Category
🎥
Short filmTranscript
00:00You
00:30You
01:00Oh
01:30Oh
02:00Oh
02:30Oh
02:48Hi
03:00Foreign
03:30Foreign
03:52Foreign
04:00Foreign
04:08Foreign
04:20Foreign
04:30Foreign
04:46Hi
04:52Hi
05:00Foreign
05:22Foreign
05:30Foreign
05:44Foreign
06:00Foreign
06:14Foreign
06:30Foreign
06:44Ah
07:00Foreign
07:14Foreign
07:30Foreign
07:44Foreign
08:00Foreign
08:16Anyone
08:20Foreign
08:30Foreign
08:42Foreign
09:00Foreign
09:10Unstable
09:30Foreign
09:40Foreign
09:48Foreign
10:00Foreign
10:14Foreign
10:30Foreign
10:56Foreign
11:00Foreign
11:06Foreign
11:14Foreign
11:26Foreign
11:30Foreign
11:40Foreign
11:50Foreign
12:00Foreign
12:24Foreign
12:30Foreign
12:44Foreign
13:00Foreign
13:08Foreign
13:14Foreign
13:30Foreign
13:40Foreign
14:00Foreign
14:04Foreign
14:16Foreign
14:26Foreign
14:30Foreign
14:44Foreign
15:00Foreign
15:06Foreign
15:14Foreign
15:24Foreign
15:30Activate
15:32Or mobile phone overheat
15:34Okay
15:36Wow
15:38Abhijit
15:40Analysis
15:42Foreign
15:44Foreign
15:46Foreign
15:48Foreign
15:50Foreign
15:52Foreign
15:54Foreign
15:56Foreign
15:58Foreign
16:00Foreign
16:02Foreign
16:04Foreign
16:06Foreign
16:08Foreign
16:10Foreign
16:12Foreign
16:14Foreign
16:16Foreign
16:18Foreign
16:20Foreign
16:22Foreign
16:24Foreign
16:26Foreign
16:28Foreign
16:34Foreign
16:42Foreign
16:56Sir, this chip doesn't belong to any registered company.
17:06Its serial number is also very old.
17:08But we have found a match in the database, sir.
17:10This chip was registered for the first time.
17:13At the time of the EcoMesh project.
17:15Three years ago.
17:17Project lead's name.
17:19Dr. Advait.
17:21EcoMesh?
17:22Sounds familiar.
17:25It used to control signal overload, right?
17:27Yes, sir.
17:28It used to manage signal traffic between tower systems.
17:32Sir, this means that this technology was made to help people.
17:35And now people are getting phone blasts because of this.
17:38How?
17:39Sir, look at this.
17:41The duplication of the chip design is recent.
17:43What?
17:45Two months ago, GRN Devices Lab activated it again.
17:49The technician's name is Karan.
17:51GRN Lab?
17:53Karan?
17:54The most interesting thing is that the name of the software code written in this chip.
17:58Titli underscore overwrite protocol.
18:00It must be a code name.
18:03Sir, it is possible that the person who made this program.
18:07To hide his real name.
18:09He must have written his name Titli.
18:11Karan.
18:12From where this signal is originating.
18:14We need its mapping.
18:16Once we know where it is coming from.
18:19We can reach the criminal.
18:20Sir.
18:21Sir.
18:22I know a person.
18:24Who is an expert in signal mapping.
18:27The one who has made this duplicate chip.
18:30Karan.
18:31We have to catch him.
18:33Find out where Karan is hiding.
18:48No.
18:51No.
18:56You are very brave ACP.
18:59Now you are part of my network.
19:03You answered.
19:05Now the city will listen.
19:07Goodbye ACP.
19:16I can't recognize your voice.
19:19Who can it be?
19:22Who can it be?
19:25Whoever it is.
19:27Wherever it is.
19:29Now I can't escape.
19:33Sir.
19:34Karan's location is somewhere around.
19:36No.
19:38Stop the car. Stop the car.
19:51Stop the car.
19:58Sir.
19:59This is Yasha.
20:00Telecom software expert.
20:02Like you said.
20:03We need a person.
20:04Who can understand signal mapping and tower relay.
