Название: Thread of Suspicion
Автор: Susan Sleeman
Издательство: HarperCollins
Жанр: Короткие любовные романы
Серия: Mills & Boon Love Inspired Suspense
isbn: 9781472014740
isbn:
For a moment, he didn’t seem to know how to take her response, but then he tipped back his head and laughed, an altogether pleasant sound.
When his laughter stilled, she said, “So can I get back to work without you watching my every move now?”
“I could stand to get cleaned up, I suppose.” He stood and she saw the pain light in his eyes for a moment before he cleared it. This guy didn’t want anyone to see he was weak, and yet it was his weakness that made him seem human to her.
As he left the room, she dug into his computer files. Thirty minutes later, she knew without a doubt that even an inexperienced hacker could have used his home network to access Crypton on the night in question. But what she found next threw her a curveball.
“Interesting,” she whispered as she wondered what her findings meant.
She heard footsteps heading her way, and she looked up to see Luke returning. She didn’t want to stare at him, but how could she not? He wore pressed tactical pants in a dark brown, a light tan T-shirt that molded to his toned physique and his damp hair was even darker and brought out the penetrating blue of his eyes. He was the complete physical package, and she was more attracted to him than she’d first thought. Something that hadn’t happened since Paul’s reign of terror.
Why now, God? Why him?
“Have you found anything?” he asked, oblivious to the battle raging inside her.
She forced her mind back to the job. “Yes, but I don’t know what to make of it yet.”
“Can you explain it in simple terms that I can follow?”
She swiveled the monitor so he could see it, then tapped the screen. “These entries are from your and Natalie’s computers. The entry shows you both used your wireless router to connect to the internet the day before SatCom was hacked. Notice the two IDs.”
He nodded. “Since the IDs are different, does that mean each computer has a different ID?”
“Exactly, and that lets me see who accessed the internet the night in question.” She opened another log. “This is the day SatCom was hacked. You can see one computer logged on to the internet, and the ID is different from the first two I showed you.”
He leaned closer to look at the screen, his fresh minty scent filling the air. “I don’t understand how that can be. We only have the two computers you see here.”
“What about a visitor? Did you or Natalie have a friend over that night?”
“Not at three in the morning.”
“Then the only thing that makes sense is that someone used your wireless network from outside your home. To do that your network would need to be unsecured.”
“Nat takes care of all of that stuff,” he said quickly—maybe too quickly in hopes of covering himself. “At least she did until her computer crashed a few days ago. She had to call in a friend to help her. He found a virus on her computer.” He shook his head. “Another reason I don’t like computers much. I prefer to be able to see my enemies.”
“Did the friend access your network with his computer?”
“I don’t know. Can’t you tell by looking at the logs you’ve been reviewing?”
“I can tell a computer other than your laptop or your sister’s desktop accessed your network, but without seeing the friend’s computer, I can’t tell if it was his.”
“I can call Nat and ask him to bring it over.”
“That would be great.”
As he made the call, Dani tuned him out and pondered the puzzle before her. What motive might the friend have for sabotaging SatCom? For that matter, what motive might Luke’s sister have?
Dani would need to run a background check on both of them and prove a connection to SatCom before considering them strong suspects. At this point, Luke still held top spot on her list.
Assuming his guilt, had he used another laptop to do his dirty work, then hidden or disposed of it? But then why log into SatCom from his home, where it could be traced?
Made no sense. The only other explanation was that the network wasn’t secure on the day SatCom was accessed. That she could check easily enough.
She pulled up the wireless router log and scanned the data. The settings had been altered a few days ago, well after SatCom’s hack. Maybe the friend who fixed Natalie’s computer had changed the settings to block other viruses. If Dani had been called in to fix Natalie’s computer issues, she would’ve secured the network, and she guessed the friend had done the same thing.
Luke’s conversation was coming to a close, but Dani signaled to him not to hang up yet.
“Hold on, sis,” he said, turning his attention to Dani.
“Will you ask Natalie if her friend altered the network security settings?”
Luke asked the question. A few moments later, he said, “She says he didn’t connect to the network with his computer that night, and he said something about making things more secure, but Nat doesn’t know exactly what he did.”
“Thanks,” Dani replied. “As long as he drops by with his computer tonight, that’s all I need for now.”
Luke said goodbye to his sister and stowed his phone.
She waited for him to look at her again. “When did this friend work on Natalie’s computer?”
“I don’t know. Do you need the exact date?”
“If you don’t want to go to jail, I do.”
He cringed and moved back.
“Look,” she said. “I’m sorry for being so blunt, but since I’ve cleared your computers, we can assume no one broke in here to use them. And with the current security settings, the likelihood of access coming from outside your house is minuscule. But I found a change made to the settings, so I suspect the friend helping your sister modified the settings to protect her from another virus. If this happened after the login to SatCom, we can prove the network was accessible before that day.”
He raised his head in thought. “I think it was last Tuesday. No wait...Monday. I remember because the Seahawks were playing, and her friend commented on the game.”
She checked the dates again. “That correlates with the date I found.”
“So this means someone could have accessed our network from outside the house before then, right?”
“Right.”
The tension in his expression loosened. “Is there any way to find the computer that was used?”
“Maybe. The hacker СКАЧАТЬ