Chapter 8: A Calculated Glitch
Chapter 8: A Calculated Glitch
The next forty-eight hours transformed Alex from suspect to hero in the eyes of the university's IT security department. He threw himself into the role with methodical precision, crafting detailed technical documentation that painted him as a brilliant employee who'd discovered a critical vulnerability rather than the person who'd exploited it.
His fabricated report on the "legacy phone system spoofing vulnerability" was a masterpiece of misdirection. Alex had spent years learning the university's ancient infrastructure, and he used that knowledge to construct a plausible explanation for how an external attacker could have manipulated the registration system while leaving digital breadcrumbs that pointed to legitimate employees.
The beauty of his deception lay in its foundation of truth. The phone registration system really was antiquated and poorly secured. Caller ID spoofing was a genuine technique used by sophisticated hackers. The vulnerability Alex described could theoretically exist, even if no one had actually exploited it in the way he claimed.
By Wednesday morning, Alex found himself in the university's main IT conference room, surrounded by network administrators and security specialists who hung on his every word as he presented his findings. Ms. Albright sat at the head of the table, her earlier suspicion replaced by professional admiration for his detective work.
"The core issue," Alex explained, pointing to a diagram he'd created showing the phone system's architecture, "is that the legacy authentication protocol relies on caller ID verification without cryptographic validation. A sophisticated attacker could use readily available equipment to spoof their phone number and make it appear as though calls originated from our internal lines."
David Chen, the head of IT security, leaned forward with interest. "You're saying someone could sit in a parking lot with a laptop and make it look like they were calling from our basement?"
"Exactly," Alex replied, warming to his performance. "The system was designed in 1995, before modern security standards existed. Back then, caller ID spoofing required expensive equipment that only telecommunications companies possessed. Now you can download apps that do the same thing."
Ms. Albright consulted her tablet, reviewing the timeline of events. "But the attacker would still need legitimate student credentials to modify enrollment records. How would they obtain Mr. Sharma's ID and PIN?"
Alex had anticipated this question and prepared an answer that would deflect attention from his administrative access. "Social engineering is incredibly effective, especially with international students who might not understand American privacy norms. The attacker could have posed as a university official, claimed there was a problem with Sharma's account, and requested his credentials for 'verification purposes.'"
Several IT staff members nodded knowingly. Social engineering attacks were common enough that Alex's explanation sounded entirely plausible.
"There's another possibility," Alex continued, his voice taking on the tone of someone reluctantly sharing bad news. "The attacker might have inside knowledge of our systems. Not necessarily an employee, but someone who'd previously worked here or had access through other channels."
The room fell silent as the implications sank in. Alex was suggesting that their security breach might have been perpetrated by someone with intimate knowledge of university operations—a disgruntled former employee, a contractor, or even a student worker who'd learned too much about the infrastructure.
"That's a disturbing thought," David said. "How would we even begin to investigate that possibility?"
Alex spread his hands in a gesture of professional helplessness. "It would require a comprehensive audit of everyone who's had system access over the past several years. Former employees, contractors, student workers, even maintenance staff who might have observed passwords or procedures."
Ms. Albright was taking notes rapidly, her earlier focus on Alex replaced by the overwhelming scope of the investigation he'd just outlined. "Mr. Carter, you've identified a systemic vulnerability that could affect every student at this university. This goes far beyond Mr. Sharma's case."
"I agree," Alex said gravely. "Which is why I think we need to implement immediate countermeasures while we work on a long-term solution."
He pulled out another folder, this one containing a detailed proposal he'd spent the previous night perfecting. "I've drafted a comprehensive security patch that would address the phone system vulnerability while maintaining backward compatibility with our existing infrastructure."
David accepted the proposal and began reading, his eyebrows rising as he processed the technical details. "This is... incredibly thorough. You've identified attack vectors I didn't even know existed."
"I've been working with these systems for two years," Alex replied modestly. "You learn to see patterns that might not be obvious to someone who only deals with the modern network infrastructure."
Ms. Albright leaned back in her chair, studying Alex with an expression he couldn't quite read. "Mr. Carter, I have to ask—how did you acquire such detailed knowledge of network security and system vulnerabilities? This level of expertise is unusual for an undergraduate student."
For a moment, Alex felt the familiar chill of suspicion. But then he realized that Ms. Albright's question came from professional curiosity rather than investigative instinct. She was impressed by his technical knowledge, not threatened by it.
"Honestly? I got interested in cybersecurity after hearing about data breaches at other universities," Alex said, projecting the enthusiasm of a student who'd found his calling. "I started reading security research papers, taking online courses, even attending hacker conferences when I could afford it. I figured if I was going to work with student data, I should understand how to protect it."
The answer was perfect because it was largely true. Alex had indeed educated himself about network security, though his motivations had been more offensive than defensive. His knowledge of vulnerabilities came from studying how to exploit them, not how to prevent them.
"That's exactly the kind of initiative we need in this department," David said, closing Alex's proposal. "Ms. Albright, I think we should seriously consider bringing Mr. Carter on board as a security consultant for this project."
Alex felt a surge of satisfaction that he carefully kept off his face. Not only had he deflected suspicion from himself, but he was now being recruited to help solve the very crime he'd committed. The irony was so perfect it was almost artistic.
"I'd be honored to help," Alex said. "Student data security is something I'm genuinely passionate about."
Ms. Albright nodded approvingly. "Excellent. Mr. Carter, I'm going to need you to work directly with our IT team to implement your proposed security patches. This will require expanded system access and administrative privileges."
The words hit Alex like a bolt of lightning. Ms. Albright was offering him even greater access to the university's systems—the digital keys to the kingdom he'd already learned to manipulate. What had started as a desperate gambit to avoid prosecution was becoming an opportunity to expand his capabilities exponentially.
"I understand the responsibility that comes with that level of access," Alex said carefully. "I take data security very seriously."
"I can see that," Ms. Albright replied. "Your proactive approach to identifying this vulnerability demonstrates exactly the kind of thinking we need. I'll have the paperwork processed by Friday."
As the meeting concluded and Alex gathered his materials, he caught David Chen reviewing his technical proposal with obvious admiration. "This is graduate-level work," David murmured to Ms. Albright. "Where did we find this kid?"
"He found us," she replied. "Sometimes the best security experts are the ones who understand how systems can be broken."
Alex maintained his professional demeanor as he shook hands and accepted congratulations from the IT staff, but internally he was marveling at the completeness of his transformation. In less than a week, he'd gone from primary suspect to trusted consultant, from potential criminal to cybersecurity expert.
The walk back to his dorm felt like a victory lap. Alex had not only survived Ms. Albright's investigation but turned it into a career opportunity. He'd weaponized his own knowledge of the crime to become the person responsible for preventing similar attacks.
His phone buzzed with a text from Lucy: Heard through the grapevine that you're becoming some kind of computer security expert. That's amazing! Can we celebrate tonight?
Alex typed back: Absolutely. I have some good news to share.
But as he sent the message, Alex realized that his victory came with complications he hadn't anticipated. Lucy would want details about his new role, explanations for his sudden expertise, insights into the investigation that had made him a hero. He would need to construct an entirely new narrative about his transformation from mild-mannered student worker to cybersecurity consultant.
More importantly, he would need to be careful about how he used his expanded access to the university's systems. Ms. Albright and David Chen would be watching his work closely, analyzing his methods, learning from his approach to security. He would be operating under a level of scrutiny that made his previous activities look like child's play.
But Alex found himself energized rather than intimidated by the challenge. He'd discovered a talent for manipulation that went far beyond his ability to navigate computer systems. He could craft narratives that transformed his weaknesses into strengths, present himself as whatever his audience needed him to be, and make people grateful for his deception.
As he reached his dorm room, Alex caught his reflection in the lobby mirror. The person looking back at him had evolved again—no longer just a digital saboteur or a hunted suspect, but someone who could manipulate institutional authority itself.
He'd turned his greatest vulnerability into his strongest asset, but more than that, he'd learned to make the system work for him in ways he'd never imagined possible. The ghost in the machine had become its guardian, trusted with the very secrets he'd once stolen.
And the most beautiful part was that everyone was thanking him for it.
The hunt had ended with the predator becoming the protector, but Alex knew the game was far from over. He now had access to every student's records, every administrative function, every digital secret the university possessed.
Jay Sharma had been just the beginning.
Characters

Alex Carter

Jay Sharma

Lucy Miller
