Sophie, an ethical hacker, utilized specialized tools and search engines to encrypt all her online activities, ensuring anonymous navigation to acquire confidential information from official government or federal databases. Subsequently, after gathering the required information, she executed a successful attack on the targeted government organization without leaving any traces. Which of the following techniques is depicted in the above scenario?