By Deborah M. Todd Pittsburgh Post-Gazette (MCT) For shadowy cybercriminals who find backdoor access to stores of personal data, the process of hijacking identities and pocketing stolen cash can be...