241:, a Russian hacker and identity thief, is questioned by the FBI and brought into the investigation by Sebeck. Unfortunately, traditional investigation methods are useless against Sobol's Daemon program. Ross eventually deduces that the Daemon can anticipate their every move, seemingly one step ahead of anyone who tries to interfere with its operation. Even after being named in the Daemon hoax (and put on the FBI's most wanted list), Ross willingly helps the US government to stop the program. Assigned to the NSA's anti-Daemon task force, with Agent Phillips, he is a firsthand witness to Loki's attack on the installation and barely survives the massacre that follows. With his immunity deal rescinded, he vanishes underground with the intent on destroying the Daemon on his own.
248:
herring, but fear of the Daemon forces his hand and his team is ordered to secure the site regardless. His team is quickly killed, and he remains the lone survivor, infiltrating the house and accidentally triggering a bomb, which levels the property. Blamed for the failure, he is relieved of duty but is later brought onto the anti-Daemon task force by the Major. When Loki is revealed to have infiltrated the building, Roy pursues him, against orders. Fearful of the publicity that the chase will generate, the Major kills Roy himself. Despite being an enemy to the Daemon, he becomes a folk hero of the
Darknet, known as "The Burning Man" by the Darknet users, who respect him for his tenacity.
271:, unnamed throughout the series, is introduced as a secret DOD liaison assigned to the daemon task force. Soon, everyone who encounters him realizes that his history is checkered, and his loyalty remains with the military-industrial complex now under attack by the Daemon. When Loki massacres the task force, he quickly contains the situation by destroying all evidence (including leveling the building) and personally executing Roy Merritt, fearful that Merritt's pursuit of Loki will attract too much attention. Realizing that they have underestimated the Daemon and its network, the Major retreats and prepares to wage a secret war against the Daemon and its agents.
254:, a genius workaholic government cryptographer. Phillips joins the investigation shortly after the FBI is called in. Eventually, she is placed in charge of the anti-Daemon task force, but she finds plenty of interference from the Major. She is attracted to Jon Ross (the attraction is mutual), but she quickly states that national security will take precedence and their relationship will remain professional. Phillips objects to the murder of Sebeck to protect infected corporate systems from the Daemon's wrath. One of a handful survivors from Loki's attack, Phillips is blamed for the failure and relieved of duties.
235:
frames Sebeck for its creation as a multi-million scheme and a hoax. The US government, though knowing the truth, fast tracks Sebeck's trial and executes him eight months later. Sebeck makes peace with his wife, who loves him despite the fact that Sebeck is having an affair, but his son Chris remains estranged, and he proclaims his innocence while dying from lethal injection. However, Sebeck later awakens to learn that the Daemon faked his death and assigned him the task to prove that humanity deserves its freedom from the Daemon. Joined by a fellow operative named Laney Price, Sebeck vanishes into
America.
265:
and quickly becomes one of the most powerful operatives. His behavior, though useful to the Daemon, is hated and feared even by other
Darknet members. His first major act is to infiltrate the anti-Daemon task force. When found out, he quickly triggers an attack, which leaves most of the people and agents there dead. He is pursued by Roy Merritt, as he escapes and witnesses the Major executing Roy, vowing to kill the Major for betraying his own man.
285:
deemed acceptable to serve. He eventually becomes a security operative, assigned jobs such as executing criminals, participating a massive worldwide assassination of spammers who corrupt the internet. Mosley's only request is for the Daemon to locate his missing son and protect him. Ray is both found and sent to live with Daemon agents, who will raise and educate Ray in a safe family-like setting.
