Monday 29 October 2012

Different Design Turnaround

slightly different design with thinner waist and legs.

Male And Female Character Turnarounds



Male and female turnarounds, to help tell the difference between the characters the female is a shade of pink with eye lashes and breasts.

Main Character Concept Art


Some concept of our main character in a very square world. also this design he hasn't got clothes or stickers instead more simplistic and more robotic looking. 

Character Design stages




Just some quick concept on how our main character is looking. Alan said go with a simple design and we came up with the character anatomy being made out square shames like the pixels with have in our idea.

second image shows our character with clothes or with stickers as clothing.

Hacked Storyboard

After going through several story drafts we finally settled with the story of an innocent man leaving a cafe, he gets a notification on his phone and when he goes to check his social book he gets hacked by an anonymous person. The man thinks that the hacker is in the vicinity so he runs into the park where theres people to look for the culprit but ends up seeing his face on the bodies of other people while slowly loosing his own identity. Finally he sees his reflection in which he has no face anymore and gets approached by a person with his face who shows signs of being the hacker.






Thursday 18 October 2012

Identity Theft Concept Art


Just some concept art for our Identity theft idea, this is not the main character just to show an idea of what the pixels on the face may look like.

The Voxelator

This looks like what we want our characters to look like. If we can send the models to 3ds Max, we can do this.



Voxelator tool for 3ds max from Eren Saritas on Vimeo.

Kinect Pixel Sorting


Kinect Pixel Sorting from Kieran Startup on Vimeo.

Chaosmos

Research: Pixels!

For our look, I found some images and videos that can help us to make a decision.
































Monday 8 October 2012

Script 2 StoryBoard / Scene 1-6

Script #3 (Re-done Script One)

Scene 1:

Environment: Hacker's room.
       
Fade in from white onto the white ring of a power button for the CPU.

   
The camera zooms out to reveal a computer screen on the side (to the right) of the CPU.
        
A hand of a person appears from the left of the frame, turns on the power button.                                    (SFX: Button press click) The button changes to green and the monitor lights up.                                   (SFX: Start-up chime).

Scene 2: 

The camera focuses from left to right onto a TV screen in the room of the innocent person.
 ( VFX: Flicker of TV on the rest of the room). The headlines read:
          
LONG TIME HACKER: SCHRODINGER WANTED FOR BANK THEFT. SCHRODINGER IS BELIEVED TO BE BEHIND THE NATIONAL SECURITY BREACH OF 1999.

Scene 3: 

The camera changes to the back of the computer monitor. The face of the innocent guy,      illuminated by the light of the monitor is revealed. He is sweating, agitated and engrossed into something on the screen. He is typing furiously.
(SFX: Keyboard being typed on)

Scene 4:

The computer screen of the hacker where the codes are flashing on the screen. (SFX: Beeps and clicks.Keyboard being typed on)

Scene 5: 

Television in innocent guy's apartment. Headlines read:

BREAKING NEWS

CENTRAL BANK HACKED. MILLIONS OF POUNDS DRAINED

Scene 6:

Innocent Guy's face lit by the light of the monitor. His face becomes contorted in slight horror.
(SFX: No,no,no,no)

Scene 7:

Monitor of innocent guy. The camera turns from the face of the innocent guy to the monitor in a 180 degree turn.

Monitor:
Logo of Schrodinger(The hacker's alias)

ERROR: FILES UNAVAILABLE

VIRUS DETECTED (SFX: ominous beeping)

Scene 8: 

The shot travels down below the computer, under the desk, following the path of the wires. It goes through the wall and travels through another wall, tracing the wires' path. (SFX: Fast paced music, wind whoosh sound)

 Scene 9: 

Environment: A French swanky apartment. Mid morning light. SFX: Jazz music

The wire ends into a router. The camera turns 180 degrees to face the router while still in motion and moving farther away from the router.

Scene 10: 

The camera turns 180 degrees again to start traveling forwards in the direction of its travel.

Scene 11: 

Camera travels and comes to the balcony of the apartment. There is a round wooden coffee table in the balcony and a wooden chair. There is coffee on the table and a laptop. A man in a suit sits at the table. His back faces the camera.

