Jump to ratings and reviews
Rate this book
Rate this book
When a powerful client summons him for a midnight meeting, lawyer Chris Bruen knows something is very wrong. Zapper, the world’s most popular search engine, has been compromised and its most valuable asset—search algorithms—stolen. The company suspects that this most recent instance in a wave of high-tech crimes originated in China, and that the government itself is behind the systematic theft of US intellectual property.

Chris travels to China to search for evidence that will link the intrusion to the People’s Liberation Army. With remote assistance from Zoey Doucet, the head of his firm’s computer forensics lab and his maybe-girlfriend, Chris uncovers information that takes him even deeper into the shadowy world of cybercrime. Now he is trapped in a foreign land with a hard drive containing information that puts his life in jeopardy. In this secretive world of Big Data, Chris will risk everything to fight an elusive enemy as far-reaching as the Internet itself.

321 pages, Kindle Edition

First published December 9, 2014

136 people are currently reading
1239 people want to read

About the author

Reece Hirsch

7 books589 followers
Reece Hirsch is the author of six thrillers that draw upon his background as a privacy attorney. His first book, The Insider, was a finalist for the International Thriller Writers Award for Best First Novel. His two most recent books, Black Nowhere and Dark Tomorrow, feature FBI Special Agent Lisa Tanchik, who investigates cybercrimes. Hirsch was a partner in the San Francisco office of an international law firm and cochair of its privacy and cybersecurity practice. He lives in the Bay Area with his wife. His website is www.reecehirsch.com.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
211 (39%)
4 stars
234 (44%)
3 stars
70 (13%)
2 stars
11 (2%)
1 star
4 (<1%)
Displaying 1 - 30 of 70 reviews
Profile Image for Tulay.
1,202 reviews2 followers
May 29, 2017
Interesting story.

This second book was better than the first one, Chris Bruen character continues to grow on me. Story is about how we are knowingly or unknowingly being hacked. China, like many other countries in the business of hacking. This is always on the headlines, but like me knowingly give Amazon to collect information about my buying habits, what kind of books I like reading. At this techno age all we can do is be very careful.
Profile Image for Barbara.
650 reviews81 followers
December 16, 2014
I found out about this book and author through Good Reads, due to a contest, and thought the story & series seemed like something I'd enjoy. I have to say I REALLY enjoyed Intrusion and will go back and read the others in the series. The topic, cyber theft, cyber spying and Asia are certainly completely relevant with what is currently being reported in the news with regard to N. Korea. In this case the spying & theft were done by China and involved a company not unlike Google. I found the main characters Chris Gruen and his partner and romantic interest, Zooey Doucet, to be absolutely plausible. The author did a great job of making them "real", funny, and human. The book was very fast paced and kept me wanting to turn the pages. Don't worry if you are not too techy, the author keeps things understandable. The story was well written, the pacing was excellent and made for a extremely satisfying read.I am glad that I have a new series to pursue.
Profile Image for Marla.
1,284 reviews244 followers
August 24, 2017
What a fantastic story. This is the second Reece Hirsch book I've read and I have enjoyed each of them. This was a page turner that never slowed down. Reece does a great job of using his knowledge of cyber crime to weave a plot that keeps the reader entertained and sitting on the edge of their seat. I really liked Chris and Zoey and hope they return in a future book. I will read everything Reece has written as he never disappoints and always takes me on a wild ride that I do not want to get off of.

I won this book through the Goodreads giveaway and thank Reece for my copy.
Profile Image for Michael Clark.
27 reviews
May 1, 2015
Visceral, current, edgy and fast. The kind of story Grisham would write if he had Clancy as a technical adviser, taking cues from the bleeding edge of the social underground to script the adventures of a superhero lawyer. Tale is woven with an insider's knowledge of the real world- Unit 61398, APT1, Bitcoin, Silk Road, assassins for online hire, and all the variations of hacker from white to black hat.

