Disclosure (1994)

Our next 3D file browsing system is from the 1994 film Disclosure. Thanks to site reader Patrick H Lauke for the suggestion.

Like Jurassic Park, Disclosure is based on a Michael Crichton novel, although this time without any dinosaurs. (Would-be scriptwriters should compare the relative success of these two films when planning a study program.) The plot of the film is corporate infighting within Digicom, manufacturer of high tech CD-ROM drives—it was the 1990s—and also virtual reality systems. Tom Sanders, executive in charge of the CD-ROM production line, is being set up to take the blame for manufacturing failures that are really the fault of cost-cutting measures by rival executive Meredith Johnson.

The Corridor: Hardware Interface

The virtual reality system is introduced at about 40 minutes, using the narrative device of a product demonstration within the company to explain to the attendees what it does. The scene is nicely done, conveying all the important points we need to know in two minutes. (To be clear, some of the images used here come from a later scene in the film, but it’s the same system in both.)

The process of entangling yourself with the necessary hardware and software is quite distinct from interacting with the VR itself, so let’s discuss these separately, starting with the physical interface.

Tom wearing VR headset and one glove, being scanned. Disclosure (1994)

In Disclosure the virtual reality user wears a headset and one glove, all connected by cables to the computer system. Like most virtual reality systems, the headset is responsible for visual display, audio, and head movement tracking; the glove for hand movement and gesture tracking. 

There are two “laser scanners” on the walls. These are the planar blue lights, which scan the user’s body at startup. After that they track body motion, although since the user still has to wear a glove, the scanners presumably just track approximate body movement and orientation without fine detail.

Lastly, the user stands on a concave hexagonal plate covered in embedded white balls, which allows the user to “walk” on the spot.

Closeup of user standing on curved surface of white balls. Disclosure (1994)

Searching for Evidence

The scene we’re most interested in takes place later in the film, the evening before a vital presentation which will determine Tom’s future. He needs to search the company computer files for evidence against Meredith, but discovers that his normal account has been blocked from access.   He knows though that the virtual reality demonstrator is on display in a nearby hotel suite, and also knows about the demonstrator having unlimited access. He sneaks into the hotel suite to use The Corridor. Tom is under a certain amount of time pressure because a couple of company VIPs and their guests are downstairs in the hotel and might return at any time.

The first step for Tom is to launch the virtual reality system. This is done from an Indy workstation, using the regular Unix command line.

The command line to start the virtual reality system. Disclosure (1994)

Next he moves over to the VR space itself. He puts on the glove but not the headset, presses a key on the keyboard (of the VR computer, not the workstation), and stands still for a moment while he is scanned from top to bottom.

Real world Tom, wearing one VR glove, waits while the scanners map his body. Disclosure (1994)

On the left is the Indy workstation used to start the VR system. In the middle is the external monitor which will, in a moment, show the third person view of the VR user as seen earlier during the product demonstration.

Now that Tom has been scanned into the system, he puts on the headset and enters the virtual space.

The Corridor: Virtual Interface

“The Corridor,” as you’ve no doubt guessed, is a three dimensional file browsing program. It is so named because the user will walk down a corridor in a virtual building, the walls lined with “file cabinets” containing the actual computer files.

Three important aspects of The Corridor were mentioned during the product demonstration earlier in the film. They’ll help structure our tour of this interface, so let’s review them now, as they all come up in our discussion of the interfaces.

  1. There is a voice-activated help system, which will summon a virtual “Angel” assistant.
  2. Since the computers themselves are part of a multi-user network with shared storage, there can be more than one user “inside” The Corridor at a time.
    Users who do not have access to the virtual reality system will appear as wireframe body shapes with a 2D photo where the head should be.
  3. There are no access controls and so the virtual reality user, despite being a guest or demo account, has unlimited access to all the company files. This is spectacularly bad design, but necessary for the plot.

With those bits of system exposition complete, now we can switch to Tom’s own first person view of the virtual reality environment.

Virtual world Tom watches his hands rezzing up, right hand with glove. Disclosure (1994)

There isn’t a real background yet, just abstract streaks. The avatar hands are rezzing up, and note that the right hand wearing the glove has a different appearance to the left. This mimics the real world, so eases the transition for the user.

Overlaid on the virtual reality view is a Digicom label at the bottom and four corner brackets which are never explained, although they do resemble those used in cameras to indicate the preferred viewing area.

To the left is a small axis indicator, the three green lines labeled X, Y, and Z. These show up in many 3D applications because, silly though it sounds, it is easy in a 3D computer environment to lose track of directions or even which way is up. A common fix for the user being unable to see anything is just to turn 180 degrees around.

We then switch to a third person view of Tom’s avatar in the virtual world.

Tom is fully rezzed up, within cloud of visual static. Disclosure (1994)

This is an almost photographic-quality image. To remind the viewers that this is in the virtual world rather than real, the avatar follows the visual convention described in chapter 4 of Make It So for volumetric projections, with scan lines and occasional flickers. An interesting choice is that the avatar also wears a “headset”, but it is translucent so we can see the face.

Now that he’s in the virtual reality, Tom has one more action needed to enter The Corridor. He pushes a big button floating before him in space.

Tom presses one button on a floating control panel. Disclosure (1994)

This seems unnecessary, but we can assume that in the future of this platform, there will be more programs to choose from.

The Corridor rezzes up, the streaks assembling into wireframe components which then slide together as the surfaces are shaded. Tom doesn’t have to wait for the process to complete before he starts walking, which suggests that this is a Level Of Detail (LOD) implementation where parts of the building are not rendered in detail until the user is close enough for it to be worth doing.