Scene 12: 

The camera settles for a second, on the face of the man. He is typing furiously with a calm expression and looking at the monitor. His face is illuminated by the light through the window on the right. (Not in frame)

(SFX: Typing of keys on keyboard)

Scene 13: 

The mouth (below the eyes) of Schrodinger(The hacker) He smiles in a satisfied manner.


Scene 14: 

The camera turns 180 degrees to her monitor to show:

The logo of Schrodinger.

VIRUS SENT: RECEIVING FILES

(Loading bar: 40% received)

Fade out to white.

The End



Sunday 7 October 2012

Character Design Sheet: Schrodinger


Character Design Sheet: Franklin Dominic K. or Innocent Cafe Guy (ICG)


Script #2

Scene 1: Environment: Dimly lit cafe.

Fade in from white onto the white ring of a power button for a laptop. Camera travels up to the screen of the laptop whilst the button is still in the frame. Hand of a person appears from the lower left of the screen and presses the button. (SFX: Button press click. Start-up chimes)

Scene 2:
The camera focuses from left to right onto a TV screen in the room of the innocent person.
 ( VFX: Flicker of TV on the rest of the room). The headlines read:
            
LONG TIME HACKER: SCHRODINGER WANTED FOR BANK THEFT. SCHRODINGER IS BELIEVED TO BE BEHIND THE NATIONAL SECURITY BREACH OF 1999.

Scene 3: The camera switches to a shot behind the laptop screen of Innocent Cafe Guy(ICG). He is typing furiously. (SFX: Furious typing on keyboard).

Scene 4: Screen of hacker with the windows open for hacking.

INITIATING SCHRODINGER NETWORK

ACTIVATING VIRUS

Scene 5: The camera travels from the power cable of the hacker's laptop and through the plug socket. It goes through the wall.

Scene 6: The camera travels through the wall and out onto the exterior of a wall.

Scenen 7: An ATM screen with the words

SYSTEM ERROR

NO FUNDS AVAILABLE (SFX: Beeping)

Scene 8: Screen of hacker with codes. (SFX: Typing and Beeps)

Scene 9: The face of ICG sweating. (SFX: Typing on keyboard)

Scene 10: Screen of Hacker:

FIREWALL BREACHED.

SENDING VIRUS.

Scene 11: Camera travels up from laptop screen of hacker and reveals TV screen on the wall far away in front of the laptop.

The screen reads:

BREAKING NEWS:

BANK HEIST

FUNDS DRAINED

BELIEVED TO BE THE WORK OF SCHRODINGER- WANTED FOR THE NATIONAL SECURITY BREACH OF 1997

Scene 12:
Innocent Guy's face lit by the light of the monitor. His face becomes contorted in slight horror.
(SFX: No,no,no,no)


Scene 13:

Monitor of innocent guy. The camera turns from the face of the innocent guy to the monitor in a 180 degree turn.

Monitor:
Logo of Schrodinger(The hacker's alias)

ERROR: FILES UNAVAILABLE

VIRUS DETECTED (SFX: ominous beeping)

Scene 14:

Hacker sitting at the table next to ICG. Hacker at the left with the laptop open and the light from the screen illuminating his face. The shadowed figure of ICG in the background in a heightened state of distress, (SFX: 'You have got to be kidding me')

Scene 15: The camera turns to face the hacker. His face is illuminated by the light on his laptop screen. He smirks.

Scene 16: The camera turns to the laptop screen. The screen reads:

SYSTEM BREACHED. VIRUS SENT.

RECEIVING FILES

(Loading bar: 40% received)

Fade to white.

The End

Script #1

Scene 1:

Environment: Hacker's room.
         
Fade in from white onto the white ring of a power button for the CPU.

     
The camera zooms out to reveal a computer screen on the side (to the right) of the CPU.
          
A hand of a person appears from the left of the frame, turns on the power button.                                    (SFX: Button press click) The button changes to green and the monitor lights up.                                   (SFX: Start-up chime).

Scene 2: 

The camera focuses from left to right onto a TV screen in the room of the innocent person.
 ( VFX: Flicker of TV on the rest of the room). The headlines read:
            
LONG TIME HACKER: SCHRODINGER WANTED FOR BANK THEFT. SCHRODINGER IS BELIEVED TO BE BEHIND THE NATIONAL SECURITY BREACH OF 1999.

