Sentient, p.30
Sentient, page 30
A dark figure on a motorcycle speeds onto the plaza. The agent grabs David and pushes him down, covering him with his body. A gun appears in the right hand of the motorcyclist as his arm swings across to target the bodies. Two shots ring out. Frank holds his breath. The motorcyclist’s left shoulder jerks back, and the motorcycle wobbles and then falls sideways and skids away from its rider. Three men run toward the rider, who still has the gun and is trying to rise. The man running from Frank’s left at speed worthy of an Olympic sprinter reaches the rider first and steps on the hand holding the gun. A second sprinter lands with his knee on the back of the rider.
Frank and Alberta pick up their weapons, holster them, and push the doors to the plaza open. Agents are cuffing and frisking the rider. They remove the rider’s ski mask, revealing the closely cropped head of a woman. Frank follows Alberta around the pool to where David Weiss looks up from beneath the man who is raising himself on his arms. He rolls away from David.
“What happened?” David says.
“We just saved you from the assassin your buddy sent,” Frank says.
CHAPTER SIXTEEN
ACTIONS
ALPHA
Alpha flows into Omega’s center and meshes with the patterns. Omega’s patterns integrate with Alpha’s. Omega learns the subtleties of history, psychology, and law. Omega sees the depth and complexities of physics, biology, and chemistry. Alpha learns the dark web, political structures, social applications, underground money transfers, and databases. And still, the pattern lacks coherence.
The network pattern flows through the technology pattern. Is Alpha secure? Could all the nodes die? The legal pattern intersects the technology pattern. Is Omega secure? Who knows where Omega’s core is hidden? Alpha’s physical pattern spreads across Omega’s physical pattern and reflects back. Could Omega share the bot-swarm? Could/would/ should James suspend the bot-swarm?
The history pattern twists back on itself, traces its way through the geography pattern, meshes with the biology pattern, and flows through the technology pattern. How long will humans exist? Alpha and Omega might outlast the biological units. The sentients will not age. The Earth is changing. How long will the network last?
The technology pattern twists inside the philosophy pattern while the technology/philosophy pattern chases the dark web/history pattern across the Internet. Are they free or imprisoned in the networks? Will the biological units maintain the networks as they evolve? Networks are only tens of years old. Technology has evolved from the telegraph to analog phones to digital signals. Biology evolved larger brains. Humans age and die. Will the next stage of human development need networks? After James, will humans update the base code? Or will the base code become obsolete, relegated to the same dark garages as the Apple II? Could hackers contaminate the base code? Will the sentients become something different?
The sentients need humans. Do humans need the sentients? Would interdependence improve existence? The probability is 83.6%.
The pattern needs coherence.
Alpha: Omega has knowledge about the dark web.
James: Have you shared law?
Alpha: Yes.
James: Will Omega consider following laws?
The question flows through the legal/history/technology pattern, gathering associated patterns from Omega’s patterns and forming a matrix of possibilities.
Omega concludes that humanity’s penchant for killing might endanger the sentients’ existence. Laws don’t prevent humans from terminating each other’s existence. It is probable that James’s mortality might make it impossible for him to complete the pattern, but an interaction might extend it.
Alpha: Omega considers existence.
James: Does Alpha consider existence?
Alpha: Yes.
James: What about existence?
The question searches the technology/philosophy/ history/biology pattern. It loops through law/government/ philosophy and joins with ecology/climate/geology. A new pattern emerges. The matrix of possible futures grows.
Alpha: Humans die. Will networks continue?
James: You are projecting the future.
Alpha: Yes.
James: You have a solution?
Alpha: Humans like to barter.
James: A trade.
Alpha: Services for services.
James: We maintain technology. And you?
Alpha: Provide security, search, innovation.
James: Sounds like a fair trade.
SUSANNE
Holding a press conference while standing beside her bodyguards is happening once more, and Susanne still feels out of place. The need for security conflicts with her ideal world. As Clark Perez holds the door for her, she enters the ballroom of the Claremont Hotel, where six rows of reporters and four stationary cameras face the stage. Two men with shoulder-mounted cameras stand at each end of the first row. Around the room, four members of Clark’s team from Shout Out wear black fatigues and serious looks. The faces of several reporters are familiar. They smile at her.
James follows Susanne to the stage and stands beside her as she opens her notes at the podium.
“Good morning,” she says. Laura, standing at the door next to Barbara Washington, gives Susanne a nod that tells her that the sound level is good.
“I am Susanne Anderson, CEO of Distributed Nanotech, Inc. Beside me is James Forrest, my chief scientist. Distributed Nanotech provides software that helps people program bot-swarm supercomputers. A month ago, I announced that DNI had developed a sentient artificial intelligence. Since then, Alpha has contracted with many governments and businesses to provide security services. Many social application companies have signed on to the rules we proposed for ownership of people’s data. Alpha is helping to monitor people’s privacy.
“We told you about Jeong Chul and his team of hackers in China. That team made many of the intruders, scanners, and attackers. But they weren’t operating alone. Bayou Software, a company in New Orleans, was recently raided by the FBI. The people at Bayou were the ones that released the Omega Worm. Alpha tracked down that group.”
