Language Selection

English French German Italian Portuguese Spanish

The yin and yang of game mods

Filed under
Gaming

To critics of violent games, video game hackers have become the new threat to America's children because they modify the most popular games to include sexual content.

For the uninitiated, these game hackers, known as ``modders,'' are a terrifying lot.

The Entertainment Software Ratings Board targeted the modders when it noted the widespread availability of a mod software program, dubbed ``Hot Coffee,'' that can be downloaded from the Internet to run with the popular ``Grand Theft Auto: San Andreas'' game. Hot Coffee was the reason the board changed its rating on the Grand Theft Auto game from ``mature'' to ``adults only.''

The Hot Coffee mod unlocked sex scenes hidden on the game. Even though the scenes were originally created by its own Rockstar development studio, the game's publisher, Take-Two Interactive Software in New York, responded by blaming the modders in part, threatening to take legal action against those who violated its ``end user license agreements'' that govern how people use its software.

But game developers view the mod community as a misunderstood and underappreciated lot. Now that the modders are the subject of what they call a ``witch hunt,'' game developers are doing their part to fight back. In short, they say that restricting mods is an infringement on First Amendment rights and on creativity.

Jack Thompson, a Florida attorney who has tangled with makers of video games over this issue, says, ``Creative people seem to be big on creativity and not on much else. If publishers want to encourage the mod community, they need to be careful about that. You can't be so enamored of creativity that responsibility goes out the window.''

On Internet message boards such as ``GTA Garage,'' modders are responding to their critics. The administrators of the Web site GTA Garage, where mods for the Grand Theft Auto series are available, posted a series of letters and wrote in an introductory note, ``Some of us decided it would be a good idea to defend ourselves from the whole `modders are evil' myth they are perpetuating.''

Over-reaction

In their letter, the GTA Garage administrators wrote, ``History does show this same sort of fearful over-reaction was exhibited toward explicit movies in the past. And before that, heavy metal, rap music, The Beatles, and comic books were to blame.''

Mods are available on the Internet by the thousands, and many have little to do with sex or violence. Web users can download an image of an Adidas shirt for their characters to wear in Grand Theft Auto, or convert the sci-fi game ``Unreal Tournament 2004'' into a Western gunslinger's game dubbed ``Damnation.''

``The industry looks to the modders for their next generation of talent,'' said John Davison, editorial director at game magazine publisher Ziff Davis Media Game Group in San Francisco. ``This has been going on for more than a decade. The last thing the industry wants to do is close down this avenue.''

Some of the mods are offensive and amateurish, but many are independent works of art in their own right, says Jamil Moledina, executive director of the Game Developers Conference.

``The fact is, the modders, or those who take advantage of tools provided by the game publishers, are longstanding contributors to quality game development.''

Modding has a long and storied history. Game developers started the tradition of including extra hidden features in games, known as Easter Eggs, as a kind of inside joke to fellow programmers or rewards for diligent gamers.

Games such as 1993's ``Doom'' included tools that enabled players to create their own landscapes for the games. Some of those mods, such as ``Porn Doom,'' pushed the edge on taste. But many mods prove so popular that they extend the time that gamers spend with a game by hundreds of hours.

College student Minh Le spent about 20 hours a week working on a modification of the 1997 hit ``Half-Life.'' When he and his friends made it available on the Internet in 1999, ``Counter-Strike,'' a modern police-terrorist shooting game, turned into a monster hit. The game was downloaded by the millions, the creators of Half-Life at Valve in Kirkland, Wash., acquired the rights to it and sold millions more copies at retail. Le parlayed the mod into a job at Valve.

Another successful mod was ``Desert Combat,'' a transformation of Electronic Arts' ``Battlefield 1942'' that gave the online combat game a modern battlefield setting. That pre-empted EA's own ``Battlefield 2'' game by years, and EA eventually bought the developer that created the Desert Combat mod.

Legal liability

Publishers have watched the trend and made it easier to mod games by including sophisticated tools.

Most of the modders are creating content that publishers like. Some are producing annoying content, such as the ones that misappropriate copyrighted characters like ``Hello Kitty'' or ``The Simpsons.'' And some mods are so offensive, such as Hot Coffee or the naked ``Sims 2'' mod, that they're catching the wrath of politicians.

If the mods expose game publishers to legal liability, as with Hot Coffee, then game publishers might think twice about making the tools for modding available, said Jason Della Rocca, executive director of the International Game Developers Association.

``It would be very disappointing to see any formal legal action against modders,'' he said. ``The mod scene is a source of innovation and a significant channel for creative expression.''

Don Karl, a lawyer who represents game developers at Perkins Coie in Los Angeles, said publishers don't want to be put in the position of deciding which mods are appropriate and which aren't.

``Clearly, I can see the pressure intensifying on the game companies,'' Karl said. ``It puts the game companies in the role of being a policeman.''

By Dean Takahashi
Mercury News

More in Tux Machines

Google and Mozilla

  • Google Rolls Out Continuous Fuzzing Service For Open Source Software
    Google has launched a new project for continuously testing open source software for security vulnerabilities. The company's new OSS-Fuzz service is available in beta starting this week, but at least initially it will only be available for open source projects that have a very large user base or are critical to global IT infrastructure.
  • Mozilla is doing well financially (2015)
    Mozilla announced a major change in November 2014 in regards to the company's main revenue stream. The organization had a contract with Google in 2014 and before that had Google pay Mozilla money for being the default search engine in the Firefox web browser. This deal was Mozilla's main source of revenue, about 329 million US Dollars in 2014. The change saw Mozilla broker deals with search providers instead for certain regions of the world.

