The second half of the film is all about retrieving the data from Johnny’s implant without the full set of access codes. Johnny needs to get the data downloaded soon or he will die from the “synaptic seepage” caused by squeezing 320G of data into a system with 160G capacity. The bad guys would prefer to remove his head and cryogenically freeze it, allowing them to take their time over retrieval.
1 of 3: Spider’s Scanners
The implant cable interface won’t allow access to the data without the codes. To bypass this protection requires three increasingly complicated brain scanners, two of them medical systems and the final a LoTek hacking device. Although the implant stores data, not human memories, all of these brain scanners work in the same way as the Non-invasive, “Reading from the brain” interfaces described in Chapter 7 of Make It So.
The first system is owned by Spider, a Newark body modification specialist. Johnny sits in a chair, with an open metal framework surrounding his head. There’s a bright strobing light, switching on and off several times a second.
Nearby a monitor shows a large rotating image of his head and skull, and three smaller images on the left labelled as Scans 1 to 3.
The largest image resembles a current-day MRI or CT display. It is being drawn on a regular flat 2D display rather than as a 3D holographic type projection, so does not qualify as a volumetric projection even though a current day computer graphics programmer might call it such. The topmost Scan 1 is the head viewed from above in the same rendering style. Scan 2 in the middle shows a bright spot around the implant, and Scan 3 shows a circuit board, presumably the implant itself. The background is is blue, which so far has been common but not as predominant as it is in other science fiction interfaces. Chris suggests this is because blue LEDs were not common in 1995, so the physical lights we see are red and green and likewise the onscreen graphics use many bright colors.
Occasionally a purple bar slides across the main image. It perhaps represents some kind of processing update, but since the image is already rotating, that seems superfluous. At one point the color of the main image changes to red, with a matching red sliding bar, but we don’t know why. All the smaller images rotate or flash regularly, with faint ticking sounds as they do.
From this system, Spider is able to tell Johnny that there is a problem with his implant and it must be painful. (Understandably, Johnny is not impressed with this less than helpful diagnosis.) Unlike either the scanner at Newark Airport or the LoTek binoculars, there are no obvious messages or indicators providing this information. But this is a specialised piece of medical technology rather than a public access system, so presumably Spider has sufficient expertise to interpret the displays without needing large popup text.
2 of 3: Hospital Scanner
Spider takes Johnny to a hospital for a more thorough scan. Here the first step is attaching a black flexible strip with various cables around his head. His implant cable is also connected.
There isn’t a clear shot of the entire system, but behind Johnny is a CRT monitor and to his left, our right, is a bank of displays that look like electronic oscilloscopes. Since embedded body electronics are common in the world of Johnny Mnemonic, that is probably exactly what they are intended to be. Spider adjusts some controls on these.
The oscilloscopes show no text, just green lines and shapes. The CRT behind Johnny is now showing the same head image that we saw at the end of the previous scan.
In front of the oscilloscopes is a PC keyboard from the 1990s. In 2021 this will look even older, but this entire hospital is portrayed as a shoestring operation relying on donations and salvage. Spider types on the keyboard, and the CRT changes to show a lot of scrolling text.
This is enough for Spider to announce that the “data” is the cure for NAS, the world wide epidemic disease that Jane is showing symptoms of. Again it’s not clear how he can determine this, as the data is still protected by the access codes. Perhaps the scrolling text is unencrypted metadata in the implant that is more easily retrieved. Given the apparent hazardous life of a mnemonic courier, it would make sense to attach the equivalent of a sticky label to the implant, briefly describing the contents and who they should be delivered to.
(This is also the point where one has to ask why this valuable data is encrypted and protected to begin with. Using a mnemonic courier for distribution makes sense, to avoid content filters on the Internet. But now the data is here in Newark, with the intended recipients, so why is it so hard to get at? The best answer I can think of is that the scientists wanted to ensure that the mnemonic courier couldn’t keep the data for themselves and sell it to the highest bidder.)
The third of the three brain interfaces warrants its own post, coming up next.
Once Johnny has installed his motion detector on the door, the brain upload can begin.
3. Building it
Johnny starts by opening his briefcase and removing various components, which he connects together into the complete upload system. Some of the parts are disguised, and the whole sequence is similar to an assassin in a thriller film assembling a gun out of harmless looking pieces.
