Ithaca Mass Shooting Investigation - Tue, Oct 22, 2019
△▼△TOP SECRET//SI//DGO△▼△
Report No: GT/GL-191022-069260108
Location: Ithaca, New York
Agents:
Summary: Agents were deployed to Ithaca, New York to assume control of a mass-shooting investigation linked to a former Cornucopia House child, Finn Smith (adopted name: Bradley McKay). Local authorities had concluded the incident was an isolated act of ideologically motivated violence. Upon review and seizure of evidence, Agents identified multiple anomalies inconsistent with conventional explanations, including irregular weapons manufacture, nonstandard digital artifacts, altered movement records, and evidence suggesting external influence on the shooter prior to the event.
Operation Report:
-
Agents arrived in Ithaca and formally assumed jurisdiction over the investigation from the Ithaca Police Department under an FBI counterterrorism cover.
-
Initial review of case files indicated a narrative of a lone, radicalized shooter motivated by misogynistic and extremist online content. The file showed signs of being assembled for rapid closure, with limited forensic follow-through.
-
Agents identified irregularities in firearms documentation:
- The rifle used in the attack resembled an AR-pattern weapon but was marked with an unknown manufacturer’s mark (“CAR”).
- The weapon was chambered for 5.58mm ammunition, a nonstandard caliber.
- Serial numbers were incomplete and incompatible with national tracing systems.
-
Agents took custody of all physical and digital evidence, including the rifle, remaining ammunition, McKay’s phone, and a laptop recovered from his dormitory.
-
Crime scene investigator Anne McKenna privately acknowledged unresolved concerns and cooperated with the transfer, highlighting anomalies previously noted but not pursued by local authorities.
-
Examination of McKay’s phone revealed:
- A non-commercial application labeled “PICKY EATER,” functioning as a comprehensive network-routing and browsing tool.
- Cached records of nonexistent domains and malformed IP-like strings following consistent but unfamiliar internal rules.
- A set of highly realistic images depicting sorority members torturing and killing a male victim. These images showed no signs of digital manipulation, yet all identified individuals were confirmed alive and accounted for.
-
CCTV footage review established:
- McKay appeared on camera en route to the sorority house but could not be traced leaving his dormitory or transiting several camera-covered routes.
- He displayed confusion and disorientation prior to the attack, repeatedly consulting his phone as if navigation data did not match physical surroundings.
- After the shootings, McKay searched the sorority house as if looking for a specific location or object, then fled and was later killed during police confrontation.
-
Digital analysis of McKay’s laptop revealed:
- A hand-soldered hardware modification integrated into the motherboard.
- Storage systems and encrypted partitions managed by the same “Piggy Eater” architecture seen on the phone.
- Encrypted data inaccessible without further specialized equipment.
-
Agents identified extensive online communication between McKay and an individual named Robert Wallace, who encouraged McKay’s paranoia and violent ideation.
- References suggested Wallace provided guidance and materials related to the implanted hardware and associated software.
- Available network data placed Wallace’s activity in Bangor, Maine.
-
No evidence indicated McKay possessed the technical skill or resources to independently design, manufacture, or acquire the weaponry and digital systems recovered.
Analysis and Recommendations:
-
The convergence of anomalies—nonexistent calibers, malformed network identifiers, incomplete serial systems, and inconsistent camera coverage—suggests exposure to information, tools, or environments operating under alternate physical or technical constraints.
-
McKay’s behavior indicates he was acting on internally consistent expectations that did not align with observed reality, implying possible cross-domain contamination, external manipulation, or partial displacement.
-
The “Piggy Eater” system represents a significant vector of concern. Its apparent ability to interface with nonexistent domains and obscure data across platforms warrants immediate containment and replication analysis by Program technical assets.
-
Robert Wallace should be treated as a priority person of interest. His role appears analogous to a handler, recruiter, or technical facilitator rather than a passive online agitator.
-
The case shows thematic parallels to prior Cornucopia House–related incidents involving altered perception, identity instability, and incomplete integration into baseline reality.
-
Continued field investigation is recommended at the following sites:
- McKay’s former dormitory room.
