Picky Eater Investigation - Wed, Oct 23, 2019
△▼△TOP SECRET//SI//DGO△▼△
Report No: GT/GL-191023-070260115
Location: Ithaca, New York
Agents:
Summary: Agents assigned to MASTICATE Cell conducted an on-site investigation into the Cornell University mass shooting attributed to Bradley McKay (alias Finn Smith), a former Cornucopia House child. The session focused on physical site inspections, witness interviews, and technical exploitation of recovered digital evidence. Findings strongly suggest the presence of an unnatural informational filter or parallel informational environment associated with software known as Picky Eater, influencing perception, memory, and physical evidence without leaving conventional traces.
Operation Report:
-
Agents arrived in Ithaca and reviewed evidence previously collected by Ithaca PD, including McKay’s phone, laptop, firearm, and personal effects.
-
Initial forensic review of McKay’s phone revealed the Picky Eater application:
- The app functioned as a web aggregator, browser plugin, and Tor adjunct.
- It consumed extreme system resources, rapidly draining battery life and repeatedly rewriting device firmware.
- Network traffic routed through non-resolvable IP addresses and domains that did not exist in conventional infrastructure.
-
CCTV footage from the shooting showed McKay repeatedly checking his phone, appearing confused and agitated, and using an external battery pack that was later recovered fully drained.
-
Agents searched McKay’s sealed dorm room:
- The room showed no occult paraphernalia or overtly anomalous objects.
- A soldering iron and printed installation instructions for a hardware chip linked to Picky Eater were recovered, indicating deliberate physical modification of McKay’s laptop.
- A paperback copy of The Catcher in the Rye attributed to “J.F. Salinger” was found. The text diverged from known editions, containing altered passages casting women as antagonists and promoting ideological themes aligned with McKay’s radicalization. All other books appeared consistent with known publications.
-
Agents examined McKay’s financial records via his unlocked phone:
- No purchases or withdrawals were recorded after late 2018, despite ongoing parental deposits for tuition and expenses.
- No transactions explained acquisition of the altered book or technical components.
-
Agents inspected the sorority house depicted in the violent photographs found on McKay’s phone:
- Physical layout partially matched photographed angles, but room details did not align.
- The fireplace seen in the images existed, but its spatial orientation and surroundings differed.
- The photographs appeared to depict a distorted or alternate version of the same structure.
-
Agents interviewed Emily Galperin, one of the women depicted as a perpetrator in the images:
- She denied any connection to McKay or the victim Avery Bell.
- Her reactions were consistent with shock and fear; no deception was detected.
- A search of her dorm room revealed nothing anomalous; no unnatural sensory indicators were detected.
-
Agents conducted a speakerphone interview with McKay’s adoptive parents:
- They confirmed McKay was adopted as a teenager and had suffered early childhood trauma resulting in developmental and social difficulties.
- Their recollections of McKay’s whereabouts during late 2018 and early 2019 were inconsistent and confused, particularly around holidays.
- Earlier memories (pre-college) were detailed and coherent; later memories were vague and contradictory.
-
Technical asset Justin successfully restored power to McKay’s laptop:
- The system exhibited extreme power draw and fan activity similar to the phone.
- Picky Eater launched automatically on startup.
- Browser history entries resolved to nonexistent servers.
- Files of note included a document titled Fighting the Matriarchy and a picky_eater_install directory containing crude hardware instructions and an email contact that no longer existed.
- Attempts to contact the software distributor failed; associated domains were invalid.
- A search conducted within Picky Eater for Avery Bell and the torture imagery initiated unknown processes; results were not resolved during this session.
Analysis and Recommendations:
- Picky Eater appears to function as more than software: it requires hardware modification and exerts persistent influence over perception, memory, and informational reality. The altered book and fabricated photographic evidence suggest access to, or bleed-through from, a parallel informational framework rather than simple hallucination or forgery.
- The consistent failure of witnesses—including family members—to clearly remember McKay during key periods mirrors known effects of exposure to certain extradimensional or cognitohazardous phenomena documented in prior Program-era operations.
- The absence of financial trails implies acquisition vectors outside conventional commerce, reinforcing the hypothesis of a closed or self-propagating system.
