Semblance of Storms In Audio Format

Semblance of Storms in audio format is now available narrated by Tobey Alvarez. It can be found on Audible, Amazon and Apple iTunes.

A novel of mistakes, secrets, lusts and relationships.

Semblance of Storms ACX

Semblance of Storms Retail Sample

Semblance of Storms RS Narrated by Tobey Alvarez

All that is required, by his publishers is to write a fourth book, not like the flop that was his third. His successful first two books bought him fame, some fortune and disputes with his terminally ill father. He wants his son to help with his half-sister. If only her mom, wouldn’t give confusing messages on what she wants; possibly him. A family friend and lawyer will help, as he always has done but there are secrets in his past too.

His new book will be a tale of boy meets girl in his usual elaborate and descriptive style. His agent, wants him to produce it soon but he has his own pressures from his new investors. There might be a movie deal to be negotiated. The new investor is represented by an attractive woman who is infamous for other reasons.

His editor, wants him to finish the book so she can stop his publisher asking for the advance back. She hopes he has written something as good as his first published book. He does too. He needs to concentrate on writing this book not drafting anything else. Old lost, and possible new loves and lusts, keep distracting him. The idle beach lifestyle diverts him as do post pandemic visitors.

Just when he begins to make progress on the last chapters a hurricane approaches his home in North Carolina. If he goes to visit his father, another storm may await in Houston. His neighbor and that family add further complications and secrets that need to be hidden or avoided, especially from the FBI.

Semblance of Storms and Other Audio Books

All my audio books can be found here

Landscape in Audio Book Format

Landscape in audio book format is now available narrated by CC Kline. You can find it in Audible US, Audible UK, Amazon and Apple

Landscape ACX

Landscape Retail Sample

Landscape – CC Cline

In Landscape – She is a PA who dreams of running her own art gallery. He is an IT technician gambling away everything he wants. They meet and fall in love. Their relationship is threatened by endless bets even whilst they share their love of paintings.

Years later some dreams are fulfilled others are dashed. Will the former lovers meet again? This is a contemporary romance now available in Audio format.

The book is also available from Amazon in Germany, France, Italy, Spain, Canada and selected other Amazon sites

All my audio books can be found listed here

Sail Chains in Audio Book Format

Sail Chains narrated by Kevin Redson is now available in audio book format. This is the second part of the Sailing Clear series Part one Sailing Clear is also available in Audio

Sail Chains is available at Amazon, Audible USA, Audible UK, and Apple

Sail Chains Audio

Sail Chains Retail Sample

Sail Chains Audio Sample narrated by Kevin Redson

Captain Tom Larring barely escaped alive from a mission in Afghanistan. He now has another task. Effi Miani has been undercover in the Middle East but is needed for the same operation. Together they must find Bravo-One-One who is the highest priority target for MI6. He is believed to be building a chemical weapon in Northwest Pakistan. A previous MI6 operation has already failed. A leak or a traitor inside MI6 may have destroyed that mission, so extra precautions must be taken otherwise, this team will also fail.

Tom and Effi need a faultless back story before embarking on their mission. The operation needs financing and a cover story. The help of a former disgraced MI6 officer, Michelle Houston, and her lover, Hugh Turnbill, is sought. They successfully control the laundering of black funds for the security services whilst sailing clear of the security services. Some of the MI6 leadership wants to gain direct control of the money and the couple, despite previous agreements. They want that control regardless of the risks to the operations in Pakistan. They think they may get leverage using two former teenage runaways connected to the couple.

The hunt for whoever leaked the information continues. Suspicions are raised. The internal security team needs to prevent the traitor putting the financiers and the operation at risk. An MI5 team is on the trail of a suspicious Saudi diplomat. He may be connected to Bravo-One-One.

Closed missions should not be re-opened. The NSA and GCHQ are monitoring and tracing communications using secret programmes and techniques, but some secrets should not be shared with allies.

The book is also available from Amazon in Germany, France, Italy, Spain, Canada and selected other Amazon sites

All my audio books can be found listed here

Audio Books Dedicated Page Now Published

I’ve been busy with narrators on creating audio books.

Audio Books Permanent Page

I have added a new permanent page here showing all audio books on a dedicated page. This includes all books both produced and in production. There are also details of narrators and links to sales outlets and retail samples.

Narrators

If you are interested in creating non-English translations, please let me know or use the ACX platform to contact me. As at June 08, I now have a narrator for To The Survivors, but I’m re-looking for a narrator for Sail Chains.

