|Episode Overview||Summary||POI||Cast and Crew|
|Person of Interest -- Season 2 (Flashbacks in parentheses)|
|201 "The Contingency" (Finch)||209 "C.O.D."||217 "Proteus"|
|202 "Bad Code" (Root)||210 "Shadow Box"||218 "All In"|
|203 "Masquerade"||211 "2πR"||219 "Trojan Horse"|
|204 "Triggerman"||212 "Prisoner's Dilemma" (Reese)||220 "In Extremis" (Fusco)|
|205 "Bury the Lede"||213 "Dead Reckoning" (Stanton)||221 "Zero Day" (Finch/Ingram)|
|206 "The High Road" (Finch)||214 "One Percent" (Finch/Ingram)||222 "God Mode" (Finch/Hersh)|
|207 "Critical"||215 "Booked Solid"|
|208 "Til Death" (Finch)||216 "Relevance"||<< Season 1 | Season 3 >>|
|“||Don't count me out just yet, Harold.||”|
When the number of a leading tech executive comes up, Finch infiltrates her corporation to gather intel, but can't determine whether she is working in her company's best interest, or planning to destroy it from the inside. Meanwhile, Carter continues to question Cal Beecher's integrity after he provides incriminating information about a fellow detective.
Origin of the TitleEdit
The term Trojan Horse has its origins in Greek mythology, based in the tale that the ancient Greeks hid themselves in a large wooden horse presented as a gift to their enemies, the fortified city of Troy. When the Trojans pulled the massive horse into the city, the Greeks attacked and won the war. The term has come to mean anyone who enters an organization via subterfuge with the intention of doing harm. In computing, a trojan horse is a program designed to trick users into running it, generally the outcome is damage to the user's system.
Main Plot PointsEdit
- There is increased vigilance on the part of the US Congress regarding implementation of new guidelines on large-scale purchases of technology equipment made in China, which was the concept underlying this episode. The concern is that "back doors", unobtrusive means of accessing computer systems with little chance of detection, can be installed, or that "sniffer chips" can be implanted in the computer systems of American companies which operate in China, making them vulnerable to compromise.
- Finch identifies the virus code as originating with Decima Technologies. Decima is the name of one of the three Fates responsible for the metaphorical thread of life (destiny) in Roman mythology. Decima controls the events and interactions in each life by weaving the thread into a tapestry.
- When Finch discovers Justin Lee's true identity, a Chinese identity card is shown. The identity code is 15 digits, but in reality, it should contain 18. According to the number, Justin was born in Heilongjiang province, most likely in Harbin, a city north to Beijing. That form of identity code is only used in Mainland China, but according to the card, Justin Lee lives in Hong Kong where it is not used. Also, the card uses simplified Chinese characters while in Hong Kong traditional characters are used.
Bloopers and Continuity ErrorsEdit
- When Fusco is listening in on Elias and Beecher's conversation, Elias pauses between "He was clean," and "You got played." In Fusco's recording that he plays for Carter, there is no pause.
- Greer uses a Huawei M835 smartphone.
- Justin Lee's emails to his father don't sound like they were written by a Chinese native speaker. They sound more like they were translated from English into Chinese than the other way round.
- The news article about Monica Jacobs was published by the New York Journal. This is the paper that Maxine Angelis, the person of interest from "Bury the Lede", works for.
- This episode has the largest number of embedded code appearances to date, showing the growing effect of the virus in the Machine.
Main article: Trojan Horse/Embedded codes
- The first code is an excerpt from "Balaam's Second Oracle" in the King James Bible.
- The second code is an excerpt from a translated letter from Dr. Wetzel to Hinrich Lohse, the Reich Commissar for the East in 1941, confirming command's decision to use gassing devices in the elimination of all Jews "who are not capable of work".
- The third code is an excerpt from "The Prince", a political treatise by Italian diplomat and theorist Niccolò Machiavelli.
- The fourth code is an excerpt from "A Retrospective on Counterinsurgency Operations", a CIA report on the Tay Ninh Provincial Reconnaissance Unit and its role in the Phoenix Program from 1969-70.
- The fifth code is an excerpt from an Informational Memorandum on the subject of potential threats to Information Management Systems by cyber-terrorists.
- The sixth code is an excerpt from The Valley Of Fear, the final Sherlock Holmes novel by Sir Arthur Conan Doyle.
- The seventh code is an excerpt from the Introduction To Codes, Ciphers, & Codebreaking, an article by Greg Goebel on the concepts, terminology and origins of codebreaking.
- The eighth code is an excerpt from a version of the Bhagavad Gita, a 700-verse Sanskrit epic within the Mahabharata.
- "You think I should have a hobby. Now what would that be? Hanging around your derelict library with you, your poorly socialized guard dog... and Bear here?" (Shaw)
- "I'll do everything in my power to determine his identity and render him irrelevant." (Greer, about Harold Finch)