Marshall, Dennis and Jamie.
“Shit, we’ve got another one. Kid accessed the computer on his mother’s car. Deployed the airbags and then sent her into a bridge abutment at over ninety miles an hour. The kid was caught when the coroner noticed the airbag burns and injuries were inconsistent with the type of accident. She suspected an airbag failure and they pulled the black box. At first they thought it was a freak deployment. Then they went through the code again and they found where the instructions had been hidden. Again, no record of the kid’s name, no pictures of him and no records of his existence. Just a reference to say that he was responsible.”
“This one used a cell phone to kill her stepfather,” Marshall noted.
“I doubt that one is …” Dennis said.
“Used an exploit virus to cause the unit to heat up to 350 degrees and explode in his hand,” Marshall cut him off.
“How do you even do something like that?” Dennis asked.
“No accelerant, just used the technology as it was and converted it into a bomb with a simple app,” Marshall answered, and laid out pictures of the stepfather whose hand and head were partially obliterated and the burned out phone.
“Seems she installed it remotely using a message to deliver the virus app and again, no name, no history, no files on her,” Marshall said.
“She is definitely in,” Angie insisted.
“But we know that it was a guy on each team for the graphosocial virus,” Dennis said.
“No, we don’t,” Angie countered. “Our assumptions as to it being a male are based on our own profile, not on any information about the three teams. Our assumption that it is one person is based on the computer profile. We now have candidates that could all be involved based on their history.”
“What do you have?” Dennis asked Angie.
“I’ve got a vehicular homicide. A pedestrian, age 30. Originally the case was brought against the driver, a fifty year old male, who claimed someone or something took over his car. Later, when police and a cybercrime officer reviewed the death, they found several peculiarities, including the fact that the driver had six green lights in a row. Going back through the records on servers they saw that the traffic grid was being changed from the outside. They also saw that the monitoring cameras changed their focus and pivoted through a line of cars to select the one that ultimately hit the woman,” Angie said. “It was her teenage son who tracked her and killed her. But again, no record, no name.”
“Well, our dead executive from Bloomfield Hills, Michigan was killed by a virus being inserted into his pacemaker’s software. Seems his son figured out how to use his pacemaker’s monitor to install the virus. Then he programmed it to throw his father into a tachycardia and then turn itself off, all while he was at school. No name on the kid, and the mother had died six months earlier of a …”Jamie trailed off.
“What is it?”
“The mother died of a stroke, but according to this she was a diabetic on an insulin pump. We have another pattern here. With the exception of the chef the targets were family, parents or step parents, and the kid in this case had no parents after the father died. Which makes me wonder if he killed his mother first,” Jamie finished.
Angie checked the files. “Five children who disappear and are off the records. All involved in tech homicides and all within about a year of each other’s age and now it seems all of them without parents.”
“The chef killer too?” Jamie asked.
“Both parents were dead before he attacked the chef. Seems no one noticed until the police came to visit the house as part of their investigation into chef’s murder,” Angie said.
“Five killers. No obvious connections and all of them are now ghosts in the wind,” Dennis observed.
“So what do you think?” Jamie asked.
Dennis shrugged.
“It could be that one of them used the other profiles to bury
Serenity King, Pepper Pace, Aliyah Burke, Erosa Knowles, Latrivia Nelson, Tianna Laveen, Bridget Midway, Yvette Hines