top of page

 
Broken Codes and Ciphers -
A Stark Warning to the West

Odette.png

Code Name Odette deals with codes and cyphers as well as the dangers of radical penetration agents in Western Intelligence Agencies. What my research revealed was fascinating.

​

I further wanted to explain the difference between a code and a cypher. I found that not many know the difference but I am sure after reading Code Name Odette, you will.

​

We also found out that almost all the decrypted World War Two Bletchley Park cyphers were useless, as workable intelligence goes. On a tactical level, they were rarely used by those needing it most, the ground troops who were fighting the enemy. For these reasons, this makes it an almost useless effort. When you look beyond the romanticised versions of history you must conclude that everyone was reading everyone else’s cyphers and did so habitually.

​

More importantly, currently, it has been uncovered in the research that the damage done by former NSA contractor Edward Snowden to the ability of the West to crack Al-Qaeda and other Muslim terrorist cyphers cannot be described in words.

​

They immediately upgraded all their cyphers after his revelations, we discuss these changes as well. I have no doubts that his actions will and most probably already have murdered American servicemen.

​

This has brought us to another point in Code Name Odette, the penetration of radicals into the Western Intelligence Services since there is an astonishing reluctance to do thorough background checks of new recruits because of the fear of being accused of “Islamophobia.”

​

They don’t ask the pertinent questions and do the necessary checks and appoint men and women almost blindly. It is something that has been discussed in other GMJ Books too, the open-door policy, which will break those Agencies in the years to come. You must be daft to think that spy games are not being played and I have good reasons why I warn.

​

If you care to read the so-called “Al-Qaeda Manual” which has a South African connection that I often explain in my books and first came to the fore when found on the 2005 London Tube bombers computers, all 178 pages of it, if not more, has an entire chapter in it on penetrating Western Agencies. So, the threat is here and the danger present, it makes perfect sense and is in line with other intercepted messages.

Description:

Spymaster extraordinaire, Angelique Dawson and her team are in Nigeria, West Africa, to investigate what she believes is the breaking of cyphers in the UK Embassy in Abuja, the Nigerian capital. Her orbiting satellites have picked up a decoded message that she planted as a barium charge. The trail leads to the small island of São Tomé, famous as a staging base during the Biafran War.

​

To get there she commandeers an old C-7 Caribou, a twin-engine Vietnam era cargo aircraft. Her bodyguard and later husband, former Police Special Forces Company Commander, Geoffrey Foxtrot, is the designated coffee maker, his friend, legendary Special Forces platoon leader Geelslang Peter Ndebele, is acting as co-pilot.

​

All seems to go as planned until complications arise, leaving split second decisions that almost end our heroes lives. This story weaves an interesting plot that will have your head spinning!

​

If you wish to read about Covert and Special Forces Operations in sub-Saharan Africa, the GMJ Books are the place to start. You will learn about covert operations, Special Forces techniques and military history not known outside the select few.

​

This is the eighth book in the popular GMJ Series.

bottom of page