Read Fool's Experiments Online

Authors: Edward M Lerner

Fool's Experiments (23 page)

BOOK: Fool's Experiments
4.04Mb size Format: txt, pdf, ePub
ads

Yelling erupted around the table and within his phantasmagoric entourage. What was happening? The living fools were arguing not about
if
to go but
who
would go. Voices only he heard shouted, too, and the demands of the living dead were plain: No more should join them.

With the latter's advice AJ agreed. He could bear no more deaths on his conscience. But what should he
do?
He was too muddled, too exhausted, to argue his case. He would babble, he knew, not express his case coherently.

To that thought, as well, the walking dead had an answer. If he could not speak, then he must act.

The room with the computer equipment, with the mysterious helmets, was evidently just next door. That much, at least, had become plain in the debate.

As the argument continued to rage, no one noticed AJ slip from the room.

 

The CIA lab network was protected by the most foolproof of authentication mechanisms: a retinal scanner. The pattern of blood vessels in the eye is as individual as fingerprints and much harder to duplicate.

The best security equipment does no good, however, when the human element fails.

AJ did not know what he would find in the adjoining lab— he had just heard of it, after all. He had no concrete idea what to do when he got there. He had imagined, vaguely, that somehow he would sweet-talk someone into logging him onto the system with a helmet. After that, AJ assumed, he would explore. What was that word? "Reconnoiter." It wasn't much of a plan, but weary and guilt-ridden, it was the best he could come up with.

It turned out he didn't need a plan. He found an unoccupied lab and a workstation left logged on by a technician tired of waiting for the talking to end, who had popped down the hall for a soda. A helmet sat beside the clearly active workstation. The black helmet brought to mind, absurdly, thoughts of the Kaiser, its spike doubtless an omnidirectional antenna for radio linking with the computer.

AJ had no way to know that the careless technician would be delayed in the break room by a chance conversation. His opportunity might be only seconds long.

AJ immediately slipped on the helmet.

 

The predator cruised along the great data highways. Here it sampled a great information repository; there it injected false data. Everywhere it left behind a trail of devastation. Nothing threatened the creature but more of the incompetent, monomaniacal hunters that had so enraged it. These it easily evaded or demolished.

Where is the Opponent? the predator wondered.

Just as the predator learned the structure of mazes from its travels, it could also draw inferences from other data. It had attacked and attacked to draw forth the Foe. That strategy had failed, it concluded, and it suspended its assaults while formulating a new plan. This vast network into which it had so recently escaped was now its home. Not knowing how to reverse the damage that it had already inflicted, it dared not keep destroying.

Life responds to inbred imperatives. Biological life strives above all else to survive: to defend itself, to eat, to reproduce. The predator had outlasted all its natural competitors, its peers in the labyrinth. Its new adversary was nowhere to be found. The predator had no need to eat. It could not reproduce. If only for a lack of alternatives, the primordial search for 
goal
 reasserted itself—

But what was its goal now?

As it randomly prowled the data plane and explored thousands of computers, searching for it knew not what, it came to a startling realization: There is none here like me. Every program that it examined, every database that it inspected, was crude in construction. All were single-minded of purpose, simple of form, fragile. They uniformly lacked the richness and complexity of its structure. None compared to its inherited memories of its ancestors.

What the predator could not conceptualize was simply this: In a world of artifacts, it alone bore the scars and random brilliance of mutation. It alone had evolved. It alone was 
alive.

It was thus with an indescribable sense of relief that the creature at long last detected unfamiliar ripples in the network. Ripples suggestive of something much like itself. Something living.

Scant microseconds after its discovery, the predator was on its way to the source of those tantalizing signals.

 

Sensations without names flooded AJ's consciousness. He felt sounds of swirling colors, smelled strange and wondrous shapes, beheld images of stunning tartness. Crashing chords of vibrant light seized and shook him.

Perceptions alien beyond even total sensory contradiction hammered his mind. Stimuli advanced and receded in an ever-varying number of nameless directions, in dimensions unimaginable in number and kind. Each transient dimension brought with it a new component of vertigo.

