I began setting everything up. First off, a couple of new bank accounts were set up. Next, I activated the bot army that I created. Most of the bot army would be distractions, but I had one small group that could be traced, although it would be difficult. Only a really good hacker would be able to map it back to the origin. I didn’t want it to be too easy. Of course, I wiped the personnel folder with my name on it from Linda’s company servers. I also broke in and changed all the file transfers that were done on my laptop to show a different IP address. To prevent that from happening again, I set off a really nasty virus on my laptop, then disconnected it from my secret servers. Later that evening, when I went to check my email, I ‘discovered’ that a virus had attacked my laptop from a spam email that I opened and pretty much destroyed it. I didn’t mention the look of concern on Linda’s face when she saw what happened.
The next morning, I saw a text exchange between Linda and James. Apparently, they were almost at the end of the scam. They just wanted two more transfers to make it to an even $10 million before springing the trap on me. The plan was to suddenly ‘discover’ the theft. Of course, since Linda would be the one to actually discover it, she would be in charge of the ‘investigation’. James, being IT manager would be running the cyber part of the investigation. Unsurprisingly, everything would lead straight back to me. Linda would, of course, have me served with divorce papers while I sat in jail, then eventually marry James after about a year. Both would proclaim their complete shock that I would ever do something like that. Of course, there would be some suspicion about Linda’s possible involvement, but she would point to her investigation and discovery, as well as her belief that I must have been hiding my knowledge of computers from her. Also, it must be obvious that she was a victim, since I specifically targeted her and used her to gain access to the company’s computer systems. They both laughed at the thought of me trying to answer questions about where the money went when I had no idea what the police were talking about. Linda also said she would get me a new laptop, and that they could make the last transfers within the next three weeks. Now I knew what my deadline was.
Monday, I went in and told my boss that I needed the week off for some personal stuff. I had plenty of vacation time, and he was a pretty cool guy, so it wasn’t a problem. I did some online checking to find the meanest, dirtiest, aggressive shark for a divorce lawyer in the city and made an appointment for the next day. They thought that they had three weeks, but they would be lucky to last two weeks.
Returning home, I fired up my computer system and went to work. I logged onto James’s home computer. For an IT guy, you would think that he would have enough sense to shut it down and power it off when he wasn’t using it. Nope. All he did was turn off the monitor. I was running his computer through a server in Belarus. Not that it really mattered, because that link would be erased anyway. His computer would be the end of the trail for anyone following it. The cartel that I had hit 5-years ago had at least learned something about security. They had changed their accounts and passwords, but still used the same banks. Upgraded passwords? They only work when you don’t store them on your personal computers that are vulnerable to phishing software embedded in email links for items that any multimillionaire would want. This was just the preliminary work. I would wait until I was finished with Linda before going after James. James wasn’t going to survive this, and I still needed to use him for Linda’s downfall.