Well, I definitely have never been to their support pages because I actually didn't know that there was such a thing as Google Support. Sounds like an Oxymoron.
I haven't seen it said here that it was all cookie files that were invalid. But, with 45+ pages of posts, I may have missed that.
Oh, you're not, but there will be plenty of folks from BC's team that will be along soon to demean them. Kind of like when they blasted me for not knowing what I was talking about despite the fact that I proved that the cursor files were .bmp files, because, you know, the "expert" said that they wouldn't be.
I'm not trusting the "experts" from either side. I'm doing my own research. Unlike them, I have no vested interest in the results.
If you are referring to me, I am not on any side and not much of an expert with IE -- we barely allow MS Windows. The other day, I did a response to you after I did some further testing, but they closed the thread and thus lost the post. Attached is recreated from an intermediate save.
I do not understand how the watermarks on each image/tile and the watermarks in this deleted cookie with the invalid / missing meta data all fit together, but apparently that deleted cookie water mark had not been found until this week. M testified that with a subpoena Google could recover from this watermark the who, where, and when for the associated search. Someone MIGHT be in big trouble real soon.
The "dropping" of files could have been done locally on the machine, timestamps forced with one of the utilities, done remotely through the VPN or otherwise, or done on the disk while removed from the laptop. There was something that indicated that the disk was accessed after power down without using a writeblock or at least a functioning one.
M also testified that the FBI's disk with a fresh install of Vista and then doing a duplication of the search had a small fraction of a percent of its files with invalid timestamps, while BC's computer had more than an additiional 2% with invalid timestamps. CC testified that there was no significant difference found.
I would guess a subpoena has gone to Google. I also heard that Gilmore and another forensic expert are on the defense witness list incase something comes back before this goes to the jury. Rank speculation on my part.
ETA: I got caught again posting to a closed thread!
+++++++++++++++++
First, the tricks to getting Windows Explorer to display the TIF is when you are at the "Temporary Internet Files" folder, go into the Address window and add "\Content.IE5" at the end. You probably need to also change the Folder > Options... to display Hidden and System files. This lets you then browse around all those files IE and websites have used.
By manually clearing the .bmp files, I can roughly approximate what you did, but playing around with that raises other interesting questions that I haven't researched yet. What were the TIF retention policies on that computer?
I earlier asked if this data would have been updated by any later uses of Google Maps or of other Google apps that might use the same cursors.