Using software that bypasses normal security constraints to allow unauthorized access to data. For example, such a program may issue commands directly to the disk drivers without going through normal file I/O routines, bypassing not only security restrictions but also leaving no audit trail. See
superencrypting.