Probably employed some cloaking software, which is good and bad. Bad, in that we can’t see what he found, good in that whatever he was up to, he took unusual care to cover his tracks. I’m still inside Cy’s laptop, and I can tailgate him again, but that forty-five minutes is lost to us. If I had a team of hackers, real pros, maybe I could’ve burst through those new firewalls to see what he was up to, but I can’t do that on my own.” He holds up both hands, surrendering.

