A marksman living in exile is coaxed back into action after learning of a plot to kill the president. Ultimately double-crossed and framed for the attempt, he goes on the run to track the real killer and find out who exactly set him up, and why.
Two Passengers and the conductor discover that a person has passed away on their Night Train cabin. They come across valuable diamonds on his person, that they wish to keep for themselves. ... See full summary »
Coming from a police family, Tom Hardy ends up fighting his uncle after the murder of his father. Tom believes the killer is another cop, and goes on the record with his allegations. Demoted then to river duty, the killer taunts Tom.
Sarah Jessica Parker,
Jerry and Rachel are two strangers thrown together by a mysterious phone call from a woman they have never met. Threatening their lives and family, she pushes Jerry and Rachel into a series of increasingly dangerous situations, using the technology of everyday life to track and control their every move.
Max Peterson is a globe-trotting techno-whiz who installs security systems on computers. He receives an anonymous gift: a phone which sends messages that enable him to win at a casino. Max soon finds himself pursed by hit men, the casino's security chief, and a CIA operative. Who's sending Max messages? Previous recipients of similar windfalls have ended up dead. After a couple of close scrapes, Max realizes he's in danger, so he tries to find out the root of the conspiracy - which seems to have access to every security camera in the world - before he's the next victim. Why is this happening to him, and who can he trust? Written by
After servers power down during final battle and the three protagonists are arrested, they magically appear powered up again in the background of a closeup shot of Max. See more »
Everything okay down there?
Piece a cake.
That locks it?
Yep, centuries of Thai history, safe as Fort Knox. Watch, uh,
[removes a panel]
Relax, I'm a professional.
[causes a massive short]
Okay, now your servers are down because of a power surge, a grid malfunction, or maybe even a bomb. Now, if the intruder tries to reboot your servers or access the data, he'll always hit this screen.
This is your BIOS-level password. Without it, nothing works in this room.
[...] See more »
Firstly, let me say that the reviewers giving this film one star can't possibly have seen a truly bad movie. This is by no means mind-blowing, but is a OK attempt at the spy-thriller genre. It brings in some new aspects with regards to storyline, but ultimately coming of cliché'd and slightly cheesy.
The acting as OK, but i never base a film on it's acting unless it is visibly terrible, which this isn't. However, the scripting could have been massively improved just by taking out the attempted humour, which ultimately fails and leaves the film looking childish. The storyline starts off fairly strongly, and is fairly enjoyable to watch. However, it is clearly a copy of Eagle Eye/other similar films, but with a lower budget.
It's only let down is when the conspiracy is uncovered, leading to an ending that is resolved in a very cliché manor, which is a shame, as it could have made the movie more enjoyable if new aspects were brought in, giving it a better twist. Also, some of the characters play seemingly, very confused roles, switching sides from 'good' to 'bad' with no real explanation as such.
However, if you enjoyed films like Eagle Eye, Minority Report, The Island etc etc, then definitely give this a try. It isn't quite as good, but well worth the look if you fancy an easy to watch tech-based film. 6/10
53 of 79 people found this review helpful.
Was this review helpful to you?