Rex: The Gilgo Beach Architect | The Rex Heuermann Investigation
Rex Heuermann murdered eight women on Long Island between 1993 and 2010 while working as a Manhattan architect for companies like American Airlines, Target, and Nike. The investigation that should have caught him was obstructed by the very officials running it, with three Suffolk County law enforcement officials eventually going to federal prison for corruption that kept the FBI locked out of the case for years.
This series reconstructs the entire Gilgo Beach case from court filings, cell tower records, DNA evidence, witness testimony, and the public record. Every claim is sourced and cited on NBN.fm.
A 25-episode investigative series from the Neural Broadcast Network.
Rex: The Gilgo Beach Architect | The Rex Heuermann Investigation
Inside Heuermann's Murder Planning Document: HK2002-04
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
A Microsoft Word file labeled HK2002-04, created in 2000 and deleted from the hard drive. Forensically recovered from unallocated space on Heuermann's laptop. Inside: four categories. Problems. Supplies. Dump Sites. Targets.
All sources cited in this episode are available at https://nbn.fm/rex-the-gilgo-beach-architect/episode/ep11.
About the Neural Broadcast Network
NBN is a technology-first media company engineering global IP from the public record. Court filings, forensic evidence, government documents, and primary source journalism, produced through AI-native workflows that let the record speak for itself.
Subscribe to the newsletter: https://nbn.fm/newsletter
A Microsoft Word document. Created in 2000, modified through 2002, deleted from the hard drive but forensically recovered from the unallocated space on Rexierman's laptop. The file was labeled HK 2002-04. Inside it, four categories problems, supplies, dump sites, targets. He organized murder the way he organized architecture.
SPEAKER_01Yeah, and the gravity of that specific discovery really changes the entire landscape of this investigation. I mean, you are looking at a serial killer maintaining a planning spreadsheet that is structurally identical to a commercial construction project timeline. Right. It is an administrative ledger. He is documenting forensic countermeasures and uh operational logistics in a standard word processor.
SPEAKER_00You are listening to Rex, the Gilgo Beach architect. Our mission is to walk you through the exact court filings, forensic reports, and digital evidence that exposed a suburban professional's double life.
SPEAKER_01And we want to be very clear right off the top. Every document, every court filing, and investigative source referenced throughout our analysis is available for a review on the Neural Broadcast Network website.
SPEAKER_00Because the narrative of this investigation shifts entirely on the recovery of that specific digital file.
SPEAKER_01It really does, because when investigators executed the search warrant at 105 First Avenue in Massapequa Park, they seized hundreds of electronic devices.
SPEAKER_00Aaron Powell Hundreds.
SPEAKER_01Right. But HK 200204 was not sitting in some visible folder on a desktop. It was pulled out of a digital dark zone.
SPEAKER_00Aaron Powell So explain the mechanics of that to the listener. Yeah. Because you know, when you empty the recycle bin on your computer, you assume that file is gone forever. Sure. How does a document last modified in 2002 survive for over two decades on a hard drive?
SPEAKER_01Aaron Powell Well, it really comes down to how operating systems actually manage physical storage. When you save a file, the computer writes that data onto the physical sectors of the hard drive and then it creates a directory pointer.
SPEAKER_00Okay. A pointer.
SPEAKER_01Yeah, that pointer tells the system exactly where the file lives. So when you hit delete and then you go and empty your digital trash, the operating system does not meticulously erase the underlying ones and zeros.
SPEAKER_00It doesn't wipe it clean.
SPEAKER_01No, it simply deletes the pointer. It just marks that physical space on the hard drive as available, or what forensic analysts call unallocated space.
SPEAKER_00Aaron Powell Let me make sure I have this straight. It is like it's like taking the index card out of a physical library's catalog, right?
SPEAKER_01That's a good way to look at it.
SPEAKER_00The librarian looks at the catalog, sees no record of the book, and assumes the shelf is empty. But if you actually walk back into the stacks, the physical book is still sitting right there in the dark.
