It was clear to Adam that Eastman had no idea what the details were or how long they might take to work out He had put his faith in the infallible Tommy. Adam hoped his trust was misplaced. It would be amusing to see Roger humbled by financial ruin. He could imagine the fat blowhard crying over his martini-he still drank those-and cursing Tommy Binswanger and the injustice of the world.
“Looks like you lucked into something big,” Adam said. “Wish I’d known about it.”
Eastman laughed. “You? On your salary, you couldn’t get on board a deal like this, kid.”
Kid again. “Guess you’re right.”
“But I’ll tell you what. When we have our grand opening, you’re invited.”
Eastman completed his tour of the office park. He drove through the gate, then got out and padlocked it again.
“Gotta protect my investment,” he said as he drove away. “Not that there’s any risk of vandalism. Got no neighbors except a few horse ranches a mile away or more. Anyway, the place is sealed up tight. Ten-foot perimeter fence topped with razor wire. Nobody can get in.”
“Or out,” Adam muttered, thinking of the complex for the first time not as an office park but as a huge steel cage.
“What’s that?”
“Nothing. Say, Roger, I’m developing a thirst. What do you say we stop off for adult beverages on our way home?”
“The wife’ll kill me. I’m late enough as it is.” Eastman shrugged. “What the hell. I feel like celebrating. Every time I visit that place, I see dollar signs, kid.”
Adam didn’t even mind being called kid now. He laughed along with Eastman, laughed at his locker-room jokes and his anecdotes about golf and the firm and “the wife,” who evidently had no actual name. He laughed when they shared a table at a tavern on Melrose, and he laughed when after several drinks Eastman fumbled with his coat.
“Let me help you with that, Rog,” Adam offered, still laughing as his fingers slipped into the coat pocket and closed over the ring of keys.
He found the key ring now, in his pants pocket, and fingered it for reassurance. As long as the place was locked up, C.J. was trapped. He could hunt her down. She couldn’t fight him.
Or could she? Already she’d proven more dangerous than he had expected. He’d thought it would be so easy. He’d rehearsed her death for days. He’d killed her a thousand times in his thoughts.
And always his mantra played in counterpoint to the stream of images, the mantra he recited now, through gritted teeth.
“Nobody fucks with me. Nobody makes me their bitch. Nobody-”
Another stab of pain in his knee. Damn. He wouldn’t be able to walk much farther.
To track her down, he would have to use his car.
45
Gader had made good on his threat to call an attorney. Around 1:30 A.M., a grim, bearded, bespectacled young man arrived at the house and ordered Rawls and Brand to leave. His client did not wish to extend further cooperation to the federal authorities until they returned with a search warrant.
“It could be an arrest warrant,” Rawls said, getting in a parting shot. Gader paled, but the attorney was unmoved.
So now, at twenty minutes before two in the morning, Rawls and Brand were speeding back to the FBI field office. Rawls was at the wheel of the sedan. Brand in the passenger seat with his notebook computer on his lap. He had pulled up a copy of the tip-off e-mail message, which he had stored on a floppy disk.
Agent Rawlz,
Something phunny going on. Do you like to watch? Say you’re Bluebeard. You have to find the key.
“Any ideas?” Rawls asked as they pulled onto 1-695.
“Maybe. I don’t see any clues to who he is. But there may be a clue to who he isn’t.”
“Translation?”
“This hackerspeak he uses-it seems kind of phony, like it’s a persona he’s putting on.”
“He isn’t a real hacker?”
“Well, he found a way inside Gader’s server. Got Bluebeard’s user name and password. He must have some skills. But it’s not who he is, if you get my drift. It’s not what he’s all about.”
“You’re saying he probably isn’t a teenage kid hanging out in chat rooms, bragging about his latest hack.”
“Right. He just wants to be seen that way.”
“How does that help us?”
“I wonder.” Rawls lapsed into silence as the car sped through the frigid night.
It was Brand’s comment about coincidence that had turned their attention to the anonymous e-mail message. If a visitor to the Web site had figured out what was going on, why wait until the day of the next abduction before alerting the authorities? It was almost as if the e-mail was part of a game someone was playing. But who? The killer himself? Or somebody close to him?
No way to know. But Rawls and Brand were now convinced that the tipster must not be allowed to remain anonymous.
Rawls thought about what Brand had said. The informer wasn’t a true hacker. He was only masquerading as one. Yet he’d known enough to send the e-mail through a remailing service that scrubbed off all routing information and made a trace impossible. And he’d known enough to bypass the field office’s email address in favor of Rawls’s personal account His personal account.
“We’ve been going at this backward,” Rawls said.
“How so?”
“It’s not the message that matters. It’s how he got it to me.”
“Sure, but we can’t trace-”
“We don’t have to. He obtained my e-mail address. Now, how would he do that? How would you do it?”
Brand considered the problem. “First I’d have to get your name. It’s not listed on the field office’s Web site, so I’d probably have to look in archived newspaper stories. The Baltimore Sun ran a story on the Myers case a few months ago. You were mentioned.”
Rawls nodded. “And identified as part of the computer crime squad.”
“He could have found that article in a database search. Okay, so he’s got the name of an agent in Baltimore who knows computers. Now he needs the e-mail account to go with it. So he searches e-mail directories-”
“Right. That’s how he got to me. And that’s how we’ll get to him.”
“Will we?”
“Those directories keep logs of searches and hits. We can find out who’s searched for my name-”
“And with any luck, the search will be linked to the searcher’s IP address. But maybe he thought of that. He might have used a public terminal or routed his search request through an anonymizer.”
“I don’t think so. If he’s just playacting as a hacker, he won’t know all the ins and outs. He’ll think he’s more anonymous on the Web than he really is.”
“Worth a shot, anyway.” Brand was already hooking his data-capable cell phone to the laptop to get online.
By the time the sedan pulled into the parking lot of the field office. Brand had searched for his partner’s name on the half-dozen largest e-mail directories. Only two listed a Noah Rawls.
In the office, Rawls got on the phone to the first directory’s technical assistance number, identifying himself as a federal agent, while Brand used his own phone line to contact the other service.
Strictly speaking, a warrant was required to force the system operator to relinquish private information to law enforcement agents. But the directory services were mainstream, commercial operations, and unlike remailers and anonymizers, they were not eager to force a confrontation with the FBI. The sysop at the first service checked his logs immediately, no questions asked.
“Sorry, sir,” he reported. “I see zero hits on the name Noah Rawls during the past three weeks. We don’t keep records longer than that.”
“Thanks anyway.” Rawls hung up, wondering if they’d reached another dead end.
Then he saw Brand scribbling on his desk blotter, and he knew they had something from the second service.
“The FBI appreciates your cooperation,” Brand said into the phone, then cradled the handset. “One hit, ten days ago. We got the IP address.”