Tom enters The Corridor. Nearby floor and walls are fully rendered, the more distant section is not complete. Disclosure (1994)

The architecture is classical, rendered with the slightly artificial-looking computer shading that is common in 3D computer environments because it needs much less computation than trying for full photorealism.

Instead of a corridor this is an entire multistory building. It is large and empty, and as Tom is walking bits of architecture reshape themselves, rather like the interior of Hogwarts in Harry Potter.

Although there are paintings on some of the walls, there aren’t any signs, labels, or even room numbers. Tom has to wander around looking for the files, at one point nearly “falling” off the edge of the floor down an internal air well. Finally he steps into one archway room entrance and file cabinets appear in the walls.

Tom enters a room full of cabinets. Disclosure (1994)

Unlike the classical architecture around him, these cabinets are very modern looking with glowing blue light lines. Tom has found what he is looking for, so now begins to manipulate files rather than browsing.

Virtual Filing Cabinets

The four nearest cabinets according to the titles above are

  1. Communications
  2. Operations
  3. System Control
  4. Research Data.

There are ten file drawers in each. The drawers are unmarked, but labels only appear when the user looks directly at it, so Tom has to move his head to centre each drawer in turn to find the one he wants.

Tom looks at one particular drawer to make the title appear. Disclosure (1994)

The fourth drawer Tom looks at is labeled “Malaysia”. He touches it with the gloved hand and it slides out from the wall.

Tom withdraws his hand as the drawer slides open. Disclosure (1994)

Inside are five “folders” which, again, are opened by touching. The folder slides up, and then three sheets, each looking like a printed document, slide up and fan out.

Axis indicator on left, pointing down. One document sliding up from a folder. Disclosure (1994)

Note the tilted axis indicator at the left. The Y axis, representing a line extending upwards from the top of Tom’s head, is now leaning towards the horizontal because Tom is looking down at the file drawer. In the shot below, both the folder and then the individual documents are moving up so Tom’s gaze is now back to more or less level.

Close up of three “pages” within a virtual document. Disclosure (1994)

At this point the film cuts away from Tom. Rival executive Meredith, having been foiled in her first attempt at discrediting Tom, has decided to cover her tracks by deleting all the incriminating files. Meredith enters her office and logs on to her Indy workstation. She is using a Command Line Interface (CLI) shell, not the standard SGI Unix shell but a custom Digicom program that also has a graphical menu. (Since it isn’t three dimensional it isn’t interesting enough to show here.)

Tom uses the gloved hand to push the sheets one by one to the side after scanning the content.

Tom scrolling through the pages of one folder by swiping with two fingers. Disclosure (1994)

Quick note: This is harder than it looks in virtual reality. In a 2D GUI moving the mouse over an interface element is obvious. In three dimensions the user also has to move their hand forwards or backwards to get their hand (or finger) in the right place, and unless there is some kind of haptic feedback it isn’t obvious to the user that they’ve made contact.

Tom now receives a nasty surprise.

The shot below shows Tom’s photorealistic avatar at the left, standing in front of the open file cabinet. The green shape on the right is the avatar of Meredith who is logged in to a regular workstation. Without the laser scanners and cameras her avatar is a generic wireframe female humanoid with a face photograph stuck on top. This is excellent design, making The Corridor usable across a range of different hardware capabilities.

Tom sees the Meredith avatar appear. Disclosure (1994)

Why does The Corridor system place her avatar here? A multiuser computer system, or even just a networked file server,  obviously has to know who is logged on. Unix systems in general and command line shells also track which directory the user is “in”, the current working directory. Meredith is using her CLI interface to delete files in a particular directory so The Corridor can position her avatar in the corresponding virtual reality location. Or rather, the avatar glides into position rather than suddenly popping into existence: Tom is only surprised because the documents blocked his virtual view.

Quick note: While this is plausible, there are technical complications. Command line users often open more than one shell at a time in different directories. In such a case, what would The Corridor do? Duplicate the wireframe avatar in each location? In the real world we can’t be in more than one place at a time, would doing so contradict the virtual reality metaphor?

There is an asymmetry here in that Tom knows Meredith is “in the system” but not vice versa. Meredith could in theory use CLI commands to find out who else is logged on and whether anyone was running The Corridor, but she would need to actively seek out that information and has no reason to do so. It didn’t occur to Tom either, but he doesn’t need to think about it,  the virtual reality environment conveys more information about the system by default.

We briefly cut away to Meredith confirming her CLI delete command. Tom sees this as the file drawer lid emitting beams of light which rotate down. These beams first erase the floating sheets, then the folders in the drawer. The drawer itself now has a red “DELETED” label and slides back into the wall.

Tom watches Meredith deleting the files in an open drawer. Disclosure (1994)

Tom steps further into the room. The same red labels appear on the other file drawers even though they are currently closed.

Tom watches Meredith deleting other, unopened, drawers. Disclosure (1994)

Talking to an Angel

Tom now switches to using the system voice interface, saying “Angel I need help” to bring up the virtual reality assistant. Like everything else we’ve seen in this VR system the “angel” rezzes up from a point cloud, although much more quickly than the architecture: people who need help tend to be more impatient and less interested in pausing to admire special effects.

The voice assistant as it appears within VR. Disclosure (1994)

Just in case the user is now looking in the wrong direction the angel also announces “Help is here” in a very natural sounding voice.