Audio Books

Audio Book Covers

Audio Book Details and Samples

BookTitleNarratorLanguageAudibleAmazonApple iTunes
Demise AudioAn Agent’s Demise
The Demise Series – Part One
Colin Fluxman
English – UK
Audible USA
Audible UK
Audible France
Audible Germany
AmazonApple
An Agent's Rise ACXAn Agent’s Rise
The Demise Series – Part Two
Stephen H Marsden
English – USAAudible USA
Audible UK
Audible France
Audible Germany
Amazon UKApple Books iTunes
An Agent's Prize ACXAn Agent’s Prize
The Demise Series – Part Three
Stephen H Marsden
English – USAIn Production
Demise Trilogy ACXThe Demise Trilogy
The Demise Series in one volume
Stephen H MarsdenEnglish – USAIn Production
SC ACXSailing Clear
Sailing Clear Series – Part One
Johnathan Welsh
English – UKAudible USA
Audible UK
Audible France
Audible Germany
AmazonApple
Sail Chains ACXSail Chains
Sailing Clear Series – Part Two
Kevin Redson
English – UKAudible USA
Audible UK
Audible France
Audible Germany
Amazon USAApple Books iTunes
Sails ACX CoverSails
Sailing Clear Series – Part Three
Kevin Redson
English UKAudible USA
Audible UK
Audible France
Audible Germany
Amazon UKApple Books iTunes
Counter ACXCounterGreg Cooper
English – USAAudible USA
Audible UK
Audible France
Audible Germany
AmazonApple Books iTunes
Fives ACXThe World of Fives
The Observer Series – Part One
Monica McIntire

Check Out Monica’s Web Site
English – USAAudible USA
Audible UK
Audible France
Audible Germany

Apple Books
AmazonApple Books iTunes
Intervention ACXIntervention
The Observer Series – Part Two
Monica McIntire

Check Out Monica’s Web Site
English – USAAudible USA
Audible UK
Audible France
Audible Germany
AmazonApple Books iTunes
TTS ACXTo The Survivors
Charles Robert Fox
English – UKAudible USA
Audible UK
Audible France
Audible Germany
Amazon UK
Amazon USA
Apple Books iTunes
Persuasive Man ACXThe Persuasive ManLiam Carrolan
English – USAAudible USA
Audible UK
Audible France
Audible Germany
AmazonApple Books
Landscape ACXLandscapeCC Kline
English – USAAudible USA
Audible UK
Audible France
Audible Germany
Amazon UKApple Books iTunes
NTM ACXNot Too MuchCC Kline
English – USAAudible USA
Audible UK
Audible France
Audible Germany
AmazonApple Books iTunes
Semblance ACXSemblance of StormsTobey Alvarez
English – USAAudible USA
Audible UK
Audible France
Audible Germany
Amazon USAApple Books iTunes
Take Four Audio ACXTake FourCC Kline
In Production
English UKIn Production
Re-Semblance Audio ACX CoverRe-SemblanceTobey Alvarez
In Production
English – USAIn Production

Audio Books Production

All audio books produced using the ACX platform to link narrators to writers.

ACX

Sailing Clear Is Free on Kindle

To celebrate the release of the sequel Sail Chains, my book, Sailing Clear will be free on Kindle from Saturday 19th June Midnight Pacific time through to Monday 21st June – get it while you can.

Sailing Cover

Sailing Clear
Missing girls, missing money, missing man, luxury motor yachts and the people chasing them.

An old MI6 undercover mission to prevent terrorists entering the UK via sex trafficking routes went wrong. The undercover agent is assigned to a new role.

A man lost in the shadows manages the hidden finances of the security services but dreams of a better life sailing the Mediterranean. When he runs off he is hunted, but he may have been killed by an organised crime leader. The police are assigned to find him.

Two sisters run away to Greece from the sexual abuse of their father.

The characters intersect as the hunt commences. Then the security services need to find options to deal with the fallout.

The undercover agent now in her new planning role is assigned to trace the missing financier, but a corrupt cop may give them all away

Sail Chains is Published

Sail Chains is published today

Available as a Paperback and on Kindle as an e-book. It is part of the Sailing Clear series and a sequel of sorts to Sailing Clear but can be read as a stand-alone. As it provides a tale heavily connected to intelligence systems run by the NSA and GCHQ, there is a forward in the book which can also be found in this blog post

Sail Chains Cover

Captain Tom Larring barely escaped alive from a mission in Afghanistan. He now has another task. Effi Miani has been undercover in the Middle east but is needed for the same operation. Together they must find Bravo-One-One who is the highest priority target for MI6. He is believed to be building a chemical weapon in Northwest Pakistan. A previous MI6 operation has already failed. A leak or a traitor inside MI6 may have destroyed that mission, so extra precautions must be taken otherwise, this team will also fail.