SPEAKER_01Aaron Powell That is precisely how it works. The data remains entirely intact in that unallocated space until the system requires that specific physical sector to save a new file.
SPEAKER_00And then it overwrites it.
SPEAKER_01Exactly. And because modern hard drives have immense storage capacities, you know, depending on how a specific device is used, a deleted file can sit dormant in that unallocated sector indefinitely.
SPEAKER_00Aaron Powell So he deletes the file, assuming it is permanently destroyed. But the investigators, they bypass the operating system entirely. Trevor Burrus, Jr.
SPEAKER_01Correct. Forensic examiners use write-blocking hardware. They connect the C's drive to a laboratory computer in a read-only state.
SPEAKER_00Aaron Powell Right, ensuring they don't alter a single byte of metadata or accidentally overwrite anything.
SPEAKER_01Aaron Powell Yeah, that is critical for the chain of evidence. Then they use specialized software to create a bit-by-bit physical image of the drive. Once they have that, they deploy data carving tools that just scan the raw, unallocated space looking for specific file signatures.
SPEAKER_00And in this case, they were looking for the hexadecimal headers that identify a Microsoft Word document.
SPEAKER_01Right. They rebuilt the fragmented data structures and essentially resurrected a 20-year-old blueprint.
SPEAKER_00Which is profound.
SPEAKER_01Yeah.
SPEAKER_00But we have to anchor the creation of this document to his specific biographical timeline. The metadata shows the document was created in 2000. Right. And for context, Rex Herriman founded his architectural firm, RH Consultants and Associates, in Manhattan in 1994.
SPEAKER_01Yeah.
SPEAKER_00So by the year 2000, he was a 37-year-old licensed architect. You're talking about a man who was securing contracts to design spaces for Catholic charities, American Airlines, and Target.
SPEAKER_01And that professional context is the lens through which you really have to view this evidence. Because this is not a frantic handwritten record scrawled in a spiral in our book and hidden under a mattress. It is a professional's work product.
SPEAKER_00He commuted from his family home in Massapequa Park to an office in Manhattan.
SPEAKER_01Sat down at a keyboard, opened a standard word processing application, and applied the exact methodology of his daily architectural practice to the execution of a double life.
SPEAKER_00Categorization, logistical supply chains, risk assessment.
SPEAKER_01Right.
SPEAKER_00But put yourself in the shoes of the defense attorney for a moment, because I am looking at this prosecution narrative, and my immediate counter-argument is going to be about authorship and custody.
SPEAKER_01Oh, without a doubt.
SPEAKER_00I would argue that look, you found a computer in a family home, a home with a wife and children, and you found a deleted file. How do you definitively prove that my client was the individual sitting at the keyboard typing those specific keystrokes?
SPEAKER_01Well, that is the precise friction point in the pretrial hearings. The defense rigorously challenges the chain of custody of the digital evidence.
SPEAKER_00They demand strict proofs of authorship.
SPEAKER_01Yeah. Arguing that simple presence on a household device does not equal intent or execution by the homeowner. Furthermore, they attack the chronological gap.
unknownTrevor Burrus, Jr.
SPEAKER_00Right, because the modification dates on HK 2002 or 04 are bracketed between 2000 and 2002.
SPEAKER_01Right.
SPEAKER_00And the murders of the victims, known as the Gilgo 4, occurred years later. The defense argues that a document last modified in 2002 cannot definitively establish premeditation for crimes committed a decade after the fact.
SPEAKER_01Which is a standard defense strategy. But the prosecution's response is multi-layered. They counter the authorship argument by cross-referencing the device's usage logs, router connection histories, and the presence of other highly personal verified documents on that exact same hard drive.
SPEAKER_00So you look at the digital footprint of who was logged in during the specific modification timestamp.
