In a war where both sides operate in deep disguise, Deep Black must fight a world where betrayal, trust, faith, and doubt collide…. Goodreads helps you keep track of books you want to read. Want to Read saving…. Want to Read Currently Reading Read. Other editions. Enlarge cover. Error rating book.
Refresh and try again. Open Preview See a Problem? Details if other :. Thanks for telling us about the problem. Return to Book Page. Preview — Deep Black by Stephen Coonts. Jim DeFelice Goodreads Author. A spy plane gathering data on a new Russian weapon is blown out of the sky by a mysterious MiG. Is it an accident or the start of the next world war? One U. Get A Copy. Mass Market Paperback , pages. More Details Original Title.
Other Editions Friend Reviews. To see what your friends thought of this book, please sign up. To ask other readers questions about Deep Black , please sign up. Lists with This Book. Community Reviews. Showing Rating details. More filters. Sort order.
Jul 03, Beth rated it really liked it. The audiobook I checked out from the Library was pretty scratched up, so I missed about half of the story. But what I did hear seemed like a good story. View all 4 comments. Jul 22, Jerry B rated it liked it. It's beginning to look like Stephen Coonts doesn't know where to take his career now that the Jake Grafton series has been pretty well tapped out. From his first book "The Intruders" through "America", we've watched Grafton grow from a young naval fighter pilot to an Admiral, providing suspense and thrills certainly on a par with Clancy's Jack Ryan except in much fewer words!
Our leading characters, Charlie Dean, a ex-Marine sniper, and Lia DeFrancesca, a former Delta Force trooper, spend most of the book deep in Russia ferreting out various evidence of mischief by the bad guys.
Activities there alternate with command and control vignettes back at the "Art Room", some sort of conglomerate spy oversight agency. While the story was mildly entertaining at times, we thought the plot and writing skills on display were a departure from what we expect of Coonts.
In particular the gender and sexual tension generated or not between the leads Charlie and Lia were barely beyond adolescent. Much of the technology used by the operatives, such as ear-embedded communications with an agency half-way 'round the globe, remote controlled drone fighters, and many other sensing and locating devices, were rather far-fetched, detracting from the credibility of the plot. It doesn't seem to us Coonts did his fan club any favor with this novel - perhaps it was just to keep his name out there while he gets ready to publish his next hardback?
Our advice: wait! Jan 11, Monica Willyard Moen rated it liked it Shelves: bookshare , mysteries , nls. I felt frustrated by this book. It has an interesting plot, and I like two of the five main characters. The female lead spoiled things for me. The author seemed to use excessive profanity and rudeness to establish how tough she is is instead of showing us.
Her male counterparts didn't behave this way. Of course, she's gorgeous and sexy. I don't generally consider myself a feminist, and I don't go looking for bad examples of women in fiction.
- Group Theory and Its Applications in Physics.
- Deep Black.
- Arctic Gold?
- English Historical Documents: c. 500–1042, Second Edition: 500-1042 Vol 1 (English Historical Documents, 500-1042).
Something about this really jars me, and reduced my en I felt frustrated by this book. Something about this really jars me, and reduced my enjoyment of this book. I'm just not comfortable with it. Do women have to be of noxious and crude to be tough? No, I don't think so.
I have seen other examples of very tough women who behaved like human beings.
They worked full-time hard asses. Feb 09, William Bentrim rated it liked it. The ability of the US government to impact another nation's computers and infrastructure is hypothesized. Of course, I think this is all speculative but how would one know unless perhaps you are Edward Snowden. The book has lots of action and cutting edge tools of destruction. Again, I don't know if any of this stuff exists but the weapons and tech used are typical of a Coonts bo Deep Black by Stephen Coonts Coonts addresses the surveillance expertise of NSA and his fictitious Desk 3 in this book.
Again, I don't know if any of this stuff exists but the weapons and tech used are typical of a Coonts book, lots of whiz-bang and hooha! The story is intricate and shows the value of "boots on the ground" when dealing with data collection. Conspiracy by Stephen Coonts. A Secret Service agent is dead, an apparent sui….
Stephen Coonts' Deep Black: Deep Black on Apple Books
Shelve Conspiracy. Book 7. Arctic Gold by Stephen Coonts. In the Arctic, two American intelligence operativ… More. Shelve Arctic Gold. Book 8. Sea of Terror by Stephen Coonts. Two massive ships are on a… More. Shelve Sea of Terror. Book 9.
Death Wave by Stephen Coonts. Shelve Death Wave.
- Macmillan: Series: Deep Black.
- World Rule: Accountability, Legitimacy, and the Design of Global Governance.
- Reward Yourself;
- Audio Editions.
- Deep Black Series Books (Deep Black) by Stephen Coonts and Jim DeFelice.
Book Tell him we'll agree to terms. His squadron probably ran out of whore money — or jet fuel. Martin once more tried to ignore the conversation. Air pirates were rarely encountered by Dashik since they freely paid the protection fees in advance, but there were always new groups muscling in. Legitimate PVO units obtained quite a bit of "supplemental funding" through their Air Security fees; occasional freelancers got in the act for a few weeks or as long as they could get away with it.
Deep Black (Deep Black Series #1)
The agreement to make a certain credit card payment to a specific account upon landing generally precluded being diverted; if that didn't work, naming a specific PVO general as their protector inevitably got the pirate to break off. Russia's chaos had grown considerably over the past few months; the country's economy, never strong, was once more teetering. Part of the problem had to do with an increase in military expenditures to develop new weapons and deal with insurgencies in the southern parts of the country, but Martin thought the country would have been far better off putting the money into things such as housing or even subsidizing agriculture.
The red clusters on the video screen pulsated as their contents were transmitted. A white dialogue box opened to their right, the computer sniffing a significant sequence. A run of hexadecimals shot across the screen; Martin tapped them to stop the flow of numbers, then pointed below the box. The computers took the intercepted sequence and examined them for signifiers that were used in the current Russian military telemetry and data storage. As smart as they were, Dashik's onboard computers did not have the capacity — or time — to translate the information, let alone hunt for cipher keys or do anything to "break" an encryption.
But that wasn't the point. By identifying the way the information was organized, the system helped operators decide what to capture. Its significance was determined elsewhere. Martin had no idea what Fox Blue, Variation 13, was, only that it was on his list to capture. He directed the system to concentrate all of its energy on tapping the source rather than continuing to scan for others. He debated asking the satellite image library for a close-up of the target building, which looked like a small shed on the bottom screen.
But the library wasn't kept onboard, and requesting the information from SpyNet and having it beamed back down would narrow the transmit flow. An overflow error appeared — clearly this was a very large storage system; the plane's equipment couldn't keep up with the data it was stealing. This is something interesting. In the next second, Martin felt his stomach leave his body.
The aircraft plummeted, twisting in the air on its left wing. As it slammed back in the opposite direction, the seat belt nearly severed his body. The computer sounded a high tone that meant it was losing its ability to reap magnetic signatures; the signal grew sharp and then was replaced by a hum — they were no longer collecting.
The next thing Martin heard was a deep, low rattle that traveled through the floor and up into his seat. He felt cold grip his shoulders but had enough presence of mind to issue a command to the computer. Cleo was not part of command sequence; it was the name of his six-year-old daughter, whom he'd lost to his wife after their divorce five years ago. In the next second, the aircraft flared into a bright meteor in the dark Siberian night.
William Rubens pushed his hands slowly out from his sides as the two men in black ninja uniforms approached. Palms upward, he looked a little like an angel supplicating heaven; he waited patiently while one of them took a small device from his belt and waved it over Rubens' body. About the size and shape of a flashlight, the device scanned Rubens' clothes for circuits that might be used to defeat the next array of sensors, which were positioned in a narrow archway a few feet away. Satisfied that he carried nothing electronic, not even a watch, the ninjas nodded, and Rubens stepped forward through the detector.
The fact that Rubens had led the team that developed both the archway and the circuitry detectors did not exempt him from a thorough check, nor did the fact that, as the head of National Security Agency's Combined Service Direct Operations Division — called simply Desk Three — Rubens was the number two man at the agency. If anything, it made the men work harder.