Which of the following social-engineering techniques was used in this case?