"is to figure out who the hacker is."