“That’s odd,” said Devine. And it did seem odd. “Maybe she started keeping everything in her personal cloud. Lots of people do now.”
“I think Sara was a very good friend of yours.”
Devine felt his gut tighten under her stare. “I liked her. Everyone did.”
Ellen took the business card from her husband and gazed down at it for a tense moment. “You’re wrong there, Mr. Devine,” she said.
“What’s that, honey?” said Fred sharply.
Ellen turned the card over and over in her hands, like it was hot to the touch. “Someone clearly didn’t like Sara at all,” she said.
CHAPTER
25
WHEN DEVINE GOT BACK TO the house, Valentine was waiting for him in the living room, excitement and concern competing for equal time on his features.
“What’s up, Will?”
“Dude, the email?”
“What about it? Did you find out who sent it?”
“No. It’s untraceable.”
“Well, thanks for trying. It’s the weirdest thing I’ve ever seen. I mean, it doesn’t even look like an email address.”
“No, Travis, is not that easy. I mean, I could not trace it. People I work with, they cannot trace it, either. At first, I think it is some kind of weird spoofing email or maybe hexadecimal.”
“What?” exclaimed Devine.
“Hexadecimal. A base system to simplify binary language computers use. But I dig deeper and it is not that either.”
“Okay, but people send anonymous emails all the time,” said Devine. “Don’t they?”
“There are many ways to sending such messages on internet,” said Valentine. “Cheap, not so cheap, hard, not so hard.”
Devine leaned against the wall. “You’re going to need to explain that.”
“New phone number, preferably burner or prepaid with cash or cloned credit card, fake name and info, new email account, Hotmail, Gmail. Different browser, use incognito mode, and off goes mail. Russia has Yandex webmail, no phone verification needed. Hotmail and Gmail require phone number, but that is bypassed with burner phone. Incognito mode still has location IP address sent with email. But this email has none of that.”
“So then it’s untraceable, you mean?”
“Not if person you send it to has resources. And by being cheap you create big problem.”
“What are the more expensive and better ways?”
“Use special service to do just what you want, send anonymous email. Built-in premier encryption, spoofed IP address, auto deletion from whatever server is used, password protect, no personal info required. Good shit like that.”
“Who does that?” asked Devine.
“Many platforms do proxy email. Some legit and reputable, others not so much. They all do that and do it good. Or you can jump over them and use VPN platform. But don’t do free service, they sell data to third party. Use premium service and your IP address goes poof.”
“Well, whoever sent that email must have used one of those services or the VPN method.”
When Devine eyed the Russian, the man seemed more serious than Devine had ever seen him. Gone was the pizza-and-beer caricature of a Russian hacker.
“Even with that, you can’t hide the computer’s MAC address. Every device has MAC address attached to network card. Is like fingerprint.”
“But this one doesn’t?”
“I think maybe they spoof address, make it invisible.”
“I thought you said it wasn’t a spoofing email?”
“Does not matter. We can break those systems, no matter which method used,” he said quite confidently. “No matter if MAC address spoofed. That is what we do! But this email was not sent on one of those platforms. It could not be. It has none of protocols required to send message over broadband, including an IP, or Internet Protocol, address.”
“So I guess it has to have all that stuff?”
“Of course, Travis, get with fuckin’ program.” Valentine sighed and sat back on the couch. “When you send email, sender and recipient IP addresses are in packet. Then it is directed to gateway or router. Then on to higher-level network. It does this over and over, until it gets to destination email address.”
“So then how did the email manage to show up in my inbox?” asked Devine, before answering his own question: “Someone had to have my email address.”
“Yes, this is true. But that is easy to get. The big thing, Travis, is we do not know who send it or how they manage to send it. I mean, we can’t even trace message to any portal on internet.”