I see what you mean. I don't know how the would access the breach. Perhaps it was some kind of experiment?