I followed Emily around a corner, where she pressed some buttons on an electronic keypad beside an unmarked door. On the other side of it was a huge busy bull pen of desks and cubicles with phones ringing and FBI agents tapping at computers and running around.
Without saying anything to anyone, Emily guided me through the office maze and around another corner to another unmarked door beside another keypad. She typed in another combo, and then we were in a cramped, too-bright windowless room where there were rows of servers on shelves and wires on racks and eight or nine people typing at computer terminals.
Emily introduced me around to the agents of the FBI New York office cyber investigative squad. CIS supervisory agent Chuck Jordan was a young, intense, clean-cut guy who, in his sharp Tiffany-blue button-down dress shirt and gray slacks, looked more like a young finance guy than a cop.
Jordan had called Emily as we were finishing breakfast. He said he might have found a possible lead on Yevdokimov’s whereabouts.
“So you think you have something for us, Chuck?” said Emily.
Instead of saying anything, Chuck handed us a photograph. It was a shot of a cluttered table with papers and books piled on it. There was a pair of glasses, a magenta Sharpie, and a crumpled napkin on an egg-crusted paper plate. Beyond the messy table was a room with bare, paint-chipped plaster walls and dirty hardwood floors. The space struck me as vaguely industrial.
In the top left-hand corner of the photo, you could see a shadeless window. In the window was the stone edifice of an old office building on the other side of a narrow street.
“This is the PC where the ransom demand originated from,” Chuck said. “This shot is from the PC’s webcam.”
“Where is it?” I said.
“That’s the rub,” Chuck said. “We don’t know. They sent the signal through Tor, the underground computer network. It bounces things around so you don’t know the actual physical location or owner of a particular computer. Basically, we can find the original computer. Unfortunately, we just don’t know whose it is or where it is. That’s why we turned on the PC’s camera to get a clue from the room.”
“You turned on the camera on the bad guy’s computer? How?”
“After the judge gave us a warrant, we sent in our Trojan horse,” Chuck said.
“Trojan horses are the investigative malware we use,” Emily explained. “It looks like a regular program on the surface, but behind the scenes, it’s secretly able to contact the PC’s internal controller to allow backdoor access to the target PC.”
“Like a virus or something?” I said.
“Technically, no,” said Chuck. “Technically, a virus attempts to inject itself into other files. A Trojan is its own file.”
“But how do you get in?” I said. “What about firewalls and stuff?”
“Most people have one or two popular antivirus programs, so we usually send the Trojan through a pretend update to one of them,” Chuck said. “But in this case, the target didn’t seem to have an antivirus program on the list, so we used an exploit in their browser’s PDF parser.”
“A what in the what?” I said.
Emily rolled her eyes.
“Does it matter, Mike? They went around it with some computer stuff. Bottom line, we can look at a bad guy’s files, even turn on his webcam and microphone, which is what they did here.”
“And you searched their files?” I said to Chuck. “Did you find the ransom video?”
“No, it’s not there. They must have removed it,” he said, squinting.
“What about encryption? This guy is a hacker himself,” I said. “He has to use encryption, right?”
“He had layers upon layers of it, but we looked at the PC’s recorded keystrokes and got the passwords to the encryption software he used.”
“Got it,” I said, gazing at the picture again.
I concentrated on the building beyond the window. It had setbacks and some fairly elaborate ornamentation in the stonework. Some stone wreaths and a lot of fleurs-de-lis. Where was this building? It definitely seemed familiar.
“Hey, wait. Did you get any audio?” Emily said.
“I thought you’d never ask,” Chuck said with a mischievous smile as he clicked a terminal’s button.
“We picked this up just three minutes ago,” he said. “This is a live feed. Listen carefully.”
We did. There were sirens and traffic, and then we heard it. A soft, rhythmic buzzing sound.
“No,” I said. “That’s not what it sounds like, is it?”
“Oh, yes, it is,” said Chuck, rubbing his hands together. “Someone is close to that computer, and they’re snoring. We heard a door open ten minutes ago, then somebody creaking down onto what has to be a bed or something.”
“Yevdokimov! Has to be!” Emily said. “He’s there right now!”
“Wherever the hell ‘there’ is,” I said as I gazed at the photo again. “This building in the window here. I feel like I know it. I just can’t place it.”
“It’s definitely in Manhattan, definitely somewhere below Ninety-Sixth Street,” Chuck offered.
“Old, dirty, once-grand office buildings. Where in the city do you have these old, dirty buildings? Basically all over the damn place,” I said, thinking out loud.
“Tribeca, maybe?” Chuck said. “Or SoHo?”
“Yes, kind of,” I said. “But in SoHo, the buildings are usually older and have elaborate fire escapes and all that painted cast-iron cladding. With all these setbacks, this building is prewar—classic-Superman era.”
“It looks huge,” said Emily.
“It also looks high up,” Chuck said. “Ten or twelve stories, maybe.”
“Wait. I got it!” I said, violently shaking the photograph. “The fleurs-de-lis!”
“The what?” said Chuck.
“The fleurs-de-lis. The intricate stonework design here under the windows. And the setbacks. I used to work in Midtown South. I know where this is!”
“You know the building?” Emily said.
“No, but I know the neighborhood. It’s the garment district. The West Side below Times Square,” I said, ushering Emily to the door. “Tell your buddies downstairs to lower the drawbridge, because we need to get uptown and pop this Russian clown before he wakes up and we lose him again.”