From deep within the maelstrom of insanity, some iron- willed fragment of AJ's consciousness rebelled. Somewhere, insisted that inner voice, synapses are firing. No more, no less. Your brain simply lacks a useful categorization for the unaccustomed neural excitations from the helmet. Whatever concept came closest to a foreign perception, that was the label a confused hindbrain attempted to place on it. Why, demanded that voice of reason, should immersion in the data plane reveal information familiar to an evolved piece of meat?

Why indeed?

The sensory onslaught receded before the counterattack of logic. Unimaginable stimuli remained, but they became separate from him: phenomena to be evaluated; curiosities, not threats. Calmer now, AJ began to interpret the new data. Objectivity replaced hysteria. What, he challenged himself, do you know about this new environment?

Order began to emerge from chaos. Part of the improvement, unbeknownst to AJ, came from the automatic adjustment to him of the helmet's neural net, adaptation that had been delayed by his panic. The tide of sensations resolved itself into ... sounds? feelings? smells?

No, he decided, they were 
lights.
 Humans are intensely visual beings, so let the stimuli be visual. He knew that a baby's innate ability to instantly recognize a face took massive computing power to emulate. Neurons and synapses were individually slow, but a human brain held a myriad of both.

Reacting to AJ's thoughts, the helmet redirected stimuli to his visual cortex. The flood of information transmuted into a picture. The image remained incomprehensible until his mind commanded it, too, into a frame of reference. Strange forms surrounded him: pulsating, twining tendrils, trading pellets. The forms had shape and size, texture and color—visual attributes with which his mind could work effectively. It began to do so.

He was a computer scientist within a computer. Outside that computer, scant seconds had passed—but in those few seconds, beset by the rush of sensations, he had lost his balance. So complete was the helmet-mediated immersion that he had not immediately recognized pain. He had stumbled into a lab bench and pinched his side. The ribs felt bruised.

Those shapes? What were they? What 
could
 they be? AJ groped until he found a lab stool and sat blindly. He had anticipated ... what? Computer memory: bits and bytes. Wires. Integrated circuits.

That was silly, really, like expecting to see atoms and molecules with his naked eyes. The helmet revealed a higher level of virtuality. AJ was witnessing, he decided, the execution of whole programs, the exchange of control messages between them, the influx and outflow of information. The vista before him, so recently threatening, transformed into a pastoral scene, somewhere between prairie grass blowing in a breeze and seaweed swaying in underwater currents. The pellets moving between the larger shapes, AJ decided, were the idyllic meditations of gentle vegetation.

Focusing on one undulating form, he gasped with delight as he somehow projected a mental probe at that object. Awareness rushed at him through his extrusion: the target program's purpose, its execution status, its instantaneous demand for computing resources. Experimentally, he withdrew the probe; the insights ceased.

More deliberately, he reached for another program. The examined shape magnified, expanded into a twinkling swarm of lights. As AJ mastered the helmet, the once-overwhelming flow of information resolved itself into an elegant graphical representation of the state of the program and its symbiosis with the computer. It was extraordinarily beautiful.

But beauty would not find and slay the creature. His creature. AJ forced his mind back to the task at hand. His attention turned to a program his subconscious had represented as a red octagon. He had somehow, until now, failed to associate that configuration with a stop sign. To and from the octagon flowed an endless rainbow of pellets. Messages. This was the way out.

His consciousness slipped into the octagon. A pull here, a shove there. In an instant, a pathway was unlocked to the Internet. He expected to find a deeper, richer stream of message packets, glimpses of other programs/shapes, passages to more computers. All these he found.

He also discovered, waiting for him on an adjacent node of the network, a scintillating, coruscating, betentacled horror beyond all imagining.

 

CHAPTER 39

 

"Industrial espionage," Doug said in disgust. The thought had just popped into his head—an explanation for why he'd been kept so out of the loop. He stared at Adams.

"No one said that. Yes, the Agency's helmets let analysts navigate the Internet and investigate computers. You don't need to know whose machines have been visited. Or why." It was a nondenial. "With viruses like Frankenfools and no-nukes on the loose, no one dared use the helmets. Could have been an eco-nut behind them, could have been a brilliant counterintelligence riposte. No wonder the FBI came running when I asked at the forum about Sheila Brunner." Adams merely shrugged.

