~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Phone Taps
After the "hacking" incident, Tsomato heard this the next time he tried to place a phone call. A few days later, after the first message had been spread throughout the Internet Community, Tsomato found this message had been left on his answering machine.
Log Files
In a feeble attempt to track the "hacker", three sessions were logged which are of a great interest. In the first, Tsomato and Mark Doubt are planning a frameup. In the second, Tsomato reads Kevin's mail, and realizes that Kevin is onto them. As a final maneuver, Tsomato places an incriminating file into the "gkremen" account.
Spying Software
Unbeknownst to Tsomato, this program, which he had been developing to allow the government to spy on the actions of Windows users, has been distributed widely within the hacker community, and is currently being used to track the actions of high ranking government officials.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~