How to exploit data mining without becoming aware of it