264:
and other cyber crimes. After running afoul of some hackers from the
Philippines, he allows his partner in crime, Jason Heider, to be killed in his place. Needing to lie low, Loki is recruited by the Daemon by outthinking a hidden game level in one of Sobol's games. Loki is the first Daemon operative
284:
is a former drug dealer and convicted killer recruited by the Daemon, which helps him to escape prison by transferring him first to minimum security and then releasing him altogether. With a new identity, he travels to a Daemon-controlled office where he is interrogated by the Daemon's AI and is
234:
is called in to investigate the death of Pavlos. However, when a connection is made between the two programmers and
Cyberstorm, the FBI takes over led by Agent Decker. For being the first authority figure in the investigation, the Daemon selects Sebeck against his will to serve the Daemon, which
277:
is a recently fired reporter, whose good looks have hindered her career for years. Having been relegated to fluff pieces and put on the air to be pretty, she is quickly recruited as a Daemon operative, her job to investigate stories that benefit the Daemon and help push its propaganda. Her main
247:
a decorated FBI agent is brought in to secure Sobol's property, when several FBI agents and police officers are killed by an automated Hummer that attacks anyone who approaches. A longtime military officer and expert in hostage situations, he realizes that Sobol's estate is a death trap and red
27:
209:
is activated. Sobol, dying of brain cancer, was fearful for humanity and began to envision a new world order. The Daemon becomes his tool to achieve that vision. The Daemon's first mission is to kill two programmers Joseph Pavlos and Chopra Singh who worked for CyberStorm
Entertainment and
217:, used as transport and occasionally as weapons), Razorbacks (sword-wielding robotic riderless motorcycles, specifically designed as weapons) and other devices. The Daemon also creates a secondary online web service, hidden from the general public, dubbed the
573:
191:
about a distributed persistent computer application that begins to change the real world after its original programmer's death. The story was concluded in a sequel,
213:
The program secretly takes over hundreds of companies and provides financial and computing resources for recruiting real world agents and creating AutoM8s (
543:
76:
608:
436:
352:
528:
598:
205:
Upon publication of the obituary for
Matthew A. Sobol, a brilliant computer programmer and CTO of Cyberstorm Entertainment, a
122:
523:
446:
593:
533:
613:
588:
518:
513:
568:
563:
548:
508:
455:
538:
145:
578:
558:
583:
492:
603:
278:
effect in the story is to help frame Sebeck. She eventually becomes the spokesman for the Daemon.
222:
553:
188:
66:
40:
221:, which allows Daemon operatives to exchange information freely. Daemon implements a kind of
31:
2006 original edition, featuring the author's starting pseudonym (his name spelled backwards)
480:
412:
8:
260:
aka "Loki
Stormbringer" is a sociopathic loner and avid gamer. He makes a living through
441:
331:
206:
472:
130:
117:
389:
317:
156:
58:
228:
What follows is a series of interlocking stories following the main characters:
261:
214:
502:
298:
62:
466:
437:
Insightful interview with Daniel Suarez, titled "Understanding the Daemon"
294:
193:
172:
137:
26:
322:
218:
131:
376:
574:
Massively multiplayer online role-playing games in fiction
157:
334:, but they likely reverted to Suarez on 8 December 2012.
225:inside the community of its recruited operatives.
210:unknowingly helped in the creation of the Daemon.
500:
495:, Editor-in-Chief, The Ethical Hacker Network
387:
388:Trachtenberg, Jeffrey A. (March 18, 2009).
404:
377:Daemon by Leinad Zeraus Acquired by Dutton
447:An interview with Daniel Suarez on the
381:
544:Speculative crime and thriller fiction
501:
410:
609:Fiction about government by algorithm
370:
411:Suarez, Daniel (November 30, 2012).
215:computer controlled driverless cars
13:
350:
326:, had optioned the film rights to
312:
288:
14:
625:
430:
25:
16:Science fiction two-novel series
529:American science fiction novels
390:"When Computers Rule the World"
599:Novels about mass surveillance
344:
1:
337:
320:, who produced the 1983 film
305:and the rights to the sequel
245:Agent Roy "Tripwire" Merritt
7:
524:2006 science fiction novels
10:
630:
484:: IT Keepsakes; Jim Rapoza
413:"Status of 'Daemon' Movie"
353:"Understanding the Daemon"
112:444 pp (paperback edition)
594:Novels about cryptography
534:Novels about the Internet
493:A Book Review: Don Donzal
252:NSA Agent Natalie Philips
167:
155:
143:
129:
116:
108:
100:
92:
82:
72:
54:
46:
36:
24:
614:Fiction about computing
589:Fiction about parasites
223:government by algorithm
200:
519:Novels about computing
514:Techno-thriller novels
465:by political theorist
293:On June 25, 2008, the
67:Social science fiction
569:Hive minds in fiction
564:Fiction about malware
232:Detective Pete Sebeck
549:Postcyberpunk novels
509:2006 American novels
473:Joi Ito's Review of
309:from Verdugo Press.
