Stupidity: The team can hack security cameras and gain access to Pam's laptop easily and load the image they want on her screen, but then have to email it to themselves for some reason rather than just transfer the file directly via the connection they already have to her machine. Ridiculously insecure and an unnecessary step.
Suggested correction: You're not wrong, but that segment is far more flawed. In reality, hackers never use the "remote desktop" technique, which has high bandwidth overhead and would require constant distraction of Pam to prevent her from noticing the blatant intrusion on her screen. Real-world hackers typically open a file-sharing connection to analyze the victim's PC, avoiding any interaction with the screen, mouse, keyboard, or email address.