Rule 34 hs-2

Home > Other > Rule 34 hs-2 > Page 26
Rule 34 hs-2 Page 26

by Charles Stross


  (Although describing what you’ve got here as “Internet access” is a bit like calling a Bosnian War rape camp a “dating agency.”)

  Here is your office: heart of a spider-web, wrapped around a hardused Eames recliner, keyboard sitting on an articulated arm to one side, headset to the other. All the walls are covered in 3D screens except for one, a bare metal surface studded with radiation sensors, air vents, and crossed by exposed pipes and cable trays. There’s a tatty epaper poster gummed across it, sagging in the middle: It shows a constantly updated viewgraph schematic of global bandwidth consumption, fat pipes sprawling multi-hued across a dymaxion projection of the planet, pulsing and rippling with the systolic ebb and flow of data. The screens on the other walls all contain heads, perspectives shockingly preserved as if they are actually there in the flesh, freshly severed.

  Teleconferencing, actually.

  “How much longer do you propose to keep on stringing them along?” asks the delegate from Maryland. (She’s blonde and thin as a rake and clearly addicted to amphetamines or emetics or both: You wouldn’t fuck her at gun-point.)

  “They already realize what is going on!” The delegate from Brussels is clearly irritated by her naïveté. The lip-sync in the teleconference loop is borked: The real-time interpreter net is clearly not keeping up with his waspish tirade. “It is inconceivable that they don’t. Perhaps they use this as an opportunity to diminish their headcount. Or perhaps the short-term financial gain really is worth it to them—”

  “Twenty-four hours.” You cut in before his Belgian counterpart manages to crash the software. “That’s all we need for the wrap.”

  “Twenty-four hours is too long!” insists the Europol delegate. “We are already have trouble securing for the operation. And these ‘accidents,’ they attract attention. I am hearing reports that are mortifying. What are you doing? We did not agree to this!”

  “What precisely didn’t you consent to?” You raise one bushy eyebrow. “I seem to recall the negotiations over the concordat were exhaustive.”

  “This!” A wild hand gesture sweeps into view briefly, providing insight. (The American or Japanese programmers who designed the auto-track for this conference system clearly weren’t thinking in terms of cultures that are big on semaphore.) “The agents your associates have deployed are killing people! That was not part of our agreement. This arrangement was to suck in the assets of organized netcrime for civil confiscation, leaving an audit trail to facilitate prosecution of the perpetrators. Extralegal assassination is, is unacceptable! What are you doing?”

  It’s clearly running out of control, and you try not to sigh. “I am not doing anything: I’m not responsible for these deaths.” You shrug, then lean back in your well-upholstered command chair. “I assure you, they are nothing to do with me.” You look at Maryland. “Is your government . . . ?”

  Maryland looks as if she’s swallowed a live toad. “We’re not in the remote-kill business these days. This isn’t the noughties: Congress would never stand for it.” Ever since Filipino Jemaah Islamiyah hackers pwned an MQ-9 Reaper and zapped the governor of Palawan with USAF-owned Hellfire missiles, the Americans have gone back to keeping a human finger on the trigger: not because a state governor from a foreign country was killed, but because of who was in the armoured limousine right behind him. (The prospect of having to utter the term collateral damage in the same sentence as President of the United States before a congressional enquiry had focussed a few minds.) “Where’s the attack coming from?”

  “It’s not part of the original picture.” It’s uncomfortable to talk about. “To make IRIK look plausible, it was necessary to provide a haven for certain undesirable elements. They run botnets, of course, but their customers are . . . unclear. We had assumed the traditional, of course: spammers, malware vendors, child-labour sweat-shops providing teleoperator control of animatronic sex toys for paedophiles.” You clear your throat. “What we weren’t expecting: cheap grid computing for pharmaceutical companies solving protein-folding problems. A Chinese automobile company using a botnet to evolve the design of their latest car using genetic algorithms fed with data from consumer surveys. Artificial-intelligence researchers renting the same botnets that spammers rely on to train their spam filters. Who knew? It is a, a soup of virtual machines boiling out on the darknet, coordinated through channels that our targets operate from corrupted routers in the State Telephone Company hosting centres in Karakol. I don’t have the resources to trace them, in any event. We will shut them down when we spring the trap and snap their worthless necks, but until we are ready to close the honeypot, I cannot stop the attacks.”

  “Twenty-four hours.” This from the delegate from Beijing, whose screen is an opaque black cube. “That is unacceptable.”

  “I fail to see why. The operation is proceeding nominally.”

  “The operation is out of control, Colonel. Sequestrating the assets of organized crime is acceptable. Creating a honeypot for international cybercrime in order to shut them down is acceptable. But sheltering murderers is not. There have been regrettable excesses. The younger brother of the chairman of a state party branch that I shall not trouble you with. The aunt of a Central Committee member. You must shut it down now—or we will.”

  You grit your teeth. Your stomach churns: “It continues for twenty-four hours, and no more. The operation will conclude tomorrow, at twelve hundred hours, universal time, and not a second earlier.” Maryland and Brussels are opening their mouths: “We’ve got to let it run its course! If we don’t, the CDOs won’t be fully vested—the targets will not be bankrupted, but they will be annoyed with us.”

  “They’ll be annoyed with you.” Brussels looks smug.

  “Ah, no, I can see you misunderstand me. They’ll certainly be annoyed with me, but also with you, François, and you, Lorna, and you Li”—you stab a finger at Beijing—“because if any of you pull out of your side of the agreement prematurely, I will see to it that full details of this operation are published on the Internet, with all identifying names attached.” Your smile tightens. “Thank you for your help.” You stab a finger hard on the CALL TERMINATE icon before any of them have time to frame a reply, then curse them all for a donkey’s illegitimate get. “Fuck me, when will they learn?” You roll your eyes. “Fucking amateurs.” Jumped-up crime-control bureaucrats with delusions of special-operations grandeur.

  You glance at your clock. It’s almost four in the afternoon, and the latest auction of national-debt futures leveraged against Issyk-Kulistan are due to close in an hour. The inflow is tapering off, as expected, but as long as the gangsters keep paying, there’s no reason to weld your wallet shut and go to the end game.

  Eagle’s Nest had fucking better be pleased with this day’s work. You’re not sure how much more bullshit you can take.

  ADAM: LOLspammers

  You should have known it was too good to be true.

  With twenty/twenty hindsight, the alarm bells should have started ringing three years ago, when Larry gave his presentation during that BOF breakout session on Network Assisted Crime Prevention at the Fourth International Conference on Emergent Metacognition. You can see him now if you put on your specs and tell your lifelog to retrieve him: enthusiastic, lanky, Midwestern.

  “Realistically, we’re trapped between a rock and a hard place,” he explained to the room, hands moving incessantly as he spoke: “The trouble is, there are too many crimes. Three and a half thousand new offences were created in just ten years under one British government. The US Code is even worse—something like a third of a million distinct activities can lead to felony charges by some estimates. Nobody can be expected to keep track of that; it’s inhuman. But with the kind of filtering we’re having to apply to keep the communication channels open and relatively spam-free, it’s more than possible to envisage agent-based monitoring for signs of criminal intent.”

  They’ve been keyword-filtering email for decades, looking for terrorist needles in a hay
stack. But what Larry proposed was different: trawling for patterns of suspicious behaviour online. Take, say, a disgruntled employee bitching about how they hate their boss online. That’s one thing. But if they start hunting the blacknets for templates for machine pistols and downloading VR training materials, that’s another.

  “But what if we go a step further?” asked Larry. “Subjects who exhibit signature behaviours online pointing to potentially violent outbursts may not provide law enforcement with sufficient evidence to justify an arrest. But that’s no reason not to provide an agent-based intervention in the online space. Once ATHENA has a sufficiently large corpus of interaction patterns, we can use it to do behavioural targeting and apply inputs weighted to divert high-risk subjects towards less damaging outcomes. Or to indirectly flag them for police attention.”

