IT PROFESSIONALS
What is an IT Professional ?
" An IT Professional is someone who has knowledge , skills and mastery on his field ( Information Technology). In order to be called an IT professional , A person must have knowledge or have been educated in every corner of Information Technology , knowing how it works and how to work on it ."
What can you say whether a person is an IT
professional or NOT?
We can identify an IT professional if he possess the following
Qualities :
- Has a working knowledge of related
technical areas.
- Is a mile deep in primary
expertise
- And most of all ,APPLIES ethical manner inside and outside work if he or she doesn't
possess any of those stated above , he , in some aspect cannot be consider as a
professional
- .Can you consider a Graduate of 3 month
Technician Course a Professional ? YES
!!!We
can consider a 3 month Technician Course a Professional. That is according to
an article post by
Jeniebarbosa(https://jeniebarbosa.wordpress.com/2011/08/30/can-you-consider-a-graduate-of-a-3-month-computer-technician-course-a-professional/)
There she says that ,they are considered as Professionals ONLY if he/she have
utilize and make use of the skills and knowledge acquired into a real working
environment.
Does an Email Document acceptable as legal Document as evidence in Court? YES!!!It
is acceptable as an evidence in Court ,but first ,they have to measure it's
reliability.According
to Federal law No. 1 Article 4 , Section 1 :"Electronic messages shall not
be denied legal effect and enforceability solely because it is in electronic
form."
CASE STUDY 2: E-COMMERCE OF THE PHILIPPINES
1. Does an email
document acceptable as legal document as evidence in the courts? Justify your
answer. Specify the law, article and section information.
Yes. An email document is acceptable as
legal document as evidence in the courts. It is clearly stated in the R.A 8792
– The E-Commerce Law of the Philippines under PART I – CHAPTER II-SECTION
6- Legal Requirements of Electronic Data Messages and Electronic
Documents which states that
–
“Information shall not be denied validity or enforceability solely on the
ground that it is in the form of an electronic data message purporting to
give rise to such legal effect, or that it is merely incorporated by reference
in that electronic data message.”
2. What are the
requirements for an electronic document to be accepted as legal document? Justify
your answer. Specify the law, article and section information.
Proving the validity of an electronic document, it
must comply the requirements stated by the E-commerce law under Part I-
Chapter II- SECTION 7. Legal Recognition of Electronic Documents stating that
“Electronic documents shall have the legal effect, validity or enforce
ability as any other document or legal writing, and –
(a) Where the law requires a document to be in writing, that requirement is met
by an electronic document if the said electronic document maintains its
integrity and reliability and can be authenticated so as to be usable for
subsequent reference, in that –
i) The electronic document has remained complete and
unaltered, apart from the addition of any endorsement and any authorized
change, or any change which arises in the normal course of communication,
storage and display; and
ii) The electronic document is reliable in the light of the
purpose for which it was generated and in the light of all relevant
circumstances.
(b) Paragraph (a) applies whether the requirement therein is in the form of an
obligation or whether the law simple provides consequences for the
document not being presented or retained in its original form.
(c) Where the law requires that a document be presented or retained in its
original form, that requirement is met by an electronic document if –
i) There exist a reliable assurance as to the integrity of
the document from the time when it was first generated in its final form;
and
ii) That document is capable of being displayed to the
person to whom it is to be presented: Provided, that no provision of this
Act shall apply to vary any and all requirements of existing laws on
formalities required in the execution of documents for their validity.
For evidentiary purposes, an electronic document shall be functional equivalent
of a written document under existing laws.
This Act does not modify any statutory rule relating to the admissibility of
electronic data messages or electronic documents, except the rules
relating to authentication and best evidence.
3. Is it legal to create
electronic contracts agreed by both parties? Justify your answer. Specify the
law, article and section information.
SECTION 16. Formation and Validity of
Electronic Concepts.
(1) Except as otherwise agreed by the parties, an offer, the acceptance of an
offer and such other elements required under existing laws for the formation of
contracts may be expressed in, demonstrated and proved by means of electronic
data messages or electronic documents and no contract shall be denied validity
or enforceability on the sole ground that it is in the form of an electronic
data message or electronic document, or that any or all of the elements
required under existing laws for the formation of the contracts is expressed,
demonstrated and proved by means of electronic data messages or electronic
documents.
