The author provides an account of how he tracked down "Hunter," a criminal who was hacking into the nation's computer networks to gain unauthorized access to sensitive military and security information.