SPEAKER_01Exactly. But the most substantial counter to the defense's timeline argument relies on the physical evidence. The prosecution asserts that HK 200204 outlines a rigid operational protocol. And when you examine the physical condition of the victims recovered from the dump sites, the trauma and the forensic countermeasures directly mirror the instructions written in the 2000 to 2002 document.
SPEAKER_00The execution perfectly matches the blueprint.
SPEAKER_01It does.
SPEAKER_00Then we need to open that blueprint and examine exactly what is inside. The document contains 87 distinct details.
SPEAKER_0187.
SPEAKER_00Yes. And they are meticulously organized under four primary headers: problems, supplies, DS for dump sites, and TRG for targets.
SPEAKER_01And it goes even deeper. It further breaks down the logistics into eight operational subcategories: pre-prep, prep-body prep, post-event, recon reports, takedowns, pickup, dispose of, and things to remember.
SPEAKER_00I mean, the level of categorization is indistinguishable from a commercial site plan.
SPEAKER_01It really is.
SPEAKER_00Let us begin with the first primary header. Problems. The prosecution classifies this section as a ledger of forensic countermeasures. I'm looking at the document here, and it specifically says under the problems category: DNA, tire marks, blood stains, fingerprints, MO, plastic bag slash cat litter, witness elimination, supply tracing, foot slash shoe prints, photographs, misleaders, police stops, truck immobilization, fingerprints and gloves, classic bag matching, hair and fiber.
SPEAKER_01You have to analyze that list for what it truly is because it is not a list of anxieties from a panicking offender. It is a clinical evasion strategy. Consider the year. In 2000, DNA analysis was utilized in criminal justice, sure, but it was not the ubiquitous, universally understood concept you see in popular media. Trevor Burrus, Jr.
SPEAKER_00Right. It wasn't on every television show yet. Exactly.
SPEAKER_01Yet he explicitly categorized DNA and hair and fiber as primary logistical hurdles. He calculated the risk of bloodstain transfer. He identified the locational giveaway of tire tracks at remote scenes.
SPEAKER_00But the entry that stands out most prominently to me is police stops.
SPEAKER_01Yes.
SPEAKER_00Because if you look at the history of criminal investigations, a routine traffic stop is often the unpredictable variable that exposes a methodical offender. Oh, absolutely. An expired registration or a broken taillight introduces an uncontrollable third-party, a patrol officer, into the operation.
SPEAKER_01Right. And his inclusion of police stops demonstrates an advanced procedural awareness. He anticipated the severe logistical risk of being pulled over by law enforcement while transporting evidence or victims in a vehicle.
SPEAKER_00Which indicates he was actively studying criminal procedure.
SPEAKER_01He was. He was plotting defensive driving tactics, checking his vehicle's equipment, and mapping transportation routes specifically designed to minimize the probability of intersecting with a patrol unit.
SPEAKER_00And that exact procedural awareness translates directly into the next major header. I'm looking at the document here, and it specifically says under the supplies category. Booties, lie slash acid, police scanner, rope slash cord, saws slash cutting tools, hairnets, photo film, burn can, foam drain cleaner, body wash slash wipes, tarp slash drop clothes, medical gloves, bags slash tape, large electrical clips, ratcheted cargo straps.
SPEAKER_01Notice how the supplies directly answer the problems.
SPEAKER_00They map right to each other.
SPEAKER_01Yeah. He identified hair and fiber as a problem, so he listed hairnets and booties as supplies. That is a concerted effort at contamination control.
SPEAKER_00He listed bloodstains as a problem, so he procured tarps, drop clothes, and body wash/slash wipes.
SPEAKER_01Right. But the inclusion of the police scanner is the crucial operational link here.
SPEAKER_00Explain how a police scanner functions in this context. Because it's not just about listening to the local news broadcasts.
SPEAKER_01No, not at all. A police scanner is a tool for real-time operational surveillance. It allows an individual to intercept and monitor local law enforcement radio traffic on specific UHF and VHF frequencies.
SPEAKER_00So by tuning into the dispatch channels of the local precincts covering his operational areas, he could track the physical locations of patrol cars.