Intrusion was actually a book I couldn't put down, the story engaged me deeply by spinning a host of intimately familiar themes (yes, I have Googled 61398, and I mine bitcoin) and presented an entertaining narrative. As a detective/thriller/hightech adventure with a nod to a potential romance theme, this is a story that should have it's movie rights snapped up. It's a well written trip down the dangerous side of law, brimming with timely reference, and enough homage to tech and law in San Francisco to give Primary Colors a run for their money.

Buy it. Read it. Enjoy it. I certainly did.

Standard disclaimer: Intrusion was received as a free ARC copy from the author through goodreads. I have received no compensation or consideration for this review, and offer it as my opinion only.
3,514 reviews
April 8, 2017
A great book especially all the information pertaining to China and their theft of US technology. It's just infuriating that the US will not do anything about it. I received the book free from Goodreads. Thank you Goodreads for the very interesting book.

When an internet search engine company is hacked by the Chinese, they call in their experts to determine the severity of the problem and how to recover the stolen algorithms used to make their search engine the largest in the world. China is working on their own search engine and, if they have access to the one in the United States, they could overtake it and become the largest. And this would give them more access to American companies and their technologies. An attorney representing the company decides to travel to China and get proof of China’s involvement in the theft. Once he gets it, what will he do with it? The State Department does not want to make waves with our biggest creditor.
Profile Image for L.A. Starks.
Author 12 books733 followers
January 2, 2015
A ripped-from-the-headlines thriller set in and around San Francisco. It's great fun to read about places I know, from Menlo Park to Stinson Beach to San Francisco itself. The theme could not be timelier: the book starts when a Google-like company has its algorithms stolen by the Chinese.

Hirsch clearly knows his tech & San Francisco environment. I would have liked to have gotten more sense of the organizations/countries--more of the macro conflict, a la Patricia Cornwell. This is a minor complaint about a novel so current it could have come from today's news.

I look forward to reading more by Reece Hirsch.
Profile Image for Rich.
297 reviews28 followers
May 28, 2017
wow this was a surprise. I really enjoyed the first novel in the series and gave it 5 stars this one was a series drop off. I really had to struggle to get thru this one. the first had good suspence and a good story and it was told from the main characters perspective and the reader was not told who the bad guy was. The author had a good idea by using China but did not had a clear idea .I was very tired of the china Hit man and what he was feeling in his head, waste of reading time I did not care. I really did not need to now what Zoey was going in her hear. How the main character found a certain woman in China hard to believe and there were other issues that were some what hard to believe.I will get the current novel in the series soon and hope it is more lie the first one-this one was meah
Profile Image for Michele.
172 reviews8 followers
May 18, 2015
First, the obligatory line: I was sent this book by the author in exchange for a review in the "First reads" promotion from Goodreads.
I am easily giving five stars for a very enjoyable book that is outside of my typical reading genre. I do not read a lot of thriller/espionage/crime stories. I knew nothing of cybercrime or "big data" (or China for that matter) but that did not get in the way of following along with this fun, fast-paced story. "Intrusion" is very well-plotted and very well-told. It was one of those books that you hurry back to because every time you set it down you are at a point in the story where there are new developments and you have to see how they resolve. The chapters were short, the story moved along at a consistent pace, and there was no unnecessary "telling" even though somehow I was taught quite a few things that I did not know before. Gripping and engaging really from the first chapter to the last. The creepy dude in the story was very well written because he was...well....quite creepy, and in particular I liked how his story began and ended; he did not just show up in the pages to fulfill is role in the plot.
Thank you Mr. Hirsch for not injecting eye-rolling nonsense or cliche into the private lives of the two main characters and thank you for sharing your book with me. More please!

Profile Image for Doseofbella.
195 reviews42 followers
March 4, 2016
Intrusion
By: Reese Hirsch
Published By: Thomas & Mercer
Copy Courtesy of Goodreads
First Reads Giveaway
Reviewed By: tk

Chris Bruen is a privacy and security lawyer. His current focus is trying to find out who has stolen algorithms of an internet search engine. Although to some it may appear as no big problem. Kids trying to be hackers could be one possibility. Another larger possibility is a company with intent. What are they going to do with this information? Who would it benefit? Bruen will risk it all to find the answers, even if he loses himself in the process.

