Fortunes of War by Stephen Coonts

By Stephen Coonts

4 eastern nationalists typhoon Tokyo's imperial palace and behead the emperor. Their aim: to invade Russia and overcome oil-rich Siberia with the intention to dominate the globe. quickly the area explodes in struggle, as Japan, Russia and the U.S. cross head-to-head in a fight that threatens overall destruction. Now 3 males from 3 assorted countries needs to meet their final problem: to struggle as patriots in a conflict pushed via greed and madness--and store the planet from not anything under a full-scale nuclear attack.

Stephen Coonts' Fortunes of War is an explosive, action-packed mystery.

Show description

Read or Download Fortunes of War PDF

Similar espionage books

Call to Treason (Tom Clancy's Op-Center, Book 11)

Tom Clancy's Op-Center: name to Treason is another gripping addition to the bestselling sequence masterminded by means of Tom Clancy and Steve Pieczenik. The Op-Center's price range is slashed, leaving normal Mike Rodgers available in the market for a brand new task. whilst presidential candidiate Senator Donald Orr recruits Rodgers to behave as his army consultant, it feels like an ideal transition.

War of Numbers: An Intelligence Memoir

SAM ADAMS enjoyed intelligence paintings, and that enthusiasm shines all through this memoir of his years with the relevant Intelligence organisation. His profession used to be ruled by way of an epic fight over Vietnam -- over army makes an attempt to conceal the real dimension of the enemy forces there, and over the integrity of the intelligence approach.

Confidential: The Life of Secret Agent Turned Hollywood Tycoon- Arnon Milchan

Arnon Milchan has led a mystery double existence. the type of existence one might examine in a John Le Carré secret agent novel or in a film made through Hollywood colleagues Steven Spielberg or Oliver Stone. this can be the tale of a undercover agent, of nuclear proliferation, billion-dollar high-tech safeguard transactions, ideology, patriotism, love, heartbreak, and the awe inspiring Hollywood profession of a mysterious tycoon.

You're Stepping on My Cloak and Dagger

With a pointy eye and wry wit, Roger corridor recounts his reports as an American military officer assigned to the place of work of Strategic companies (OSS) in the course of global struggle II. First released in 1957 to serious and well known acclaim, his booklet has turn into a cult favourite in intelligence circles. the tale follows Hall's stories from a junior officer fleeing a tedious education project in Louisiana to his quirky and rigorous OSS education rituals within the usa, England, and Scotland.

Additional resources for Fortunes of War

Example text

In each nation, counter-espionage work led to executions. In France, the infamous Mata Hari was convicted and shot in 1917 (despite her effectiveness as a spy being highly questionable). Two years earlier, the Russians executed an alleged spy, Sergei Myasoedov, on similarly dubious evidence. The Germans struggled to secure occupied territories and arrested thousands. They executed several hundred in both western and eastern Europe. In Britain, Vernon Kell’s organisation had identified a small web of German spies.

A system was required to investigate the richness of the trail people left online; even, perhaps, building a pattern of terrorist behaviour before asking a computer which individuals matched it. For instance, who was communicating between Britain and Pakistan while also viewing extremist websites? To identify targets whom MI5 could then investigate, such methods required access to both data and massive computing power. The world of spying had met the world of big data. And much of the data, especially in the US, was held by the private sector.

A system was required to investigate the richness of the trail people left online; even, perhaps, building a pattern of terrorist behaviour before asking a computer which individuals matched it. For instance, who was communicating between Britain and Pakistan while also viewing extremist websites? To identify targets whom MI5 could then investigate, such methods required access to both data and massive computing power. The world of spying had met the world of big data. And much of the data, especially in the US, was held by the private sector.

Download PDF sample

Rated 4.40 of 5 – based on 7 votes