Reader’s Digest International — August 2017

(singke) #1
August• 2017 | 75

READER’S DIGEST


Motek’s lead animator Oshri Even-
Zohar was eager to join the project,
and the creation of Sweetie began.
First, Oshri and three other
Motek artists created a repository of
references from hundreds of images
of Filipino girls. Using these, they
designed Sweetie’s facial features



  • everything from the bones in her
    cheeks to the thickness of her skin.
    Next, the team designed Sweetie in
    two dimensions, painting and draw-
    ing her with different expressions and
    from various angles. What did Sweetie
    look like when sad? Happy? Embar-
    rassed?Theteamcreatedavastmood
    board and then modelled it in 3D.
    Finally, it was time to use motion
    capture to animate Sweetie. An actress
    specialising in mime acted out the 25
    movements Sweetie would be able to
    perform, from nodding yes, shaking
    her head no, smiling, adjusting her
    web cam and typing, to getting up and
    exiting the frame. Each was synced
    with a keyboard command so that
    Sweetie’s responses could be easily
    controlled in real time.
    Theentireprocesstookcloseto
    six months.
    Then Oshri proudly presented the
    petite brown-skinned girl to Mark,
    Hans, Albert-Jaap and the rest of
    the small team. Sweetie had to be
    convincing. He walked her through
    her range of movements, then turned
    to face his audience. Every single
    member was smiling.
    Sweetie was a go.


IT WAS JULY 2013and the team
had rented an empty warehouse
space in the desolate industrial har-
bour of Amsterdam. They boarded
up the windows. When the landlord
asked questions, Mark said they were
shooting the new IKEA catalogue and
couldn’t have any leaks.
Then they loaded in laptops,
screens, routers, online security gear
and webcams. All the computers but
one had been programmed with IP
addresses that appeared to be in the
Philippines. The remaining laptop
was ‘air gapped’, never having been
connected to the internet and was
therefore safe from hacking. This
was where data on the identities of
the predators would be stored.
Then the infiltration began. Four
operators specially scouted by Mark
entered chat rooms that Hans knew
were playgrounds for predators.
The operators worked in pairs.
While one engaged the predator
with Sweetie, the other used clues
from the chat to search the web and
identify theindividual.
Hans watched as Sweetie entered
her first chat room. No sooner had she
posted her username than requests to
make contact flooded in. Men from
all corners of the globe were eager to
share personal information – emails,
Skype addresses, real names, naked
photographs – in the hopes of pur-
chasing webcam sex with a prepubes-
cent girl. Sometimes they demanded
a glimpse of Sweetie before revealing
Free download pdf