Download e-book for kindle: Operation Ghost Flight by Stephen Yoham

By Stephen Yoham

ISBN-10: 1684097134

ISBN-13: 9781684097135

H. Hunter Mahoy, a top-notch tax advisor in Miami, unintentionally documents a talk among consumers, Cuban businessmen, discussing their involvement within the dying of a US Senator 3 years prior. Mahoy takes the recording to the FBI bureau leader in Miami who turns out bored with the outdated case. at the as far back as his motor vehicle, Hunter will get mugged. Then his workplace will get ransacked. He mails a letter to an past love, Morgan Lindsey, a Washington usher in reporter, figuring out complete good she is going to examine additional.
Several days later, whereas hovering excessive over the Everglades in a high-performance fiberglass sailplane, Hunter suffers a midair collision with an army stealth fighter and finally ends up using his parachute into the swampy observed grass lower than. He stumbles upon an front to an underground base the place he overhears most sensible US executive officers plotting to drop a laser-guided bomb from a stealth fighter on Fidel Castro and US President James Weber in the course of an historic assembly at Guantanamo Bay, Cuba, in exactly weeks’ time. Hunter additionally learns they're trying to find the downed sailplane pilot to allow them to kill him to maintain the stealth fighter midair incident a mystery. not less than one individual within the CIA is usually occupied with their Operation Ghost Flight.
Hunter and Morgan are pressured to workforce up. unable or keen to belief someone, the race is on for them to warn President Weber at once whereas various teams are attempting to kill them at each turn.

Show description

Read or Download Operation Ghost Flight PDF

Best other_5 books

Troppo facile dire no: Prontuario contro l’oscurantismo di - download pdf or read online

Sergio Staino e Chicco Testa. Una «strana coppia» che, a ben vedere, ha molti punti in comune. «Innanzitutto entrambi – scrive Testa – facciamo parte di quelli che “Sono stato iscritto al Pci”». advert accomunarli c’è poi il tono irriverente e il non essere mai riusciti a emanciparsi dalla «passionaccia» in keeping with los angeles politica.

New PDF release: In Strangers' Houses

In case you fresh strangers' homes you study their soiled secrets and techniques. .. Lena Szarka, a Hungarian purifier operating in London, is aware that each one too good. So while her pal Timea disappears, she suspects certainly one of her consumers is in charge. The police do not percentage her suspicions and it truly is left to Lena to show sleuth and locate her buddy.

Read e-book online The Bible Explorer's Guide: 1,000 Amazing Facts and Photos PDF

The Bible Explorer’s consultant we could teenagers arise shut and private with lifestyle in the course of Bible instances via pictures, maps, and illustrations illuminating, humans, areas, gadgets, and constructions of the Bible. What did Noah’s Ark relatively seem like? Who was once David and whom did he struggle? How did 1st century voters of Jerusalem stay?

New PDF release: Pentesting Azure

A complete consultant to penetration checking out cloud providers deployed with Microsoft Azure, the preferred cloud computing merchant utilized by businesses like Warner Brothers and Apple. you are going to find out how to:-Gain entry by way of circumventing two-factor authentication and stealing administration certificate from developer machines-Make feel of Azure's providers by utilizing PowerShell instructions to discover IP addresses, administrative clients, and firewall rules-Exploit Azure's garage version and get well garage keys -Attack digital machines and procure passwords, binaries, code, and settings files-Compromise networks by way of editing firewall rules-Attack really good prone like Azure Key Vault and Azure Websites-Know should you should be stuck through viewing logs and safeguard eventsPacked with real-world examples from the author's event as a company penetration tester, pattern scripts from assaults, and "Defenders counsel" that specify how businesses can decrease hazard, Attacking Microsoft Azure offers a transparent evaluate of Azure's vulnerabilities and the way to use them.

Additional info for Operation Ghost Flight

Example text

Download PDF sample

Operation Ghost Flight by Stephen Yoham

by Donald

Rated 4.03 of 5 – based on 40 votes