[quote=@Unhinged] It must be pretty elaborate if you can't teleport in, wirelessly access the data, wirelessly access the security, overpower them, outrun them, outgun them, trick them, turn them off- [/quote] There are measures in place to prevent quick access without identity verification. While those techniques may work in the long run, they won’t be so simple.