It looks strange today to see a computer system with so many external devices connected by cables. We’ve become accustomed to one piece computing devices with integrated functionality, and keyboards, mice, cameras, printers, and headphones that connect wirelessly.
Cables and other connections are not always considered as interfaces, but “all parts of a thing which enable its use” is the definition according to Chris. In the early to mid 1990s most computer user were well aware of the potential for confusion and frustration in such interfaces. A personal computer could have connections to monitor, keyboard, mouse, modem, CD drive, and joystick – and every single device would use a different type of cable. USB, while not perfect, is one of the greatest ever improvements in user interfaces.
Why not go wireless? Wireless devices remove the need for a physical connection, but this means that anyone, not just you, could potentially connect. So instead of worrying about whether we have the right kind of cable, we now worry about the right kind of Bluetooth pairing and WiFi encryption password scheme. Mobile wireless devices also need their own batteries, which have to be charged. So wireless may seem visually cleaner, but comes with its own set of problems.
As of early 2016 we have two new standards, Lightning and USB-C, that are orientation-independent (only fifty years after audio cables), high bandwidth, and able to transmit power to peripherals as well. Perhaps by 2021 cables will have made a comeback as the usual way to connect devices.
2. Explaining it
Johnny explains the process to the scientists. He needs them to begin the upload by pushing a button, helpfully labelled “start”, on the gadget that resembles an optical disk drive. There’s a big red button as well, which is not explained but would make an excellent “cancel” button.
It would be simpler if Johnny just did this himself. But we will shortly discover that the upload process is apparently very painful. If Johnny had his hands near the system, he might involuntarily push another button or disturb a cable. So for them, having a single, easily differentiated button to press minimizes their chance of messing it up.
1. Making codes
He also sticks a small black disk on the hotel room’s silver remote control. The small disk is evidently is a wireless controller or camera of some kind. The scientists must watch the upload progress counter, and as it approaches the end, use this modified remote to grab three frames from the TV display, which will become the “access code” for the data. (More on this below.)
None of the buttons on this remote have markings or labels, but neither Johnny nor the scientist who will be using it are bothered. Perhaps this hotel chain tries to please every possible guest by not favouring any particular language? But even in that case, I’d expect there to be some kind of symbols on the buttons and a multilingual manual to explain the meaning of each. Maybe Johnny spends so much time in hotel suites that he has memorised the button layout?
Short of a mind reading remote that can translate any button press into “what the user intended”, I have to admit this is a terrible interface.
(There is a label on the black disk, but I have no idea what it means or even which script that is. Anyone?)
0. Go go go
Johnny plugs in his implant, puts on a headset with more cables, and bites down on a mouthguard. He’s ready.
The scientist pushes the start button and the upload begins. Johnny sees the data stream in his headset as a flood of graphics and text.
Why does he need the headset when there is a direct cable connection to the implant? The movie doesn’t make it explicit. It could be related to the images used as the access code. (More on this below.) Perhaps the images need to be processed by the recipient’s own optic nerve system for more reliable storage?
Still, in the spirit of apologetics we should try to find a better explanation than “an opportunity for 1995 cutting edge computer generated graphics.” Perhaps it is a very flashy progress indicator? Older computer systems had blinking lights on disk drives to indicate activity, copied on some of today’s USB sticks. Current-day file upload or download GUIs have progress bars. As processing and graphics capabilities increase, it will be possible for software to display thumbnails or previews of the actual data being transferred without slowing down.
Unfortunately there is an argument against this, which is that the obvious upload progress indicator is a numeric display counting gigabytes down to zero, and it makes a fast chirping sound as a sonic indicator as well. The counter shows the data flowing at gigabytes per second, the entire upload lasting about a minute. There’s also the problem that it’s not Johnny who is interested in knowing whether the upload is scientific data rather than, say, a video collection; but the scientists, and they can’t see it.
As the counter drops below one hundred, the scientist points the remote with black disk at the TV display, currently showing a cartoon, and presses the middle button. The image from the TV appears overlaid on the data stream to Johnny. This is a little odd, because Johnny assured the scientists that he wouldn’t know what the access codes were himself. Maybe these brief flashes are not enough time for him to remember these particular images among the gigabytes of visual content. But the way they’re shown to us, I’ll bet you can remember them when they come up again later in the plot.
