I think if they go this way they should stick to the irate neighbor concept. If CPD were looking to plant evidence, it seems they'd plant some physical evidence and be done with it.
To me they are trying to pour water into an upside down bucket unless they can show the system WAS hacked and things actually altered, or produce the neighbor who did it.
I don't think they have to suggest tampering, there may have been no tampering.
I think they will show network intrusion (i.e. the real MAC of the device accessing) which then casts doubt on the integrity of all resources within that network.