SPEAKER_01Exactly. He could determine if a civilian had called in a suspicious vehicle report. He used it to ensure his selected areas were completely clear of law enforcement before initiating any movement. It is fundamentally an offensive intelligence gathering tool.
SPEAKER_00And we see that same geographic intelligence applied in the DS or dump sites category.
SPEAKER_01We do.
SPEAKER_00The document lists DS-1 Mill Road, along with notes on other reconnaissance areas and dumpster sites. Mill Road is geographically significant because it leads toward the Gilgo Beach corridor along Ocean Parkway.
SPEAKER_01You really have to understand the specific layout of Ocean Parkway to grasp why it was selected. It is a geography of deliberate concealment. Right. It is a remote, narrow, two-lane strip of roadway situated on a barrier island. On one side, you have dense, unmaintained coastal brush and thick brambles adjacent to state parkland.
SPEAKER_00And crucially, because it is a barrier island, it is accessed by very few single road entry and exit points. There are no intersecting cross streets for miles.
SPEAKER_01Which means if you are parked on the shoulder at two in the morning, you have massive sight lines.
SPEAKER_00You can see the headlights of any approaching vehicle, police or civilian, from miles away.
SPEAKER_01Giving you ample time to cease activity and blend in, it minimizes the likelihood of incidental traffic and provides a massive tactical advantage.
SPEAKER_00Which brings us to the TRG or targets category. This section outlines his victim selection criteria. I'm looking at the document here, and it specifically says T1 Megan, small is good, and T U N K, in parentheses black. This is the documentation of a highly specific predatory pattern.
SPEAKER_01The investigation confirmed that the targeting focused exclusively on sex workers. These individuals were contacted through prepaid communication networks, burner phones, and online escort listings.
SPEAKER_00And the operational logic behind this selection is explicitly detailed in the prosecution's filings.
SPEAKER_01Right. He targeted a demographic that he perceived as vulnerable. These individuals were highly mobile. They were required to maintain strict anonymity for their own security.
SPEAKER_00And they often operated without third-party oversight or immediate physical protection.
SPEAKER_01The brutal reality is that he targeted them because he calculated that their lifestyle would maximize the window of time between their disappearance and the filing of a formal missing persons report by a family member.
SPEAKER_00That is the grim calculus. And the document elaborates on exactly how he planned to exploit that window. The pre-prep section details monitoring weather reports.
SPEAKER_01Yeah.
SPEAKER_00It details conducting video camera reconnaissance on specific local routes, specifically naming routes 112 and 231.
SPEAKER_01He was driving those rights looking for civilian and commercial security cameras. He was mapping the blind spots. He was charting paths that would leave no digital record of his vehicle's movement.
SPEAKER_00And the document uses the terminology hunts to describe this scouting process.
SPEAKER_01It does. And under the takedownslash pickup section, there are specific warnings to himself about hunt duration. He was strictly timing his operations.
SPEAKER_00If an operation took too long, the exposure risk increased.
SPEAKER_01Right. And the document suggests he had internal protocols to abort if that happened.
SPEAKER_00We have to connect the body prep section of this document directly to the physical recovery of the victims. And we discuss these victims with the absolute utmost respect for their lives and their dignity.
SPEAKER_01Always.
SPEAKER_00Valerie Mack was a 24-year-old mother who lived in Philadelphia and New Jersey. Jessica Taylor was 20 years old from Poughkeepsie, New York. We have to look at the forensic reality of how they were recovered, because it is the linchpin of the prosecution's case.
SPEAKER_01The body prep section of HK 200204 provides a clinical checklist. Washing, trace evidence removal, DNA elimination, decapitation, identification mark removal, specifically noting tattoos, and hand removal.
SPEAKER_00And when investigators recovered the remains of Valerie Mack and Jessica Taylor, the physical evidence precisely matched that 2000 to 2002 blueprint.
