The MAC addresses (the specific computers sending and receiving the data) is such a great piece of information. It should lead investigators to specific machines. If the data on that Maxine has been erased or is deferent, then whoever had control of that machine also committed treason along with anyone who gave access passwords and so on. Was something as simple as Packet Tracer the key to seeing the theft in real time?
The MAC addresses (the specific computers sending and receiving the data) is such a great piece of information. It should lead investigators to specific machines. If the data on that Maxine has been erased or is deferent, then whoever had control of that machine also committed treason along with anyone who gave access passwords and so on. Was something as simple as Packet Tracer the key to seeing the theft in real time?
It would be pretty damning if those target ids correspond with election hardware