K.

Apparently neutral, K. played a rol in interrupting normal communications in the network.

Given the tasks that he was developing in the team, he was responsible, somehow, for the permissions on libraries.

He thought that his actions could be covered, but both O. and me knew of the role he played.

In one occasion I mentioned this problem directly to C.G. and she, somehow, talked to him and the problem was fixed. Temporarily. All this at the second location.

The problem with me interacting with this guys is that I had already studied client/server before meeting them. Some of their actions were transparent to me due to my former experience in labs where the techniques that they were using had been practiced over and over again by people that attended classes. It was like seen students doing the same exercises - refusing privileges, blocking ip's, etc.

But at that time there was already more than that. I had some hints, only that I could not believe it.

They had already gone beyond certain limits in communications.

He was one of the favorites of T.
E-mail me when people leave their comments –

You need to be a member of Peacepink3 to add comments!

Join Peacepink3