Re: I'd like to know
If they can't man in the middle encrypted traffic, by decrypting it on the monitoring equipment and then re-encrypting with their own certificate to send it on to its destination, then they can't see what's in it. The bad guys used an encrypted connection to carry out their nefarious activities.