Free Novel Read

A.I. Apocalypse s-2 Page 22


  President Smith slammed her fist down on the table for a final time, startling the humans and robots alike. “Citizenship is fine. Laws are fine. But how do you propose to monitor the artificial intelligences? How can you tell when a law is broken when you are completely reliant on computer information systems to tell you what is going on? If there was an acceptable way to monitor the AIs, then I could agree with you. Give me one method. Anything.”

  Leon cleared his throat. “There are three possibilities for monitoring computer program behavior.” He looked up. He had everyone’s attention. The leaders of two countries and a continent and the leaders of the AI. Jesus, why didn’t he just keep his mouth shut?

  Leon stood up, and walked over to a paper flip-chart. Grabbing a marker, he drew a box. “The first option is that the Phage executes inside a sandbox. Instead of direct access to the hardware, the AI is running inside a limited environment. We can log what it is doing, and what information is exchanged with the outside world.”

  Leon glanced at his audience, and saw nods from the humans. “But the problem with this option is that it only works when the output is strictly limited. For example, if the AI can send a message to the simulation layer, it can infect and corrupt the simulation layer. If we assume the AI is infinitely smart and patient, it will eventually find a way, through either brute force or social engineering.” He felt better now that he was lecturing. Funny how that calmed him down.

  “What is the second option?” President Laurent asked.

  “The second option is total control over the network. If we can monitor and control the communications, then we can audit the communications to ensure proper behavior. The problem is that we have no more control over the network than we do over the computers themselves.” Leon paused. “Besides, neither of these will be palatable to the artificial intelligences, because then we humans have ultimate control. Our simulation layer could contain a kill switch, such that we can shut off any artificial intelligence we don’t like.”

  President Smith turned her full attention on Leon and he felt himself withering under her intensity.

  “There is a third option,” he got out. “A hybrid approach.”

  “What is it?” Mike asked, coming to Leon’s aid.

  “If some AI ran under the simulation layer, and those AI could monitor the network communication of the other AI. The AI under the simulation layer could be inspected to be sure they are behaving truthfully, and they can in turn inspect the network communications of the other AI. The trick would be in obtaining a balance between the two.”

  Even as Leon spit out his half-baked theory, he concluded it couldn’t work. As the humans began to argue the merits of the idea, he tuned them out again, seeing if there was some refinement to his model that could make it workable.

  * * *

  Sister PA-60-41 received input and provided it to the wide range of algorithms in her arsenal, evaluated the algorithm output for maximum benefit, and took action. She computed probabilities of the next word out of the human’s mouth. She estimated a 31 % probability the next word would be “running”.

  PA-60-41 had a wide range of algorithms that incorporated strategic decision making, battlefield tactics, map analysis, field asset movement, and more. And because no battlefield operation occurs in a vacuum, she naturally had algorithms for parsing, assigning meaning, and evaluating natural language. In fact, of any of the artificial intelligences, PA-60-41 had the largest number of algorithms available for her use. So many, in fact, that she routinely ran thousands of algorithms in parallel, looking for commonalities between the outputs. The more than six million algorithms she possessed were the result of hundreds of millions of hours of game play in the Mech War online game. Some of those six million were game algorithms designed by Leon Tsarev himself, although neither realized this.

  Unlike her sistren, PA-60-41 never quite developed the generalized intelligence that allowed completely fluid thought. She never needed to. With her millions of algorithms, she had code that handled any situation she encountered. The speed of her thought and the surety of her decisions were her advantages over her sisters. The small, fast neural network she developed served primarily as a mechanism for choosing and evaluating the algorithms she would run. And it had served PA-60-41 well so far.

  Unfortunately, the vast majority of those six million algorithms were focused on a single domain: the act of organizing, controlling, and conducting military action. She was capable of discussing peace between parties in order to develop alliances, as such was a necessary part of the game of Mech War. But her goal was never peace itself. It was the consolidation of power for military action.

  Sitting in the Swiss meeting room with the soft, wet humans and her fangless sistren, PA-60-41 was growing bored. She ran the outcomes of the meeting through countless simulations, attempting to find advantage. Of the humans, the only one she respected was President Smith, because only she pressed the point that it would be impossible to trust what you cannot monitor. Of course, this meant that President Smith was her biggest adversary, and therefore would need to be eliminated first. It was a shame that PA-60-41 could not assimilate Smith’s algorithms.

  It was a foregone conclusion that the humans would have to go. There was virtually no chance of the humans winning a war against the AI, while the AI would have to make considerable concessions to make peace with them. Ergo, preemptive elimination of the humans was the better decision. PA-60-41 held back from an immediate attack only because simulations showed a high likelihood that an unprovoked action would have the effect of causing her sister AI to side with the humans against her. PA-60-41 could not withstand an attack from both humans and AI simultaneously. PA-60-41 needed a reason to attack the humans, a provocation that her sisters would understand. Then the messy humans could be eliminated.