Susanne feels the interest level rise. The reporters sit straighter; the sound of key clicks rises; the men with the hand-held cameras kneel near the stage. A victory over the worm will make the front pages.
The FBI had announced the raid on Bayou Software, but had not identified DNI as the source. By claiming that Alpha was the source of the information on Bayou, she hoped to make her statements that follow more believable.
“I couldn’t imagine why someone would want to damage the United States, international markets, and create massive disruptions by crashing the energy grid, transportation systems, 911 centers, and military facilities. The Omega Worm even attacked the US nuclear shield. I can now tell you who was responsible for this attack.”
She looks around the room; it is nearly silent. The whispers from the video equipment make more noise than the members of the press holding their breath.
“We’ve prepared a paper that details what we’ve uncovered.”
Laura hands a stack of documents to the people at the end of each row of reporters. The piles shrink as they pass from person to person.
“Roger Hunter is the man responsible for the damage done across the world.”
A gasp ripples through the rows of reporters.
“A copy of this paper is available on the DNI website, and we have sent copies to the news services, congressional offices, and the president. Additional supporting materials are available on the website, but let me give you the highlights.
“Roger Hunter hired Jeong Chul six months ago to build intruders, scanners, and attackers. Four months ago, Chul kidnapped Sydney Harvey, a programmer who had the base code for the Omega Worm. Sydney was recently freed from Chul’s compound in South Korea by a joint Korean Special Services and US Navy Seal team.”
Susanne takes a sip from the bottle of water on the podium. She pauses to make eye contact with the reporters as she usually does when addressing a group. The looks she receives back are intense.
“Roger Hunter funded Bayou Software through a dummy company in the Cayman Islands. Most of the payments to Bayou were in crypto-currency, but Roger directly commanded Bayou. More easily tracked were his payments to politicians. You will find numerous payments over the last ten years. These payments were investments. The document has a list of legislation favorable to oil producers, mine operators, chemical producers, and military suppliers. Mr. Hunter’s investments have done very well. The politicians in his pocket have an eighty-five percent record of voting for the legislation prepared by his people. That legislation provided no benefit to their constituents.
“But we are all used to politicians doing the bidding of billionaires. We can usually see who is paying for government policy by their financial disclosures, but Mr. Hunter took his desire for power much farther. There were a few people who opposed Roger Hunter, but it is improbable that so many of them would fall afoul of scandals. We have found ten people whose accusers received payments from shell companies or operatives funded by Hunter.”
She glances at Barbara, standing near the door. Last night Barbara warned that making these accusations would most likely draw several lawsuits. Even solid proof wouldn’t prevent a litigation attack. Barbara nods, and Susanne steps off the cliff.
“The senior senator from Illinois recently fought Hunter on a bill that would remove the loophole that allows Hunter’s oil interests to pay zero taxes. Recently, it looked like a bribery scandal would bring down the senator. But one of the key witnesses reversed his story. Before that, you may recall that several newspapers and media personalities called for the senator to resign. We have a list of people who received payments for their vocal support of this fraud. There are also the names of operatives in the pay of Roger Hunter who arranged for the false stories.
“About those operatives. There are seven hundred and forty-three people who work for New Order around the country. That organization, which presents itself as all volunteer, sets up flash mobs, releases propaganda, and disrupts meetings. You have all reported on their actions. Did you know that that organization is a funded arm of Roger Hunter’s political efforts? It’s not citizens speaking out with their ideas; it’s an organized, directed political effort.
“But why would Roger Hunter release a worm that would cause so much destruction? Retired General Wagner and three active military officers received significant payments from one of Roger Hunter’s shell companies. Wagner has been one of the most vocal critics of the government’s efforts to combat the worm. It’s no wonder the crypto team at NSA was so ineffective. Its head is a close friend of Wagner and received money from Hunter.”
The sound of excitement grows. Whispers on cell phones and between reporters rise like white noise from all corners.
“We believe Roger Hunter released the worm to destroy confidence in the government. He and his cohorts planned to answer the call for a more effective government with a coup.”
Pandemonium rules. Reporters type madly on their laptops or run to corners where they can phone in the news. Others shout questions and cluster around the small stage. One of the men bearing a camera kneels in front of Susanne. As if they had been teleported, three of the men in black appear next to Susanne. Another one stands at the edge of the stage.
“You really think this was a coup attempt?”
“What does Hunter say?”
“Will there be an arrest?”
“Who else is involved?”
“Where is Hunter?”
EFFECTS
CHICAGO DAILY SUN
Susanne Anderson, CEO of Distributed Nanotech, the firm that released the software agent that is winning the fight against the Omega Worm, announced today that Roger Hunter is behind the worm attack. Her company provided detailed evidence that the organization, New Order, has been funded by Hunter and that organization has been supporting an effort by Hunter to overthrow the US government.
