I think if Terri had somehow found a way to obtain a "buyer" for Kyron, there would be evidence on her computer of such. We know she is not careful about electronics. And since LE is still keeping all sorts of options open, it makes me think that they did not find anything that pointed to one scenario or another. I mean, one would almost have to use the internet to locate any such person, or group, or set of parents, etc...who might want a young boy. And according to Kaine, she was on the computer all the time. If the answer is not on her hard drive...she probably just "dealt" with poot Kyron herself.
I agree with the above.
But sometimes I wonder...
Nowadays, netbooks and laptops are relatively cheap. You can buy a used laptop on ebay for less than $200. It'll be a couple years out of date, probably not very fast, but good enough to web surf and do email with.
I've always thought that if I were considering committing a crime, my first step would be to buy a cheap laptop or netbook to be used
only for research and communication related to the crime. Using one of those pay-in-advance credit cards that you can get in anyone's name (usually used as a form of gift card).
I'd keep my two computers completely separate. Never, ever check email for my "official" self from my secret computer or check my secret email addy from my official computer. Any research connected to the crime would be done with the secret laptop. They would be like two computers belonging to two completely separate people.
Being that I'm a belt-and-suspenders kind of gal, I would never ever use my secret computer on my home wireless network. I would find the local free hotspots and use them exclusively. However, I'm not a young mother who has to deal with a toddler, so getting away from home for an hour or two each day to use free wifi hotspots would not be as big a problem for me as it might be for someone who does have a small child or two to take care of.
And as soon as the crime had been committed, I'd physically dismember the secret computer, smash the hard drive platter and dispose of the various parts in different locations. One computer part per location. Most laptops can be reduced to pieces no larger than a deck of playing cards in 5-10 minutes (assuming a plastic case; a metal case might be more of a problem). Then it's just a matter of driving around and dropping one piece off every time I'd see a garbage container.
I wonder if LE got all the records of useage from the Horman's ISP? It would be mind numbingly boring to check all outgoing packets but it might reveal something that the family electronics have not.
Okay, I just asked my local internet guru. According to my dear husband, some ISPs keep such records and some do not. Those that do keep such records usually do not keep them for very long (data storage limitations).
One huge flaw in all the above is that it requires someone who plans in advance, who is very organised and disciplined, who is able to keep a secret from the entire world. Kinda like Ted Kaczynski, the Unabomber. And even Ted wasn't able to keep everything completely secret, he sent enough of his political ramblings to his mother and brother that they were able to identify him from his manifesto.
That just doesn't seem like TMH to me.