the same size as Donnieâs boots in the mud room. Natasha should be here any minute to process the crime scene. Iâd have her check it out.
I descended the stairs, stepping past Ardisâs body as reverently as I could. âWeâll want to check the neighborâs clock,â I told Ellory. âSee if it has the correct time. If we really are talking about 1:48 p.m.â
âIâll have an officer do it.â He stared past me toward the landing. âYou think he forgot something maybe?â
âWho?â
âThe shooter. That he might have been on his way out, realized he forgot something upstairs, went back to the landing to get it, and then fired the last shot through the living room window when he got there.â
âI really couldnât say.â
Jake, who was still on the landing, answered, âThat would make sense.â
While Jake came down the stairs to join us, I questioned Ellory about some of the issues that the rather disappointing and incomplete police report had left unanswered.
âWere the lights in the house on or off when you arrived?â
âThey were on. All of them, except the study.â
âWere the exterior doors locked or unlocked?â
âThe doors were unlocked, but thatâs not so unusual.â He said the next few words with uncertainty, as if heâd stopped believing them: âThereâs not much crime around here.â
âAppliances. Which were on?â
âYou mean like the oven?â
âYes, and the computer, television, the washer, dryer, a cooking timerâanything.â All of these things tell us what was happening, where people were, what they were doing, or when they were doing it.
He thought. âNot the washer or dryer. Or the TV. We checked the computer for a suicide note; didnât find one though.â
âThe computer is in the study?â
âYes.â
I retrieved my laptop from the mud room. âDo you by any chance know the last webpage that was opened?â
He was looking increasingly disappointed in himself the more we spoke. âI didnât look.â
âItâs okay. Thanks.â
In the small office nook attached to the living room I clicked to the internet history while Ellory asked Jake, âYouâre a profiler. Whatâs your take on this?â
The web history was password protected. The Bureau has ways past that, however. I surfed to the Federal Digital Database and entered my ID number.
âRage,â Jake said. âDonnieâsâor whoever committed these crimesâtheir behavior exhibits uncontrollable rage. We find this type of thing with people who snap. Something pushes them over the edgeâjob loss, marital problems, the death of a child.â
I downloaded the program I needed, and a few seconds later, using a 32-byte MD5 hash, Iâd cracked the password and I was in.
Jake continued, âAlmost always in cases like this, we find what we call a trigger event or a precipitating stressor. Do we know if there was any sudden trauma in his life recently?â
âNo,â Ellory answered. âIf there was I don't know what it would be.â
The web history had been deleted, but the hard drive hadnât been wiped. It wasnât difficult to click into the terminal window, enter a few lines of code that Angela Knight, my friend in the Bureauâs Cybercrime Division, had taught me, and pull up the files.
Someone had been surfing through the naval archives of Ohio Class fleet ballistic missile submarine, or SSBN, deployment records from the 1980s. I could hardly believe the information was made available to the public, but then again, the data was three decades old. A few mouse clicks told me that the Cold War archives werenât considered matters of national security any longer, and a Freedom of Information Act request had apparently been filed by a group known as Eco-Tech four months
Shaw Johnny
Uther Pendragon
Julia Kent
Caridad Piñeiro
Anonymous
Michael Jecks
Denise Grover Swank
Jeri Smith-Ready
K.N. Lee
Kim Vogel Sawyer