I’ve been in IT for well over 25 years, and a CCIE for over 15 years now. There was a time when routers would not have played much of a role in this, outside of netflow/jflow/ipfix connection data, but remote access VPN configs would certainly be suspicious.
Far beyond that, most router operating systems now are built on top of a Linux kernel. This allows them to run Linux containers. These containers can do whatever you want them to do (and these containers can potentially be in the middle of a break/inspect/re-encrypt path configured on the report itself.
I don’t see this as a distraction. They have to look at EVERYTHING to get a complete audit. It’s not like they stopped doing anything else while arguing about the routers.
Isn’t IOS XE limited to the ASR 9000 series?
I doubt Maricopa is running those.
I agree with this. We may not be able to get ALL the traffic header/log information for Nov 3,4 but all they need is ANY|ONE piece of illegal access. THEN the ‘clean as the wind-driven snow’ (as Rushbo used to say) - goes out the window. THEN they can tack it on the wall as one more piece of a chain of evidence of wrongdoing. Build the case. Use EVERYTHING to do it.
ONE receipt in the garbage could be the missing link in the chain and be enough for the Feds to bring down a mobster.
The distraction part is primarily people in this forum who think because Maricopa County must be hiding something because they won’t turn them over, you’ve seen the comments, basically if we could just get the routers we could see who illegally accessed the network and changed the votes, when in reality it’s likely to show nothing