Feeds

Bird of Prey: 1980s IT on on the small screen

How an overweight computer expert took on a Europe-wide conspiracy and won

5 things you didn’t know about cloud backup

'You don't need a licence for one. At least not yet'

Ironically, then, for all the suggestion we might all become merely numbers in the machine, it’s Henry’s computers skills - and the ready availability of computer hardware: “64K memory, disk drive, storage for 120,000 characters. And you’ll need a modem,” the sales assistant tells him - that allows our hero to unpick the web of conspiracy.

Bird of Prey

Henry talks crime with City of London Fraud Squad DI Richardson (Jim Broadbent)

Technology, Hutchinson was clearly saying, was as much a force for personal empowerment as an bureaucratic tool. Ayn Rand would have been proud.

Computers can act against you. “Just think of it as an extra couple of million PC Plods walking up the street very slowly and thinking even slower,” says a Police Computer operator in episode two.

Bird of Prey

The computerless office. No typewriter, either

But then for exposing the nefarious they can't be beaten: "A few years ago [information] would have stayed in the file gathering dust. Now you put it in the magic machine and sometimes it comes up with connections you never dreamed of."

Computers for bad, computers for good. Yet gadgets do little to hinder Henry - or anyone else, for that matter. It’s the human connections that drive the conspiracy. French fraudster Louis Vacheron hopes The Power will get him off the hook - instead, the danger posed to others by his cocked up crime gets him killed by the same mechanism, which is also employed to use the Vice Squad to scare Henry from getting too nosey. The killers, robotic though they seem, are human.

Bird of Prey

Friend or foe?

It’s Le Pouvoir which is the anonymous power, not the computer, able to suborn not only the police but the security services to prevent a bigger crime from succeeding.

The show’s one flaw, perhaps, is that a nebulous power makes for a less compelling ‘villain’ - there is no éminence grise using power and influence, murder and mayhem. Charles Bridgnorth, a colourful, larger-than-life intelligence operative who prefigures 1985’s Edge of Darkness’ grey area operating CIA man Darius Jedburg - Edge of Darkness was overseen, like Bird of Prey by veteran BBC drama producer Michael Wearing - here fills the villain’s shows rather more fully than slimy Eurocrat Hugo Jardine, but he’s no closer to the centre of the web.

Bird of Prey

1980s kit

They’re just cogs in the works, both repaying favours owed to others, though hoping to make a bob or two in the process of a scheme to monopolise the then yet-to-be-built Channel Tunnel. The year before Bird of Prey was shown, Margaret Thatcher and François Mitterrand agreed to back a solid but a privately funded attempt to create the 'chunnel'.

Still, you can’t argue with the verisimilitude. Director Michael Rolfe sent a youthful Jim Broadbent - long before he achieved National Treasure status - to spend time with the City of London Fraud Squad, the better to inform his performance as DI Richardson, and he comes across as a believable copper. Richardson also gets the best lines.

Henry “And why do we keep meeting in pubs?”

Richardson “I like pubs. And they sell beer.”

Bird of Prey

Civil servant Tony Hendersley (Jeremy Child) learns what it's all about

Richard Griffiths is no less effective as the put-upon civil servant Henry Jay, and it’s a strong cast all round. Only Ann Pennington’s investigative journalist who also runs a “commercial intelligence consultancy” stretches credibility, though as much because of her OTT 1980s wardrobe and mode of speech, Tiger, as anything else.

But Bird of Prey is never less than utterly entertaining and pulls you in, even now, through Hutchinson’s plotting and splendid dialogue - "It's the 80s; death by violence counts as natural causes" - musician Dave Greenslade’s 8-bit era synthy soundtrack and Griffiths portrayal of Henry. He is the innocent boffin splendidly isolated from the real world who is then forced to empower himself to protect his life and loves. He’s an archetypal nerd hero who uses brains - and, occasionally, IT - not brawn to win through. ®

Bird of Prey is still available on DVD paired with its less impressive sequel.

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.