Attack Vector

The power of the insignificant

Fiction & Literature, Thrillers, Mystery & Suspense
Cover of the book Attack Vector by Tom Williams, Self published
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tom Williams ISBN: 1230003137482
Publisher: Self published Publication: March 16, 2019
Imprint: Language: English
Author: Tom Williams
ISBN: 1230003137482
Publisher: Self published
Publication: March 16, 2019
Imprint:
Language: English

A pilot, pharmaceutical executive, medical doctor, investment advisor, and a priest die in accidents, or it seems that way.

In Washington, DC, renowned FBI Chief Data Scientist Dr. Steven Flynn supervises a secret computer software program he designed. Its mission is to identify the smallest nuance of similarities in attacks on the Homeland. The system reveals the five seemingly deadly accidents had a single common fact; the use of software developed and marketed by a Silicon Valley software company. Were the accidents premeditated murders?

When FBI Special Agent Molly Perchant confronts the Company’s CEO with compelling circumstantial evidence that an unidentified employee was responsible for the killings, the CEO reaches out to Dr. Marcie Conover and Bill Ockham, partners at the private technology investigation firm Ockham’s Razor to validate or deny the Government’s claims.

The Ockham’s Razor team uncovers a heinous conspiracy that repurposes everyday digital products into weapons of death. Was it revenge, vengeance, terrorism, or cyber attacks? Was a Company employee complicit? Proving the three elements of an advanced technology crime: means, opportunity, and motive confront the duo’s emotional, legal, and ethical boundaries.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A pilot, pharmaceutical executive, medical doctor, investment advisor, and a priest die in accidents, or it seems that way.

In Washington, DC, renowned FBI Chief Data Scientist Dr. Steven Flynn supervises a secret computer software program he designed. Its mission is to identify the smallest nuance of similarities in attacks on the Homeland. The system reveals the five seemingly deadly accidents had a single common fact; the use of software developed and marketed by a Silicon Valley software company. Were the accidents premeditated murders?

When FBI Special Agent Molly Perchant confronts the Company’s CEO with compelling circumstantial evidence that an unidentified employee was responsible for the killings, the CEO reaches out to Dr. Marcie Conover and Bill Ockham, partners at the private technology investigation firm Ockham’s Razor to validate or deny the Government’s claims.

The Ockham’s Razor team uncovers a heinous conspiracy that repurposes everyday digital products into weapons of death. Was it revenge, vengeance, terrorism, or cyber attacks? Was a Company employee complicit? Proving the three elements of an advanced technology crime: means, opportunity, and motive confront the duo’s emotional, legal, and ethical boundaries.

More books from Self published

Cover of the book Fall Into Nightmares by Tom Williams
Cover of the book A Thin line by Tom Williams
Cover of the book When Running Is Not Enough by Tom Williams
Cover of the book The Moloch Caper by Tom Williams
Cover of the book Always Been Mine (The Moreno Brothers #2) by Tom Williams
Cover of the book Life’s Lessons in The Storms by Tom Williams
Cover of the book Macford: A Tragical Historie of York 2010 - 2014 by Tom Williams
Cover of the book Her Husband's Brother by Tom Williams
Cover of the book Making You Mine (The Moreno Brothers #5) by Tom Williams
Cover of the book SHOTTAMA by Tom Williams
Cover of the book Desiring Lacey by Tom Williams
Cover of the book The Best of Friends by Tom Williams
Cover of the book Breaking Brandon (Fate #2) by Tom Williams
Cover of the book Craving Stassi by Tom Williams
Cover of the book Christmas Snow by Tom Williams
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy