Many stories have come to light lately about people getting caught using their computer for nefarious purposes. Possession of confidential business secrets, CP or spreadsheets to track gambling activities have gotten a wide variety of folks in hot water. How did these people get caught? By now, most lay people know that a specialized form of technical analysis, most often referred to as computer forensics, facilitated their capture…