I understand what they are supposed to be, but how did Mike get his hands on them? And how does he know what he has are legit?
To go along with that, does he have anyway of proving these are legit captures? or is that what this is supposed to prove?
In a network information being sent between to IoT devices can be monitored using software potentially a MITM situation or various other methods meaning whatever information was being sent either to flip votes or what have you from the source it was sent from or to the destination it was sent to is all recorded
Source; Studying for CCNA 200-301 and soon to be network engineer.