Maya left for her retreat on Tuesday morning. She kissed me on the cheek, a dry, performative gesture.
"Don't be a baby while I'm gone, okay?" she teased, her voice dripping with that new, condescending edge. "Try to hit the gym or something. Maybe you'll move up a rank."
She laughed and walked out the door. I waited until her Uber pulled away before I stood up. I had exactly 72 hours.
As a cybersecurity expert, I don't believe in messy breakups. I believe in 'de-provisioning.' When an employee is a threat to a company, you don't give them a two-week notice to sabotage the system. You revoke their access, you escort them out, and you wipe their footprint.
First: The physical space. We had lived in my apartment for three years. Maya never paid rent—she said she was 'saving for our future house'—but she had managed to fill every corner with her things. I called a professional packing service. I told them I was moving and needed everything belonging to 'the lady of the house' packed and moved to a climate-controlled storage unit.
By 4:00 PM, the apartment looked like it did the day I bought it. Minimalist. Clean. Quiet. I paid for three months of storage in her name and dropped the key at her sister’s house with a note that simply said: "Maya’s things. She knows why."
Next: The legal boundary. I called my locksmith. Because the apartment was solely in my name and she had no formal lease, I was within my rights to change the locks. I also had a new, high-grade security system installed with facial recognition and a silent alarm.
Then, I went to work on the digital front. This was my playground.
Maya had been using my secondary credit card for 'household expenses'—which mostly turned out to be $400 hair appointments and designer shoes. I cancelled it.
I went through our shared streaming accounts, the gym membership I paid for, the cloud storage where she kept her portfolio. One by one, I hit 'Remove User.'
But the most important part was my company. Maya had been doing some 'freelance' promotion for my firm. It was a way for me to give her extra money without it feeling like a handout. She had a guest login for our marketing server.
I pulled the logs. My blood ran cold.
She hadn't just been mocking me. She had been downloading client contact lists. She had been biding her time to jump to a competitor, using my own proprietary data as her 'buy-in.' She wasn't just a cruel girlfriend; she was a corporate spy in silk pajamas.
I didn't just delete her account. I flagged her IP address, prepared a formal cease-and-desist letter, and compiled a folder of her unauthorized downloads. I sent it all to my lawyer.
By Wednesday night, I was sitting in a luxury hotel across town. I didn't want to be there when she realized the world had changed. I ordered a glass of 18-year-old scotch and opened the 'Partner Assessment' screenshots one last time.
I looked at the photos she took of me. The mockery. The cruelty. And then I looked at the other men in the group.
There was David, a kind, slightly overweight accountant who adored his wife, Sarah. Sarah had written: "He’s so boring, I literally do my grocery list in my head while we’re intimate. If he didn't pay for my car, I'd be gone."
There was Mark, who had just recovered from a serious illness. His girlfriend, Chloe, had shared a photo of his surgical scars with the caption: "Frankenstein's monster is back home. Gross, right?"
These women were predators. And I realized that if I just walked away, they would keep doing this.
I created a new email account. I attached the screenshots of the entire chat, organized by 'Contributor.' I sent them to the husbands and boyfriends of every woman in that group. No message, no explanation. Just the truth, laid bare.
The fallout started almost immediately.
My phone—the one I kept for 'public' use—started blowing up.
Maya’s first text: “Ethan? My key isn't working. Are you home? Open the door, it’s raining.”
Ten minutes later: “Ethan, this isn't funny. Why is the alarm going off? Why is my code denied? Answer me!”
Then the calls started. I had already set up a routing system. Every call from her went straight to a pre-recorded message from my lawyer's office, stating that all communication must be handled through legal channels due to the pending investigation into data theft.
I watched through the apartment’s new doorbell camera. Maya was standing in the hallway, surrounded by her expensive luggage, screaming at a door that wouldn't open. She looked frantic. She looked small.
But then, her phone must have buzzed with a notification from her 'Assessment' group.
I watched her face go from pale to ghostly white. She started typing furiously. Then she looked up at the camera, her eyes wide with a mixture of terror and realization. She knew. She knew I hadn't just changed the locks. I had nuked her entire social ecosystem.
She started pounding on the door, sobbing now. "Ethan! Please! You can't do this! It was just a joke! We all do it! Don't ruin everything over a few texts!"
I turned off the monitor. I didn't feel happy, but I felt... clean.
The next morning, I received a notification from my office. Maya had shown up at the front desk, demanding to see me. She was disheveled, wearing the same clothes from the night before.
My head of security, a mountain of a man named Marcus, handled it.
"Mr. Sterling is not available, Ms. Vance," I heard him say through the lobby feed. "And if you set foot on this floor again, we will exercise the restraining order currently being drafted. Here is a copy of your termination from the freelance project and the invoice for the stolen data."
She looked at the papers, her hands shaking. "Stolen data? I didn't... it was just for my portfolio!"
"Tell it to the lawyers," Marcus said, his voice like granite.
Maya left. But she wasn't done. That afternoon, she did exactly what I expected her to do. She went to the one person she thought could manipulate me.
My mother.
My phone buzzed. It was a call from my mom. I picked it up.
"Ethan? Honey? Maya is here at the house. She’s... she’s a mess. She says you’ve had some kind of breakdown and kicked her out on the street? She says you're accusing her of crimes? Ethan, what on earth is happening?"
I took a deep breath. "Mom, did she tell you why I did it?"
"She said you went through her private girl-talk and got upset over some jokes."
"Mom," I said, my voice cracking slightly for the first time. "I'm sending you a file. Look at the photos in it. Then tell me if you want that woman in your house."
I sent the file. I stayed on the line. I heard the silence as my mother scrolled through the images Maya had taken of me—her son—to mock with her friends. I heard my mother’s sharp intake of breath when she read Maya’s comments about waiting for me to get richer so she could leave.
"Ethan..." my mother whispered, her voice trembling with rage. "I'm calling the police to escort her off my property right now."
Maya had tried to use my family as a weapon. She didn't realize I had already provided them with the shield.
But as the second week began, Maya’s desperation turned into something much more dangerous. She didn't have a job, she didn't have a home, and her friends—the ones who were now dealing with their own divorces and breakups—blamed her for the leak.
She had nothing left to lose. And that’s when I received a message from an unknown number.
"I still have the photos, Ethan. The ones I didn't share. If you don't give me $50,000 and sign over the apartment, they go on every public forum I can find. Let’s see how your 'professional reputation' handles that."
She was trying to blackmail a cybersecurity expert. It was the digital equivalent of bringing a toothpick to a gunfight.