- Continued operation of Picky Eater on seized devices poses a contamination risk. Isolation, air-gapping, and controlled observation are recommended. Consider consultation with Program assets experienced in non-Euclidean data systems.
- Agents should be monitored for cognitive or perceptual drift, particularly regarding memory gaps or normalization of contradictions.
- A-Cell may wish to cross-reference Picky Eater with historical incidents involving rewritten texts, altered media artifacts, or “false but internally consistent” realities. Similar patterns have appeared in pre-Program case files marked for restricted access.
- Recommendation: escalate investigation to determine whether Picky Eater is a localized vector or part of a wider dissemination effort. Containment priority should be elevated pending confirmation.
Establishing the immediate timeline and what the team did the previous night The Handler confirms it’s late on the first day in Ithaca (around 9–10 PM the previous evening). The team collected the phone and laptop from the police and returned to the hotel to begin analysis. Justin spent time trying to repair the laptop and concluded he’d need a new power supply, to be picked up in the morning; he couldn’t progress further that night. The group discusses leads visible on the Handler’s list (referenced as being on the main Foundry screen), including: Frank Booth (Brian) mentions that he already sent the name of the supplier/contact to AUSA Antonia Pitzerelli. Clarifying the shooter’s online contact and the tech pipeline The Handler confirms: The shooter’s online contact is Robert Wallace. They connected via 4chan boards; the team has McKay’s message history on the phone. Wallace appears to have sent: The Handler recalls details of the hardware: Justin’s initial technical work on the phone: Computer Science check Justin attempts to understand Picky Eater’s inner workings and makes a Computer Science check (result: 15, not a standout success). Over several hours of analysis, Justin forms a clearer picture: Picky Eater seems to serve as: The app has severe system impact: The team checks the CCTV footage for operational practicality: Because the team has McKay’s belongings, they check the pockets and find: McCarter’s occult scan of the message history Matthew McCarter (Robert) wants to read the message history to look for occult references and makes an Occult check (success: 2 under 47). Result: The team asks about Wallace’s status/role: The Handler explains the contact timeline: Endurance checks after working late The Handler calls for CON × 5 checks to see who got enough sleep: Outcome: Justin may be a bit tired, but functional; the “nerds” can keep going. Morning logistics: power supply pickup and plan to hit McKay’s dorm The group plans to go to the dorm in the morning; Justin needs to pick up the ordered power supply. The Handler confirms: The group decides the dorm search is priority. Arriving at McKay’s dorm: confirming camera coverage As they approach the dorm, Frank wants to understand the camera situation, specifically because they previously noted a lack of footage of McKay leaving. The Handler describes: The team gains access without a major confrontation: Searching McKay’s dorm room: general condition and initial impressions The dorm room is a single (no roommate). The Handler describes the decor as stereotypically “insecure young man trying too hard”: The desk shows where the laptop used to sit: Bookshelf investigation: discovering an “off” copy of The Catcher in the Rye The team turns to the bookshelf; Frank receives a +20% bonus on the relevant INT × 5 check because the novel is commonly read in American high schools. While skimming the books, a specific item stands out: The book appears physically consistent with an older paperback printing (like a high school copy handed out repeatedly), but the content is wrong in pointed ways: A paragraph (highlighted in red) depicts a scene where a pimp tells Holden Caulfield to “take the red pill.” Another highlighted passage blames Holden’s sister for his brother Allie’s suicide. The altered passages cast women/female characters more as villains, and the “red pill” language aligns with the ideology seen in McKay’s message history. The team checks publisher details: Verifying the rest of the bookshelf The team splits the books into stacks and spends hours comparing details: Outcome: Physical room search: looking for anything else unusual The team searches drawers and the wardrobe/cabinet area. They do not find a portal or any other dramatic anomaly. The room yields one additional practical clue: Financial trail attempt: checking McKay’s accounts from the phone The team considers looking up credit/debit history for bookstores or odd purchases. Instead of running it through FBI channels, Justin tries the faster route: Findings: McKay has a credit card (likely provided by parents). There are not many charges. The last recorded charge is November 2018. There are no big cash withdrawals that suggest unusual spending. His balance is