Originally provided by Finch to Reese, the two have since passed the program on to Carter (“In Extremis”), Fusco (“Bad Code”) and Shaw (“Nothing to Hide”). Finch can quickly implement the program on a just-bought pre-paid cell phone despite his equipment in the library having been compromised by Root's hack and him having to abandon all of his technology for protection. This indicates he can either recover the program quickly or replicate it. (“Root Cause”)
Graph IRI | Count |
---|---|
http://dbkwik.webdatacommons.org | 13 |