periods of time, and as noted in the article, material has been added AFTER the laptop was dropped off to Mac Issac, and while a good deal of data is authenticated...as any fraudulent scheme would need...a large amount of that data cannot be verified...that's the problem.