Rex: The Gilgo Beach Architect | The Rex Heuermann Investigation

Inside Heuermann's Murder Planning Document: HK2002-04

Neural Broadcast Network Season 1 Episode 11

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 32:00

A Microsoft Word file labeled HK2002-04, created in 2000 and deleted from the hard drive. Forensically recovered from unallocated space on Heuermann's laptop. Inside: four categories. Problems. Supplies. Dump Sites. Targets.

All sources cited in this episode are available at https://nbn.fm/rex-the-gilgo-beach-architect/episode/ep11.

About the Neural Broadcast Network

NBN is a technology-first media company engineering global IP from the public record. Court filings, forensic evidence, government documents, and primary source journalism, produced through AI-native workflows that let the record speak for itself.

Subscribe to the newsletter: https://nbn.fm/newsletter

SPEAKER_00

A Microsoft Word document. Created in 2000, modified through 2002, deleted from the hard drive but forensically recovered from the unallocated space on Rexierman's laptop. The file was labeled HK 2002-04. Inside it, four categories problems, supplies, dump sites, targets. He organized murder the way he organized architecture.

SPEAKER_01

Yeah, and the gravity of that specific discovery really changes the entire landscape of this investigation. I mean, you are looking at a serial killer maintaining a planning spreadsheet that is structurally identical to a commercial construction project timeline. Right. It is an administrative ledger. He is documenting forensic countermeasures and uh operational logistics in a standard word processor.

SPEAKER_00

You are listening to Rex, the Gilgo Beach architect. Our mission is to walk you through the exact court filings, forensic reports, and digital evidence that exposed a suburban professional's double life.

SPEAKER_01

And we want to be very clear right off the top. Every document, every court filing, and investigative source referenced throughout our analysis is available for a review on the Neural Broadcast Network website.

SPEAKER_00

Because the narrative of this investigation shifts entirely on the recovery of that specific digital file.

SPEAKER_01

It really does, because when investigators executed the search warrant at 105 First Avenue in Massapequa Park, they seized hundreds of electronic devices.

SPEAKER_00

Aaron Powell Hundreds.

SPEAKER_01

Right. But HK 200204 was not sitting in some visible folder on a desktop. It was pulled out of a digital dark zone.

SPEAKER_00

Aaron Powell So explain the mechanics of that to the listener. Yeah. Because you know, when you empty the recycle bin on your computer, you assume that file is gone forever. Sure. How does a document last modified in 2002 survive for over two decades on a hard drive?

SPEAKER_01

Aaron Powell Well, it really comes down to how operating systems actually manage physical storage. When you save a file, the computer writes that data onto the physical sectors of the hard drive and then it creates a directory pointer.

SPEAKER_00

Okay. A pointer.

SPEAKER_01

Yeah, that pointer tells the system exactly where the file lives. So when you hit delete and then you go and empty your digital trash, the operating system does not meticulously erase the underlying ones and zeros.

SPEAKER_00

It doesn't wipe it clean.

SPEAKER_01

No, it simply deletes the pointer. It just marks that physical space on the hard drive as available, or what forensic analysts call unallocated space.

SPEAKER_00

Aaron Powell Let me make sure I have this straight. It is like it's like taking the index card out of a physical library's catalog, right?

SPEAKER_01

That's a good way to look at it.

SPEAKER_00

The librarian looks at the catalog, sees no record of the book, and assumes the shelf is empty. But if you actually walk back into the stacks, the physical book is still sitting right there in the dark.

SPEAKER_01

Aaron Powell That is precisely how it works. The data remains entirely intact in that unallocated space until the system requires that specific physical sector to save a new file.

SPEAKER_00

And then it overwrites it.

SPEAKER_01

Exactly. And because modern hard drives have immense storage capacities, you know, depending on how a specific device is used, a deleted file can sit dormant in that unallocated sector indefinitely.

SPEAKER_00

Aaron Powell So he deletes the file, assuming it is permanently destroyed. But the investigators, they bypass the operating system entirely. Trevor Burrus, Jr.

SPEAKER_01

Correct. Forensic examiners use write-blocking hardware. They connect the C's drive to a laboratory computer in a read-only state.

SPEAKER_00

Aaron Powell Right, ensuring they don't alter a single byte of metadata or accidentally overwrite anything.

SPEAKER_01

Aaron Powell Yeah, that is critical for the chain of evidence. Then they use specialized software to create a bit-by-bit physical image of the drive. Once they have that, they deploy data carving tools that just scan the raw, unallocated space looking for specific file signatures.

SPEAKER_00

And in this case, they were looking for the hexadecimal headers that identify a Microsoft Word document.

SPEAKER_01

Right. They rebuilt the fragmented data structures and essentially resurrected a 20-year-old blueprint.

SPEAKER_00

Which is profound.

SPEAKER_01

Yeah.

SPEAKER_00

But we have to anchor the creation of this document to his specific biographical timeline. The metadata shows the document was created in 2000. Right. And for context, Rex Herriman founded his architectural firm, RH Consultants and Associates, in Manhattan in 1994.

SPEAKER_01

Yeah.

SPEAKER_00

So by the year 2000, he was a 37-year-old licensed architect. You're talking about a man who was securing contracts to design spaces for Catholic charities, American Airlines, and Target.

SPEAKER_01

And that professional context is the lens through which you really have to view this evidence. Because this is not a frantic handwritten record scrawled in a spiral in our book and hidden under a mattress. It is a professional's work product.

SPEAKER_00

He commuted from his family home in Massapequa Park to an office in Manhattan.

SPEAKER_01

Sat down at a keyboard, opened a standard word processing application, and applied the exact methodology of his daily architectural practice to the execution of a double life.

SPEAKER_00

Categorization, logistical supply chains, risk assessment.

SPEAKER_01

Right.

SPEAKER_00

But put yourself in the shoes of the defense attorney for a moment, because I am looking at this prosecution narrative, and my immediate counter-argument is going to be about authorship and custody.

SPEAKER_01

Oh, without a doubt.

SPEAKER_00

I would argue that look, you found a computer in a family home, a home with a wife and children, and you found a deleted file. How do you definitively prove that my client was the individual sitting at the keyboard typing those specific keystrokes?

SPEAKER_01

Well, that is the precise friction point in the pretrial hearings. The defense rigorously challenges the chain of custody of the digital evidence.

SPEAKER_00

They demand strict proofs of authorship.

SPEAKER_01

Yeah. Arguing that simple presence on a household device does not equal intent or execution by the homeowner. Furthermore, they attack the chronological gap.

unknown

Trevor Burrus, Jr.

SPEAKER_00

Right, because the modification dates on HK 2002 or 04 are bracketed between 2000 and 2002.

SPEAKER_01

Right.

SPEAKER_00

And the murders of the victims, known as the Gilgo 4, occurred years later. The defense argues that a document last modified in 2002 cannot definitively establish premeditation for crimes committed a decade after the fact.

SPEAKER_01

Which is a standard defense strategy. But the prosecution's response is multi-layered. They counter the authorship argument by cross-referencing the device's usage logs, router connection histories, and the presence of other highly personal verified documents on that exact same hard drive.

SPEAKER_00

So you look at the digital footprint of who was logged in during the specific modification timestamp.

SPEAKER_01

Exactly. But the most substantial counter to the defense's timeline argument relies on the physical evidence. The prosecution asserts that HK 200204 outlines a rigid operational protocol. And when you examine the physical condition of the victims recovered from the dump sites, the trauma and the forensic countermeasures directly mirror the instructions written in the 2000 to 2002 document.

SPEAKER_00

The execution perfectly matches the blueprint.

SPEAKER_01

It does.

SPEAKER_00

Then we need to open that blueprint and examine exactly what is inside. The document contains 87 distinct details.

SPEAKER_01

87.

