« PREVIOUS ENTRY
Polly wanna discuss relativistic ontology?
NEXT ENTRY »
Rush and Courtney
In July, a British man was cleared of charges that he had downloaded child pornography. How? He claimed that a trojan-horse program had been the culprit; the program had downloaded the porn without his knowledge or consent. Now, a teenager in the U.K. has successfully used this defense for a hacking crime — he claimed a trojan horse had infected his computer and used it to break into a remote corporate server. As CNN.com reports:
Caffrey had been charged with breaking into the system and crippling the server that provides scheduling information for all ships entering the world’s sixth-largest port.
Although authorities traced the hack back to Caffrey’s computer, he said that someone must have remotely planted a program, called a “trojan,” onto his computer that did the hacking and that could have been programmed to self-destruct.
It’s a fascinating defense — because while it might at first blush seem scoffworthy, the fact is that computers these days are crammed full of more spyware than ever before. There are probably a half-dozen bots on your computer as we speak. They’re communicating with the outside world, sending out requests, transmitting data, doing stuff of which you have no clue.
This is yet another aspect today’s Turing world. We spend our days trying to screen out spam, or to pass spambot-screens so that we can use services like Yahoo mail or Ebay. In effect, we’re constantly attempting to verify who’s actually human, while also trying to prove our own humanness. The flip-side is also true: In a trojan-horse defense, you have to prove that the bot did it — that when your computer sent out that HTTP request to load a page from a sketchy child-porn site, that it wasn’t really you. There were no human hands on the keyboard.
I predict this area is going to become indescribably weirder in the years to come.
I'm Clive Thompson, the author of Smarter Than You Think: How Technology is Changing Our Minds for the Better (Penguin Press). You can order the book now at Amazon, Barnes and Noble, Powells, Indiebound, or through your local bookstore! I'm also a contributing writer for the New York Times Magazine and a columnist for Wired magazine. Email is here or ping me via the antiquated form of AOL IM (pomeranian99).
ECHO
Erik Weissengruber
Vespaboy
Terri Senft
Tom Igoe
El Rey Del Art
Morgan Noel
Maura Johnston
Cori Eckert
Heather Gold
Andrew Hearst
Chris Allbritton
Bret Dawson
Michele Tepper
Sharyn November
Gail Jaitin
Barnaby Marshall
Frankly, I'd Rather Not
The Shifted Librarian
Ryan Bigge
Nick Denton
Howard Sherman's Nuggets
Serial Deviant
Ellen McDermott
Jeff Liu
Marc Kelsey
Chris Shieh
Iron Monkey
Diversions
Rob Toole
Donut Rock City
Ross Judson
Idle Words
J-Walk Blog
The Antic Muse
Tribblescape
Little Things
Jeff Heer
Abstract Dynamics
Snark Market
Plastic Bag
Sensory Impact
Incoming Signals
MemeFirst
MemoryCard
Majikthise
Ludonauts
Boing Boing
Slashdot
Atrios
Smart Mobs
Plastic
Ludology.org
The Feature
Gizmodo
game girl
Mindjack
Techdirt Wireless News
Corante Gaming blog
Corante Social Software blog
ECHO
SciTech Daily
Arts and Letters Daily
Textually.org
BlogPulse
Robots.net
Alan Reiter's Wireless Data Weblog
Brad DeLong
Viral Marketing Blog
Gameblogs
Slashdot Games