1. Broken Promise and Bad Intensions


    Date: 5/8/2024, Categories: Loving Wives, Author: byCindyTV

    ... tomorrow.
    
    Just as expected, the predator clicked the link and gave me access to the company's inner sanctum. I then erased any evidence of the email coming from Ellie and the remote access logs on her laptop, and when IT checked, they would not find the email, the link, or any record of the incident. With some luck, their IT staff would just ignore the report and move on to other, more pressing issues.
    
    I waited a week before I started my activity. Using a VPN and multiple remote servers in 8 different countries, I installed several programs on Richard's company main server to help me complete my work. After a few hours I had access to their more valuable files and downloaded company financials, salaries from HR, engineering designs, and projects that were going to be sent in for patent approvals. These patents would be worth millions to the company.
    
    Then I wanted to have a little fun with Richard, and through his work computer, I signed him up for several porn sites, including two that were on the Deep and Dark web. Having access to his life through his PC, I used his credit card and bank information. It was simple to sign him up and use his company PC without his knowledge. I set up a program to move any messages from those sites to a hidden file I created on his PC, which only I had access to.
    
    In that secret, hidden file, I downloaded dozens of child porn images and videos, company diagrams, and confident engineering papers and started my campaign for 'Burn ...
    ... Richard.' Over the next month, using his company email account, I sent several documents to their top competitors from his company email account, with a note asking them when the payments would be transferred to his account. Then I made a rudimentary delete of the sent emails. Richard was hired for his financial background, not his technical skills, so like most novices, he would think that once the emails and files were deleted, all traces would be gone. But under any type of investigation, the evidence would be easy to find.
    
    Then, from his PC, I started sending the child pornography to sites I knew were monitored by the FBI. Over a week, I sent more than 100 images that would definitely get the FBI's attention. At the same time, I paid one of my associates to plant a USB drive filled with dozens of the child porn images in Richard's apartment. It took them less than two days to find a way in and plant the device. All part of my plan.
    
    Of course, during the entire process, I was careful to use a VPN, and several remote servers, and my experience in cyber security to erase any possible ties to myself.
    
    Ten days later, a team of six FBI agents entered Richard's office while he was in a meeting with the President of the company. The agents came in, brandishing weapons and yelling "FBI — Nobody Move," as they swarmed the office. The scene was surreal, and the entire office staff froze in fear, and watched the scene unfold as they remained frozen in place, and silent.
    
    "We ...