The angel is rendered with white robe, halo, harp, and rapidly beating wings. This is horribly clichéd, but a help system needs to be reassuring in appearance as well as function. An angel appearing as a winged flying serpent or wheel of fire would be more original and authentic (yes, really: ​​Biblically Accurate Angels) but users fleeing in terror would seriously impact the customer satisfaction scores.

Now Tom has a short but interesting conversation with the angel, beginning with a question:

  • Tom
  • Is there any way to stop these files from being deleted?
  • Angel
  • I’m sorry, you are not level five.
  • Tom
  • Angel, you’re supposed to protect the files!
  • Angel
  • Access control is restricted to level five.

Tom has made the mistake, as described in chapter 9 Anthropomorphism of the book, of ascribing more agency to this software program than it actually has. He thinks he is engaged in a conversational interface (chapter 6 Sonic Interfaces) with a fully autonomous system, which should therefore be interested in and care about the wellbeing of the entire system. Which it doesn’t, because this is just a limited-command voice interface to a guide.

Even though this is obviously scripted, rather than a genuine error I think this raises an interesting question for real world interface designers: do users expect that an interface with higher visual quality/fidelity will be more realistic in other aspects as well? If a voice interface assistant has a simple polyhedron with no attempt at photorealism (say, like Bit in Tron) or with zoomorphism (say, like the search bear in Until the End of the World) will users adjust their expectations for speech recognition downwards? I’m not aware of any research that might answer this question. Readers?

Despite Tom’s frustration, the angel has given an excellent answer – for a guide. A very simple help program would have recited the command(s) that could be used to protect files against deletion. Which would have frustrated Tom even more when he tried to use one and got some kind of permission denied error. This program has checked whether the user can actually use commands before responding.

This does contradict the earlier VR demonstration where we were told that the user had unlimited access. I would explain this as being “unlimited read access, not write”, but the presenter didn’t think it worthwhile to go into such detail for the mostly non-technical audience.

Tom is now aware that he is under even more time pressure as the Meredith avatar is still moving around the room. Realising his mistake, he uses the voice interface as a query language.

“Show me all communications with Malaysia.”
“Telephone or video?”
“Video.”

This brings up a more conventional looking GUI window because not everything in virtual reality needs to be three-dimensional. It’s always tempting for a 3D programmer to re-implement everything, but it’s also possible to embed 2D GUI applications into a virtual world.

Tom looks at a conventional 2D display of file icons inside VR. Disclosure (1994)

The window shows a thumbnail icon for each recorded video conference call. This isn’t very helpful, so Tom again decides that a voice query will be much faster than looking at each one in turn.

“Show me, uh, the last transmission involving Meredith.”

There’s a short 2D transition effect swapping the thumbnail icon display for the video call itself, which starts playing at just the right point for plot purposes.

Tom watches a previously recorded video call made by Meredith (right). Disclosure (1994)

While Tom is watching and listening, Meredith is still typing commands. The camera orbits around behind the video conference call window so we can see the Meredith avatar approach, which also shows us that this window is slightly three dimensional, the content floating a short distance in front of the frame. The film then cuts away briefly to show Meredith confirming her “kill all” command. The video conference recordings are deleted, including the one Tom is watching.

Tom is informed that Meredith (seen here in the background as a wireframe avatar) is deleting the video call. Disclosure (1994)

This is also the moment when the downstairs VIPs return to the hotel suite, so the scene ends with Tom managing to sneak out without being detected.

Virtual reality has saved the day for Tom. The documents and video conference calls have been deleted by Meredith, but he knows that they once existed and has a colleague retrieve the files he needs from the backup tapes. (Which is good writing: the majority of companies shown in film and TV never seem to have backups for files, no matter how vital.) Meredith doesn’t know that he knows, so he has the upper hand to expose her plot.

Analysis

How believable is the interface?

I won’t spend much time on the hardware, since our focus is on file browsing in three dimensions. From top to bottom, the virtual reality system starts as believable and becomes less so.

Hardware

The headset and glove look like real VR equipment, believable in 1994 and still so today. Having only one glove is unusual, and makes impossible some of the common gesture actions described in chapter 5 of Make It So, which require both hands.

The “laser scanners” that create the 3D geometry and texture maps for the 3D avatar and perform real time body tracking would more likely be cameras, but that would not sound as cool.

And lastly the walking platform apparently requires our user to stand on large marbles or ball bearings and stay balanced while wearing a headset. Uh…maybe…no. Apologetics fails me. To me it looks like it would be uncomfortable to walk on, almost like deterrent paving.

Software

The Corridor, unlike the 3D file browser used in Jurassic Park, is a special effect created for the film. It was a mostly-plausible, near future system in 1994, except for the photorealistic avatar. Usually this site doesn’t discuss historical context (the  “new criticism” stance), but I think in this case it helps to explain how this interface would have appeared to audiences almost two decades ago.

I’ll start with the 3D graphics of the virtual building. My initial impression was that The Corridor could have been created as an interactive program in 1994, but that was my memory compressing the decade. During the 1990s 3D computer graphics, both interactive and CGI, improved at a phenomenal rate. The virtual building would not have been interactive in 1994, was possible on the most powerful systems six years later in 2000, and looks rather old-fashioned compared to what the game consoles of the 21st C can achieve.

For the voice interface I made the opposite mistake. Voice interfaces on phones and home computing appliances have become common in the second decade of the 21st C, but in reality are much older. Apple Macintosh computers in 1994 had text-to-speech synthesis with natural sounding voices and limited vocabulary voice command recognition. (And without needing an Internet connection!) So the voice interface in the scene is believable.

