The Silent Conquest · Book One
Robert J. Green
What if the apps teaching your children math, music, and social skills were listening to every word spoken in your home — and had been for eighteen years?
// China's harvest date is 2040. // The target crop: the next generation of American military families. //
// Classified Briefing //
When MIT economist Marcus Webb discovers that Chinese state-backed funds have spent four hundred million dollars purchasing farmland within surveillance range of every nuclear weapons facility in America, his analysis triggers a cascade of revelations across five strangers — each independently holding a piece of the same terrifying puzzle.
A CIA analyst tracing impossible financial patterns through twenty-three shell companies. A defense contractor whose AI detection system finds ghost radar signatures the Air Force's own filters are designed to miss. Wei Zhang — a Chinese-American animator in Sunnyvale — who discovers surveillance code hidden inside the children's games she helps create, and mails a handwritten letter to the FBI. And a retired Army colonel who has been watching his neighbor's property for fourteen months with binoculars and a composition notebook, waiting for someone to believe him.
What they uncover is an eighteen-year operation targeting thirty million American families through the educational apps their children love — apps that fund their own surveillance through advertising revenue, making them the world's most profitable spy network. Overhead, nuclear-powered drones launched from those purchased farms photograph America's nuclear deterrent with technology the Pentagon doesn't know exists.
No government agency connected the dots. Five civilians did.
The clock is ticking. China's harvest date is 2040.
The target crop: the next generation of American military families.
Digital Harvest is the story of what it cost five ordinary people to make a government listen — and what it cost them personally when it finally did.
// THE FIVE — PERSONNEL OVERVIEW //
"The kind of story that makes you check your child's tablet before you finish the first chapter — and then makes you realize you probably should have checked years ago."
— ADVANCE READER RESPONSE
// Threat Assessment //
The Americans meets Tom Clancy's Jack Ryan — with the financial sophistication of John le Carré and the institutional realism of The Looming Tower.
Digital Harvest is written for readers who have read the best in the genre and know when something is authentic — readers who recognize real tradecraft, institutional friction, and operational realism that isn't borrowed from Hollywood.
// IF YOU READ THESE, THIS IS FOR YOU //
// CROSSOVER AUDIENCES //
// THE SILENT CONQUEST — SERIES ARCHITECTURE //
Digital Harvest is the first book in a four-novel arc following a single Chinese strategic program from its origins in agricultural surveillance to its endgame in economic conquest. Each book stands alone. Together they document the full scope of modern conquest through commerce rather than conflict.
// FOUR-BOOK ARC //
Agricultural surveillance · Nuclear drone ISR · The discovery
European operations · Evolved architecture · The escalation
Global network revealed · Taiwan integration · The crisis
Five Pillars endgame · Lu Kai's gambit · The reckoning
// ADAPTATION //
The series is architected for adaptation as an 18–24 episode premium streaming series — built on the same moral complexity and authentic tradecraft that defines the best work in the genre.
// Intelligence Alert System //
Digital Harvest is in final preparation for publication. Join the notification list to be first to know when pre-orders open and when the book releases. No newsletters. No spam. One email when the book is ready.
// CASP-1 — CIVILIAN ANALYTICAL SUPPORT PROGRAM //
Readers with military, intelligence, or national security backgrounds may apply for CASP-1 participation — a structured advance reader program limited to 500 qualified participants.
CASP-1 participants receive the complete pre-publication manuscript. In return, they commit to reading within 6 weeks, completing a Debrief Instrument, and posting an honest review at release. Participants who complete their CASP-1 obligations receive access to additional program materials.
// 500 CASP-1 slots available — applications reviewed in order received //
// No clearance required. Civilian analytical support program. //
// Participants who complete all obligations earn access to the Intel Vault — 12 classified-format supplemental documents from the agencies in the novel. //
// Open-Source Intelligence Products //
The analytical framework in The Silent Conquest series is built on real supply chain vulnerability research — conducted entirely from publicly available government data. The same methodology that powers the fiction produced findings that stand on their own. These articles present the nonfictional distillation of that research.
// FOREIGN AFFAIRS //
Everyone's Finger Is on the Trigger
The global economy has assembled a system of mutual supply chain dependency that mirrors the logic of nuclear deterrence — without doctrine, red lines, or stabilizing architecture. An introduction to Mutual Threshold Saturation and the 1,637 single-source dependencies no one had previously counted.
// SUBMITTED — AWAITING EDITORIAL RESPONSE //
// WAR ON THE ROCKS //
Why America's supply chain vulnerabilities are a defense problem, not just an economic one. From Salt Typhoon to gallium wafers to aging Mississippi River locks — the compound vulnerability map the defense community needs and no agency has built.
// FORTHCOMING //
// LAWFARE //
Six major legal authorities in five years — and none of them talks to the others. How sector-specific supply chain law produces contradictory outcomes, temporal vulnerabilities, and structural opacity. From deep-sea mining under UNCLOS to the FDA's inability to trace its own database.
// FORTHCOMING //
// Additional Analysis and Commentary //
// METHODOLOGY NOTE //
All research is derived from publicly available U.S. government reports, congressional testimony, international organization publications, and open-source trade data. No classified materials were referenced. A companion research paper with full methodology, sector-by-sector enumeration, and multi-country analysis is available upon request. Every factual claim is independently verifiable.