The Stinger Proxy PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download The Stinger Proxy PDF full book. Access full book title The Stinger Proxy by Rick Crawford. Download full books in PDF and EPUB format.

The Stinger Proxy

The Stinger Proxy PDF Author: Rick Crawford
Publisher: Fidelis Publishing. LLC
ISBN: 1956454225
Category : Fiction
Languages : en
Pages : 391

Book Description
Most everyone is familiar with the story of Charlie Wilson' s War, immortalized on the big screen by actor Tom Hanks in the title role. What most people aren' t familiar with are the countless stories of the boots on the ground who helped the determined Congressman Charlie Wilson execute his mission to help free the people of Afghanistan from Soviet occupation. The Stinger Proxy, a novel based on my own personal experience as an Army bomb tech who served in “ Charlie Wilson' s War,” is one such story.Set in 1988 at the height of the Cold War, a large U.S.-funded supply of weapons and ammunition bound for Afghanistan mysteriously explodes in Islamabad, Pakistan. A young Army sergeant is quickly deployed with a hand-picked team of Explosive Ordnance Disposal soldiers to assist the Pakistan Army with cleanup operations. What they uncover is an intricate plot to steal the most valuable of those weapons &– the Stinger missiles that had been helping the Afghan Mujahideen turn the tide against the occupying Soviet Army.The classified mission, led by two seasoned Vietnam veterans, is soon compromised by an unknown security breach and the team is targeted by hostile intelligence operatives. Fearing for the lives of the EOD team, the CIA must hide them in a safehouse until the threat is mitigated.In the course of their work, the American EOD team encounters two integral characters in this tortuous plot. None better than “ Jeb” — the covert Green Beret colonel who has been facilitating weapons shipments to Afghanistan for years. And none worse than “ Whitebeard” — the Pakistani Army general and deputy director of Inter-Services Intelligence who orchestrates the plan to lift the Stingers.With the Stinger missiles now in the wrong hands, it' s anybody' s guess how, or where, they' ll be used. The team must come to terms with the possibility that the Stingers— once bound for Afghanistan— may ultimately have been used in the assassination of Pakistani President Muhammad Zia ulHaq and two American diplomats.Adding to the intrigue is the beautiful CIA Officer “ Tara” who is tasked with tracking the leak that led to the threat against the EOD team. She inadvertently falls for the young sergeant in the process, and the two must reconcile their feelings with the fact that their relationship can' t last.While this story takes place some thirty-three years ago, it is relevant as a contrast and comparison to the current situation in Afghanistan. It speaks to the best intentions of our nation, and how those intentions often go awry.

The Stinger Proxy

The Stinger Proxy PDF Author: Rick Crawford
Publisher: Fidelis Publishing. LLC
ISBN: 1956454225
Category : Fiction
Languages : en
Pages : 391

Book Description
Most everyone is familiar with the story of Charlie Wilson' s War, immortalized on the big screen by actor Tom Hanks in the title role. What most people aren' t familiar with are the countless stories of the boots on the ground who helped the determined Congressman Charlie Wilson execute his mission to help free the people of Afghanistan from Soviet occupation. The Stinger Proxy, a novel based on my own personal experience as an Army bomb tech who served in “ Charlie Wilson' s War,” is one such story.Set in 1988 at the height of the Cold War, a large U.S.-funded supply of weapons and ammunition bound for Afghanistan mysteriously explodes in Islamabad, Pakistan. A young Army sergeant is quickly deployed with a hand-picked team of Explosive Ordnance Disposal soldiers to assist the Pakistan Army with cleanup operations. What they uncover is an intricate plot to steal the most valuable of those weapons &– the Stinger missiles that had been helping the Afghan Mujahideen turn the tide against the occupying Soviet Army.The classified mission, led by two seasoned Vietnam veterans, is soon compromised by an unknown security breach and the team is targeted by hostile intelligence operatives. Fearing for the lives of the EOD team, the CIA must hide them in a safehouse until the threat is mitigated.In the course of their work, the American EOD team encounters two integral characters in this tortuous plot. None better than “ Jeb” — the covert Green Beret colonel who has been facilitating weapons shipments to Afghanistan for years. And none worse than “ Whitebeard” — the Pakistani Army general and deputy director of Inter-Services Intelligence who orchestrates the plan to lift the Stingers.With the Stinger missiles now in the wrong hands, it' s anybody' s guess how, or where, they' ll be used. The team must come to terms with the possibility that the Stingers— once bound for Afghanistan— may ultimately have been used in the assassination of Pakistani President Muhammad Zia ulHaq and two American diplomats.Adding to the intrigue is the beautiful CIA Officer “ Tara” who is tasked with tracking the leak that led to the threat against the EOD team. She inadvertently falls for the young sergeant in the process, and the two must reconcile their feelings with the fact that their relationship can' t last.While this story takes place some thirty-three years ago, it is relevant as a contrast and comparison to the current situation in Afghanistan. It speaks to the best intentions of our nation, and how those intentions often go awry.

