Invasion of Privacy: A Deep Web Thriller #1 (Deep Web Thriller Series) (14 page)

BOOK: Invasion of Privacy: A Deep Web Thriller #1 (Deep Web Thriller Series)
13.45Mb size Format: txt, pdf, ePub
ads

Alan gazed about as if expecting a follow-up comment. None came.

“Was Anna picked up from reception?” Jenny asked, trying to keep the momentum flowing.

“About half an hour before Anna arrived, Miss Seidov received a call from the meeting room on the eighteenth floor. It was a man’s voice. Identified himself as William Webber. She doesn’t recall any particular accent, but she is from Azerbaijan after all.”

“What did the man say?”

“Only that he was expecting a visitor at 5:30 p.m. He asked for the receptionist to phone him directly in the meeting room rather than the WMA offices.”

“Which presumably she did . . .”

“Yes, and when she phoned through, Webber asked the receptionist to send her straight up to the eighteenth floor, where he said he would meet her at the lifts.”

“Was there no security? Surely, that was an unusual request, Alan?” asked DS Harry O’Reilly, the MIT’s computer specialist, from the back of the room. 

“Apparently not in that building. There’s no security barriers or anything. Just the reception. The receptionist said she worked in other higher security Flexbase buildings where guests need to be escorted, but not this one.”

“What about CCTV?” asked one of the PCs that Jenny didn’t know. “Surely the killer must have arrived earlier that day?”

“Only in reception. But it’s all controlled centrally from the Flexbase HQ in Docklands. We need to get someone over there to start going through the footage. Fiona . . .” Alan nodded at Fiona who took the hint and added the action to the list.

 “This is a priority line of enquiry,” contributed Da Silva. “The perpetrator could be recorded going in or leaving afterwards. And I cannot believe, DI Price, that we have no one chasing this down already.”

Jenny immediately felt her shackles rising. The cheek of the man. That was why the team got together like this, so that they could collate all lines of enquiry and prioritise them. Which would be done at the end of the session. She was about to say this when Alan spoke.

“I’ll head off down there now, Jenny. I think I’m all done here anyway.”

“Thank you, DS Coombs,” said Da Silva.

“Yes, thanks Alan,” said Jenny.

Alan stood up and made his way through the throng to the exit at the back of the room. Da Silva folded his arms.

“DS O’Reilly, what have you learned about how the meeting room was booked?”

“I’ve been on the phone to yer man from their help desk for hours already.” Harry had the soft lilt of an Irish accent. “Those beggars know nothing at all. Best I could get out of them was that yer man booked it through the Flexbase public website.”

“Can they trace where the booking was made from?” Fiona asked, more comfortable with IT than Jenny would ever be.

“Not the eejits I was talking to. The admin app they’re using doesn’t display source IP addresses from whoever booked. Now that doesn’t mean it’s not stored in the database itself, just that they’ve no idea how to check. I’ve got the name of the vendor who wrote the booking system. I’ll follow up after this.”

“Is it true the email address used to make the booking was fake?” Jenny asked, recalling Lawrence MacDonald’s outburst at the Flexbase building manager earlier.

“Completely made up. It’s just an open text field to be filled in on the web page. No logic built in to verify if it’s even in a valid email format, never mind a check to see it’s real. The confirmation email that the booking system sends out just bounced and no one ever checks the logs. Bad design if you ask me.”

“The meeting room booking was made the Monday before?”

“Yes, at 3:14 p.m. And he booked out all four rooms on the eighteenth floor with the same fake email address.”

“Which is one of the reasons we know this murder was pre-meditated,” said Karim.

Jenny summarised for the group. She made sure that Fiona captured all the actions. In fact, she rather enjoyed having someone else do the writing. Perhaps Da Silva had a point. Her handwriting
was
pretty illegible, especially compared to Fiona Jones’ neat block capitals.

“Now the most interesting part,” Jenny stated. “The lure.”

The murder itself felt secondary for solving this case. The rape and murder were key components of the killer’s ritual, but that was as far as it went. Criminal psychologists might disagree, but understanding the killer’s physical actions wouldn’t necessarily help Jenny make a break through. And anyway, HOLMES would have thrown up a similar case if the modus operandi had been recorded already. And it hadn’t. 

