I am wondering if JA used a keylogger on Travis' computer.
These are often full of viruses. Which could explain all the viruses found on his computer.
Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the target computer.
Let’s take up a small example: The user on the target computer goes to
http://mail.yahoo.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password“. Along with this, you will also be shown that they were typed in the Yahoo login page. Thus, the keylogger loads upon every startup, runs in the background and captures each and every keystroke.
Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills. Some keyloggers will send all activity logs to the email of the person who is "monitoring" another user.
The target user will never come to know about the presence of the keylogger on their computer. This is because, once installed, the keylogger will run in total stealth mode. Unlike other programs, it will never show up in the start-menu, windows startup, program files, add/remove programs or the task manager. So, the victim can no way identify its presence on their PC.
This program can also be removed remotely once you no longer have a need for it. Not sure if the virus' would remain.
It was just a thought.