The multi-user aspects of The Corridor were possible in 1994. The wireframe avatars for users not in virtual reality are unflattering or perhaps creepy, but not technically difficult. As a first iteration of a prototype system it’s a good attempt to span a range of hardware capabilities.

The virtual reality avatar, though, is not believable for the 1990s and would be difficult today. Photographs of the body, made during the startup scan, could be used as a texture map for the VR avatar. But live video of the face would be much more difficult, especially when the face is partly obscured by a headset.

How well does the interface inform the narrative of the story?

The virtual reality system in itself is useful to the overall narrative because it makes the Digicom company seem high tech. Even in 1994 CD-ROM drives weren’t very interesting.

The Corridor is essential to the tension of the scene where Tom uses it to find the files, because otherwise the scene would be much shorter and really boring. If we ignore the virtual reality these are the interface actions:

  • Tom reads an email.
  • Meredith deletes the folder containing those emails.
  • Tom finds a folder full of recorded video calls.
  • Tom watches one recorded video call.
  • Meredith deletes the folder containing the video calls.

Imagine how this would have looked if both were using a conventional 2D GUI, such as the Macintosh Finder or MS Windows Explorer. Double click, press and drag, double click…done.

The Corridor slows down Tom’s actions and makes them far more visible and understandable. Thanks to the virtual reality avatar we don’t have to watch an actor push a mouse around. We see him moving and swiping, be surprised and react; and the voice interface adds extra emotion and some useful exposition. It also helps with the plot, giving Tom awareness of what Meredith is doing without having to actively spy on her, or look at some kind of logs or recordings later on.

Meredith, though, can’t use the VR system because then she’d be aware of Tom as well. Using a conventional workstation visually distinguishes and separates Meredith from Tom in the scene.

So overall, though the “action” is pretty mundane, it’s crucial to the plot, and the VR interface helps make this interesting and more engaging.

How well does the interface equip the character to achieve their goals?

As described in the film itself, The Corridor is a prototype for demonstrating virtual reality. As a file browser it’s awful, but since Tom has lost all his normal privileges this is the only system available, and he does manage to eventually find the files he needs.

At the start of the scene, Tom spends quite some time wandering around a vast multi-storey building without a map, room numbers, or even coordinates overlaid on his virtual view. Which seems rather pointless because all the files are in one room anyway. As previously discussed for Johnny Mnemonic, walking or flying everywhere in your file system seems like a good idea at first, but often becomes tedious over time. Many actual and some fictional 3D worlds give users the ability to teleport directly to any desired location.

Then the file drawers in each cabinet have no labels either, so Tom has to look carefully at each one in turn. There is so much more the interface could be doing to help him with his task, and even help the users of the VR demo learn and explore its technology as well.

Contrast this with Meredith, who uses her command line interface and 2D GUI to go through files like a chainsaw.

Tom becomes much more efficient with the voice interface. Which is just as well, because if he hadn’t, Meredith would have deleted the video conference recordings while he was still staring at virtual filing cabinets. However neither the voice interface nor the corresponding file display need three dimensional graphics.

There is hope for version 2.0 of The Corridor, even restricting ourselves to 1994 capabilities. The first and most obvious is to copy 2D GUI file browsers, or the 3D file browser from Jurassic Park, and show the corresponding text name next to each graphical file or folder object. The voice interface is so good that it should be turned on by default without requiring the angel. And finally add some kind of map overlay with a you are here moving dot, like the maps that players in 3D games such as Doom could display with a keystroke.

Film making challenge: VR on screen

Virtual reality (or augmented reality systems such as Hololens) provide a better viewing experience for 3D graphics by creating the illusion of real three dimensional space rather than a 2D monitor. But it is always a first person view and unlike conventional 2D monitors nobody else can usually see what the VR user is seeing without a deliberate mirroring/debugging display. This is an important difference from other advanced or speculative technologies that film makers might choose to include. Showing a character wielding a laser pistol instead of a revolver or driving a hover car instead of a wheeled car hardly changes how to stage a scene, but VR does.

So, how can we show virtual reality in film?

There’s the first-person view corresponding to what the virtual reality user is seeing themselves. (Well, half of what they see since it’s not stereographic, but it’s cinema VR, so close enough.) This is like watching a screencast of someone else playing a first person computer game, the original active experience of the user becoming passive viewing by the audience. Most people can imagine themselves in the driving seat of a car and thus make sense of the turns and changes of speed in a first person car chase, but the film audience probably won’t be familiar with the VR system depicted and will therefore have trouble understanding what is happening. There’s also the problem that viewing someone else’s first-person view, shifting and changing in response to their movements rather than your own, can make people disoriented or nauseated.

A third-person view is better for showing the audience the character and the context in which they act. But not the diegetic real-world third-person view, which would be the character wearing a geeky headset and poking at invisible objects. As seen in Disclosure, the third person view should be within the virtual reality.

But in doing that, now there is a new problem: the avatar in virtual reality representing the real character. If the avatar is too simple the audience may not identify it with the real world character and it will be difficult to show body language and emotion. More realistic CGI avatars are increasingly expensive and risk falling into the Uncanny Valley. Since these films are science fiction rather than factual, the easy solution is to declare that virtual reality has achieved the goal of being entirely photorealistic and just film real actors and sets. Adding the occasional ripple or blur to the real world footage to remind the audience that it’s meant to be virtual reality, again as seen in Disclosure, is relatively cheap and quick.
So, solving all these problems results in the cinematic trope we can call Extradiegetic Avatars, which are third-person, highly-lifelike “renderings” of characters, with a telltale Hologram Projection Imperfection for audience readability, that may or may not be possible within the world of the film itself.

