Выбрать главу

Chris took a soda from the fridge and hustled back downstairs. Ali was in the bedroom changing into her comfy sweats when her phone rang. Caller ID told her the number was restricted.

“Ms. Reynolds?”

“Yes.”

“It’s B.”

The B. in question happened to belong to Bartholomew Quentin Simpson. Named after his maternal grandfather, Bart Simpson had been ten years old when the other Bart Simpson first appeared on local TV screens, thereby consigning Sedona’s Bart Simpson to a peculiar form of childhood hell. Subjected to unending teasing, he stopped answering to any name but his first initial, since using both of them, B.Q., didn’t work for him, either. The one initialed B. had retreated into the solitary solace that computers had to offer. By seventh grade, he had taken apart his father’s old Commodore 64 computer and put it back together.

By eighth grade, B. Simpson had taught himself to write computer code. To his parents’ dismay, he had dropped out of high school his junior year after selling his first video game to Nintendo. He had gone to work for them long enough and well enough that he’d been able to “retire” at age twenty-eight. He had returned to the Sedona area, where, although he had never played golf, he bought himself a golf-course-view home. Rather than hitting the links, he had started his own computer security firm called High Noon Enterprises. His company motto was “It takes a hacker to catch a hacker.”

Now that B. Simpson was back in town, he easily could have been one of Sedona’s most eligible bachelors, except no one really knew he was there. He lived alone and worked odd hours, usually coming into the Sugarloaf for breakfast just as Edie and Bob Larson were closing down for the day. It was Bob who had brought B. Simpson’s painful childhood history and the existence of High Noon Enterprises to Ali’s attention.

“The way I understand it, he’s sort of like an Internet version of an old-fashioned gunslinger,” Bob Larson had told his daughter. “As much time as you spend online, you should probably have someone like him in your corner. I wouldn’t be surprised if someone shipped you one of those awful viruses. Or worms.”

In the end, Ali had signed up with B.’s High Noon Enterprises more to shut her father up than because she was worried about being hacked. In the three months since she’d been a paying customer, it had seemed like a needless expense. As far as she could see, preventing cyber crime seemed about as exciting as watching grass grow.

“Good to hear from you,” Ali said now to B. “What’s up?”

“You won’t think it’s good to hear from me when you find out what I have to say,” B. warned her. “You’ve got yourself a Trojan.”

“Excuse me?” Ali asked.

“A Trojan horse,” B. replied. “In your computer. Twice each day I run a monitoring check on all the computers I have under contract. Today your noontime analysis came up positive.”

“What does that mean?”

“It means that as long as your computer is connected to the Internet, someone else can see everything you do there. He can take over control of your computer. He can gain access to your files and change them. He can also send mail that’s ostensibly from you, even though it isn’t. You don’t use a multiple-computer network, do you?”

“No,” Ali said. “I’m usually on my air card.”

“That’s good,” B. said. “If there are other computers operating on the same network, the bad guy can gain access to those as well. If he’s inside your computer, he’s also inside your network.”

Suddenly, cyber crime sounded a lot more ominous. Ali was surprised to find herself feeling spooked and vulnerable. Knowing that a crook could operate inside her computer made her feel like someone had broken into her house and penetrated her personal safety zone.

“What should I do, then?” she asked. “Turn off the computer? Unplug the damn thing and shut it down?”

“No,” B. said. “If you do that, it might tip him off that we’re on to him. I want you to leave the computer on. Try to use it more or less the way you usually do.”

“Why?”

“Computers that are connected to the Internet are two-way streets,” B. explained. “Whoever sent you the Trojan did it over the Internet. I’m going to try to return the favor and send one right back to him. While he’s monitoring your every keystroke, I’ll be monitoring his keystrokes. If he makes a move, I should be able to begin tracking him down.”

“Wait a minute,” Ali said. “If he has that kind of total access to my computer, shouldn’t I cancel my credit cards and shut down my online banking? Should I report this to the police?”

“It’s my experience that banks are a whole lot more interested in identity theft than cops are. If there’s a murder or even an armed robbery, the cops are all over it. With identity theft, they’re not until and unless we can prove that a crime has actually been committed. They’ll get on the bandwagon once we’ve accumulated enough evidence that it’s easy for them to make a case without having to expend much effort. Right now the best thing that could happen is that the guy will try to rip you off. In order to catch him at it, you’ll need to monitor your credit-card and bank transactions very carefully. Be on the lookout for anything out of the ordinary, but don’t use your computer to do it.”

“If I’m not supposed to use my computer,” Ali objected, “how am I supposed to go about monitoring anything?”

“I have a couple of spare laptops lying around,” B. said. “I’ll be glad to lend you one of mine to use for the time being. If you don’t mind, I can drop off a loaner for you a little later this evening. You can insert your air card and use that for anything you don’t want exposed to prying eyes.”

“You’ll drop it off,” Ali murmured. “Does that mean you know where I live?”

“Yup,” B. replied, “I’m afraid I do. It was right there in your computer files, plain as day. And I’m not the only one who would know that, either. If I found it out, our sneaky little friend can find it out, too.”

“Great,” Ali said. “See you when you get here. The sooner the better.”

Ali had been planning on taking a look at Bryan Forester’s two thumb drives. Heeding her computer security expert’s warning, however, she left them in her purse. Under normal circumstances, she might have picked up her computer and checked her e-mail account. But now, self-conscious in the knowledge that her every keystroke might be under observation, she left the computer where it was and went into the bedroom to change into sweats.

Late in the afternoon, Matt managed to get his brain focused on work. When his phone rang, he answered it before the second ring. Yes, he was a bureaucrat-and a lowly one-but that was also why Matt always answered his phone so promptly. He regarded himself as a public servant, and he didn’t like to keep the public waiting.

So when he answered, Matt thought it would be someone calling about one of his many accounts. The last thing he expected was a phone call from a detective-a homicide detective!

“My name’s Dave Holman,” the man on the phone announced. “Detective Dave Holman, with the Yavapai County Sheriff’s Department. Is this Matthew Morrison?”

Matt’s first thought was that it had to be some kind of joke. Bill Baxter was one of Matt’s former coworkers at the state auditor’s office. Before transferring over to the Department of Weights and Measures, Bill had established himself as a practical joker of the first water. This sounded like the kind of off-the-wall stunt Bill would pull.

“Bill?” Matt asked uncertainly. “Bill Baxter, is this you?”

“No,” the caller replied. “It’s not Bill Baxter. As I said a moment ago, my name is Dave Holman.”

“Sorry,” Matt said. “My mistake. You sound a lot like another guy I know, a friend of mine.” He glanced guiltily around his cubicle to see if anyone was listening. Bobbie Bacon, his nearest neighbor, was talking on her phone. No one else seemed to be paying the slightest bit of attention. “What can I do for you-Did you say Holman?”