Essentially, perpetrators gain access to stores of information