In this case "chumps" is the complainant on behalf of us.
Chumps automatically creates a list of subject systems and responsible parties.
Systems are initially identified by IP address, then by MAC address
The specific threat we are interested in is Abuse of Resources, this doesn't limit the potential problems associated with this system.