Crime Stories with Nancy Grace
Episode: SAVANNAH GUTHRIE MISSING: DAY 37
Date: March 9, 2026
Overview
This episode of Crime Stories with Nancy Grace centers on the ongoing investigation into the disappearance of Nancy Guthrie, mother of broadcaster Savannah Guthrie, now missing for 37 days. The panel discusses new developments, including the discovery of a vandalized utility box near Nancy's home, theories about signal jamming, and the potential for a "breakthrough" in the case, possibly via digital forensics or FBI analysis of tattoo/graffiti evidence. The episode combines expert insight from digital analysts, law enforcement professionals, and forensic experts to explore leads and bust common misconceptions swirling around the case.
Key Discussion Points and Insights
1. The Vandalized Utility Box: Red Herring or Critical Clue?
[02:37–16:40]
- Discovery & Theories: A utility box near Nancy Guthrie's home was vandalized around the time of her disappearance. Initial speculation was that this might relate to a signal jammer used to disable Wi-Fi/cameras during an abduction.
- Nancy Grace: "What if the utility box was the cause for the blackout? And what was protruding from the porch guy's pocket actually was a walkie-talkie to an accomplice?" [05:18]
- Expert Analysis:
- James Bass (Digital forensic analyst): Skeptical the box is involved, identifying it as likely a telephone junction box, not directly tied to Wi-Fi or home security feeds.
- "Not possible as presented. [...] If it had been destroyed or in some way altered, the connection would not have been intermittent. It would have been out completely." [07:05]
- Brian Fitzgibbons (Security director): Suggests the act was likely just vandalism or copper theft, not an attempt to disrupt communications during an abduction.
- "If that line were cutting the WI fi, the data coming in from the street to the house, there would be a persistent outage." [09:45]
- "I can't imagine that's a high value target in relation to an abduction case." [10:26]
- Joseph Scott Morgan (Forensic investigator): Stresses checking for physical evidence (tool marks, fingerprints) on the box for possible links to the crime, but overall thinks the utility box's involvement is unlikely.
- "Are there any primarks on that box...what kind of knowledge or level of knowledge did they have about this?" [12:12]
- James Bass (Digital forensic analyst): Skeptical the box is involved, identifying it as likely a telephone junction box, not directly tied to Wi-Fi or home security feeds.
Notable Quote:
- Nancy Grace (on motives for box tampering):
“Why does anybody do anything? I mean, in my mind, I would look for a logical motive... Why would somebody crack open a utility box? For what? There's nothing to steal. I guess the same reason people throw stones and knock out street lights." [13:54]
2. Breakthrough Hopes: Digital Forensics and Data Trails
[20:18–30:03]
- Cell Tower Dumps & Location Data:
- James Bass explains how law enforcement leverages Google and Apple data to trace suspect location histories ("Google takeout"/"GTO" requests), even tracking second-by-second location pins.
- "As part of their service, they offer Google Maps and location services. And in the background, they're going to drop a location pin sometimes every five to 30 seconds." [22:02]
- "That data is collected and it's retained forever. Until you go in and tell them to delete that information, it will forever reside." [23:08]
- James Bass explains how law enforcement leverages Google and Apple data to trace suspect location histories ("Google takeout"/"GTO" requests), even tracking second-by-second location pins.
- Data Limitations:
- Devices off or in airplane mode are invisible; but "burner phone" anonymization is very limited in the modern digital era due to activation and payment requirements.
- "If the device is turned off, we're not going to get anything from it." [25:15]
- "Most people...could get a completely anonymous phone...Nowadays, nothing's really anonymous." [26:58]
- Devices off or in airplane mode are invisible; but "burner phone" anonymization is very limited in the modern digital era due to activation and payment requirements.
- Apple vs. Google:
- Both companies collect similar tracking data; Apple stores more on-device, but location history can often be subpoenaed from both.
- "Nothing that they're all collecting in general, they collect the same data. Google, they save more, they focus a little...Apple focuses a little bit more on anonymity and keeping your data on your device." [28:34]
- Both companies collect similar tracking data; Apple stores more on-device, but location history can often be subpoenaed from both.
- Investigative Direction:
- Nancy Grace and Joseph Scott Morgan both believe a digital lead is most likely the "breakthrough" alluded to by investigators, though DNA evidence or traditional police work could be involved.
Notable Quotes:
- Nancy Grace:
"It's gotta be digital. I think it's digital." [29:00] - Joseph Scott Morgan:
"I think they've been trying to unspool this DNA information for some time...But as we stand right now, I would be leaning probably into the digital data that we're talking about because no one travels this world without one of these damn millstones that we have around our electronic neck, you know, with these phones." [30:03]
3. Investigation Techniques: Old-School vs. High-Tech
[30:54–35:13]
- Traditional Policing:
- When digital trails run cold, the focus returns to neighborhood canvassing, pressuring known criminal elements, and raising the reward pool to spur tips.
- Joseph Scott Morgan: "This is going to be a matter of...good old fashioned police work where they're putting pressure points along the way...to get somebody to roll over." [31:47–33:06]
- When digital trails run cold, the focus returns to neighborhood canvassing, pressuring known criminal elements, and raising the reward pool to spur tips.
- Suspect Profile:
- Discussion about whether this was the work of a burglar gone wrong or a planned kidnapper: Consensus that this isn’t a typical burglary but a targeted abduction.