Absolutely mind-blowing story! Even though a work of fiction, Reese Hirsch will push you to open your mind to incredible possibilities of a possible take over by “others” using the internet as true weapon. Threats to our everyday lives come in many shapes. It is terrifying to imagine such a devious plan could work.

Hold on with both hands when you open your mind to the terror of a plot so ingenious that you will surely be convinced that it is happening right here and now. I look forward to the next Reese Hirsch novel, and his amazing talent as a suspense/thriller genre writer.

Highly recommended. 5/5
Profile Image for Jo Reason.
374 reviews28 followers
January 3, 2015
Free copy in exchange for an honest review. I was thrilled to be awarded this on NetGalley, I love a good cyber thriller and this doesn´t disappoint. There is so much action, thrills, twists and turns that you won´t be able to put this down. I particularly enjoyed the part where the main character, Chris is in China, the author does a great job of describing the different aspects covered and on loads of things to do with China. There are explanations of what things mean regarding technical parts of the novel.

I got to enjoy Chris and Zoey in their adventure. This is the second book featuring Chris Bruen, but I didn´t know this when I started reading, there is no problem though as it is a standalone. Tao was also a great character, I love a good baddie.

Love the cover and the title is apt for the book.
For more information on the author and links CLICK HERE
Profile Image for Elizabeth A..
320 reviews30 followers
June 27, 2015
[Note: This is a joint review of the first two books in this series, Intrusion and The Adversary.]

Using computers, social media and the Internet are a part of the daily lives of nearly 3 billion people. That’s a staggering number, but one that makes it easy to understand why controlling the online world and, more importantly, the ways people access it and the information that can gleaned from those who use it, are things some will stop at nothing to achieve.

Enter Chris Bruen, former Department of Justice prosecutor and current partner in the law firm Reynolds, Fincher and McComb, where he specializes in data security. In his position at the DOJ it was Chris’s job to track down and prosecute big-time hackers. He’s parlayed that experience, as well as some personal hands-on hacking experimentation during his early teen years, into now showing massive corporations how they can protect themselves from the kinds of people he used to run to ground.

That’s the setup for a new series from Reece Hirsch, author of the previous standalone legal thriller The Insider, which was a finalist for the 2011 International Thriller Writers Award for Best First Novel.

The first novel featuring Bruen, The Adversary, finds him dispatched to Amsterdam to retrieve a stolen source code. More than simply the ripoff of a proprietary piece of software, however, the code in question is the one that runs the majority of the operating systems in the world: small and large, commercial and private, even some governmental and military. Upon arriving at the location the suspected hacker had been tracked to, Bruen finds not the stolen code, but a dead body. Things spin quickly out of control from there, with Bruen finding himself personally targeted, and set up, by a group of black hat hackers intent on releasing a devastating computer virus known as Lurker. In order to stop the potentially globally crippling plot, Bruen has to both decode the virus and figure out why he has been placed in the group’s crosshairs, all while managing not to get caught by the multiple law enforcement agencies mistakenly hunting him as the cyber attack’s mastermind.

The second in the series, Intrusion, finds Bruen once again dealing with high-level hackers, though the potential fallout this time has international political ramifications. The book opens with the CEO of Zapper, the world’s largest search engine, summoning Bruen to a mysterious meeting in the wee hours of the night. Upon his arrival, Bruen can’t help but notice Zapper has assembled a Who’s Who of white hat hackers and cyber security experts. It seems Zapper has been hacked, its coveted search algorithms stolen.

Far more insidious than simply some rogue black hat hacker showing off for fun or ransom, the trail appears to lead back to someone in the People’s Liberation Army of China. Accordingly, Bruen heads to China, where he ends up with a hard drive containing information people are willing to kill for, people who won’t let pesky details like borders and laws stop them from trying to prevent Bruen from exposing the information he finds.

In addition to simply being damn good thrillers, Hirsch has tapped into areas of concern about cyber crime and data security that are either already happening, or are frighteningly on the verge of doing so. The Sony Pictures hack, cyber attacks on The White House that have been traced to both Russian and Chinese hackers over the past few years, cyber security consultant Chris Roberts’s claim that he can hack into and take over the flight control systems of airliners, millions of people’s personal data being compromised, Virgina-based cyber security firm Mandiant’s report identifying Unit 61398 of the People’s Liberation Army as the source of cyber attacks against over 100 corporations—events reminiscent of all appear in The Adversary and Intrusion.

And in that regard, both books make for reads that are more than merely page-turners; they are actually informative. While at the same time weaving an intriguing web of fiction, Hirsch also explores the very real potentially devastating economic effects that could occur as the result of theft of proprietary U.S. corporate technology by a rival nation, as well as the complex ethics of hacking in general—what right, if any, is there for information to be “free” to the world? Hirsch, himself a nationally recognized privacy and security law expert, brings a level of detail and ripped from the headlines urgency to the storytelling that will cause you to rethink everything you thought you knew about your online playground and just how safe it is…or isn’t, as the case may be.
Profile Image for June.
19 reviews6 followers
February 17, 2016
I won this book on Goodreads. This story keeps you on the edge and keeps you reading. It has a surprise twist at the end that I didn't see coming.
Profile Image for Kevin Rowe.
47 reviews3 followers
December 29, 2014
Loved it! If you haven't read Reese yet, and like twisty thrillers, make sure you do!! :)
Profile Image for Phoenix Reads.
Author 7 books63 followers
October 30, 2017
A fascinating tale of corporate espionage and hacking by the Chinese. The hero gets himself in all sorts of trouble by trying to prove who did it. I have to say I really enjoyed Intrusion and will others in the series. The topic, cyber theft, cyber spying and Asia are certainly relevant.
Profile Image for Ashley Lewis.
601 reviews96 followers
October 15, 2019
I'm so glad I felt the urge to read more from this author even though I didn't like the first novel I read by him. I yet again really enjoyed this book! I don't think it was quite as strong as the last one, but still quite good!
Profile Image for Patricia Bergman.
457 reviews38 followers
July 19, 2020
I won this from Goodreads several years ago and have finally decided to read it. This is a timely work of fiction that actually discusses the theft of our intellectual property by China. I am sure that many of the high tech devices discussed in the book are actually being utilized. This is a good thriller that offers some interesting science. It is a good mystery/thriller.
Profile Image for Aditi.
920 reviews1,453 followers
April 13, 2016
"It is a fairly open secret that almost all systems can be hacked, somehow. It is a less spoken of secret that such hacking has actually gone quite mainstream."

----Dan Kaminsky


Reece Hirsch, an American author, has penned a fast-paced, action-packed gripping thriller, Intrusion that narrates the story of a lawyer, who is called upon in the middle of the night to handle a search-engine company's delicate situation when some of their major algorithms are got stolen by some petty Chinese hackers, that finally leads the lawyer and his girlfriend on a dangerous and an almost life-threatening track.


Synopsis:

When a powerful client summons him for a midnight meeting, lawyer Chris Bruen knows something is very wrong. Zapper, the world’s most popular search engine, has been compromised and its most valuable asset—search algorithms—stolen. The company suspects that this most recent instance in a wave of high-tech crimes originated in China, and that the government itself is behind the systematic theft of US intellectual property.

Chris travels to China to search for evidence that will link the intrusion to the People’s Liberation Army. With remote assistance from Zoey Doucet, the head of his firm’s computer forensics lab and his maybe-girlfriend, Chris uncovers information that takes him even deeper into the shadowy world of cyber crime. Now he is trapped in a foreign land with a hard drive containing information that puts his life in jeopardy. In this secretive world of Big Data, Chris will risk everything to fight an elusive enemy as far-reaching as the Internet itself.