(2) Electronic transactions made through networking among banks, or linkages
thereof with other entities or networks, and vice versa, shall be deemed
consummated upon the actual dispensing of cash or the debit of one account and
the corresponding credit to another, whether such transaction is initiated by
the depositor or by an authorized collecting party: Provided, That the
obligation of one bank, entity, or person similarly situated to another arising
there from shall be considered absolute and shall not be subjected to the
process of preference of credits.
4. Would you be
imprisoned if you are found guilty of computer hacking? Justify your answer.
Specify the law, article, and section information.
SECTION 33. Penalties.
The following Acts shall be penalized by fine and/or imprisonment, as follows:
(a) Hacking or cracking which refers to unauthorized access into or
interference in a computer system/server or information and communication
system; or any access in order to corrupt, alter, steal, or destroy using a
computer or other similar information and communication devices, without the
knowledge and consent of the owner of the computer or information and
communications system, including the introduction of computer viruses and the
like, resulting in the corruption, destruction, alteration, theft or loss of
electronic data messages or electronic document shall be punished by a minimum
fine of one hundred thousand pesos (P100,000.00) and a maximum commensurate to
the damage incurred and a mandatory imprisonment of six (6) months to three (3)
years.
5. How much is the fine
for computer hacking? Justify your answer. Specify the law, article, and
section information.
PENALTIES FOR COMPUTER HACKING
Someone who hacks into another person's computer
could be punished by a number of different crimes, depending on the
circumstances. The law punishes hacking under the computer crime statutes.
These crimes carry penalties ranging from a class B misdemeanor (punishable by
up to six months in prison, a fine of up to $1,000, or both) to a class B
felony (punishable by up to 20 years in prison, a fine of up to $15,000, or
both). The law also punishes unauthorized access to a computer or computer
network, with penalties ranging from a class B misdemeanor to a class D felony
(punishable by up to five years in prison, a fine of up to $5,000, or both).
A number of generally applicable crimes could also
apply. For example, hacking could be done to commit identity theft or larceny
and it could be punished under those generally applicable crimes.
In addition to criminal penalties, the law
specifically authorizes someone harmed by a computer or unauthorized use crime
to bring a civil lawsuit against the perpetrator. These civil actions are in
addition to any other grounds for a civil action that the injured party may
have.
6. Would you be
imprisoned for copying or downloading copyrighted movies and music from the
internet without proper copyright permissions? Justify your answer. Specify the
law, article and section information.
SECTION 33. Penalties.
The following Acts shall be penalized by fine and/or imprisonment, as follows:
(b) Piracy or the unauthorized copying, reproduction, dissemination,
distribution, importation, use, removal, alteration, substitution,
modification, storage, uploading, downloading, communication, making available
to the public, or broadcasting of protected material, electronic signature or
copyrighted works including legally protected sound recordings or phonograms or
information material on protected works, through the use of telecommunication
networks, such as, but not limited to, the internet, in a manner that infringes
intellectual property rights shall be punished by a minimum fine of one hundred
thousand pesos (P100,000.00) and a maximum commensurate to the damage incurred
and a mandatory imprisonment of six (6) months to three (3) years.
1. Does an email document acceptable as legal document as evidence in the courts? Justify your answer. Specify the law, article and section information.
“Information shall not be denied validity or enforceability solely on the ground that it is in the form of an electronic data message purporting to give rise to such legal effect, or that it is merely incorporated by reference in that electronic data message.”
2. What are the requirements for an electronic document to be accepted as legal document? Justify your answer. Specify the law, article and section information.
Proving the validity of an electronic document, it must comply the requirements stated by the E-commerce law under Part I- Chapter II- SECTION 7. Legal Recognition of Electronic Documents stating that
“Electronic documents shall have the legal effect, validity or enforce ability as any other document or legal writing, and –
(a) Where the law requires a document to be in writing, that requirement is met by an electronic document if the said electronic document maintains its integrity and reliability and can be authenticated so as to be usable for subsequent reference, in that –
i) The electronic document has remained complete and unaltered, apart from the addition of any endorsement and any authorized change, or any change which arises in the normal course of communication, storage and display; and
ii) The electronic document is reliable in the light of the purpose for which it was generated and in the light of all relevant circumstances.
