SlideShare a Scribd company logo
1 of 9
Download to read offline
Disconnected
Inspiration
These are the
films that have
influenced our
idea.
These images also gave us
some visual inspiration to our
project i.e. mise en scene.
Plot
A level student and computer wizz-kid Andrew, has been given a homework assignment to try and decode a fake online database (that’s been set
up by his subject teacher). While working on the assignment, he stumbles upon the British government’s database and uncovers ethical and
sensitive information about public privacy. Outraged by his discovery, he takes on the alias Cyber Shadow, and threatens the government with
cryptic messages and clues. The government receives these messages and decodes them, ‘either release the information yourself or I will… you
have 48 hours’. The government knows that if they release this information, then their image as a ‘trusted government’ would shatter. The PM
decides to send out two MI5 agents (Billy and Dan) to track the student down. Using the clues and taunts that Cyber Shadow sent, the agents
think that they have discovered his location and decide to arrest him. But when they storm their suspected location, it was empty. The student led
them to the wrong location and uploads the sensitive information online for the public to see.'
3 Act structure
Act 1 Plot Point 1 Act 2 Plot Point 2 Act 3
A level student and
computer wizz-kid
(name), has been given
a homework assignment
to try and decode a fake
online database (that’s
been set up by his
subject teacher). While
working on the
assignment, he stumbles
upon the British
government’s database
and uncovers ethical and
sensitive information
about public privacy.
Outraged by his
discovery, he takes on
the alias (name), and
threatens the
government with cryptic
messages and clues.
The government
receives these
messages and decodes
them, ‘either release the
information yourself or I
will… you have 48
hours’.
The government knows
that if they release this
information, then their
image as a ‘trusted
government’ would
shatter. The PM decides
to send out two agents
(name and name) to
track the student down.
Using the clues and
taunts that the student
sent, the agents think
that they have
discovered his location
and decide to arrest him.
When they storm their
suspected location, it
was empty. The student
led them to the wrong
location and uploads the
sensitive information
online for the public to
see.'
This is our plot in the form of Syd Feild's three act structure, we will focus and
include the plot points in our trailer.
Characters
Andrew (Cyber Shadow): The hacker and A-level computer
student who ends up hacking into the British government’s
database and go under the alias Cyber Shadow.
Billy (Agent 1): An agent sent by the British government (and
teamed up with Dan) to track down Cyber Shadow.
Dan (Agent 2): An agent sent by the British government (and
teamed up with Billy) to track down Cyber Shadow.
Mise en Scene
● Dark setting in a room full of computers surrounding the hacker.
● Agents wearing suits and are searching for the hacker using various tools
and gadgets.
● The mise en scene gets darker as Andrew becomes Cyber Shadow
Target Audience
Primary Target Audience:
Our main target audience will consist of a young audience between the age of 15
- 35 years old. This is because this age range have grown up with and
experienced the technology of computers.
Secondary Target Audience:
Anyone over 35 years old who would find films (with similar themes) interesting
i.e. Wargames and The Matrix.
Branding
The branding for our film will have a logo that will be an electronic style font.
We have different ideas such as the silhouette of the hacker, a logo that the
hacker uses in the film or computer code.
Example of font.
Marketing
- Social Media
- Trailer
- ‘Fake Virus’ promotion
- Posters
- Website
- Early screening for journalists.

More Related Content

Viewers also liked

Shotlist (after filming day).doc
Shotlist (after filming day).docShotlist (after filming day).doc
Shotlist (after filming day).docStrudwick
 
Existing Magazine Research
Existing Magazine ResearchExisting Magazine Research
Existing Magazine ResearchStrudwick
 
Media question 2- Evaluation 004
Media question 2- Evaluation 004Media question 2- Evaluation 004
Media question 2- Evaluation 004GuyHorsfall
 
Disconnected Screenplay
Disconnected ScreenplayDisconnected Screenplay
Disconnected ScreenplayStrudwick
 
Filming schedule
Filming scheduleFilming schedule
Filming scheduleStrudwick
 
Film Day Risk Assessment
Film Day Risk AssessmentFilm Day Risk Assessment
Film Day Risk AssessmentStrudwick
 
Magazine development
Magazine developmentMagazine development
Magazine developmentLH6868
 
Acceptance
Acceptance Acceptance
Acceptance LH6868
 

Viewers also liked (11)

Shotlist (after filming day).doc
Shotlist (after filming day).docShotlist (after filming day).doc
Shotlist (after filming day).doc
 
Existing Magazine Research
Existing Magazine ResearchExisting Magazine Research
Existing Magazine Research
 
Media question 2- Evaluation 004
Media question 2- Evaluation 004Media question 2- Evaluation 004
Media question 2- Evaluation 004
 
Disconnected Screenplay
Disconnected ScreenplayDisconnected Screenplay
Disconnected Screenplay
 
Filming schedule
Filming scheduleFilming schedule
Filming schedule
 
Shotlist
ShotlistShotlist
Shotlist
 
Film Day Risk Assessment
Film Day Risk AssessmentFilm Day Risk Assessment
Film Day Risk Assessment
 
