction. He was wrong.
Deletion on a floppy disk — or any storage medium — does not erase data. It marks the space as available for reuse. The data remains until it is overwritten. The police forensics team recovered the deleted file in minutes.
The Name in the Machine
The recovered file was another Word document. Unremarkable in content. But embedded in its metadata — the hidden properties that every document file carries — were two pieces of information that ended a thirty-year manhunt.
The “Last Modified By” field contained a first name — the killer's real first name.
The document also contained a link to a local church.
An investigator ran the search. The church's congregation council president matched the first name from the metadata. He was sixty years old, married with two children, and worked as a municipal compliance officer in a nearby suburb. He was a scout leader. A member of the congregation for thirty years. The kind of man neighbors described as “a little uptight, but perfectly normal.”
The Arrest
Police obtained a court order for a DNA sample from the suspect's daughter's medical records at a state university. The DNA was a familial match to biological evidence recovered from BTK's crime scenes decades earlier. On February 25, 2005 — nine days after the floppy disk arrived — officers pulled the suspect over during a routine-looking traffic stop.
The church president, the scout leader, the municipal compliance officer, was charged with ten counts of first-degree murder. He later confessed to all of them in a courtroom monologue so detailed and emotionless that the presiding judge visibly struggled to maintain composure. He was sentenced to ten consecutive life terms with no possibility of parole.
What Metadata Reveals About Your Documents
BTK was not careless. He evaded one of the longest serial-killer investigations in American history for three decades. He understood that physical evidence could be traced. He changed his methods, varied his routines, and waited years between communications. What he did not understand was that every digital document carries a hidden biography of its own creation.
Document metadata can include:
- Author name — the username logged into the computer when the file was created or last saved
- Organization — the company or institution name registered in the software
- Creation and modification dates — when the file was first created and last edited
- Software version — the exact application and version used to create the file
- File path — on some systems, the full directory path where the file was saved
- Revision history — how many times the document was edited and by whom
- Embedded comments and tracked changes — deleted text and editorial notes that may still live in the file
None of this requires exotic forensic technology. It is information that every PDF, every Word document, every spreadsheet carries by default. Reading it does not require law enforcement tools — just a metadata viewer.
Every time a document is shared — with a client, a colleague, a court, the public — its metadata goes with it. Without inspection, the sender has no way of knowing what information the file is carrying.
What Files Say About Their Authors
PDFb2's Metadata tool shows the metadata embedded in any PDF file, entirely in the browser — author names, creation dates, software identifiers, custom properties — and can strip anything that should not be shared.
BTK asked investigators if a floppy disk could be traced. They told him it was safe, and he believed them. The real answer was simpler than he imagined. The file contained his name. Not because of some sophisticated forensic technique. Because he never looked at the metadata.
View and Strip PDF Metadata in Your Browser
PDFb2's Metadata tool reveals hidden document properties and removes them on demand. Files never leave the browser.
Inspect PDF Metadata Now