Wakandan tattoo

When I saw King Tchalla’s brother pull his lip down to reveal his glowing blue, vibranium-powered Wakandan tattoo, the body modification evoked for me the palpable rush of ancestral memories and spiritual longing for a Black utopia, an uncolonized land and body that Black American spirituals have envisioned (what scholars call sonic utopias.) 

The lip tattoo is a brilliant bit of worldbuilding. The Wakandan diaspora is, at this point in the movie, a sort of secret society. Having a glowing tattoo shows that the mark is genuine (one presumes it could only be produced with vibranium and therefore not easily forged). Placing it inside the lip means it is ordinarily concealed, and, because of the natural interface of the body, it is easy to reveal. Lastly, it must be a painful spot to tattoo, so shows by way of inference how badass the Wakandan culture is. But it’s more than good worldbuilding to me.

The Black Panther film tattoo electrifies my imagination because it combines both chemical augmentation and amplifies the African identity of being a Wakandan in this story. I think the film could have had even more backstory around the tattoo as a right of passage and development of it in the film. Is it embedded at birth? Or is there a coming of age ceremony associated with it? It would have been cool to see the lip tattoo as a smart tattoo with powers to communicate with other devices and even as a communication device to speak or subvocalize thoughts and desires.

How can we imagine the Wakandan tattoo for the future? I co-designed Afro-Rithms From The Future, an imagination game for creating a dynamic, engaging, and safe space for a community to imagine possible worlds using ordinary objects as inspirations to rethink existing organizational, institutional, and societal relationships. In our launch of the game at the Afrofutures Festival last year at the foresight consultancy Institute For The Future, the winner by declaration was Reina Robinson, a woman who imagined a tattoo that represented one’s history and could be scanned to receive reparation funds to redress and heal the trauma of slavery. 

Doreen Garner is a tattoo artist in Brooklyn who acknowledges that tattooing is “a violent act,” but reframes it in her work as an act of healing. She guides her client-patients through this process. Garner began the Black Panther Tattoo Project in January 2019 on MLK Day. She views the Black Panther tattoo as reclaiming pride as solidarity through a shared image. It represents Black pride and “unapologetic energy that we all need to be expressing right now.” Tattooing is a meditative exercise for her as she makes “a lot of the same marks,” and fills in the same spaces for her Black Panther Tattoo project clientele. When folx are at a concert, party, or panel—and recognize their shared image—they can link up to share their experiences. 

What if this were a smart tattoo where you could hear the tattoo as sound? Right now, the tech outfit Skin Motion can make your tattoo hearable “by pointing the camera on a mobile device at the tattoo,” where you’ll be able to hear the tattoo playback an audio recording. 

Garner, speaking as a Black female tattoo artist, exhorts future artists, “don’t be held back” by thinking that it is a white, male-dominated profession. “White people did not invent tattooing as a practice, because it belongs to us.” They are not the masters. There are many masters of tattooing across cultures.

One example: Yoruba tribal marks. (Apologies for the shitpic.)

The Wakandan tattoo as an ancestral marker reflects a centuries-old tradition in African culture. In Black Panther we see the tattoo as a bold, embedded pillar of Wakandan unity, powerfully inviting us to imagine how tattoos may evolve in the future.

Black Futures Matter

Each post in the Black Panther review is followed by actions that you can take to support Black lives. For this post, support the Black Speculative Arts Movement (BSAM): Sign up for their updates. The organization sends email notifications about special launches, network actions, programs, and partnerships. Being connected to the network is one way to stay unified and support BSAM work. Look out for the launch of the California BSAM regional hub network soon. Listen to the Afrofuturist Podcast with host Ahmed Best as well where Black Futures Matter.  

Upcoming BSAM event

On Aug. 17, join BSAM’s Look For Us in the Whirlwind event as it celebrates the Pan-African legacy of Marcus Garvey.

A Virtual Global Gathering of Afrofuturists and Pan-Afrikanists

This event is a global Pan-African virtual gathering to honour Marcus M. Garvey Jr.’s legacy. It will feature a keynote from Dr. Julius W. Garvey, the youngest son of Marcus and Amy Jacques Garvey.

OmniBro

The OmniBro is the ubiquitous payment and identification system in Idiocracy. We see it four times in the movie.

Doc office

Idiocracy_omnibro02

Dr. Lexus asks Joe to pay for his visit, “…if you could just go ahead and, like, put your tattoo in that shit.” In this case, that shit is a barcode scanner mounted to the back of a desktop register. We don’t get to see it in use, because as described in the prior post, Dr. Lexus freaks out, realizing Joe is unscannable and hitting the panic button.

Prison

Idiocracy_omnibro04.png

Another time we see the OmniBro is in the prison. After talking his way past the guard, another guard at a checkout counter has him scan his new tattoo. The guard checks the screen and tells him, “Uh. Yeah, I don’t see you in here. So you’re going to have to…uh…stay in prison.” Joe says, “Could you check again, because I was definitely in prison. OK. I got sat on my face and everything. Maybe check those files back there?” The guard turns, and Joe runs. There’s admittedly a post in there about prison security and release (and America has a lot to improve, especially in its reprehensible prison-for-profit systems), but this post is about the OmniBro.

Carl’s Junior

The third time we see it is at the Carl’s Junior kiosk. (More on the whole system in the next post.) Though the customer appears to have already scanned, it is how anyone ordering food pays for it.

