Attack Vector

The power of the insignificant

Fiction & Literature, Thrillers, Mystery & Suspense
Cover of the book Attack Vector by Tom Williams, Self published
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tom Williams ISBN: 1230003137482
Publisher: Self published Publication: March 16, 2019
Imprint: Language: English
Author: Tom Williams
ISBN: 1230003137482
Publisher: Self published
Publication: March 16, 2019
Imprint:
Language: English

A pilot, pharmaceutical executive, medical doctor, investment advisor, and a priest die in accidents, or it seems that way.

In Washington, DC, renowned FBI Chief Data Scientist Dr. Steven Flynn supervises a secret computer software program he designed. Its mission is to identify the smallest nuance of similarities in attacks on the Homeland. The system reveals the five seemingly deadly accidents had a single common fact; the use of software developed and marketed by a Silicon Valley software company. Were the accidents premeditated murders?

When FBI Special Agent Molly Perchant confronts the Company’s CEO with compelling circumstantial evidence that an unidentified employee was responsible for the killings, the CEO reaches out to Dr. Marcie Conover and Bill Ockham, partners at the private technology investigation firm Ockham’s Razor to validate or deny the Government’s claims.

The Ockham’s Razor team uncovers a heinous conspiracy that repurposes everyday digital products into weapons of death. Was it revenge, vengeance, terrorism, or cyber attacks? Was a Company employee complicit? Proving the three elements of an advanced technology crime: means, opportunity, and motive confront the duo’s emotional, legal, and ethical boundaries.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A pilot, pharmaceutical executive, medical doctor, investment advisor, and a priest die in accidents, or it seems that way.

In Washington, DC, renowned FBI Chief Data Scientist Dr. Steven Flynn supervises a secret computer software program he designed. Its mission is to identify the smallest nuance of similarities in attacks on the Homeland. The system reveals the five seemingly deadly accidents had a single common fact; the use of software developed and marketed by a Silicon Valley software company. Were the accidents premeditated murders?

When FBI Special Agent Molly Perchant confronts the Company’s CEO with compelling circumstantial evidence that an unidentified employee was responsible for the killings, the CEO reaches out to Dr. Marcie Conover and Bill Ockham, partners at the private technology investigation firm Ockham’s Razor to validate or deny the Government’s claims.

The Ockham’s Razor team uncovers a heinous conspiracy that repurposes everyday digital products into weapons of death. Was it revenge, vengeance, terrorism, or cyber attacks? Was a Company employee complicit? Proving the three elements of an advanced technology crime: means, opportunity, and motive confront the duo’s emotional, legal, and ethical boundaries.

More books from Self published

Cover of the book Katie by Tom Williams
Cover of the book Gretel by Tom Williams
Cover of the book Machine Man by Tom Williams
Cover of the book a fool's journey Book I by Tom Williams
Cover of the book Canti popolari della Penisola Sorrentina by Tom Williams
Cover of the book Inside Matters by Tom Williams
Cover of the book The Bridge by Tom Williams
Cover of the book Vincent by Tom Williams
Cover of the book The Moloch Caper by Tom Williams
Cover of the book 7am L'Appennino Modenese tra la Linea Gotica e le vie dei Pellegrini by Tom Williams
Cover of the book Neuroeconomics by Tom Williams
Cover of the book Marconi's Secret Jungle Lab by Tom Williams
Cover of the book The Start of Something by Tom Williams
Cover of the book Monkey Travels by Tom Williams
Cover of the book City of Dark Angels by Tom Williams
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy