======================================================================= Cybernetics in the 3rd Millennium (C3M) Volume 12 Number 1, Jul. 2015 Alan B. Scrivener — www.well.com/user/abs — mailto:abs@well.com ======================================================================== In this issue: Spy vs. Spy appropriated to sell spy software (muzeum.llu.pl/konkurs/app-for-tracking/phone-spy-by-imei.html)
- Reboot Du Jour
- Uncrackable Encryption for the Masses
- "If It's Just a Virtual Actor, Then Why Am I Feeling Real Emotions?" (Part Six)
Reboot Du Jour
I know it's getting old, but I am yet again rebooting this eZine. Here's a few short subjects to begin:
a postcard promoting my new book, now on Amazon.com
- I wrote a book, and you can buy it on Amazon: "A Survival Guide for the Traveling Techie" (2014) by Alan B. Scrivener. ( www.amazon.com/exec/obidos/ASIN/0974996815/hip-20 ) I also have a website to promote it, which desperately needs work. (Any web marketing folks out there want to give me a bid to fix it up?) ( travelingtechie.com ) And I'm even writing a blog, the "Traveling Techie Blog," to promote it as well. ( travelingtechie.blogspot.com )
- I spent most of 2014 consulting for a company called SynGlyphX, which uses 3D shapes called "glyphs" to display high-dimensional, complex spatial data in an intuitive way. The above video explains the concepts. The work is based on a public domain tool called ANTz. ( github.com/openantz/antz ) Also check out the SynGlyphX YouTube channel, ( www.youtube.com/user/SynGlyphX ) and my colleague Jeff Sale's site about ANTz at EdWorlds. ( www.edworlds.com/antz/toroids )
- Nora Bateson's awesome film "An Ecology of Mind," which I have spoken highly of before, is now on Vimeo. ( vimeo.com/ondemand/bateson )
- I received an email from Anna Chekovsky (about a year ago) letting me know she translated my 1993 article for the Medicine Meets Virtual Reality conference, "The Impact of Visual Programming in Medical Research," into Swedish. ( www.teilestore.de/edu/?p=1384 )
IATSE logo
- Follow Up to "What Just Happened?" in C3M volume 11 number 1. ( www.well.com/user/abs/Cyb/archive/c3m_1101.html#sec_1 ) Shortly after I wrote the article, about Samuel L. Jackson and the Academy Awards dissing digital artists at the 2013 Oscars, I attended the 2013 international conference on computer graphics and interactive techniques, commonly called SIGGRAPH, held in Los Angeles July 21-25. ( s2013.siggraph.org ) On the exhibits floor I found a booth for the labor union known as IATSE, the InternationalAlliance of Theatrical Stage Employees, which as it turns out is making a full court press to be the union of digital artists and animators for the movie and television industries. ( iatse.net ) I spent some time talking to the representative in the booth, especially about the events of the 2013 Oscars. He confirmed what I suspected, which is that many actors, including Mr. Jackson in particular (according to a conversation this gentleman had been a party to), feel that their craft is in danger of becoming extinct, or at least marginalized, due to computer graphics technology. He and I agreed that this is absurd. After all, for example, why does Pixar keep hiring big stars to do voices, instead computer generating them? Because only a human can give the kind of emotional performances audiences want to experience. Those of us inside the CGI industry understand this, but unfortunately some actors have believed the unrealistic prognostications that have been around since the 1980s, predicting complete replacement of actors by VActors (see the article at the end of this 'zine for more detail). If you ask me, the real tragedy is that the digital artists and animators, who are also human beings, are not getting the credit they deserve. The are still considered "below the line" employees, meaning they are not believed to contribute creatively, but only provide necessary grunt work, like a grip does. This is a modern scandal. While I don't generally see the benefits of unionization in the tech world, I am coming around to the viewpoint that in union-dominated Hollywood the Johnny-come-latelies in the computer industry need union protection to get the respect they deserve, as well as screen credits, benefits like overtime and pensions, and often even just to get paid. More on this as I become aware of it.
