Font Size:  

Zy paled. “So whoever installed this could tap into Tessa’s computer at will and could see every time she or Aspen hit a key? And they could access our servers without anyone being the wiser?”

As much as he hated to tell his buddy, Trees couldn’t sugarcoat this. “Yep. I begged Aspen to let me scan that computer a couple of times. Every time, she said it crashed or she finger-flubbed whatever she’d been typing and ended up somewhere in the computer she shouldn’t be, like a command prompt.”

“Then Tessa couldn’t have had anything to do with this. She’s not a computer whiz, and she definitely doesn’t know anything about writing code, especially something that involved.”

“You think Aspen does?” Trees pointed out. At least Tessa was good at her job. The temp had been a wreck.

“Is it possible neither of them did this?”

“Possible? Anything is. Improbable? Yeah.” And Trees felt really sorry for Zy. “Keep digging. See if you can find any traces of contact in March, around the time we went to Mexico and damn near got ambushed.”

“Getting there. After that software is installed, there isn’t much in the way of sent emails except to the bosses. It’s like…Aspen didn’t do that much.”

“No, it’s not ‘like’ that. She actually didn’t do much. But no fishy communications around the time of our mission?”

Zy shrugged. “Not that I see.”

“With remote access and keystroke recording, all anyone had to do was log in to our server themselves and they could mine almost anything.”

“Do you think that spyware/remote-access garbage is still on Tessa’s computer?”

Zy clearly hoped Tessa had been passing on information without even knowing it, and Trees had bad news for his buddy. “No. As soon as Aspen cleared the building, I restored the computer back to the factory settings, then carefully rebuilt Tessa’s profile. I didn’t trust Aspen not to have unwittingly screwed everything up.”

“So the rogue software is gone? And we have no way of knowing who might have been accessing our systems and where the information was going?”

Trees winced. “When you put it that way, I should have looked to see what was on the computer before I wiped it, but I had no idea…”

“You couldn’t have. You finding anything else?”

Yeah, and it wasn’t good. “Let me finish. Then…we’ll talk.”

Zy stood and ambled to the coffeepot, brewing another. “Coffee?”

“Yeah. It’s going to be a long night.”

Zy glanced down the hall, where Laila’s light was still on. “Should I encourage her to go to sleep?”

“You can try, but she won’t.”

With a grim press of his lips, Zy poured two cups of coffee and headed back to the table. Trees absently sipped the black brew and scribbled notes as he peered at the screen, working, working…until he came across something that made his heart stop.

When Trees looked up, Zy froze. “What?”

“There are footprints of communications from what looks like a Gmail account to an external mail host with its servers in Switzerland.”

“Why is that important? Why does the server location matter?”

“Because the Swiss have some of the strictest tech privacy laws in the world. No one is getting their hands on that information. A lot of people use this kind of service. People who don’t like their emails being scanned for keywords so that online retailers can market to them, for instance. People who don’t love government intrusion into their personal life.”

“So you have one of these email addresses?”

“Not this particular provider. This one is expensive. But I have one like it. It’s also commonly used by people who have something to hide.”

“Like criminals?”

As much as Trees hated to admit it… “Exactly. I’m not saying that anyone who has one of these is up to something nefarious, but I am saying that anyone up to something nefarious probably has one of these email addresses, rather than a simple freebie.”

“Let me recap: Someone with Gmail sent messages to a party with a super-secure email address who might be a criminal?”

“Yes.”

“And?”

“Because the information packet passed through our server, and I have some goodies residing there just in case, I can read the contents of the emails. But I can’t prove who the Gmail address belongs to.” But if they could prove it was Tessa’s, then she was toast.

So was Zy’s heart.

“Are the communications from this Gmail something to worry about?”

Trees hated to tell him the truth, but Zy needed to hear it. “August eighteenth. The Gmail account owner wrote a summation of the plan Hunter outlined for Walker and me to spy in Mexico. The mission in which he was taken in the parking lot.”

“Shit.”

“Yep. Shit.” That had definitely been the work of their mole. What chapped Trees’s hide more was that the bosses would have come to him to investigate this sooner if they hadn’t suspected him. “There’s just one thing about this that’s a little weird: the message was sent in the middle of the night.”

Source: www.allfreenovel.com
Articles you may like