Tom and Effi need a faultless back story before embarking on their mission. The operation needs financing and a cover story. The help of a former disgraced MI6 officer, Michelle Houston, and her lover, Hugh Turnbill, is sought. They successfully control the laundering of black funds for the security services whilst sailing clear of the security services. Some of the MI6 leadership wants to gain direct control of the money and the couple, despite previous agreements. They want that control regardless of the risks to the operations in Pakistan. They think they may get leverage using two former teenage runaways connected to the couple.

The hunt for whoever leaked the information continues. Suspicions are raised. The internal security team needs to prevent the traitor putting the financiers and the operation at risk. An MI5 team is on the trail of a suspicious Saudi diplomat. He may be connected to Bravo-One-One.

Closed missions should not be re-opened. The NSA and GCHQ are monitoring and tracing communications using secret programmes and techniques, but some secrets should not be shared with allies.

Government Snooping Chains

The NSA and GCHQ Programs provide insight into government snooping chains. This blog also provides a forward to my book Sail Chains. The current focus on surveillance and privacy is based on the actions of Facebook, Amazon and google. The allied western intelligence agencies do much more. Previous blogs

Secure communications, tracking, and other jargon is used within this tale. The descriptions are based on real techniques used in Information Technology and Intelligence Surveillance. Some are described below to avoid lengthy passages of explanation in the narrative of the book and here in this blog for public edification.

Five-Eyes

Five-Eyes is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to a multilateral agreement which is a treaty for joint cooperation in signals intelligence. It is a wide ranging agreement and includes facilities in each country including the Government Communication Headquarters, GCHQ, in Cheltenham, UK, and the National Security Agency, NSA, with its HQ at Fort Meade in the USA. Both organisations also carry out their own operations and programmes. Many of these programmes were known in small parts to the media and hence general public; however the extent of these programmes was not well known until the revelations leaked or stolen by Edward Snowden.

Hadn’t realised this comes 10 years after Snowden’s revelations.

GCHQ

GCHQ
NSA Signpost
NSA Sign post

Legal restrictions in all Five Eyes countries are supposed to restrict or prevent gathering of information on citizens. Secret courts, FISA (Foreign Intelligence Surveillance Act) in USA and CMPs (Closed Material Procedures) in UK provide legal cover. Parliamentary or Congressional scrutiny is very limited. In many cases the elected representatives or their advisors do not have sufficient levels of security clearance to see the material about the programmes let alone the technical understanding of the implications.

The NSA is not supposed to spy on US citizens without a warrant but they can collect data about US citizens whilst spying on foreigners. In one example 90% of the data collected in one sweep was about US citizens (>9,500 citizens out of 11,000 contacts). In this way GCHQ can spy on US Citizens and vice versa and each can pass data to the other through the Five Eyes and not be subject to any scrutiny. It is clear from multiple sources that this spying is not just on threats but also on journalists, whistleblowers and multiple other targets that the security services have decided are legitimate targets.

Snowden

The main details were leaked by Edward Snowden to two reporters Barton Gellman who published via the Washington Post and Glenn Greenwald in The Guardian. A film maker, Laura Poitras conducted interviews and also acted as a go-between, especially between Snowden and Gellman during the initial contacts when source VERAX was making contact. Many of the electronic copies of papers and programme details remain unreleased by the journalists. The NSA and GCHQ continue to deny many of the details, see here


STELLARWIND

was the code name of a warrant less surveillance program begun under the George W. Bush administration’s President’s Surveillance Program. The National Security Agency (NSA) program was approved by President Bush shortly after the September 11, 2001, attacks and was revealed by Thomas Tamm to The New York Times in 2004. STELLARWIND’s output is fed into the MAINWAY database

PRISM

PRISM is a code name for a program under which the NSA collects internet communications from various US internet companies. The NSA had placed collection systems directly in the data centres of the large tech companies including Microsoft, Google, Apple, Facebook and others. Due to the nature of Internet routing many non-US connections route or partially route via the data centres. Thus privacy campaigners use Virtual Private Networks, VPNs, and other techniques to mask their messages. These techniques are also used by enemies including terrorists.

MAINWAY

MAINWAY is a database maintained by the NSA (and Five Eyes partners) containing metadata for hundreds of billions of telephone calls made through the four largest telephone carriers in the United States: AT&T, SBC, BellSouth (all three now called AT&T) and Verizon. The existence of this database and the NSA program that compiled it was unknown to the general public until USA Today broke the story on May 10, 2006. It is estimated that the database contains over 1.9 trillion call-detail records. The records include detailed call information (caller, receiver, date/time of call, length of call, etc.) for use in traffic analysis and social network analysis, but do not include audio information or transcripts of the content of the phone calls.

