The West is below its maximum possibility but in Mark Russinovich's Trojan Horse. A innovative, invisible trojan horse that alters info with out leaving a trace―more refined than any obvious before―has been pointed out in the desktops of the United countries, roiling foreign politics. Cybersecurity analysts Jeff Aiken and Daryl Haugen are summoned to root it out and become aware of its source.
As the virus penetrates Western intelligence, and the terrifying fact approximately its writer is printed, Jeff and Daryl locate themselves in a determined race to opposite it because the destiny of either East and West hangs within the balance.
Read Online or Download Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series) PDF
Best Espionage books
THE HADES FACTOR
"Ludlum pulls out all of the stops and dazzles his readers. "
A baffling virus has claimed the lives of 4 humans around the country--including Dr. Sophia Russell, a examine scientist operating to appreciate the disorder. sour and broken-hearted over the demise of his appealing fianc e, Jon Smith is decided to discover the reason for the virus that killed her--and hinder it from changing into an epidemic of epic proportions. He'll commute around the globe and into the darkest corridors of homicide and greed, to discover a killer who might sacrifice thousands of lives for his personal good fortune
The Quiller sequence makes a speciality of a solitary, hugely able undercover agent (named after Sir Arthur Quiller-Couch) who works (generally by myself) for a central authority bureau that "doesn't exist" and narrates his personal adventures. Quiller (not his actual identify) occupies a literary heart floor among James Bondand John le Carré.
The obvious resurrection of a long-dead overseas terrorist and the homicide of a CIA agent unearths one other American agent operating for his existence.
Ex-FBI agent Steve Vail navigates a maze of hidden codes and brain-teasing puzzles to stick sizzling at the path of a band of Russian spies during this breathtaking follow-up to his ny occasions bestselling debut, The Bricklayer.
Extra resources for Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series)
Ahmed smiled, slipping a heavy computerized from the bag into his waistband. “Let us wish so. ” PRAGUE three, CZECH REPUBLIC TABORITSKA five 9:12 A. M. CET At nearly an analogous second in Prague, Saliha opened the door to Ahmed’s residence and located it empty. She closed the door at the back of her, then positioned the bag she’d introduced again for him at the desk. The small room was once stale, smelling of cigarettes. It felt deserted. She opened the window to allow in air, then took the room in back, conscientiously. may possibly he have moved with no telling her? It didn’t look most probably but when he have been to finish it together with her that used to be how she anticipated it'd be. She crossed the room and tested his closet. A small athletic bag he stored there has been long past and so used to be a jacket. yet such a lot of his issues have been untouched. one other of his journeys. She regarded round yet discovered no message from him for her. That was once no shock. He beloved his secrets and techniques and he or she used to be, in any case, just a girl. So … no cash. no longer now at the least. He’d no longer concept to depart it out for her. good, he’d pay her while he back. Saliha sighed, took one final glance in regards to the room, then closed the window and locked the door as she left. on the entryway, the gross gypsy, wearing a ratty dirty undershirt, eyed her in any such method that she shivered. 18 GENEVA, SWITZERLAND UNITED international locations place of work AT GENEVA (UNOG) workplace FOR DISARMAMENT AFFAIRS PALAIS DES international locations 11:34 A. M. CET notwithstanding utilized by the DOD, mIRC used to be no longer unique to it even though it had changed the code to require either private and non-private key codes among events, whatever that used to be often not obligatory. The method allowed safe communique among desktops wherever. All messages, or video for that subject, have been encrypted en path, after which unscrambled by way of the receiving machine. Daryl got the incoming message on her desktop. Jeff crowded over to her. It used to be, as anticipated, Frank Renkin, who usually used video in contacting them. the image was once sharp, and published how drained the fellow used to be. It used to be very early morning there and he seemed as though he’d labored all evening. “I see you stumbled on your guy all right,” Frank stated with a smile after greeting them. Daryl smiled. “Thanks on your support. ” “Any development? ” Frank requested. She nodded. “I’d say so. yet we nonetheless have plenty of unanswered questions. How approximately your staff? ” “As I messaged you past, we came upon the self-deleting concealment software program, almost like you. Very sneaky and a foul signal if crackers are going to begin utilizing anything that refined. My monstrous information is it sounds as if the aim of the malware is to repeat any record the contaminated computing device has and is ready to modify it. Does that sound commonly used to you? ” Jeff stuffed him in on what they’d get a hold of, explaining in a few aspect how the Trojan made it attainable to switch a record in the midst of an email transmission. “The what? ” “That was once our response. You ship an attachment,” Jeff stated, “even money it earlier than it leaves your laptop, yet an altered rfile arrives on the different finish. ” Daryl responded. “They needs to replica the dossier to their method, examine and adjust it, then ship again the altered model.