Can intelligence analysts find hackers by the clues in their code?