SPEAKER_01It did. Both victims were decapitated. Both victims had their hands removed, which thwarts fingerprint identification.
SPEAKER_00Furthermore, Jessica Taylor exhibited specific linear sharp force injuries where a tattoo had been intentionally mutilated.
SPEAKER_01The Hiller actively tried to obliterate a unique identifying mark, exactly as the document instructed.
SPEAKER_00The correlation between the written protocol in HK 200204 and the physical trauma inflicted upon Valerie Mack and Jessica Taylor is the evidentiary bridge.
SPEAKER_01It is the anchor. It links the theoretical digital planning document found on the hard drive to the practical execution of the crimes in the physical world.
SPEAKER_00It proves the document was not a fantasy, it was an applied manual.
SPEAKER_01Yes, and the document also provides a clear window into how he was educating himself to write that manual. Right. In the Knights section of HK 200204, the text specifically cites FBI profiler John Douglas's books. It names Mindhunter and the cases that haunt us.
SPEAKER_00The document references specific page numbers regarding sex substitution, disorganization theory, and victim analysis. He was actively studying the foundational texts of serial killer profiling.
SPEAKER_01And this is a critical psychological insight. He was reading the FBI's own playbook.
unknownRight.
SPEAKER_01And I wanted to understand how behavioral analysts build profiles, how crime scene technicians process evidence, and fundamentally the common mistakes that result in offenders being caught.
SPEAKER_00He studied law enforcement methodology so he can reverse engineer his own evasion strategies.
SPEAKER_01Exactly. And during the execution of search warrants, investigators actually located a physical copy of the cases that haunt us sitting in his Manhattan architectural office.
SPEAKER_00He applied that reverse-engineered strategy heavily to his communication methods. Investigators mapped out a massive complex network of prepaid cellular devices.
SPEAKER_01They identified a total of seven prepaid burner phones that were utilized to contact victims and coordinate meetings.
SPEAKER_00Seven phones. And the operational compartmentalization of that network is intense. Four of those specific burner phones were used to contact dozens of sex workers more than 500 times in the two years immediately preceding his arrest.
SPEAKER_01The established pattern demonstrates extreme discipline. He would acquire a prepaid device, utilize it for a specific operation or a brief, defined time period, and then permanently discard it shortly after a victim's death.
SPEAKER_00He kept his criminal communications completely firewalled from his personal cell phone and his architectural firm's communications.
SPEAKER_01Completely separate.
SPEAKER_00It was a sustained, deliberate management of a shadow network over a period of years.
SPEAKER_01However, that entire sprawling digital infrastructure contained a single critical point of failure. Right. One of those prepaid burner phones, a vital operational tool, was purchased using Rex Heurerman's personal credit card.
SPEAKER_00I have to stop you there because as an investigator, that detail is jarring.
SPEAKER_01It really is.
SPEAKER_00You have a man who drafted a highly complex encrypted Word document cataloging forensic countermeasures. He is utilizing hair nets, booties, and foam drain cleaner to destroy trace evidence.
SPEAKER_01Yeah.
SPEAKER_00He is monitoring tactical radio frequencies on a police scanner. He is studying the published textbooks of FBI behavioral analysts. Right. How does a man with that level of meticulous paranoia execute a financial transaction for a burner phone using a credit card with his own legal name and home billing address?
SPEAKER_01Well, it is the ultimate paradox of the organized offender. They can plan for the most complex forensic contingencies, DNA transfer, blood spatter, digital routing, but they're still human beings prone to the banality of administrative errors. Trevor Burrus, Jr.
SPEAKER_00It's an administrative mistake.
SPEAKER_01Exactly. Perhaps he was rushed. Perhaps he lacked the cash on hand at that exact moment and assumed a low-dollar prepaid phone purchase would vanish into the millions of daily retail transactions.
SPEAKER_00But that single lapse in discipline shattered the anonymity of his entire burner phone network.
