Quote:
Originally Posted by Dick Tracy
The computer handling the hole cards needs to be investigated, but I'm sure they (attempted) to scrub it already.
Who attempted to scrub it?
Seriously, guys. I'm not saying obstruction of justice never happens- far from it- but this notion that people involved in complex computer crimes just erase all the evidence, even evidence that isn't within their control, even when doing so can get them in real trouble with their employers or make things look more suspicious, is unfounded.
Most likely, the mechanisms that were used to perpetrate this still exist somewhere in readable form.
Somewhat less likely, some of the mechanisms not within the possession, custody, or control of Stones which were use to perpetrate this no longer exist. However, in that event, (1) the mechanisms within the possession, custody, and control of Stones still do exist, and (2) there is some sort of digital forensic trail that will yield significant usable evidence regarding the destroyed or secreted items.
But no, the chances that (1) the hole card reading computer contains relevant evidence regarding the hack and (2) it was successfully scrubbed of all incriminating information by a Stones employee with access to it are very close to zero.
IF this is investigated properly, there is going to be a mountain of evidence. It's just impossible to pull something like this off without leaving an extensive trail.