Language Selection

English French German Italian Portuguese Spanish

Actors Strike Over Video Game Voices

Filed under
Gaming

A button worn by picketing actors at last week's E3 video games trade show suggested they might pull the plug if they don't get a bigger share of the industry's huge profits. It read "Game Over."

About 2,000 union actors give voice to characters such as Obi Wan Kenobi in the latest "Star Wars" game. One actor can provide the voice of several characters during a single recording session.

Talks between game publishers and the two main actors' unions broke earlier this month. Actors will decide over the next two weeks if the impasse is critical enough to call a strike.

Voice actors have worked under a contract with game publishers since 1993. But now that video games generate nearly as much revenue as domestic movie ticket sales, actors say they want a piece of every game sold rather than one-time up front fees.

"To deny working-class performers their fair share of the tremendous profits their labor helps to generate is illogical, unreasonable and unjust," John Connolly, president of the American Federation of Television and Radio Artists said recently. "It is simply shortsighted to believe that consumers don't care about the artistic quality of the characters."

That's a risk game companies seem willing to take, especially in light of divisions among actors, some of whom feel a strike would lead to the complete loss of union protection on video game jobs.

"The union's demand for an equity stake, or residual structure, is unreasonable and not fair to the hundreds of people who often spend years developing a game," Howard Fabrick, an attorney representing publishers in the talks, said in a statement. "Voiceover work represents a small fraction of a video game's development and consumer enjoyment."

No more than 15 percent of all games are produced under union contract, the unions say. But that includes nine of the 10 top-sellers last year.

In some cases, celebrity voices and likeness are key to selling a game. Electronic Arts Inc. recently signed a deal with actors James Caan and Robert Duvall to reprise their roles in the game version of the Oscar-winning film "The Godfather."

But in most cases, anonymous actors lend their voices to game characters. And while professional voices lend reality to games, analysts say the voices are not the key to a game's ultimate success.

"They have no leverage," Yankee Group analyst Mike Goodman said of the voice actors.

"In 99 percent of all games, the voice actors are irrelevant," Goodman said. "You replace one voice actor with another nonunion actor and no one will know the difference."

The two actors' unions have sent ballots to their members working in video games asking for a strike authorization. The results are due in two weeks. If actors fail to support a strike by a significant margin, union officials will consider accepting the latest proposal from publishers or restarting talks.

Actors say the residual model is standard practice for TV shows and commercials as well as home video sales. They also say they have been flexible in talks, backing off an earlier demand for straight residuals and instead proposing that producers pay actors an additional session fee after the game sells 400,000 copies.

Fees would also be paid for every 100,000 copies sold after that.

Producers have countered with an offer of a 34.8 percent wage hike over three years, bringing the one-hour rate for union actors to $375 from $278.

Publishers have also proposed raising overtime payments, limiting the number of voices that actors would be required to perform and agreeing to pay extra when a publisher uses a voice recording in another game.

GARY GENTILE
Associated Press

More in Tux Machines

Games: Ostriv, Back to Bed, EVERSPACE, Hiveswap: Act 1

Openwashing and Microsoft FUD

BlueBorne Vulnerability Is Patched in All Supported Ubuntu Releases, Update Now

Canonical released today new kernel updates for all of its supported Ubuntu Linux releases, patching recently discovered security vulnerabilities, including the infamous BlueBorne that exposes billions of Bluetooth devices. The BlueBorne vulnerability (CVE-2017-1000251) appears to affect all supported Ubuntu versions, including Ubuntu 17.04 (Zesty Zapus), Ubuntu 16.04 LTS (Xenial Xerus) up to 16.04.3, Ubuntu 14.04 LTS (Trusty Tahr) up to 14.04.5, and Ubuntu 12.04 LTS (Precise Pangolin) up to 12.04.5. Read more

Security: Updates, 2017 Linux Security Summit, Software Updates for Embedded Linux and More

  • Security updates for Tuesday
  • The 2017 Linux Security Summit
    The past Thursday and Friday was the 2017 Linux Security Summit, and once again I think it was a great success. A round of thanks to James Morris for leading the effort, the program committee for selecting a solid set of talks (we saw a big increase in submissions this year), the presenters, the attendees, the Linux Foundation, and our sponsor - thank you all! Unfortunately we don't have recordings of the talks, but I've included my notes on each of the presentations below. I've also included links to the slides, but not all of the slides were available at the time of writing; check the LSS 2017 slide archive for updates.
  • Key Considerations for Software Updates for Embedded Linux and IoT
    The Mirai botnet attack that enslaved poorly secured connected embedded devices is yet another tangible example of the importance of security before bringing your embedded devices online. A new strain of Mirai has caused network outages to about a million Deutsche Telekom customers due to poorly secured routers. Many of these embedded devices run a variant of embedded Linux; typically, the distribution size is around 16MB today. Unfortunately, the Linux kernel, although very widely used, is far from immune to critical security vulnerabilities as well. In fact, in a presentation at Linux Security Summit 2016, Kees Cook highlighted two examples of critical security vulnerabilities in the Linux kernel: one being present in kernel versions from 2.6.1 all the way to 3.15, the other from 3.4 to 3.14. He also showed that a myriad of high severity vulnerabilities are continuously being found and addressed—more than 30 in his data set.
  • APNIC-sponsored proposal could vastly improve DNS resilience against DDoS