Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Deadly Invisible Enemies: Evil in the Air: Deadly Invisible Enemies, #1
Deadly Invisible Enemies: Evil in the Air: Deadly Invisible Enemies, #1
Deadly Invisible Enemies: Evil in the Air: Deadly Invisible Enemies, #1
Ebook179 pages4 hours

Deadly Invisible Enemies: Evil in the Air: Deadly Invisible Enemies, #1

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Secrets have deadly consequences, especially in a digital world.

What would soul mates give up to be together?  What would soul mates do to stay together?  On the night of his tenth wedding anniversary Kevin Albright was about to find out.

In an instant, Kevin, a renowned computer security expert, loses a wife and son as security is breached at the highest levels of government.  Kevin suspects the FBI are not sharing the real details about that night and wonders if the U.S. Attorney General knows what is really going on in the Department of Justice.  He vows to get the killers even if they’re in the government and he has to “die” to do it. 

When he is nearly killed, it sets off a high stakes game of 3D cyber chess.  Kevin must play like a chess master to stay alive and close in on an unseen enemy.

Dying to get his wife’s killers, the hunt takes him deep into an invisible underworld.

LanguageEnglish
Release dateSep 9, 2014
ISBN9780993860522
Deadly Invisible Enemies: Evil in the Air: Deadly Invisible Enemies, #1
Author

Harold Lea Brown

Harold Lea Brown believes that story is life well told and a way to explore the human condition.  It has always been a part of who he is—it is in his blood.  In his teens, he told story through music when he played in a rock band.  Later he told story through award winning poetry and used story as a way of communicating corporate history and vision as a chief business strategist.  He has also published award winning technical articles in the field of information management where he received the Infomatics Award for advancing the information management field.  His family roots are Norwegian and Finnish, where story is core to passing on history to future generations. In 2017, Harold was named one of “The Top 100 Indie Writers in the World,” in a multimedia book published by Del Weston and Theresa Weston on iTunes.  In the past ten years his writing has been recognized at more than fifty film festival and screenwriting events in Canada, the United States, Mexico, Australia, the United Kingdom, the Netherlands and Spain.  His award-winning work includes feature length screenplays, teleplays, web series and miniseries, spanning the drama, thriller, crime/mystery, action/adventure and comedy genres.   His sub genre specialties include government, politics and technology—fields he has worked in for more than thirty years.   He has studied producing and various storytelling formats, appearing in Canadian, U.S. and international television and film productions.  He is the recipient of the Gerri Cook Memorial Award for the Most Promising Producer and is a producer of television, feature and new media projects. His first two novels in the Deadly Invisible Enemies (DIE) techno-thriller series received the international 2016 eLit Silver Medal Book Award for best anthology.  Harold is currently developing a multi-platform series based on his DIE techno-thriller series and a television drama series inspired by Louis Riel, based on an award winning screenplay he has written.

Read more from Harold Lea Brown

Related to Deadly Invisible Enemies

Titles in the series (3)

View More

Related ebooks

Suspense For You

View More

Related articles

Related categories

Reviews for Deadly Invisible Enemies

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Deadly Invisible Enemies - Harold Lea Brown

    Dedication

    To my storyteller journey supporters and to the two people who encouraged me to pursue my dream and write, and whose actions challenge and inspire me to be a better person every day in every way—my late mother,  Helmi, and my soul mate, Jane.

    Acknowledgement

    Special thanks to Greg Banks for cover artwork, formatting and sage advice in publishing this novel.

    Prologue

    Fifteen hundred youth delegates under the age of twenty listened to Kevin Albright’s opening remarks to the Twenty-Second International Youth Conference on Global Security, while keyboarding on their smartphones, tablets and notebooks. Although he hoped they were all capturing the salient points he was presenting, he knew his young audience was part of the often-labeled A.D.D. generation—he preferred to call them multitaskers.

    It was the last time Kevin spoke at such an open public forum, before a flourishing and invisible cyber domain operated by a new breed of crime boss placed him in their crosshairs.

    In the nineteenth century, Kevin said, a frog was placed into a pot of cold water. The heat was slowly turned up and before the frog realized it, he was boiled alive.

    Ooh, boiled frog—that’s disgusting, a very young delegate near the front of the room said.