SPEAKER_01It did. That credit card transaction gave investigators a name. It allowed them to link a specific anonymous device directly to Rex Heurman.
SPEAKER_00And from that point, they utilized cell tower data to build what the task force calls the box.
SPEAKER_01Cell site analysis is foundational to establishing the physical timeline. In 2012, with assistance from the FBI's Operational Technology Division, analysts reviewed the routing data for the burner phones.
SPEAKER_00Right, because when a cellular device connects to a network, it constantly pings the nearest cell towers to maintain a signal.
SPEAKER_01Yes. The network records which specific tower and which specific directional sector of that tower the phone communicates with. By analyzing these call detail records, investigators determined that calls made from the burner phones were routinely routing through a very concentrated cluster of cell towers located in Massive Pequa Park.
SPEAKER_00They mapped the geographic radius of those tower pings, and that physical coverage zone became the box.
SPEAKER_01Correct. But the breakthrough came when investigators overlaid the billing records and location data from Hurriman's personal registered cell phone. The data show that his personal phone was pinging within that exact same geographic box during the identical time windows that the anonymous burner phones were active.
SPEAKER_00You have two separate devices. Yeah. One is registered to a Manhattan architect, one is an anonymous burner phone calling sex workers. Yeah. And both devices are operating simultaneously, sitting in the exact same narrow geographic location in Mass Pequal Park.
SPEAKER_01That overlapping data is the undeniable physical link. And the sobering reality of this investigation is that this crucial overlapping data sat within the broader, massive volume of case files for over a decade.
SPEAKER_00Just sitting there in the archives.
SPEAKER_01Right. It was not until the newly formed Gilgo Homicide Task Force initiated a comprehensive review of the legacy data that an investigator recognized the significance of that overlap.
SPEAKER_00His surveillance behavior did not stop at burner phones. It extended deep into his internet activity. Investigators documented the creation of multiple fake email accounts.
SPEAKER_01He linked these fictitious accounts to services like Google Pay and Tinder, utilizing them to move anonymously through online spaces.
SPEAKER_00The search history associated with those anonymous accounts forms a critical pillar of the indictment. Through these fake profiles, he executed over 200 distinct Google searches, specifically monitoring the progress of the Gilgo Beach investigation.
SPEAKER_01He was not just casually watching the evening news.
SPEAKER_00No.
SPEAKER_01He was running targeted queries for updates on the task force's structure. He was looking up the names of specific lead investigators. He was tracking exactly what forensic information the police departments were releasing to the media.
SPEAKER_00He was actively surveilling the task force that was hunting him.
SPEAKER_01He was using those digital tools to gauge how close law enforcement was getting to his physical location. The true scale of his hidden infrastructure was fully exposed during the execution of the search warrants following his arrest.
SPEAKER_00On July 13th, 2023, investigators initiated a massive 12-day search of the residence at 105 First Avenue.
SPEAKER_01Right, and detailed the logistics of that search for the listener because this was not a standard walkthrough with a few evidence bags.
SPEAKER_00Not at all. The physical excavation was an industrial scale operation. Investigators brought in ground penetrating radar to map the subsurface anomalies of the property.
SPEAKER_01They deployed heavy construction equipment to physically excavate portions of the yard.
SPEAKER_00And inside the residence, beneath the floorboards, they discovered a reinforced basement vault.
SPEAKER_01A reinforced vault built into the foundation of a suburban family home.
SPEAKER_00Yes. From that vault and the surrounding property, investigators seized nearly 300 firearms.
SPEAKER_01300?
SPEAKER_00They recovered hundreds of electronic devices, hard drives, laptops, cellular phones, flash drives. You have to consider the sheer volume of that seizure and the years of labor required to build and supply a concealment infrastructure of that magnitude.
SPEAKER_01Defense naturally presses heavily on the chain of evidence connecting those physical items to the specific charged crimes. Right. They argue accurately that a credit card purchase of a phone proves contact, but it does not definitively prove murder. They argue that owning a vault full of legally or illegally acquired firearms does not legally equate to committing a homicide on Ocean Parkway.