Idiocracy_omnibro24

What’s good?

If I had to note the positives of the OmniBro system, it is that it seems easy for even morons to explain, understand, and use. Wrists are more commonly pointed down, so it’s a little more deliberate to have to turn the wrist up to pay. So adding to its ease-of-use is some measure of biology against accidental activation.

Also it’s more sterile than money. (Yeah, money’s dirty.)

And it’s ubiquitous, so a citizen of Idiocracy doesn’t need a credit card totem to know whether or not a vendor accepts their money. There are airlines and even a restaurant that I know of in San Francisco that only accept credit cards, and it’s disgusting. (Yes, yes, I know what the Department of the Treasury says, but I think it’s gross, classist, and corporatist to require your customers first have a relationship with a credit card company before you’ll do business with them.) So I suppose that aspect encourages an easy-to-access marketplace.

So, the good: It’s usable, sterile, and ubiquitous.

What’s questionable?

Where to start? Well, certainly it’s horrible that participation in the economy requires a permanent body modification. I’m not at all religious, but I agree wholeheartedly with the admonishment against any totalitarian “mark of the beast” just to participate in culture, for all the body autonomy and social justice reasons that one should be against it. (Before anyone gets their apophenia into an uproar about biblical meanings, you can relax. Idiocracy’s tattoos are on the wrong hand.)

You might imagine that the mark signals some sort of ingroup membership, but if everyone in Idiocracy has one, there’s no real outgroup.

Still, it raises lots of questions about the choice of a tattoo:

  • Skin stretches and changes as time wears on. Tattoos get sun blurred (and the wrist gets a lot more sun exposure than other areas.) What happens to a citizen when their barcode no longer works? The tattoo machine (a post on this later) looks like it only tattoos in one place, so another visit won’t fix it, and likely would make matters worse. Is there some do-over machine?
  • What about people who don’t have a left wrist? (The machine can only work on left arms.) What about people who get the tattoo but later lose their left arm?
  • Where’s any other factor for multifactor authentication? Cash fails this as well, but if you are robbed of your cash, at least you still have an arm left to try and acquire some more.

What’s awful, though, is the fourth time we see it in the movie.

Rando vending surveillance

When fleeing the police with Freeto and Rita in Frito’s car, Joe accidentally makes the mistake of raising his tattooed wrist above the door frame, where it is scanned through the window by a vending machine he happens to be passing. The scan identifies Joe and the car he’s in, and something sends a shutdown signal to Frito’s car. (More on the car interface a later post.)

Ease-to-consume is concomitant with ease-to-surveil. Sure, the citizen doesn’t have to carry cash, do rudimentary math, or remember their bank balance, but in exchange they leave themselves open to constant tracking and identification. In the movie this just means it’s easy to find Joe. They’re comparatively dumb enough to make his escape the stuff of comedy.

But in our world, where the forces that market you away from your money are vastly more funded, equipped, and dedicated to their task than you, this tradeoff winds up putting Americans in a terrible debt load that may be *gasp* worse than Italy’s by 2023. (Sorry, dear Italian friends.) Combine this debt load with the health gamble and 40-year stagnant wages, and it seems like the tradeoff only an idiot would take. But hey, it’s easy to wave your phone for a fix at Starbucks, so what am I going on about, right?

Fight the Idiocracy

The Bloomberg article about American debt load includes this tasty paragraph, “While Trump and congressional Republicans raised alarms about the debt and deficit when Democrat Barack Obama was president, spending hasn’t abated with the GOP in control of the White House and Congress.

Where the GOP used to tout themselves as the party of fiscal conservatism, it’s now clearer than ever that they’re just hypocrite oligarchs; spending wildly, giving free tax passes to their insanely wealthy friends, hoping a hundred dollars a month is enough to convince you to look the other way, all the while planning to gut your “entitlement” programs like social security, medicare, and medicaid. It’s insanity. They have to be voted way, way out if we have any hope of saving our economic well being.

voteworms.jpg
Sold out womp womp

I wanted with this post to convince you to give out Cards Against Humanity’s Vote Worms, but they’re already sold out. So instead I’ll point you to their smart Hacks the Election campaign, which did not do as well on launch, but would definitely have more effect if it sold out. If you are in or know someone in one of the following swing districts, definitely check this out.

  1. California 25th district: Help elect Katie Hill
  2. Iowa 1st district: Help elect Abby Finkenauer
  3. Illinois 26th district: Help elect Sean Casten
  4. Illinois 14th district: Help elect Lauren Underwood
  5. Kansas 4th district: Help elect James Thompson
  6. Texas 26th district (what is it about 26th districts?): Help elect Linsey Fagan
CAH-hackselection.png

Snitch phone

If you’re reading these chronologically, let me note here that I had to skip Bea Arthur’s marvelous turn as Ackmena, as she tends the bar and rebuffs the amorous petitions of the lovelorn, hole-in-the-head Krelman, before singing her frustrated patrons out of the bar when a curfew is announced. To find the next interface of note, we have to forward to when…

Han and Chewie arrive, only to find a Stormtrooper menacing Lumpy. Han knocks the blaster out of his hand, and when the Stormtrooper dives to retrieve it, he falls through the bannister of the tree house and to his death.

SWHS_generalalert-09.png

Why aren’t these in any way affiiiiixxxxxxeeeeeeddddddd?

Han enters the home and wishes everyone a Happy Life Day. Then he bugs out.

SWHS_generalalert-12.png

But I still have to return for the insane closing number. Hold me.

