ยฉPixabay
Author profile picture

It was the day before Christmas when the professorโ€™s phone rang. The screen said โ€œanonymousโ€, with a small a. That could only mean one thing.
โ€œHacker!โ€ said the professor.
โ€œProfessor!โ€ replied the hacker.
The hacker and the professor had known each other for a while. They had worked together when they were both still working for the police. The hacker called himself a hacker. Not an ethical hacker or a white-hat hacker, just a hacker. And the professor didnโ€™t really know many of these.

Recently, the professor had given a lecture on the need for cooperation between police, universities and businesses. Lots of people had come to listen, and the hacker was one of them.
โ€œYouโ€™ll hear about it in the media soon enough, but the University of Maastricht has fallen victim to ransomware,โ€ said the hacker, โ€œand as that actually involves cooperation between the police, the university and the business community, Iโ€™d like to invite you for a cuppa coffee.โ€
If the hacker said โ€˜cuppaโ€™, he meant a double espresso. However, โ€˜inviteโ€™ didnโ€™t necessarily meant that he was paying.

And so it came to be.
They had barely shaken hands before the hacker had gone off on a tangent.
โ€œThis type of software is aimed at getting ransom money. It was planted on the victimโ€™s system much earlier and was most likely tested before it was actually activated. The software encrypts or shifts important data, and the victim receives a message offering to decrypt the data in exchange for crypto currency.โ€
โ€œHow about a double espresso?โ€ the professor asked. After a slight nod of his head that was only obvious to an experienced observer, the hacker hurtled on.
โ€œEven if Maastricht University were to pay, there is a good chance that only a portion of the data could be recovered. Moreover, it increases the chance of subsequent ransomware because the victim appears to be willing to pay.โ€
The professor noted that weapons of mass destruction refer to weapons of the past, but that weapons of mass disruption have the future.

โ€But thatโ€™s when it gets really interesting,โ€ the hacker went on. โ€œbecause what does the victim do next? โ€
The professor knew that raising an eyebrow was all that was needed.
โ€œIโ€™ll tell you: theyโ€™ll hire a commercial party to do an analysis of the damage, and the chances of undoing that damage. This is the most crucial thing for the victim. And the police? Theyโ€™ll be called in to file a report and run an investigation. But thatโ€™s comparable to bicycle theft.โ€
The professor didnโ€™t have long to think about this comparison.
โ€œItโ€™s more of a formality, I mean. Because I can assure you that any clues in the software code, or the email or IP addresses point to countries where the police are not allowed to investigate! So detection and prosecution is out of the question from the outset.โ€

The hacker stared at him with a meaningful look in his eyes. Their relationship required that the professor should now ask a smart question.
โ€œSo youโ€™re saying that this kind of criminals can get away with everything because they donโ€™t have any natural enemies?โ€ It wasnโ€™t really a smart question, but more of a summary.
โ€œExactly!โ€ the hacker exclaimed enthusiastically. โ€œThe victim is technically no match for the criminal. And the police canโ€™t do anything as they have to stick to conventions or to the rules of professional conduct.โ€

The hacker was silent. Just for a moment.
โ€œBut as a citizen, I donโ€™t have to worry about that. I am on various forums, pretending to be someone else, using pseudonyms and shielded email addresses, buying a piece of software here and there. I donโ€™t do anything illegal, but I do stuff the police canโ€™t do or can only do in very exceptional cases.โ€
The professor nodded. In their previous lives they had frequently been confronted with legislation that prevented the police from doing what a citizen is allowed to do.
โ€œMeanwhile โ€“ Iโ€™ve collected a huge amount of data. On groups of offenders, modus operandi , conversations between people and so on. Thereโ€™s predictive value in all of that.โ€ The hacker continued, โ€œI donโ€™t want to say that the attack on the university could have been prevented with this, but Iโ€™m already detecting patterns with my own eyes. So if we apply data science โ€ฆ well then โ€ฆโ€
He was looking for the right words and that was a new experience for the professor too.
โ€œโ€ฆ Then we will definitely be better able to predict whatโ€™s going to happen.โ€

Christmas came, and shortly after that, New Yearโ€™s Eve. The hackerโ€™s observations lingered in the professorโ€™s head the whole time. When the new decade dawned, he grabbed his phone. 2020 had to become the year of pattern recognition, and that would begin with a double espresso.

He called โ€œanonymous.โ€ With a small a.