Feeds
70%
Call of Duty: Black Ops 2

Call of Duty: Black Ops 2 game review

Playing with fire

  • alert
  • submit to reddit

High performance access to file storage

Wails from the script

Well, the setting has changed for one. Much of the game is now set in what could be dubbed "future warfare" where governments have gone drone happy and China controls much of the world's resources.

Call of Duty: Black Ops 2

Shut down the computer

Thing is, China isn't the villain of the piece, that honour goes to Raul Menendez who, much like your average Bond villain, has a victim complex a mile wide leaving him firmly in the "Death to America" camp. No prizes for guessing you'll be gunning for Team USA then – in missions that flit between past and future battles – as Menendez's sob story is laid bare.

I'm just going to say it now: Black Ops 2, despite involvement from some Hollywood scribes, including David S. Goyer – The Dark Knight, Blade – won't be winning any awards for its narrative. Indeed, if Goyer was as involved, as stated, then he's evidently decided against bringing his best to the project.

Call of Duty: Black Ops 2

Aim to chute?

That said, strides have been made to revolutionise its narrative structure. This is still no Mass Effect, but story branches will split based on your mission success. This, at least, lends some replayability to proceedings. Further variation comes courtesy of numerous Strike Force missions. Think, single player assault-type missions with casual real-time strategy thrown in for good measure.

These are not only an attempt to splice something new into the Call of Duty formula, but also affect the game's progression (and even ending) depending on how well you perform. Previously missed objectives might also be completed here too, should you perform well.

Aside from these few sections, however, the spectres of aforementioned bottlenecks and survival episodes remain unexorcised, meaning the actual nuts and bolts of the gameplay doesn't lend itself well to repeat servings.

Call of Duty: Black Ops 2

Attack with the Parrot drone

Treyarch has gone all out to impress with toys – flying suits, operable mechs, cloaking fatigues, even cavalry charges – but such options fall flat when used against enemy forces lacking any semblance of personality or intelligence.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.