School Library Journal Review
Gr 5-9-In Trackers (Scholastic, 2010), Adam, Finn, Lewis, and Emily found themselves pulled deeper and deeper into the world of high-tech hacking-and "tracking," the ability to trace online criminals' movements by the signs they leave behind. Now, billions of dollars have vanished into the ether, and Carman mixes a quick-cut, TV procedural-style of dialogue and narration as the four teens find themselves in the custody of an FBI-style intelligence force. Adam is interrogated by an agent who believes he is lying; the agent swears that he will "break him." Then there's the mysterious Shantorian, the super-hacker the Trackers are pursuing, as well as furtive Lazlo and gorgeous, smart Zara, who may be the Trackers' allies-or maybe not. The book is accompanied by a website filled with video files that support the story. Primarily of interest to fans of the first book.-Walter Minkel, Austin Public Library, TX (c) Copyright 2011. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.
Horn Book Review
In this second Trackers book, four tech junkies continue their cat-and-mouse game. This time |ber-hacker Shantorian joins forces with adversaries from the previous volume. The novel includes passwords granting access to online videos that advance the story's plot (appendices include scripts for readers without internet access). The characters remain flat, and there's less interactive content this time, but fans may not care. (c) Copyright 2011. The Horn Book, Inc., a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.
Booklist Review
Four exceptionally tech-savvy kids are recruited by the government to guard against the mysterious archcriminal Shantorian. In this second book in the Trackers series, the story is told through a series of interrogations of the tracker Adam Henderson by an agent who is assigned to break him. Things aren't always what they seem, though, as we learn that one tracker may be a mole. Readers are invited to crack codes, look for clues, and watch videos on their computers. (The same information is also found in an appendix.) It is almost impossible not to be caught up in this unconventional series and its many twists and touches of humor.--Morning, Todd Copyright 2010 Booklist