- Shopping Bag ( 0 items )
An overlooked security flaw in smartphone and tablet assembly allows the cult...
An overlooked security flaw in smartphone and tablet assembly allows the cult leader, a tormented victim of the Rape of Nanjing, to implant killer Trojan chips. Always-on and ever-present social networks provide the chip’s activation path. Nothing is what it seems as strategic attacks manipulate the US public, mislead the press, and divert attention from the cult’s true objectives—all while forcing the US military to back down.
Greg Cannon, a young engineer with the NTSB, uncovers the cyberterrorists’attack method but an overzealous reporter exposes Greg’s investigation before he can identify the source. Now alerted, the cult leader activates a sleeper assassin—the seductive and psychotic, Shelly Chambers—totake out Greg before he can avert Dormant Curse.
It’s an intense, high-stakes game as Greg, Shelly, and the cult are set on a collision course. Meanwhile, the Chinese, US, and Middle East governments are pulled into a momentous battle toward an unpredictable yet credible shift in global strata.
Posted August 18, 2011
What a great book, I was glued to my seat-couldn't turn the pages fast enough! It's scary to think terrorists could invade our country and cause such terror and destruction with a common household item. I am excited to have discovered a new author and I am anxiously awaiting a sequel...Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted August 3, 2011
Please write a series! This thrill ride that plays out like a movie. It's the scary truth.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted August 21, 2011
No text was provided for this review.