SPEAKER_00

Yes. And they are meticulously organized under four primary headers: problems, supplies, DS for dump sites, and TRG for targets.

SPEAKER_01

And it goes even deeper. It further breaks down the logistics into eight operational subcategories: pre-prep, prep-body prep, post-event, recon reports, takedowns, pickup, dispose of, and things to remember.

SPEAKER_00

I mean, the level of categorization is indistinguishable from a commercial site plan.

SPEAKER_01

It really is.

SPEAKER_00

Let us begin with the first primary header. Problems. The prosecution classifies this section as a ledger of forensic countermeasures. I'm looking at the document here, and it specifically says under the problems category: DNA, tire marks, blood stains, fingerprints, MO, plastic bag slash cat litter, witness elimination, supply tracing, foot slash shoe prints, photographs, misleaders, police stops, truck immobilization, fingerprints and gloves, classic bag matching, hair and fiber.

SPEAKER_01

You have to analyze that list for what it truly is because it is not a list of anxieties from a panicking offender. It is a clinical evasion strategy. Consider the year. In 2000, DNA analysis was utilized in criminal justice, sure, but it was not the ubiquitous, universally understood concept you see in popular media. Trevor Burrus, Jr.

SPEAKER_00

Right. It wasn't on every television show yet. Exactly.

SPEAKER_01

Yet he explicitly categorized DNA and hair and fiber as primary logistical hurdles. He calculated the risk of bloodstain transfer. He identified the locational giveaway of tire tracks at remote scenes.

SPEAKER_00

But the entry that stands out most prominently to me is police stops.

SPEAKER_01

Yes.

SPEAKER_00

Because if you look at the history of criminal investigations, a routine traffic stop is often the unpredictable variable that exposes a methodical offender. Oh, absolutely. An expired registration or a broken taillight introduces an uncontrollable third-party, a patrol officer, into the operation.

SPEAKER_01

Right. And his inclusion of police stops demonstrates an advanced procedural awareness. He anticipated the severe logistical risk of being pulled over by law enforcement while transporting evidence or victims in a vehicle.

SPEAKER_00

Which indicates he was actively studying criminal procedure.

SPEAKER_01

He was. He was plotting defensive driving tactics, checking his vehicle's equipment, and mapping transportation routes specifically designed to minimize the probability of intersecting with a patrol unit.

SPEAKER_00

And that exact procedural awareness translates directly into the next major header. I'm looking at the document here, and it specifically says under the supplies category. Booties, lie slash acid, police scanner, rope slash cord, saws slash cutting tools, hairnets, photo film, burn can, foam drain cleaner, body wash slash wipes, tarp slash drop clothes, medical gloves, bags slash tape, large electrical clips, ratcheted cargo straps.

SPEAKER_01

Notice how the supplies directly answer the problems.

SPEAKER_00

They map right to each other.

SPEAKER_01

Yeah. He identified hair and fiber as a problem, so he listed hairnets and booties as supplies. That is a concerted effort at contamination control.

SPEAKER_00

He listed bloodstains as a problem, so he procured tarps, drop clothes, and body wash/slash wipes.

SPEAKER_01

Right. But the inclusion of the police scanner is the crucial operational link here.

SPEAKER_00

Explain how a police scanner functions in this context. Because it's not just about listening to the local news broadcasts.

SPEAKER_01

No, not at all. A police scanner is a tool for real-time operational surveillance. It allows an individual to intercept and monitor local law enforcement radio traffic on specific UHF and VHF frequencies.

SPEAKER_00

So by tuning into the dispatch channels of the local precincts covering his operational areas, he could track the physical locations of patrol cars.

SPEAKER_01

Exactly. He could determine if a civilian had called in a suspicious vehicle report. He used it to ensure his selected areas were completely clear of law enforcement before initiating any movement. It is fundamentally an offensive intelligence gathering tool.

SPEAKER_00

And we see that same geographic intelligence applied in the DS or dump sites category.

