It has been quite some time since my last post. I had a total hip replacement followed by a double pulmonary embolism. Both the clots were the size of a quarter in diameter and five and a half inches in length. Put me in the hospital for quite some time. Never want to go through that again. But, enough of that. The story, like all my other ones has a happy ending. All comments are welcomed.
(
The parking lot was empty except for one car just like every morning at 6:15. That car belonged to Tom Reynolds who provided the overnight security for Digital Data Recovery System, Inc. DDRS, as everyone called it, provided recovery services to individuals, companies and even government agencies for crashed, virus infected or destroyed computer hard drives.
I parked and exited my car with my briefcase in my left hand and a cardboard tray with two hot coffees, from the all night coffee bar just down the street, in my right hand.
Tom saw me coming and had the entrance door unlocked and opened before I came within ten feet of the lobby.
"Morning Mr. Steiger," he said as he reached for one of the coffees. "Thanks for the coffee. What do I owe you?"
"Forget it. It's on me," I replied. "And how many times do I have to tell you, Mr. Steiger is my father, just call me Rick."
Walking me to the open elevator he reached in and pressed the button that would send me to my third floor office.
My office was more than a simple office. In addition to a desk and chair it also was a fully equipped computer lab complete with a test bench, various meters and gauges along with all possible tools and spare computer parts.
"Have a good day, Mr. Steiger," he said smiling as the doors closed sending me on my way.
Once inside I booted up my desktop computer and entered the first of seven different passwords that would shut down the security firewalls. While I waited for the computer to alert me to enter the next password, I reflected on how I came to be at DDRS.
I graduated with a Bachelor's degree in Computer Science followed by a Master's Computer Technology and Computer Forensics. I got a license and surety bond enabling me to work with state, local and federal agencies in processing evidence from computers seized by law enforcement agencies.
As my computer alerted me to enter the next password, I continued with my thoughts.
The Feds had busted a ring of sex traffickers who were enslaving young people, some as young as five or six years of age. When they broke into the office of the ring leader they discovered he had taken a sledge hammer to his computer. Their tech people took one look at the destruction and said it would be impossible to retrieve any meaningful data.
So they brought the destroyed computer monitor along with the hard drive to DDRS and I had been working to retrieve the data for the past ten days.
Today would be the day I would try to extract the data from the destroyed hard drive. Since the storage disk had been severely damaged I had to figure a way to collect the data from it without completely destroying it.
'Ping'
Time for the third password.
I had finally figured out a way to avoid spinning the storage disk through the read/write heads which would surely destroy the disk.
'Ping'
I entered the fourth password.
I had obtained two computers of the same make, model and year of manufacture to test out my ideas. One was sitting on my test bench. I had tried to replicate the same type of damage to it that the original one, sitting in my evidence safe, had incurred. After successfully trying out my idea over two dozen times I was ready to try and extract the data from the destroyed hard drive that had been seized by the Feds.
'Ping'
I then entered the fifth password as I began to collect the tools and necessary components I needed.
'Ping'
I entered the next to last password as I retrieved the hard drive with the evidence on it from my locked safe.
As I was removing the the components from second undamaged computer to install; my desktop computer alerted me to enter the final password to shut down the security firewalls.
Finishing up, I held my breath, as I entered the command to begin the transfer of data from the damaged hard drive to my desktop computer. In what seemed like hours but was only a matter of a few short minutes, the transfer was complete.
After shutting down the damaged hard drive I began looking at what had been transferred. From the few files I examined I knew that the Feds would be pleased.
The files contained the names of offshores banks, account numbers and passwords. The other files contained the listing of transactions, including names and date, in the trafficking of young females and males int the illicit sex trade.
After transferring the recovered files to several flash drives as well as large capacity DVDs I called the head of my department. His secretary answered and I asked to speak to Dr. Collins. Phil Collins was not only my boss and mentor he was also my friend.
When he came on the line I told him he could call the Feds and have them come and collect their evidence.
"I'll be down to your office just as soon as I hang up the phone with the Feds," he told me.
Fifteen minutes later he walked into my office asking, "how much data were you able to salvage?"
"I believe I got it all and from what I saw it is going to send some bad dudes to prison for a very, very long time," I replied.
I then proceeded to fill him in on what I found and the methods I used to retrieve it.
I had just finished briefing him when three men walked into my office. Two I recognized as Federal agents and the third was introduced as the Federal attorney who would be prosecuting the case.
In addition to the files containing the names of the off- shore banks, account numbers along with the passwords and other files containing the listing of transactions with names and dates, in the trafficking of the young kids into the illicit sex trade, I also recovered all of the deleted emails.
I explained to them that nothing is really deleted. It is just moved to another portion of the storage disk to written over at a later date.
"I think you need to take a close look at the last email that was received just a few hours before you took the computer and hard drive into custody. It appears that someone is going to deliver twenty-five hundred doses of Fentanyl on this coming Sunday. All the data, time and location are detailed in it."
After telling them that bit of information the lead agent took out his cell phone in an attempt to set up an arrest when the deal went down.
"Forget about using your cell phone in here," I told him. "The entire building is shielded. No wireless signals can get in or out for obvious reasons. You can use my landline if you wish. It's secure."
While he made the call the other agent began to secure the evidence while the Federal Attorney had me sign off on the chain of evidence custody documents.While he waited for the lea agent to finish his call he slipped one of the flash drives into his laptop and began scrolling through the data. Every page he looked at brought a bigger smile to his face.
Turning to me he said, "with this data you managed to recover, the case against these guys just became a slam-dunk. I wish all the cases I prosecute had this amount of evidence. It would make my job a piece of cake."
"If you ever decide to leave here come and see me. I could always use someone on my staff with your expertise to join me."
"Thank you." I replied. "But I am quite content right here where I am."
After the lead agent had finished his call the three of them left thanking me once more for what I had accomplished.
Turning to Phil I asked him if he had a new assignment for me.
He replied. "No, I think that will be up to my replacement."
"Replacement????? What replacement?"
"I am retiring and I put my papers in last month. Forty years is long enough. I kept it quiet to avoid a big fuss. Barbara and I plan to do a lot of stuff we have talked about for years. So it's time."
"When? Do you know who will replace you? Is he from outside the organization?" The questioned tumbled from my mouth.
"Technically next Friday, but Monday will be my last day at work. I want to be here when they make the formal announcement."
"So yes, I know who it is and he is not an outsider."
"You know who it is? Can you tell me or is it confidential?"
"The directors asked me to submit a list of names of who I thought would be the best replacement. When I submitted it there was only one name on it. Yours."
"Me? Phil, there are at least fifteen guys with more seniority than me."
"I didn't base my choice on seniority. I based it on several factors. The most important one was the fact that you are liked and respected by the entire staff. When someone as a problem they come to you. You have always taken the time away from your own assignments to help them. To me that was the deciding factor."
I interrupted him. "Not everyone likes me. There is one guy, Ralph Turner, who definitely doesn't care for me, especially after I told him I would help him solve a problem he had with an assignment but I wouldn't do his job for him."
"I know all about that," Phil said. "Evidently he got really pissed when you told him. That confrontation made quite a commotion. More than one person heard him shouting a carrying on and on and it got back to me. You know I never did understand why I wasn't permitted to terminate him."
"Well, it is water under the bridge now. I don't think that he will present any difficulties for you. I understand he is moving on to something else. So will not have to deal with him."
"This morning I met with a member of the Board and was assured that my choice would be accepted by them. So, Congratulations."