This case involves a graduate student at a prominent school who had access to his school’s computers through a student computer account. The student created a computer spyware program called an “Internet worm” that could exploit the security defects on computer networks. The worm was capable of spreading across a national network of computers after being inserted into one computer location connected to the network. The student’s programming of the worm made it blend in with the typical Unix operating system of the computer, making it difficult to detect or read so other programmers were not able to “kill” the worm easily. The worm would “ask” each computer whether it already had a copy of the worm and if the computer did not have a copy, it would duplicate itself onto the computer. However, when the student released the worm, it began replicating and re-infecting computers much faster than he had predicted. This resulted in far more copying than the student had intended. The worm caused many PCs around the country to crash, including computers at research facilities, universities, and military sites. The student’s worm caused thousands of dollars in damages and harmed security practices and procedures. It was particularly harmful for businesses with BYOD, or “Bring Your Own Device” polices in place, where the computer an employee brought home could easily pick up and spread the worm virus. An expert in digital forensics and internet security/computer electronics was sought to opine on the issue.