Gamble Powerpoint
Gamble PowerpointGamble Powerpoint
Gamble Powerpoint
 
Magazine development
Magazine developmentMagazine development
Magazine development
 
Acceptance
Acceptance Acceptance
Acceptance
 
Question 3
Question 3Question 3
Question 3
 

Similar to A2 Media Project Pitch

Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioNatalie Acevedo
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie Acevedo
 
Social Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxSocial Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxDaniel Gorita
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world? Dipak Parmar
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security AgencyToya Shamberger
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
2600 v14 n1 (spring 1997)
2600 v14 n1 (spring 1997)2600 v14 n1 (spring 1997)
2600 v14 n1 (spring 1997)Felipe Prado
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniRiziqRamadani
 
A news photographer is being investigated for embezzling money from th.pdf
A news photographer is being investigated for embezzling money from th.pdfA news photographer is being investigated for embezzling money from th.pdf
A news photographer is being investigated for embezzling money from th.pdfBrianp9BHillc
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 

Similar to A2 Media Project Pitch (20)

Deeply Inspired Designs Porfolio
Deeply Inspired Designs PorfolioDeeply Inspired Designs Porfolio
Deeply Inspired Designs Porfolio
 
Natalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digitalNatalie's Acevedo Porfolio digital
Natalie's Acevedo Porfolio digital
 
Social Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxSocial Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptx
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
Pitch
PitchPitch
Pitch
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Pitch
PitchPitch
Pitch
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Hardrive presentation
Hardrive presentationHardrive presentation
Hardrive presentation
 
Hardrive Presentation
Hardrive PresentationHardrive Presentation
Hardrive Presentation
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
2600 v14 n1 (spring 1997)
2600 v14 n1 (spring 1997)2600 v14 n1 (spring 1997)
2600 v14 n1 (spring 1997)
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq Ramadani
 
A news photographer is being investigated for embezzling money from th.pdf
A news photographer is being investigated for embezzling money from th.pdfA news photographer is being investigated for embezzling money from th.pdf
A news photographer is being investigated for embezzling money from th.pdf
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Hackers
HackersHackers
Hackers
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 

Recently uploaded

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

A2 Media Project Pitch

  • 2. Inspiration These are the films that have influenced our idea. These images also gave us some visual inspiration to our project i.e. mise en scene.
  • 3. Plot A level student and computer wizz-kid Andrew, has been given a homework assignment to try and decode a fake online database (that’s been set up by his subject teacher). While working on the assignment, he stumbles upon the British government’s database and uncovers ethical and sensitive information about public privacy. Outraged by his discovery, he takes on the alias Cyber Shadow, and threatens the government with cryptic messages and clues. The government receives these messages and decodes them, ‘either release the information yourself or I will… you have 48 hours’. The government knows that if they release this information, then their image as a ‘trusted government’ would shatter. The PM decides to send out two MI5 agents (Billy and Dan) to track the student down. Using the clues and taunts that Cyber Shadow sent, the agents think that they have discovered his location and decide to arrest him. But when they storm their suspected location, it was empty. The student led them to the wrong location and uploads the sensitive information online for the public to see.'
  • 4. 3 Act structure Act 1 Plot Point 1 Act 2 Plot Point 2 Act 3 A level student and computer wizz-kid (name), has been given a homework assignment to try and decode a fake online database (that’s been set up by his subject teacher). While working on the assignment, he stumbles upon the British government’s database and uncovers ethical and sensitive information about public privacy. Outraged by his discovery, he takes on the alias (name), and threatens the government with cryptic messages and clues. The government receives these messages and decodes them, ‘either release the information yourself or I will… you have 48 hours’. The government knows that if they release this information, then their image as a ‘trusted government’ would shatter. The PM decides to send out two agents (name and name) to track the student down. Using the clues and taunts that the student sent, the agents think that they have discovered his location and decide to arrest him. When they storm their suspected location, it was empty. The student led them to the wrong location and uploads the sensitive information online for the public to see.' This is our plot in the form of Syd Feild's three act structure, we will focus and include the plot points in our trailer.
  • 5. Characters Andrew (Cyber Shadow): The hacker and A-level computer student who ends up hacking into the British government’s database and go under the alias Cyber Shadow. Billy (Agent 1): An agent sent by the British government (and teamed up with Dan) to track down Cyber Shadow. Dan (Agent 2): An agent sent by the British government (and teamed up with Billy) to track down Cyber Shadow.
  • 6. Mise en Scene ● Dark setting in a room full of computers surrounding the hacker. ● Agents wearing suits and are searching for the hacker using various tools and gadgets. ● The mise en scene gets darker as Andrew becomes Cyber Shadow
  • 7. Target Audience Primary Target Audience: Our main target audience will consist of a young audience between the age of 15 - 35 years old. This is because this age range have grown up with and experienced the technology of computers. Secondary Target Audience: Anyone over 35 years old who would find films (with similar themes) interesting i.e. Wargames and The Matrix.
  • 8. Branding The branding for our film will have a logo that will be an electronic style font. We have different ideas such as the silhouette of the hacker, a logo that the hacker uses in the film or computer code. Example of font.
  • 9. Marketing - Social Media - Trailer - ‘Fake Virus’ promotion - Posters - Website - Early screening for journalists.