    You’re right, it was disgusting, Kevin said. "So is our inability to learn and react to significant changes that occur gradually. It is a test humanity has faced through the centuries. Time and again, we have been lulled into a false sense of security and in the twenty-first century, this has never been more true. Today, the virtual reality is that computer and telecommunications technology has leapfrogged the globe’s ability to protect critical assets and information."

    Kevin stopped speaking, stepped out from behind the podium and walked to the edge of the stage.

    "Think about that for one moment. Right now, no country, no government, no business and no individual who use something as basic as a computer or telephone are able to guarantee their communications are not being compromised. I am willing to bet that while you are here today, at a security conference, in Washington D.C., discussing cyber security, many of you have let your guard down—been lulled into a false sense of security."

    Kevin paused and scanned the audience. He could tell most were skeptical and it was something he had already anticipated.

    "How many of you are using a wireless network called ‘Security Conference’ right now?" he asked.

    Almost every delegate raised a hand.

    OK, Kevin paused, as he watched several delegates near the front of the room engrossed in smartphone texting sessions. He continued, "Many do not realize, or choose not to believe, they have a problem. So what does that mean for you?"

    Kevin surveyed the audience. His smartphone vibrated. He pulled the phone out, glanced at the screen, smiled and keyed in a command and put it way.

    We live in an age where you have never been more connected to each other—chat rooms, social networking and messaging. You spend a minute here, a minute there—hours every day on your smartphone.

    Kevin’s smartphone vibrated again and he pulled it out.

    It can be rude, intrusive and downright annoying, he said.

    He waved his smartphone in the air.

    "There are more than one billion of these in use worldwide. This little device knows more about you than anyone, even more than your parents."

    Some in the audience laughed.

    It owns your soul, Kevin continued. Forget about George Orwell and 1984 and big government. Everyone in cyberspace knows where you are if they want to know where you are.  They know what you are doing, and if you are texting, they know what you are thinking. When I was your age, Kevin paused as some in the audience snickered, "and that was only a few years ago, I innocently believed that computers and the Internet were the greatest gifts to humankind. Now, I realize there is a big flip side. On any given day and moment, technology can be turned against you. Criminals and foreign interests have never had access to the kind of technology and opportunities they now have to conduct twenty-four seven surveillance, intrude in to every aspect of your lives, and steal personal and important confidential data. Events once rationalized as coincidence or random chance might just as easily be intentional, as a result."

    Hey, my phone just died, a delegate said.

    Kevin paused and faced in the delegates’ direction.

    Another smartphone started playing music. The phone’s owner frantically tried to turn the phone off, but the music just played louder.

    Kevin slowly panned the audience, stopping periodically to watch delegates react as strange digital sounds erupted from their devices. A growing chorus of smartphone ringtones soon filled the auditorium and sounded like a badly tuned orchestra.

    The cyber world you inhabit is a very dangerous place, Kevin continued. You don’t know who the enemy is or what they look like. Every day it’s harder to figure out whom you can trust. It is a place where the bullets are invisible and the battlefield is right in your own backyard. There are no rules of engagement. When you’re hit, you may not even know it—at least not initially.

    Kevin paused and glanced at his smartphone, then looked directly at the delegate whose phone had just died. Then he looked at the broader audience as smartphone owners tried to silence their ringtones.

    Now, was that just a coincidence, random chance or intentional? he said. A wave of murmurs and whispers spread like wildfire through the auditorium as Kevin walked back to the podium.

    This is the new reality, virtual reality—where time, distance and location mean nothing. Where computer trafficking is more lethal than drug trafficking. Where crime and terrorism are a global electronic game played, won or lost in nanoseconds. In this new reality, there is no room for complacency.

    Kevin glanced at his smartphone again and continued, "Yet, I know that most, if not all of you, in this room use a smartphone to freely exchange information. You probably believe the telecommunications companies have got your back, and your communications are secure—right Robert1011?"

    What? a voice from the audience said.

    Well, in the few minutes I have been speaking to you, I and my associate, Wayne Helmes—he’s seated at the back of the room, have hacked into and captured dozens of text message sessions going on in this room. And Robert1011, your meet up with Foxy999 tonight—

    Oh no, a female delegate said.

    How did you do that? an embarrassed delegate asked. He was obviously Robert1011.

    Kevin nodded to the back of the hall and Wayne stood up to answer.

    One of the most basic, and older I might add, tricks of the trade, Wayne said. We set up a fake wireless network in the room and called it ‘Security Conference.’ As soon as you came into the room, your smartphone found the network signal. Every keystroke, every picture, every email, every text message you sent since you entered the room has been captured.

