Halting State
Encyclopedia
Halting State is a novel
by Charles Stross
, published in the United States on October 2, 2007 and in the UK in January, 2008. Stross has said that it is "a thriller set in the software houses that write multiplayer games
". The plot centres around a bank robbery in a virtual world. It features speculative technologies, including Specs and virtual server networks over mobile phones. The book is on its second printing in the United States. The novel was nominated for both the Hugo
and Locus Awards in 2008.
The main story is split between three main protagonists, Sue, Elaine, and Jack, respectively, whose sections are always in the second person
, with italicized thoughts in first person
during each character's respective chapter. Each chapter is followed in sequential trilogies (Sue, Elaine, Jack) for the duration of the novel. This pattern excepts only the prologue
and epilogue
of the novel, which both contain faux
email
to supporting characters.
A sequel to Halting State entitled Rule 34
(previously '419') was released in mid-2011.
email addressed to Nigel MacDonald, listing a job offer. It is later learned that this email is for a work-at-home programmer position at Hayek Associates PLC.
It is then learned that a cybercrime
has been committed in the massively multiplayer online role-playing game
(MMORPG) Avalon Four. A robbery of several thousand euros worth of "prestige items" occurs in the game's central bank, led by a band of orcs and a "dragon for fire support." It is later noticed that this seemingly simple incident has deep implications - both financial (Hayek stock price) and logistical (compromised cryptographic keys), which sets the stage for the latter half of the novel.
The main story is then divided between police chapters as Sue, investigation sections as Elaine, and programmer and gamer geek sections as Jack. Initially separate storylines, the three inevitably join forces to combat a much larger conspiracy that hinges on international espionage
and counterterrorism. These initial segments track the bank robbery and mystery man, Nigel MacDonald, who is revealed as a shadow identity created from Jack Reed's credentials as a programmer and gamer.
Eventually, it is discovered that the entirety of the European network backbone
—including its root keyservers
-- has been compromised by Chinese hackers
. It is more or less at this point that the wool is removed from the reader's eyes that "it's no longer a game," while Jack and Elaine develop a romance between action segments.
Using the game Spooks as a sock puppet
for real espionage missions, Jack and Elaine are sent to uncover the identity of a mole inside Hayek Associates, which is subsequently revealed to be a front for the government. The mole is said to have leaked cryptographic keys to "Team Red", or Chinese interests, through a blacknet. For contrast, the European protagonists are called simply, "Team Blue".
It is at this point that the stage is set for the final confrontation. Using Nigel's shadow identity as bait for Team Red's mole, Elaine and Jack successfully expose and capture Marcus Hackman, who is revealed to be the mole and main antagonist. It is then revealed that Hackman had staged the whole thing in order to use strategic put options to earn €26 million when his own company, Hayek Associates, took the fall for the initial robbery sequence.
Jack is shot twice in the chest during this exchange, but is seen recovering in a hospital bed by the end of the book.
The novel closes with an email
addressed to Hackman that resembles a 419 scam from a Nigerian banker, implying that is where he hid the money.
called it a "tight, well-observed thriller", but found the second-person narrative
distancing.
Novel
A novel is a book of long narrative in literary prose. The genre has historical roots both in the fields of the medieval and early modern romance and in the tradition of the novella. The latter supplied the present generic term in the late 18th century....
by Charles Stross
Charles Stross
Charles David George "Charlie" Stross is a British writer of science fiction, Lovecraftian horror and fantasy. He was born in Leeds.Stross specialises in hard science fiction and space opera...
, published in the United States on October 2, 2007 and in the UK in January, 2008. Stross has said that it is "a thriller set in the software houses that write multiplayer games
MMORPG
Massively multiplayer online role-playing game is a genre of role-playing video games in which a very large number of players interact with one another within a virtual game world....
". The plot centres around a bank robbery in a virtual world. It features speculative technologies, including Specs and virtual server networks over mobile phones. The book is on its second printing in the United States. The novel was nominated for both the Hugo
Hugo Award
The Hugo Awards are given annually for the best science fiction or fantasy works and achievements of the previous year. The award is named after Hugo Gernsback, the founder of the pioneering science fiction magazine Amazing Stories, and was officially named the Science Fiction Achievement Awards...
and Locus Awards in 2008.
The main story is split between three main protagonists, Sue, Elaine, and Jack, respectively, whose sections are always in the second person
Second-person narrative
The second-person narrative is a narrative mode in which the protagonist or another main character is referred to by employment of second-person personal pronouns and other kinds of addressing forms, for example the English second-person pronoun "you"....
, with italicized thoughts in first person
First-person narrative
First-person point of view is a narrative mode where a story is narrated by one character at a time, speaking for and about themselves. First-person narrative may be singular, plural or multiple as well as being an authoritative, reliable or deceptive "voice" and represents point of view in the...
during each character's respective chapter. Each chapter is followed in sequential trilogies (Sue, Elaine, Jack) for the duration of the novel. This pattern excepts only the prologue
Prologue
A prologue is an opening to a story that establishes the setting and gives background details, often some earlier story that ties into the main one, and other miscellaneous information. The Greek prologos included the modern meaning of prologue, but was of wider significance...
and epilogue
Epilogue
An epilogue, epilog or afterword is a piece of writing at the end of a work of literature or drama, usually used to bring closure to the work...
of the novel, which both contain faux
Fake
Fake means not real.Fake may also refer to:In music:* Fake , a Swedish synthpop band active in the 1980s*Fake?, a Japanese rock band* Fake , 2010 song by Ai featuring Namie Amuro...