Chris is called upon by the Zapper's employees in the middle of the night when the company's high security algorithms are get stolen by some Chinese hackers. Chris soon decides to chase the hackers all the way to China and to find clues and evidence against the people's liberation Army, who are trying to overtake Zapper, the world's number one search engine. But a messy situations makes him the killer with a most valued hard drive containing the information to overthrow the people's liberation Army. With the help of Zoey, his girlfriend from San Francisco, Chris tries to find a way out of the country into the safe lands of America, but it is not too late that an international Chinese hit man is trying to close upon Chris and his girlfriend's lives.

The author's writing style is fantastic and quite edgy laced with tension and adrenaline-rushing actions scenes that are depicted with lots depth and description, that will let the readers look right into those striking scenes from the book. The narrative is highly interesting and that will keep the readers on their edges of their seats till the very last page. The pacing is really fast, as one event after another keeps happening all through out the story.

The mystery in the book is tightly wrapped under so many twists and turns that will only make the readers anticipate till the very last page. The story is very addictive and will pull the readers into it's core from the very beginning. The backdrop of Beijing and its countryside landscape are well captured by the author, thus it will take the readers on a joy ride through the green as well as sky high structures in Beijing.

The characters are very real and their demeanor while thrown into a crisis is very sensible. The character of Chris is highly likable as he is thoughtful when it comes to challenges and is really very sharp. The rest of the supporting cast are well-developed and will keep the readers glued into the book till the very end. The realism in each and every character is very evident from the way they projected themselves into the story line.

Overall, this is a must read thriller which is anticipating and very enthralling and will keep the readers turning the pages of this book till the very end.

Verdict: A hacking thriller which is honest and very intriguing.

Courtesy: Thanks to the author, Reece Hirsch, for giving me an opportunity to read and review this book.
Profile Image for Clare O'Beara.
Author 25 books371 followers
January 24, 2016
I enjoyed this cyber crime story, which flits from Shanghai to San Francisco. A major search engine has been hacked and they suspect the Chinese government is the one responsible for stealing their algorithms. A lawyer who works in the field of privacy and data security offers to go to Shanghai and see what he can find out. Chris has got business Mandarin and he knows better than to bring his own computer or phone, but he is a conspicuous outsider and doesn't have backup on the ground.

I liked Chris's girlfriend Zoey, a hacktivist turned sober, we could say, as she works in his computer lab. Not only has she a mind of her own, though some of her decisions are strange and selfish, but she works fast at connecting with China's secret online dissidents.

A young Chinese man who is tied to a powerful business owner in order to protect his brother, is obliged to turn assassin. We see a good deal of him but before long lose all sympathy for him.

We see a good deal of crowded, polluted, shoddy Shanghai, with a nod to Neuromancer, and we also get a brief look at other tourist spots like the Great Wall and smog-choked Beijing. Back in SF, why not take in Chinatown for a contrast!

The characters don't know the rules of a kidnapping which is that you never let the kidnapper take you away from other people. Fight first or it will be too late. As well, I could literally not believe that a person would tap out h-e-l-p in Morse Code. Not only does nobody know those letters while everyone knows SOS and what the signal means, SOS is three letters and help is four.

There's plenty of food for thought as we realise that if such a major firm could be hacked, anyone could. We're told from the outset that for every firm finding an intrusion, a hundred more have been hacked but don't know it. This is described as wholesale theft of intellectual and business property. If you are not up on terms like grey hat hackers or antistatic strips, you should check them out as you meet them (look online) as the characters know what they are talking about and don't explain. There's action, danger and unauthorised use of cellphone masts. Have fun.

Profile Image for A Reader's Heaven.
1,592 reviews28 followers
December 1, 2016
(I received a free copy of this book from Net Galley in exchange for an honest review.)

When a powerful client summons him for a midnight meeting, lawyer Chris Bruen knows something is very wrong. Zapper, the world’s most popular search engine, has been compromised and its most valuable asset—search algorithms—stolen. The company suspects that this most recent instance in a wave of high-tech crimes originated in China, and that the government itself is behind the systematic theft of US intellectual property.
Chris travels to China to search for evidence that will link the intrusion to the People’s Liberation Army. With remote assistance from Zoey Doucet, the head of his firm’s computer forensics lab and his maybe-girlfriend, Chris uncovers information that takes him even deeper into the shadowy world of cybercrime. Now he is trapped in a foreign land with a hard drive containing information that puts his life in jeopardy. In this secretive world of Big Data, Chris will risk everything to fight an elusive enemy as far-reaching as the Internet itself.