SPEAKER_00And the defense's job is to isolate each piece of evidence and argue that independently it proves nothing.
SPEAKER_01Exactly. But the prosecution's position is that the totality of the evidence forms an irrefutable matrix. The credit card purchase identifies the specific user of the burner phone.
SPEAKER_00The cell tower data physically places that burner phone in the exact same room with Jurman's personal phone in Mass Peacoel Park.
SPEAKER_01Right. The call logs on that burner phone link directly to the victim's final known communications. And the recovered document, HK 200204, outlines the precise methodology that matches the physical trauma found on the victim's remains at the recovery sites.
SPEAKER_00It does. But this brings us to the profound blind spots in the investigation.
SPEAKER_01Over 500 unidentified contacts. The task force is currently undertaking the massive burden of determining who those individuals are. They must investigate whether those specific digital contacts correlate with other missing persons' reports, unsolved homicides, or Jane Doe recoveries in the tri-state area.
SPEAKER_00There is a vast void in the digital data that represents potential uncharged cases connected to this web. But the most significant timeline discrepancy, the anomaly that forces a complete re-evaluation of the entire chronological narrative centing on the murder of Sandra Fastilla.
SPEAKER_01The Castilla case disrupts everything we assumed about his operational timeline.
SPEAKER_00We must outline her case clearly. Sandra Castilla was 28 years old. She was a native of Trinidad and Tobago, living in Queens, New York. Right. She was the mother of a five-year-old son. She was murdered on or about November 19th to November 20th, 1993.
SPEAKER_01And for context, in November 1993, Rex Heurman was 30 years old. This is one full year before he even founded his architecture firm in Manhattan.
SPEAKER_00The forensic evidence in the Sandra Castilla case is stark and brutal. She was strangled. Her remains exhibited 25 distinct sharp force injuries, which medical examiners determined were inflicted post-mortem.
SPEAKER_01Her remains were recovered in a wooded area near Fish Cove Road in North Sea, Southampton.
SPEAKER_00The connection between a 1993 murder in Southampton and the Gilgo Beach Task Force relies entirely on advanced forensic technology. Three specific strands of male hair were recovered from Sandra Castilla's remains during the initial investigation in 1993.
SPEAKER_01And those hairs were carefully preserved in evidence lockup for decades. In 2023 and 2024, utilizing modern DNA analysis techniques that did not exist in the early 90s, forensic laboratories retested those three strands.
SPEAKER_00The DNA profile extracted from the male hair samples matched Rex Eurman. Based on that match, he formally pleaded guilty to her murder, alongside the murders of the Gilgo 4 and Karen Vergata.
SPEAKER_01The investigative question here is structural. If Sandra Castillo was murdered in 1993 and the HK-200204 planning blueprint was created in 2000, what occurred during those seven missing years?
SPEAKER_00That is the paramount question facing the task force. Does the creation of the document in 2000 indicate that his methodology formalized over time?
SPEAKER_01Did he operate for seven years, realize he was making logistical errors or leaving trace evidence, and decide he required the rigid administrative organization of an architectural ledger?
SPEAKER_00Or, more concerningly, are there earlier iterations of this planning document, physical notebooks or older digital files that investigators have not yet located?
SPEAKER_01Right. And the Castilla case also highlights a critical historical error in the region's investigative past.
SPEAKER_00Yes, because for years, law enforcement and the public attributed Sandra Castilla's murder to John Bitroff, a convicted killer from Manorville.
SPEAKER_01The same advanced DNA testing that linked Hurriman to Castilla simultaneously cleared John Bitrolf of that specific murder.
SPEAKER_00Bitrof remains convicted and incarcerated for the murders of Rita Tangrady in November 1993 and Colleen McNamy in January 1994.
SPEAKER_01But the forensic clearance of Bitrolf in the Castilla case revealed a grim, sobering reality. You had two different prolific serial killers operating independently in Suffolk County simultaneously in the early 1990s.
