Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Invasion of Privacy (Brody Taylor Thrillers) Paperback – August 4, 2014
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
Frequently bought together
Customers who bought this item also bought
Praise for Ian Sutherland
'This man can write, cant wait for the next one.'
'Definitely an author to look out for.'
'Ian Sutherland is a born storyteller. But beware . . . after reading his books you will feel uneasy every time you go online!'
'Sutherland clearly has solid knowledge of actual network security and employs artistic license only for the sake of telling an exciting, fast paced, thrilling tale.'
Praise for Invasion of Privacy
'I didn't want this book to end!'
'Brilliant,edge of seat thriller. Fantastic narrative, great characters. Dark, creepy at times and totally unputdownable. Ian Sutherland is a master of suspense.'
'Sutherland writes an excellent mystery with multiple layers of intrigue.'
'This book took me places that I don't want to believe exist!'
'The heroine defies genre stereotyping. She's a female detective who is smart, competent and charismatic - and doesn't have to spend nine-tenths of her time fighting institutional bigotry.'
'I started with the prequel novella and immediately picked up this full-length book, reading it straight through until 5am the next morning.'
'You may want to disconnect any web or IP cams you have at home after reading this'
'I'm always happy to lose a lot of sleep on the rare occasions I encounter the right novel, and a great deal of hard work must have gone into polishing and perfecting a product of this quality.'
'A frightening tale and clever plot.'
'One of those rare novels you read slowly to keep it from ending.'
'All in all, very satisfying and worthy of a chain of sequels.'
'Brilliant. If you enjoy fast paced, intelligent detective thrillers, make this your next read.'
'One of those books that once it has hold of you doesn't let you go. It was almost as though there was a powerful winch at the last page which had been fastened to me and then set of winding at its top speed dragging me through the story at an alarming pace. I lost lots of valuable sleep.'
'I can't wait for the next book in this series.'
'Absolutely loved it from beginning to end, captivated me, and I was literally on the edge of my seat.'
'Invasion of Privacy is the best fiction book I have read this year. It deserves a wider audience.'
From the Author
Hi thriller fans!
The chilling premise behind Invasion of Privacy came first, long before the character of Brody Taylor. I'd tried various ways to tell the story in a dramatic and suspenseful way and only succeeded when the character of Brody popped into my head, fully formed and wonderfully flawed. As intricate and twisted as the plot is, it's Brody that makes the whole thing far more interesting and exciting. In our modern, technology dependent world he's incredibly powerful and because of this he's frequently confronted with the dilemmas: just because he can do something, should he? And, does the end always justify the means?
But the best part about Brody is that he's a character in a setting worthy of a whole series of books. There is a much darker side to the connected world into which we all blindly jump into each day. We hear about it in news all too frequently. Pitting Brody against these anonymous online criminals is too good an opportunity to pass up, especially when their digital crimes affect us in the ordinary world in which we all live. But to make a character like Brody work well, you need a counterpoint. And DI Jenny Price is perfect. She's the law-enforcing, real-world action hero to Brody's law-bending, tech-savvy anti-hero.
It seems that readers love Brody and Jenny too. The books have been downloaded tens of thousands of times by readers all around the world. The reviews are amazing and the books have both been #1 in their genres.
I hope you enjoy meeting Brody Taylor and Jenny Price. I'm always delighted to correspond with readers. You can find out more and contact me at ianhsutherland.com.
If you buy a new print edition of this book (or purchased one in the past), you can buy the Kindle edition for only $0.99 (Save 80%). Print edition purchase must be sold by Amazon. Learn more.
For thousands of qualifying books, your past, present, and future print-edition purchases now lets you buy the Kindle edition for $2.99 or less. (Textbooks available for $9.99 or less.)
Browse award-winning titles. See more
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
This book held me transfixed—filled with cyber geek speak, some of which I have heard, but none of which I have enough knowledge to speak with authority. I actually sent the author a message and asked him if the premise of the story had any basis in reality—and he quickly replied that things of that nature are indeed real.
Most of us use the internet pretty regularly with little thought to the dark side of it. Yes—in the news we hear that countries around the world have entities that hack into government agencies, banks and credit card companies to steal information and security secrets. They also threaten infrastructures like hydro grids, airline companies…but the general public never seriously believes that they could personally be involved; that is until you read invasion of Privacy! This book took me places that I don’t want to believe exist!! For me it involved a dark world in cyberspace that could be equated to crime mobsters like Al Kapone –just a different decade and a different venue, but just as corrupt, just as territorial and just as deadly. It was shocking to read how easily the hackers accessed personal information, the techniques they used to get the information that they wanted, the multiple ways they set up false identities so that they could not be detected.
To the outside world, Brody Taylor passes as a security consultant, but in reality, he is a top dog in the internet hacker world—a recognition that he has worked hard to achieve, and one that creates jealousy and anger in a few of those that he has beaten or exposed. High on a recent success, he lets himself be enticed by a request for help on CrackerHack, an online forum used by computer hackers from all over the world to brag about their exploits and swap ideas, tips and techniques. Brody spent much of his spare time on there. The message was from a member called Crooner42, a username that Brody vaguely recognised. Crooner said he was looking for someone with 'Advanced Pentest Techniques.’ Too late Taylor realises that he has been duped, but his pride won’t let him back down. He decides he will follow through with the challenge.
While working every possible angle to find a way into the seemingly impenetrable site, he becomes aware that a sadistic killer may be following it to pick his victims. Brody’s line of work is illegal in the eyes of the law, but he finesses his way into a police investigation that is searching for a serial killer who is contacting women, arranging to meet with them and then raping and murdering them. He teams up with Detective Jenny Price and uses some of his skills to help solve the case. Of course there is something in it for Brody—in doing so he discovers the illusive thread that lets him nail the challenge he accepted from Crooner42.
But little does he know that in doing so he has placed himself and his career as a hacker in mortal danger.
I highly recommend this book and I will be watching for more Brody Taylor thrillers. Great job Ian Sulivan! WOW!!!
I thoroughly enjoyed this book and intend to read more from this author.
Being in technology, I tried to think ahead of where the plot was going from the technical aspects but found Sutherland displays his tech chops by keeping me guessing. Even so, he explains the technology in terms that readers not familiar with pentests, social engineering or IP addressing can still follow along.
I thoroughly enjoyed this work and look forward to more books in Brody Taylor series.