Not that I don't believe you but what do you consider as criminal activity?
That part that makes it criminal is the fact he knew those files contain the keys for the other receivers bin he is throwing into the customers receiver.
It borders on cloning or trying to clone a receiver which is illegal.
Those keys then are carried into the unsuspecting persons receiver who thought they were getting custom maps for their receiver when in fact they were not but one he kept illegally to throw into other receivers since he was too lazy to create his own set of mappings.
Now if that person who had this done to them unknowingly tried to sub to programming and the bin he used was mine (which it was), and I have my receiver turned off then they get shut down also.
The one thing the programmer did at my request was to come up with a newer program which only the programmer and I have to clean that up and restore their receivers to an un-compromised state.