Chapter 58

Two floors down, a freckled hand tapped out the user name and password that would grant access to the police database. The screen flashed and a mail account launched, telling him he had seven new messages. Six were departmental memos no one would ever read, the seventh was from someone called GARGOYLE. There was nothing in the subject line. The man glanced nervously over the top of his monitor then clicked it open. It contained just one word. Green.

He deep deleted the message, removing all trace of it from the network, then opened up a command module. A black box appeared on the screen asking for another user name and password. He entered them both, worming his way deeper into the network and scanning the recently updated files.

GARGOYLE was a relatively simple piece of software he had written himself, which made the job of monitoring the status of any case he wasn’t supposed to be looking at much, much easier. Rather than go through the tedious process of hacking into the central database and manually checking for new updates, he could simply attach the program to the architecture of any file, and whenever it was updated GARGOYLE automatically let him know via email.

He found the file on the dead monk, opened it, and started scrolling through. On page twenty-three he spotted a small block of text the program had highlighted in lime green. It detailed the taking into custody of one Liv Adamsen following her uncorroborated report of an attempted abduction at the airport. She was upstairs in an interview room on the fourth floor. That was Robbery and Homicide. He frowned, not quite sure what all that had to do with the dead monk.

Still. .

Not his problem.

Both parties had requested that any new additions to the case file be reported to them directly. Who was he to play gatekeeper?

He plugged a flash drive into the USB port on the front of his computer, copied and pasted the details then closed the case file and carefully retraced his steps through the maze of the database, re-locking all his invisible doors as he retreated.

When he was back at the default desktop he opened an innocuous spreadsheet for the benefit of anyone curious enough to glance at his screen, grabbed his coat and phone and headed for the door. He never sent anything from his own terminal, even encrypted. It was too risky and he was too careful. Besides, there was an Internet cafe around the corner where the baristas were hot and the coffee was better.

Загрузка...