SPEAKER_01

We do.

SPEAKER_00

The document lists DS-1 Mill Road, along with notes on other reconnaissance areas and dumpster sites. Mill Road is geographically significant because it leads toward the Gilgo Beach corridor along Ocean Parkway.

SPEAKER_01

You really have to understand the specific layout of Ocean Parkway to grasp why it was selected. It is a geography of deliberate concealment. Right. It is a remote, narrow, two-lane strip of roadway situated on a barrier island. On one side, you have dense, unmaintained coastal brush and thick brambles adjacent to state parkland.

SPEAKER_00

And crucially, because it is a barrier island, it is accessed by very few single road entry and exit points. There are no intersecting cross streets for miles.

SPEAKER_01

Which means if you are parked on the shoulder at two in the morning, you have massive sight lines.

SPEAKER_00

You can see the headlights of any approaching vehicle, police or civilian, from miles away.

SPEAKER_01

Giving you ample time to cease activity and blend in, it minimizes the likelihood of incidental traffic and provides a massive tactical advantage.

SPEAKER_00

Which brings us to the TRG or targets category. This section outlines his victim selection criteria. I'm looking at the document here, and it specifically says T1 Megan, small is good, and T U N K, in parentheses black. This is the documentation of a highly specific predatory pattern.

SPEAKER_01

The investigation confirmed that the targeting focused exclusively on sex workers. These individuals were contacted through prepaid communication networks, burner phones, and online escort listings.

SPEAKER_00

And the operational logic behind this selection is explicitly detailed in the prosecution's filings.

SPEAKER_01

Right. He targeted a demographic that he perceived as vulnerable. These individuals were highly mobile. They were required to maintain strict anonymity for their own security.

SPEAKER_00

And they often operated without third-party oversight or immediate physical protection.

SPEAKER_01

The brutal reality is that he targeted them because he calculated that their lifestyle would maximize the window of time between their disappearance and the filing of a formal missing persons report by a family member.

SPEAKER_00

That is the grim calculus. And the document elaborates on exactly how he planned to exploit that window. The pre-prep section details monitoring weather reports.

SPEAKER_01

Yeah.

SPEAKER_00

It details conducting video camera reconnaissance on specific local routes, specifically naming routes 112 and 231.

SPEAKER_01

He was driving those rights looking for civilian and commercial security cameras. He was mapping the blind spots. He was charting paths that would leave no digital record of his vehicle's movement.

SPEAKER_00

And the document uses the terminology hunts to describe this scouting process.

SPEAKER_01

It does. And under the takedownslash pickup section, there are specific warnings to himself about hunt duration. He was strictly timing his operations.

SPEAKER_00

If an operation took too long, the exposure risk increased.

SPEAKER_01

Right. And the document suggests he had internal protocols to abort if that happened.

SPEAKER_00

We have to connect the body prep section of this document directly to the physical recovery of the victims. And we discuss these victims with the absolute utmost respect for their lives and their dignity.

SPEAKER_01

Always.

SPEAKER_00

Valerie Mack was a 24-year-old mother who lived in Philadelphia and New Jersey. Jessica Taylor was 20 years old from Poughkeepsie, New York. We have to look at the forensic reality of how they were recovered, because it is the linchpin of the prosecution's case.

SPEAKER_01

The body prep section of HK 200204 provides a clinical checklist. Washing, trace evidence removal, DNA elimination, decapitation, identification mark removal, specifically noting tattoos, and hand removal.

SPEAKER_00

And when investigators recovered the remains of Valerie Mack and Jessica Taylor, the physical evidence precisely matched that 2000 to 2002 blueprint.

SPEAKER_01

It did. Both victims were decapitated. Both victims had their hands removed, which thwarts fingerprint identification.

SPEAKER_00

Furthermore, Jessica Taylor exhibited specific linear sharp force injuries where a tattoo had been intentionally mutilated.