Email
Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the...
to supporting characters.
A sequel to Halting State entitled Rule 34
Rule 34 (novel)
Rule 34 is a near-future science fiction novel by Charles Stross. It is a loose sequel to Halting State, and was released on July 5 and 7th , 2011. The title is a reference to the meme Rule 34 of the Internet, a meme which states that "If it exists, there is porn of it...
(previously '419') was released in mid-2011.
Plot summary
The plot opens with a fauxFake
Fake means not real.Fake may also refer to:In music:* Fake , a Swedish synthpop band active in the 1980s*Fake?, a Japanese rock band* Fake , 2010 song by Ai featuring Namie Amuro...
email addressed to Nigel MacDonald, listing a job offer. It is later learned that this email is for a work-at-home programmer position at Hayek Associates PLC.
It is then learned that a cybercrime
CyberCrime
CyberCrime was an innovative, weekly America television program on TechTV that focused on the dangers facing computer users. Filmed in San Francisco, California, the show was hosted by Alex Wellen and Jennifer London...
has been committed in the massively multiplayer online role-playing game
Massively multiplayer online role-playing game
Massively multiplayer online role-playing game is a genre of role-playing video games in which a very large number of players interact with one another within a virtual game world....
(MMORPG) Avalon Four. A robbery of several thousand euros worth of "prestige items" occurs in the game's central bank, led by a band of orcs and a "dragon for fire support." It is later noticed that this seemingly simple incident has deep implications - both financial (Hayek stock price) and logistical (compromised cryptographic keys), which sets the stage for the latter half of the novel.
The main story is then divided between police chapters as Sue, investigation sections as Elaine, and programmer and gamer geek sections as Jack. Initially separate storylines, the three inevitably join forces to combat a much larger conspiracy that hinges on international espionage
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...
and counterterrorism. These initial segments track the bank robbery and mystery man, Nigel MacDonald, who is revealed as a shadow identity created from Jack Reed's credentials as a programmer and gamer.
Eventually, it is discovered that the entirety of the European network backbone
Internet backbone
The Internet backbone refers to the principal data routes between large, strategically interconnected networks and core routers in the Internet...
—including its root keyservers
Key server (cryptographic)
In computer security, a key server is a computer that receives and then serves existing cryptographic keys to users or other programs. The users' programs can be working on the same network as the key server or on another networked computer....
-- has been compromised by Chinese hackers
Hacker (computer security)
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...
. It is more or less at this point that the wool is removed from the reader's eyes that "it's no longer a game," while Jack and Elaine develop a romance between action segments.
Using the game Spooks as a sock puppet
Sock puppet
A sock puppet is a puppet made from a sock or similar garment. When the manipulator fits a hand into the closed end of the sock, the puppet can be seemingly made to "talk". The puppet's mouth is formed by the region between the sock's heel and toe, with the puppeteer's thumb forming a jaw...
for real espionage missions, Jack and Elaine are sent to uncover the identity of a mole inside Hayek Associates, which is subsequently revealed to be a front for the government. The mole is said to have leaked cryptographic keys to "Team Red", or Chinese interests, through a blacknet. For contrast, the European protagonists are called simply, "Team Blue".
It is at this point that the stage is set for the final confrontation. Using Nigel's shadow identity as bait for Team Red's mole, Elaine and Jack successfully expose and capture Marcus Hackman, who is revealed to be the mole and main antagonist. It is then revealed that Hackman had staged the whole thing in order to use strategic put options to earn €26 million when his own company, Hayek Associates, took the fall for the initial robbery sequence.
Jack is shot twice in the chest during this exchange, but is seen recovering in a hospital bed by the end of the book.
The novel closes with an email
Email
Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the...
addressed to Hackman that resembles a 419 scam from a Nigerian banker, implying that is where he hid the money.
Protagonists
- Sue Smith, EdinburghEdinburghEdinburgh is the capital city of Scotland, the second largest city in Scotland, and the eighth most populous in the United Kingdom. The City of Edinburgh Council governs one of Scotland's 32 local government council areas. The council area includes urban Edinburgh and a rural area...
Detective Sergeant - Elaine Barnaby, insurance fraud investigator for Dietrich-Brunner Associates
- Jack Reed, recently laid-off programmer and expert on MMORPGs
Reception
Halting State was nominated for the both the Hugo and Locus Awards in 2008, and The GuardianThe Guardian
The Guardian, formerly known as The Manchester Guardian , is a British national daily newspaper in the Berliner format...
called it a "tight, well-observed thriller", but found the second-person narrative
Second-person narrative
The second-person narrative is a narrative mode in which the protagonist or another main character is referred to by employment of second-person personal pronouns and other kinds of addressing forms, for example the English second-person pronoun "you"....
distancing.
External links
- Halting State at Worlds Without End
- Audio review and discussion of Halting State at The Science Fiction Book Review Podcast