Uncrackable Encryption for the Masses
Captain Midnight decoder ring (en.wikipedia.org/wiki/Secret_decoder_ring)
"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." — Fourth Amendment to the United States Constitution, 1792 ( en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution )
|
|
antique lock box with key, circa 1800
(http://hygra.com/uk/wb2/wb119/)
Analogy #1: The lock box. Most people understand the lock and key, an amazingly digital technology from the analog era. If I give you a lock box and send you to see Alice, who has the key, you can't see what's in the box unless you pick the lock or break the box. This is the promise of encryption, that someone — or some mechanism — can carry an encrypted message, but no one who possesses it will be able to read it without the encryption key that allows it to be decrypted back to its "plaintext" form.
the routes of Paul Revere and associates
(thehistoricpresent.wordpress.com/2011/08/15
/what-does-one-if-by-land-two-if-by-sea-mean/)
Analogy #2: "One if by land, two if by sea." Most every
schoolchild in America knows the story of Paul Revere's ride, warning the
Minutemen that the British were coming, and how a signal in the tower of the
Old North Church revealed their route -- "One if by land, two if by sea." Though
anyone in Boston could see the lights in the tower (did you remember that there
were two?) only those who knew the code could interpret them.
But what if the secret of the code got out? The British (or anyone else) could
know what the colonists knew. A more sophisticated code would work this way:
on the morning of the ride the signaler ( sexton Robert Newman ) could flip
a coin, and use this formula:
"Once I had a secret code, Where A was B, and B was G. G was K, and K was J; And J was M, and M was P. V was X, and X was V, And U was I, and I was U. 87 stood for Z, And 2 for T, and T for 2. O was 12, and Q was 17; I still don't know what those numbers mean. That is how we won the war; My secret code's no secret anymore. H was 9, and S was 33; Oh, how that confused the enemy! Then a recent survey showed That I don't understand my secret code." — "Secret Code" (parody of "Secret Love") by Allan Sherman, 1953 ( www.youtube.com/watch?v=rdrN9lOw6po ) ( www.amazon.com/exec/obidos/ASIN/B003SWFLYW/hip-20 )So let's talk about ciphers for a minute. Any encoding technique which substitutes one symbol for another is called a cipher. Fans of the movie 2001: A Space Odyssey may recall that clever viewers spotted the fact that the name of the murderous computer, HAL, could be transposed to IBM just by bumping each letter up to the next one in the alphabet (and from Z to A to wrap around). This is a trivial cipher, and not worth using unless perhaps if you're trying to confound children. This type of cipher is know as as a ROT1 since the letters are "rotated" by one. ( listverse.com/2012/03/13/10-codes-and-ciphers/ ) shift by 1 (ROT1) A -> B B -> C C -> D ... Y -> Z Z -> A You can add a little complexity by bumping up by a different number than one (and of course you must again wrap around from Z to A if you go beyond the end of the alphabet.) This is essentially the encryption technique provided by the famous Captain Midnight (above) and Little Orphan Annie decoder rings of yore. It is called the Caesar cipher, named after Julius Caesar, who used it in his private correspondence. ( en.wikipedia.org/wiki/Caesar_cipher ) shift by 4 (ROT4) A -> D B -> E C -> F ... Y -> C Z -> D The next step in increasing complexity is to have each letter encode as another in some scrambled way, instead of having each "mapping" be by shifting all the letters by the same amount. (Allan Sherman's song, "Secret Code," describes such a cipher in the lyrics quoted above.) scrambled A -> M B -> K C -> Y ... Y -> D Z -> N It might seem like this would make a pretty good cipher, but actually it wouldn't. The table above is considered the "key" to the cipher, and this case the key is one letter long — it is applied to each letter the same way. This means that every time a letter in the plaintext is repeated, the encrypted letter will also always be the same. This makes it possible to find patterns in the message. The historical novel "Cryptonomicon" (1999) by Neal Stephenson has a passage in which such s cipher is quickly broken. ( www.amazon.com/exec/obidos/ASIN/0060512806/hip-20 ) In World War II a group of Army recruits who are being screened for possible code-breaking talent are placed in a classroom with a chalk board, and an officer begins writing without addressing them.
"Reading from a notebook, [Commander Schoen] writes out the following in block letters:( www.euskalnet.net/larraorma/crypto/slide7.html ) If you have the same techie impulses I do you might like to attempt to break the code before you continue reading. * * * By doing a frequency analysis the character of Waterhouse quickly identifies 18 as standing for the letter E in the message, and goes on to solve it: "ATTACK PEARL HARBOR DECEMBER SEVEN" — which immediately earns him a place in the code-breaking team. A more complicated case is called a Vigenére cipher. In this case the shift is different for each character in the message, up to a point where the key repeats. Often a phrase is used to represent the shifts. The first time I ran across this technique was in a Hardy Boys book I read as a kid. The boys found a piece of paper covered in apparent gibberish, with the initials C.S.A. written across the page. They eventually figured, with the paper dated from the Civil War and the initials stood for "Confederate States of America" which was the encryption key. Using this key over and over they decrypted the message. In such an encoding each letter in the key represents a numeric shift in the letters: A is 1, B is 2, etc. So the first letter in the message is shifted 3 letters (C), the second letter is shifted 15 letters (O), the third letter is shifted 14 letters (N), etc. This kind of cipher is possible to crack using the same letter frequency techniques (though a computer is probably required) as long as the message is no shorter than the key. This brings us to the central lesson here: if the key is as long as the message, and the key is random, the cipher becomes uncrackable. Not hard to crack, not crackable only with powerful computers and a long time, but theoretically uncrackable.19 17 17 19 14 20 23 18 19 8 12 16 19 8 3 21 8 25 18 14 18 6 31 8 8 15 18 22 18 11Around the time that the fourth or fifth number is going up on the chalkboard, Waterhouse feels the hairs standing up on the back of his neck. By the time the third group of five numbers is written out, he has not failed to notice that none of them is larger than 26 — that being the number of letters in the alphabet. His heart is pounding more wildly than it did when Nipponese bombs were tracing parabolic trajectories toward the deck of the grounded Nevada. He pulls a pencil out of his pocket. Finding no paper handy, he writes down the numbers from 1 to 26 on the surface of his little writing desk."
the secure teletype between Washington and Moscow,
sometimes called the "red phone" though it was neither
(http://skeptics.stackexchange.com/questions
/4215/does-the-u-s-president-have-a-red-phone)
"Any one who considers arithmetical methods of producing random digits is, of course, in a state of sin." — John Von Neumann, 1951( en.wikiquote.org/wiki/John_von_Neumann ) While current debates over encryption wrestle with "how strong is strong enough?" (a 512-byte key is often defined as "strong" encryption), the technique of using a random key as long as the message has been known since 1882, and has been in the public domain since the 1930s, when a 1919 patent expired. ( en.wikipedia.org/wiki/One-time_pad ) Of course, creating random numbers is a tricky business. The best definition of "random" is "unpredictable." But it is only possible to prove that a given sequence of numbers isn't random, not that it is. Still, human history provides a time-tested set of techniques, mostly associated with gambling. Coin flips, roulette wheels, dice, lottery balls and thorough card shuffles have been used for a long time without problems (in the absence of cheating) to create fair games of chance. The above-mentioned "Cryptonomicon" describes secretaries at the legendary Bletchley Park in England in World War II drawing pieces of paper to create random keys for one-time-pad codes used by allied military codes. The big problem is that these techniques are labor-intensive. Recently, hardware random number devices have become popular, using various types of electronic, thermal or quantum noise to generate random numbers, which at last allows the process to be automated. ( en.wikipedia.org/wiki/Hardware_random_number_generator ) It must be emphasized, as Dr. Von Neumann warned us, that using an algorithm or formula — which is a repeatable process — cannot produce random numbers; that is why these techniques are called pseudo-random. Recent advances in the mathematical field called chaos theory have yielded a better theoretical understanding of how the traditional gambling techniques actually work, but the best evidence of their effectiveness is that people keep using them. Both sides in World War II used this technique for some secure communications, and when used properly these codes were never broken. In the 1960s when the US and the USSR implemented the so-called "red phone," a teletype system was combined with paper tapes of random numbers, identical at both ends, to ensure secure transmission. (I was surprised to learn that the system was never used for any "real" communication between the superpowers; only test messages consisting of quotes form American and Russian literature were sent back and forth.) Believe me when I tell you that a message encoded with a truly random one-time-pad can not be "cracked" by any cryptanalysis technique, now or in the future. If the NSA is collecting citizen emails and archiving them against the day when future techniques have evolved to allow them to be read, this approach will not do any good, ever, with randomly encrypted communications.
"I usually go around speaking on the threat of the human element, particularly on social engineering." — Kevin Mitnick, famous cybercriminal( www.inspirationalstories.com/quotes/t/kevin-mitnick ) Okay, I'm going to warn you up front that this plan, as I present it, is a pain to implement. What you want is a system that is seamlessly integrated with email and other infrastructure, but since you and I don't control that, instead this is a bolt-on solution. And let's be clear what problem we're solving. With the system I describe, you can be confident that anyone intercepting any emails will be utterly unable to decrypt and read your messages (or look at your files, such a Excel spreadsheets) if all they have to work with is the traffic in and out of your network. This is not a plan for preventing cracking into your network, and stealing data, installing keyloggers and rootkits (look them up), or any kind of physical break-in resulting in theft of hardware and the data on them. But we need to solve one problem at a time. A reasonable use-case would be a company with a bunch of field offices, with the need for each office to email confidential company information, such as financial data, to headquarters every fiscal quarter so accounts can roll it all up into a quarterly report. To protect these files, which are infrequently sent between trusted parties, you would need this set of equipment, software and procedures:
"I think people watch TV and think the bureau can do lots of things. We cannot break strong encryption." — FBI Director James Comey testifying to the US Senate Intelligence Committee on the need for law-enforcement "backdoors" to encryption, July 8, 2015( www.npr.org/sections/thetwo-way/2015/07/08/421251662/fbi-director-says-agents-need-access-to-encrypted-data-to-preserve-public-safety ) First of all let me say that, sad as it makes me to admit this, I know that my ideas are controversial in this day and age. For example, I have a near, dear relation who is a flight attendant, and I'm pretty sure she wants terrorists stopped even if the Fourth Amendment gets shredded in the process. But I can't go for that. I believe that our founding fathers were quite wise (even if they didn't always practice what they preached), and there are good reasons to maintain and defend our constitutional rights. When James Madison wrote "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated," I think that was meant to include email, texts, private web forums, and other electronic communications. Our government claims otherwise (when they bother to claim anything — much of the time they just snatch what they want secretly). I want to roll this back. It is still legal to encrypt your communications, though some in law enforcement keep trying to make a run at this right. During the early days of the Clinton administration a proposal called the "Clipper chip" would have mandated back doors for government spying in all electronic devices. Luckily it was shot down, but it keeps popping up with new names. For a while there they tried to shut down just talking about encryption, calling it "exporting munitions" if keys were 512 bytes or more. This has been eased, but you still have to tell the Bureau of Industry and Security, located about 1000 feet from the White House in Washington, if you want to release open source encryption software. ( en.wikipedia.org/wiki/Export_of_cryptography_from_the_United_States ) I believe one way to hold back the tide of encroachment is to get technology out there into citizens' hands while it's still easy. Recall the cautionary tale of dual key encryption, which barely missed being classified and buried because the inventors had the good sense to publish their work in Canada just in time. If you think it's too dangerous to give citizens superencryption technology (which, as I've said, is already in the public domain), here's something to consider. If your goal is fighting terrorists "at any cost" you can use that argument to justify all of these steps:
Silicon Graphics "Serious Fun" marketing, circa 1993
( www.nekochan.net/weblog/archives/2002/11/ )
1993, second year in Anaheim. This is the year they had the virtual sex panel which, uh, everybody had a good time with. 1993 was also the year that had, what I think is probably the most amazing SIGGRAPH party that's ever happened, which was the party at the Richard Nixon Museum. I have this image of watching Timothy Leary ranting and raving on stage at the Nixon Museum, twenty feet from the grave of Pat Nixon, and it's... just really cosmic, I don't know. — Jim Blinn, "SIGGRAPH '98 Keynote"( www.siggraph.org/s98/conference/keynote/blinn.html ) There was something magical about SIGGRAPH '93 in Anaheim. There's more than I have space to relate here, but a few examples will suffice.
