Information Theft Techniques