The Broken Window

Jeffrey Deaver
Warning!  After reading this book you might never use a charge/debit card again.  Identity theft is quite the topic these days.  Deaver's latest book in his Lincoln Rhyme series is about this subject, only on a grand scale.  When we think of identity theft, we tend to internalize.  What if this happens to me?  Deaver takes this to the next level.  Picture about 400,000,000 Americans; each having a 500-page dossier that contains all of their personal/professional/private information, and all this info is stored on a super-computer.  This privately owned and managed computer system is not subject to federal laws and/or guidelines.  To confuse things further, most federal and state government agencies including police forces, rely on the data this company supplies.  The founder and owner of the company's motto:  "Information is power".  Deaver's plot is diabolical.  A serial-killer has found a way to commit murder and have all the evidence point toward an innocent bystander of his preconceived choice.  The killer cannot only plant evidence but manipulate the investigations and investigators.  As usual, Deaver has many characters for his reader's to choose from that might be the killer.  I guessed wrong and was not pleased.  Author's note:  The non-fiction book that Deaver got a lot of ideas from is No Place to Hide by Robert O'Harrow, Jr., which is in our collection (303.4833/O'HARROW,R).
If your status is Confirmed Registration, your spot for the event is confirmed.

If registration for this event is full, you will be placed on a waiting list. Wait listed registrants are moved to the confirmed registration list (in the order of registration) when cancelations are received. You will receive an email notification if you are moved from the wait list to the confirmed registration list.

6.012 Patron-Generated Content

The Library offers various venues in which patrons can contribute content that is accessible to the public.  These include, but are not limited to, blogs, reviews, forums, and social tagging on the Library’s website and catalog.  Any instance in which a patron posts written or recorded content to any of the Library’s venues that are accessible to the public is considered “patron-generated content” and is subject to this policy.
By contributing patron-generated content, patrons grant the Library an irrevocable, royalty-free, worldwide, perpetual right and license to use, copy, modify, display, archive, distribute, reproduce and create derivative works based upon that content.
By submitting patron-generated content, patrons warrant they are the sole authors or that they have obtained all necessary permission associated with copyrights and trademarks to submit such content.
Patrons are liable for the opinions expressed and the accuracy of the information contained in the content they submit.  The Library assumes no responsibility for such content.
The Library reserves the right not to post submitted content or to remove patron-generated content for any reason, including but not limited to:
  • content that is profane, obscene, or pornographic;
  • content that is abusive, discriminatory or hateful on account of race, national origin, religion, age, gender, disability, or sexual orientation;
  • content that contains threats, personal attacks, or harassment;
  • content that contains solicitations or advertisements;
  • content that is invasive of another person’s privacy;
  • content that is unrelated to the discussion or venue in which it is posted;
  • content that is in violation of the Library’s Code of Conduct or any other Library policy