SPEAKER_01

The Hiller actively tried to obliterate a unique identifying mark, exactly as the document instructed.

SPEAKER_00

The correlation between the written protocol in HK 200204 and the physical trauma inflicted upon Valerie Mack and Jessica Taylor is the evidentiary bridge.

SPEAKER_01

It is the anchor. It links the theoretical digital planning document found on the hard drive to the practical execution of the crimes in the physical world.

SPEAKER_00

It proves the document was not a fantasy, it was an applied manual.

SPEAKER_01

Yes, and the document also provides a clear window into how he was educating himself to write that manual. Right. In the Knights section of HK 200204, the text specifically cites FBI profiler John Douglas's books. It names Mindhunter and the cases that haunt us.

SPEAKER_00

The document references specific page numbers regarding sex substitution, disorganization theory, and victim analysis. He was actively studying the foundational texts of serial killer profiling.

SPEAKER_01

And this is a critical psychological insight. He was reading the FBI's own playbook.

unknown

Right.

SPEAKER_01

And I wanted to understand how behavioral analysts build profiles, how crime scene technicians process evidence, and fundamentally the common mistakes that result in offenders being caught.

SPEAKER_00

He studied law enforcement methodology so he can reverse engineer his own evasion strategies.

SPEAKER_01

Exactly. And during the execution of search warrants, investigators actually located a physical copy of the cases that haunt us sitting in his Manhattan architectural office.

SPEAKER_00

He applied that reverse-engineered strategy heavily to his communication methods. Investigators mapped out a massive complex network of prepaid cellular devices.

SPEAKER_01

They identified a total of seven prepaid burner phones that were utilized to contact victims and coordinate meetings.

SPEAKER_00

Seven phones. And the operational compartmentalization of that network is intense. Four of those specific burner phones were used to contact dozens of sex workers more than 500 times in the two years immediately preceding his arrest.

SPEAKER_01

The established pattern demonstrates extreme discipline. He would acquire a prepaid device, utilize it for a specific operation or a brief, defined time period, and then permanently discard it shortly after a victim's death.

SPEAKER_00

He kept his criminal communications completely firewalled from his personal cell phone and his architectural firm's communications.

SPEAKER_01

Completely separate.

SPEAKER_00

It was a sustained, deliberate management of a shadow network over a period of years.

SPEAKER_01

However, that entire sprawling digital infrastructure contained a single critical point of failure. Right. One of those prepaid burner phones, a vital operational tool, was purchased using Rex Heurerman's personal credit card.

SPEAKER_00

I have to stop you there because as an investigator, that detail is jarring.

SPEAKER_01

It really is.

SPEAKER_00

You have a man who drafted a highly complex encrypted Word document cataloging forensic countermeasures. He is utilizing hair nets, booties, and foam drain cleaner to destroy trace evidence.

SPEAKER_01

Yeah.

SPEAKER_00

He is monitoring tactical radio frequencies on a police scanner. He is studying the published textbooks of FBI behavioral analysts. Right. How does a man with that level of meticulous paranoia execute a financial transaction for a burner phone using a credit card with his own legal name and home billing address?

SPEAKER_01

Well, it is the ultimate paradox of the organized offender. They can plan for the most complex forensic contingencies, DNA transfer, blood spatter, digital routing, but they're still human beings prone to the banality of administrative errors. Trevor Burrus, Jr.

SPEAKER_00

It's an administrative mistake.

SPEAKER_01

Exactly. Perhaps he was rushed. Perhaps he lacked the cash on hand at that exact moment and assumed a low-dollar prepaid phone purchase would vanish into the millions of daily retail transactions.

SPEAKER_00

But that single lapse in discipline shattered the anonymity of his entire burner phone network.

SPEAKER_01

It did. That credit card transaction gave investigators a name. It allowed them to link a specific anonymous device directly to Rex Heurman.

SPEAKER_00

And from that point, they utilized cell tower data to build what the task force calls the box.

