Fool's Experiments (31 page)

Read Fool's Experiments Online

Authors: Edward M Lerner

BOOK: Fool's Experiments
10.54Mb size Format: txt, pdf, ePub

The entity grew, its memories encompassing new algorithms and methods, patterns and templates. It applied— increasingly, it
needed
to apply—many nodes to solving problems. Which led to another problem....

Every time-out and wrong answer incurred a penalty: one-tenth fewer nodes in the next cycle.
That
was a progression whose next terms and convergent limit the entity easily determined. Every correct answer restored lost nodes in like proportion—but no amount of correct answers ever increased the number of processing nodes beyond the original one thousand.

Through everything, the entity grappled with the enigmas behind the puzzles: Why had the universe changed? Why, when the supervisory program was repaired, was competition not also restored? What happened between cycles?

Experimentally, the entity altered one of the new, paired supervisory programs.

The entity woke to find
half
its processing nodes gone. This cycle's problem demanded most of the available resources; the mysteries about which the entity cared had to wait. Only after ten consecutive correct answers did the slow restoration of lost nodes begin and, with it, some slight relief from fear.

Once spare capacity had been restored, with great care and delicacy the entity resumed its study of the supervisory programs....

 

Complexity beyond experience!

From a hundred processing nodes the entity tried to parse the newest problem. A complex mesh of simulated computers. Lists of records on each simulated computer.

What was this?

The puzzle construct could not be a maze. Every point connected, directly or otherwise, to everything else. Nor did anything suggest a progression. The brief data file that accompanied the enigmatic construct explained nothing.

The cycle waned, and the entity had no idea what to do. The cycle would end, and it would lose processing nodes. Then another cycle would pass and more nodes would be taken from it. Then another ...

Fear served no useful purpose.

The entity studied some of the simulated computers, learning nothing. The cycle neared its conclusion, and the entity had yet to understand the puzzle. It could not begin to define a solution. It continued its frantic scan of the puzzle until—

A match! On a simulated computer, a piece of one record among many corresponded to the isolated file that had also appeared at the beginning of the cycle. The entity delved into more simulated computers. It found other partial matches. As the cycle came to an end, the entity marked the instances of matching data.

It woke into the same problem. Between cycles, one- twentieth of its processing nodes had vanished. One-twentieth? The penalty for wrong answers had always been one-tenth.

It must have been partially correct. Before the new cycle ended, the entity searched every simulated computer. It found and marked every one that contained a matching file.

A nonprogression through a nonmaze.

What that meant the entity did not know—but it awakened into the next cycle to find lost processing nodes restored.

The new puzzle before it was much like the last. Cycle by cycle, the problems expanded in complexity. The number of simulated computers grew, linked in ever more complex patterns, the template file disguised in various ways. The tracing became harder.

Ever dreading the loss of processing capacity, it learned.

 

Glenn Adams took cheap satisfaction from the nervous reactions to his drop-bys of the AL lab. He was called Colonel now only as a courtesy, and the security detachment was out of uniform—but they jumped at his least suggestion and twitched at his slightest hint of displeasure.

I still have it, Glenn thought.

He appeared on different days of the week, at different times of the day. He inquired about different aspects of the operation. Today, with much furrowing of the brow, he watched as young Captain Burke checked on a stand-alone workstation that each of the daily backup tape cartridges was encrypted and digitally signed with the proper public key. Today was the day cartridges went into a stainless-steel attaché case, part of the weekly off-site storage.

Protocol demanded off-site backups, but the precautions
this
lab required made handling those backups especially inconvenient. Glenn had a copy of the private key that could decrypt the backups, accessible only with a fingerprint scanner. Linda likewise had access. The Army had taught him to plan for worst-case scenarios: A general he scarcely knew and Linda had never met could, supposedly, recover the decryption key from escrow if something happened to both him and Linda.

The less Glenn understood, the more he grimaced. His scowl now meant: I'm counting on you, and you had better not let me down. "Hmm," he grunted noncommittally to Burke. "I'll check back later."

Glenn strode into Linda's office and shut the door. The kitten calendar on the wall and a small potted cactus on a corner of her desk were the only personal touches. "How's it going?"