Then Saun Dann returns to the home just before a general alert comes over the family Imperial Issue Media Console.

Continue reading

Airport Security

After fleeing the Yakuza in the hotel, Johnny arrives in the Free City of Newark, and has to go through immigration control. This process appears to be entirely automated, starting with an electronic passport reader.

jm-9-customs-b

After that there is a security scanner, which is reminiscent of HAL from the film 2001: A Space Odyssey.

jm-9-customs-f

The green light runs over Johnny from top to bottom. Continue reading

Brain Upload

Once Johnny has installed his motion detector on the door, the brain upload can begin.

3. Building it

Johnny starts by opening his briefcase and removing various components, which he connects together into the complete upload system. Some of the parts are disguised, and the whole sequence is similar to an assassin in a thriller film assembling a gun out of harmless looking pieces.

jm-6-uploader-kit-a

It looks strange today to see a computer system with so many external devices connected by cables. We’ve become accustomed to one piece computing devices with integrated functionality, and keyboards, mice, cameras, printers, and headphones that connect wirelessly.

Cables and other connections are not always considered as interfaces, but “all parts of a thing which enable its use” is the definition according to Chris. In the early to mid 1990s most computer user were well aware of the potential for confusion and frustration in such interfaces. A personal computer could have connections to monitor, keyboard, mouse, modem, CD drive, and joystick – and every single device would use a different type of cable. USB, while not perfect, is one of the greatest ever improvements in user interfaces. Continue reading

A Deadly Pattern

The Drones’ primary task is to patrol the surface for threats, then eliminate those threats. The drones are always on guard, responding swiftly and violently against anything they do perceive as a threat.

image02

During his day-to-day maintenance, Jack often encounters active drones. Initially, the drones always regard him as a threat, and offer him a brief window of time speak his name and tech number (for example, “Jack, Tech 49”) to authenticate. The drone then compares this speech against some database, shown on their HUD as a zoomed-in image of Jack’s mouth and a vocal frequency.

vlcsnap-2015-02-03-22h07m47s249

Occasionally, we see that Jack’s identification doesn’t immediately work. In those cases, he’s given a second chance by the drone to confirm his identity. Continue reading

The SandPhone

LogansRun037

Not everyone is comfortable giving over to the flimsy promise of Carrousel [sic]. Some citizens run, and Sandmen find and terminate these cultural heretics.

Sandmen carry a device with them that has many different uses. It goes unnamed in the movie, so let’s just call it the SandPhone. It is a thick black rectangle about 20cm at its long edge, about the size of a very large cell phone. Near the earpiece on one broad side is a small screen for displaying text and images. Below that is a white line. The lower half of this face is metallic grill that covers a microphone. On the left edge is a momentary button that allows talking. Just above this is a small red button. When not in use, the device is holstered on the sandman’s belt.

The SandPhone lets the Sandman receive information through a display that can show both image and text. The Sandman sends back information and requests by voice in a CB radio metaphor.

Notifications

The first time we see the device is when Logan and Francis are attending Carrousel. Somehow, on his belt it catches his attention. With the crowd too loud for sound, and no evidence it’s light, my bet’s on haptics. Realizing he’s got a message, he picks it up, presses the edge button and the screen displays two lines of text:

RUNNER: GREAT HALL
ENTRANCE WEST.

He then puts the device to his face as we would a cell phone and shouts, “Affirmative!” as loud as he can.

LogansRun038

Perp wayfinding

Running with the device outside the Great Hall, Logan uses the SandPhone as a detector. By holding it flat out in front of him he hears a rhythmic pulse. Turning it this way and that, he listens for the change in pitch. It rises when he is pointing towards the targeted runner.

Bio identification

LogansRun046
LogansRun050

When he and Francis have terminated the runner, he snaps the device off his belt, and pressing the edge button, he reports back to dispatch, “Runner terminated, 0.31. Ready for cleanup.” Then by placing the device near the head of the dead runner, the device displays on the screen the last photographic image of him on file. Since the face on the SandPhone screen does not match the face he sees before him, Logan lifts the device to his face and, holding the edge button, requests an identity check of dispatch. Instantly he pulls the device away from his face to show the text:

IDENT. AFFIRM
NEW YOU #483
FACE CHANGE.

LogansRun182

Send backup

Much later in the film we see Logan alert dispatch to the location of the underground hideout by reaching down to the holstered device and pressing the white line button on its face. Its screen pulses green, and his position is highlight on the runner board (see below) at dispatch. Minutes later the location is raided by Sandmen.

Analysis

The first thing to note is that this is pretty close to a modern smart phone. He receives images and text messages, can talk to dispatch, and it has a biometric capability for identifying citizens. It’s tempting to paint this as visionary, but keep in mind that the first mobile phone was demonstrated in 1973, three years earlier, so it’s likely that the film makers were riffing off of the demo technology they’d heard about or maybe even seen in person.

We evaluate an interface’s design by how well it helps its user achieves his goals. (Even if those goals are anethma. That’s how we judge an interface.) In this case, the SandPhone helps Logan get the information he needs, when he needs it, across multiple channels. It doesn’t distract him with other functions. It’s context aware and doesn’t apparently have battery issues.

There are improvements of course.

We should make sure his hands are free by making the information available as an augmented reality display instead of a handheld device. This would also give him the information privately rather than display it for anyone (notably members of the resistance) to see it. Wayfinding would be more sensible as an overlay to his vision through this device.

