Cursor will data search the victim, run a trace using falcone's link and then examine and/or hack the commlink from the room.
what exactly you're trying to trace?
browsing the message logs, you see a text message requesting the ransom, with threat to kill the victim and spread the word on streets, message originating node and access_id of the sender. However there is no icon of the sender, he is not subscribed, and thus there is no link you could trace.
Trace User (Track)
You trace an icon back to its originating node. This is a Computer +
Track (10, Complex Action) Extended Test. The target may increase
the threshold with the Redirect Trace action, and a Stealth program
run by your target acts as a negative dice pool modifier.
When you reach the threshold of the Extended Test, you have
successfully traced the target, learning the target’s access ID and the
location of the device housing the originating node (usually the user’s
commlink). If the target is using a wired connection to the Matrix, you
learn his exact location. If he is using a wireless connection, you have
his location triangulated to within about 50 meters. As long as you
keep your Track program running and the target remains connected
to the Matrix, you may continue to monitor the target’s location. Black
IC can make the trace easier.
You can also use this action to trace a subscription to its other
end. For example, you may trace the subscription from a drone to the
rigger controlling it.