Hacking is where an individual finds and exploits a weakness in a computer system or network, and then uses that for their own personal gain. Sometimes, all that it takes to be considered hacking is simply exploiting a weakness in another computer system even if you don’t use it to your personal benefit.
• The Motivations for Hacking
– Most of us can already get a general idea of what hacking is from what we know in media. We’ve all seen movies or read books where one of the characters is a professional hacker and uses their skills to either outsmart the good guys or seek revenge against the villain. But all of the hacking characters that we watch in movies have a motivation for hacking in the first place. This holds true for actual hackers in real life as well.
– The reasons why people would choose to discover and exploit a weakness in a computer system is primarily for financial gain, to erase any information about them, to bring about harm to an opposing organization or party, or just for the thrill of doing it.
– You may not believe it, but many hackers are divorced or have broken up with a significant other and are using their hacking skills against their ex-spouse either as revenge or to charge them with hacking. In this case, the victim of the hacking would be the ex-spouse, and they would need to report the hacking to law enforcement. They will also likely be required to testify at a trial, but beyond that, they won’t be involved as much in the case. Some may find this surprising such an ex-spouse hacking into your computer would definitely be a more personal issue beyond the legal aspects of hacking.
• Reporting a Hacker
– If you know or have strong reason to believe that somebody is a hacker, you should contact your local authorities as soon as possible. If this fails or leads to nowhere, you can move up and contact the FBI. As hacking is a serious crime, the FBI is guaranteed to take it very seriously (as your local police department should too). You can also try contacting your local law enforcement and the FBI at the same time, as the hacker may have violated both state and Federal laws. The authorities will try to locate the source of the hacking to find the hacker.