I understand what they are supposed to be, but how did Mike get his hands on them? And how does he know what he has are legit?
To go along with that, does he have anyway of proving these are legit captures? or is that what this is supposed to prove?
Basically, Internet Protocol (IP) works like postcards in the regular mail. Each "card" has a to address, a from address, a datestamp and a message. Everything that uses IP is sent that way, including pictures and sounds.
A message that will not fit on to one card requires the use of many cards. They keep track of which cards are in the same message with Transmission Control Protocol (TCP).
Each one of those IP cards constitutes a "packet" so packet capture is like someone tapping in to the mail system and photocopying all the postcards. You can then knit them together to get the compete message.