Wikia

Person of Interest Wiki

Root Cause

1,540 articles on
this wiki
Talk0
Episode Overview   Summary   POI   Cast and Characters   Crew    
Person of Interest -- Season 1 (Flashbacks in parentheses)
101Pilot” (Reese) 109Get Carter” (Carter) 117Baby Blue
102Ghosts” (Finch) 110Number Crunch118Identity Crisis
103Mission Creep” (Reese) 111Super” (Finch) 119Flesh and Blood” (Elias)
104Cura Te Ipsum112Legacy120Matsya Nyaya” (Reese)
105Judgment113Root Cause121Many Happy Returns” (Reese)
106The Fix114Wolf and Cub122No Good Deed” (Finch/Ingram)
107Witness115Blue Code” (Reese) 123Firewall
108Foe” (Reese) 116RiskSeason 2 >>
Root Cause

1x13 RootCause

SeasonEpisode

113

Air dateFebruary 2, 2012

Running time43:57

Production code2J6213

Written byErik Mountain

Directed byRichard J. Lewis

Viewers15.10M

Images (27)

You can call me Root.

— Root


"Root Cause" is the 13th episode in season 1, and the 13th produced hour of Person of Interest. It originally aired on February 2, 2012.

SynopsisEdit

Reese and Finch's latest POI is a down-on-his-luck man who may have reached his breaking point. As the case evolves, the duo calls upon a former POI for help, the resourceful and well-connected Zoe Morgan.

Origin of the TitleEdit

Main Plot PointsEdit

Episode NotesEdit

Acronyms and VocabularyEdit

  • Honeypot: A small network that is setup to create the appearance of major network. Architects of this type of network hope that a hacker might be enticed by the falsely generated "network traffic" long enough to trace the intruder's whereabouts. Its name derives from the notion of flies being drawn to honey.
  • Worm: Malware, or a potentially unwanted program, that replicates without the aid of being attached to another program. Its purpose can be anything from slowing down network traffic, consuming CPU time, disk space and  memory, to stealing (or destroying) data.

Production NotesEdit

  • The IP addresses (452.34.256.193) used to communicate with "Root" are not possible and IRC is typically on port 6667, not 96. These maybe intentional. Using IP addresses and IRC ports that don't exist prevents potential problems and abuse that could arise from inadvertently using legitimate IP addresses and IRC ports, much like how virtually every phone number used in TV and films has a "555" prefix, which is not used for any legitimate phone numbers.

Bloopers and Continuity ErrorsEdit

  • Reese and Scott Powell take a 1 train to Grand Central Station, and the hitman following them gets off an A train. In real life, neither 1 nor A trains go to Grand Central Station. The platform where they get off the train and call Scott's wife is used by an S train (shuttle) that stops only at Times Square and Grand Central. They wouldn’t use it for a getaway since it goes nowhere. From a production standpoint though, it’s the easiest train to shut down for filming.
  • At the end of the episode when Root contacts Finch, her final text before disconnecting is merely "...Harold"; however, in the previous shot as she is shown typing this word, the keys she presses are completely unrelated.

TriviaEdit

  • Before showing Reese and Scott on the train for the first time, there are a few security-camera-style views of a subway platform, implying they got on the train there (though it is not directly shown). However, if the implication was right, it would make no sense, as it is just another platform at the same station where they got off the train later on, Grand Central Station.
  • In the subway station, Reese leads the hitman into a bathroom. In real life, no bathroom exists in that corridor. The door Reese opens really leads to a storage room, and then the camera cuts to a bathroom in a studio.
  • Powell's car has the same license plate (EWQ-2147) as Fusco's car in “Ghosts”.
  • The roles of the Asian policeman coming into Matheson's home and the Asian journalist asking Scott Powell questions in front of his yard at the end of the episode were played by the same actor.
  • The method of attack Root uses against Finch is called a Distributed Denial-of-service (DDoS) attack. The way it works is several systems or bots flood the bandwidth or resources of a targeted system. The key advantage of a DDoS attack is that it uses several systems attacking at the same time, which makes it harder to counteract. While the Machine classifies the attack as Distributed, it is somewhat more similar to a Permanent Denial-of-service (PDoS) attack. In this attack, the targeted system is so badly damaged that it requires replacement or re-installation of hardware. PDoS attacks exploit flaws in networked systems which can allow remote access from one device to another. PDoS attacks are also faster and require less resources than DDoS attacks.

QuotesEdit

  • "If there is one thing our little venture has proven, Mr. Reese, it's that people are rarely what they seem" (Finch)
  • "There are no bathrooms on a stake out, Finch" (Reese)
  • "I haven't been able to unmask the hacker's IP, but here's a vulnerability in the firewall. Yes! Okay... now we're in. So now let's see who's behind the curtain."  (Finch)
  • "Wait, something's wrong. We didn't hack in, we were let in. It's a honeypot! Incredibly sophisticated... they're using a worm to infect any devices connected to our private network, including our phones. They're listening to us right now, destroy your phone. You know how to find me." (Finch)

VideosEdit

Around Wikia's network

Random Wiki