To Jenny, the use of the meeting room for the location was unusual and would certainly help to narrow down suspects, but all the techno-gabble around vendors, booking systems and IP addresses confused her. 

She was convinced that victim selection was key, especially so far in advance. This was no stranger. It had to be someone close to Anna. Someone who knew enough to exploit her private dreams of playing in the Royal Opera House Orchestra. It was the smart use of the Royal Opera House that had overruled any reservations Anna should have had when confronted with a strange, corporate office block in Paddington for her audition.

Jenny summarised this line of thinking for the room. There was general agreement all round.

“O’Reilly, have you retrieved the killer’s email from Anna’s laptop yet?”

“Technically, it’s on a mail-server in . . . ah, sure never mind. Here’s a printout.” He handed her a sheet of paper.

Jenny scanned it and then read it aloud to the group.

 

Dear Ms Parker, 

I have been given your details by Jake Symmonds, one of your music lecturers at Trinity Laban. He has done this off-the-record as he and I are old colleagues. I work for WMA Associates, an independent agency that identifies up-and-coming talent for professional orchestras around the world. I am currently carrying out a confidential search for a cellist on behalf of the Royal Opera House Orchestra. Initially, this would be a temporary position, filling in for someone going on maternity leave. But it could lead to greater things. 

 

Jenny paused and then commented, “Can you believe this shit?”

“Sadly, Anna Parker did,” said Da Silva.

“Yes, she did.” Jenny knew she deserved the gentle rebuke. She continued reading.

 

Jake has given you a strong personal reference and so I would like to invite you to audition for this exciting opportunity. Due to urgent time pressures, the only slot I have remaining is on Friday 20th April at 17:30. The address for the audition is at the WMA Associates offices, which are located at Tower 2, Paddington Basin, London, W1 9OL. 

Please be prepared to play two solo pieces of your choice. 

I would very much appreciate it if you could keep this under wraps at this stage, given the publicity surrounding my client. I look forward to meeting you in person on Friday afternoon. 

Kind regards, 

William Webber.

 

The room pondered the note silently. 

Jenny offered her thoughts, “Okay, this gives us at least three strands. Who was he to know so much about her? Does this lecturer Jake really have any involvement in this? And the email itself – can it be tracked?”

Fiona added further actions to the whiteboard.

“I’m after looking into the email,” said Harry. “It’s from a spoofed email account. It’s the same fake address as yer man used when booking the meeting room. Now then, underneath the display headers, it’s a completely different email address. It’s one of those disposable ones that you can get without registering any personal details. The only line of enquiry left is to trace the IP address via the email service provider, from when it was initially registered and when this email was sent. The only problem is that could take a fierce long time and depends if they are forthcoming or not.”

“So, does that mean we’re dealing with someone really IT savvy?” asked Jenny.

“Not necessarily. If you google ‘fake email address’ there’s a feckload of sites that explain step-by-step how to do it without being traced.”

“Okay, so we’re back to the list of people who would have known enough about Anna to compose something like this, playing on her dreams so well. What about Facebook?”

“I’ve already checked,” said Fiona, standing beside Jenny. “She’s got over five hundred friends listed. We’ll need to eliminate all of them. And we’re checking Facebook and Twitter to see if anyone has been cyber-stalking her.”

“Who has five hundred friends?” asked Verity, one of the civilian indexers, a rotund middle-aged woman. 

“Come on, Verity,” said her colleague, an older gentleman whom Jenny recognised from around the station but didn’t know, “You know what the kids are like these days with their friends. Quantity over quality, not like in our day, eh!”

Jenny agreed with the sentiment. Online connections were no substitute for the proper intimacy that real face-to-face friendship offered.

“What about cross-referencing everyone on her Facebook and Twitter accounts with every name we end up getting from Flexbase?” suggested Fiona. “If someone shows up on the list of people who know something about Flexbase and also on the list of Anna’s friends, then we’d have a strong suspect.”

“Great idea, DC Jones,” said Da Silva. 

Jenny agreed; it really was a good idea. She’d never have thought of it herself. But that was why they were a team. 

“Can you set that up, Harry?” Fiona asked.

“I can,” he replied. “It’ll only take a minute. Just get me the names from Flexbase, ideally with email addresses, and I’ll be after organising it.”

“This is good,” said Jenny. “What about this lecturer? Jake?”

“Yup, I’m on that,” said Fiona, capturing the action anyway.

“Anything else?” Jenny asked the room.

Karim put up his hand and said, “What about checking with the Royal Opera House? Just in case they really
were
auditioning?”

Fiona wrote down the action.

“Okay. Last strand. Other witnesses and suspects. You know, the basic legwork we’re all so good at. Let’s trace Anna’s steps from leaving her house to arriving at Flexbase. Did she go anywhere else first? Meet anyone else? Let’s talk to her family and friends. Anyone who had something against her? There’s a list of one-night stands over the last six months we need to talk to. Perhaps there’s something there.”

Karim added, “Yeah, and we’ve yet to confirm alibis for the other flatmates. And then there’s Kim Chang’s boyfriend. There’s something not right there.”

“What do you mean, Karim?” asked one of the other DCs, with a smirk.

“Karim’s just jealous,” said another to the room. “He mentioned it earlier. He can’t understand how come a looker like this Kim Chang would lower her standards so much. I think Karim’s hoping he’s in with a shot if we nick the boyfriend.”

Laughter erupted around the room. The light relief at Karim’s expense eased the tension of the workload they all knew was going to be immense over the next few days.

Da Silva stood up. “Thank you DI Price. The only thing missing is the media engagement strategy. We need one, following the impromptu interview I was forced to give this morning in Paddington. I’ll pick that up with DS Schuster, our press officer. He’ll be here later. Okay folks, let’s get this list of actions prioritised, listed on HOLMES and assigned owners. I want to regroup in two hours.”

Jenny thought about Da Silva. She’d never seen a DCI be so hands-off before. And yet, he maintained his authority, made decisions and kept the media to himself, where he would be most visible to his superiors. Perhaps this high-flying, fast-tracked, overly promoted detective had more to him than was initially apparent.

* * *

The problem with creating a tunnel through the Internet is the necessity to dig from both sides. A daemon should be running at the other end, working in tandem to set up the tunnel. Once the tunnel is in place, any kind of protocol, instruction or data can be sent through and the firewall has no idea. All it sees is more traffic on port 80. The daemon at the other end of the tunnel relays these instructions from its privileged location behind the firewall, launching data against any of the servers. In this way a hacker can run far more sophisticated scans for weaknesses and ultimately take control of any of the servers.

But the key was identifying an initial vulnerability through which to set up a remote daemon. Brody had tried and failed dismally for the last two hours. This web server was secure. Incredibly secure. As was the router and the other servers behind the firewall.

He was frustrated. And he had the shakes. The latter he put down to far too much caffeine. He always overdid the coffee during a marathon hacking session. He knew the stereotype Hollywood hacker was a young kid with acne, who drank too much cola. Maybe that was him fifteen years ago, but continued access to a decent income had given him a taste for some of the finer things in life. Good quality coffee was his modern-day cola substitute. The only downside was that the caffeine count was much higher. And decaffeinated coffee was no substitute for the real thing.

Brody wondered if Matt_The_Hatter had some tricks up his sleeve that Brody didn’t know about. Paranoiacally, Brody checked back into the CrackerHack forum pages, dreading a post from Matt_The_Hatter already announcing his success over Brody. But nothing had been published. 

Crooner42 had done an impressive job in setting up SWY’s defences. Maybe his naive public approach to requesting a pentest was a smart move after all. If both Fingal and Matt_The_Hatter were seen to fail, then there was no way any police force would ever succeed. And Crooner42’s status in the hacker community would immediately notch up a few levels while theirs would plummet.

Brody’s smartphone beeped twice. He checked it absently. It was his calendar reminding him to head for his daily workout at the gym. That could wait. 

But then he noticed another calendar item. It was for his date with Harriet that evening. 

Damn, he’d been looking forward to that.

BOOK: Invasion of Privacy: A Deep Web Thriller #1 (Deep Web Thriller Series)
13.45Mb size Format: txt, pdf, ePub
ads

Other books

Choker by Elizabeth Woods
0373659458 (R) by Karen Templeton
Smugglers 1: Nikki by Gerald McCallum
Shiva and Other Stories by Barry N. Malzberg, Catska Ench, Cory Ench
THE PRIZE by Sean O'Kane