Notes

Occasional reflections that do not belong elsewhere.

  • Notes

    Untangling the Web: My Journey Writing the Mystery of Sea Spider

    When I set out to write Sea Spider, I knew I didn’t just want to create another “whodunit.” I wanted to build a “whatisit?”—a story where the central mystery is as slippery and layered as the world of espionage itself. Today, I’d like to pull back the curtain a little and talk about the heart of the novel: the elusive, terrifying, and deeply ambiguous figure (or figures) known only as the Sea Spider.

    One question I get asked most is: “Who is the Sea Spider?” And my answer is always: “What do you think?”

    You see, from the very first chapter, my goal was to make you, the reader, feel exactly what Fiona Jones feels: that cold, creeping paranoia where no one is above suspicion. Is it the quiet man who fixes the printers? The charming oligarch with unlimited resources? The boss who seems a little too eager to control the narrative? I had a fantastic time weaving this web of potential betrayals, making sure every character had a shadowy corner where a secret could hide.

    I wanted the identity of the Sea Spider to be more than just a name on the final page. I wanted the hunt for it to question the very nature of betrayal in the 21st century. Is a traitor just one person? Or, in our hyper-connected world, is the most dangerous threat a network—a silent, symbiotic cell working within the system it’s meant to protect? As you followed Fiona’s investigation, I hope you felt that dawning horror, that realization that the enemy might not have a single face.

    This brings me to my protagonist, Fiona “Slash” Jones. I built her to be the perfect scalpel to dissect this conspiracy: brutally pragmatic, fiercely independent, and armed with a dry wit that’s her last line of defense against a crumbling world. Writing her was a joy because she refuses to see things in black and white. “Justice has sides,” she says, “depending on who has the power to claim justice.” Through her eyes, I wanted to explore the grim calculus of survival. How far would you go to expose a truth that could get you killed? Who would you sacrifice?

    So, as you turned the pages, I was right there with you, watching you piece together the clues I’d planted. Did you trust Oscar Torres’s weary authority? Did you think Eleanor Vance was a victim or something more? When you got to the end, did the final pieces click into a shape you expected, or did they form a more disturbing, complex picture?

    That’s the conversation I truly love. The mystery of the Sea Spider was designed to live on in your mind, in the debates and theories you have after finishing the book.

    Now, I’d love to turn the tables. Who did you trust the most when you started reading, and when did that change? What was the moment that made you gasp or rethink everything?

    Drop your thoughts in the comments below. Let’s unravel this web together.

  • Notes

    The Shadow War for Innovation: A Deep Dive into Commercial Espionage

    Blog image, commercial espionage, murphyeseyes.com
    Author’s Note: This article is for informational and entertainment purposes only. The author does not condone or encourage any illegal activities, including theft of trade secrets or any form of espionage. The information presented here is based on publicly available sources and is intended to provide a general overview of the challenges and techniques involved in combating commercial espionage. Any attempt to perform commercial espionage is illegal and carries significant consequences.

    As a writer of espionage thrillers, I’m fascinated by the world of secrets, deception, and the high stakes games people play in the shadows. While most people picture spies in trench coats battling international terrorists, a far more common – and arguably more damaging – form of espionage takes place every single day: commercial espionage.

    Forget nation-state conflicts for a moment. This is a war waged by corporations against corporations, all for a competitive edge. And the weaponry isn’t bullets and bombs, it’s intellectual property.

    What is Commercial Espionage?

    Simply put, commercial espionage is the theft of trade secrets. This can include formulas, designs, customer lists, pricing strategies, manufacturing processes, research & development data… anything that gives a company an advantage over its rivals. Think of the recipe for Coca-Cola – that’s the kind of asset we’re talking about. But it extends far beyond iconic brands. It’s happening in pharmaceuticals, tech, automotive, agriculture, and pretty much every industry you can imagine.

    How Does it Happen? It’s Not Always High-Tech.

