What is the count up to?
Do any of those laptops actually contain the malicious code used in the machines? Was one of them a control terminal?
That would be a big reason not to enter them into evidence.
What is the count up to?
Do any of those laptops actually contain the malicious code used in the machines? Was one of them a control terminal?
That would be a big reason not to enter them into evidence.