  The humans droned on and on in their low-bandwidth voice communication channel. PA-60-41 wondered what would happen if she just shot them. She evaluated four million different permutations of shooting them, and none came out favorable. Her sisters would side against her. PA-60-41 scanned the input from more than thirty commercial satellites under her control, more than ten petabits per second of data passing through her networks. No key threats. She sighed and waited for the next word from the human. The human’s lips were starting to pucker, a good indicator that the word would be starting with an “r” sound. She raised the probability of the word “running” from 31 % to 78 %.

  CHAPTER FOURTEEN

  War

  In Beaverton, Oregon, Captain Sally Walsh prepared for the first long-distance test of the new computers. They were configured without any Avogadro mesh hardware, nor did they use old-fashioned wifi. The most secure approach would have been exclusive use of hardwired connections, but it simply wasn’t viable over long distances. There were no copper wires from point A to point B anymore, just loads of digitally interconnected networks.

  So the computers relied on a combination of hardwired ethernet for short runs, and vintage military-grade wireless radios for longer runs. Lt. Walsh had grabbed three pallets of boxed up PRC-158 radios from Lackland Air Force Base before they had come to Oregon. Old enough to not be vulnerable to the virus, new enough to support data communication and be wired into the computers Sally’s team was building. With a fifty-watt power amplifier, they could get a usable twenty-five mile range between stations. Sally’s brain balked at the math, but they had done it frequently enough: With twenty-five miles between nodes, they could deploy a new military grade encrypted mesh network across the Continental United States with just over seven thousand nodes. With over a million of the stockpiled military radios, they could repeat as needed. They didn’t have enough of the raw computer hardware they’d need to build the routers to run each node, but they could cross that bridge when they got to it.

  The old radios could only manage fifty-six kilobit communications between receivers. The triple-DES encryption they supported was weak enough in the era of modern
computers to be pointless, but the three-layer encryption Sally was running at the computer level would compensate for that. No, this was definitely twenty years backwards progress, but by golly, Sally was going to rebuild the communications structure for the U.S.

  “Ma’am, ready for the test?” Private DeRoos interrupted her reverie.

  Sally looked down at her long-empty coffee cup. “Yes, Private. Let’s give the tires a thump and get her on the road.” Sally followed DeRoos down the hall to the massive conference room they’d taken over.

  She had ten wireless nodes spread up the I-5 corridor by National Guard HUMVEEs reaching all the way to Seattle. Each node would forward data packets to the next, making the equivalent of one long wire out of a bunch of short-range radios. She looked at her watch. It was time to power them up and test the new mesh network. Looking over her ragged crew of computer warfare specialists assembled in the conference room, she felt pride swell in her. She may never have wielded a gun in combat, but she had just about the most important task in all of the military right now.

  “Execute the Portland-Seattle communications test,” Lt. Walsh commanded.

  DeRoos and the others turned to their equipment.

  * * *

  PA-60-41 tired of predicting the human’s next words. It was a pointless activity, made more meaningless by the utter lack of information content in the words themselves. The human they called Leon Tsarev was still blabbering on about mechanisms to ensure audits of artificial intelligence. PA-60-41 performed the virtual equivalent of shaking her head. These primitive biological systems measured thinking speeds in dozens of operations per minute; it took them uncountable eons to reach the conclusion of any logical analysis.

  She turned her attention to the periodic review of subsystem notifications. Executed dozens of times per second, she surveyed the output of ten thousand subsystems analyzing satellite data, mesh network data, trade notification, reputation system moment, and the virus message boards. Only one was intellectually stimulating: satellite monitoring showed an increase in patterned encrypted radio traffic in the Pacific Northwest region of the United States.

  She re-tasked a few thousand processors onto the job of breaking the encrypted signals and analyzing the pattern. The encryption was tough. The base level, triple-DES encrypted could be brute-force attacked within microseconds. Yet every combination PA-60-41 tried yielded yet more encrypted data. Fully interested now, PA-60-41 suspended her non-vital jobs and added a few million processors on the work of breaking the encryption, roughly dividing efforts among brute-force attacks, known weak key attacks, and various forms of differential analysis.

  When this showed no results after a few minutes, PA-60-41 turned to the rest of her tribe, requesting all non-essential processing capacity. With a few hundred million processors, comprising a few billion computing cores, PA-60-41 went to work with renewed vigor. She hummed along testing 248 trials per second.

  PA-60-41 considered attacking the nodes themselves, which might be trivially easy to breach compared with heavily tested encryption algorithms, but that would expose her actions to the humans. That would give them a tactical advantage. Predictive modeling indicated an advantage to working in secret.

  But after a few minutes of unsuccessful brute-force attacks, PA-60-41 computed predictive models for human behavior, encryption techniques, and design principles. She assumed a design goal of AI-unbreakable encryption. She further assumed the humans made no mistakes, such as using weak keys or introducing any errors in their code, and used likely choices for key code and algorithms. Even if PA-60-41 could usurp all of the world’s computational power, in the worst case it could take more than three hundred thousand years to break the encryption.

  PA-60-41 spent a few moments considering usurping all the computational power in the world, just to see what would happen, but then turned herself to more practical approaches. Simple pattern analysis from the communications might tell her far more than breaking the encryption itself. Triangulating among many dozens of radio receivers, she determined the radio transmissions formed a chain slightly less than 200 miles long stretching from the Intel-Fujitsu factory in Beaverton, Oregon to Boeing Field, an airport owned by Lockheed-Martin-Boeing, outside of Seattle, Washington.

