This appears to be a reference to acquiring delegates' online login details.Another document summarises a sustained campaign to penetrate South African computers, recording that they gained access to the network of their foreign ministry, investigated phone lines used by High Commission in London and retrieved documents including briefings for South African delegates to G20 and G8 meetings". (S