I obtained confidential information in the same way government employees did, and I did it all without even touching a computer. … I was so successful with this line of attack that I rarely had to go towards a technical attack.