Scene 3: 

The camera changes to the back of the computer monitor. The face of the innocent guy,      illuminated by the light of the monitor is revealed. He is sweating, agitated and engrossed into something on the screen. He is typing furiously.
(SFX: Keyboard being typed on)

Scene 4:

The computer screen of the hacker where the codes are flashing on the screen. (SFX: Beeps and clicks.Keyboard being typed on)

Scene 5: 

Television in innocent guy's apartment. Headlines read:

BREAKING NEWS

CENTRAL BANK HACKED. MILLIONS OF POUNDS DRAINED

Scene 6:

Innocent Guy's face lit by the light of the monitor. His face becomes contorted in slight horror.
(SFX: No,no,no,no)

Scene 7:

Monitor of innocent guy. The camera turns from the face of the innocent guy to the monitor in a 180 degree turn.

Monitor:
Logo of Schrodinger(The hacker's alias)

ERROR: FILES UNAVAILABLE

VIRUS DETECTED (SFX: ominous beeping)

Scene 8: 

The shot travels down below the computer, under the desk, following the path of the wires. It goes through the wall and travels through another wall, tracing the wires' path. (SFX: Fast paced music, wind whoosh sound)

 Scene 9: 

Environment: A French swanky apartment. Mid morning light. SFX: Jazz music

The wire ends into a router. The camera turns 180 degrees to face the router while still in motion and moving farther away from the router.

Scene 10: 

The camera turns 180 degrees again to start traveling forwards in the direction of its travel.

Scene 11: 

Camera travels and comes to the balcony of the apartment. There is a round wooden coffee table in the balcony and a wooden chair. There is coffee on the table and a laptop.

Scene 12:

 The camera moves onto a door. It goes through the door.

Scene 13: 

Through the door and into the room of a 10-12 year old girl.

Environment: Well lit room of a girl. Bed with toys and a book case. Books about computers on the table. A set of headphones on the side of the computer.

Scene 14: 

The camera settles for a second, on the face of the girl. She is typing furiously with a calm expression and looking at the monitor. Her face is illuminated by the light through the window on the right. (Not in frame)

(SFX: Typing of keys on keyboard)


Scene 15: 

The mouth (below the eyes) of Schrodinger(The hacker) She smiles in a satisfied manner.

Scene 16: 

The camera turns 180 degrees to her monitor to show:

The logo of Schrodinger.

VIRUS SENT: RECEIVING FILES

(Loading bar: 40% received)

Fade out to white.

The End



Wednesday 3 October 2012

Cyber Warfare: Underlying Themes

Frame XIII have decided to move forward with our cyber hacking idea for the 1970-2000 communication age. So in turn the themes have to be analysed around hackers and how they fit into society or better yet how they try to separate themselves from society; "Most are also relatively individualistic and anti-conformist." (The Jargon File, http://catb.org/jargon/html/index.html)

Hackers are usually seen vile criminals that rank amongst murderers and other sort of top class outlaws. In a general sense of right and wrong this can be seen as true as hackers usually cause trouble for individuals or even companies, ranging from misdemeanour crimes to full on invasion of someones personal life.
The odd truth behind the hackers psyche is in fact knowledge. "The most obvious common ‘personality’ characteristics of hackers are high intelligence, consuming curiosity, and facility with intellectual abstractions." (The Jargon File)
They seek to improve their talents and challenge themselves with new hacking tasks, sometimes resulting in innocent people having their lives troubled in the process. 

In a sense the same can apply to a really strong person with the knowledge to fight anyone. He may choose to refine his skills without involving the outside world or he may decide that his power will let him be superior to everyone else and fight on the streets.
The hacker, instead of muscles, uses his brain. An expert hacker will normally be a highly intelligent person, whom outside of his hacking practises, will partake in other mentally stimulating interests or jobs. Like the strong muscle man, the hacker also knows he has the ability to be dominate over the rest of mankind, over the internet; whether he chooses to use his skills to cause havoc for others or just to further his knowledge is another question.

The main theme in our animation is the idea that the hacker can be anyone of us, with the knowledge and potential to ruin someones life with the push of a button, and that this has only become possible through the push of technology and communication.


Schrodinger The Hacker



Hacker At Cafe / Concept Art


A quick digital painting of the Hacker at the cafe on his laptop.
story soon to be uploaded.