Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Based on current geopolitical upheavals and coming technological advancements, Dormant Curse is a cyberterrorism-conspiracy thriller that steers the reader through the twisted mind and actions of aChinese-cult leader hell-bent on pay-back. Dormant Curse is the mission; retribution for past atrocities, seizure of ever-scarce natural resources, and restoration of China to her former glory, are its goals. An overlooked security flaw in smartphone and tablet assembly allows the cult leader, a tormented victim of the Rape of Nanjing, to implant killer Trojan chips. Always-on and ever-present social networks provide the chip's activation path. Nothing is what it seems as strategic attacks manipulate the US public, mislead the press, and divert attention from the cult's true objectives--all while forcing the US military to back down. Greg Cannon, a young engineer with the NTSB, uncovers the cyberterrorists'attack method but an overzealous reporter exposes Greg's investigation before he can identify the source. Now alerted, the cult leader activates a sleeper assassin--the seductive and psychotic, Shelly Chambers--totake out Greg before he can avert Dormant Curse. It's an intense, high-stakes game as Greg, Shelly, and the cult are set on a collision course. Meanwhile, the Chinese, US, and Middle East governments are pulled into a momentous battle toward an unpredictable yet credible shift in global strata
Based on current geopolitical upheavals and coming technological advancements, Dormant Curse is a cyberterrorism-conspiracy thriller that steers the reader through the twisted mind and actions of aChinese-cult leader hell-bent on pay-back. Dormant Curse is the mission; retribution for past atrocities, seizure of ever-scarce natural resources, and restoration of China to her former glory, are its goals.An overlooked security flaw in smartphone and tablet assembly allows the cult leader, a tormented victim of the Rape of Nanjing, to implant killer Trojan chips. Always-on and ever-present social networks provide the chipΓÇÖs activation path. Nothing is what it seems as strategic attacks manipulate the US public, mislead the press, and divert attention from the cultΓÇÖs true objectivesΓÇöall while forcing the US military to back down.Greg Cannon, a young engineer with the NTSB, uncovers the cyberterroristsΓÇÖattack method but an overzealous reporter exposes GregΓÇÖs investigation before he can identify the source. Now alerted, the cult leader activates a sleeper assassinΓÇöthe seductive and psychotic, Shelly ChambersΓÇötotake out Greg before he can avert Dormant Curse.ItΓÇÖs an intense, high-stakes game as Greg, Shelly, and the cult are set on a collision course. Meanwhile, the Chinese, US, and Middle East governments are pulled into a momentous battle toward an unpredictable yet credible shift in global strata.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.