I don't understand why people keep calling this a hack. The systems were accessed by normal means as allowed and configured by their systems administrators.<p>Data hijack, data destruction, or some other term indicating there was vandalization through allowed access means would serve the tech community better.