I believe the answer is: infiltrate
The infiltration method that most popular in recent years have been developed into two main method.
The first method is by posing into someone that work around the desired data and the second method is by using hacker to got into the other party's system.