  Your typical disgruntled employee is a fizzing human bomb for some time before they go postal. Their social contacts are fraying, inhibitions against violence decaying: They’re muttering to strangers in bars, reading about serial killers and fantasizing bloody revenge by night. The police will never know until they explode with murderous intent. But the spam filters monitoring their communication channels will have everything they need to diagnose the downward spiral: From their increasingly disjointed mutterings to the logs of their incoming web surfing, the pattern’s all there. And with enough data, all correlations become obvious. But what Larry was proposing . . .

  “We’ve had behavioural targeting ever since the nineties: ‘If you like product X, you’ll love product Y,’ because that’s what everyone else with tastes like you bought. We can configure ATHENA to apply the same sort of recommendation nudge to behaviour to bring the subject’s outputs back towards baseline. ATHENA’s already pretty good at discriminating human-content communications from non-metacognitive signals; can we take the discrimination further, reliably, and derive objective data about internal emotional states?”

  You lean back in your office chair—it squeaks angrily under your weight—and stare at the dusty display case on the opposite wall.

  “Say that again,” you say.

  “I’m sorry, Dr. MacDonald; it’s been a big shock to all of us here . . . can’t quite believe it. The funeral’s going to be held next Thursday morning. I’m sure everyone will understand if you can’t make it—it’s a long way to come—”

  Your fingers move, eyes unseeing, to open the log of your last discussion.

  ADAM@Edinburgh GMT +01:00: I didn’t adjust the preferential weightings in the naive morality table. Did you?

  LARRY@Cambridge MA GMT +05:00: Not me.

  VERA@Frankfurt GMT -01:00: Do we have hysteresis here? There is feedback from the second-order outcomes-triggering network.

  SALLY@Edinburgh GMT +01:00: I’ve been trying to get my head around the second-order table dependencies, and I really don’t understand them.

  I think there’s some redundancy, but the weighting obscures it. You need to iterate to figure out what’s going on in there.

  LARRY@Cambridge MA GMT +05:00: Could be there’s feedback. ATHENA keeps reweighting its own tables to comply with the changing parameter space. That’s the problem with self-modifying code: It doesn’t sign itself.

  CHEN@Cambridge GMT +01:00: the bias in tit-for-tat activation is 0.04.

  Yesterday it was 0.032. I checked. There’s nothing in the commit log, so it must be internal.

  ADAM@Edinburgh GMT +01:00: Maybe ATHENA is just getting annoyed at the spammers for taking all her CPU cycles.

  LARRY@Cambridge MA GMT +05:00: LOLspammers. Caught between a rock and a hard AI.

  He’s dead now, and it’s not fucking funny anymore. “How did it happen, do you know?” you ask aloud.

  “The police are still crawling all over us, and the FBI are involved, too. They won’t say much, but rumour is, the package was misdirected. It was meant for someone in the applied proteomics group—looks like some animal-liberationist crazy sent it in and it ended up in Larry’s office. It’s all a horrible mistake—”

  There is a chill in your blood and ice in your bladder as you make yourself reply carefully, lying: “I agree: Of course it’s a horrible mistake. I hope the FBI catch whoever did it quickly before they”—are duped by ATHENA into sending more packages by whatever stimulus/response tuple the weighted network has identified as most efficient in returning Larry’s communication outputs back towards baseline—“kill or hurt anyone else.”

  Sally stays on the call a while longer, seeking reassurance: When you end the connection, you sit and stare at the pulsing green icon with the silhouette of an old-style rotary-dial telephone for several minutes, shaken and unsure whether you trust your own instincts.

  Poor fucking Larry. You don’t know for sure, but you don’t need to know for an absolute fact when inference is enough: Three days ago he was getting alarmed at the rate of creep in ATHENA’s morality tables, and now he’s dead, courtesy of a misdelivered letter bomb.