(b) Paragraph (a) applies whether the requirement therein is in the form of an obligation or whether the law simple provides consequences for the document not being presented or retained in its original form.
(c) Where the law requires that a document be presented or retained in its original form, that requirement is met by an electronic document if –
i) There exist a reliable assurance as to the integrity of the document from the time when it was first generated in its final form; and
ii) That document is capable of being displayed to the person to whom it is to be presented: Provided, that no provision of this Act shall apply to vary any and all requirements of existing laws on formalities required in the execution of documents for their validity.
For evidentiary purposes, an electronic document shall be functional equivalent of a written document under existing laws.
This Act does not modify any statutory rule relating to the admissibility of electronic data messages or electronic documents, except the rules relating to authentication and best evidence.
3. Is it legal to create electronic contracts agreed by both parties? Justify your answer. Specify the law, article and section information.
(1) Except as otherwise agreed by the parties, an offer, the acceptance of an offer and such other elements required under existing laws for the formation of contracts may be expressed in, demonstrated and proved by means of electronic data messages or electronic documents and no contract shall be denied validity or enforceability on the sole ground that it is in the form of an electronic data message or electronic document, or that any or all of the elements required under existing laws for the formation of the contracts is expressed, demonstrated and proved by means of electronic data messages or electronic documents.
(2) Electronic transactions made through networking among banks, or linkages thereof with other entities or networks, and vice versa, shall be deemed consummated upon the actual dispensing of cash or the debit of one account and the corresponding credit to another, whether such transaction is initiated by the depositor or by an authorized collecting party: Provided, That the obligation of one bank, entity, or person similarly situated to another arising there from shall be considered absolute and shall not be subjected to the process of preference of credits.
4. Would you be imprisoned if you are found guilty of computer hacking? Justify your answer. Specify the law, article, and section information.
The following Acts shall be penalized by fine and/or imprisonment, as follows: (a) Hacking or cracking which refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic document shall be punished by a minimum fine of one hundred thousand pesos (P100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years.
5. How much is the fine for computer hacking? Justify your answer. Specify the law, article, and section information.
PENALTIES FOR COMPUTER HACKING
Someone who hacks into another person's computer could be punished by a number of different crimes, depending on the circumstances. The law punishes hacking under the computer crime statutes. These crimes carry penalties ranging from a class B misdemeanor (punishable by up to six months in prison, a fine of up to $1,000, or both) to a class B felony (punishable by up to 20 years in prison, a fine of up to $15,000, or both). The law also punishes unauthorized access to a computer or computer network, with penalties ranging from a class B misdemeanor to a class D felony (punishable by up to five years in prison, a fine of up to $5,000, or both).
A number of generally applicable crimes could also apply. For example, hacking could be done to commit identity theft or larceny and it could be punished under those generally applicable crimes.
In addition to criminal penalties, the law specifically authorizes someone harmed by a computer or unauthorized use crime to bring a civil lawsuit against the perpetrator. These civil actions are in addition to any other grounds for a civil action that the injured party may have.
6. Would you be imprisoned for copying or downloading copyrighted movies and music from the internet without proper copyright permissions? Justify your answer. Specify the law, article and section information.
The following Acts shall be penalized by fine and/or imprisonment, as follows: (b) Piracy or the unauthorized copying, reproduction, dissemination, distribution, importation, use, removal, alteration, substitution, modification, storage, uploading, downloading, communication, making available to the public, or broadcasting of protected material, electronic signature or copyrighted works including legally protected sound recordings or phonograms or information material on protected works, through the use of telecommunication networks, such as, but not limited to, the internet, in a manner that infringes intellectual property rights shall be punished by a minimum fine of one hundred thousand pesos (P100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years.
VIRUSES
I LOVE YOU VIRUSDisablePwdCachingDisablePwdCaching from the computer registry. Once these changes have been made to the computer it will send it self to the people in your address book with the Subject ILOVEYOU.
