Pulse en una miniatura para ir a Google Books.
Cargando... Treacherypor Noel Primrose
Ninguno Cargando...
Inscríbete en LibraryThing para averiguar si este libro te gustará. Actualmente no hay Conversaciones sobre este libro. sin reseñas | añadir una reseña
Pertenece a las seriesJack Somerton (2)
No se han encontrado descripciones de biblioteca. |
Antiguo miembro de Primeros reseñadores de LibraryThingEl libro Treachery de Noel Primrose estaba disponible desde LibraryThing Early Reviewers. Debates activosNinguno
Google Books — Cargando... GénerosSin géneros ValoraciónPromedio:
¿Eres tú?Conviértete en un Autor de LibraryThing. |
The story starts out with the British Prime Minister and the person in charge of part of the security staff. Unknown to anyone else the director of the security service is in contact with Jupiter, the developer of the technology that can control most other computers from a satellite network. The PM is reluctant to deploy the satellite network because of concerns over control of it and the possibility that it can be used for bad purposes. The PM is only temporarily until the party reelects a new leader to become the PM.
Unknown to director of the security service, the US President has gotten control of the scientist and his lab. The director of the security service puts himself up for election to replace a friend in Parliament that was the previous PM. These three men were all friends and served together in the SAS. The director uses some retired SAS men who work for his security firm to derail the candidate running against him so he wins the election. After his selection, he becomes a member of the new PM’s cabinet and the Minister in Charge of the security agencies.
He supervises the deployment of the satellite network and several tests of the technology to take control of several computers without anyone knowing how or who took control. In meetings with the PM he becomes aware that the US President is aware of the technology and controls Jupiter and his lab.
This is a good story about the possible evil uses of technology by government. ( )