- Home
- Bill Kitson
Dead and Gone Page 21
Dead and Gone Read online
Page 21
‘What?’ asked Jackie.
‘It’s all part of the scam, believing what you see. Jackie, do you look like your passport photo? Tina, do you?’ Both women shrugged and agreed they had terrible photos.
‘Exactly. Linda Wilson was reported to have been seen on the ferry and abroad, and what proof did they have? Her passport!’
‘I get it,’ said Jackie. ‘Just because you have the passport doesn’t mean it’s you. Not if you look similar to the photo. And wasn’t Diane Carlson supposed to be on holiday at the time Linda Wilson vanished?’
Nash grinned as he nodded in agreement.
Tina looked amused. ‘Glad I was able to help.’ She continued, ‘Anyway, the good news, if you can call it that, is that when I checked out Farrell’s website for Security Solutions, apart from those you mentioned, I couldn’t see any other companies that might have been sold infected software.’
‘Well, that’s a relief. The question now is: where do we go from here?’ Fleming asked Nash.
‘I think the first thing we need is to know what progress Viv’s made with identifying this woman Peter Macaulay’s been seeing, and also if he’s discovered anything about the mysterious Mark Tankard.’
Nash was about to pick the phone up, when it rang. ‘Speak of the Devil,’ he said, ‘I was just going to ring you. I take it you have news?’ He listened for a few minutes before saying, ‘That’s ridiculous. Sorry, Viv, but you dropped a bit of a clanger there. Never mind, we’ll talk about it later. Any news on Tankard?’
Nash put the phone down and Fleming saw him shaking his head. ‘What’s ridiculous?’ she asked.
‘Viv slipped up when he checked the entry on the electoral roll for the house where the woman lives. He and Tom spent hours searching for Hope Morgan, a woman who doesn’t exist. He forgot that on the electoral roll, the surname comes before the Christian name. He should have been searching for information on Morgan Hope, who most definitely does exist. Now that he’s looked for the right details, he’s discovered that she works as a secretary at Wilson Macaulay Industries, which would explain where she met Peter Macaulay.’
‘Anything about Mark Tankard?’
‘No, he remains a mystery at present. Viv’s got Tom working on that, whilst he concentrates on Morgan Hope’s past.’
He was still speaking when the phone rang again. He listened for a moment, and the women saw his expression change. ‘Thanks, Viv. That is extremely interesting.’
He replaced the receiver and looked at Tina. ‘Are you prepared for a sleepless night?’
She smiled faintly. ‘That depends what you have in mind, Mike.’ Then added, ‘If needs be, of course I am. Why, what have you found out?’
He told them, and after he finished, Fleming asked, ‘What do you want me to do?’
‘If Tina can get me the information I need, I want you to sort out some arrest warrants, and also to arrange a meeting for me.’
Nash turned to Tina. ‘Would you be in a position to give me chapter and verse before morning on exactly how the frauds were conducted?’
‘No problem, I’ll get working on it now.’
Nash watched her disappear into his office and glanced towards Fleming, who was staring at him, an odd expression on her face. ‘Something wrong?’
‘No, I was waiting for you to give me details for these warrants.’
‘I need to speak to Mexican Pete first, and then I might have to ask Tina to do a special job for me. However, whilst you’re not doing anything else, would you try and arrange for the directors of the companies we’ve identified as Farrell’s clients to meet at Wilson Macaulay Industries tomorrow? You’ll need to get Peter Macaulay’s approval first. By then, all being well, I think we’ll be in a position to wrap the whole thing up.’
‘Mike, what exactly are you up to?’
He explained, and as he spoke, Fleming’s expression changed from surprise to incredulity and then acceptance. ‘How on earth did they get away with it? And why did nobody spot anything untoward?’
Nash shrugged. ‘If you’re told something, you tend to believe it unless there’s something to make you suspicious. It was simple, and that’s probably why nobody raised any awkward questions. However, just to be certain, let’s talk to Mexican Pete.’