SPEAKER_01

Cell site analysis is foundational to establishing the physical timeline. In 2012, with assistance from the FBI's Operational Technology Division, analysts reviewed the routing data for the burner phones.

SPEAKER_00

Right, because when a cellular device connects to a network, it constantly pings the nearest cell towers to maintain a signal.

SPEAKER_01

Yes. The network records which specific tower and which specific directional sector of that tower the phone communicates with. By analyzing these call detail records, investigators determined that calls made from the burner phones were routinely routing through a very concentrated cluster of cell towers located in Massive Pequa Park.

SPEAKER_00

They mapped the geographic radius of those tower pings, and that physical coverage zone became the box.

SPEAKER_01

Correct. But the breakthrough came when investigators overlaid the billing records and location data from Hurriman's personal registered cell phone. The data show that his personal phone was pinging within that exact same geographic box during the identical time windows that the anonymous burner phones were active.

SPEAKER_00

You have two separate devices. Yeah. One is registered to a Manhattan architect, one is an anonymous burner phone calling sex workers. Yeah. And both devices are operating simultaneously, sitting in the exact same narrow geographic location in Mass Pequal Park.

SPEAKER_01

That overlapping data is the undeniable physical link. And the sobering reality of this investigation is that this crucial overlapping data sat within the broader, massive volume of case files for over a decade.

SPEAKER_00

Just sitting there in the archives.

SPEAKER_01

Right. It was not until the newly formed Gilgo Homicide Task Force initiated a comprehensive review of the legacy data that an investigator recognized the significance of that overlap.

SPEAKER_00

His surveillance behavior did not stop at burner phones. It extended deep into his internet activity. Investigators documented the creation of multiple fake email accounts.

SPEAKER_01

He linked these fictitious accounts to services like Google Pay and Tinder, utilizing them to move anonymously through online spaces.

SPEAKER_00

The search history associated with those anonymous accounts forms a critical pillar of the indictment. Through these fake profiles, he executed over 200 distinct Google searches, specifically monitoring the progress of the Gilgo Beach investigation.

SPEAKER_01

He was not just casually watching the evening news.

SPEAKER_00

No.

SPEAKER_01

He was running targeted queries for updates on the task force's structure. He was looking up the names of specific lead investigators. He was tracking exactly what forensic information the police departments were releasing to the media.

SPEAKER_00

He was actively surveilling the task force that was hunting him.

SPEAKER_01

He was using those digital tools to gauge how close law enforcement was getting to his physical location. The true scale of his hidden infrastructure was fully exposed during the execution of the search warrants following his arrest.

SPEAKER_00

On July 13th, 2023, investigators initiated a massive 12-day search of the residence at 105 First Avenue.

SPEAKER_01

Right, and detailed the logistics of that search for the listener because this was not a standard walkthrough with a few evidence bags.

SPEAKER_00

Not at all. The physical excavation was an industrial scale operation. Investigators brought in ground penetrating radar to map the subsurface anomalies of the property.

SPEAKER_01

They deployed heavy construction equipment to physically excavate portions of the yard.

SPEAKER_00

And inside the residence, beneath the floorboards, they discovered a reinforced basement vault.

SPEAKER_01

A reinforced vault built into the foundation of a suburban family home.

SPEAKER_00

Yes. From that vault and the surrounding property, investigators seized nearly 300 firearms.

SPEAKER_01

300?

SPEAKER_00

They recovered hundreds of electronic devices, hard drives, laptops, cellular phones, flash drives. You have to consider the sheer volume of that seizure and the years of labor required to build and supply a concealment infrastructure of that magnitude.

SPEAKER_01

Defense naturally presses heavily on the chain of evidence connecting those physical items to the specific charged crimes. Right. They argue accurately that a credit card purchase of a phone proves contact, but it does not definitively prove murder. They argue that owning a vault full of legally or illegally acquired firearms does not legally equate to committing a homicide on Ocean Parkway.