The Bonzo Dog Band on
"Do Not Adjust Your Set" (BBC)
Late in the summer of 1993 I decided I wanted to do something to stay in touch
with Anne Herring. One of the shows she'd performed at the Adventurers Club
was called the "Maid's Singalong," done in character as Ginger Vitus the maid.
She worked the room alone (except for her invisible accompanist, Fingers the
ghost of the keyboard player). She sang some songs, lead the crowd in some
singing, and even encouraged a few brave guests to stand up and perform songs
they knew. (Going through various evolutions, this show continued to be
performed until the bitter end of the club.)
( www.youtube.com/watch?v=T3Z5msSkDEw )
In the spirit of this show, I made a short mix tape — of two songs — that
I thought would be great in the club, "Mad Dogs and Englishmen Go Out in the
Midday Sun" by Noel Coward (1932),
( www.youtube.com/watch?v=z2YvYiWtovM )
and "Hunting Tigers Out In Indiah" performed by the Bonzo Dog Band (1969),
a cover of a 1930 song by Hal Swain & His Band.
https://www.youtube.com/watch?v=ZNmL1L3dF6g
( www.youtube.com/watch?v=ZNmL1L3dF6g )
I was able to mail her the cassette, since we'd talked her out of her postal
address. Later she told us she was familiar with the Noel Coward song, but
not the Bonzo Dog Band one. (An aside: the above video of the Hunting Tigers
song is actually from a rare BBC program for children, "Do Not Adjust Your Set,"
which starred several comedians who later went on to fame in the troupe Monty
Python's Flying Circus.)
( en.wikipedia.org/wiki/Do_Not_Adjust_Your_Set )
"Bug, Sig and Karla were all a bit annoyed by how 'family-oriented' and we yearned for traces of its proud history of sleaze and corruption. I mean, if you can't get lost in Las Vegas then what's the point of Las Vegas?" — Douglas Coupland, 1995 "Microserfs"( www.amazon.com/exec/obidos/ASIN/0061624268/hip-20 ) I've been a fan of Preview Centers for a long time. I think my first one was the Walt Disney World Preview Center, which our aunt, uncle and cousins took us to when our family visited Florida in the summer of 1971, just a few months too soon to visit the Magic Kingdom. Later I also greatly enjoyed the Disney's California Adventure Preview Center, located near the Disneyland ticket booths, which in some ways was better than the finished theme park. But the world record for preview centers must be held by Las Vegas in the 1990s. Amid well-videotaped casino implosions (most of which can be found on YouTube), ( www.youtube.com/watch?v=5igVwiXk-gM ) Sin City was working hard to reinvent itself at that time, and I remember visiting trailers with concept art, models, and advance souvenirs for sale for at least three new casino/resorts: the New York New York, the Aladdin, and the MGM Grand. In each case I bought a t-shirt, and for a while I considered it to be a techie status symbol (with time travel overtones) to wear a shirt for a casino that was in the future. (I got a copy of the poster above at the MGM Grand Preview Center in 1993.) During this heady era the SIGGRAPH conference came to Las Vegas its one and only time, in the summer of 1991, and several computer graphics vendors took advantage of the opportunity to do a hard court press with casino managers, pitching ideas for Virtual Reality (VR) and other eye candy to the leaders of the gambling empire. I can't show cause and effect, but a great deal of cutting edge "new media" style spectacle — what they used to call "location-based entertainment" — popped up in Vegas. There was the Pharaoh illusion in front of the Luxor, the audio-animatronic dragon that emerged from the Excalibur, only to be vanquished by Merlin the Wizard, and eventually an authentic Virtual Actor in the form of a computer-generated pirate which had live conversations with folks entering the Treasure Island casino from the parking garage and riding down an escalator. (The latter was not very effective; the phenomenon lasted such a short time on the escalator ride that very few guests realized it was a live, interactive character.) Along with this new tech revolution there was also a general trend of Las Vegas attempting to become more family friendly. Along with a Wizard of Oz theme, there were lions in lobby of the MGM Grand. The Mirage had the white tigers from the Siegfried and Roy show on display in their lobby, and a dolphin garden out back. The afore-mentioned Treasure Island had a live pirate ship battle with a British man o' war every hour in the false bay at the front of the casino. The Luxor had a whole level in its pyramid of family-friendly movie/rides and a world class Sega arcade. The Excalibur also had a whole level of carnival-style games, puppet shows, medieval fantasy crafts, and not a gambling machine in sight. In the basement was a jousting dinner show, much like Medieval Times near Disneyland in California and Walt Disney World in Florida. Circus Circus and the MGM Grand added full-up amusement parks out back. New York New York had a roller coaster running right