How and where did the virus originated?
The ILOVEYOU virus comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book and, perhaps more seriously, the loss of every JPEG, MP3, and certain other files on the recipient's hard disk. Because Microsoft Outlook is widely installed as the e-mail handler in corporate networks, the ILOVEYOU virus can spread rapidly from user to user within a corporation. On May 4, 2000, the virus spread so quickly that e-mail had to be shut down in a number of major enterprises such as the Ford Motor Company. The virus reached an estimated 45 million users in a single day
Love
Letter Virus,
also known as the I love you virus, ILOVEYOU and Love Letter, was a
computer worm originating in the Philippines, which began infecting
computers on May 5, 2000. It spread by e-mail, arriving with the
subject line "ILOVEYOU" and an attachment,
"LOVE-LETTER-FOR-YOU.txt.vbs". If the attachment was opened, a Visual
Basic script was executed, and the computer was infected. Many
recipients were fooled because Microsoft Windows concealed the extension of the file, and
it was mistaken as a simple text file. Once executed, the script then
e-mailed itself to everyone in the victim's contact list, edited
the Windows Registry to execute the worm at startup, and
replaced the data in many computer files, including JPEG images and Word Documents, with copies of
itself.
Who
was responsible for creating and distributing?Some think it was Onel de Guzman of the
Philippines. Filipino authorities investigated de Guzman on charges of theft --
at the time the Philippines had no computer espionage or sabotage laws. Citing a lack of evidence,
the Filipino authorities dropped the charges against de Guzman, who would
neither confirm nor deny his responsibility for the virus. According to some
estimates, the ILOVEYOU virus caused $10 billion in damages.
Love Bug infects users who are using Microsoft Windows and/or
Microsoft Outlook. The following are examples of what the virus might look
like. If you see this e-mail do NOT open the attachment and delete the e-mail
IMMEDIATELY, even if the message is from someone you know well. uThe ILOVEYOU virus initially traveled the Internet by e-mail,
just like the Melissa virus. The subject of the e-mail said that the message
was a love letter from a secret admirer. An attachment in the e-mail was what
caused all the trouble. The original worm had the file name of
LOVE-LETTER-FOR-YOU.TXT.vbs. The vbs extension pointed to the language the
hacker used to create the worm:uThe Love Bug infects users who are using Microsoft Windows and/or
Microsoft Outlook. The following are examples of what the virus might look
like. If you see this e-mail do NOT open the attachment and delete the e-mail
IMMEDIATELY, even if the message is from someone you know well. uThe virus begins by copying itself into
the Windows directory placing Win32dll.vbs and LOVE-LETTER-FOR-YOU.TXT.vbs.
Once these files have been placed on the hard disk. The virus will place it
self into the computer's registry making the virus active on the following
boots. The virus will also try to delete HideSharePwds
Were there any prosecution?uThe Philippine
Department of Justice dropped all charges against a Manila college student
accused of releasing the "Love Bug" computer virus, citing a lack of
applicable laws and evidence.uThe Philippine
authorities filed theft and other charges against Mr. de Guzman, but dropped
them in August because of insufficient evidence. The case against him was
weakened because at the time, the Philippines did not have laws governing
computer espionage.
NIMDA VIRUS
uThe worm was released
on September 18, 2001. Due to the release date, some media
quickly began speculating a link between the virus and Al Qaeda, though this theory
ended up proving unfounded. The worm’s name spelled backwards is “admin“.uIt was unique in that
it used five attack vectors. It infected email and sent itself out to email
contacts; broke into web servers and infected files on websites by spreading
automatically across a network; and by parasitically infecting existing
programs on a hard disk.
Who was responsible
for creating and distributing it?uOne of the intriguing things about Nimda,
is that it was never established who created it. It appeared one week after
9/11 leading to speculation that it was created by state actors or even
terrorist groups. What is certain is that it was an incredibly clever and
destructive worm and perhaps a foretaste of what is to come should open cyber
warfare ever break out between nation states.
