IMO when someone from an FBI computer forensic team tells me that there was a google search and that there was no tampering with the files I believe him over the other guy who couldn't get hired by the FBI.
They seem to ask for evidence to back up timeline of stories one way or another. If the timeline doesn't match BC's story it could be over for him...
That guy is not really FBI and I don't understand why some think the FBI is impeachable. They have had their share of controversies. Also whoever said JW wanted to be in the FBI? That so called FBI guy didn't have much experience examining computers anyway and had poor explanations for the descrepencies. It was shown by JW how easy it is to boot a computer using any of a number of Linux Live CD's to manipulate files on the computer's disk without there being any evidence in the Windows event log. Files were obviously shown to have been tampered with or planted by someone. In fact it only takes minutes to do this. It would seem to me that this is what happenned especially given the fact that all of the files in question had identical time stamps down to the millasecond. This doesn't happen during a real search, zoom, etc. Here is how easy it is to do this:
1.) Clear cache and use a Windows PC and MSIE to do google maps search for Fielding Dr. or whatever that zip code was.
2.) Copy the cache files that were generated to the USB drive.
3.) Boot the PC Using Operator Live Linux CD (Runs entirely in RAM)
4.) mkdir /mnt/usb (create mount point for USB drive)
5.) mkdir /mnt/c (create mount point for PC's C: drive)
6.) mount /dev/sdd1 /mnt/usd (mount USB drive)
7.) mount -t ntfs /dev/sda1 /mnt/c (mount PC's C: Drive)
8.) cp /mnt/usb/* "/mnt/c/Documents and Settings/username/Local Settings/Temporary Internet Files" (copy cache files from USB drive to the browser cache directory)
10.) touch -t 200807110115.15 (for each of the copied cache file names) I don't rem the exact time stamp of the files for the alleged search so the time string might be different from this)
One could create a tmp dir and copy the files there and then do a touch 200807110115.15 * and then move them to the Temporary Internet Files directory and then delete the tmp directory. However there are tools that could see the deleted temp directory if the defense desired to use them. An ever better way would have been to use a loop construct to increment a counter to add to the seconds so all of the files wouldn't have an identical time stamp. Even this would look fishy upon close analysis and the time difference between all of the files would be the same. However it would look better than all files having the exact same time stamp.
The above process is so easy even a cave man can do it. You can pretty much follow the above steps verbatim.