This is the 2nd Chris Bruen novel, following on from The Adversary.

Conspiracies, cybercrime, international relations and action! What's not to love?

This was a really fast-paced novel, featuring lawyer Chris Bruen. I hadn't read the first book before reading this and I don't think it is necessary - I didn't feel like I had missed anything at all in backstory or history while reading this book.

The biggest bonus outside of those few things I already mentioned? The fact that the tech-speak is kept to a minimum. Sometimes authors get a little too clever and overdo it, but there is enough here to add authenticity to the story without getting bogged down in needless explanations and descriptions.

A cast of characters and a plot that read like they have stepped out of the current political climate just add to the enjoyment.

Definitely recommended!


Paul
ARH
Profile Image for Cathleen.
738 reviews19 followers
December 13, 2014
I received an ARC from the Publisher and NetGalley in exchange for my honest review.

The author "Reece Hirsch" knows how to write a story that keeps you reading and sitting on the edge of your seat. What a scary read! This plot is so plausible and the characters are so realistic.

Chris Bruen, the main character, is a lawyer specializing in intellectual properties. The story opens with a phone call from his biggest client, Zapper, the worlds biggest and most popular internet search engine. They have been hacked and the algorithms that jeopardizes Zapper's very existence have been stolen. The identity of the hackers leads Chris to Shanghai. Zoey Doucet, a former hacker and his girlfriend, runs his computer lab. Zoey, through underground connections has set Chris up with trusted individuals in China.

Chris hopes to discover who was behind the hacking of Zapper and retrieve the stolen algorithms and instead finds himself in a bad situation. It seems that there is someone at every turn trying to kill him. Chris eventually is able to get out of China and arrives safely back in the US only to discover the killer has followed him home. The killer, Red Sun, enjoys his work and particularly enjoys torturing his victims prior to killing them. He will kill anyone who gets in his way of completing the job he was hired to do.

There are so many twists and turns throughout this story that you are engaged to the very last paragraph. For those of you who enjoy an well written cyber-triller, this is definitely a must read.
Profile Image for Nenette.
865 reviews62 followers
January 15, 2015
Way-deep inside each person, is there really some unknown undesirable or worse, an evil trait or characteristic, just lurking, waiting for the trigger that will unleash it? And will the person, upon realizing that he had it in him, acknowledge or deny it?

On his third novel, Reece Hirsch, again, did not disappoint, action-wise and thrill-wise. He had both his main man and trigger man experience that battle within themselves. Only the dictates of their conscience and their moral reasoning spelled the difference in their fights.

Much as it would be good to follow Chris Bruen's story from The Adversary (a serial), Intrusion is a completely standalone book. I also love that this third novel came in as a whole book. It did not tease me chapter by chapter, making my mouth water while waiting for the next installment, like The Adversary did.

There's just one thing I needed more of in this book. I wish Grogan's connections were explained a little more, I felt that part of the novel towards the end wasn't given so much detailed attention as the earlier chapters. This is just a small thing though, as overall this book is still highly recommendable.
Profile Image for Ingo.
1,248 reviews17 followers
August 29, 2018
Lent (like the first one) with Kindle Unlimited. One of the few books I hope will be good. Some authors I do not know, but the first book in this series was good, and I have already bought the third book (Surveillance) for a reasonable price.