- The sorority house interior, with attention to architectural inconsistencies.
- Direct contact with Wallace, if feasible, under controlled conditions.
-
A-Cell may wish to cross-reference recovered digital structures and numerical patterns against archives from previous operations involving spatial or dimensional irregularities.
-
Agents involved remain operational but demonstrate early signs of pattern convergence across unrelated anomalies; monitoring for fixation or overextension is advised.
Travel to Ithaca / early open-source digging The team flies from D.C. to the nearest airport (explicitly identified as Ithaca Tompkins International Airport) and drives into Ithaca together. The Handler provides the publicly known outline of the event: Justin (prompted by Chris) does internet sleuthing / forum trawling: He succeeds on a Computer Science / Search-style check (explicitly a success, with a roll of 31). He finds campus discussion focused on the victims and identifies them as: The sorority is identified as Delta Phi Epsilon. Discussion about McKay yields very little: The team clarifies uncertainty about McKay’s student status: Ithaca Police Department handoff The team arrives at Ithaca PD headquarters, shows FBI task force paperwork, and is placed in a small meeting room. A detective arrives with a thick case folder: The case file contents and local police theory (as reflected in reports): Physical evidence inventory includes: The file is being built toward a straightforward conclusion: disgruntled loner / lone shooter. The police theory is supported by phone material indicating: White nationalist forums content. Men’s-rights / misogynistic radicalization content. The file references images believed to be photoshopped: women at campus allegedly ritually murdering someone. Frank performs a Law check and succeeds: He assesses the file as an ongoing case with missing “fill-in” work, but not obviously cover-up: Initial anomaly: the rifle metadata looks wrong Frank reviews the rifle evidence section with a strong Firearms capability (score called out as 61; treated as “pretty good”). The rifle is visually described as resembling a classic AR-15, but the evidence paperwork is strange: Frank attempts to look up “CAR” as a manufacturer and finds no registered gun manufacturer by that name / mark. Transition to evidence room and meeting CSI Anne McKenna The team requests access to the physical evidence and the digital evidence system. Detective Hertz escorts them to the evidence room; Anne McKenna (crime scene investigator / evidence custodian) joins them. The team pushes Hertz out: Frank apologizes to McKenna for the discomfort and frames Hertz as the problem. McKenna provides context: McKenna’s walkthrough of the key evidence and anomalies Rifle On the table: a black rifle that looks like an AR-15 at a glance. McKenna explains: It has an unregistered maker’s mark: CAR. It is 5.58 mm, non-standard. Ballistics confirm it is truly 5.58 mm. It would require someone to manufacture custom rounds. McKay’s parents claim: McKenna cannot explain how a college student acquired it. Phone The phone is a cracked Samsung S9 (noted as “last year’s model”). It’s plugged in and charged; screen is on; there is a smear of blood on the screen. McKay’s parents bought it on a family plan. McKenna highlights a suspicious app on the home screen: Icon: a “vomiting smiley face.” Label: “PICKY EATER” (all caps). It is not on the Google Play Store; appears sideloaded / not normally distributed. Their techs found it functions like a powerful VPN / traffic-routing layer (“everything on the phone goes through this app”). Its stored data includes: McKenna describes it as “a web browser on steroids” in function. Laptop Graphic photo set allegedly depicting sorority torture McKenna shows the team a series of extremely graphic images from the evidence system: PD analysis summary (as reported by McKenna): Facial recognition identified principal faces: The victim face matches Avery Bell, a Cornell student who is alive. The women are identified as Emily Galperin, Sarah Donovan, and Ashley Holloway. The images are believed to be fake because the “victim” is alive. PD tools found no signs of editing (no obvious Photoshop artifacts), but McKenna suggests the FBI might have better tools. McKenna compared the room in the images with the sorority house: The images do not appear overtly occult/ritualistic: CCTV / surveillance footage timeline McKenna brings up processed CCTV footage with timestamps of “interesting bits.” The shooting is stated to be Monday the 14th a little after 10:00 a.m. McKenna notes Cornell had begun fall break the previous Saturday: Footage sequence: 10:12 a.m.: first time McKay is caught on camera, walking on a sidewalk off campus, carrying the rifle openly; seen by a traffic light camera about two blocks from Delta Phi Epsilon. 