After washing, I walked into a small room that's connected to my room. It's only accessible through my room and most of the time I keep it locked, to make sure no one get inside and ruin my treasures.
Once inside, I walked directly and sat Infront of my computer. It was equipped with the best tools and pieces needed to make it perfect for hacking and preventing others from locating me and my IP location.
While sitting, I felt a sense of nostalgia. It's been a long time since I used it. When I lost my memory, I was surprised of all the weird advanced tools, as well as codes and scripts.
I tried a lot to work on it, to understand the codes and protocols that I had, using some notes I left and the few memories I had, hoping I might find something that help me in getting my whole memory back.
But it was to no vail, although I couldn't crack and venture through it, I didn't ask anyone to do so, nor inform them of what I deemed "classified info". I figured I had a secret, understood what it could be, and that I didn't want anyone to know, otherwise, my computer won't be that complex.
Thinking of that now, makes me both amused and wistful. I was me, but I couldn't understand myself. No one could help, for it seemed not many knew about my secret, and even those who knew, didn't know the depths of it. And I didn't know who to ask and trust, specially all of this seemed dangerous and important, which made me more lost back then.
I will not forgive whoever was behind this. The pain, suffering, and agony that I was subjected to, they will have it 10 times worse.
My fingers danced through the keyboard, fast and swiftly, just like when I play the piano. It's a rhythm, that I know by heart. One that brings me joy, peace and happiness. All this time, it felt like I was floating in a weird space, but now I found my place. And this rhythm grounded me on my feet.
Black windows appeared in front me, and different complex and hard sequences of codes were flying around. I hacked the police databases, breaking through firewalls without triggering and alerting the police, it was like walking in the park.
Once I managed to break through, the data was encrypted, making it difficult to read even if accessed. Well, it might be for others but not me. I entered some key codes, and in less than a second, decrypting data started.
Two minutes later, all the data were decrypted, as I surfed through the data downloading every piece of information that I needed, and once I was done, I cleaned any trail left by me, and exited the database.
Looking through the information, made me certain I wasn't mistaken. Someone was indeed cleaning the mess.
I found information that was actually erased from the database by someone, it left a trail that I managed to recover. The driver of the first accident was imprisoned for drunk driving while the driver for the second accident died on the spot due heart attack according to his medical report.
But I'm sure, it was the same driver for both accidents. Looking through the deleted information, the original driver was switched.
Someone took the blame for the first accident and was imprisoned, I retrieved his information and looked into the second one.
The alarming thing is that this 'dead' guy had, indeed, died in an accident due a stroke as his medical report specified, but it was in another place. The horrible part, is that the real accident was erased and he was blamed for my accident. Moreover, the car plate was changed.
Looking into the first driver, made it very weird. There was no transaction, no suspicious money received by his family, they didn't have any change in living situation, nothing.
Some officers that received a bribe tampered with the investigation and erased crucial information. However, I managed to get their identities.
Tracking the officers, I managed to locate them, hacked their personal devices, personal accounts, financial accounts, network, and email accounts. It seemed that some unknown IP reached to them transferred the money, instructed the leader what to do, and then disappeared.
Tracking him down is tricky, for he seems like a professional, experienced hacker. I smirked, 'well if it was easy, it won't be fun'.
I cracked my fingers, and with a fighting and challenging spirit, I start typing code after code. That guy has used an excellent proxy server and virtual private network, encrypted his internet routes, and acted as an intermediary between the devices and the internet. Skillfully hiding and masking the IP address.
I tracked the last interaction between the two, then started network sniffling, capturing and analyzing packets of data traveling over the network, when I identified the server, I started cracking the virtual private network, all while making sure not to trigger and alerting the bastard. I'll have to admit, this one is remarkable. His defense and protection system, is better than that of many countries. Making me more curious to who is behind this.
Could it be someone who managed to recognize me as DARKRUNE? Impossible, I always made sure to hide my IP well, my protection system and the proxy server I use is top notch. It cost hundreds of million dollars. Moreover, I modified it. No one can match it, nor break it. Unless that bastard is better than me.
But there's none. I'm not being arrogant or haughty, but that's a fact that everyone in the hacker platform knows. There's a competition that is made, where every hacker register in to classify the best hackers. And several, incredible hackers, the best of every country in the world, participated.
And I came on top. The competition is ongoing, everyday someone can participate, and the classification always change. But no one managed to break my record. Not even in the year that I was absent.
It took me 30 minutes, and I succeeded in breaking the last firewall. It might be short for others, but for me, it was long. The last time it took me that long to break a network, was when I launched an attack on a country to expose a human trafficking that some politician had a hand in.
Once I broke in. I started reconnaissance. It's a phase where I attack to gather all the information about the target, including the IP address. This will alert the culprit but it's not a problem to me. For all it will take me less than 30 seconds.
As expected, the culprit noticed. He started attacking me, and reinforcing his firewall to protect his location from leaking. I left him fake trail to dupe him, but as expected he didn't take long to figure it out, but it was too late.
The IP address was with me. I removed any trail that may lead to me then left him a few gifts and a virus, to disrupt his system and obstructed it. With my unique signature as DARKRUNE, I left.
I did this for two reasons. One if the attacker, knew my real identity, and that was the reason behind the assassination, they will definitely make another move to attack me again. But this time, I'll be ready.
The second reason, if the attacker wasn't aware of my identity, and the attack was for other reason, related to Marry Kay and not DARKRUNE, then they won't suspect me.
Afterall, who will tell that the famous DARKRUNE is a 17-year-old girl? Will soon to be 18…
Thus, it will give me more time to geolocate him and counterattack.