MainParticle1 black


This site contains affiliate links, which may give a portion of your purchases back to Chris & Cecilia. This percentage is paid by the retailer, not by the customer.


All images used on covers and trailers have been purchased from several photographers and from photography sites such as:


Jenn Le Blanc Photo Smexy Studio (Covers: Alternate Connection, Locked & Reloaded, Ace, Begin Again, Laws of Attraction)

Serg Studios (Cover: Double H)

Hot Damn Stock (Cover: Eight Nights with a Hero Boxset)

Photography Sites:






Public Domain Images from:


Wiki Commons 

Video and audio clips purchased from:






St. Stephen's Green - is a city centre public park in Dublin, Ireland. The park is adjacent to one of Dublin's main shopping streets, Grafton Street, and to a shopping centrenamed for it, while on its surrounding streets are the offices of a number of public bodies and the city terminus of one of Dublin's Luas tram lines. It is often informally called Stephen's Green. At 22 acres (89,000 m2), it is the largest of the parks in Dublin's main Georgian squares.

Grafton Street - is one of the two principal shopping streets in Dublin city centre, the other being Henry Street. It runs from St. Stephen's Green in the south (at the lowest point of the street) to College Green in the north (to the highest point). In 2008, Grafton Street was the fifth most expensive main shopping street in the world, at ‚¬5,621/m².

Eden Quay - is one of the Dublin quays on the banks of the River Liffey in Dublin. The quay runs the bank between O'Connell Bridge and Butt Bridge. The quay is bisected by Marlborough Street, roughly halfway along its length.

Target - The person, place or thing under surveillance.

Marker - Object used to identify who the Target is meeting.

Cryptology - Cryptography (or cryptology; from Greek κρÏ...πτός, kryptos, "hidden, secret"; and γράϕειν, gráphin, "writing", or -λογία, -logia, , "study", respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography includeATM cards, computer passwords, and electronic commerce.

CCTV - Closed-circuit television (CCTV) is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. Surveillance of the public using CCTV is particularly common in the UK, where there are reportedly more cameras per person than in any other country in the world.[3] There and elsewhere, its increasing use has triggered a debate about security versus privacy.

F.A.C.E. - Method developed by Dr. Paul Ekman that provides information about how to recognize signs of emotion in the face.

Decryption - The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password.

NSA - is a cryptologic intelligence agency of the United States Department of Defense responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting U.S. government communications and information systems,[1] which involves cryptanalysis and cryptography.

Keylogging or Keylogger - keystroke logging (often called keylogging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis. -

Kernel - kernel is the central component of most computer operating systems; it is a bridge between applications and the actual data processing done at the hardware level. The kernel's responsibilities include managing the system's resources (the communication between hardware and software components).[1] Usually as a basic component of an operating system, a kernel can provide the lowest-level abstraction layer for the resources (especially processors and I/O devices) that application software must control to perform its function. It typically makes these facilities available to application processes through inter-process communicationmechanisms and system calls.

MDS - Trevor's client on To Russia With Love. An MDS developer called Paul Faber developed the decrypter software stolen. He was also the contact who met Trevor for the exchange of information.

IM format - Instant messaging (IM) is a form of real-time direct text-based communication between two or more people using personal computers or other devices, along with shared software clients. The user's text is conveyed over a network, such as the Internet. More advanced instant messaging software clients also allow enhanced modes of communication, such as live voice or video calling.

FTP uploads -File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one host to another over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server.[1] FTP users may authenticate themselves using a clear-text sign-in protocol but can connect anonymously if the server is configured to allow it.

URL - is a Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it. The word URL means Uniform Resource Locator, and it helps detect a location with the help of, it's network location. The best-known example of the use of URLs is for the addresses of web pages on the World Wide Web, such as

HR - Human Resourscs

.ru, .ua and .ge extensions - Internet website extensions for Russia, Ukraine, and Georgia

ECHELON - is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UK€“USA Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United States, known as AUSCANNZUKUS). It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.

Remote access - communication with a data processing facility from a remote location or facility through a data link.

The General Post Office (GPO) (Irish: Ard-Oifig an Phoist) in Dublin is the headquarters of the Irish postal service, An Post, and Dublin's principal post office. Sited in the centre of O'Connell Street, the city's main thoroughfare, it is one of Ireland's most famous buildings, and was the last of the great Georgianpublic buildings erected in the capital.

Ben Bulben - Sometimes spelt Benbulben or Benbulbin (from the Irish:Binn Ghulbain), is a large rock formation in County Sligo, Ireland. It is part of the Dartry Mountains, an area sometimes called "Yeats Country". Ben Bulben is listed as a protected structure.

Tochka - is a popular euphemism for an outdoor market for prostitutes in Moscow and other large Russian cities, a word literally meaning 'point' or 'location' in Russian.

Glock 23 and the Sig P226 - Default issue handguns for federal officers.

Serial keypad hacker - Small device used to decode and break keypad codes bypassing the security.

Infiltration - The Act of penetrating a group or organization's network without being noticed for purposes such as spying.

Firewall - A computer program or hardware device used to provide additional security on networks by blocking access from the public network to certain services in the private network.

IP address numbers - Stands for "Internet Protocol." It provides a standard set of rules for sending and receiving data through the Internet. People often use the term "IP" when referring to an IP address, which is OK. The two terms are not necessarily synonymous, but when you ask what somebody's IP is, most people will know that you are referring to their IP address.

Traceroute - A tool that can check the path followed by one data packet as it travels through a network such as the Internet.

Vulnerabilities of Computers (general term) - Provide the entry gate for computer attacks. Vulnerabilities persist for a number of reasons, including poor security practices and procedures, inadequate training for individuals responsible for network security, and software products of poor quality.

Exploit (general term) - A software program taking advantage of vulnerabilities in software. An exploit can be used by crackers for breaking security or for otherwise attacking a host over the network.

Sysadmin - A system administrator, systems administrator, or sysadmin, is a person employed to maintain and operate a computer system and/or network. System administrators may be members of an information technology department.

Standalone server - A standalone device is able to function independently and without any outside source of intrusion

Da - Russia word for "Yes". A more forceful, almost rude way of answering the phone instead of Allo.

E&E - Evade & Escape

Operative - The person conducting surveillance

Contact - Any person the subject meets or confers with.

Convoy - A person employed by a subject to detect surveillance. Usually done by following the subject.

Decoy - A person who attempts to divert the operative€™s attention from the subject.

Burnt - Term indication that the subject has discovered the identity of an operative.

Stationary surveillance - The garget is not expected to become mobile.

Mobile surveillance - The target is moving, either walking or in a vehicle.