Download At Risk by Stella Rimington PDF

By Stella Rimington

A terrorist is focusing on Britain. And to make issues worse it’s an “invisible”--someone touring below a British passport. almost very unlikely to discover ahead of it’s too late.The task falls to Liz Carlyle, the main inventive counter terror agent in British intelligence. monitoring down this invisible is a problem like none she has confronted prior to. it is going to require all her hard-won event, to claim not anything of her intelligence and braveness. Drawing on her personal years as Britain's highest-ranking undercover agent, Stella Rimington supplies us a narrative that's clever, tautly drawn, and suspenseful from first to last. Review:

The girl who previously headed Britain's intelligence provider (and what may Ian Fleming have made from that?) is available in from the chilly with a sensible, shrewdpermanent, and brilliantly paced mystery that turns out ripped from the headlines--if now not today's, then most likely tomorrow's. Liz Carlyle is an agent-runner in MI-5's Joint Counter-Terrorist workforce, that's dealing with the last word intelligence nightmare; an "invisible," a terrorist who's an ethnic local of the objective kingdom and therefore in a position to pass its borders unchecked and movement round its environs unquestioned. All Liz and her workforce need to move on is the suspicion neighborhood fisherman who was once shot with an strange armor-piercing gun identified to be favourite via overseas brokers and whose physique was once present in the restroom of a shipping café close to a smuggler's seashore could have been desirous about aiding an undercover operative referred to as "Vengeance prior to God" input England with out advantage of passport or visa--a guy whose project, if now not his id, has been the topic of modern intelligence "chatter" from militant Muslim resources. And whereas Liz thinks she understands who the operative is--an Afghani with cast papers final visible in a German port city--she doesn't have a clue concerning the "invisible" who's supporting him, or the objective of their crosshairs.

This is a tightly drawn, expertly instructed story that wastes few phrases in describing the shadowy global of the intelligence prone, the turf battles and infighting, or even the romantic entanglements that attend the lives of these concerned. It marks a promising moment occupation for its writer, whose destiny good fortune will without doubt be even more public than her previous accomplishments. --Jane Adams

From Publishers Weekly:

The first girl director common of Britain's MI5, Rimington speaks well approximately place of work concerns whereas ratcheting the strain excessive in her authoritative debut mystery. input Liz Carlyle, an agent-runner with a flavor for classic outfits; her married lover, Mark Callendar, whom she doesn't love; and an beautiful head of part, Charles Wetherby. You don't want Liz's deductive powers to determine that Wetherby will ultimately prevail Mark, who terminally annoys Liz via leaving his spouse. Liz is married to her activity. Small ask yourself: it doesn't get extra intriguing than this. The Islamic Terror Syndicate (ITS) might be approximately to set up an "invisible"—"an ethnic local of the objective country"—and in simple terms Liz can pull jointly the entire threads. Rimington infuses the chase with ethical complexity via making the invisible a true man or woman, regardless of that she boasts a pretend identify and has "become a cipher, a selfless software of vengeance, a baby of Heaven." many of the characters think actual, even if Rimington sometimes is going on approximately strangers in brief glimpsed and introduces numerous wryly flirtatious male brokers too many. She is open approximately having had an help with the constitution of the e-book, however the voice jewelry precise, and he or she retains religion with a style she essentially venerates.

Show description

Read Online or Download At Risk PDF

Similar espionage books

Operation Garbo: The Personal Story of the Most Successful Spy of World War II

Juan Pujol Garcia, higher referred to as Garbo, was once probably the main influential secret agent of global warfare II. through feeding fake info to the Germans at the eve of the D-Day landings he ensured their absence in nice numbers from Normandy’s shores. This allowed the Allied push opposed to Hitler to start. Amazingly, Garbo’s conceal was once by no means damaged.

Counterfeit Lies

The explosive new mystery from Oliver North, who stormed bestseller lists national together with his disarmingly real army novel Heroes Proved, is a gripping, continuous story which could in basic terms be written through a person who has "been there, performed that. "

Veteran undercover FBI agent Jake Kruse is investigating a smuggling ring in southern California whilst his project is lower brief. A well known felony safeguard legal professional desires to rent Jake on one other type of venture: to kill the daughter of an area crime boss.

What all started as a "contract killing" quickly captures the eye of the CIA, the U. S. mystery provider, and high-level officers in Washington. The secret agent is plunged right into a lethal underworld of North Korean espionage, Hezbollah terror and the sinister deception Iran makes use of to obtain nuclear guns. stuck in an internet of foreign intrigue that is going to the pinnacle of the U. S. govt, Kruse is compelled to confront the last word ethical drawback: doing what’s correct while every little thing turns out wrong.

His manhattan occasions bestseller Heroes Proved was once praised via Sean Hannity as "a heart-thumping ‘must-read’ for each American" and as "inspiring fact within the kind of a novel" by way of U. S. military Lieutenant basic William "Jerry" Boykin, a founding member of Delta Force.

Now, nationwide defense specialist and adorned battle hero Oliver North and previous U. S. Marine and FBI secret agent Bob Hamer carry their real-life adventure to this pulse-pounding story of overseas intrigue and down-to-the-wire suspense. they are saying it’s fiction. yet it’s all too genuine.

Fortunes of War

4 jap nationalists typhoon Tokyo's imperial palace and behead the emperor. Their objective: to invade Russia and overcome oil-rich Siberia in an effort to dominate the globe. quickly the realm explodes in conflict, as Japan, Russia and the us move head-to-head in a fight that threatens overall destruction.

Niemand lebt ewig (James Bond, Band 20)

Auf dem Weg zu einer österreichischen Spezialklinik erreicht James Bond die Warnung, dass jemand ein hohes Kopfgeld auf ihn ausgesetzt hat. Der Beginn eines Abenteuers, das ihn nicht nur in die Arme von "La Principessa", der reichen und wunderschönen Sukie Tempesta, führt, sondern auch immer wieder in Situationen, in denen er nur knapp dem Tod von der Schippe springen kann.

Additional info for At Risk

Example text

The reason is that those are terms specific to Human Intelligence, or HUMINT, which is just one type of collection among many. Depending on what is being targeted, the other intelligence disciplines can produce much more effective results. The collection of Internet traffic generally falls into this category. The word images is used instead of photographs because there are many high-tech types of images well beyond traditional pictures. There are many other disciplines, such as TRASHINT, which are important but used less often than the ones mentioned here.

For example, HUMINT can gather information, but it may be partial or fake. SIGINT can overhear people talking about faking the information. IMINT can take pictures confirming the results. So a good intelligence operation looks for everything and then analyzes and evaluates all of it. 16 CHAPTER ONE Spies use a set of well-established collection methods. Some of those methods are scientifically complex, but the vulnerabilities they exploit are basically the same ones that petty criminals take advantage of.

Their competitors (and car magazine writers) go to equally great lengths to unmask the latest model:They pay people to surreptitiously photograph the cars, they rent airplanes to observe and photograph the cars from the air, and they even infiltrate the testing grounds to plant cameras. First and foremost, intelligence requirements must be realistic, taking into account the available data, resources, and potential risk. Available resources, however, rarely allow for such omnipotence, so companies tend to focus their espionage efforts rather narrowly, very often on specific customer concerns—anything that could affect market share and customer satisfaction.

Download PDF sample

Rated 4.44 of 5 – based on 38 votes