Imagine the Big Brother from George Orwell’s 1984, only in stealth mode. A system so sophisticated that nothing hides from it. It’s eyes and ears are everywhere. It knows where you are, why you’re there, who you are meeting with and what you are talking about. It watches you every minute of every day. Yet you walk as if everything is normal. Would you want to live in that world where those in power can crush you like an ant, should you become an inconvenience to them.
Designed by Harold Finch (played by Micheal Emerson) an average employee by the day and a genius computer scientist by the night. He built the Machine to watch acts of terror and alert the authorities beforehand. But it sees everything even acts of small crime. Based on it’s observations, it churns out social security numbers of either victims or perpetrators. The Machine was originally developed for government use, however, seeing it’s potential misuse if placed in wrong hands, Finch hid it and turned into a vigilante. With the help of the Machine, Finch and his team John Reese (played by Jim Cviezel), Sameen Shaw (played by Sarah Shahi), Root (played by Amy Acker) and Detective Lionel Fusco (played by Kevin Chapman) have took it upon themselves to protect/incriminate the Person of Interest and prevent the Machine from falling into the wrong hands.
It’s hard to come by a TV show like this. The show has got an Imdb rating of 8.5 and has won People’s Choice Award (2012) in the category of Favorite New Drama. It is a must watch for those of you who crave good entertainment in the field of computers. The storyline is gripping and the added benefit is that the viewers get to learn something new about computer science and information technology in nearly every episode.
You can purchase seasons 1-4 from following links:
- Person of Interest Season 1
- Person of Interest Season 2
- Person of Interest Season 3
- Person of Interest Season 4
Image Credits: Deviantart.com
Uday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. He speaks on cybersecurity awareness, offensive security research etc. and has authored various articles on topics related to cyber security and software development for a leading magazine on open source software.