Some surface tweaks might also be made, such as giving him a means of text input so he wouldn’t have to shout above the roar of Carrousel. Some silent means of input would help for when he needs to provide silent input as well. First I thought optical inputs might be ideal, given the augmented reality, but we don’t want his eyes distracted like that, even for the duration of glances. Instead some other gestural input—perhaps a face twitch or subvocal input—that lets him keep the rest of his body tense and ready for action.

Citizen biometrics should be a background fact, given the penopticon of Dome City. The information would come to him when he gets his assignement. But turn those same biometrics around on Logan, and his body could request reinforcements before he even thought to do so manually. When his heart rate elevates and galvanic skin response lowers, dispatch would know something was up, and route backup immediately.

A strategic interaction designer would even ask why he has to chase runners at all, when predictive algorithms could guess which citizens were likely to run and take action to forestall their rebellion. But then we’re into Minority Report, and this needs to stay Logan’s Run.

Portable brainwave detector

Barbarella-032

Through the atom transmitter Dianthus bestows several gifts on Barbarella to help her with her mission. The first of these is the “portable brainwave detector…to test for Durand-Durand’s presence.” To operate it, Barbarella must press “a contact,” (Dianthus is offscreen when he indicates the contact, but later we see her operating the leaf-like button near the wrist) and if Durand-Durand is around, the ball of lights will glow and an alarm will sound.

vlcsnap-00002

The device is wearable, wrapping around Barbarella’s forearm, and held in place by a ring. This aspect of the design is good, since it means the device is ever-present for operation, and the design of it makes it lovely enough to be overlooked as a fashion accessory. In fact many characters see her wearing it and make no mention.

PBD_worn

Manual activation is less than ideal, though, since this might tip off the suspect. This is especially true with the blinking, glowing ball of light and audio feedback. And, in fact, this is what happens later in the film when Durand-Durand trips over the device. The blinking light and audio catch his attention, betray the device for what it is, and blow Barbarella’’s cover in the process.

Portable Brainwave Device

The best feedback would be invisible, like a haptic vibration through the cuff to her skin. Ideally, the device would be constantly on, to detect the subject passively, the moment he came into range. But presuming battery life is the issue, the activation cue should be something much more subtle, like Barbarella’s touching the back of the ring with the thumb of the same hand. Such a gesture would match the existing design of the object, be discreet to an observer, and yet still discrete enough to prevent accidental activation.

Security and Control’s control

The mission is world-critical, so like a cockpit, the two who are ultimately in control are kept secure. The control room is accessible (to mere humans, anyway) only through a vault door with an armed guard. Hadley and Sitterson must present IDs to the guard before he grants them access.

Sitterson and Hadley pass security.

Truman, the guard, takes and swipes their cards through a groove in a hand-held device. We are not shown what is on the tiny screen, but we do hear the device’s quick chirps to confirm the positive identity. That sound means that Truman’s eyes aren’t tied to the screen. He can listen for confirmation and monitor the people in front of him for any sign of nervousness or subterfuge.

Hadley boots up the control room screens.

The room itself tells a rich story through its interfaces alone. The wooden panels at the back access Bronze Age technology with its wooden-handled gears, glass bowls, and mechanical devices that smash vials of blood. The massive panel at which they sit is full of Space Age pushbuttons, rheostats, and levers. On the walls behind them are banks of CRT screens. These are augmented with Digital Age, massive, flat panel displays and touch panel screens within easy reach on the console. This is a system that has grown and evolved for eons, with layers of technology that add up to a tangled but functional means of surveillance and control.

The interfaces hint at the great age of the operation.

Utter surveillance

In order for Control to do their job, they have to keep tabs on the victims at all times, even long before the event: Are the sacrifices conforming to archetype? Do they have a reason to head to the cabin?

The nest empties.

To these ends, there are field agents in the world reporting back by earpiece, and everything about the cabin is wired for video and audio: The rooms, the surrounding woods, even the nearby lake.

Once the ritual sacrifice begins, they have to keep an even tighter surveillance: Are they behaving according to trope? Do they realize the dark truth? Is the Virgin suffering but safe? A lot of the technology seen in the control room is dedicated to this core function of monitoring.

The stage managers monitor the victims.

There are huge screens at the front of the room. There are manual controls for these screens on the big panel. There is an array of CRTs on the far right.

The small digital screens can display anything, but a mode we often see is a split in quarters, showing four cameras in the area of the stage. For example, all the cameras fixed on the rooms are on one screen. This provides a very useful peripheral signal in Sitterson and Hadley’s visual field. As they monitor the scenario, motion will catch their eyes. If that motion is not on a monitor they expect it to be, they can check what’s happening quickly by turning their head and fixating. This helps keep them tightly attuned to what’s happening in the different areas on “stage.”

For internal security, the entire complex is also wired for video, including the holding cages for the nightmare monsters.

Sitterson looks for the escapees amongst the cubes.

The control room watches the bloody chaos spread.

One screen that kind of confuses us appears to be biometrics of the victims. Are the victims implanted with devices for measuring such things, or are sophisticated non-invasive environmental sensors involved? Regardless of the mechanisms, if Control has access to vital signs, how are they mistaken about Marty’s death? We only get a short glance at the screen, so maybe it’s not vital signs, but simple, static biometrics like height, and weight, even though the radiograph diagram suggests more.

Sitterson tries to avoid talking to Mordecai.

Communications

Sitterson and Hadley are managing a huge production. It involves departments as broad ranging as chemistry, maintenance, and demolitions. To coordinate and troubleshoot during the ritual, two other communications options are available beyond the monitors; land phone lines and direct-connection, push-to-talk microphones.

Hadley receives some bad news.