The stereotypical image of a hacker is that of a lone hooded figure at a computer, attempting to gain access — we presume — to a high-security network, probably belonging to a government department clouded in secrecy. The truth is more mundane: using readily available tools, or slight variants on them, teams of relatively skilled people use automated routines to comb the internet for easy openings to steal data for money.