Share

12

12

We check Chuck’s recent call history, but the most recent on the log is Jason’s from our motel room.

“Not surprised,” Jason confesses. “Chuck may have been an IT idiot, but I doubt the Marching Tides would be stupid enough to be contacting each other over normal channels.”

A quick scan of the apps on the phone and we find a suspicious-looking unnamed app nestled away with just a plain black square for an icon. It requires a username and password to login. Luckily, Chuck being the brain-waffle that he was had his login stats saved in his keychain. Idiot.

Sure enough, the app appears to be a Dark Web access point for killers-for-hire. There does appear to be a voice chat feature, which we guess is how Chuck called his contact from the diner, but there isn’t a record of calls made through it, so that doesn’t help us too much.

The private messages tab, however, proves much more fruitful. We find a series of correspondences between Chuck and a contact named ‘Gale’.

“There was
Locked Chapter
Continue to read this book on the APP

Related chapters

Latest chapter

DMCA.com Protection Status