“It’s not as good as it sounds,” the guy said. “You’re gonna be overwhelmed with data, and it’ll take a lot of work to sift through the crap for a few nuggets of information.”
“I know somebody who can probably do that for us,” I said.
“There you go. Satisfied?”
“More than,” I said. “Paul?”
“You bet. What do we do now?”
“You just sit quietly and play with your computer for twenty minutes or so. I’ve got a flight to catch. Oh, and about that key-logging program….”
“What about it?” I said.
“It has a limited life span.”
“Meaning?”
“The chain of e-mail accounts involved will expire in sixty days, and with it the flow of information. On the other hand, if your target somehow discovers the key-logger, the flow of information may stop sooner.”
“Fair enough,” I said.
“Are we being watched?” Paul said.
“What do you think?”