The Island of Dragons (Rockpools Book 4) by Gregg Dunnett

The Island of Dragons (Rockpools Book 4) by Gregg Dunnett

Author:Gregg Dunnett [Dunnett, Gregg]
Language: eng
Format: epub
ISBN: 9781912835256
Publisher: Old Map Books
Published: 2021-04-30T23:00:00+00:00


Chapter Thirty-One

They worked together on the report, West paying particular care to make sure there were no claims which weren’t strongly supported by the evidence. It was broken down into sections.

There was considerable evidence to suggest that Billy Wheatley was responsible for the attack on the Fonchem facility. Rental car records, and data from his computer, showed he faked an ID in order to rent a car, which he then booked onto the Lornea Island ferry on the day prior to the attack. He was then seen leaving the island, on the day after the attack. In total sixteen of his fingerprints were identified on the remaining fragments of the bomb casing, strongly indicating he was at least present when the device was made, if not responsible for its manufacture. The single trail of footprints reportedly seen by the murdered security guard, and their small size, was consistent with the size of Wheatley’s own feet. And Wheatley had an ongoing campaign against Fonchem, something he didn’t even try to hide, which may, in his mind, have provided a motive for the attack.

The autopsy on the security guard had by now confirmed that he was killed by the detonation when the device exploded. It had caused so much destruction that it was impossible to ascertain exactly what had happened. It was possible Wheatley had timed the device to explode when the guard was there, or it might have been an unfortunate accident – none of the other bomb sites had involved any injuries or deaths.

Interviews carried out with all those who had known Wheatley during his brief time at college had all told a similar story. He was quiet and polite, and clearly highly intelligent, but also reserved, and appearing to be more interested in his own private projects than taking part in the typical freshman activities. The details of his private projects had not been shared. He had an ‘air’ about him, a sense that he was different. Arrogant was a word that came up a lot. He appeared highly capable of carrying out the work tasked to him, yet unmotivated by it. His attendance to classes had started well, but slipped in the weeks before the attack.

The computer equipment recovered from Wheatley’s student apartment revealed an interesting absence of information, which in itself was damning. He had installed and employed an array of software and devices designed to prevent leaving any sort of electronic trail. His cellphone, which was not recovered, was discovered to have been loaded with software that projected a false position, to anyone who tried to track it. Though this program was legal, other software and apps installed were not. In total he seemed to have gone to considerable lengths to leave false trails, and to hide his true online activities, and physical locations. This was considered the likely reason it had been difficult so far to place him at the locations of the other bombings the agents were investigating. But with sufficient resources and time,



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.