Bride by Proxy

Bride by Proxy PDF Author: Lori Power
Publisher: The Wild Rose Press Inc
ISBN: 1509237216
Category : Fiction
Languages : en
Pages : 147

Book Description
Wanderlust flows fast in Captain Garrett McGuire's veins. The last thing he wants is to be tied to England. It's 1798, and the sea and the New World beckon. Before her untimely death, Garrett's beloved mother and her best friend arranged a wedding pact between their children. But they picked the wrong daughter. The younger of the MacLeod daughters, Anne, is more comfortable with her hands in the dirt. She would rather be anywhere than at a ball because her heart was claimed years ago by someone promised to her beloved sister. How, and at what cost, can a longstanding plan be upset?

Chloe: Book One of Chloe's People

Chloe: Book One of Chloe's People PDF Author: Cheryl Chumley
Publisher: Fidelis Publishing. LLC
ISBN: 1956454608
Category : Fiction
Languages : en
Pages : 192

Book Description
Chloe stepped from the school bus into the snowy slush of the sidewalk, flipped her backpack around her shoulders and let loose a string of curse words as her strap broke and books and papers spilled onto the wet ground. "Well now, little child, that's some vocabulary you've got there. But tell me, do you need some help?" The voice boomed in Chloe's ear, and she gazed in wonder into eyes that oddly danced and flashed sparks of white and gold. For a moment, she forgot about rushing home to her angry, alcoholic mother and instead stood still, breathing in deep the sudden scent of vanilla enveloping her. A smile broke from her lips and she very nearly giggled. "I'm Mr. Xander," he said, reaching for her hand with long, large fingers. So began a strange chain of events following Chloe into adulthood as she traveled down dark roads and strayed into shadowy spots, searching for what she knew not in her childhood and so had no idea how to identify and obtain in her maturing years—the grace, love and acceptance of God. But can she leave the darkness for the light? It's a question all sinners must wrestle with and in the end, the only real answer is this: God does indeed work in mysterious ways. ,

The Fear Protocol

The Fear Protocol PDF Author: Brad Newbold
Publisher: Fidelis Publishing. LLC
ISBN: 195645456X
Category : Fiction
Languages : en
Pages : 325

Book Description
In a society where social credit scores dictate worth, the Newman family faces a waking nightmare when their low score lands them in a sixty-day house arrest. Trapped in their home, they're bombarded by an AI named Babble, through their government-controlled "smart devices," indoctrinating them with progressive values. As their resources dwindle, their struggle for survival takes a terrifying turn when they clash with the "Bulls of Bashan," a group of radicals intent on eliminating those deemed unsafe.In The Fear Protocol, Brad Newbold crafts a gripping dystopian tale probing the consequences of an ideology equating beliefs with violence. With pulse-pounding suspense and timely social commentary, this novel challenges readers to confront the dangers invading our world, and the erosion of truth in the pursuit of societal acceptance. Prepare for a riveting journey as the Newman family fights for their humanity against forces determined to erase it.

Popping by Proxy

Popping by Proxy PDF Author: O. E. Young
Publisher:
ISBN:
Category :
Languages : en
Pages : 40

Book Description


Pak Proxy War

Pak Proxy War PDF Author: Rajeev Sharma
Publisher:
ISBN:
Category : Political Science
Languages : en
Pages : 232

Book Description
An Unscrupulous Intelligence Agency Like The Isi Which Has Been Waging A Proxy War Against India For Past Two Decades.... A State Like Pakistan Which Is In Search Of An Identity.... A Militia Like Taliban Which Is Created By These Two To Make Afghanistan The Fifth Province Of Pakistan.... And A Fanatic, Firebrand Muslim Like Osama Bin Laden Who Is Convinced That One Day In Afghanistan (Is) Like A Thousand Days Of Praying In An Ordinary Mosque . Kargil Was Inevitable In The Wake Of All This. It Happened. More Kargils Are Inevitable, Worldwide. Dagestan, Tatarstan, Bashkiria, Ingueshetia, North Ossetia (In Russia), Xinkiang (China), Kyrgyzhstan, Tajikistan, Ujbekistan, Turkmenistan.... The List Is Long. One Man Is Trying To Make It All Happen Bin Laden. One Powerful Secret Agency Is Hand-In-Glove With Him In All This The Isi. Pak Proxy War: A Story Of Isi, Bin Laden And Kargil Focuses On The Saudi Civil Engineer-Turned-Terrorist, Bin Laden, The Taliban And The Isi And How A Combination Of All These Factors Led To Pakistan Army S Intrusion In Kargil. The Book Calls For Taking A Pro-Active Rather Than A Reactive Approach To Pakistan S Threat Of More Kargils Be Paid Back In The Same Coin : More Bangladeshs . Contents Part I: Kargil Chapter 1: The Intrusion, Chapter 2: A Man Called Pervez Musharraf, Chapter 3: Operation Topac, Chapter 4: Making Of The Line Of Control. Part Ii: Pakistan: A Rogue State? Chapter 5: Pakistan Army, Chapter 6: Terrorist Training Camp In Afghanistan And Pakistan, Chapter 7: Markaz-Ud-Daawa-Wal-Irshad (Mdi), Chapter 8: Sipah-E-Sahiba Pakistan (Ssp). Part Iii: A State Within A State Chapter 9: Inter Services Intelligences (Isi), Chapter 10: Profile Of Some Pakistan-Backed Militant Outfits, Chapter 11: Lashkar-E-Tayyiba, Chapter 12: Tehrik-E-Jehad. Part Iv: Bin Laden And Taliban Chapter 13: Osama Bin Laden, Chapter 14: Taliban. Part V: Appendices Appendix 1: Diary Of A Pakistani Soldier, Appendix 2: Pakistan S Role In Fostering Terrorism In Kashmir: Facts And Figures, Appendix 3: Indo-Pak Military Balance, Appendix 4: Political And Constitutional Developments In J&K Since 1947.

