. "It has pictures of equipment used, diagrams of the networking layout, and other details that hackers could make use of." . . .