All very well, but it's more than likely that the ASIO will cover it's tracks until the last computer in the chain before the target one, the Terrorists will find the apparent computer that hacked theirs and go round and put a bomb under the poor bastard that owns it or shoot them.