539:Transhumanist books
187:is a 2006 novel by
163:PS3626.E73 D34 2006
125:(paperback edition)
21:
579:Novels about death
559:Fictional software
332:Paramount Pictures
19:
180:
179:
123:978-0-9786271-0-2
104:Print (Paperback)
93:Publication place
621:
584:Detective novels
424:
423:
421:
419:
408:
402:
401:
399:
397:
392:. online.wsj.com
385:
379:
374:
368:
367:
365:
363:
348:
318:Walter F. Parkes
168:Followed by
159:
133:
88:December 1, 2006
84:Publication date
29:
22:
18:
629:
628:
624:
623:
622:
620:
619:
618:
604:Utopian fiction
499:
498:
456:Review of both
442:Novels' website
433:
428:
427:
417:
415:
409:
405:
395:
393:
386:
382:
375:
371:
361:
359:
351:Rieger, Frank.
349:
345:
340:
315:
313:Film adaptation
297:imprint of the
291:
289:Dutton purchase
203:
148:
101:Media type
85:
59:Techno-thriller
32:
17:
12:
11:
5:
627:
617:
616:
611:
606:
601:
596:
591:
586:
581:
576:
571:
566:
561:
556:
551:
546:
541:
536:
531:
526:
521:
516:
511:
497:
496:
490:
478:
470:
453:
444:
439:
432:
431:External links
429:
426:
425:
403:
380:
369:
342:
341:
339:
336:
314:
311:
290:
287:
282:Charles Mosely
262:identity theft
202:
199:
178:
177:
169:
165:
164:
161:
153:
152:
149:
144:
141:
140:
135:
127:
126:
120:
114:
113:
110:
106:
105:
102:
98:
97:
94:
90:
89:
86:
83:
80:
79:
74:
70:
69:
56:
52:
51:
48:
44:
43:
38:
34:
33:
30:
15:
9:
6:
4:
3:
2:
626:
615:
612:
610:
607:
605:
602:
600:
597:
595:
592:
590:
587:
585:
582:
580:
577:
575:
572:
570:
567:
565:
562:
560:
557:
555:
554:Mixed reality
552:
550:
547:
545:
542:
540:
537:
535:
532:
530:
527:
525:
522:
520:
517:
515:
512:
510:
507:
506:
504:
494:
491:
489:
485:
483:
479:
477:
476:
471:
468:
464:
463:
459:
454:
452:
450:
445:
443:
440:
438:
435:
434:
414:
407:
391:
384:
378:
373:
358:
354:
347:
343:
335:
333:
329:
325:
324:
319:
310:
308:
304:
300:
299:Penguin Group
296:
286:
283:
279:
276:
275:Anji Anderson
272:
270:
266:
263:
259:
255:
253:
249:
246:
242:
240:
236:
233:
229:
226:
224:
220:
216:
211:
208:
198:
196:
195:
190:
189:Daniel Suarez
186:
185:
176:
174:
170:
166:
162:
160:
158:LC Class
154:
150:
147:
146:Dewey Decimal
142:
139:
136:
134:
128:
124:
121:
119:
115:
111:
107:
103:
99:
96:United States
95:
91:
87:
81:
78:
77:Verdugo Press
75:
71:
68:
64:
63:Postcyberpunk
60:
57:
53:
49:
45:
42:
41:Daniel Suarez
39:
35:
28:
23:
487:
481:
474:
467:Kevin Carson
461:
457:
448:
416:. Retrieved
406:
394:. Retrieved
383:
372:
360:. Retrieved
356:
346:
327:
321:
316:
306:
302:
292:
281:
280:
274:
273:
268:
267:
257:
256:
251:
250:
244:
243:
238:
237:
231:
230:
227:
212:
204:
192:
183:
182:
181:
171:
258:Brian Gragg
197:, in 2010.
503:Categories
449:BookBanter
338:References
301:purchased
418:April 14,
269:The Major
151:813/.6 22
138:123420486
73:Publisher
462:Freedom™
323:WarGames
307:Freedom™
239:Jon Ross
194:Freedom™
173:Freedom™
47:Language
482:Daemons
451:podcast
396:July 8,
362:5 April
357:FAZ.NET
219:Darknet
50:English
20:Daemon
475:Daemon
458:Daemon
328:Daemon
303:Daemon
295:Dutton
207:daemon
184:Daemon
175:
37:Author
488:eWeek
330:with
109:Pages
55:Genre
460:and
420:2013
398:2009
364:2020
201:Plot
132:OCLC
118:ISBN
505::
486:,
355:.
65:,
61:,
469:.
422:.
400:.
366:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.