20:07No one can be better than him.
20:09Hello sir.
20:10Sir, I have taken training in Bhoomi mam's AI workshop.
20:12I have also learnt tower modulation.
20:14Sir, I noticed an irregular signal bounce in some old towers.
20:18When I heard this news.
20:20I thought I should show you this data.
20:22Okay.
20:24Just remember.
20:25Whatever analysis you will do.
20:27You will do it through CID system.
20:29You will not use network from your personal phone.
20:32Alright sir.
20:34Sir.
20:35You are here.
20:36You should be with mom.
20:39I know Pankaj.
20:40But I tried.
20:43But.
20:44A CID officer can't stay away from his duty for long.
20:48So.
20:50Let's finish this game together.
20:53Sir.
20:57Yes, Kritika.
21:03Sir, look at this.
21:04Sir, this is the last location.
21:06This is Karan's location, sir.
21:08Chidinagar sector 5.
21:10This is 5 minutes away from here.
21:12Sir, I also saw some different signals at this place.
21:15Maybe this is the same place.
21:16Okay.
21:17Let's not waste time.
21:18Let's go there.
21:19Okay, Yasha.
21:20You will be connected to CID control room.
21:22And we need details of everything.
21:24Okay?
21:25Sure, sir.
21:48Let's go.
22:18Kritika.
22:48Kritika.
23:19Karan.
23:23Hey.
23:24Don't run.
23:25You will get shot.
23:31Stop.
23:32Stop.
23:37Sir.
23:38Enough.
23:39Your server is down.
23:43Sir, I didn't do anything.
23:44I am just a technician.
23:46There is an extra chip in the phone that is getting blasted.
23:48You made it.
23:49Do you have any idea that people are dying because of your chip?
23:52I was given designs, sir.
23:53I was told to make a new chip with the old designs of E-commerce.
23:57I was also told that I will get money for it.
23:59Who gave you the design?
24:01Sir, it was just a voice.
24:03I could only hear it.
24:04I couldn't see it.
24:05Whose voice?
24:06Dr. Advait's?
24:07No, sir.
24:08He is missing since a long time.
24:09Whether he is missing or hidden, we will not find him.
24:11How can we put this chip in the phones?
24:16Through the free phone repair campaign,
24:18a person used to go to people's houses and
24:20used to take their phone and put a new chip in it.
24:23Was it your person or someone else?
24:25I just hired technicians.
24:27I thought it was just testing.
24:30Arrest him.
24:31And seize all the hard drives and chips here.
24:34Take him away.
24:36He is just a pawn.
24:40The real mastermind is someone else.
24:42That E-commerce research lab has been closed for three years.
24:45We have to go there.
24:47We will get answers to some questions there.
25:12E-commerce Research Lab
25:42E-commerce Research Lab
26:12E-commerce Research Lab
26:14E-commerce Research Lab
26:16E-commerce Research Lab
26:18E-commerce Research Lab
26:20E-commerce Research Lab
26:22E-commerce Research Lab
26:24E-commerce Research Lab
26:26E-commerce Research Lab
26:28E-commerce Research Lab
26:30E-commerce Research Lab
26:32E-commerce Research Lab
26:34E-commerce Research Lab
26:36E-commerce Research Lab
26:38E-commerce Research Lab
26:40E-commerce Research Lab
26:42E-commerce Research Lab
26:44E-commerce Research Lab
26:46E-commerce Research Lab
26:48E-commerce Research Lab
26:50E-commerce Research Lab
26:52E-commerce Research Lab
26:54E-commerce Research Lab
26:56E-commerce Research Lab
26:58E-commerce Research Lab
27:00E-commerce Research Lab
27:02E-commerce Research Lab
27:04E-commerce Research Lab
27:06E-commerce Research Lab
27:08Sir?
27:09There's something here, sir.
27:10Yes.
27:11Sir?
27:12What happened?
27:13There's a sound coming from downstairs.
27:30Dr. Advaith.
27:32Dr. Advaith, are you okay?
27:35Dr. Advaith.
27:37Don't worry.
27:38We're from the CID.
27:40Are you okay?
27:41I...
27:43I was locked up in this room on someone's orders.
27:47Who did this?
