Usually, a modern data theft story begins and ends with some shady system infiltration, firewall dodging, and presumably ...