ONE COULD ENGAGE A HACKER TO PERFORM PHONE BREACHING ASSISTANCE.