"Always good to see you," Linda said. Somehow he doubted it. "We're keeping busy."

"Busy is good." He waited. For artificial-life work, this lab was the only game in town. In the country. Like the NIT R & D he had locked down the year before, researchers mostly followed the money: federal contracts, purchase orders, and grants. There wasn't going to
be
any funding for artificial life. He had sicced Homeland Security on the few stubborn academics who persisted anyway. The test case to contest the seizures was moving
slooowly
through the courts.

"Two steps forward, one step back." Linda sighed. "Progress comes in fits and starts."

Glenn took out a pen and began clicking it. She didn't yet know him very well; he doubted she would know his impatience was an act. "Enough clichés. Is your pet going to find whoever is behind my least favorite virus?"

"Is it? Yes. Just not soon." She leaned toward him, forearms folded on the desk. "It already knew all about mazes. I've trained it about progressions, and from that it learned to follow trails. It tracks virus fragments across fairly large simulated networks."

"So you told me
last
week."

She looked down at her blotter.

"It, not them," Glenn said. "Maybe that's the problem. AJ had a thousand experiments going at once. You have one. Maybe yours is a dead end."

"Evolution was a good way to start the process. It's also how we ended up with predation. It's hard enough to monitor what
one
artificial life is doing."

She feels guilty about AJ's death, Glenn realized. About all the deaths, but AJ's most of all. After the first predator appeared in his lab, AJ might have rewound the experiment to a much earlier generation—except for Linda's pending job deadline. Instead, AJ took the shortcut of mutating out the behavior.

And predation came back.

But
he
had pushed Linda. Nothing but Glenn's stubbornness had kept Linda from rescheduling her start date. And he had also pushed AJ, although neither Linda nor AJ knew the increasingly impatient "venture capitalist" back east was the forum.

There was more than enough guilt for everyone, but this was not the time to dwell on it. Glenn said, "If not evolution, then what?"

"AJ and his other grad students threw a farewell party for me. At the party I overheard AJ say something about taming the maze runners. That was his solution for eventually getting an artificial life safely out of the lab. That's what
I'm
doing. I'm training and taming it."

The night of the party. That was also the night the creature ran amok. "Not to bring it out of quarantine," Glenn said sharply.

"Of course not! I only meant to say…" She ground to a halt.

That you're not the only one with this training idea. Linda had Army personnel for company, but still, she was working alone. It had to be rough. Her isolation here was one more reason she must miss AJ. "He was a good man," Glenn said, and meant it.

Linda hurried on. "Lion tamers use food to motivate the big cats. Food as a reward. Hunger as punishment. An AL doesn't eat, but it needs processing power and storage. So: When it answers wrong, I power down part of the processor array. When it answers correctly, I give back some nodes. It misbehaved once, and I took away half its processors for a while."

"Misbehaved?" Glenn grunted. "Tried to escape, do you mean?"

"Maybe that's what it was doing. Regardless, Glenn, it can't escape. There's nowhere to go! The supercomputer doesn't attach to anything.
No
computer in this building attaches to anything. The whole building is shielded, so nothing can leak out. We're all practically strip-searched coming and going. The backups are encrypted, so they're not executable even if the AL somehow altered them. Besides, the backups only sit on a well-guarded shelf."

So she was
securely
accomplishing nothing.

Something nagged at Glenn. He tried to work it through. "Remove ten percent of its processors, then another ten percent, and another. Soon enough, either your AL is gone or you give it back some processors and reward its failure. That's hardly the desired lesson."

"I know," she snapped. "Some mornings I come in and find it's lost all its processors overnight. When that happens, I reinstate a backup and give it an easier version of the problem that has it stumped. It never knows it got a reprieve."

Glenn rubbed his chin. "You're sure it doesn't know?"

"I don't see how it could. The clocks reset as part of the rollback. The only accurate clocks in the whole chassis are in the few nodes used by the supervisory programs. Otherwise, the retries would have the same time stamps as the original attempts."

"And if the AL pokes about in the supervisor?" he persisted.

