Chapter Index
    Cover of Assassin’s Revenge–A David Slaton Novel
    Adventure FictionThriller

    Assassin’s Revenge–A David Slaton Novel

    by Larsen, Ward
    “Assassin’s Revenge—A David Slaton Novel” by Ward Larsen follows former assassin David Slaton as he is drawn back into a world of danger when a shadowy adversary targets his family. Forced to confront his past, Slaton employs his lethal skills to unravel a conspiracy that spans international borders. The novel explores themes of vengeance, loyalty, and the moral complexities of retribution, blending high-stakes action with intricate plotting. Larsen’s taut prose and relentless pacing make this a standout thriller, appealing to fans of espionage and suspense. The book underscores the enduring consequences of violence and the personal cost of redemption.

    The chap­ter opens with Sla­ton, a Mossad oper­a­tive, and Mordechai, an IAEA offi­cial, din­ing togeth­er after a series of har­row­ing events. Sla­ton, still reel­ing from attempt­ed assas­si­na­tions and inter­ro­ga­tions, bare­ly notices his meal, while Mordechai eats vora­cious­ly. Their con­ver­sa­tion quick­ly turns to Mordechai’s sus­pi­cions about El-Mas­ri, a col­league at the IAEA, whom he believes is involved in illic­it activ­i­ties. Mordechai reveals he attempt­ed to hack El-Masri’s secure lap­top using a known vul­ner­a­bil­i­ty but failed, poten­tial­ly alert­ing El-Mas­ri to the breach. This fail­ure may have trig­gered the recent attacks on Sla­ton and Mordechai.

    Mordechai explains that El-Masri’s lap­top had an addi­tion­al fire­wall, thwart­ing his efforts. Worse, Mordechai sus­pects El-Mas­ri retal­i­at­ed by hack­ing his own com­put­er, inter­cept­ing a mes­sage Mordechai had sent to Sla­ton for help. The altered mes­sage lured Sla­ton into a trap, sug­gest­ing El-Mas­ri or his allies knew inti­mate details about Slaton’s past and fam­i­ly. Sla­ton ques­tions how El-Mas­ri could have uncov­ered such clas­si­fied infor­ma­tion, lead­ing both men to spec­u­late about pos­si­ble col­lab­o­ra­tors, rang­ing from state intel­li­gence ser­vices to ter­ror­ist groups.

    The dis­cus­sion shifts to El-Masri’s cur­rent whereabouts—Pakistan’s PARR-II reac­tor, where he is over­see­ing the extrac­tion of high­ly enriched ura­ni­um (HEU). Mordechai explains that Pakistan’s nuclear weapons facil­i­ties are off-lim­its to IAEA over­sight, but PARR-II is mon­i­tored as a research reac­tor. Sla­ton deduces that El-Masri’s trip aligns with his sus­pect­ed pat­tern of divert­ing nuclear mate­ri­als. Mordechai esti­mates El-Mas­ri will return to Vien­na soon, set­ting the stage for a poten­tial con­fronta­tion.

    As the chap­ter con­cludes, Mordechai pro­pos­es team­ing up with Sla­ton to inves­ti­gate El-Mas­ri fur­ther. Sla­ton, ini­tial­ly reluc­tant, weighs the pros and cons of col­lab­o­ra­tion. While work­ing alone offers greater con­trol, part­ner­ing with Mordechai could pro­vide valu­able resources. The chap­ter ends on a sus­pense­ful note, with Sla­ton sip­ping his cof­fee, leav­ing his deci­sion unre­solved but hint­ing at a pos­si­ble alliance to uncov­er El-Masri’s schemes.

    FAQs

    • 1. What was Mordechai’s initial suspicion about El-Masri, and what steps did he take to investigate further?

      Answer:
      Mordechai suspected El-Masri of wrongdoing but lacked concrete evidence. During an audit, he found circumstantial evidence that raised his suspicions. To gather more definitive proof, he decided to hack into El-Masri’s secured work computer, exploiting a known weakness in the IAEA’s internal encryption software that he was aware of due to his oversight role in information security. However, his attempt was thwarted by a secondary firewall on El-Masri’s device, potentially alerting El-Masri to the breach attempt. This risky move may have escalated the situation, leading to the subsequent events.