SPEAKER_00The geographic overlap is striking.
SPEAKER_01It really is.
SPEAKER_00The investigative task force utilized multiple streams of physical and digital tracking to separate those cases and build the current evidentiary framework. Beyond the burner phones and the planning document, they gathered corroborating physical evidence from witness testimony.
SPEAKER_01Right. During the investigation into the disappearance of victim Amber Costello, a witness provided a very specific description of a vehicle and its driver.
SPEAKER_00The witness described the driver as appearing like an ogre and noted the vehicle was a distinct first-generation Chevrolet Avalanche.
SPEAKER_01In March 2022, detectives utilized vehicle registration databases to conclusively connect Rex Hewerman to a first-generation Chevrolet Avalanche.
SPEAKER_00But matching a vehicle description is not enough for an indictment. The collection of the confirmation DNA demonstrates the protracted, methodical nature of the surveillance operation. Investigators needed a direct, fresh DNA sample from Hewerman to compare against the forensic evidence gathered from the victims over the past decade.
SPEAKER_01Right, and on January 26, 2023, surveillance teams tracking his movements in Manhattan observed him discard a pizza box into a sidewalk trash can.
SPEAKER_00Investigators immediately secured that trash can and retrieved the pizza box. The forensic laboratory processed the discarded material, specifically extracting mitochondrial DNA.
SPEAKER_01It is essential to explain the difference between nuclear DNA and mitochondrial DNA in this context. Nuclear DNA is found in the center of the cell and provides a unique, highly specific profile of an individual. Mitochondrial DNA is found in the mitochondria surrounding the nucleus and it traces the maternal lineage. Right. Many hair shafts recovered from crime scenes lack the root, meaning they lack nuclear DNA. But laboratories can still extract mitochondrial DNA from the shaft itself.
SPEAKER_00They extracted the mitochondrial DNA from the pizza box and compared that profile against the male hair recovered from the remains of victim Megan Waterman.
SPEAKER_01And the profiles matched, excluding 99.96% of the North American population.
SPEAKER_00That statistic is the anchor. Yet even with these definitive forensic matches, the scope of the investigation is far from complete. You have to return to the hundreds of electronic devices pulled from the basement vault at 105 First Avenue.
SPEAKER_01A complete digital forensic review of hundreds of hard drives, laptops, cellular devices, and flash drives requires years of processing.
SPEAKER_00Years.
SPEAKER_01The sheer volume of raw data means the full scope of his activities, his communications, and his potential victims remains incomplete. The task force is parsing through decades of digital storage, bite by bite.
SPEAKER_00As we synthesize the evidence presented in the filings, you are confronted by dual structures operating simultaneously. On the surface, there's the public architect. He built a successful career over decades, negotiating complex zoning contracts, meeting strict project deadlines, and designing infrastructure for major American institutions in Manhattan. He raised a family in a suburban home.
SPEAKER_01But beneath that surface, he engineered and maintained a subterranean infrastructure. He meticulously managed a network of prepaid burner phones, discarding them after a kill.
SPEAKER_00He created fake email accounts to surveil the police task force. He amassed an arsenal of nearly 300 firearms inside a reinforced basement vault.
SPEAKER_01And he authored, updated and relied upon the HK 200204 document.
SPEAKER_00The central thesis of the prosecution's case is that he built a system. Document HK 200204 provides the ultimate conclusion regarding his methodology. It proves this was not an impulsive, disorganized predator reacting to momentary opportunity.
SPEAKER_01The forensic reality forces an acknowledgement that a functioning, employed professional constructed and maintained a flawless apparatus for murder, operating it concurrently with his everyday life for decades.
SPEAKER_00Next time, December 2010, a police canine unit finds the first body on Ocean Parkway. Within 48 hours, three more. The discovery that changed everything.
SPEAKER_01Everything we cited is sourced on the Neural Broadcast Network website.