increasing because his parents are still making deposits (large deposits consistent with tuition/housing schedules). Decision point: nothing else in the dorm beyond the anomalous book and install evidence The group concludes the dorm room is largely tapped out: The team decides to move to the sorority house. Sorority house visit: comparing the photos to the real interior The sorority house is just off campus. It is no longer actively held as a sealed crime scene: Frank’s goal: find the room(s) in the photographs (especially where the staged “flaying” imagery appears). The Handler clarifies the spatial weirdness: A key anchor detail persists: A fireplace appears in the photos. The team can see a fireplace down a hallway from the living room and identify it as the same fireplace, yet: Target list and identifying witnesses The team pivots to the individuals identified in the photos: The team decides to track down Emily Galperin, specifically to access her dorm room (and, repeatedly, to see if McCarter’s “sense” triggers anywhere). McCarter’s “sniff” investigations and growing frustration At the sorority house, McCarter attempts to “sniff out” the unnatural in the room that corresponds to the photo. Outcome: Interviewing Emily Galperin at her dorm After some coordination/phone tag, Galperin meets the agents at her dorm room and lets them in. The Handler describes Galperin: Setting: McCarter again prowls the room “like a hound,” sniffing for the trigger. Galperin’s statements (unprompted / easily prompted): Human checks during the Galperin interaction The Handler calls for Human checks to read Galperin’s reaction. Based on the results: Direct question: Avery Bell Concluding the Galperin lead Back to the hotel: regrouping and next investigative steps The team returns to the Holiday Inn Express. Justin takes the new power supply and begins restoring the laptop: The rest of the team discusses calling McKay’s adoptive parents while Justin works. Calling McKay’s adoptive parents: establishing background The Handler names the adoptive parents on the spot: Mitchell and Annabelle McKay. The agents identify themselves as FBI investigators; the parents go on speakerphone. Mr. McKay’s first question: Why is the FBI involved now? Frank frames the inquiry as a connection to other individuals in the country that requires investigation. Key background details from the parents: They adopted Bradley when he was very young (stated as just shy of three years old). He went through a severe traumatic experience as a toddler. They report that he was not talking when they adopted him. They were told he might not remember clearly, but the effects of trauma would persist; they describe “developmental issues” they tried to help him work through. They characterize him as: Pets: Human checks during the parents call The Handler calls for Human checks (speakerphone, so everyone can roll). Interpretation: Parents’ inconsistency about Bradley’s whereabouts When asked about the holidays (Christmas 2018), the parents contradict each other and themselves: Philomena’s read: they aren’t exactly sure where he was, and their certainty collapses when pressed for specifics. Other questions asked of the parents The team asks if they know Robert Wallace: Philomena asks a reality-check question: The team asks about Bradley getting into Cornell: The parents give a clearer, detailed story here than they do about recent holidays. They describe it as a point of pride: The contrast stands out: pre-Cornell memories are clearer than post-arrival details. Returning focus to Justin’s laptop work: the machine comes back online Justin succeeds in getting the laptop up and running. Immediate observation: like the phone, the laptop shows heavy power draw: On boot: Browser history and network anomalies on the laptop Justin checks browser history: Reading the Picky Eater installer documentation Justin finds a readme/instructions inside the installer materials. The readme is not a deep technical breakdown, but it states: Picky Eater does nothing without the accompanying hardware. It provides crude directions on where to solder/attach the chip to the motherboard. The instructions look like a good way to fry the motherboard, yet McKay apparently managed it. Picky Eater is described as: The document does not identify an author, but it provides an email address for requesting: Attempting to contact the Picky Eater source Justin uses a burner email and attempts to contact the address, expressing interest in “selling” Picky Eater. Result: Planning a social-engineering approach to Robert Wallace Justin suggests that agents with stronger social skills create an account on the board where McKay and Wallace interacted and attempt to contact Wallace using his known username. The Handler notes: Using Picky Eater’s search engine Justin opens a browser and finds Picky Eater has its own search engine. He enters a search intended to locate or reproduce the violent photo content: The Handler ends the session on this hook: Session closeSession Notes
△▼△TOP SECRET//SI//DGO△▼△