How to pull off the perfect cyber crime