Only a miracle-and faulty workmanship-prevents a germ-packed warhead from exploding when a terrorist missile slams into the United Nations building in New York. The lettering on the side of the rocket is Russian, which presents the West with its worst a direct link between a fanatical U. S. terrorist group and Russian gangsters with access to the germ warfare arsenal of the former Soviet Union.
This potentially devastating attack reunites the FBI's Russian expert William Cowley and Moscow's Organized Crime Director Dimitri Danilov. Their to penetrate and destroy the unknown group claiming responsibility before they can strike again.
And as the Superpowers teeter on the brink of diplomatic meltdown, Cowley and Danilov make another nightmare discovery. The terrorists are being cleverly financed by ultra-sophisticated hackers looting U. S. banks, breaking into law enforcement and Pentagon computers, and keeping themselves always one click ahead of the frantic pursuit.
The Watchmen is a spine-chilling chase that strikes at the heart of our fears of terrorism and its prevention.
Brian Freemantle [b. 1936] is one of Britain's most acclaimed authors of spy fiction. His novels have sold over ten million copies worldwide. Born in Southampton, Freemantle entered his career as a journalist, and began writing espionage thrillers in the late 1960s. Charlie M (1977) introduced the world to Charlie Muffin and won Freemantle international recognition—he would go on to publish fourteen titles in the series.
Freemantle has written dozens of other novels, including two featuring Sebastian Holmes, an illegitimate son of Sherlock Holmes, and the Cowley and Danilov series, about an American FBI agent and a Russian militia detective who work together to comabt organized crime in the post-Cold War world. Freemantle lives and works in London, Englad.
Notes-review “The Watchmen” Brian Freemantle 7/15/14
A high suspense conspiracy novel with a great deal of intricate actions by a large cast of characters divided between the good guys attempting to find and corral a large cast of bad guys who must first be identified and have their actions predicted.
The threat posed here is one paralleling the 9/11 type of international terrorist attack where as much damage as possible will be specifically directed at high value high visibility targets, in this case the UN building, and later Washington D.C. with the objective of disrupting civilizations' common functioning in critical choke points, ie. NY city and Washington. This book was written prior to the 9/11 attack, so it was predictive in goals and effects, but varied on the means and constituency of the attackers.
The author uses interspersed action sequences to build the suspense, and provide the sensation of the reader being interjected into plot sequences. This however requires the reader to keep track of a large set of difficult Russian names associated with the large cast of characters, and to keep track of which character attributes are assigned to each player in the plot.
Russia is used as the source of biological and tactical weapons, and most of the action or suspense is focused on finding leaks in the source of weapons and determining the trail of responsibility to find stolen weapons, trace back to who paid for them, how they were stolen, who intends to use them, how they will be transported, and what the target is for their use.
Political alignments and ramifications provide a background of support for the suspense of consequences of failure to perform for both the good guys and the bad guys. Most of the characters involved could be real people with regular human frailties, attitudes, and capabilities for performance under duress.
I thought that the author was weak in his use of assumed hacker capabilities, personality, and the ability to find and nullify site intrusions. One basic premise was that the central hacker here worked in a bank, and had escalated his privileges to be able to “raid” accounts by transactional withdrawals. The premise was that the transactional amounts were less than a dollar so would be ignored and difficult to trace. I thought this to be a weak point, since relational databases and accounting procedures in effect in the late 90's would have been able to fairly easily point to specific transactions in question. From there, the accounts used for transfer should have been obvious as either having a large balance with numerous very small deposit transactions, or many small transfer accounts used to extradite funds. The owner credentials of a large number of these types of accounts wouldn't hold up to scrutiny if instigated by one person. The author was using the situation of using a large number of less than 1 dollar transactions to accumulate over 2 million dollars. Any given user questioning a transaction, particularly a transfer of this type, should have been able to pinpoint the target account, even if it were directed to another banking institution. Even lazy and inept auditors should have easily been able to suspect fraudulent activity, and the net amount was enough to be classed as a major felony.
There were security intrusions into the pentagon, NASA, and several other defense machines. Even using keyloggers on old Windows systems, one person wouldn't have been able to access all those systems at will, and even less likely to be able to perform file manipulation remotely, to the extent of machine take overs of entire high level networks. This kind of activity takes time, dedicated effort, and usually involves a coordinated team using specific intrusion techniques that other hackers have found and published. It also generally requires high bandwidth and dedicated effort at specific times while bypassing normal security issues, such as password resets, executable code checksum analysis, network logging, etc. The author didn't detail any of the background for the capabilities exhibited in this book, except that the pentagon access seemed to be attributed to anti-static bands attached on monitors (CRTs) and acting as effective key-loggers. He also didn't expound on how a NASA intrusion could be extended across systems to be able to modify the flight parameters of the space shuttle.
In the end, the main hacker appear to be an individual with a normal enough personality to be able to perform normal cubicle type operations in a bank, and not be seen as a nefarious system hacker with the stereotypical antisocial attitude. At the end of the book, even this hacker had a sudden revelation as to who the “General” was. This was not clear to me, so someone may can explain whether he suddenly recognized that this was a slang character assignment being use to characterize him by the loose organization of field agents who perpetrated the terrorism, or if there were other hackers coordinating efforts.
As a final warning for readers, the main hacker has been left undetected, and is gathering a new force on the last lines of the book.
This story encompasses a many tiered investigation, both in the U.S. and Russia, after a series of terrorist attacks. The first pairing of these two characters, one an F.B.I. agent and the other a Russian Investigator, was a five star novel. The second pairing was a four star review. And now, third novel into the series and we have a three star review. With some thrillers they get so darn detailed with a large cast of characters that the author includes a list of the various players either at the beginning or end of the book. This one has that large cast of characters with no list causing this reader to constantly slow down to determine who was who. Another small itch for me was some of the misspelled words that stood out like a sore thumb here and there. With these gripes out of the way I will say that I did enjoy the story and the detail the author puts into the investigation.