In the course of a wireless network forensics operation at a technology firm in Austin, Texas, investigators deploy standard capture tools to collect live traffic from a suspected internal intrusion. Despite maintaining proximity to the affected area, they obtain only partial packet captures, and the extracted logs show significant gaps that prevent correlating device identifiers with timestamps. What condition most directly accounts for this limitation?
Submit