He dialled the mortuary. ‘Professor, how are you progressing?’
‘I’ve recovered the remains from the garden, if that’s what you’re driving at, but it will take a while to give you any answers.’
‘There is one piece of information that might be useful in the meantime.’
He explained, and Ramirez said, ‘Wait a minute, I’ll find out.’ Nash listened as the pathologist rummaged through paperwork. A moment later he gave his answer.
‘Thank you,’ Nash said and put the phone down. He stared at Fleming for a moment, but she realized he wasn’t looking at her.
‘What is it?’
‘I think we’ve become ghost hunters. We’re chasing phantoms rather than real people. I think I do need Tina to do a spot of computer hacking after all.’
‘Whose computer is she going to break into? Or shouldn’t I know?’
Nash told her. Fleming should have got used to the surprises Nash was capable of springing, but this one made her gasp. It was only after he gave his explanation that she agreed, with great reluctance, to turn a blind eye to what was about to happen.
chapter twenty-three
Jackie Fleming and Mironova arrived at Wilson Macaulay Industries’ head office next morning, well before the scheduled time for their meeting. They were ushered into the boardroom, where Peter Macaulay and his father were waiting, along with Diane Carlson. ‘What’s this all about?’ Christopher demanded.
‘I prefer to leave explanations until after everyone is here. It will save having to go over everything twice.’
Fleming had barely finished speaking when her mobile rang. She answered it, but her part of the conversation gave little clue as to who she was speaking to, or the subject matter of the call. ‘How did it go?’ she asked, and after hearing the reply, ‘Any problems?’
Mironova saw her smile, and deduced that the news was positive. ‘OK, get here as soon as you can.’ Fleming glanced across at Mironova and nodded, but there was little for the others to gauge whether the call related to them or not.
Sir Stuart Crawshaw was the first of the visitors to arrive. He was followed into the boardroom by the young, dynamic managing director of Dales Sports. Having greeted the other executives, he turned to the detectives. ‘Superintendent Fleming? What’s the reason for this meeting? Your message yesterday was rather short on information.’
Jackie repeated her earlier comment. Fortunately, they did not have long to wait before the CEO of Good Buys Supermarkets arrived. ‘I believe we can start now.’ Fleming looked at Peter Macaulay. ‘I think it would be advisable to have someone to take notes of what’s discussed here. Do you have someone available to do that? Your secretary, perhaps?’
Macaulay looked slightly uncomfortable. ‘She’s covering for our receptionist, and I don’t have anyone else available at the moment,’ he explained.
‘That’s not a problem. I’m sure Detective Sergeant Mironova won’t mind doing that for the duration of the meeting.’
Clara left the boardroom, and a minute or two later Morgan Hope entered, carrying a shorthand notebook and pencil. She took her seat at the far end of the oblong table, nearest the door. As soon as the secretary was ready, Fleming addressed the meeting. ‘With the assistance of a computer expert loaned to us specifically for this inquiry, we have been investigating the systematic theft which has resulted in large-scale fraud committed against the customers of all your companies. Along with that inquiry, we have been pursuing murder inquiries in connection with the killing of three people, and the abduction of a fourth, who we believe would have been another victim had we not intervened in time. To cover up their involvement in the fraud, the criminal gang set up scapegoats. When they were t
hreatened with discovery, they murdered a local solicitor, Neil Ormondroyd, who had found evidence that confirmed one of the crimes. They then abducted an independent specialist, Patricia Wain, who was about to conduct an internal audit at Shires Financial Services which would have given the fraud away. They also wanted to discover how much she had gleaned from her initial examination of the Shire Finance software, but fortunately we were able to rescue her before they attempted to extract that information.’
She looked at each of the executives in turn. ‘Our computer expert has uncovered elements of the fraud that involve all your companies. She has not only identified the source of the problems, but has followed the money trail from the point where the excess was creamed off your accounts, to the originating computer where the stolen funds ended up. That computer is right here in this building.’ Jackie paused and smiled slightly. ‘It isn’t coincidence that I asked for the meeting to be held here today.’
