Inventors have their own Oscars: The Sci-Tech Awards
Inventors have their own Oscars: The Sci-Tech Awards
Presented since 1931, the film academy’s Scientific and Technical Awards recognize engineering and design achievements that have had a lasting influence on the art of filmmaking, from newfangled camera rigs to advanced computer software that makes animated renderings more precise.
“The academy tries to recognize cleverness and the things that change the movies,” said Doug Roble, creative director of software at Digital Domain and vice-chair of the academy’s Scientific and Technical Awards committee.
Since 1977, these prizes have been awarded at a dinner ceremony ahead of the Academy Awards. The private, untelevised event is generally hosted by a celebrity or two, who often struggle to explain the inventions being honored.
This year’s ceremony, set for Saturday, will be hosted by Patrick Stewart.
The Sci-Tech Awards, as they are colloquially known, comprise certificates, plaques and Oscar statuettes. Unlike the Academy Awards, Sci-Tech prizes aren’t for the previous year’s work. Inventions aren’t generally considered for Sci-Tech Awards until they’ve been used in various productions, Roble said.
“We take the long view,” he said. “We are awarding software or hardware or engineering that has stood the test of time... One of the things we look for is adoption of the technology beyond just the people who created it.”
All kinds of game-changing inventions are eligible for consideration.
“Last year we gave a mechanical horse puppet a Sci-Tech Award,” Roble said.
The creation makes it easier to film scenes on “horseback,” for both the performer and director. But it’s not just a hydraulic marvel.
“It had to be horsey enough that the horses around the actor will accept it,” Roble said, adding that the puppet has a tail that swishes back and forth. It was used in 2015’s “The Revenant,” among other films.
Other inventions that have been recognized include a pump device that helps flip cars in action films and software (created by Roble) that digitized certain shots of food that were previously done with practical effects.
This year’s awardees include an advanced camera rig mount that makes aerial shots easier and several software developments critical to modern animated movies.
The Presto and Premo character animation systems allow artists to see their fully rendered characters interact with other characters in real time. The old process was far less detailed and way more time consuming, Roble said.
“The technology these guys built is just beautiful, and it’s optimized to take full advantage of the latest hardware,” he said, adding that it’s been used in Pixar and DreamWorks Animation productions.
Three Oscar statuettes will be presented Saturday as well, with two of them recognizing the Houdini visual effects and animation system.
“It has become the de-facto standard for doing visual effects at studios,” Roble said. “It’s like a Photoshop for destruction.”
Where Photoshop allows users to manipulate images, Houdini allows them to manipulate three-dimensional objects. Artists can program specific details that are then extrapolated out to entire structures or scenes.
It’s this technology that created the warped buildings in Marvel’s “Doctor Strange” and galactic destruction in “Rogue One.”
The program’s pioneer, Mark Elendt, and the company he works for, Side Effects Software, will each receive the Academy Award of Merit, an Oscar statuette. Visual effects artist Jonathan Erland will receive the Gordon E. Sawyer Award, an Oscar statuette for his career contributions that include pioneering effects for “Star Wars” in 1977 and “Star Trek” two years later.
Roble noted that the innovations recognized with the film academy’s Sci-Tech Awards all share one thing in common: “This is all in service of art.”
FBI may have disrupted major cyber attack on Ukraine
- Ukraine has been locked in a years-long struggle with Russia-backed separatists in the country’s east and has repeatedly been hit by cyberattacks of escalating severity. Last year witnessed the eruption of the NotPetya worm, which crippled critical system
- Network technology company Cisco Systems and antivirus company Symantec have warned that a half-million Internet-connected routers had been compromised in a possible effort to lay the groundwork for a cyber-sabotage operation against targets in Ukraine.
LONDON: The FBI has put a spoke in the wheel of a major Russian digital disruption operation potentially aimed at causing havoc in Ukraine, evidence pieced together from researchers, Ukrainian officials and US court documents indicates.
On Wednesday, network technology company Cisco Systems and antivirus company Symantec warned that a half-million Internet-connected routers had been compromised in a possible effort to lay the groundwork for a cyber-sabotage operation against targets in Ukraine.
Court documents simultaneously unsealed in Pittsburgh the same day show the FBI has seized a key website communicating with the massive army of hijacked devices, disrupting what could have been — and might still be — an ambitious cyber attack by the Russian government-aligned hacking group widely known as Fancy Bear.
“I hope it catches the actors off guard and leads to the downfall of their network,” said Craig Williams, the director of outreach for Talos, the digital threat intelligence unit of Cisco that cooperated with the bureau. But he warned that the hackers could still regain control of the infected routers if they possessed their addresses and the right resources to re-establish command and control.
FBI Assistant Director Scott Smith said the agency “has taken a critical step in minimizing the impact of the malware attack. While this is an important first step, the FBI’s work is not done.”
Much about the hackers’ motives remains open to conjecture. Cisco said the malicious software, which it and Symantec both dubbed VPNFilter after a folder it creates, was sitting on more than 500,000 routers in 54 countries but mostly in Ukraine, and had the capacity to render them unusable — a massively disruptive move if carried out at such a scale.
“It could be a significant threat to users around the world,” said Williams.
The US Justice Department said the malware “could be used for a variety of malicious purposes, including intelligence gathering, theft of valuable information, destructive or disruptive attacks, and the mizattribution of such activities.”
Ukraine’s cyberpolice said in a statement that it was possible the hackers planned to strike during “large-scale events,” an apparent reference either to the upcoming Champions League game between Real Madrid and Liverpool in the capital, Kiev, on Saturday or to Ukraine’s upcoming Constitution Day celebrations.
Ukraine has been locked in a years-long struggle with Russia-backed separatists in the country’s east and has repeatedly been hit by cyberattacks of escalating severity. Last year witnessed the eruption of the NotPetya worm, which crippled critical systems, including hospitals , across the country and dealt hundreds of millions of dollars in collateral damage around the globe. Ukraine, the United States and Britain have blamed the attack on Moscow — a charge the Kremlin has denied.
Cisco and Symantec both steered clear of attributing the VPNFilter malware to any particular actor, but an FBI affidavit explicitly attributed it to Fancy Bear, the same group that hacked into the Democratic National Committee in 2016 and has been linked to a long series of digital intrusions stretching back more than a decade. The US intelligence community assesses that Fancy Bear acts on behalf of Russia’s military intelligence service.
An FBI affidavit — whose existence was first reported by The Daily Beast — said the hackers used lines of code hidden in the metadata of online photo albums to communicate with their network of seeded routers. If the photo albums disappeared, the hackers turned to a fallback website — the same site whose seizure the FBI ordered Tuesday.
An email sent to the website’s registered owner was returned as undeliverable.
When asked why the FBI specifically named Fancy Bear where Cisco did not, Williams noted that while attribution was extremely tricky based on malware analysis alone, “if you combine that knowledge with a traditional intelligence apparatus interesting things can come to light.”
In any case, he said, “we have a high degree of confidence that the actor behind this is acting against the Ukraine’s best interest.”
Cisco said in a research note that the malware affected devices geared for small and home offices from manufacturers including Netgear, TP-Link and Linksys and had the potential to disable “Internet access for hundreds of thousands of victims worldwide or in a focused region.”
The malware’s principal capabilities, the company said, included stealthy intelligence-collecting, monitoring industrial-control software and, if triggered, “bricking” or disabling routers. It also persists on the infected routers after they are rebooted.