Rules of Engagement

A Novel

This title was previously available on NetGalley and is now archived.
Buy on Amazon Buy on BN.com Buy on Bookshop.org
*This page contains affiliate links, so we may earn a small commission when you make a purchase through links on our site at no additional cost to you.
Send NetGalley books directly to your Kindle or Kindle app

1
To read on a Kindle or Kindle app, please add kindle@netgalley.com as an approved email address to receive files in your Amazon account. Click here for step-by-step instructions.
2
Also find your Kindle email address within your Amazon account, and enter it here.
Pub Date Jun 25 2019 | Archive Date Jun 25 2019

Description

"In Rules of Engagement, David Bruns and J. R. Olson deliver a captivating and utterly authentic portrayal of modern day combat that compares with the best of the timeless classics by Tom Clancy, Dale Brown, and Stephen Coonts. This one must not be missed!" —Mark Greaney, #1 New York Times bestselling author of Mission Critical

A terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III.

Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he’s disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he’s about to unleash his virtual masterpiece—a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. First penetrating the Chinese, he has their war machine launch a series of attacks on the U.S. Pacific forces.

Don Riley, head of U.S. Cyber Command, discovers that not only have the Chinese lost control of their military, but the same virus has infected the American network. It’s only a matter of time before the U.S. loses control of its own military. His secret weapon in this war is a trio of supremely talented midshipmen from the U.S. Naval Academy, who uncover the infiltration, and are working to track down the elusive terrorist.

But time is running out. China and Japan have lost control of their military and the U.S. is in danger of doing the same. The weapons are hot and the result is an ever-larger real-world conflict where casualties continue to mount. The only remaining hope is to find and stop the attack at its source—before time runs out.

"In Rules of Engagement, David Bruns and J. R. Olson deliver a captivating and utterly authentic portrayal of modern day combat that compares with the best of the timeless classics by Tom Clancy...


Available Editions

EDITION Other Format
ISBN 9781250200310
PRICE $27.99 (USD)
PAGES 336

Average rating from 17 members


Featured Reviews

The authors themselves acknowledge that thier writing style is reminiscent of early Tom Clancy work, and I couldn't agree more. The action flows smoothly and the characters are believable. The villain is very dangerous but is human enough to make mistakes. The midshipmen are probably being groomed for follow on stories which is perfectly fine. They deserve more time in print. The techno jargon is explained just enough to be believable but to so to lose the reader. Well worth the read!

Was this review helpful?

This book reminded me of a classic Tom Clancy thriller. I could not put the book down. It is a mesmerizing tale. Looking for more from Bruns and Olson.

Was this review helpful?

The authors have presented a modern story of war. This is opposed to descriptions of battle in past centuries such as "War and Peace" "All Quiet On the Western Front" and "Battle Cry". Those presented descriptions of men and women fighting other humans face to face. " Rules of Engagement" deals with computers against computers guided by men and women working behind the lines.
Rafid Roshed is one of the most wanted men in the world with years of violent crimes against the west. He has developed an arrangement with North Korea and helps them launch Cyber attacks against their enemies which are the U.S., China and Japan. His latest development is a computer virus that once inserted into a country's command system can gain control and begin to learn how to carry on on it's own. As the story opens Roshed's virus has already gained control of China's system and has guided the Chinese Air force and navy into attacking both the United States and Japan. This occurs without the permission and against the will of the Chinese government.
Don Riley, the head of U.S. Cyber command with the help of three brilliant midshipmen loaned by the naval academy at Annapolis take on the task of finding and destroying the deadly virus. At the same time their mission would be to kill or capture Roshed. As in any good war story the action is swift and constant. The book describes the systems utilized in the war and does not utilize an idiom outside of the normal reader's complete understanding in doing so. Very engrossing and very well done and an excellent reason to keep an eye out for more from the authors.

Was this review helpful?

This is excellent -- Fast paced, interesting and creative plot, plus well written characters (including important female characters, which is still pretty unusual in this kind of novel). This is a very talented writing duo, and I look forward to more! Recommended.

I really appreciate the ARC for review!

Was this review helpful?

The most wanted man in the world isn’t a religious zealot or a some 3rd world megalomaniac. He’s a man driven by revenge. To avenge the loss of his wife that forced him underground and his children to live in exile. Rafiq Roshed.

He has trained himself to see and execute small and extensive cyber-attacks on the people responsible. That would be the west in general and the USA in particular. But he can’t do this on his own. He needs a sponsor. Pak Myung-rok is Kim Jong-un’s go-to guy when the Supreme Leader wants something done that can’t be traced back.

