were
found, none of them contained any data from the EngineerCorp servers.
Additionally, they verified the identity of the computer
that matched the MAC address of the one responsible for the breach. On it, they
found the most complex and advanced series of security scripts, designed to
block any kind of tracking that might occur. It would take weeks just to sort
out exactly what it was doing, much less understand the logic behind it. The
engineers would get to work immediately on analyzing the code.
In the inventory, they also found a burnt Ethernet cable.
Analysis on the wire proved that it had recently been burned, probably within
the last twenty-four hours. The engineers also found traces of human DNA,
including burned skin, on the wires, indicating that someone had been in
contact with them at the time they were burned. Further analysis allowed them
to match the sample to DNA from Alice McArthur's medical records.
From there, it became more or less a summary of basic
personal information for Alice. They knew what stores she shopped at, what
places she frequented, her employment history, her credit history, who she socialized
with, and more. From the most basic facts to the most trivial information, it
was completely analyzed and reported to Eric.
As for clues to her current whereabouts, there was little
information. She had no living relatives to speak of. Either they had all
passed away, or were too far removed to matter. Since her parents had died,
Alice kept mainly to herself. Her cell phone was also a dead end. It had gone "off
grid," but in all likelihood, it was untraceable in the same way as her computer
had been.
The lead engineer also mentioned that based on the volume
of data supposedly downloaded from their servers, the target device had to have
an impressive storage capacity, one beyond any normal computer. A server could
have held the information, but no common computer or laptop would have that
kind of storage capabilities. There had been no indication that she ever owned
any type of device like that. The servers that Alice did possess had all been
accounted for.
The most likely scenario, if she had actually downloaded any of the information, was that she was only storing a fraction of the database on
something small enough to take with her. Although this directly contradicted
the report from the EngineerCorp mainframe, which showed that all of the
data had been dumped, the engineer conjectured that the data must have filled
the target device and the rest of it had been lost during the transfer.
Eric leaned back in his chair, pensive.
If she only downloaded a fraction of the server, then
the situation may not be as bad as it seems. What would she want with a partial
download? What information was she after?
All that remained now was to find this device, if it
existed, ascertain if any of the data had been further compromised, and get rid
of any remaining loose ends.
In any case, young Alice will definitely be a guest of
EngineerCorp very soon…
***
Alice had been sitting on the sofa, staring at the
fireplace for quite some time. The inside was charred from the many fires burned
within its walls. Her memories were the only thing keeping it lit now. Sighing,
her thoughts returned to the present.
I can't risk everything on the hope that I will convince
EngineerCorp that I'm not a threat. I need a backup plan, just in case they don't
believe me.
She needed to find someone that could be enlisted to
protect her, or could at least pose enough of a threat to EngineerCorp to keep
her safe… Only, no one posed any kind of threat to them, especially since the
incident with Cyberconn.
Cyberconn?
Suddenly, unbidden images flashed through her mind. She saw
a confidential report detailing how EngineerCorp infiltrated the Cyberconn
network, and began siphoning information about all of their projects back to their
servers. There were blackmail letters to key people, preventing them from
Daniela Krien, Jamie Bulloch