Proxy Warfare

Proxy Warfare PDF Author: Andrew Mumford
Publisher: John Wiley & Sons
ISBN: 074567092X
Category : Political Science
Languages : en
Pages : 151

Book Description
Proxy wars represent a perennial strand in the history of conflict. The appeal of ‘warfare on the cheap’ has proved an irresistible strategic allure for nations through the centuries. However, proxy wars remain a missing link in contemporary war and security studies. In this timely book Andrew Mumford sheds new light on the dynamics and lineage of proxy warfare from the Cold War to the War on Terror, whilst developing a cogent conceptual framework to explain their appeal. Tracing the political and strategic development of proxy wars throughout the last century, they emerge as a dominant characteristic of contemporary conflict. The book ably shows how proxy interventions often prolong existing conflicts given the perpetuity of arms, money and sometimes proxy fighters sponsored by third party donors. Furthermore, it emphasizes why, given the direction of the War on Terror, the rise of China as a global power, and the prominence now achieved by non-state actors in the ‘Arab Spring’, the phenomenon of proxy warfare is increasingly relevant to understandings of contemporary security. Proxy Warfare is an indispensable guide for students and scholars interested in the evolution and potential future direction of war and conflict in the modern world.

My Enemy's Enemy

My Enemy's Enemy PDF Author: Geraint Hughes
Publisher: Apollo Books
ISBN: 9781845194499
Category : History
Languages : en
Pages : 254

Book Description
Suitable for contemporary security scholars, and those involved in political/military policy, this title offers terminology intends to clarify scholarly understanding of proxy warfare, a framework for understanding why states seek to use proxies in order to fulfil strategic objectives.

Professional Microsoft Robotics Developer Studio

Professional Microsoft Robotics Developer Studio PDF Author: Kyle Johns
Publisher: John Wiley & Sons
ISBN: 0470500182
Category : Technology & Engineering
Languages : en
Pages : 867

Book Description
Microsoft Robotics Developer Studio (MRDS) offers an exciting new wayto program robots in the Windows environment. With key portions of the MRDS code available in source form, it is readily extensible and offers numerous opportunities for programmers and hobbyists. This comprehensive book illustrates creative ways to use the tools and libraries in MRDS so you can start building innovative new robotics applications. The book begins with a brief overview of MRDS and then launches into MRDS concepts and takes a look at fundamental code patterns that can be used in MRDS programming. You'll work through examples—all in C#—of common tasks, including an examination of the physics features of the MRDS simulator. As the chapters progress, so does the level of difficulty and you'll gradually evolve from navigating a simple robot around a simulated course to controlling simulated and actual robotic arms, and finally, to an autonomous robot that runs with an embedded PC or PDA. What you will learn from this book How to program in the multi-threaded environment provided by the concurrency and coordination runtime Suggestions for starting and stopping services, configuring services, and packaging your services for deployment Techniques for building new services from scratch and then testing them How to build your own simulated environments and robots using the Visual Simulation Environment What robots are supported under MRDS and how to select one for purchase Who this book is for This book is for programmers who are interested in becoming proficient in the rapidly growing field of robotics. All examples featured in the book are in C#, which is the preferred language for MRDS.

Proxy Wars from a Global Perspective

Proxy Wars from a Global Perspective PDF Author: Pawel Bernat
Publisher: Bloomsbury Publishing
ISBN: 1350369292
Category : Political Science
Languages : en
Pages : 216

Book Description
Proxy warfare is a growing international phenomenon. Although states have used proxies in armed conflicts for centuries, evolving regional and global security architecture is now forcing states to radically change the way contemporary conflicts are fought. Based on ten case studies, this reassesses exactly how these changing global and systemic factors are shaping the ways in which states use non-state actors as proxies in their armed conflicts. Examining the use of proxy warfare worldwide, focusing on the last decade's conflicts, this volume brings together contributions from scholars of international relations and global security studies in order to explore cases of armed conflict of particular regional and global significance. These include recent developments in the conflict in Israel and Palestine, the Central African Republic, Libya, Mali, Central Asia, Syria, Ukraine, Nagorno-Karabakh, Brazil and Yemen. By drawing on both theory and practise, it offers a re-evaluation of contemporary understanding of "outsourced warfare", with policy implications for how we understand and negotiate with states using proxy warfare in the future.