The film’s inspiration seems to come from a piece of news. The CIA monitored all Americans’ mobile phones in order to counter terrorism. This piece of news seemed to touch us on the other side of the ocean, and there was no follow-up report, but for the United States that advocates freedom and democracy. Humanly speaking, it is nothing more than opening the Pandora's Box. In addition to mobile phones, there is another category of scourges that are cameras. A post was circulated a long time ago, and some open cameras can be searched with google. Although there are only some cameras in public areas, who can guarantee that you will not appear in front of the camera? According to reports, the camera coverage in some developed cities has reached over 98%, leaving you with nowhere to hide. As for the personal computer you use, everyone knows that there are so many loopholes. The film uses these tools that we must use in the information age to build a huge information network, and these resources are centralized and controlled on an artificial intelligence terminal, the classic plot of a science fiction film. Compared with the nuclear warfare on computers in the 1980s, it is a joke, but now this computer is really playing. "She" regarded herself as an American citizen and was determined to realize her civil rights to "violently overthrow tyranny." Of course, the ending can be imagined, the main theme is often gray. The hero is not dead, the president is saved, and the theft of information continues.
Although the supercomputer in the film has not yet been born, collecting information is what the intelligence agencies of various countries are doing, which may be thousands of ordinary computers. Ironically, terrorists also know how to use all kinds of open information. The terrorist attack in Mumbai some time ago used BlackBerry phones and Google Earth to locate. The paradoxical result is that we no longer have privacy.
View more about
Eagle Eye reviews