27:48Who was he?
27:49He stole my system.
27:52I had made it for the city's towers and roads.
27:57Someone turned it into a bomb.
28:00Who stole it?
28:01There was a message on my computer.
28:05Take this pen drive.
28:08There's a voice in it.
28:10A voice?
28:11A voice?
28:13A voice?
28:30You must be wondering how the CID got here.
28:34This isn't a small team.
28:36The whole world knows your names.
28:39That's why I wanted the CID to come into my game.
28:42Because the real fun in playing chess with a real player
28:46doesn't come with a pawn.
28:48Sir, this is an open challenge.
28:51Dr. Advaith.
28:53Yes.
28:54That was my way.
28:55A trap.
28:57You think you've found me.
29:00That's my victory.
29:02So this video was made for us.
29:06I'm not afraid of you CID guys.
29:09I just need a little more time.
29:11The tower is ready.
29:13The voice too.
29:16The city will be shaken with the next signal.
29:23It seems like he planned everything.
29:26Don't let the CID get to Dr. Advaith.
29:29Maybe he's sending us in a different direction.
29:32Either Dr. Advaith is lying
29:35or he's playing someone else's game.
29:39He's already up to something big.
29:41Yasha, did you trace the location?
29:50Sir, an unusual tower signal has been traced.
29:53It changes every 10 seconds.
29:55That means the source is moving.
29:57So it's not a fixed tower?
29:59No, sir.
30:00It's coming from a moving van.
30:02The location is 1 km away.
30:05Industrial zone, sector 90.
30:08One second, sir.
30:09Look at this.
30:11This is the van.
30:12The current hotspot of the signal.
30:14The signal is active.
30:15That means they're preparing for the blast.
30:17Get the team ready.
30:18Inform the backup unit.
30:19We're leaving right away.
30:32Okay.
30:58Sir, the signal is coming from this van.
31:01The frequency was detected during the mobile blast.
31:19No one will even know
31:21that this van has become a ticking bomb for the entire city.
31:31We're leaving.
31:50The entire system is set here.
31:52The blast is ready.
31:55There's very little time.
31:57Cut all the connections.
31:58No, sir.
31:59If we cut anything wrong,
32:00the signal will trigger instantly.
32:02Remote deactivation is not safe.
32:05That means we're trapped.
32:07He knew we'd find this van.
32:25If anyone picks up this phone,
32:28the entire block will be blown up.
32:32Everyone, get out.
32:33This van is here to blow us up.
32:35Come on, fast.
32:36Out.
32:59Out.
33:18Sir, the security of the bureau has been breached.
33:21Someone is stealing our data.
33:23Come on, let's go.
33:28Sir, the system is being breached.
33:30Someone is hacking our internal server.
33:38What's the data?
33:39Sir, 75%.
33:40It's being transferred quickly.
33:42Just a few more seconds.
33:50The CID is trapped.
33:54Shut down the power.
33:55Quick, come on.
34:02Sir.
34:03Locus is safe.
34:07Yasha.
34:08Where's Yasha?
34:11Where is she?
34:12Check the CCTV footage.
34:20Sir.
34:21Sir.
34:22Yes.
34:23Three minutes before the breach, Yasha left.
34:26It was all her plan.
34:29This man is not just a voice.
34:32He was listening to every move, every word of the CID.
34:36The CID was in his control.
34:38A girl kept spilling mud in front of us.
34:42And we couldn't recognize her.
34:44The CID was in his control.
34:49You are a part of the CID.
34:50You recommended Yasha.
34:52He hacked the entire system.
34:53You didn't even know?
34:54Sir, I had no idea about his intentions.
34:59Sir, I thought he was an expert.
35:00He would help us.
35:01Help?
35:02He transferred 99% of the data.
35:05It would have gone to 100% if he hadn't shut down at the right time.
35:08Do you have any idea what was going to happen?
35:11You gave the access, right?
35:12Sir, I gave the approval.
35:14He was working in the control room.
35:16He was in front of everyone.
35:17So, I thought it would be safe.
35:18Bhoomi, no one can be trusted in our profession.
35:22Did you check the background?
35:23Sir, he gave me the documents.