Roshed’s latest attack was directed at the power hubs up and down the East Coast. 36 million people were affected. Effective, but it wasn’t crippling. The leash on Pak has some flexibility and some representatives of the various Russian mobs have asked Pak to help them with some business. A lack of sustained hostilities in the far east means that the sale of weapons has dropped off considerably. In their infinite wisdom, the mob figures that a little nudge might touch off a raised level of suspicion between China and Japan.

The plan developed by Roshed involves a deep hack into the Chinese and Japanese military networks. A hack so deep that Roshed can in near complete charge of the command and control for each country. And the hack is a learning system. Touch one part of the code and another activates that tells other routines to turn on or shut off.

A higher up in US cyber security is Don Riley. When times are quasi-quiet, he teaches a seminar at Annapolis. Mostly for upper classmen, he has managed to get permission for a talented plebe (freshman) to enroll. Three students have demonstrated exceptional skills. Midshipman 2nd class (college Jr.) Andrea Ramirez is about the fastest coder he’s ever seen. Don Goodwin, the plebe, has an extraordinary ability to see patterns in code. Sort of like seeing a couple jigsaw puzzles mixed and spread out and be able to assemble both in seconds. And Midshipman 1st class (college Sr.) Janet Everett takes what Goodwin sees and Ramirez codes and from her 10,000 ft view, sees what, when, and where outcomes should happen. The leader of the pack of students.

Riley’s no fool. He persuades his bosses to get this trio read in on progressively higher and higher levels of security that goes along with increasingly intensive levels of responsibility and danger.

Roshed tunnels his way into the Chinese and Japanese networks. His own team rivals Riley’s team. But Roshed has gone one step further. A step expressly forbidden by the Supreme Leader. He’s also hacked into the increasingly complex US system. And it’s here that Roshed’s plans could potentially lead to WWIII.

Flyovers that skirt sovereign airspace. Ships that may or may not be in territorial waters. Responses that used to be just a supersonic fly-by are now ordered to fire. Planes are downed. Ships get sunk. Submarines are being ordered to attack a US carrier. Crap is getting out of hand.

To stay out of WWIII, the hack of the US system has to be halted, be it killed or just distracted. Not to mention that the source of these actions have to be tracked down. Coders and hackers on both sides become unwilling participants in a shooting war.

Early reviews of this book say it pays homage to early Tom Clancy techno-thrillers. Hard to argue with that. Clancy’s early books jumped up and down the chain of command on both sides of any conflict in glamorous and shithole locations around the world. That formula worked for Clancy and boy does it works for Bruns/Olson.

It's a bit of serendipity that I read this right after reading Sting of the Wasp. Both have the same theme: a chase to find a most wanted terrorist with one main difference. Wasp followed a small team with a mostly silent back-up team and this book involves an all hands on deck hunt by the US military cyber force.

The authors are USNA grads and the requisite post-Annapolis naval careers. Always great when insider experiences are the foundation of a book’s details. They always say, ‘write about what you know’ and that is on full display. Now I’ve never been a fan of co-authored novels because the final product almost seems like a watered down compromise of writing styles. Not here. This collaboration is seamless. Bruns and Olson have done a few self-financed and self-published books so they’ve cut their teeth admirably in this co-author business. This is the first of a two-book deal with St. Martin’s Press. If you’ve missed the authenticity of Clancy’s techno-thriller genre and continue to look for similar books, look no more. You won’t be disappointed.

Available June 25, 2019

Was this review helpful?

The world is a cauldron, ready to boil over at any moment. North Korea is testing missiles that could possibly reach the continental U.S., Putin wants to rebuild the USSR and China wants to expand its territory in the South China Sea. To fight all this, the American military has developed a communications network that can operate independently of the orbiting satellite network. There’s just one problem: unknown to them, the network has been hacked by a long-sought terrorist working for Kim Jong-un. Tensions between China and America rise when China appears to launch an unprovoked attack on U.S. Naval ships and faces an in-kind response. The only hope to stop a full-fledged war is with three Naval Academy Midshipmen. The question is, can they act in time?

Rules of Engagement by David Bruns and J. R. Olson is a well-written, ripped-from-the-headlines novel. While some of the technology in the novel is still in the future, much of what the author refers to is quite real. Bruns and Olson both have a wealth of real-world naval experience from which to draw inspiration, having both been officers for a number of years. Their writing style will appeal to fans of Clancy and Bond. I absolutely loved this novel and give it 4/5 stars.

*A copy of the ebook was the only compensation received in exchange for this review. *

Was this review helpful?

Readers who liked this book also liked: