Code Name OST-M Audiobook By George M James cover art

Code Name OST-M

Virtual Voice Sample

Try for $0.00
Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.

Code Name OST-M

By: George M James
Narrated by: Virtual Voice
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $3.99

Buy for $3.99

Confirm purchase
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.
Cancel

This title uses virtual voice narration

Virtual voice is computer-generated narration for audiobooks.

About this listen

Code Name OST-M deals with deviousness. We show how a good man can end up working for the enemy and not even know it. The scenario is to run a red flag operation on him. You let the person working for you believe that he is working for someone else, someone he has sympathy with. Older readers will recall Sean Connery in “From Russia with Love.” In this film, the Russian female cypher clerk thinks she is working for the KGB but actually she is recruited by and is working for a criminal organisation. In another case, the FBI, before they became the “Clinton Whitewash Bureau,” discovered a female secretary who was leaking documents. She confessed that she thought that she was working for the Brits, a friendly nation, but in fact, she was working for Soviet Intelligence. This became known as the “Emily Syndrome.” The Soviets / Russians are masters at this. I will explain how ordinary people, good solid folk, can be compromised into doing things that they never believed they would. Also revealed is how a mole inside an agency is able to cause havoc until caught. The suspicion and distrust alone destroy efficiency faster than the actual leaks. The mole hunts in MI6 in the 1950s and 1960s are classic examples. But they are needed, if a mole exists, he or she must be found and exterminated. Furthermore, it is shown how advanced computer software is used by counter-espionage. Software is used to track down enemy agents and moles, linking the different ends until the picture is formed. It is extremely seldom that those on the outside are allowed inside a mole-hunting operational HQ, in OST-M, you are right there, inside. Finally we solve the puzzle of the sudden disappearance of Muslim terrorism in South Africa. Description: Spymaster extraordinaire, Angelique Dawson and her longtime chief agent and bodyguard, later her husband, former Police Special Forces Company Commander, Major Geoffrey Foxtrot, is flying an L-39 Albatros advanced trainer high over the Atlantic Ocean. Unexpectedly, the aircraft’s threat receivers go off. They are being scanned by an unseen hostile fighter jet. Seconds later a BVR (Beyond Visual Recognition) air-to-air missile is launched at them and the fight for survival is on. Angelique, an experienced combat pilot, tries everything to evade the incoming missile but to no avail. Because her aircraft is sabotaged, the flare dispensers are burning and stuck and thus increasing the heat signature, the missile slams into the airframe. Angelique and Foxtrot are in a precarious situation, to say the least. How will they manoeuvre themselves out of this one? If you wish to read about covert and Special Forces Operations in sub-Saharan Africa, the GMJ Books are the place to start. You will learn about Special Forces techniques and military history not known outside the select few. This is Book 16 of the popular GMJ Series. Action & Adventure Biographical Fiction Espionage Military
activate_Holiday_promo_in_buybox_DT_T2

What listeners say about Code Name OST-M

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.