During the past two years, he’d penetrated highly protected computer systems, in which he had planted rootkits that allowed him to swim through their networks without their security becoming aware that a secret fish explored the data depths. His explorations had also led him into strange places on the Dark Web.