      2. How does the chapter illustrate the tension between Slaton and Mordechai’s current predicament and their mundane surroundings?

      Answer:
      The chapter juxtaposes the life-threatening dangers Slaton has recently faced—assassination attempts, abduction, and interrogation—with the ordinary setting of a restaurant where he and Mordechai dine. While Slaton is too preoccupied with his unsettled life to enjoy the meal, Mordechai eats heartily, indifferent to the culinary experience. This contrast highlights how their extreme circumstances render them disconnected from normalcy. The roast lamb and gnocchi become trivial compared to their urgent discussion about El-Masri’s potential betrayal and the looming threat, emphasizing the dissonance between their reality and the peaceful restaurant ambiance.

      3. What possible explanations does Slaton consider for how El-Masri (or his associates) might have uncovered his identity and family details?

      Answer:
      Slaton theorizes that El-Masri, upon detecting Mordechai’s hacking attempt, may have reversed the breach to access Mordechai’s communications. Since Mordechai had tried to contact Slaton for help, El-Masri could have intercepted the message. However, Slaton questions how El-Masri would have known his Mossad background, specialty, and family details, suggesting El-Masri likely had help from a knowledgeable group—possibly a state intelligence service (like Egypt’s Mukhabarat), a terrorist organization, or another hostile entity. The mention of “Polaris Venture” in Mordechai’s message might have also triggered further investigation by El-Masri’s allies.

      4. Why is El-Masri’s current location significant, and what does it imply about his potential activities?

      Answer:
      El-Masri is in Pakistan, overseeing a HEU (highly enriched uranium) extraction at the PARR-II research reactor. This is significant because it mirrors previous operations where nuclear material was diverted under the guise of legitimate IAEA oversight. Slaton immediately connects this to another possible theft scheme, suggesting El-Masri could be repeating the same illicit activity—stealing weapons-grade material during the downblending process. The fact that Pakistan restricts access to its weapons facilities but allows IAEA monitoring of PARR-II makes it an ideal target for such an operation, heightening suspicions about El-Masri’s intentions.

      5. How does Slaton weigh the pros and cons of partnering with Mordechai, and what does this reveal about his operational mindset?

      Answer:
      Slaton prefers working alone but considers collaborating with Mordechai due to the latter’s insider knowledge and research capabilities. He recognizes the benefits of shared intelligence but also acknowledges the risks: increased security vulnerabilities and the need to trust Mordechai. This deliberation reveals Slaton’s pragmatic and cautious approach—he values efficiency and resources but prioritizes operational security. His hesitation reflects his experience as a former Mossad operative, where trust is earned, and partnerships are carefully evaluated for potential compromises. The chapter ends on this unresolved note, leaving his decision pending.

    Quotes

    • 1. “Any appreciation for the tastes or textures of the meal was lost on Slaton—and so it would remain until his life was righted.”

      This opening line sets the tone for the chapter, illustrating Slaton’s state of mind after surviving assassination attempts and interrogations. It underscores how trauma overshadows even basic human experiences like eating.

      2. “I suppose you could say I repeated my previous great mistake—I hacked into El-Masri’s work computer.”

      Mordechai’s admission reveals his desperation to uncover evidence against El-Masri, while also showing his recurring pattern of risky behavior. This action sets in motion the chapter’s central conflict about compromised cybersecurity and its consequences.

      3. “If El-Masri really is stealing weapons-grade material, he’s not doing it alone… It could be anybody from a state intelligence service to a terror group.”

      This quote captures the chapter’s pivotal turning point where Slaton and Mordechai realize the potential scale of the conspiracy. It expands the threat beyond one individual to potentially dangerous international actors.

      4. “To include Mordechai meant trusting him, at least to a point. It would present twice the security headache. But also twice the research capacity.”

      This internal monologue reveals Slaton’s crucial decision-making process about collaboration. It perfectly encapsulates the tension between operational security and investigative efficiency that drives the chapter’s conclusion.

    Quotes

    1. “Any appreciation for the tastes or textures of the meal was lost on Slaton—and so it would remain until his life was righted.”

    This opening line sets the tone for the chapter, illustrating Slaton’s state of mind after surviving assassination attempts and interrogations. It underscores how trauma overshadows even basic human experiences like eating.