35:28I didn't think they could be fake.
35:31Look, Bhoomi.
35:32Either you made a mistake or you are a part of this.
35:37And in both cases, he is dangerous for the CID.
35:39Okay.
35:40Sir, I will never go against the CID.
35:43Only time will tell.
35:46But now you are a part of the CID's investigation.
35:48And out of this case.
36:06Sir!
36:10Yes.
36:11Sir, we found an old file in the first van blast.
36:15In that old file, one place was mentioned again and again.
36:17Bandra Industrial Zone.
36:19Sir, I know this area very well.
36:21A telecom company's trial van was always parked there.
36:24So, Yasha didn't just make one van.
36:27He had a backup too.
36:29One for us.
36:31And one for the city.
36:32Sir, we just got a signal trace from there.
36:34Sir, I think the blast will take place from there.
36:36So, let's go.
36:37Let's go.
36:39Either this game will be over tonight
36:42or this city will be blown up.
36:55Sir!
36:57Sir, the signal has been confirmed.
36:59This van is the final source.
37:08This is the tower.
37:09Everything is happening from here.
37:10Go inside the van.
37:11Okay.
37:12I'll check the tower.
37:13Yes.
37:38There are a lot of wires here.
37:40Where is the control panel?
37:45Sir!
37:46There it is.
38:07Sir!
38:15Come on.
38:21There is very little time.
38:28Sir, are you sure which wire will trigger it?
38:31If we cut the wrong wire, the entire block will blow up.
38:37Yes, sir.
38:54Yes, sir!
39:00We'll see.
39:07Sir!
39:34This was your last chance.
39:37Come on.
39:53So, this is the thing that brought you to me.
39:55I already had a doubt when you told me the location of that van so quickly.
40:00Did you come alone?
40:03Should I consider this as your bravery or stupidity?
40:06I am in CID.
40:08I have complete faith in my decision.
40:10And also in the system.
40:12Wow.
40:13Impressive.
40:15You turned out to be much smarter than I thought.
40:19But not anymore.
40:21You have broken the CID system.
40:24And also my trust.
40:31It's done.
40:33We are safe.
40:35Come on. Come on.
40:44It's done.
40:46He was talking about blowing up the city.
40:49His voice has stopped.
40:52Game over.
41:05Sir!
41:07Umi, you...
41:11Oh.
41:13You have brought your proof of innocence along.
41:16One has to take decisions for CID, sir.
41:18Sometimes alone too.
41:19What job, Umi?
41:20I am the CID's head constable.
41:22I am the CID's head constable.
41:24I am the CID's head constable.
41:26I am the CID's head constable.
41:28I am the CID's head constable.
41:30I am the CID's head constable.
41:32Good job, Umi.
41:33I am a part of CID, sir.
41:36I will always be.
41:43Your game is over, Yasha.
41:46Now only the truth.
41:48Who do you work for?
41:49I didn't work for anyone.
41:53I just worked.
41:54I didn't get paid.
41:57I don't know who was sending the money.
41:59I don't know who was sending the money.
42:01What work were you given?
42:03Entering the CID's system.
42:04Hacking from inside.
42:06And activating the voice protocol.
42:08Voice protocol?
42:09Yes.
42:10I used to get only one instruction.
42:13Look into their eyes.
42:15Win their trust.
42:17And steal everything.
42:19After every job,
42:20I used to get money in a new account.
42:22My job was very simple.
42:24I used to sit in front of you
42:27and steal your system.
42:30Who was your mastermind?
42:33I was just a pawn.
42:35The game that was going on
42:37belonged to someone else.
42:40The voice is still inside the network.
42:45Voice?
42:48This voice is the mastermind.
42:50Until you think that everything is over,
42:54he will press his next button.
43:10Is this voice
43:12Barbossa?
43:13No.
43:22Are you?
43:23Hmm.
43:27Son, you didn't pick up my call.
43:30I will now.
43:32Always.
43:34You didn't sleep.
43:43You were scared.
43:45What if...
43:50I was waiting for you.
43:52To wake up.
43:53So that I can sleep in your lap.
43:57Come, son.
44:00Sleep in my lap.
44:13Yes.
44:24Yes.