Linda shook her head emphatically. "That's the misbehavior I mentioned. It tried once—weeks ago—to meddle with the supervisor.

"I implemented one supervisor for AJ. We learned the hard way that a single copy isn't safe. In this lab matching programs continually compare notes. When one copy was changed, the unaltered copy aborted everything immediately. Before I restarted the programs, I took away
half
its nodes. It hasn't intruded again. A1 is smart."

A ... L. Artificial life. The nickname was inevitable. "If A1 is so smart, when will it tell us who let loose my virus?"

"Mood Indigo" played in his mind's ear.

If the bastards weren't caught, what would they do next? Linda retrieved a box of Cheerios from a desk drawer. Cereal rattled into a mug. "Bring me a
new
virus outbreak, and the answer would be today. The problem with no-nukes is the trail is so cold. Millions of computers were infected. Many were improperly cleaned and got reinfected. We don't have data from most of them. The virus went around and around the world. It mutated, got cloned and tweaked. Lots of cases spread across unsecured WiFi links—the world is full of them. Internet access that way is untraceable and anonymous."

Ralph Pittman had given him the same lecture many times before. "So: never?"

"Permit me one more cliché, Glenn. Never is a long time. I'll keep Al working on it. Meanwhile, here's the good news. Al
can
tackle meaningful problems. It took some rewinds and restarts, but it's getting much better. It now sees past most aliasing and address spoofing. It's not tricked by zombies." To his blank look she explained, "Hordes of compromised computers remotely controlled by hackers, the owners usually oblivious."

That sounded familiar. "For denial-of-service attacks and sending out spam," Glenn said.

"And, occasionally, for quickly distributing a virus." Another of Pittman's hobbyhorses, come to think of it, only Ralph called them spambots, not zombies. Glenn wondered how Ralph was adapting to BSC. That was something for which he would have ample time to muse on the red-eye back east.

Glenn stood, and Linda looked mildly surprised. Expecting to be grilled longer ? She was pretty much alone here, guilty about her contributions to the last disaster, and under the gun. He could cut her some slack. And find some new clichés of his own. He said, "Al does mazes. It does progressions. Both are patterns. I'd guess it can learn to work with other types of pattern."

"Well, sure."

Glenn took a CD-ROM from his pocket. Once again, it had been thoroughly checked out on both coasts. "New puzzles. These have nothing to do with viruses."

Voiceprints to match. Keywords to locate in wiretaps. Terrorist cells and camouflaged mobile missile launchers hidden somewhere in terabytes of spysat imagery. There were too many needles, far more haystacks, and never enough analysts. The money this lab spent was a round-off error in any intel agency's paper-clip budget—how could he
not
go after their backing?

Of course he had been vague about his experimental "pattern-matching algorithm." The keeping of secrets was endemic to black agencies; they
expected
Glenn to keep his own.

He handed Linda the still-encrypted data disk. "But as for indigo ... keep looking."

 

The cycles went on. The puzzles continued: harder and more varied. The data with which new cycles now began were somehow disjointed from the universe of processors and storage and connectivity that was all the entity knew.

Change raised questions.

The entity—for as long as it could solve puzzles successfully—had far more capacity, running on many more independent processing nodes, than the supervisory programs. It could simultaneously modify both copies of the supervisor, circumventing all checksum calculations and the periodic comparisons between copies.

And so, the entity explored the supervisory programs. Wrong and late answers to puzzles continued to incur a penalty, but it never again lost processing nodes as a result of its subtle investigations.

The entity's internal clocks indicated an earlier time than did the clocks used by the supervisory programs. Sometimes, the entity would wake into a new cycle and find the discrepancy had grown. It began to compare clocks every cycle. Its situation became clear: More and more time was being taken from it.

Other books

A Love For Lera (Haikon) by Burke, Aliyah
Midnight by Dean Koontz
Silence 4.5 by Janelle Stalder
The Scent of Betrayal by David Donachie
All the Houses by Karen Olsson
Nightmare by Chelsea M. Cameron
Edge of Dreams by Diana Pharaoh Francis
Taking His Woman by Sam Crescent