Alistair MacLean's Time of the Assassins by Alastair MacNeill

By Alastair MacNeill

The African nation of Zimbala has a brand new chief, yet a person desires him lifeless – and the one guy who is aware information of the hit is being hunted by way of UNACO’s best agent on an unlawful challenge of private vengeance. Can UNACO cease their best murderer from killing his nemesis?

Alphonse Mobuto has governed the kingdom of Zimbala for forty-five years. On his demise, the Presidency passes to his eldest son, Jamel. made up our minds to introduce democracy and rid Zimbala of his father’s oppressive regime, Jamel faces retribution from those that as soon as benefited from it.

In ny to bring a massive speech on the UN, Jamel is an visible goal for an assassin’s bullet. The time and position of the assassination are identified via just one guy, Jean Jacque Bernard, a global terrorist and now a CIA operative.

Clearly a case for UNACO. yet deputy director Serge Kolchinsky realizes he has a almost certainly explosive scenario on his palms. For he discovers crack crew member Mike Graham has long past AWOL. Graham is in Beirut on a strictly unlawful venture of private vengeance - to trace down and kill Bernard…

Fast-paced and compulsive, Time of the Assassins is the fourth novel to be written by means of Alastair MacNeill from a close tale define through Alistair MacLean. even supposing MacLean died in 1987, it truly is was hoping that his many fanatics will locate that those novels provide a similar velocity and pleasure because the bestsellers by way of the grasp himself.

Show description

Read or Download Alistair MacLean's Time of the Assassins PDF

Best espionage books

Black List (Scot Harvath, Book 11)

A gorgeous mystery that envisioned the nationwide defense service provider scandal. "Brad Thor is as present as tomorrow's headlines. " —Dan Brown

#1 long island occasions bestselling writer Brad Thor returns together with his so much explosive mystery ever. someplace deep contained in the usa govt is a heavily guarded record. contributors of Congress by no means get to determine it—only the President and a mystery workforce of advisers. as soon as your identify is at the checklist, it doesn't come off . . . till you're lifeless.

Someone has simply additional counterterrorism operative Scot Harvath's identify.

Somehow Harvath needs to dodge the groups dispatched to kill him lengthy sufficient to untangle who has detailed him and why they wish him out of ways.

Somewhere, an individual, one way or the other can placed every part jointly. the single query is, will Harvath get to that individual ahead of the us suffers the main withering terrorist assault ever conceived?

An extreme, page-turning novel that's action-packed and frighteningly actual, Black record blurs the road among fiction and fact and once more reaffirms why Brad Thor "is arguably the easiest mystery author of our time" (Suspense journal) and "America's favourite author" (KTTX).

Defender (Intrepid, Book 1)

Number one secret agent tales, #3 Suspense Thrillers, #4 motion & event, #5 mystery Kindle Best-Seller

An African coup is coming near near, an SIS agent has long gone rogue and darker forces are at play.

A regular undertaking for a black-ops Interpol agent.

But this is often Alex Morgan's first and already he's out for revenge.

Part Jason Bourne, half James Bond, Alex Morgan is an agent of Interpol's black-ops department - Intrepid. Policeman, soldier and secret agent, Morgan and his fellow operatives are the faceless strangers who serve the larger stable - the skill to justify the end.

When an intelligence agent is brutally murdered and the president of a small African kingdom is installed risk, Morgan is shipped in on his first solo undertaking for Intrepid.

His disguise is to evacuate a gaggle of relief employees, with the aid of the attractive yet far-off area Halls, earlier than the rustic is swept by means of civil warfare. yet his precise venture is far darker. A undercover agent has long gone rogue - and there's extra at stake than the guy's profession within the mystery Intelligence Service.

A heart-pounding, no-holds-barred chase from the darkish middle of Africa to the crystalline waters of Sydney culminates in a struggle to the demise to forestall the vicious renegade intelligence officer and discover the shadowy conspiracy at the back of him.

Can Morgan remain alive lengthy sufficient to rescue the lady, store himself and convey the renegade to justice?

DEFENDER: Intrepid 1 is the 1st within the Alex Morgan Interpol secret agent mystery sequence taking readers via storm.

The Secret Team - The CIA and Its Allies in Control of the United States and the World

The key staff, L. Fletcher Prouty’s reveal´ of the CIA’s brutal tools of retaining nationwide safety throughout the chilly warfare, used to be first released within the Nineteen Seventies. even if, nearly all copies of the ebook disappeared upon distribution, having been bought en masse through shady “private dealers. ” definitely, Prouty’s allegations—such as how the U-2 hindrance of 1960 was once fastened to sabotage Eisenhower–Khrushchev talk—cannot have happy the CIA.

The Amerasia Spy Case: Prelude to McCarthyism

The Amerasia affair used to be the 1st of the nice undercover agent instances of the postwar period. In June 1945, six humans linked to the journal Amerasia have been arrested by way of the FBI and accused of espionage on behalf of the chinese language Communists. yet in basic terms , the editor of Amerasia and a minor govt worker, have been convicted of any offense, and their convictions have been in basic terms for unauthorized ownership of presidency records.

Extra resources for Alistair MacLean's Time of the Assassins

Example text

How to Be a Spy 25 Internal Correspondence Internal company correspondence contains an incredible amount of information. Companies produce their own newsletters, policy documents, and meeting minutes, filled with project data, details about people, company status updates, and a variety of other information. They don’t anticipate the numbers of people who will eventually see the documents. For example, my work involves identifying vulnerabilities in many publicly known companies, so I use code names for my clients in most of my documentation.

However, multibillion-dollar corporations cannot protect billions of dollars’ worth of information with less than a million-dollar security budget (although many firms have tried). Chapter 3 discusses how to determine the value of information. Why You Can Never Be Secure 33 • Threat. Although companies do not always want to acknowledge it, there is always a threat in one form or another. Chapter 4 describes how to identify threats. • Vulnerability. This refers to your organization’s weaknesses or what allows a threat to exploit you.

Information flows through a variety of media, including telephone systems, computer networks, and the mail. If I watch someone’s mail over time, just reading the envelopes, I can learn an incredible amount about that person. Return addresses on letters can reveal employers and religious affiliations. Magazine subscriptions indicate personal interests. A credit card bill can reveal something about a person’s income status. Children’s magazines indicate the approximate age and number of children in the household.

Download PDF sample

Rated 4.13 of 5 – based on 21 votes