through the Manhattan skyline facade. Also right on "the strip" Coca Cola and M'n'Ms built museums, and the DreamWorks-inspired GameWorks opened an arcade. (My all-time favorite Vegas attraction was Star Trek: the Experience, which I can't say enough good things about.) ( en.wikipedia.org/wiki/Star_Trek:_The_Experience ) In addition to these attractions at A-list locations, other lesser venues spent big to attract families with kids, including casinos at State Line on the California-Nevada border, which had the advantage of being the first legal gambling drivers came to when arrive on Interstate 15 from the Los Angeles area. Buffalo Bill's built a water ride, amusement area, and possibly the scariest roller coaster I've ever ridden, while the Primadonna next door had a ferris wheel out front and a merry-go-round and arcade in a basement level. This dream came crashing down in 1997 when a seven year old girl, left unattended by her gambling father, was murdered near that merry-go-round. ( articles.latimes.com/1997-05-28/news/mn-63101_1_casino-surveillance ) The casino management was so mortified they changed the name to the Primm to escape the bad publicity, and ripped out the rides and attractions. The businesses of Las Vegas did some soul searching, admitted that gambling-obsessed parents leaving their kids unattended was in fact a big problem, and backed away from the family-friendly image. A subsequent national TV ad campaign was "What Happens in Vegas Stays in Vegas," and the town went back to being Sin City.
map of Japanese Village and Deer Park
( ochistorical.blogspot.com/2010/06/buena-park-brea-and-oc-railroads.html )
D: You just bring that right on, right on up then, uhh? L: Alright, where do you want me to deliver it? D: Up at my house L: Where do you live? D: Up on the north side L: On the north side D: Ya L: Whereabouts on the north side? D: Up there by the Japanese amusement park L: The Japanese amusement park D: Bambi's deer place there L: Is that right? D: Where Bambi goes, nothin' grows — Hudson & Landry "Ajax Liquor Store" (audio comedy)( www.amazon.com/exec/obidos/ASIN/B000069Z0U/hip-20 ) Despite the fact that I was involved with two previous computer game projects which ended badly, in late 1993 I again was bitten by the game design bug, and decided I wanted to create a new game design. (I wasn't so keen to implement, so my goal was a design document.) I mentioned this inclination to Steve Tice, my old boss from Rockwell who had gone on to lead the company, Simgraphics, that invented the Virtual Actor and Performance Animation, and who at that point was managing computer game developers. He said he wanted to encourage my efforts. By way of inspiration he took me to the International Association of Amusement Parks and Attractions (IAAPA) conference at the Los Angeles Convention Center in November of 1993. ( www.iaapa.org ) The L.A. Times reported that over 25,000 people attended that year. ( articles.latimes.com/1993-12-03/local/me-63347_1_convention-attendance-los-angeles ) Steve especially wanted me to see the "VR aisle" that year — in addition to the traditional vendors selling carnival-type rides, water park equipment, game prizes, liability insurance, popcorn machines, etc., this new category featured "motion-base" rides, innovative interactive games, and other "new tech" solutions to the age-old problem of amusing the Rubes. Well, I was impressed with the technology and the business opportunities, and Steve and I agreed to begin having a series of informal discussions. We ended up having a series of very interesting conversations, often in places that provided additional stimulation for our ideas. One place we visited several times was Beach Boulevard in Buena Park, the street that Knott's Berry Farm was on. I had read in a newspaper article that a two-block stretch of this street had the largest concentration of separate amusements — location-based entertainment venues if you will — found anywhere in America. Historically this street had been home to some almost legendary roadside amusements, including the above-pictured Japanese Deer Park, ( www.ocregister.com/articles/park-608019-deer-museum.html ) as well as a whole menagerie of other oddities, including famous and infamous extinct attractions such as:
Kitt Car at Universal Studios Hollywood
I think it might have been New Years Eve 1993/94 that I met Richard Cray; if
not then shortly afterwards. We were introduced by my friend Greg Panos, who
as I mentioned previously is a supernode in the social network. Richard is an
actor, and had been performing in New York in "The Mystery of Edwin Drood," an
interactive production in which the audience helps write the ending. He had
come to Los Angeles because he wanted to become an operator of Virtual Actor
and Performance Cartoon technology. Richard sought out Greg because of his
fame in the VR community, and Greg offered him a place to stay as he chased
his dream on the Left Coast. (Twenty-one years later they are still roommates.)
