RAY SCOTT NOVELS
'Doubt of the Benefit' has just been released. His first book, 'The Fifth Identity', a mystery thriller, was published by Amazon as an e-book in 2012. The second book, 'Cut to the Chase', a thriller, was published in 2014 and was published as a paperback by Sid Harta Publishers of Melbourne and distributed through Dennis Jones & Associates of Bayswater.

IN COURSE OF PREPARATION

The Renegade

A Russian embassy official approaches an MI 5 building in London on a Sunday morning, wishing to defect, but is instructed to return the following day. Within hours, KGB operatives descend upon his London apartment.

Fortunately, the defector stayed overnight in an hotel and sought asylum the next day at a Guildford police station.  MI 5 has a problem…who turned him away that Sunday morning? Was he betrayed?

A team is appointed to investigate, is there a mole? If so, he or she must be located and apprehended before further damage is done. Then help comes from an unexpected quarter, from ASIO in Canberra.

Dangerous Trade-In

A computer technician replaces an old computer system for a client, but instead of delivering it to his employer trades it in at a local computer shop and pockets the cash. The shop-keeper offloads it to his employee, Donald Taylor, who wanted a back-up computer for private use.

Taylor sets up the system at his apartment, but some of the former user’s data is still on disc. Before deleting it Taylor idly checks though it, and discovers it details a proposed terror attack in Melbourne. He downloads it onto a disc, phones his employer to say what he’s found, and returns to the shop to show it to him prior to reporting it. But when he arrives his employer is being bailed up by the computer’s previous owners, who have just traced it. The shop-keeper is stabbed to death, after firstly revealing he knew what was on it, and secondly where the computer is. Taylor is a horrified witness, his presence undetected by the attackers.

The attackers flee, Taylor attempts First Aid, but his employer’s wife enters the shop and assumes Taylor is the killer. Taylor panics and heads for home but discovers the killers are already there to recover their computer and silence him.

Taylor is subsequently arrested for murder by police but not before he contacts ASIO and tells them what he’s discovered. The intelligence organization and the police must track down the original owners of the computer, but the original computer technician, who could supply the lead, has disappeared without trace. ASIO and the police have roughly isolated the date and whereabouts of the proposed attack, and with limited time at their disposal, must forestall it.