    While Hollywood often portrays commercial espionage as involving elaborate hacking and cyberattacks (and those do happen – more on that later), the reality is surprisingly… low-tech at times.

    • The Disgruntled Employee: This is a classic. A frustrated or financially-motivated employee, with access to sensitive information, can be a goldmine for a competitor.
    • Social Engineering: Con artists posing as IT support, surveyors, or even potential clients can manipulate employees into revealing confidential data. A well-placed phone call, a believable email, and suddenly, a security breach has occurred.
    • Dumpster Diving: Seriously. Searching through a company’s trash for discarded documents (even shredded ones) can yield surprisingly useful intelligence.
    • Industry Events & Conferences: Seemingly innocuous conversations at trade shows or conferences can be carefully orchestrated to extract information from unsuspecting targets. (Think of a character subtly steering a conversation in your next novel…)
    • Third-Party Vendors: Suppliers, contractors, and other partners can be compromised or coerced into providing access to sensitive data.
    Blog image, commercial espionage and commercial secret theft, murphyeseyes.com

    The Cyber Dimension: When Espionage Goes Digital

    Of course, the digital age has amplified the threat exponentially. Cyberattacks are now a primary tool for commercial spies.

    • Hacking: Targeted attacks on company servers, networks, and databases to steal intellectual property.
    • Phishing: Deceptive emails designed to trick employees into revealing login credentials or installing malware.
    • Malware & Ransomware: Spyware can be installed on company systems to monitor activity and steal data. Ransomware, while often focused on financial gain, can also be used as a distraction to cover up data theft.
    • Insider Threats (Digital): Employees intentionally or unintentionally leaking data through email, USB drives, or cloud storage.

    The Costs are Staggering

    The FBI estimates that commercial espionage costs U.S. businesses hundreds of billions of dollars annually. Beyond the financial losses, it can stifle innovation, damage reputations, and even lead to job losses. And unlike traditional espionage, the perpetrators are often motivated by pure profit.

    Is it Just “Competitive Intelligence?”

    There’s a fine line between legitimate competitive intelligence gathering (researching publicly available information about competitors) and illegal espionage. The key difference? Theft. Gathering information through legal and ethical means is perfectly acceptable. Stealing trade secrets or using deceptive practices to obtain confidential information is not.

    Real-World Examples (Without Naming Names)

    While I can’t share classified details (obviously!), several high-profile cases have made headlines in recent years. We’ve seen instances of:

    • Foreign governments sponsoring cyberattacks to steal intellectual property for their domestic companies.
    • Employees being recruited by competitors with promises of lucrative rewards in exchange for trade secrets.
    • Companies using sophisticated surveillance technology to monitor the activities of their rivals.
    Blog image, commercial espionage and data security, murphyeseyes.com

    The Thriller Writer’s Perspective

    As a writer, the world of commercial espionage is a goldmine. It’s a relatable, modern form of conflict with incredibly high stakes. It allows you to explore themes of greed, ambition, betrayal, and the lengths people will go to achieve success. It also grounds your thrillers in a reality that resonates with readers.

    What are your thoughts?

    Do you think commercial espionage is a bigger threat than traditional espionage? Let me know in the comments below! And if you enjoyed this post, be sure to check out my novels for more tales of intrigue and deception.

  • Notes

    The Mystery of Claire Valbonne — And How It Connects to “The Alphabet” Espionage Series

    Every espionage universe has a secret thread running beneath the surface — a thread that connects stories, past events, and hidden agendas. In my series The Alphabet, that thread is a classified surveillance operation known as project “The Coconut.”

    Readers first encountered hints of this project in my novel The Client Killer (Book 2 of the series). If you’re curious about the origins of The Coconut and how it shaped the intelligence landscape of this fictional world, you can explore that story here:

    📘 The Client Killer – Introduction
    https://www.murphyseyes.com/the-client-killer/

    The seventh book in the series, Marble and Mist, widens that lens. And at the center of this expansion is the character readers keep asking about:

    Who exactly is Claire Valbonne?