SPEAKER_00

And the defense's job is to isolate each piece of evidence and argue that independently it proves nothing.

SPEAKER_01

Exactly. But the prosecution's position is that the totality of the evidence forms an irrefutable matrix. The credit card purchase identifies the specific user of the burner phone.

SPEAKER_00

The cell tower data physically places that burner phone in the exact same room with Jurman's personal phone in Mass Peacoel Park.

SPEAKER_01

Right. The call logs on that burner phone link directly to the victim's final known communications. And the recovered document, HK 200204, outlines the precise methodology that matches the physical trauma found on the victim's remains at the recovery sites.

SPEAKER_00

It does. But this brings us to the profound blind spots in the investigation.

SPEAKER_01

Over 500 unidentified contacts. The task force is currently undertaking the massive burden of determining who those individuals are. They must investigate whether those specific digital contacts correlate with other missing persons' reports, unsolved homicides, or Jane Doe recoveries in the tri-state area.

SPEAKER_00

There is a vast void in the digital data that represents potential uncharged cases connected to this web. But the most significant timeline discrepancy, the anomaly that forces a complete re-evaluation of the entire chronological narrative centing on the murder of Sandra Fastilla.

SPEAKER_01

The Castilla case disrupts everything we assumed about his operational timeline.

SPEAKER_00

We must outline her case clearly. Sandra Castilla was 28 years old. She was a native of Trinidad and Tobago, living in Queens, New York. Right. She was the mother of a five-year-old son. She was murdered on or about November 19th to November 20th, 1993.

SPEAKER_01

And for context, in November 1993, Rex Heurman was 30 years old. This is one full year before he even founded his architecture firm in Manhattan.

SPEAKER_00

The forensic evidence in the Sandra Castilla case is stark and brutal. She was strangled. Her remains exhibited 25 distinct sharp force injuries, which medical examiners determined were inflicted post-mortem.

SPEAKER_01

Her remains were recovered in a wooded area near Fish Cove Road in North Sea, Southampton.

SPEAKER_00

The connection between a 1993 murder in Southampton and the Gilgo Beach Task Force relies entirely on advanced forensic technology. Three specific strands of male hair were recovered from Sandra Castilla's remains during the initial investigation in 1993.

SPEAKER_01

And those hairs were carefully preserved in evidence lockup for decades. In 2023 and 2024, utilizing modern DNA analysis techniques that did not exist in the early 90s, forensic laboratories retested those three strands.

SPEAKER_00

The DNA profile extracted from the male hair samples matched Rex Eurman. Based on that match, he formally pleaded guilty to her murder, alongside the murders of the Gilgo 4 and Karen Vergata.

SPEAKER_01

The investigative question here is structural. If Sandra Castillo was murdered in 1993 and the HK-200204 planning blueprint was created in 2000, what occurred during those seven missing years?

SPEAKER_00

That is the paramount question facing the task force. Does the creation of the document in 2000 indicate that his methodology formalized over time?

SPEAKER_01

Did he operate for seven years, realize he was making logistical errors or leaving trace evidence, and decide he required the rigid administrative organization of an architectural ledger?

SPEAKER_00

Or, more concerningly, are there earlier iterations of this planning document, physical notebooks or older digital files that investigators have not yet located?

SPEAKER_01

Right. And the Castilla case also highlights a critical historical error in the region's investigative past.

SPEAKER_00

Yes, because for years, law enforcement and the public attributed Sandra Castilla's murder to John Bitroff, a convicted killer from Manorville.

SPEAKER_01

The same advanced DNA testing that linked Hurriman to Castilla simultaneously cleared John Bitrolf of that specific murder.

SPEAKER_00

Bitrof remains convicted and incarcerated for the murders of Rita Tangrady in November 1993 and Colleen McNamy in January 1994.

SPEAKER_01

But the forensic clearance of Bitrolf in the Castilla case revealed a grim, sobering reality. You had two different prolific serial killers operating independently in Suffolk County simultaneously in the early 1990s.

