the secret censors of the mpaa.

I’ve recently been obsessing over the 1997 film Event Horizon, a sci-fi/horror flick described by its director as “The Shining in space.” For those who haven’t seen it, the basic premise is that the Event Horizon, a spaceship capable of “jumping” through space simply vanished and then reappeared seven years later; thus, a salvage crew, led by Laurence Fishburne and aided by engineer Sam Neill, are sent to rescue any surviving crew members as well as the Event Horizon. The ship, however, has come back unspeakably alive. The film unfolds slowly and then blossoms into a veritable Hellraiser homage, replete with a chaotic entity, extremely fleeting sadomasochistic imagery, and notions of pain, nothingness, and hell.

I often work best to the soothing sounds of tortured screaming, so I looped this film in the background while revising final papers and conference presentations last month. After the semester ended, I idly checked YouTube for extra footage and discovered that whole sequences had been deleted. Paul Andersen removed segments that actually helped the narrative make sense and restricted the gore to frames lasting 1-2 seconds each, in addition to radically trimming the orgiastic distress call video that motivates the salvage mission.

So then I looked at the original script. The changes made from script to screen were fairly radical. Images such as a son cannibalizing his still-breathing mother and violent, cannibalistic sex were omitted or heavily, heavily modified. A sex scene between the hallucinating Dr. Weir (Neill) and his dead wife Claire, during which he overcomes his loneliness and she tears out his eyes at climax, is also omitted. These scenes did not seem overly long or gratuitous, instead contributing to the development of a character on the brink of madness. Similar scenes made the cut in 1970s and 1980s horror films. So why this film, and why these scenes?

Continue reading

Reflections on Censorship, Occupy Wall Street, and the 99%

By now I’m sure we’ve all heard about Union Square, Washington Square Park, the Brooklyn Bridge, and other city sites that have been marched on; we’ve all seen the video clips circulating on the Internet, read about the original July call put out by AdBusters, and the supposedly unintentional or accidental censorship of emails and Tweets with the Occupy Wall Street phrase or hashtag. It does seem ridiculous that with the Occupy movement spreading to Washington D.C., the White House lawn, Los Angeles, Detroit, and banks and other corporate institutions everywhere, Twitter is currently trending #PeopleWhoAreOverrated and #moviebands.

Vibe, on the other hand, is overrrun with messages from Anonymous, the hive mind, bagpiper, and other similarly (un)identified individuals updating each other on Occupy Wall Street and the other Occupy movements springing up around the country and worldwide.

Continue reading

Tricksters, 50 Days of Lulz, Effecting Change.

On June 26th, LulzSec faded back into the woodwork, ending their hacktivity with “50 days of lulz,” in which they leaked internal data from AOL, AT&T, the FBI, gaming forums, NATO bookshop, and navy.mil, among others. The leak marked the end of the Lulz Boat’s “planned 50 day cruise,” leaving its 6-member crew to “now sail into the distance, leaving behind–we hope–inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere.  Anywhere” (LulzSec).

This begs the question I’ve been dodging forever: does spectacle, ultimately, constitute impact? What did X, Y, or Z actually do? Apart from gathering numerous followers, supporters, and participants, LulzSec’s antics have impacted the way organizations view cybersecurity, drawing statements from NATO and prompting the Obama administration to propose stricter anti-hacking laws. (This is one year after the Australian government proposed that DDoS and script hacks be termed “cyber-terrorism” following Operation Titstorm, so that their import could be easily recognized. Notably, these attacks were performed in response to ISP-level censoring measures proposed by the government that year.)

Continue reading