Rule 34 - Charles Stross [134]
Kemal is rapt, listening intently. He nods, perhaps once every ten seconds. MacDonald has got him on a string with this spiel. You look back at MacDonald. “You wouldn’t dream of doing that,” you say.
MacDonald grins and nods. “Indeed not. Morality aside, it’s stupid small-scale shit. What’d be the point?”
You peg him then. He’s not your typical aspie hacker, and he’s not a regular impulse-control case. MacDonald’s the other, rare kind: the sort of potential offender who does a cold-blooded risk-benefit calculation and refrains from action not because it’s wrong, but because the trade-off isn’t right. You won’t be seeing him in the daily arrest log anytime soon, because he kens well the opportunity cost of a decade in prison: It’d take a bottom line denominated in millions to lure him off the straight and narrow. But if he sees such a pay-off . . .
“What do you use ATHENA for?” you ask, bluntly.
“Right now we’re tracing spammers. ATHENA can scope out the fake networks: It can also tell us who’s running them.” There’s something about MacDonald’s body language that puts you on red alert. Something evasive. “ATHENA then probes the spammers to determine whether they’re human or sock-puppet. We’re working on active countermeasures, but that’s not green-lit yet; I gather there’s a working group talking to some staff at the Ministry of Justice about it, but—”
“What kind of active countermeasures?”
“Spoiler stuff, but more active than usual: using their own tools against them. You know it’s an international problem? Crossing lines of jurisdiction—a lot of them live in countries that aren’t signatory to or don’t enforce anti-netcrime treaties. So we’re examining a number of tactics that’d need to be approved by a court order before we could use them. So far it’s just theoretical, but: reverse-phishing the spammers to grab their control channels and shut down the botnets. Fucking with their phishing payloads to make them expose their real identity so you folks can arrest them. Stealing their banking credentials and applying civil-forfeiture protocols. Using their ID protocols to fuck with their personal lives—hate mail to the mother-in-law, that kind of thing. Having their computer report itself as stolen. In an extreme instance, ask the USAF to send a drone to zap them.”
“Uh-huh.” You glance down and try to look as if you’re making notes, so that he can’t see your face. One by one, the alarm bells are going off inside your head. “But you haven’t done any of this yet.”
“No.”
“But?”
“ATHENA is an international effort.” MacDonald leans forward on his elbows, fingers laced before him. “We are just academic researchers. We’re trying to find a way to, shall we say, enforce communal standards without turning the corner and ending up with a panopticon singularity, ubiquitous maximal law enforcement by software—nobody wants that, so we’re looking for something more humane. Crime prevention by automated social pressure rather than crime prosecution by AI. But . . . once you get into that territory? People don’t all agree on what constitutes