Attack Vector

The power of the insignificant

Fiction & Literature, Thrillers, Mystery & Suspense
Cover of the book Attack Vector by Tom Williams, Self published
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tom Williams ISBN: 1230003137482
Publisher: Self published Publication: March 16, 2019
Imprint: Language: English
Author: Tom Williams
ISBN: 1230003137482
Publisher: Self published
Publication: March 16, 2019
Imprint:
Language: English

A pilot, pharmaceutical executive, medical doctor, investment advisor, and a priest die in accidents, or it seems that way.

In Washington, DC, renowned FBI Chief Data Scientist Dr. Steven Flynn supervises a secret computer software program he designed. Its mission is to identify the smallest nuance of similarities in attacks on the Homeland. The system reveals the five seemingly deadly accidents had a single common fact; the use of software developed and marketed by a Silicon Valley software company. Were the accidents premeditated murders?

When FBI Special Agent Molly Perchant confronts the Company’s CEO with compelling circumstantial evidence that an unidentified employee was responsible for the killings, the CEO reaches out to Dr. Marcie Conover and Bill Ockham, partners at the private technology investigation firm Ockham’s Razor to validate or deny the Government’s claims.

The Ockham’s Razor team uncovers a heinous conspiracy that repurposes everyday digital products into weapons of death. Was it revenge, vengeance, terrorism, or cyber attacks? Was a Company employee complicit? Proving the three elements of an advanced technology crime: means, opportunity, and motive confront the duo’s emotional, legal, and ethical boundaries.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A pilot, pharmaceutical executive, medical doctor, investment advisor, and a priest die in accidents, or it seems that way.

In Washington, DC, renowned FBI Chief Data Scientist Dr. Steven Flynn supervises a secret computer software program he designed. Its mission is to identify the smallest nuance of similarities in attacks on the Homeland. The system reveals the five seemingly deadly accidents had a single common fact; the use of software developed and marketed by a Silicon Valley software company. Were the accidents premeditated murders?

When FBI Special Agent Molly Perchant confronts the Company’s CEO with compelling circumstantial evidence that an unidentified employee was responsible for the killings, the CEO reaches out to Dr. Marcie Conover and Bill Ockham, partners at the private technology investigation firm Ockham’s Razor to validate or deny the Government’s claims.

The Ockham’s Razor team uncovers a heinous conspiracy that repurposes everyday digital products into weapons of death. Was it revenge, vengeance, terrorism, or cyber attacks? Was a Company employee complicit? Proving the three elements of an advanced technology crime: means, opportunity, and motive confront the duo’s emotional, legal, and ethical boundaries.

More books from Self published

Cover of the book Girl In The Mirror by Tom Williams
Cover of the book The Best of Friends by Tom Williams
Cover of the book Ghosts in the Attic by Tom Williams
Cover of the book Hope of Cherry Blossom Lane by Tom Williams
Cover of the book Nazi Medical Experiments by Tom Williams
Cover of the book The Words That Bring Peace by Tom Williams
Cover of the book An Addictive Personality by Tom Williams
Cover of the book Beyond Sight: The True Story of a Near-Death Experience by Tom Williams
Cover of the book Merger Undone by Tom Williams
Cover of the book Siren's Return by Tom Williams
Cover of the book Desiring Lacey by Tom Williams
Cover of the book The Captain by Tom Williams
Cover of the book The Right One The Wrong Time by Tom Williams
Cover of the book 7am L'Appennino Modenese tra la Linea Gotica e le vie dei Pellegrini by Tom Williams
Cover of the book Forever Mine (The Moreno Brothers #1) by Tom Williams
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy