Disclaimer- I am hopelessly confused by all the computer stuff and so am not the best person to dig useful info out of BK notes. But after reviewing them twice, here's what I think might be relevant:
1. BN says that he never touched TA's original HD. He also says that the Mesa PD's (clone, copy whatever ) does indeed have the exact same *advertiser censored* stuff and files that he found on his own (clone, copy, whatever).
2. Inference- Nurmi says BN found child *advertiser censored* on his (clone, copy, whatever). That means the same info can still be found on the Mesa PD's version.
3. Still be to refuted by JM. That programs were deliberately installed on June 10 (19?) thst could not have been auto updates or installation), and that the installation of those programs erased files.
4. I think BN verified that the HD was turned on June 19 without a write blocker- the protection that ensures nothing is changed on the computer. That's how files were deleted/modified on June 19.
5. BN also says the unprotected HD was on for a total of 12 minutes before being turned off improperly (cord pulled or some such).
There are 2 separate issues-did JM /Flores tamper with evidence? And, did Travis access *advertiser censored* (including child *advertiser censored*) on his computer?
Tampering- whatever happened or didn't happen, it seems extremely unlikely that JSS will believe the State acted deliberately to erase or modify files. The evidence just isn't there, bolstered by the ex-atty's testimony yesterday that Maria did indeed look at files on the HD.
As far as the *advertiser censored*. I'm gonna guess that JSS allows the DT to bring it in, unless JM 's expert testifies that he looked and there is no *advertiser censored* on the Mesa PD (clone, copy, whatever).
An awful possibility would seem to be that the DT is given the time - weeks- to sort thru all the alleged *advertiser censored* on their clone, copy, whatever, to ascertain what was caused by viruses and what they claim had to be accessed on purpose.
Adding...(left it out). I don't know if BN is actually hiding anything /covering up tampering. It seems equally possible he is following directions to obfuscate, hinder, and to delay.
I say that because I think it was ok for him to delete files on his own (clone, copy, whatever). He says they were malware and viruses. The other difference between the 2 versions , used memory , might be an indication of the size of the HD BN uses to examine the clone , copy, whatever.
Thst doesn't mean he shouldn't turn over whatever it was he used or did. Just saying there may well nothing incriminating to find on it.