    And Robert1011, I know where, when and what to bring, Kevin said as he winked.

    A number of men in the audience laughed, but many in the audience sat in silence—the response Kevin expected. There would always be those who underestimated the potential threat that something smaller than a cigarette pack presented.

    "Robert1011, you could have a thousand people show up for the party," Kevin added.

    No more public wifi, the embarrassed delegate replied.

    Kevin slowly panned the crowd.

    "It is better to have happened in here than out there, he said. I could just as easily have said nothing to Robert1011 and he would be none the wiser that I had electronically eavesdropped on his plans. This happens hundreds of times every minute and hour of the day."

    Using that same fake network, Kevin paused and then turned dead serious, I could have also scooped up your contact lists—names, addresses and phone numbers, your personal photos—hopefully none are x-rated guys,

    A few men in the audience laughed nervously.

    Bank account information and worse yet passwords to your personal secrets, Kevin continued, basically everything about you. I could make your life, and your friend’s lives, a living hell. I charge thousands a day for a lesson you just got free. A little bonus included in the price of admission to this conference. For some, it will be the best investment in your life—for some, it will save your life.

    There was dead silence in the room.

    I could have also been thousands of miles away, in China or Russia, and sold your entire life to someone for a few thousand rubles—less than two hundred bucks.

    Kevin walked toward the audience.

    "As young people interested in security and the role governments play in global security, you also need to know that governments are not infallible either. Many citizens—your parents and grandparents, still believe that all the confidential information entrusted to governments and public institutions is being safely stored and protected. How can that be given the statement I just made? No country, no government, no business and no individual who uses something as basic as a computer or telephone is able to guarantee their communications are not being compromised."

    "But how can that be?" a voice screamed from the back of the hall.

    Exactly, Kevin responded. In this day and age, how is that possible?

    Kevin stared out at the audience. Maybe he had gone too far for such a young crowd. If it saved one life or even prevented one crime, he had not.

    Well, I, and every other computer security consultant, if they are truthful, will tell you that no amount of computer programs or firewalls will protect you or I from the biggest vulnerably in cyberspace—ourselves.

    Some delegates in the audience politely laughed, others were still trying to turn off their smartphone, and others sat in silence, as if reflecting on what vulnerabilities their past actions in cyberspace had created.

    "So, it is people, not technology, that are both the problem and the solution to protecting humanity in cyberspace. And it is young people such as each of you, who offer promise and hope in tackling the global security issues we face. I know I will never be able to convince you to give up your smartphone, or tablets, but you can all start tackling global security today by practicing safe texting."

    Kevin started to leave the podium and the audience broke into applause. He stopped. A mischievous smile appeared and he returned to the podium. The audience went silent.

    Robert1011, I know your phone went dead. You can turn it back on—but how do you know I didn’t plant a seed in your phone? Maybe I’ll turn your phone into a microphone when you meet up with Foxy999 and join the party—remotely.

    Kevin winked at Robert 1011 and said, I’ll be around if you want to talk about it.

    He smiled to himself as he walked off the stage and heard delegates talking about what they had just learned—some were shocked, others anxious and some vowed to be more careful when using their smartphone. For Kevin, this spelled mission accomplished.

    Chapter 1

    Power oozed from the night-lights and familiar landmarks of the Washington, D.C. skyline—the Capitol Building, J. Edgar Hoover Building, Supreme Court Building, and across the Potomac, the Pentagon. All were visible from the top floor of the East Coast Power Corporation Building, the newest, brightest lit, and tallest building in the city, except for the Washington Monument.

    Kevin Albright ran his fingers through his sandy brown hair for what seemed like the fiftieth time, as if this would keep the frustration from pouring out of his high-tech mind. It was another board meeting running late into the night. He looked quickly at his watch, 12:23 a.m., and then turned his attention back to the East Coast Power Corporation Board of Directors. They seemed very disinterested in the huge electronic wall map of the Washington, D.C. Power Grid.

    The black flecks in his green eyes glistened as he surveyed the boardroom table—all men, all gray-haired. Damn it, he thought, we’re under siege and these gray-haired old farts would rather talk about tee times and golf scores. They’re dismissing me. Wiser? Old men with gray hair are wiser! Right. It seemed to be a never-ending battle, trying to get Senators and boardroom decision-makers to understand the gravity of the situation. What

    Enjoying the preview?
    Page 1 of 1