Two more images are grabbed before the counter stops. When the upload finishes, the three images are printed out. (In the original film this is shown upside down, so I have rotated the image.)
Tagged:
So what are the images for? The script isn’t clear. I suggest that the images are being used as the equivalents of very large random numbers for whatever cryptography scheme protects the data against unauthorised access. Some current day systems use the timing of key presses and mouse movements as a source of randomness because humans simply can’t move their fingers with microsecond precision. Here, the human element makes it impossible to predict exactly which frame is chosen.
Humans also find images much easier to recognise than hundred digit numbers. Anyone who has seen the printout will be able to say whether a particular image is part of the access code or not with a high degree of confidence. In computer systems today, Secure Shell, or ssh, is a widely used encrypted terminal program for secure access to servers. Recent versions of ssh have a ‘randomart’ capability which shows a small ASCII icon generated from the current cryptographic key to everyone who logs on. If this ASCII icon appears different, this alerts everyone that the server key has been changed.
There’s one potential usability problem with the whole “pick three random images” mechanism. The last frame was grabbed when the counter was very close to zero. What would have happened if he had been too slow and missed altogether? Wouldn’t it be more reliable to have the upload system automatically grab the images rather than rely on a human? Chris suggests that maybe it secretly did grab three images that could have used without human input, but privileged the human input since it was more reliably random.
Quick aside: You may be asking, if images would be so wonderful, why aren’t we using them in this way already? It’s because our current security systems need not just very large random numbers, but very large random numbers with particular mathematical properties such as being prime. But let’s cut Johnny Mnemonic some slack, saying that by 2021 we may have new algorithms.
OK, back to the plot.
-1. Sharing the codes
The access codes are to be faxed from Beijing to Newark, although this gets interrupted by the Yakuza intruders. This is yet another device with unmarked buttons.
This device makes the same beeps and screeches as a 1990s analog fax machine. Since we’ll later learn that all the fax messages and phone calls are stored digitally in cyberspace, this must be a skeuomorphism, the old familiar audio tones now serving just as progress indicators.
As with other audio output, the tones allow the user to know that the transmission is proceeding and when it ends without having to pay full attention to the device. On the other hand, there is potential for confusion here as the digital upload is (presumably) much faster. Most current day computer systems could upload three photos, even in high resolution, well before the sequence of tones would complete. Users would most likely wait longer than actually necessary before moving on to their next task.
-2. Washing up
During the upload Johnny clenches his fists and bites his mouthguard. When the upload finishes, he retreats to the bathroom in considerable pain. At one point blood flows from his nose, and he swipes his hand over the tap to wash it down the drain. The bathroom announces that the water temperature is 17 degrees. We’ll come back to this later.
As Make It So emphasises in the chapter on brain interfaces, there is nothing in our current knowledge to suggest that writing or reading memories to or from a human brain would be painful. On the other hand, we know that information in the brain isthe shape of the neurons in the brain. Who knows what side effects will happen as those neurons are disconnected and reconnected as they need to be? We don’t know, so can’t really say whether it would hurt or not.
-3. Escaping the Yakuza
As mentioned in a prior post, while he is in the bathroom, the motion detector Johnny installed on the hotel door isn’t very effective and the Yakuza break in, kill everyone else, and acquire the second of the three access code images. Johnny escapes with the first image and flies to Newark, North America.
In Beijing, Johnny steps into a hotel lift and pulls a small package out his pocket. He unwraps it to reveal the “Pemex MemDoubler”.
Johnny extends the cable from the device and plugs it into the implant in his head. The socket glows red once the connection is made.
Analysis: The jack
The jack looks like an audio plug, and like most audio plugs is round and has no coronal-orientation requirement. It also has a bulbous rather than pointed tip. Both of these are good design, as Johnny can’t see the socket directly and while accidentally poking yourself with a headphone style point is unlikely to be harmful, it would certainly be irritating.
The socket’s glow would be a useful indicator that the thing is working, but Johnny can’t see it! Probably these sockets and jacks are produced and used for other devices as well, as red status lights are common in this world.