    She is the woman Warren Drayton falls for — and the woman who vanishes so completely that even international intelligence agencies leave no trace of her existence.

    And that disappearance has deeper roots in The Alphabet series than many readers realize.


    How “The Coconut” Links The Client Killer and Marble and Mist

    In Marble and Mist, Warren uncovers classified files proving that the U.S. Department of Defense, through a German front company called SafeComm AG, has conducted an illegal surveillance initiative codenamed “The Coconut.”

    This project wasn’t born in this book.
    Its seeds were planted earlier, in The Client Killer, where readers first encountered the dangerous consequences of global surveillance overreach.

    By referencing The Coconut again, Marble and Mist intentionally ties itself back to the revelations and conspiracies introduced in the second installment. For returning readers, this makes Claire’s disappearance even more intriguing:

    • Was Claire connected to “The Coconut” operation?
    • Was she monitoring Warren to protect the operation — or expose it?
    • Or was she a pawn trapped between the events of both books?
    • Was she sent by BND? DoD? GRU? or another intelligence agency?

    This shared universe clue is a deliberate breadcrumb linking the novels of The Alphabet Series into a larger, expanding conspiracy.


    Who Was Claire Valbonne Really? A Deeper Dive Into the Mystery

    Claire enters Warren’s life in Marseille at a moment of vulnerability. She is light to his darkness, warmth to his trauma — and yet there is something about her that does not fit the ordinary world.

    Her disappearance raises questions readers love to debate:

    1. Intelligence Operative Theory

    Given her perfect timing and total lack of digital footprint, many readers believe Claire worked for an intelligence service.
    Was she tied to the BND?
    Or perhaps to one of the agencies involved in The Coconut?

    2. Civilian in the Wrong Place Theory

    Some readers see her as an innocent who was swept into Warren’s dangerous orbit.

    3. Phantom Identity Theory

    Others think Claire was operating under a deep-cover persona — perhaps one constructed specifically for Warren to encounter.

    4. Psychological Echo Theory

    A few readers argue that Claire mirrors themes from The Client Killer, suggesting she may be connected to characters or events from earlier in the series.

    Each theory is valid — and each adds a layer to the greater Alphabet universe.


    Why Claire’s Disappearance Matters for the Series

    Claire’s vanishing body and non-existent identity is more than a plot twist.
    It’s the beginning of a pattern that threads through The Alphabet series:

    • disappearing agents
    • erased identities
    • surveillance systems
    • global power shifts hidden beneath “legitimate operations”

    In other words, Claire is not just a character — she is a signal.
    A sign that much larger forces are at work across the series.

    And for readers who have read The Client Killer, this mystery hits even harder.


    Start Reading the Alphabet Series — Free Until March 31

    If you want to explore how the threads connect — the surveillance programs, the assassinations, the intelligence wars, and the mysteries like Claire Valbonne — now is the perfect time.

    My espionage novella Marble and Mist , same as the entire The Alphabet Series, is FREE until March 31 on all e‑book platforms except Amazon.

    📘 Marble and Mist – Book Intro
    https://www.murphyseyes.com/marble-and-mist/

    📖 Read Chapter 1 Online
    https://www.murphyseyes.com/marble-and-mist-chapter-1/

    And if you want to see where The Coconut first appeared, begin with:

    📘 The Client Killer – Book Intro
    https://www.murphyseyes.com/the-client-killer/


    Tell Me Your Theory: Who Was Claire Valbonne?

    I’d love to hear your thoughts.
    Was she a spy? A ghost? A threat? A lover? A construct?
    Or something that ties the entire Alphabet Series together in ways even Warren doesn’t yet understand?

    Share your theory in the comments — you may notice something I haven’t revealed… yet.