She turned to look at Diane Carlson. ‘By accessing and examining the Wilson Macaulay Industries’ intranet, our expert was able to establish categorically that the computer in question was yours.’
Diane Carlson looked horrified.
As she finished speaking, the boardroom door opened. ‘Right on cue,’ Fleming remarked. She held her hand up to stem the barrage of questions being thrown at her. ‘My colleague, Detective Inspector Nash,’ she introduced the newcomer. ‘He will explain more about how the crime was committed, and identify the fraudsters.’
‘I’m sorry for my late arrival,’ Nash began, ‘but I was otherwise engaged. However, I am pleased to be able to tell you that we now have two members of the gang under arrest. To put it in simple terms, the fraud involved the corruption of software supplied to all your companies. In the case of Wilson Macaulay Industries and Dales Sports, the effect was less lucrative, as it was only committed against those of your customers who took advantage of the extended credit offered via your Internet sales operations. By far the larger share of the criminals’ proceeds came from the clients of Good Buys Supermarkets, and especially Shires Financial Services. The fraudsters extracted additional interest from any of the store card or credit card customers who did not settle their full balance every month. They did this in more ways than one. They massaged the interest rate so that the amount on the statement sent to clients was in excess of that due, and they delayed crediting the accounts with the payments received by as much as three days in some cases. Thus earning interest on capital that had already been paid off. In addition, if anyone used their credit card abroad, the exchange rate applied for conversion to sterling bore no resemblance to the actual rate in operation on the date in question.’
Nash turned to address Crawshaw. ‘Not content with that, they applied the same methods to all your overdraft, mortgage and loan customers. Anyone who owed money was vulnerable. The methods they used are far beyond my ability to explain in a technical sense, so I prefer to leave that until our expert arrives, which should be quite soon. In the meantime, please reserve your questions until she is here.’
There were no questions, merely a stunned silence. After a moment, Morgan Hope stood up and asked if she could be excused to organize refreshments. ‘Of course,’ Nash smiled, ‘take as long as you need.’
As they awaited her return, the mobile in Nash’s pocket bleeped, signalling an incoming text message. He glanced at the screen and smiled, before showing the gist of it to Fleming. Morgan re-entered the room pushing a small trolley from which she handed out mugs of coffee before she resumed her seat. She took up her pencil and looked towards Nash expectantly, but the detective didn’t speak.
After a couple of minutes, the door opened again. ‘Allow me to introduce our computer expert. This is Dr Tina Silver, who is on secondment to us for the duration of this case. Dr Silver is a leading expert in cybercrime and counterterrorism, and we are extremely fortunate in having use of her outstanding skills with regard to computer software.’
Nash invited Tina to explain more about the technical aspects of the fraud. She began, her voice clear and confident. ‘The whole thing began with the collapse of Bishopton Investment Group. That was designed to act as a Trojan horse by creating panic in the boardrooms of local companies, which in turn led them to take preventative measures. Unfortunately, in so doing, they allowed the very people they were trying to keep out to access their systems.’
She glanced at Nash, a clear invitation for him to contribute. ‘The other reason for the Bishopton Investments fraud was to create ready-made scapegoats in the shape of the two people who disappeared at the time Bishopton collapsed: Linda Wilson, and the man known as Mark Tankard. According to local rumour, they were living the high life in some tropical paradise on the proceeds of their crime. The truth of the matter is very different.’
Tina continued, ‘The software you all commissioned from Security Solutions contained a hidden program. It was this that allowed them to steal from your customers on a systematic basis. Although the individual amounts involved are minute, the cumulative effect over the last three years of robbing thousands of people, month in, month out, runs into millions. The scheme was highly sophisticated, and every aspect was carefully managed so that the paper statements you sent out via computer to your customers did not match the amount shown on your system. Nor did the amount received via direct debit or even by cheque. As soon as the account number appeared on your system, the excess was diverted and the amounts made to tally.’
Nash watched the group, who all appeared poleaxed by the revelations. He wondered what their reaction would be to the far greater shocks that still awaited them. ‘The scheme is one of the most sophisticated I have ever encountered,’ Tina told them. ‘And the measures taken to avoid detection and discourage attempts to penetrate the areas within your system where the fraud was committed were all but impossible to bypass. That is except by someone with the very highest level of computer expertise.’
She turned to look at Diane. ‘Ms Carlson, I believe? I was able to follow the trail of the diverted funds. It led me to a partition in the hard drive of your computer. From there, the money was transmitted on a regular basis to an offshore account. That account was not in the Cayman Islands, or anywhere near there,’ she added. ‘That was simply another myth created to throw people off the trail should they get that far with their enquiries.’
‘You don’t believe I was involved, surely? I don’t know enough about computers,’ Diane protested indignantly as the others round the table stared at her.
Crawshaw leaned forward and looked at Nash. ‘If you’re right and the software from Security Solutions was the cause, are you suggesting Jonathan Farrell was behind this? Did he sell us software simply to enable him to steal money from our customers?’
‘Yes, and no,’ Nash told him. ‘As far as I’m aware, Jonathan Farrell has never committed a criminal act in his life. If that appears to be a contradiction, let me explain. The man you know as Jonathan Farrell is actually Mark Tankard. The only mistake the real Jonathan Farrell made was to be too trusting. He trusted his wife and he trusted his best friend. They both betrayed him, as they’ve continued to betray and use people for many years.’
‘Can you prove all this?’ the CEO of Good Buys demanded.
‘And have you arrested this man Farrell, or Tankard, or whatever his real name is?’ Crawshaw added.
‘The answer to both those questions is, yes. Farrell was arrested over an hour ago. That was why I was late arriving. Interestingly, a short while ago, a text was sent to his mobile that read “Operation Armageddon activated.” That was to inform him that a virus had been triggered.’ Nash nodded to Tina. ‘Dr Silver will explain.’
‘The effect of the virus was to remove the whole of the credit balances from the accounts of all the companies within your organizations. The liquid assets of Dales Sports, Good Buys Supermarkets, Wilson Macaulay Industries and Shires Financial Services were all transferred to the offshore account of the fraudsters, leaving
your companies in meltdown. Within days you will be facing the same fate as Bishopton Investments. Having transferred the funds, the virus then erased the full contents of your systems, leaving it impossible for anyone to trace the money or the perpetrators.’ Tina stopped as the outraged voices of the directors threatened to drown her out. She watched the horrified faces staring at her for a moment before they quietened and she relented, then added, ‘Or rather that’s what “Operation Armageddon” would have done, had I not protected your software from it.’
The look of relief on her listeners was apparent, but with one exception. ‘Do you know who sent that text?’ Christopher Macaulay asked.
‘We believe it was sent by the only member of the gang not yet under arrest,’ Nash told them. ‘Let me explain. Jonathan Farrell was an orphan, whose parents had left him quite well off. He was also a brilliant musician. He went to university to study music, where he became friendly with another student, Mark Tankard, who was studying computer science. At some point, Jonathan Farrell met and later married another student, who was also on the computer science course with Tankard. She was exceptionally talented, but from a much poorer background. So much so that she was forced to supplement her meagre grant by working as a prostitute.
‘That ceased after her marriage, so probably the sole reason for the wedding was money, certainly not affection. Whether she and Mark Tankard had become lovers before then or later, I don’t know. What is certain is that it was their alliance that led to the scheme that would give them both a life of luxury. However, to throw investigators off the scent, they needed scapegoats. The first of these was with Bishopton Investments. Tankard was working on contract to the company and when he and Linda Wilson vanished and allegedly ran off with their ill-gotten gains, Mark Tankard’s identity died at the same time. In actual fact, he had merely assumed the persona of Jonathan Farrell and set up a company which sold security software.’