There are easier and more convenient fictional brain plug interfaces, such as the neck plugs previously discussed on this website for Ghost In The Shell. But Johnny doesn’t want his implant to be too obvious, so this not so convenient plug may be a deliberate choice. Perhaps he tells inquisitive people that it’s for his Walkman.
Analysis: The device
The product name got a few chuckles from audiences in the 1990s, as the name is similar to a common classic Macintosh extension at the time, the Connectix RAM Doubler. This applied in-memory lossless data compression techniques to allow more or larger programs to run within the existing RAM.
The MemDoubler is apparently a software or firmware updater, modifying Johnny’s implant to use brain tissue twice as efficiently as before. It has voice output, again a slightly artificial sounding but not unpleasant voice. This announces that Johnny’s current capacity is 80 gigabytes. As the update is applied, a glowing progress bar gradually fills until the voice announces the new capacity of 160G.
(Going from 80G to 160G seems quaint today. But we should remember that the value of a mnemonic courier is secrecy, not quantity.)
Why does the MemDoubler need voice output? For such a simple task, the progress bar and a three digit numeric counter would seem adequate. But if there are complications—which for something wired into the brain might have an all too literal meaning for “fatal error”—a voice announcement would be able to include much more detail about the problem, or even alert bystanders if Johnny is rendered unconscious by the problem. (Given how current software installers operate, Johnny is fortunate that the MemDoubler did not insist on reciting the entire end user license agreement and warranty before the update could start.) Maybe the visual should be the default (to respect his professional need for secrecy), and the voice announcement adopted in an alert mode.
It’s also interesting that Johnny installs this immediately before he needs it, in the lift that is taking him to the hotel room where he will receive the data to be stored. Suppose someone else had been in the lift with him? In this world of routine body implants doubling your memory is probably not a crime, but at the time of writing diabetics will inject themselves in private even though that is harmless and necessary. Perhaps body-connected technology will be common enough in 2021 that public operation is considered normal, just as we have become accustomed to mobile phone conversations being carried out in public.
The jack mechanism in the intercept van is worth noting for its industrial design. Kusanagi has four jacks on the back of her neck in a square pattern. Four plugs sit on the headrest of her seat. To jack in, she simply leans back, and they seat perfectly. She leans forward, and the cables extend from the seat. Given the simple back and forward motion, it takes all of a second. Seems simple enough. But I’ve committed a blog post to it, so of course you can guess it’s not really that simple. I can see two issues with this interface.
How do the jacks and plugs meet so perfectly?
Of course, she’s a super cyborg, so we can presume she can be quite precise in her movements. But does she have eyes/cameras on the back of her head, or precision kinesthetics and a perfect body memory for position? Even if she does, it would be better would be to accommodate some margin of error to account for bumpy roads or action-packed driving maneuvers.
How to do this? One way would be a countersink so that a sloppy approach is corrected by shape. The popular (and difficult-to-source) keyhole for drunk people uses this same principle. Unfortunately, in the case of this headrest jack, the base object is Kusanagi’s neck, which is functionally a cylinder. The cones on the back of her neck would have to be unsightly large or a miss would splay the plugs and force her to retry. Fortunately, the second issue leads us to another solution.
How does she genuinely rest against the seat when she doesn’t want to jack in?
Is that even an option here? How does she simply lean back for a road trip nap without being blasted awake by a neon green 3D Google Map?
If it was a magnetic connection, like Apple’s MagSafe power connectors, the jacks and plugs could be designed such that magnetic forces pull them together. But unlike MagSafe, these jacks could be electromagnets controlled by Kusanagi. This would not only ensure intended connections, but also help deal with the precision issues raised above. The electromagnets would snap the plugs into place even if they were misaligned.
An electromagnetic interface would also answer the question of how this works for taller or shorter cyborgs hoping to use the same headrest jack.
An automated solution
This solution does require complex mechanics in the body of the rider. That’s no problem for the Ghost in the Shell diegesis, but if we were facing a challenge like this in the real world, implanting users with tech isn’t a viable solution. Instead, we could push the technology back on the van by letting it do the aiming. In the half a second she leans back, the van itself can look through a camera in the headrest to gauge the fit, and position the plugs correctly with, say, linear actuators. This solution lets human users stay human, but would ensure a precision fit where it was needed.