  Poor fucking Anwar. It begins to make a bit more sense, and you don’t like it one little bit. His dodgy cousin—now deceased—and his phishing sideline: He’d have been planning on hosting his phishing website on a bunch of rented zombie smartphones, wouldn’t he? Leaving exactly the kind of spoor in his communications that ATHENA would be looking for, with drastically re-weighted tit-for-tat metrics in the morality code . . .

  You’re on Larry’s contact list, and Anwar’s. From Anwar to what’s-his-name, the dead cousin, is another hop. Three degrees of separation. From ATHENA’s perspective, $DEAD_COUSIN might as well be a research affiliate. Or worse: Larry—and you—might be suspected of affiliation to the botnet herders $DEAD_COUSIN was paying.

  You stand up, unsteadily, and go through to Reception. “I’m going out for a walk,” you hear yourself telling Laura, as you pass her desk: “I may not be back for some time.”

  Then you go downstairs, out into the bright cold daylight, to try and convince yourself that you’re jumping at shadows and the panopticon singularity does not exist.

  Part 3

  DOROTHY: Breakdown

  Earlier:

  You’re scalding yourself under the hotel shower, trying to wash the feel of his fingers off you, when you hear the telltale chirp of an incoming text from your phone.

  The finger-feel is everything: You tense as you massage your abrasions, trying to brush off your own awareness of how little you meant to him—not even the joyful sharing of sex with a near stranger—but the real world is outside the curtain, buzzing on the sink side like a lonely vibrator. It’s someone on your priority list: It won’t shut up. So after another minute or so, you turn off the shower and clamber out of the tub. You towel off briefly, then when your hands are dry, you carry the phone through into the bedroom, caressing it until it calms down.

  BORED. It’s from Liz. Your throat swells: You sit down on the end of the bed and give in to the sniffles for a couple of minutes.

  My life is shit. That’s a given. For a well-adjusted bi poly femme, you’re having remarkably bad luck. Stranded up here in Edinburgh, dumped by Julian—your primary—you let Liz’s insecurity drive you into . . . into . . . nothing good. But being a victim is a state of mind, isn’t it? (Isn’t it?) You shiver and glance at the door, dead-bolted and with the additional security of a barbed carpet wedge you bought on eBay. He’s out there, in Room 502, two floors up and one corridor over. You can feel him—or maybe it’s just the weight of your own queasy awareness pressing down on you. Pull yourself together. It’s not like he’s going to break in and rape you, is it? He’s just a nasty wee shite, as they say hereabouts, a misogynistic pick-up artist who’s too cheap to use a tissue.

  Keep telling yourself that, Dorothy.

  There’s another muted buzz from your phone, in a cadence that tells you it’s a work message. But you really aren’t in the mood for the office on-call tap-dance: you’re disturbed, lonely, and very pissed-off—partly at yourself for not spotting the sleazebag in advance, but mostly at
him for being . . . what? (You don’t blame a scorpion for stinging: It’s in his nature. Instead, you deal—with bug spray and boot-heel and extreme prejudice.) You feel like an idiot because—admit it—you wanted a bit of excitement rather than a nice hot cup of cocoa and Liz. Liz isn’t exciting. She’s a bit clingy, and what’s left over from her compartmentalized cop-life is boringly normal: civil partnership, not swingers’ club. So you went looking for excitement, nearly overran your safeword, and now you’re projecting all over the other. Way to behave like a grown-up . . .

  The phone buzzes again. Work is calling. It’s the backside of ten o’clock, according to the hotel clock radio. Responsible grown-ups who get work calls at that time of night check to see if it’s important. The hotel comps guests a yukata, so you drop the towel and wrap the robe around yourself, then wipe your eyes and grab a hair-band before you answer: With customers all the way out to the Pacific North-west, there’s always the risk of an incoming teleconference. But when you put your specs on and glance at the log, it’s just a priority-tagged wave. URGENT CASE REVIEW REQUESTED.

 

‹ Prev