4. Tattoo and Graffiti Analysis: A High-Tech Lead
[33:55–38:29]
- FBI TAG Team:
- Law enforcement is leveraging the FBI’s Tattoo and Graffiti (TAG) analysis team to analyze a partial tattoo seen on the suspect on surveillance footage.
- Nancy Grace: "It's called tag. Tag Tattoo and Graffiti Team...It's a team of cryptanalysts, the only one of its kind in the US helping law enforcement." [35:13]
- Modern databases now allow image-based searches of tattoos, vastly improving suspect identification despite partial or blurry images.
- Brian Fitzgibbons: "...the FBI...is moving towards a tattoo database that’s image searchable as opposed to the text searchable format that exists within...NCIC." [37:40]
- Law enforcement is leveraging the FBI’s Tattoo and Graffiti (TAG) analysis team to analyze a partial tattoo seen on the suspect on surveillance footage.
- Tattoo as an Investigative Tool:
- Tattoos can link suspects to organized crime or known offender groups.
- Panel discusses methods of enhancing low-res images using AI and connecting to huge national tattoo databases.
- Tattoos can link suspects to organized crime or known offender groups.
5. Dismissing the “Chilean Theft Gang” Theory
[40:12–47:16]
- Dave Mack and James Bass both strongly refute the theory that a South American crime group targeting wealthy athletes is involved.
- These gangs aim to avoid confrontation and surveil to ensure homes are empty; Nancy Guthrie’s abduction does not fit the MO.
- "A possible foiled robbery or something...but that’s just not what seems to be the case at all. It appears that this was a targeted kidnapping, not a robbery gone bad." [41:42–45:58]
- Brian Fitzgibbons: "To think that this took place at a time when the burglar was sure that Nancy Guthrie would be home certainly refutes that point." [46:32]
- These gangs aim to avoid confrontation and surveil to ensure homes are empty; Nancy Guthrie’s abduction does not fit the MO.
6. Theories on Medical Event vs. Abduction
[49:00–54:22]
- Heart Attack Theory:
- Nancy Guthrie’s health history (blood thinners, pacemaker) has raised the possibility she suffered a heart attack during a break-in and was removed by panicked intruders.
- Joseph Scott Morgan: "...whether or not she had a heart attack...it’s almost impossible for anyone to make that kind of diagnosis at this point in time. Hopefully, we won’t have to make that diagnosis." [49:26]
- Nancy Guthrie’s health history (blood thinners, pacemaker) has raised the possibility she suffered a heart attack during a break-in and was removed by panicked intruders.
- Blood Evidence & Staging:
- Discusses blood evidence found at the scene—its size, pattern, and what it suggests about Nancy’s position (standing, kneeling, carried?).
- James Bass: "[...] it looks to have be an aspirated pattern, you know, a cough or, you know, a sneeze...I believe there's, I believe that to be the...origin of the pattern, but that's just my, my opinion." [51:44]
- Joseph Scott Morgan: “...the blood in the larger droplets, it appears...to be aerated...which means that it’s coming out of the nasal pharynx area...but with this, it's in that one focal area right there and it stops. And we don't know what happened at that point...” [52:31]
- Discusses blood evidence found at the scene—its size, pattern, and what it suggests about Nancy’s position (standing, kneeling, carried?).
Notable Quotes & Memorable Moments
-
“Not possible as presented. ...If it had been destroyed or in some way altered, the connection would not have been intermittent. It would have been out completely.”
– James Bass discussing the utility box, [07:05] -
"You don't want to encounter someone in a robbery...it really does not fit what you would expect to see."
– James Bass on the theft gang theory, [45:58] -
"No one travels this world without one of these damn millstones that we have around our electronic neck, you know, with these phones."
– Joseph Scott Morgan, [30:03] -
"We may not be able to make out this symbol, but they will."
– Nancy Grace on the FBI’s TAG team, [38:29]
Timestamps for Important Segments
- 02:37 — Vandalized utility box and introduction of the case
- 07:05 — Expert analysis: functionality of utility/phone box
- 20:18 — Role of Google/Apple in tracking suspects
- 22:02–24:59 — Deep dive into Google data tracking and law enforcement methods
- 29:00–33:06 — Discussion: digital versus traditional leads
- 33:55–38:29 — FBI tattoo/graffiti analysis explained
- 40:12–47:16 — Disputing the Chilean theft gang theory
- 49:00–54:22 — Considerations of medical event, blood evidence, and scene analysis
Final Takeaways
- Utility box: Probably not related to the kidnapping; more likely plain vandalism or an unrelated theft attempt.
- Digital evidence (Google/Apple location, cellular data) is the most promising avenue, pending device access.
- The tattoo spotted on the suspect (enhanced via FBI TAG team) could provide a major breakthrough if matched.
- No evidence of robbery—valuable items/jewelry left behind—strongly suggests a targeted abduction rather than a burglary gone wrong.
- Medical emergencies (e.g., heart attack and the subsequent removal of Nancy) are considered but can’t be proven at this stage.
- Multiple law enforcement teams (FBI, security analysts, forensics) are working parallel tracks, and the panel expects a digital or physical clue to eventually crack the case.
If you have any information on Nancy Guthrie's whereabouts, contact 1-800-225-5324 or anonymously at 520-8827-463. A reward of $1.2+ million is currently offered. [54:22]
Summary compiled in the urgent, analytical tone characteristic of Nancy Grace, with direct expert quotations and context from the episode’s expert lineup.