How did the virus
work and what effects did have?uNimda virus is a computer worm, and is also a file
infector. It quickly spread, eclipsing the economic damage caused by past
outbreaks such as Code Red Multiple propagation vectors
allowed Nimda to become the Internet’s most widespread virus/worm within 22
minutes.uThe Nimda worm's primary targets were
Internet servers. While it could infect a home PC, its real purpose was to
bring Internet traffic to a crawl. It could travel through the Internet using
multiple methods, including e-mail. This helped spread the virus across
multiple servers in record time.uThe Nimda worm created a backdoor into
the victim's operating system. It allowed the person behind the attack
to access the same level of functions as whatever account was logged into the
machine currently. uThe original
version of Nimda infected nearly 160,000 systems, according to data from the
Cooperative Association of Internet Data Analysis. Many companies pulled their
networks from the Internet to avoid being infected with the worm. The worm
affected many IT-related websites, including some belonging to Dell, Microsoft
and even one security firm, Alternative Computer Technology.
Were there any prosecutions?uThe author of the Nimda worm was never identified, so there can be no legal consequences for him. The code for the Nimda contains a copyright notice stating that it originated in communist China, but I have seen no confirmation that this statement is correct.
MELISSA VIRUSComputer programmer David L. Smith pleaded guilty on Thursday December 9th 1999 in USA courts for his role in creating and distributing the Melissa macro virus.
How and where did the virus originated?
Two days after his federal sentencing, the admitted creator of the "Melissa Virus" that snarled e-mail worldwide received a 20-month prison sentence from a state court Friday. David L. Smith also was fined $2,500 by state Superior Court Judge Lawrence M. Lawson. May 1, 2002
How did the virus work and what effects did have?
the virus through a hijacked AOL account to Smith, then 30. On December9th of that that year the programmer plead guilty to computer crimes instate and federal court, and stipulated in a detailed plea agreement tohaving caused over $80,000,000 in damage. The losses, coupled with otherstipulations in the plea agreement, carry a prison term of 46 to 57months.Smith remained free on $100,000 bail.There, the flurry of activity stopped. Smith's February 18th, 2000sentencing date was postponed, then, as the new date neared, was postponedagain. In all, Smith's sentencing has slipped five times. If he were to besentenced today, the elapsed time between his adjudication and sentencingwould come in at five times the 125 day federal average. The state case --subordinate to the federal sentence -- remains in limbo.Then-U.S. Attorney General Janet Reno lent a quote to the press release;Smith remained free on $100,000 bail.There, the flurry of activity stopped. Smith's February 18th, 2000sentencing date was postponed, then, as the new date neared, was postponedagain. In all, Smith's sentencing has slipped five times. If he were to besentenced today, the elapsed time between his adjudication and sentencingwould come in at five times the 125 day federal average. The state case --subordinate to the federal sentence -- remains in limbo.Melissa is a fast-spreading macro virus that is
distributed as an e-mail attachment that, when opened, disables a number of
safeguards in Word 97 or Word 2000, and, if the user has the Microsoft Outlook
e-mail program, causes the virus to be resent to the first 50 people in each of
the user's address books. While it does not destroy files or other resources,
Melissa has the potential to disable corporate and other mail servers as the
ripple of e-mail distribution becomes a much larger wave. On Friday, March 26,
1999, Melissa caused the Microsoft Corporation to shut down incoming e-mail.
Intel and other companies also reported being affected. The U. S. Department of
Defense-funded Computer
Emergency Response Team (CERT) issued a warning about the virus and developed a
fix.
Melissa
virus creator(David L. Smith)
Melissa
arrives in an attachment to an e-mail note with the subject line
"Important Message from ]the name of someone[," and body text that
reads "Here is that document you asked for...don't show anyone else
;-)". The attachment is often named LIST.DOC. If the recipient clicks on
or otherwise opens the attachment, the infecting file is read to computer
storage. The file itself originated in an Internet alt.sex newsgroup and
contains a list of passwords for various Web sites that require memberships.
The file also contains a Visual Basic script that copies the virus-infected
file into the normal.dot template file used by Word for custom settings and
default macros. It also creates this entry in the Windows registry.
Were there any prosecutions?Within
a week of the outbreak, New Jersey police and FBI agents trackedThen-U.S.