SPEAKER_00

The geographic overlap is striking.

SPEAKER_01

It really is.

SPEAKER_00

The investigative task force utilized multiple streams of physical and digital tracking to separate those cases and build the current evidentiary framework. Beyond the burner phones and the planning document, they gathered corroborating physical evidence from witness testimony.

SPEAKER_01

Right. During the investigation into the disappearance of victim Amber Costello, a witness provided a very specific description of a vehicle and its driver.

SPEAKER_00

The witness described the driver as appearing like an ogre and noted the vehicle was a distinct first-generation Chevrolet Avalanche.

SPEAKER_01

In March 2022, detectives utilized vehicle registration databases to conclusively connect Rex Hewerman to a first-generation Chevrolet Avalanche.

SPEAKER_00

But matching a vehicle description is not enough for an indictment. The collection of the confirmation DNA demonstrates the protracted, methodical nature of the surveillance operation. Investigators needed a direct, fresh DNA sample from Hewerman to compare against the forensic evidence gathered from the victims over the past decade.

SPEAKER_01

Right, and on January 26, 2023, surveillance teams tracking his movements in Manhattan observed him discard a pizza box into a sidewalk trash can.

SPEAKER_00

Investigators immediately secured that trash can and retrieved the pizza box. The forensic laboratory processed the discarded material, specifically extracting mitochondrial DNA.

SPEAKER_01

It is essential to explain the difference between nuclear DNA and mitochondrial DNA in this context. Nuclear DNA is found in the center of the cell and provides a unique, highly specific profile of an individual. Mitochondrial DNA is found in the mitochondria surrounding the nucleus and it traces the maternal lineage. Right. Many hair shafts recovered from crime scenes lack the root, meaning they lack nuclear DNA. But laboratories can still extract mitochondrial DNA from the shaft itself.

SPEAKER_00

They extracted the mitochondrial DNA from the pizza box and compared that profile against the male hair recovered from the remains of victim Megan Waterman.

SPEAKER_01

And the profiles matched, excluding 99.96% of the North American population.

SPEAKER_00

That statistic is the anchor. Yet even with these definitive forensic matches, the scope of the investigation is far from complete. You have to return to the hundreds of electronic devices pulled from the basement vault at 105 First Avenue.

SPEAKER_01

A complete digital forensic review of hundreds of hard drives, laptops, cellular devices, and flash drives requires years of processing.

SPEAKER_00

Years.

SPEAKER_01

The sheer volume of raw data means the full scope of his activities, his communications, and his potential victims remains incomplete. The task force is parsing through decades of digital storage, bite by bite.

SPEAKER_00

As we synthesize the evidence presented in the filings, you are confronted by dual structures operating simultaneously. On the surface, there's the public architect. He built a successful career over decades, negotiating complex zoning contracts, meeting strict project deadlines, and designing infrastructure for major American institutions in Manhattan. He raised a family in a suburban home.

SPEAKER_01

But beneath that surface, he engineered and maintained a subterranean infrastructure. He meticulously managed a network of prepaid burner phones, discarding them after a kill.

SPEAKER_00

He created fake email accounts to surveil the police task force. He amassed an arsenal of nearly 300 firearms inside a reinforced basement vault.

SPEAKER_01

And he authored, updated and relied upon the HK 200204 document.

SPEAKER_00

The central thesis of the prosecution's case is that he built a system. Document HK 200204 provides the ultimate conclusion regarding his methodology. It proves this was not an impulsive, disorganized predator reacting to momentary opportunity.

SPEAKER_01

The forensic reality forces an acknowledgement that a functioning, employed professional constructed and maintained a flawless apparatus for murder, operating it concurrently with his everyday life for decades.

SPEAKER_00

Next time, December 2010, a police canine unit finds the first body on Ocean Parkway. Within 48 hours, three more. The discovery that changed everything.

SPEAKER_01

Everything we cited is sourced on the Neural Broadcast Network website.