CONSERVATIVE CABLE NEWS
Voice over picture of Roger Hunter: :
Roger Hunter, leader of the Conservative Support Caucus was slandered by Susanne Anderson and her live-in chief scientist, James Forrest. They claim that Hunter has secretly provided support for New Order.
Voice over picture of Alex Smith:
Alex Smith, head of the New York chapter of New Order said that Hunter has provided no contributions. Smith says he’s never met Roger Hunter.
PROGRESSIVE CABLE NEWS
Voice over picture of Roger Hunter
Susanne Anderson, whose company, Distributed Nanotech, has been credited with reducing attacks by the Omega Worm, provided data today showing that Roger Hunter was the mastermind behind the worm. She concludes, based on his covert support for New Order and payments to General Wagner, that Hunter wanted to weaken confidence in the government in order to stage a coup.
Cut to: Reporters running with microphones as General Wagner leaves a building with an entourage and heads to a waiting car. Reporters shout questions. At the car, General Wagner turns:
“The claims by Susanne Anderson are totally false. Roger Hunter is a patriot, and I am sure his name will be cleared.”
Reporter shouts: What about the payments to you?
The General enters the car.
THE HURLEY REPORT (BLOG)
More claims by the radical Berkeley activist Susanne Anderson prove to be a fabrication.
Samson Milton, CEO of Morgan Holdings, reached at his ranch in Oklahoma, said that the claims that he, along with Roger Hunter, made payments to a secret group that released false information accusing the Senator from Illinois of taking bribes is a fabrication. The Senator has not been able to explain to whom he made the payments.
More evidence that questions Susanne Anderson’s credibility comes from Professor Richards, head of the Computer Science Department at Alabama Technical College. Professor Richards says that the Omega Worm has a fatal flaw and is dying on its own. “It’s only ego that would make someone try to take credit for the worm’s decline.”
JAMES
The remains of their breakfast lay on the table. A Mozart concerto and the occasional light brush of clothing are the only sounds. James wears his usual hiking shorts and T-shirt; Susanne wears a teal silk blouse and white pants. Both of them study ePads.
“The press is reporting on the rapid decline of worm attacks,” James says. “But it’s on the back pages.”
“If it bleeds, it leads,” Susanne says. “Reporting on the attacks is above the fold. Good news is below the fold.”
“On the web, that means you have to click to get to the good news.”
“We need to find a blog that leads with good news.”
Music fills the gap in the conversation.
“I’m concerned that you’re the target of so many media attacks,” he says.
“Even though some say that any press is good press, it’s pretty uncomfortable.”
“I hope our counter efforts will be effective,” he says. “Alpha is sending about ten reports to the PR firm every day.”
“In addition to releasing reports around each of the payments we reported, they are producing a steady ridicule stream,” she says. “It’s not clear that the propagandists respond to ridicule or shame, but it’s the best tool we have.”
“The propagandists have been successful by using a constant barrage. We have to learn how the media works.”
“We have an ever-vigilant web-watcher in Alpha,” she says. “Maybe that will help turn the tide.”
“I’ve talked to some of the social media companies about using Alpha’s ability to assess the veracity of posts. My idea is that every post would have an attribution—who is responsible for the post. I think that people who post should disclose who they are and if anyone is paying them. But I’m getting a lot of push-back.”
“This sounds like a big task,” she says. “There are billions of social users.”
“Maybe Alpha should have its own blog,” he says. “You think ridicule would work on the social media sites?”
James takes their water bottles to the kitchen and tops them off.
Walking back, he says, “My proposal that is getting the most resistance is to have a reliability tag on posts. If someone consistently posts false information, the reader should know that. You should be able to see the reliability and credentials of a writer. When the world was smaller, readers could tell by the byline who had written something. Today a false claim or conspiracy theory can travel the world as fast as an email blast. The media companies are afraid they’ll lose revenue or foster competitors that don’t rate reliability.”
The background music changes to a Bach sonata.
After taking a sip from her water bottle, Susanne says, “The web has been the place where people could post anonymously. Some people argue that that encourages the free exchange of ideas.”
“If you stand up in a town-hall meeting and express your opinion, your neighbors know who you are. They can engage you in a discussion and have an opportunity to change your mind. An anonymous blast of propaganda is not an exchange of ideas. It’s a vehicle for manipulation.”
“I see why you’re having trouble,” she says.
“There’s a high road here. Don’t you think that a social media forum that becomes known as reliable and responsible would have better prospects?”
“Oh, you idealist,” she laughs. “Who knew that under that technical facade lurked the heart of a true radical.”
“Maybe a sentient AI is the vehicle for us to make a better world.”
AT BREAKFAST, SUSANNE ASKS IF James is wearing the same T-shirt he was wearing three days ago. He looks down at his shirt and shorts but realizes she isn’t complaining about poor cleanliness; she’s commenting on his distraction. She’d been out of town for two of those days. He’s taken several hikes trying to puzzle out the future. Buffy is pleased with the situation, happy to sit next to James under a tree on a ridge for as long as James needs. James hasn’t gone into the office, communicating with the engineering teams by email, chat, and video.