Contact Chaining

Contact Chaining is a method of querying data held in MAINWAY to produce contact maps and then using associated algorithms of contacts of a target several levels away e.g. secondary, tertiary and beyond contact of contacts of contacts. Because MAINWAY holds historical data, officially 5 years worth for US citizens but with many caveats, previous contacts can be traced. Exceptions to deletion are any link to on-going or security investigations. This gives rise to an exponential increase in potential contacts. If the first contact has ten contacts and each has ten more and these in turn have ten more at 3rd degree of separation there are now 10x10x10 = 1,000. Most humans have far more than 10 contacts thus chains become very large very quickly. The game 6 Degrees of Kevin Bacon, the US Actor, demonstrates this is more humorous ways.

Algorithms are used to reduce the numbers or combine them into groups. This data is then combined with other communications data, for example, social medial posts and email, to build up a contact map. The seed in this case is the initial target or intercept which by correlating with another seed B. Contact C is thus linked in the chain.

Or a real one shown by the US news programme 60 Minutes

NBC Real Chain

Any one of these contacts or nodes could be the enemy that is sought or allow movements, locations and activity patterns to be tracked thus enabling potential targeting for surveillance or more direct action. Sometimes the enemy is unknown. The node shown is a phone, email address, social media handle, website, which the technique attempts to link to an individual or organisation. A phone number of a head office could be used by hundreds of contacts. How the data is processed into MAINWAY with other named systems mentioned is shown below:

Mainway Dataflow showing Government Snooping Chains

Enemies attempt to hide this activity by changing contact methods, encryption of the content of messages and other evasion techniques. For the NSA and GCHQ they are also tasked with creating method of protecting data from such intercepts by foreign powers or bad actors. Other techniques such as operating cell techniques can founder with just a single contact under the chain. Thus operational security measures are overcome. For example two terrorist cells with a leadership planning a coordinated attack can be linked.

CO-TRAVELER

A system called CO-TRAVELER is designed to track who meets with whom and covers everyone who carries a mobile/cell phone, all around the world. CO-TRAVELER collects billions of records daily of phone user location information. It maps the relationships of mobile/cell phone users across global mobile network cables, gathering data about who you are physically with, and how often your movements intersect with other phone users. The program even tracks when your phone is turned on or off.

TOR – Protects from government snooping or does it?

Tor is free and open-source software for enabling anonymous communication by directing Internet traffic through a worldwide overlay network. It consists of more than seven thousand relays designed to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace the Internet activity to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”. Tor’s intended use is to protect the personal privacy of its users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities unmonitored. It was created by the Office of Naval Research and DARPA as a security protection project and the papers from Snowden demonstrated that the NSA had managed to set up infiltration into the network.

VPNs – Encrypt channels of communication thus protecting chains but not that a connection exists

Virtual Private Networks (VPNs) are encrypted channels between one or more network points. They normally use some form of shared encryption key between the end points thus preventing interception of the communication content; however, the metadata (data about data) can still be traced including locations, of end points, times of transmission, etc. Therefore, STELLARWIND can collect this data and deposit into MAINWAY for use in Contact Chaining. If a phone is used as the data connection CO-TRAVELER can match locations and obtain more metadata in addition to location and other data sources nearby.

GCHQ

GCHQ has a different set of names achieving the same ends see here. This shows the applications CARPART, PRIMETIME, SNAPDRAGON, MoaG, SORTING FRIENDS sending data into a system called CHART BREAKER, and onwards into CONTACT LENS which is the Contact Chaining output from MAINWAY and CHART BREAKER

Sail Chains – Coming Soon

Sail Chains almost a sequel to Sailing Clear is coming soon

Sail Chains Cover
Sail Chains Cover

Captain Tom Larring barely escaped alive from a mission in Afghanistan. He now has another task. Effi Miani has been undercover in the Middle east but is needed for the same operation. Together they must find Bravo-One-One who is the highest priority target for MI6. He is believed to be building a chemical weapon in Northwest Pakistan. A previous MI6 operation has already failed. A leak or a traitor inside MI6 may have destroyed that mission, so extra precautions must be taken otherwise, this team will also fail.

Tom and Effi need a faultless back story before embarking on their mission. The operation needs financing and a cover story. The help of a former disgraced MI6 officer, Michelle Houston, and her lover, Hugh Turnbill, is sought. They successfully control the laundering of black funds for the security services whilst sailing clear of the security services. Some of the MI6 leadership wants to gain direct control of the money and the couple, despite previous agreements. They want that control regardless of the risks to the operations in Pakistan. They think they may get leverage using two former teenage runaways connected to the couple.

The hunt for whoever leaked the information continues. Suspicions are raised. The internal security team needs to prevent the traitor putting the financiers and the operation at risk. An MI5 team is on the trail of a suspicious Saudi diplomat. He may be connected to Bravo-One-One.

Closed missions should not be re-opened. The NSA and GCHQ are monitoring and tracing communications using secret programmes and techniques, but some secrets should not be shared with allies.