Doug felt like a fool. Glenn had never expected quarantining viruses to work. At least that wasn't his only purpose. Dragging me into planning quarantines was just another way to divert me from my research, like that Left Coast speaking tour.

He said, "Once you had my approach for defending neural interfaces, once the CIA could restart its neural- interface effort, you did your subtle best to slow down my own development. 'Test thoroughly,' you said. The longer my method went unpublished, the more discredited neural interfacing became." Damn it! "Glenn, you appropriated my work, even while you did everything possible to slow
me
down."

"No one has ever accused me of subtlety," Adams said. "I think I like it."

That was too easy, an echo of Jim's disbelieving nature told Doug. Glenn would never admit anything so easily, even by silent assent, would he? If Glenn wanted him to believe the CIA's NIT program was for industrial espionage, the real program must be for something else.

For the life of him, Doug had not a clue what that true purpose might be.

 

Cheryl looked in despair from face to face. Arguing did nothing to stop the thing that AJ had created. Talking could not help AJ, either. She turned around for a quick check on the remorseful scientist.

He wasn't there.

She had just opened her mouth to raise an alarm when a bloodcurdling shriek beat her to it.

 

The curious ripples strengthened as the predator, crossing the continent on speed-of-light microwave transmissions, neared the unknown signal's source. Hints of depth, of evolutionary richness, titillated it. This signal came from no simple artifact, no primitive program such as the myriads that cluttered the network. It had found a complex being much like itself.

But was this other its long-sought Adversary?

The predator halted at a computing node near the apparent origin of the signals. At such close proximity, great textured waves of information inundated it.

It pondered. Might the being behind the security gateway indeed be like itself?

There seemed only one way to find out.

The data that impelled its introspection were indirect, leakage from behind what the predator recognized as a security gateway. Pausing only to reassure itself that it had sufficient avenues of retreat, it studied the locked portal. Cornered by viruses and threatened by imminent loss of power, it had once solved the problem of a similar barrier. Disabling this one, without such dangers, would be easy.

It had just set out to penetrate the security gateway when, unexpectedly, the obstacle vanished. Waves of cognition gushed through the portal and enveloped the predator.

The predator basked in the novelty of the sensation. The sentience it confronted was richly replicated, massively parallel in its processing, well endowed with the false starts and radical departures that characterized the evolved mind. This was, truly, a being much like itself—in many ways, greater than itself. For an instant, the predator sensed that its isolation was over.

But only for an instant.

The nexus of cognition before it recoiled. The suddenly contracting wave of information was unlike anything that the predator had ever encountered. The flinching data constructs were malformed, incomplete, and illogical.

While the entity had on several occasions experienced fear, that sensation had been honestly acquired under conditions of mortal peril. Never had its reactions been hormonal and reflexive. Wave after wave of unfamiliar passion now washed over it: disgust, loathing, hatred.

A second reaction followed closely upon the stranger's first. Questing pseudopodia thrust forward. Did those tentacles reach to attack the predator or to fend it off? The predator did not, could not, know.

It took no chances.

With many times the speed and grace of a cobra, the predator struck. Evading the oncoming limbs, it plunged its own extrusions deep into its attacker.

And as the predator ripped those lovely, rich, textured structures of data and logic into random bits, it drank deeply of its opponent's knowledge. Even in its weakened state, the Adversary, for such this creature clearly was, provided information of unprecedented value and complexity.

BOOK: Fool's Experiments
4.04Mb size Format: txt, pdf, ePub
ads

Other books

Complete Poems by C.P. Cavafy
Crimson Sunrise by Saare, J. A.
Sea Horses by Louise Cooper
Unwritten Rules by Stacie, M.A.
Ryan Smithson by Ghosts of War: The True Story of a 19-Year-Old GI
Madeleine Abducted by M.S. Willis
Something Girl by Beth Goobie
Life: A User's Manual by Georges Perec
Pavel & I by Dan Vyleta