This author participates in the Readers' Favorite Free Book Program, which is open to all readers and is completely free. The author will provide you with a free copy of their book in exchange for an honest review. You and the author will discuss what sites you will post your review to and what kind of copy of the book you would like to receive (eBook, PDF, Word, paperback, etc.). To begin, click the purple email icon to send this author a private email.
This author participates in the Readers' Favorite Book Review Exchange Program, which is open to all authors and is completely free. Simply put, you agree to provide an honest review an author's book in exchange for the author doing the same for you. What sites your reviews are posted on (B&N, Amazon, etc.) and whether you send digital (eBook, PDF, Word, etc.) or hard copies of your books to each other for review is up to you. To begin, click the purple email icon to send this author a private email, and be sure to describe your book or include a link to your Readers' Favorite review page or Amazon page.
This author participates in the Readers' Favorite Book Donation Program, which was created to help nonprofit and charitable organizations (schools, libraries, convalescent homes, soldier donation programs, etc.) by providing them with free books and to help authors garner more exposure for their work. This author is willing to donate free copies of their book in exchange for reviews (if circumstances allow) and the knowledge that their book is being read and enjoyed. To begin, click the purple email icon to send this author a private email. Be sure to tell the author who you are, what organization you are with, how many books you need, how they will be used, and the number of reviews, if any, you would be able to provide.
Reviewed by Faridah Nassozi for Readers' Favorite
When mysterious and extremely disturbing videos, containing confidential details of the affected people, start popping up on the computers of CIA employees, the CIA suspects a virus. The virus, affecting the entire intelligence community, however, seems to have special interest in a particular division of the CIA, one which handles highly classified satellite imagery interpretation. The CIA, fearing the worst, brings in a highly recommended hacker to help clean up their system, but then people start dying. A CIA programmer with a 'too good to be true' boyfriend with ulterior motives and devious ways, a hacker on loan from a Canadian prison cell, and a stressed-out police detective team up and start working a number of theories including terrorist cyber attack, technology meltdown, psychological campaign on CIA employees, and denial of service attack in a bid to get to the bottom of the problem. It is up to these three to track down the virus and/or whoever is behind it and save the CIA, the entire intelligence community and maybe even the entire nation from a likely disaster.
Wow, I absolutely loved reading Buzzworm by Theo Cage. It is filled with enough intrigue to keep you glued to the pages and reading nonstop to the ending you never see coming. Buzzworm is not your everyday CIA spy game novel; it is a very captivating story which combines all the aspects of a thrilling CIA story, but the plot is unique, utterly believable and very thrilling. The story takes you behind the scenes and gives you an in-depth tour into the back office operations of the CIA and the technology that holds together the intelligence community. What fascinated me even more is Theo Cage's transfixing description of the workings of the hacker community.