<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Intelligence Archives - R. Lawson Author</title>
	<atom:link href="https://rlawsonauthor.com/category/intelligence/feed/" rel="self" type="application/rss+xml" />
	<link>https://rlawsonauthor.com/category/intelligence/</link>
	<description>Intelligent Thrillers</description>
	<lastBuildDate>Thu, 18 May 2017 23:03:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">55015724</site>	<item>
		<title>Contemporary Threats</title>
		<link>https://rlawsonauthor.com/contemporary-threats/</link>
					<comments>https://rlawsonauthor.com/contemporary-threats/#respond</comments>
		
		<dc:creator><![CDATA[R Lawson]]></dc:creator>
		<pubDate>Thu, 18 May 2017 15:42:14 +0000</pubDate>
				<category><![CDATA[About the Series]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cabo Caper]]></category>
		<category><![CDATA[EMP]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Existential Threats]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Killing Time]]></category>
		<category><![CDATA[Retribution]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[The Carrington Prophecy]]></category>
		<category><![CDATA[Biff Roberts]]></category>
		<category><![CDATA[bioterrorism]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[CIA thriller]]></category>
		<category><![CDATA[Counterterrorism]]></category>
		<category><![CDATA[cyberwarfare]]></category>
		<category><![CDATA[security threats]]></category>
		<guid isPermaLink="false">http://rlawsonauthor.com/?p=432</guid>

					<description><![CDATA[<p>The common theme of my five published novels is terrorism and counter-terrorism, a timely and disturbing subject in today&#8217;s world. The threats I cover take many forms- bioterrorism in Cabo Caper, cyberwarfare in Killing Time, targeted assassinations in Retribution, radical Islamic Jihadists in Existential Threats, and the threat of a North Korean nuclear EMP (Electromagnetic [&#8230;]</p>
<p>The post <a href="https://rlawsonauthor.com/contemporary-threats/">Contemporary Threats</a> appeared first on <a href="https://rlawsonauthor.com">R. Lawson Author</a>.</p>
]]></description>
		
					<wfw:commentRss>https://rlawsonauthor.com/contemporary-threats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">432</post-id>	</item>
		<item>
		<title>78 Spy Terms and Spying Jargon</title>
		<link>https://rlawsonauthor.com/78-spy-terms-and-spying-jargon/</link>
					<comments>https://rlawsonauthor.com/78-spy-terms-and-spying-jargon/#comments</comments>
		
		<dc:creator><![CDATA[R Lawson]]></dc:creator>
		<pubDate>Sat, 27 Aug 2016 22:01:56 +0000</pubDate>
				<category><![CDATA[About the Series]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Spying]]></category>
		<category><![CDATA[The Carrington Prophecy]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[spy jargon]]></category>
		<category><![CDATA[Spy terminology]]></category>
		<category><![CDATA[spy terms]]></category>
		<guid isPermaLink="false">http://rlawsonauthor.com/?p=375</guid>

					<description><![CDATA[<p>Spy Jargon and Terminology Spy novels often use language unfamiliar to those new to the reading this genre. Some terms are colorful, imaginative, but all have an intended meaning known to those in the field. I use them a lot in my stories to add that certain flavor, to add authenticity, build suspense, and increase [&#8230;]</p>
<p>The post <a href="https://rlawsonauthor.com/78-spy-terms-and-spying-jargon/">78 Spy Terms and Spying Jargon</a> appeared first on <a href="https://rlawsonauthor.com">R. Lawson Author</a>.</p>
]]></description>
		
					<wfw:commentRss>https://rlawsonauthor.com/78-spy-terms-and-spying-jargon/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">375</post-id>	</item>
		<item>
		<title>Malware, Intelligence and Espionage</title>
		<link>https://rlawsonauthor.com/hacking-malware-intelligence-espionage/</link>
					<comments>https://rlawsonauthor.com/hacking-malware-intelligence-espionage/#respond</comments>
		
		<dc:creator><![CDATA[R Lawson]]></dc:creator>
		<pubDate>Wed, 29 Jun 2016 00:15:10 +0000</pubDate>
				<category><![CDATA[About the Series]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Killing Time]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Retribution]]></category>
		<category><![CDATA[black hat]]></category>
		<category><![CDATA[CIA intelligence]]></category>
		<category><![CDATA[copmputer virus]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[international espionage]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[spy games]]></category>
		<category><![CDATA[white hat malware]]></category>
		<guid isPermaLink="false">http://rlawsonauthor.com/?p=327</guid>

					<description><![CDATA[<p>Hacking with Malware It all depends whether you are a White Hat or Black Hat when it comes to a national intelligence agency&#8217;s anticipated outcome in a hacking scheme. Are you the  good guy or bad guy in the hacking game?  The hacker or hackee? Most would agree it&#8217;s best to be the hacker controlling [&#8230;]</p>
<p>The post <a href="https://rlawsonauthor.com/hacking-malware-intelligence-espionage/">Malware, Intelligence and Espionage</a> appeared first on <a href="https://rlawsonauthor.com">R. Lawson Author</a>.</p>
]]></description>
		
					<wfw:commentRss>https://rlawsonauthor.com/hacking-malware-intelligence-espionage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">327</post-id>	</item>
	</channel>
</rss>
