Part 9/15:
He rationalizes the activity as a "game," emphasizing the ease and legality (from his perspective) of exploiting individuals through social engineering because the victims willingly transfer funds and credentials on their own accord. He sees himself as merely "robbing" digital assets, comparing his activities to traditional theft but in a virtual space.