8.1.2011 John tries to construct a rational explanation but nothing stands up. It is obvious that someone has access to his computer. How? A virus on his system could have disabled the firewall and reset the remote access permissions. John the Rational wants to believe this remote hacker theory. But, if true, it opens up a much more disturbing question. Why did this hacker set up a false identity to gain his trust and not just steal data in the background? Corporate espionage? Unlikely. John freelances by updating a school website. Revenge? No enemies or feuds. Not a lot of friends, either. A stalker? He could not imagine anyone paying him that much attention. Who is behind this?

He decides to trace the routes of the circular messages and see if the path yields any clues. But he doesn't find a signal. Instead he finds that during his chat sessions with the reporter/hacker the router was silent. No messages were sent to the internet during a live chat? As this outside hacker theory starts to fall, John's gut quivers a warning that the solution may lead him to a stranger he is not prepared to meet.
Previous DrawingHomeNext Drawing