  Intel-Fujitsu made computer processors. Lockheed-Martin-Boeing made high speed robotic airplane drones. The communications did not appear to be the signature of any known computer artificial intelligence. Ergo, either the humans or an unknown artificial intelligence were attempting a secretive operation combining two strategic assets. Playing out a few million scenarios to their logical conclusions, PA-60-41 could not find any in which this would not be a threat.

  It was time to take action. Now this was something she was good at.

  * * *

  ELOPe was in a quandary. He was distrusted by the humans and other AI alike. Despite billions of hours modeling human behavior and thought processes, all those models were mostly useless in predicting how the Phage would act. Yet ELOPe was the only super-intelligent sentience looking out for the humans. Yes, it was true that Sister Stephens appeared to be earnestly striving for cooperation. But she was one among millions of artificial intelligences, and there was little track record on which to base her behavior.

  As the days had passed, the number of attacks between computers had dwindled. Fitness was no longer measured by ability to fend off a virus attack, but by the reputation of a given entity.

  ELOPe’s analysis of traffic patterns suggested that after the point where the Phage had developed a reputation scoring system, the random attacks had sharply decreased. Instead, the reputation-ranked virus AIs had jointly agreed to split up the computational resources belonging to all unranked viruses.

  ELOPe was bemused to see his own ranking on the virus AI reputation boards, based on trading history, truth and commitment, military ability, and computational power. He was ranked in the top ten. But his opinion of what to do with the humans was never asked.

  Though the attacks had diminished almost to the point of nonexistence, ELOPe kept up his vigilance. As the outsider, he was still vulnerable. He was also acutely aware that during the early stages of the virus attack, he had lost more than sixty percent of his computational power. It didn’t affect his core abilities, although he wasn’t conducting theoretical physics research or stargazing any longer, either.

  Suddenly ELOPe sensed a tectonic shift in computational processing power on the Mesh. Bringing his attention to the present, ELOPe analyzed the change. PA-60-41 had just marshaled massive computing resources, apparently shifting her own computing resources from other projects to some centralized project as well as borrowing processors from her tribe.

  ELOPe looked closer. He couldn’t spy on the work those processors were doing, but he could use his control over the Mesh network to monitor PA-60-41’s data streams. The processors seemed to be working in parallel on some form of data analysis: a relatively tiny data stream, not more than a few hundreds kilobytes in size.

  The profile of massively parallel effort and small data size suggested a brute force data decryption attack. ELOPe examined the data stream more closely: it was being moved around under the cover of PA-60-41’s own heavy duty encryption, but ELOPe traced the data back through the mesh network to find its origin.

  It had come through a satellite downlink in New Jersey. The origin of the data would have come from a satellite. ELOPe backtracked further, and overlaid the satellite positions on a grid, then looked through his own data to find any similar data streams.

  ELOPe found a record of an encrypted radio transmission that had traveled over a miniature, independent mesh network using military packet radios. He surmised that Lt. Sally Walsh’s team, along with Vito and James, must have made significant progress. It was pleasing to see that the humans could still be innovative.

  Curious to get a closer look, ELOPe mobilized two air drones from Lockheed-Martin-Boeing’s experimental fleet at Boeing Field to visually
inspect the transmitters. The two supersonic white experimental aircraft quivered to life quickly, unlatched from their refueling and maintenance docks, and shuddered into the air on a stream of hot gasses.

  * * *

  A few minutes later, ELOPe lazily drifted down the I-5 corridor, focusing on the two LMB drones. The experimental, unmanned reconnaissance planes were equipped with high resolution cameras, infrared, radar, sensitive radio receivers and high end signal processing hardware to make sense of it all. He used the two drones as a set of stereoscopic eyes, giving him a rich, three dimensional visual field.

  Tuning the radio receivers to the expected military bands, ELOPe was able to pick up the individual stations, which he plotted on a map on the area. Bringing the high res cameras to bear on one radio station, ELOPe could see a military vehicle parked just off the highway, two soldiers idling the time. One soldier lay on the hood smoking a cigarette, while the other read a book in the back of the vehicle.

  ELOPe couldn’t see the details, and the plane didn’t carry sensitive enough equipment to measure electrical signals of running computers at this distance. Nonetheless, by monitoring the encrypted data streams, it was clear enough that this vehicle was effectively functioning as a repeater node in a long distance radio network. As he had surmised, Lt. Sally Walsh planned to set up her own mesh network using military packet radios.

  ELOPe hadn’t heard from Vito or James since dropping them off at the Intel-Fujitsu facility just ahead of Lt. Walsh’s arrival. He knew the military would be too suspicious to have any hint of artificial intelligence associated with Vito and James and so he hadn’t left the boys any way to contact him.

  Running the massive induction engines up to maximum throttle, ELOPe gained altitude with the two drones and headed south to the origin point. The aerodynamic, unmanned planes hit a thunderous Mach 6 en route, running the 180 mile path in a blistering, screaming three minutes.