10:13 a.m.: at an intersection, McKay appears visibly confused: Sorority house security camera: McKay kicks in the front door. Kelsey Valentine goes toward the door and is shot immediately when it opens. McKay moves into the main room and shoots Despi Sano multiple times (she appears stunned and doesn’t move). Syndra Young flees toward the back; she struggles with a deadbolt and is shot before she can escape. McKay then searches the house: 10:22 a.m.: he exits out the back door. 10:23 a.m.: police arrive at the front and clear the building; bodies are found; movement of officers is visible on the cameras. Syndra Young managed to call 911, but gave limited info; police already had basic suspect description from the earlier call. 10:29 a.m.: surveillance catches McKay sprinting through a student parking lot: McKenna’s major unresolved CCTV anomaly: Evidence custody transfer McKenna and PD arrange formal transfer: Chain of custody paperwork is completed. McKenna asks if the team has a storage device ready for digital files; Justin provides external storage (implied he has a bag of tech). McKenna notes PD policy normally restricts bringing personal devices into the evidence room, but since custody is transferring, the practical concern is reduced. A tech oversees digital transfer; the team receives: Frank asks about ammunition: Evening wrap-up and hotel work (Justin’s forensic/technical progress) The team leaves around 6–7 p.m. and heads to a hotel to set up and review evidence. Justin begins working on the Alienware laptop: He determines the laptop’s power supply is fried. Options presented: Justin opens the laptop and discovers a physical anomaly: Storage / drive structure findings: Attempting to boot the drive directly fails due to unusual / undocumented BIOS behavior. Justin mounts the drive as external storage instead: Most data appears sequestered behind a storage structure managed by PICKY EATER. He can access logs and some cached material, but there is a large encrypted data chunk he cannot access. The logs show the same kind of nonsense as the phone: Justin plans/acts to: PICKY EATER app behavior and browsing history The team opens PICKY EATER on the phone: Reviewing PICKY EATER history: Many entries do not load. Some do load, especially older entries: Evidence of a key contact: Justin finds saved screenshots of chats indicating McKay communicated (using real names) with someone named Robert Wallace roughly about a year ago (timeline implied as during/around high school and later continuing). Wallace encourages McKay’s paranoid fantasies about conspiracies of women in power keeping men weak. Justin searches for mentions of PICKY EATER: He does not find broad references in McKay’s texts/emails at first. He does find a critical mention in chats with Wallace: The implication in the findings is that the chip and PICKY EATER are connected, and McKay got them from Wallace. Justin’s further internet research: Tracing Robert Wallace Justin pulls an IP address from a private chat interaction that used a direct IP connection. He traces it to Bangor, Maine. The team notes they have: Frank texts Pitzarelli about Robert Wallace (explicitly phrased as suspicion of government affiliation); Pitzarelli replies that she will check. Other leads identified from the police material and team review The team identifies multiple follow-up threads that local police did not deeply pursue: Visit crime scenes personally: Interview/locate: University administrative anomalies: Officer involved in fatal shooting: Assessment of McKay’s demeanor on video (HUMINT attempts) Chris asks whether McKay’s movements resemble Justin’s earlier trance-like “confident purpose” (from prior campaign events). The Handler answers: No. HUMINT checks are rolled while scrutinizing the video: Chris rolls 62 (a failure) while trying to read McKay’s intent/search behavior. Matthew rolls 00 (a severe failure) when attempting to interpret the footage. Despite failed rolls, the Handler emphasizes observable basics: Firearm closer inspection Frank examines the rifle more thoroughly: Confirms the reported anomalies are accurate: Assesses build quality: The ammunition is also stamped 5.58 and appears commercially manufactured in its finish/consistency, despite the caliber being non-standard and not something you can buy normally. End-of-session direction The team concludes the first push of the investigation with key unresolved questions: The session ends as the team prepares to pursue these threads next time, with an immediate next intended lead being McKay’s dorm room and further follow-ups stemming from the evidence review.Session Notes
△▼△TOP SECRET//SI//DGO△▼△