[citation][nom]chripuck[/nom]Did you not read the part where T-Mobile said there was no security breach? Reading comprehension FTW...[/citation]
If you are competent enough to get in, through the firewall, and were able to copy the databases etc. over, then you should be competent enough to clear up your traces as well. Even in the dawn of computer networks & hacking, hackers were clearing their traces as soon as they're finished with what they are doing. So, "security isn't breached" means just "we don't have any logs stating that someone entered our network".
So, not having logs, does it really mean that nobody entered, or, someone entered and then cleared up all the logs regarding her when she's finished?