Attack Vector

The power of the insignificant

Fiction & Literature, Thrillers, Mystery & Suspense
Cover of the book Attack Vector by Tom Williams, Self published
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tom Williams ISBN: 1230003137482
Publisher: Self published Publication: March 16, 2019
Imprint: Language: English
Author: Tom Williams
ISBN: 1230003137482
Publisher: Self published
Publication: March 16, 2019
Imprint:
Language: English

A pilot, pharmaceutical executive, medical doctor, investment advisor, and a priest die in accidents, or it seems that way.

In Washington, DC, renowned FBI Chief Data Scientist Dr. Steven Flynn supervises a secret computer software program he designed. Its mission is to identify the smallest nuance of similarities in attacks on the Homeland. The system reveals the five seemingly deadly accidents had a single common fact; the use of software developed and marketed by a Silicon Valley software company. Were the accidents premeditated murders?

When FBI Special Agent Molly Perchant confronts the Company’s CEO with compelling circumstantial evidence that an unidentified employee was responsible for the killings, the CEO reaches out to Dr. Marcie Conover and Bill Ockham, partners at the private technology investigation firm Ockham’s Razor to validate or deny the Government’s claims.

The Ockham’s Razor team uncovers a heinous conspiracy that repurposes everyday digital products into weapons of death. Was it revenge, vengeance, terrorism, or cyber attacks? Was a Company employee complicit? Proving the three elements of an advanced technology crime: means, opportunity, and motive confront the duo’s emotional, legal, and ethical boundaries.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A pilot, pharmaceutical executive, medical doctor, investment advisor, and a priest die in accidents, or it seems that way.

In Washington, DC, renowned FBI Chief Data Scientist Dr. Steven Flynn supervises a secret computer software program he designed. Its mission is to identify the smallest nuance of similarities in attacks on the Homeland. The system reveals the five seemingly deadly accidents had a single common fact; the use of software developed and marketed by a Silicon Valley software company. Were the accidents premeditated murders?

When FBI Special Agent Molly Perchant confronts the Company’s CEO with compelling circumstantial evidence that an unidentified employee was responsible for the killings, the CEO reaches out to Dr. Marcie Conover and Bill Ockham, partners at the private technology investigation firm Ockham’s Razor to validate or deny the Government’s claims.

The Ockham’s Razor team uncovers a heinous conspiracy that repurposes everyday digital products into weapons of death. Was it revenge, vengeance, terrorism, or cyber attacks? Was a Company employee complicit? Proving the three elements of an advanced technology crime: means, opportunity, and motive confront the duo’s emotional, legal, and ethical boundaries.

More books from Self published

Cover of the book The Red Ghost Rides by Tom Williams
Cover of the book In the Shadows by Tom Williams
Cover of the book Faerowyn's War by Tom Williams
Cover of the book The Mental Gastric Band by Tom Williams
Cover of the book How I Quit Smoking in 1 Day by Tom Williams
Cover of the book The Dark Night Whispers by Tom Williams
Cover of the book GIVE YOUR DOG A BONE by Tom Williams
Cover of the book The Further Adventures of Jack Smacker - Little Leaguer by Tom Williams
Cover of the book Memoirs of a Self-Loathing IT Professional by Tom Williams
Cover of the book Training in Love by Tom Williams
Cover of the book Yahi Hota Pyar: A Real Love Story by Tom Williams
Cover of the book El poder curativo by Tom Williams
Cover of the book Memoirs of a Self-Loathing IT Professional by Tom Williams
Cover of the book Gretel by Tom Williams
Cover of the book Alexandra's Song by Tom Williams
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy