comparemela.com

Card image cap

this was not sent from his blackberry. this was not sent from his official computer. we have looked at all the computers he has access to. this is not from him. >> yes. i mean, you can mostly show that through computer forensics. what you do is you track it back from the recipient back to twitter using their internet protocol address. from twitter you figure out what the source was and it's either going to point back to one of anthony weiner's computers, his blackberry, his cell phone, or it's not going to point there. and that's the kind of thing you do when you conduct an investigation. even if it does point to his computer that doesn't necessarily or definitively show that he did it because hackers could have hacked his computer. but it's good evidence that at least the first step you have to do, look for that stuff. >> and so, jeff, let me just ask you this as a courtroom veteran. i guess it's both a legal analysis, a courtroom analysis, and a bit of a political analysis watching the witness there. the witness being congressman

Related Keywords

Computers , Computer , Blackberry , Yes , Access , Computer Forensics , Anthony Weiner , Twitter , Cell Phone , Source , Recipient , Internet Protocol Address , One , Point Of View , Thing , Doesn T , Evidence , Investigation , Kind , Hackers , Bit , Jeff , Analysis , Witness , Courtroom Analysis , Stuff , Step , Courtroom Veteran , Witness Being Congressman Weiner ,

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.