James Phelan
6) The Spy
Jed Walker is the man you want watching your back.
A sinister group—code-named Zodiac—has launched a series of devastating global attacks. Twelve targets across the world, twelve code-named missions. Operating distinct sleeper cells, they are the ultimate terrorist organization, watching and waiting for a precise moment to activate the next group. It's a frightening and deadly efficient way to stay one step ahead ... and cause
...7) The Hunted
In 2011, Seal Team Six killed Osama Bin Laden. Now, four years later, someone is eliminating Team Six—one by one.
Jed Walker, ex-CIA, is an outsider back in the game. He's been chasing down a sinister group code-named Zodiac that the big guns—MI5, CIA, the Pentagon—have failed to eradicate. But as Walker follows the trail of bodies, uncovering secrets and making connections he's not supposed to make, he finds the answers
...8) Dark Heart
From bestselling and award-winning author James Phelan, Jed Walker is back in another heart-stopping thriller—Dark Heart.
In war-torn Syria, the lone survivor of a massacre is pulled from beneath a pile of bodies. She is given one instruction: "Find Jed Walker."
Ex-CIA, Walker is a man who thought he was long out of the game. Discovering a terror outfit is smuggling people from the Middle East into the United States, he is drawn
...9) The Agency
From bestselling and award-winning author James Phelan, the thrilling Jed Walker series continues in The Agency.
It's 2005, New Orleans, pre-Katrina, and Jed Walker has just started at the CIA. He's sent on a mission by Harold Richter, CIA field operations legend and trainer of agents provocateur. The task is a one-way ticket—survive and succeed at all costs—and Walker is an off-the-grid, solo, deniable asset.
As Katrina
...10) Kill Switch
Jed Walker has forty-eight hours to save the world.
The countdown has begun ...
The world is under cyber attack. The secretive terror outfit known as Zodiac is preparing to unleash chaos. The options for the hackers are endless.
From massive data breaches, takedowns of critical infrastructure, and commandeering military hardware, nothing networked is safe. Knowing where they will strike is half the battle. The only thing certain
...