Imagine for a moment that you are a hacker, an ethical one. You are called upon by law enforcement to hack into a business network known to be engaged in criminal activity for financial gain as