I understand what they are supposed to be, but how did Mike get his hands on them? And how does he know what he has are legit?
To go along with that, does he have anyway of proving these are legit captures? or is that what this is supposed to prove?
You could covertly reroute/duplicate traffic for parts of the world's internet through a satellite hop and then sniff the contents flowing between ground and satellite station. If discovered, claim it was a configuration mistake.