I wrote a longer rant, forum software swallowed it.
Speculation - the attack was not RFID reading (too hard to read cards at range), instead RFID eavesdropping (i.e. use Proxmark3 or similar device to sniff the card ids as they are read by the actual reader / antenna). This wouldn't require an accomplice / server access / wifi. My guess is that the cards are 125KHz, and the antenna to reader link on the tables is probably unshielded. Consider attempting to perform this attack on your own table for ~$300 (Berkey perhaps?)
Speculation - producers were looking for cheater, and changed the cards to specifically look for conclusive evidence (but failed?)
Speculation - other hardware attacks are possible (tempest or an SDR attack like:
https://www.rtl-sdr.com/using-a-hack...btain-the-pin/)