Attorney General Janet Reno lent a quote to the press release;
CODE RED VIRUS
How and where did the virus originated?
The effect of this virus, your computer will infinite sleep mode. this virus will self install to your computer and then make a 100 copy of itself but there is a bug of its code and it will create a thousands of copy of itself its like duplicating itself. the virus will check if the TCP port 80 is active if not the virus will send this kind of message: Get /Defualt.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3#u0003%u8b00%u531b%u53ff%u0078%u0000%u00=aHTTP/1.The worm's payload is the string following the last 'N'. Due to a buffer overflow, a vulnerable host interprets this string as computer instructions, propagating the worm. Code Red Virus or Worm last july 13 2001 the virus was first noticed by the senior security engineer for the Chemical abstract services ken eichman the virus attacks almost 1000 websites in different computers, until the virus confirmed by Dshield.org and the next day the eEye digital discover the virus. between the 1st and 20th of each month the virus will rapidly spread including 20th and 28th of the month, the worm will send a junk data to port 80 of 192.137.240.91 then after 28th and it will send a lot of junk data.There is no exactly Information about who is the responsible of creating this virus, the eEye said that the virus was first originated in Makati City Philippines. the defaced web page strongly suggest that the virus was from china. there is a rumors that the Wintermute of the virus coding group 29A is the responsibility of this virus. but Wintermute did code a virus RedCode, which is just a mistaken for CodeRed.
How did the virus work and what effects did have?
At first the virus will scan the host port 80 if active then it will sends a specially Constructed HTTP get request to the victim attempting to exploit a buffer overflow problem in the indexing service, if the 2nd attempt of the virus will work the virus will automatically install to the system of the victim then the virus will send this message:Were there any prosecutions?
The Code Red Virus really affected millions of computer and websites including the Whitehouse.gov. to the creator of this virus creating this kind of virus that can destroy many computers and trespass some websites specially the website of the government but somehow we still don't judge the creator of the virus we don't know he/she made this kind of virus. The Chinese people have a high IQ's when it come to technology the Chinese are advance they are really great but some Chinese use their skills in making some kind of things. so be careful of downloading and sharing files.HACKERS
Rhaphael Gray
Teenage hacker Raphael Gray - who famously sent a shipment of Viagra Tablets to Microsoft founder Bill Gates after lifting his credit card details off the internet - has been sentenced to a probation programme of three years of community rehabilitation for his crimes
vGray was able to break into the secure systems using an £800 computer he bought in his home town Clynderwen, Pembrokeshire, Wales. After publishing the credit card info on his websites, Gray posted a personal message saying law enforcers would never find him "because they never catch anyone. The police can't hack their way out of a paper bag.“.He was dubbed the "Bill Gates Hacker" when he sent Viagra tablets to Gates' address and then published what he claimed to be the billionaire's own number.He was tracked down by ex-hacker Chris Davis who was insulted by Gray's "arrogance". It took Davis under a day to find Gray's information, which he then forwarded to the FBI. "The FBI was actually quite easy to deal with, although technically, they didn't really understand what it was I was explaining to them. The local police were also very polite, but they didn't understand it," said Davis. Gray was arrested when FBI agents and officers from the local Dyfed Powys Police turned up at the door of his home, which he shared with his mother, sister and brother in March 2000vA court heard that Gray, praised by one victim for making the Internet more secure , within 6 weeks Gray obtained access to over 23,000 different credit cards by hacking into web sites . Police on both sides of the Atlantic took a month to track down the hacker to his home, where he was arrested by FBI agents.vGray called himself "Curador", a Portuguese word from the Latin for curator, on his internet sites e-crackers.com and freecreditcards.com, where he published details of his target companies and own beliefs.
What was this case all about?v The case was all about t the computer systems were hacked by Raphael Gray for just six weeks and the multi-million pound credit card mission was putted up. He insulted the police in which they would never found him for the reason that they never caught everyone. In his task he was irritating to prove the fragile safety of credit cards in the increasing quantity of consumer websites. Unfortunately, because of his overconfidence and evil desire, he was chased down by hacker Chris Davis and sent to FBI.