Security Leftovers

  • Security updates for Friday
  • Understanding SELinux Roles
    I received a container bugzilla today for someone who was attempting to assign a container process to the object_r role. Hopefully this blog will help explain how roles work with SELinux. When we describe SELinux we often concentrate on Type Enforcement, which is the most important and most used feature of SELinux. This is what describe in the SELinux Coloring book as Dogs and Cats. We also describe MLS/MCS Separation in the coloring book.
  • The Internet Society is unhappy about security – pretty much all of it
    The Internet Society (ISOC) is the latest organisation saying, in essence, “security is rubbish – fix it”. Years of big data breaches are having their impact, it seems: in its report released last week, it quotes a 54-country, 24,000-respondent survey reporting a long-term end user trend to become more fearful in using the Internet (by Ipsos on behalf of the Centre for International Governance Innovation). Report author, economist and ISOC fellow Michael Kende, reckons companies aren't doing enough to control breaches. “According to the Online Trust Alliance, 93 per cent of breaches are preventable” he said, but “steps to mitigate the cost of breaches that do occur are not taken – attackers cannot steal data that is not stored, and cannot use data that is encrypted.”
  • UK's new Snoopers' Charter just passed an encryption backdoor law by the backdoor
    Among the many unpleasant things in the Investigatory Powers Act that was officially signed into law this week, one that has not gained as much attention is the apparent ability for the UK government to undermine encryption and demand surveillance backdoors. As the bill was passing through Parliament, several organizations noted their alarm at section 217 which obliged ISPs, telcos and other communications providers to let the government know in advance of any new products and services being deployed and allow the government to demand "technical" changes to software and systems.
  • EU budget creates bug bounty programme to improve cybersecurity
    Today the European Parliament approved the EU Budget for 2017. The budget sets aside 1.9 million euros in order to improve the EU's IT infrastructure by extending the free software audit programme (FOSSA) that MEPs Max Anderson and Julia Reda initiated two years ago, and by including a bug bounty approach in the programme that was proposed by MEP Marietje Schaake.
  • Qubes OS Begins Commercialization and Community Funding Efforts
    Since the initial launch of Qubes OS back in April 2010, work on Qubes has been funded in several different ways. Originally a pet project, it was first supported by Invisible Things Lab (ITL) out of the money we earned on various R&D and consulting contracts. Later, we decided that we should try to commercialize it. Our idea, back then, was to commercialize Windows AppVM support. Unlike the rest of Qubes OS, which is licensed under GPLv2, we thought we would offer Windows AppVM support under a proprietary license. Even though we made a lot of progress on both the business and technical sides of this endeavor, it ultimately failed. Luckily, we got a helping hand from the Open Technology Fund (OTF), which has supported the project for the past two years. While not a large sum of money in itself, it did help us a lot, especially with all the work necessary to improve Qubes’ user interface, documentation, and outreach to new communities. Indeed, the (estimated) Qubes user base has grown significantly over that period. Thank you, OTF!
  • Linux Security Basics: What System Administrators Need to Know
    Every new Linux system administrator needs to learn a few core concepts before delving into the operating system and its applications. This short guide gives a summary of some of the essential security measures that every root user must know. All advice given follows the best security practices that are mandated by the community and the industry.
  • BitUnmap: Attacking Android Ashmem
    The law of leaky abstractions states that “all non-trivial abstractions, to some degree, are leaky”. In this blog post we’ll explore the ashmem shared memory interface provided by Android and see how false assumptions about its internal operation can result in security vulnerabilities affecting core system code.

GNU/FSF

  • The Three Software Freedoms
    The government can help us by making software companies distribute the source code. They can say it's "in the interest of national security". And they can sort out the patent system (there are various problems with how the patent system handles software which are out of the scope of this article). So when you chat to your MP please mention this.
  • Leapfrog Honoring the GPL
  • A discussion on GPL compliance
    Among its many activities, the Software Freedom Conservancy (SFC) is one of the few organizations that does any work on enforcing the GPL when other compliance efforts have failed. A suggestion by SFC executive director Karen Sandler to have a Q&A session about compliance and enforcement at this year's Kernel Summit led to a prolonged discussion, but not to such a session being added to the agenda. However, the co-located Linux Plumbers Conference set up a "birds of a feather" (BoF) session so that interested developers could hear more about the SFC's efforts, get their questions answered, and provide feedback. Sandler and SFC director of strategic initiatives Brett Smith hosted the discussion, which was quite well-attended—roughly 70 people were there at a 6pm BoF on November 3.
  • Join us as a member to give back for the free software you use
    At the FSF, we run our own infrastructure using only free software, which makes us stand out from nearly every other nonprofit organization. Virtually all others rely on outside providers and use a significant amount of nonfree software. With your support, we set an example proving that a nonprofit can follow best practices while running only free software.
  • The Free Software Foundation is in need of members

today's howtos