A little too much info which is not needed (places, background info on history, people) and not enough hacking. The case, with all of its twists, even the surprise with the killer and the excursions into privacy law etc. where very good and I look forward to reading the next book in the series. What I also found very good, the moral of the MC after he had to defend himself - in this case, not as a vigilante nor planned, together with the PTSD also of Zoey his girlfriend, who has two people on her conscience.
But still, for me could have done with more hacking and more computer scenes, action and storyline was very good.
For laypersons computer things are explained, but as a retired IT-Helpdesk-slave I am not sure wether it is enough for all, I just hope so.
Recommended.
Profile Image for John Johnstone.
261 reviews
December 8, 2014
We all Google something everyday and hear or read about the size and power of Google, now you can read a thriller based on theft from a fictional Google caller Zapper. Chris Bruen a security and privacy lawyer at a law firm, is called in to investigate a hack into Zapper. Being a very hands on investigator Chris and his colleague Zoey have narrowed down the culprits and he decides to make a visit. Be warned this is not just a cybercrime investigation, Reece Hirsch has given us the whole shooting match - killings, greed, power, deadly pursuits and story twists all go to making an excellent thriller. The author has drawn on his professional background in writing this book and it shows, it is well written and gives you the impression that it is not all fiction and could be very real. This is one of my favourites of the year so far and could feature in my top 5 selection.
Profile Image for Marc Byers.
Author 2 books1 follower
January 9, 2015
I really enjoyed this book, The story flows great, hard to put the book down and reads very easy and fast. There is a little less technology then The Adversary, but was certainly more action packed. The computer hacking side of things takes a back seat to multi-national corporate and governmental issues. Chris steps out in it a little more than before and certainly feels the weight of some pretty serious attacks on him during the book. The ending is a nice twist and pretty hard to see coming due to the nice diversions along the way. If you liked The Adversary you will certainly enjoy this book. I'll certainly be hoping for more Chris Bruen books.
Profile Image for Tory Michaels.
Author 4 books79 followers
January 30, 2015
When I read it, word was just coming out about the Sony hack, so I was absolutely caught up in the timeliness of the tale.

I found the entire story to be believable and all too possible in this day and age. I kept holding my breath at various places, afraid that Chris might actually bite it at one spot or another. The pacing was phenomenal and I had to keep reading.

When I read this, I didn't realize it was part of a series, but that didn't give me any trouble while reading it. I definitely want to read more by Mr. Hirsch in the future and hope to get the chance soon!

Book provided by NetGalley in exchange for an honest review.
201 reviews
April 29, 2015
I was up into the wee hours of the morning finishing Intrusion. This a fast-paced cyber-crime thriller stars San Francisco lawyer Chris Bruen and his "maybe-girlfiend" computer forensic investigator Zoey Doucet. After a nail-biting trip to China, in search of evidence to connect the People's Liberation Army to the theft of the search algorithms, Chris returns to San Francisco, where the investigation continues. I enjoyed the descriptions of San Francisco and the unexpected plot twists at the end.

I received a free review copy of Intrusion through Goodreads First Reads.
Profile Image for Laura.
61 reviews1 follower
August 28, 2015
A big thank you to Reece Hirsch and Goodreads for giving me a copy of this book!

"Intrusion" was fast-paced, easy to read, and hard to put down: in other words, the perfect thriller! Chris Bruen, a privacy attorney, is sucked into a nightmare when he travels to China to try and determine who stole his client Zapper's --a google search engine-- algorithms.

Piracy and cyber crime: all the more terrifying because it reads so true. . .A must read for anyone interested in cyber crime and the future of the web.


224 reviews3 followers
June 14, 2015
Once again I must thank Goodreads, the author and the publisher for allowing me to read this novel. I found it to be very timely as I found out recently that my personal info may have been hacked by you guessed it t he Chinese. It was a face paced, topical and thoroughly enjoyable novel.. This is not my first novel written by Reese and have found them all to be well written and worth reading Kudos again
4 reviews
December 24, 2014
Intrusion grips you from moment one. This is a complete page turner you can't put down!! A must-read thriller that includes cyber-espionage and a deadly game that involves major players in the world economy today. I would love to see this as a movie on the big screen. What a great read! Reece Hirsch is one of my new favorite authors.
Displaying 1 - 30 of 70 reviews

Can't find what you're looking for?

Get help and learn more about the design.