Criminal logo

Love in the Time of Cybercrime

In a world of secrets, love is the ultimate vulnerability

By SANANPublished 8 months ago 4 min read

Ava Lin wasn’t just good at her job—she was legendary. As the lead threat intelligence officer at SentinelWorks, a private cybersecurity firm contracted by both Fortune 500 companies and international defense departments, she had traced Russian botnets to basement servers in Kyiv, stopped ransomware attacks mid-deployment, and once tracked a rogue AI before it could embed itself in global IoT networks.

But none of that prepared her for Eli Reyes.

They met in Berlin, at a closed-door cybersecurity summit. Ava had given a talk on quantum-resistant encryption. Eli—at the time posing as “Elias Romero,” an independent threat researcher—asked a single question during the Q&A.

“If you knew a government client was intentionally embedding backdoors into the software you secured, would you still protect them?”

The room went quiet. Ava’s heart jumped. It wasn’t the question—it was the way he asked it. Calm. Challenging. Knowing.

She didn’t answer.

Later that evening, they ran into each other at a café outside the venue. One espresso turned into two. Then came walks through the streets of Kreuzberg, conversations about digital ethics and privacy, and finally, an unspoken agreement to not talk about their pasts.

For the first time in her life, Ava didn’t feel like she had to look over her shoulder. With Eli, there was no pressure to be the watchful analyst or the tech prodigy. He wasn’t impressed by her resume—and that intrigued her.

They spent a week together before parting ways with the promise of “finding each other again.”

They did. In Lisbon. Then Prague. And eventually, she let him into her life back in San Francisco. Quietly. Privately. No social posts. No GPS tracking. No digital trail.

Love, she thought, could coexist with secrecy.

She was wrong.

Chapter Two: Pattern Recognition

Three months after Eli vanished without warning, Ava received an internal alert. A zero-day exploit was found within SentinelWorks’ custom firewall framework—software she had designed.

The code was elegant. Subtle. It didn’t extract data—it redirected it, rerouting information through a phantom server that mirrored their logs. A digital ghost.

She traced the digital signature. It was scrambled—but familiar.

Eli had once joked about a “ghost mode” backdoor he used to test vulnerabilities. She’d laughed it off. Now, she wasn’t sure it was a joke.

Ava reported the breach to the internal security board—without mentioning her suspicions. She knew what it would mean. Admitting a relationship with a suspected infiltrator would blacklist her for life.

She launched a covert investigation. Alone.

What she discovered turned everything upside down.

The data that was rerouted wasn’t being sold—it was being filtered. Every vulnerable node was being quietly patched. Weaknesses were being removed before attacks could happen. Someone was shielding SentinelWorks. Protecting it from the inside.

That someone… was Eli.

Chapter Three: The Message

She found the hidden node buried under layers of decoy metadata. Inside, encrypted using a cipher they’d created for fun one night while watching a bad hacker movie, was a message:

"I wasn’t sent to hurt you. I came to stop them—from using you. Sentinel isn’t what it seems. Someone at the top is selling access. I tried to tell you. But you were too close. So I did the only thing I could. I vanished. But I never stopped watching over you. —E"

Ava’s breath caught.

She had always believed in systems. Rules. Trustless design. She had built her life around safeguarding networks—but not hearts.

She pulled up internal audit records. Dug deeper than she ever had. What she found was sickening: secret data transfer contracts signed by SentinelWorks executives, giving certain clients persistent access to security flaws Ava and her team had “patched.” It was controlled exploitation—extortion by another name.

She had been protecting criminals.

And Eli… had been protecting her.

Character Backstories

Ava Lin

Age: 30

Origin: Singapore-born, California-raised

Education: MIT, graduated at 19

Known for: Building a self-learning intrusion detection system used by NATO

Motivation: After losing her father to a state-sponsored cyberattack that erased their family's savings and identity, Ava devoted herself to preventing digital harm. She believes in transparency and accountability—until her ideals are shaken by love and betrayal.

Eli Reyes

Age: 34

Origin: Venezuela-born, lived across South America and Europe under aliases

Education: Self-taught hacker, recruited by a black-ops unit at 18

Known for: Exposing an international surveillance network that targeted dissidents

Motivation: After refusing to weaponize a mass-surveillance system he helped build, Eli went underground. Since then, he’s worked to quietly sabotage unethical surveillance programs. He trusts few—but Ava changed that.

Chapter Four: Love as a Vulnerability

Ava resigned from SentinelWorks the next day.

Publicly, she cited burnout. Privately, she handed a hard drive to a journalist at a cybersecurity magazine, full of evidence. SentinelWorks collapsed within weeks. Executives were indicted. The story hit international headlines.

But Eli never resurfaced.

Until she received a package. No name. No return address.

Inside was a burner phone.

When she powered it on, a message popped up:

“If you’re reading this, then you already chose the truth. There’s a secure connection waiting. Come find me. —E”

A location pinged in Iceland. A safehouse.

Ava smiled.

In a world of secrets, love had made her vulnerable—but it had also made her stronger. More human.

And now, she was ready to love again.

Even if it meant risking everything.

fact or fictionfictionguiltymafiaracial profilingcelebrities

About the Creator

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2026 Creatd, Inc. All Rights Reserved.