As 1994 began I was looking ahead to the SIGGRAPH conference coming up in
Orlando. Many of the deadlines for papers, panel, courses, etc. are in
mid-January. I had been thinking about interactive media, Virtual Actors,
and their connection to the Adventurers Club. Though the club didn't use any
technology more advanced than puppets, the actors there had been racking up
close to five years of experience entertaining real audiences with interactive
entertainment. I wanted to find some kind of synergy between their skills
and experience and those of the computer graphics community.
In one of our early conversations I shared with Richard this idea, and he
was wildly enthusiastic. He had recently been doing performance animation gigs
for Simgraphics Corporation, and said he wanted to participate in whatever
event I organized. I was leaning towards a panel, but then realized I should
instead do a Birds of a Feather (BoF) session, as Benjamin Bratton had taught
me at SIGGRAPH 1993. This wold easier, and I would have more time to pull it
together, since the BoF deadline was much later. At some point I came up with
the title, "The VActor and the Human Factor."
Then I had a crisis of confidence. I didn't have as much faith then as I do
now in my ability to make things happen. I almost chickened out, despite
Richard's encouragement. When I shared the idea with Steve Tice he was also
enthusiastic, though he wasn't willing to commit to participate. He did
suggest I involve Brad de Graf, of De Graf-Wahrman fame, who had done
early experiments with Jim Henson with an interactive wire-frame Kermit the
Frog on an Evans and Sutherland vector-based graphics system, and offered to
make an introduction for me.
Still I dithered. I decided I needed to work on screwing up my courage.
I had an annual pass to Universal Studios Hollywood, and they had a small
attraction there which consisted of the "Kit Car" from the TV show "Knight
Rider" (1982-86), about a spy name Michael, played by David Hasselhoff,
who drove a superintelligent computer-controlled car named Kit.
( www.amazon.com/exec/obidos/ASIN/B00005JLG4/hip-20 )
Guests could sit in the car and talk to the computer. A voice actor (not of
course the original star William Daniels, of "A Thousand Clowns" fame) provided
the interactive voice of the car from an unseen location.
As I related in C3M volume 4 number 8:
"I once met a comic (teaching traffic school) who claimed that his first job in Hollywood was the voice of Kitt; he said the guests all asked, 'Where's Michael?' all day long."( www.well.com/user/abs/Cyb/archive/c3m_0408.html ) (As it turned out, when I met him again he admitted he'd made up the story for comic effect. Oh well.) Anyway, I used this attraction as a laboratory of interactive entertainment. I would go to Universal and sit, sometimes for hours, watching and listening as guests young and old interacted with the car. And as I learned and observed, I worked on pumping myself up. Later I got an annual pass to Knott's Berry Farm, which at the time had a themed "land" called "Knott's Airfield." (It had originally been the "Gypsy Camp," then the "Roaring 20s," and after the airfield theme it became the "Boardwalk," which is now where most of the big iron thrill rides are located.) I found the 1920s airfield theme to be quite charming. There was a restaurant there called Captain Kelly's which I enjoyed, next to the Wacky Soap Box Racers, which were taken out two years later. When I finally decided to "go for it" and organize the BoF/panel for SIGGRAPH, I would go to Captain Kelly's and sit enjoying boysenberry pie and coffee while working on the paperwork: letters to Brad de Graf, the Adventurers Club actors, and imagineer Joe Rhode, who helped design the club, and application forms to the 1994 SIGGRAPH committee. I enjoyed the ambience as my reward for sticking with the task, which I still had some resistance to completing.