
Max Smeets
@Maxwsmeets
Followers
5K
Following
4K
Media
156
Statuses
2K
@Virtualroutes @ETH_en @BindingHook. Author of NO SHORTCUTS (2022) & RANSOM WAR (2025)
Zurich
Joined June 2016
I am excited to announce my new book “Ransom War: How Cyber Crime Became a Threat to National Security” published by @OUPAcademic & @HurstPublishers, out in February 2025.
14
54
198
Happy Publication Day @Maxwsmeets! #RansomWar: How Cyber Crime Became a Threat to National Security is out now. Smeets sheds light on the inner workings of the groups responsible for deploying ransomware, and on how governments and businesses can combat the threat. ‘An expert
0
4
8
It’s time! 🥁 @BindingHook & @MunSecConf proudly announce the AI-Cybersecurity Essay Prize Competition’s five winning essays. Read more: https://t.co/6xTaEzZraw
1
3
8
Join us for a book talk with Dr @Maxwsmeets on how ransomware is reshaping national security. Learn about the rise of cybercrime, the 2022 Costa Rica crisis, and more. Stay for a discussion with Max and light refreshments. 📅05 Feb |📍 Strand Campus 🎟️:
kcl.ac.uk
Discover how ransomware has evolved into a national security threat in this compelling book talk with Dr Max Smeets.
0
3
6
Join Dr @Maxwsmeets for an eye-opening talk on the rise of ransomware and its impact on national security. Uncover how these attacks are threatening global stability and learn about the Costa Rica cyber crisis. 📅05 Feb |🕚16:30 |📍Strand Campus Register: https://t.co/mvLsaAv6Kn
kcl.ac.uk
Discover how ransomware has evolved into a national security threat in this compelling book talk with Dr Max Smeets.
0
2
3
The 3buddyproblem podcast has definitely added some fun to my commutes home this year
The Best Cybersecurity Stories of 2024 you might have missed: https://t.co/LlVkpSmBvK featuring @ryanaraine and @juanandres_gs
1
1
6
The Best Cybersecurity Stories of 2024 you might have missed: https://t.co/LlVkpSmBvK featuring @ryanaraine and @juanandres_gs
medium.com
For me, 2024 has been an amazing year. I finally got my black belt in Taekwondo and together with my friends Juan and Ryan we started a new…
1
20
49
In my latest analysis for @bindinghook I explore how 🇬🇪’s shifting political landscape is affecting its cybersecurity capacity. As the government takes an increasingly anti-democratic turn, Western partners are cutting critical aid and strategic programming. #GeorgiaProtests
Cyberattacks on Georgia in 2008 were the first large-scale computer network attacks to ever accompany major ground combat operations. Despite this early warning of cyber threats to come, Georgia’s cyber footing is still shaky. Read more from @therealosint:
0
2
6
‘Predatory Sparrow’, a mysterious ‘hacktivist’ group, targets Iran’s critical infrastructure, claiming ethical restraint while violating international cyber norms. Who are they? @Maxwsmeets, @jamessshires and @Hannah_Soph investigate for @bindinghook.
bindinghook.com
An understudied ‘hacktivist’ group conducts cyberattacks against Iran that clearly violate international norms – but claims to demonstrate ethical restraint
0
7
10
The emotional layer of hostage negotiation—de-escalation through empathy—doesn’t exist in ransomware. Attackers see businesses as faceless targets, making negotiations cold, transactional, and often futile.
bindinghook.com
Max Smeets unpacks the key differences between ransomware attacks and hostage-taking, explaining why ransomware operators feel no pressure to make concessions while victims grow increasingly desperate
0
2
6
Ransomware isn’t just digital hostage-taking. While both involve leverage and ransom demands, ransomware’s dynamics are fundamentally different. Read @Maxwsmeets' analysis:
bindinghook.com
Max Smeets unpacks the key differences between ransomware attacks and hostage-taking, explaining why ransomware operators feel no pressure to make concessions while victims grow increasingly desperate
0
1
6
My thoughts on why the hostage negotiation analogy falls short for understanding ransomware https://t.co/Im9nKxY8rv
bindinghook.com
Max Smeets unpacks the key differences between ransomware attacks and hostage-taking, explaining why ransomware operators feel no pressure to make concessions while victims grow increasingly desperate
0
1
7
Very happy to see this article with @aa_gilli out. Thanks to all the editorial team of The Republic for their support and help.
2
31
135
Check out our new website: https://t.co/pR2fOPqNoi. In the coming months, we will be adding more resources and launching new programs!
virtual-routes.org
We tackle the impact of digital and emerging technologies on global affairs
0
0
1
A big day: Virtual Routes launches! This is a major milestone for our team and mission. Really excited to see what lies ahead!
📣 Virtual Routes is here! ECCRI and ECCRI CIC are now Virtual Routes, an organization dedicated to tackling the impact of digital technologies on global affairs through research, education, and public engagement. Learn more on our new site: https://t.co/C6Pf6dBJFM
#VirtualRoutes
1
5
27
📣 Virtual Routes is here! ECCRI and ECCRI CIC are now Virtual Routes, an organization dedicated to tackling the impact of digital technologies on global affairs through research, education, and public engagement. Learn more on our new site: https://t.co/C6Pf6dBJFM
#VirtualRoutes
0
5
18
Is ransomware organized crime? It seems obvious, but it’s not. In my latest @bindinghook piece, I explain why ransomware groups don’t fit traditional definitions and what this means for understanding their operations. https://t.co/pXPNs62FXZ
bindinghook.com
Without the need for monopolies, territory, or violence, ransomware groups have more similarities to tech start-ups than the mafia
0
7
21
Germany cybersecurity strategy evolved in the wake of the 2015 Russian hack of the Bundestag and the 2022 invasion of Ukraine, but still faces limitations on countering cyber operations in peace time, writes Matthias Schulze:
bindinghook.com
The 2022 invasion of Ukraine led to major updates to German defence policy, but cyber defence is still lacking
0
6
9
North Korea’s sanctions evasion is evolving – now with cyber freelancers raising millions for the regime’s nuclear ambitions. Read more from Chandana Seshadri on @bindinghook.
bindinghook.com
North Korean freelancers generate millions through global cyber platforms, bypassing sanctions to fund Pyongyang’s programmes
1
5
5
@jamessshires proposes principles for responsible state use of cyber intrusion capabilities. They include aligning with OECD guidelines & UN norms, promoting transparency, oversight, and legal accountability. #ResponsibleTech #CyberGovernance
bindinghook.com
Binding Hook Managing Editor James Shires puts forward principles for how states should govern cyber-intrusion technologies
0
3
5