    2. “I suppose you could say I repeated my previous great mistake—I hacked into El-Masri’s work computer.”

    Mordechai’s admission reveals his desperation to uncover evidence against El-Masri, while also showing his recurring pattern of risky behavior. This action sets in motion the chapter’s central conflict about compromised cybersecurity and its consequences.

    3. “If El-Masri really is stealing weapons-grade material, he’s not doing it alone… It could be anybody from a state intelligence service to a terror group.”

    This quote captures the chapter’s pivotal turning point where Slaton and Mordechai realize the potential scale of the conspiracy. It expands the threat beyond one individual to potentially dangerous international actors.

    4. “To include Mordechai meant trusting him, at least to a point. It would present twice the security headache. But also twice the research capacity.”

    This internal monologue reveals Slaton’s crucial decision-making process about collaboration. It perfectly encapsulates the tension between operational security and investigative efficiency that drives the chapter’s conclusion.

    FAQs

    1. What was Mordechai’s initial suspicion about El-Masri, and what steps did he take to investigate further?

    Answer:
    Mordechai suspected El-Masri of wrongdoing but lacked concrete evidence. During an audit, he found circumstantial evidence that raised his suspicions. To gather more definitive proof, he decided to hack into El-Masri’s secured work computer, exploiting a known weakness in the IAEA’s internal encryption software that he was aware of due to his oversight role in information security. However, his attempt was thwarted by a secondary firewall on El-Masri’s device, potentially alerting El-Masri to the breach attempt. This risky move may have escalated the situation, leading to the subsequent events.

    2. How does the chapter illustrate the tension between Slaton and Mordechai’s current predicament and their mundane surroundings?

    Answer:
    The chapter juxtaposes the life-threatening dangers Slaton has recently faced—assassination attempts, abduction, and interrogation—with the ordinary setting of a restaurant where he and Mordechai dine. While Slaton is too preoccupied with his unsettled life to enjoy the meal, Mordechai eats heartily, indifferent to the culinary experience. This contrast highlights how their extreme circumstances render them disconnected from normalcy. The roast lamb and gnocchi become trivial compared to their urgent discussion about El-Masri’s potential betrayal and the looming threat, emphasizing the dissonance between their reality and the peaceful restaurant ambiance.

    3. What possible explanations does Slaton consider for how El-Masri (or his associates) might have uncovered his identity and family details?

    Answer:
    Slaton theorizes that El-Masri, upon detecting Mordechai’s hacking attempt, may have reversed the breach to access Mordechai’s communications. Since Mordechai had tried to contact Slaton for help, El-Masri could have intercepted the message. However, Slaton questions how El-Masri would have known his Mossad background, specialty, and family details, suggesting El-Masri likely had help from a knowledgeable group—possibly a state intelligence service (like Egypt’s Mukhabarat), a terrorist organization, or another hostile entity. The mention of “Polaris Venture” in Mordechai’s message might have also triggered further investigation by El-Masri’s allies.

    4. Why is El-Masri’s current location significant, and what does it imply about his potential activities?

    Answer:
    El-Masri is in Pakistan, overseeing a HEU (highly enriched uranium) extraction at the PARR-II research reactor. This is significant because it mirrors previous operations where nuclear material was diverted under the guise of legitimate IAEA oversight. Slaton immediately connects this to another possible theft scheme, suggesting El-Masri could be repeating the same illicit activity—stealing weapons-grade material during the downblending process. The fact that Pakistan restricts access to its weapons facilities but allows IAEA monitoring of PARR-II makes it an ideal target for such an operation, heightening suspicions about El-Masri’s intentions.

    5. How does Slaton weigh the pros and cons of partnering with Mordechai, and what does this reveal about his operational mindset?

    Answer:
    Slaton prefers working alone but considers collaborating with Mordechai due to the latter’s insider knowledge and research capabilities. He recognizes the benefits of shared intelligence but also acknowledges the risks: increased security vulnerabilities and the need to trust Mordechai. This deliberation reveals Slaton’s pragmatic and cautious approach—he values efficiency and resources but prioritizes operational security. His hesitation reflects his experience as a former Mossad operative, where trust is earned, and partnerships are carefully evaluated for potential compromises. The chapter ends on this unresolved note, leaving his decision pending.

    Note