Attack Vector

The power of the insignificant

Fiction & Literature, Thrillers, Mystery & Suspense
Cover of the book Attack Vector by Tom Williams, Self published
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tom Williams ISBN: 1230003137482
Publisher: Self published Publication: March 16, 2019
Imprint: Language: English
Author: Tom Williams
ISBN: 1230003137482
Publisher: Self published
Publication: March 16, 2019
Imprint:
Language: English

A pilot, pharmaceutical executive, medical doctor, investment advisor, and a priest die in accidents, or it seems that way.

In Washington, DC, renowned FBI Chief Data Scientist Dr. Steven Flynn supervises a secret computer software program he designed. Its mission is to identify the smallest nuance of similarities in attacks on the Homeland. The system reveals the five seemingly deadly accidents had a single common fact; the use of software developed and marketed by a Silicon Valley software company. Were the accidents premeditated murders?

When FBI Special Agent Molly Perchant confronts the Company’s CEO with compelling circumstantial evidence that an unidentified employee was responsible for the killings, the CEO reaches out to Dr. Marcie Conover and Bill Ockham, partners at the private technology investigation firm Ockham’s Razor to validate or deny the Government’s claims.

The Ockham’s Razor team uncovers a heinous conspiracy that repurposes everyday digital products into weapons of death. Was it revenge, vengeance, terrorism, or cyber attacks? Was a Company employee complicit? Proving the three elements of an advanced technology crime: means, opportunity, and motive confront the duo’s emotional, legal, and ethical boundaries.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A pilot, pharmaceutical executive, medical doctor, investment advisor, and a priest die in accidents, or it seems that way.

In Washington, DC, renowned FBI Chief Data Scientist Dr. Steven Flynn supervises a secret computer software program he designed. Its mission is to identify the smallest nuance of similarities in attacks on the Homeland. The system reveals the five seemingly deadly accidents had a single common fact; the use of software developed and marketed by a Silicon Valley software company. Were the accidents premeditated murders?

When FBI Special Agent Molly Perchant confronts the Company’s CEO with compelling circumstantial evidence that an unidentified employee was responsible for the killings, the CEO reaches out to Dr. Marcie Conover and Bill Ockham, partners at the private technology investigation firm Ockham’s Razor to validate or deny the Government’s claims.

The Ockham’s Razor team uncovers a heinous conspiracy that repurposes everyday digital products into weapons of death. Was it revenge, vengeance, terrorism, or cyber attacks? Was a Company employee complicit? Proving the three elements of an advanced technology crime: means, opportunity, and motive confront the duo’s emotional, legal, and ethical boundaries.

More books from Self published

Cover of the book Cibercrimen: Las Amenazas al Navegar en Internet y en las Redes Sociales by Tom Williams
Cover of the book Girl In The Mirror by Tom Williams
Cover of the book The Temple Is Not My Father by Tom Williams
Cover of the book Alexandra's Song by Tom Williams
Cover of the book Forever Yours (Moreno Brothers 1.5) by Tom Williams
Cover of the book Bipolar God by Tom Williams
Cover of the book 50 Days without the Sun by Tom Williams
Cover of the book SHOTTAMA by Tom Williams
Cover of the book Cook Your Way to Love & Harmony by Tom Williams
Cover of the book Falling Awake by Tom Williams
Cover of the book Calypso by Tom Williams
Cover of the book Living in the Light by Tom Williams
Cover of the book V is for Victoria: A Day in the Life of Them Vassar Girls Series Novella Book I by Tom Williams
Cover of the book What Of Faith And Fire by Tom Williams
Cover of the book Ricordo di un sogno by Tom Williams
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy