Feeds

NASA close to approving first sci-fi flick shot in space

ISS space tourist shoots schlock horror short

High performance access to file storage

The first science fiction film shot in orbit could be coming to terrestrial viewers, now that NASA has confirmed it's almost ready to give approval for the project.

Apogee of Fear was shot by space tourist Richard Garriott during his 2008 sojourn on the International Space Station (ISS). Garriott shot the basic footage for the film, using astronauts as his cast, and then added scenes and effects after his return to Earth. The film, privately shown at Dragon*Con last year, has been in legal limbo because it wasn’t included in Garriott’s deal with NASA.

"NASA is working with Richard Garriott to facilitate the video's release,” Bob Jacobs, deputy for communications at NASA, told The Register in an email. “While the project was not part of his original Space Act agreement with NASA, everyone involved had the best of intentions. We hope to resolve the remaining issues expeditiously, and we appreciate Richard's cooperation and his ongoing efforts to get people excited about the future of space exploration."

Millionaire game developer Garriott – aka Lord British in Ultima and General British in Tabula Rasa – shot the film during his 10-day tourist jaunt up to the ISS, while performing his other orbital duties. Without giving too much of the plot away, it involves a mysterious passenger who sneaks aboard the ISS for their own reasons, and it contains knowing nods to many of the greats of the science fiction genre. An audience's-heads-in-frame bootleg can be seen here.

Garriott, the son of a US astronaut who did a tour of duty on SkyLab back in the 1970s, and the second British astronaut to make it into orbit, shot the film to a script from noted fantasy author Tracy Hickman. Two US astronaut and one Russian cosmonaut have supporting roles. If NASA resolves the contractual issues, the film could be released as either a short, or as part of other films Garriott has made about space history.

Garriott is one of two second-generation astronauts: the other is cosmonaut Sergey Volkov, whose father Aleksandr was stuck on the Mir space station when the Soviet Union dissolved. Garriott also owns the Lunokhod 2 rover that surveyed the Moon in 1973 for around six months before breaking down.

And, yes, Garriott's Lunokhod 2 is still on the moon. ®

High performance access to file storage

More from The Register

next story
IBM Hursley Park: Where Big Blue buries the past, polishes family jewels
How the internet of things has deep roots in the English countryside
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Honeybee boffin STINGS OWN WEDDING TACKLE... for SCIENCE
Not the worst place to be stung, says one man
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.