Keeper of the algorithm.., p.10

Keeper of the Algorithm (The Keeper Saga Book 1), page 10

 

Keeper of the Algorithm (The Keeper Saga Book 1)
Select Voice:
Brian (uk)
Emma (uk)  
Amy (uk)
Eric (us)
Ivy (us)
Joey (us)
Salli (us)  
Justin (us)
Jennifer (us)  
Kimberly (us)  
Kendra (us)
Russell (au)
Nicole (au)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Larger Font   Reset Font Size   Smaller Font  

  Li was aware that China’s satellites had become the surveillance eyes to monitor its population and maintain social control. The government claimed it was necessary to maintain national security and social order. Naturally, Li supported these methods because he was dedicated to the State. It would never occur to him to challenge his orders.

  Locking eyes with each subordinate, Li said, "We are transitioning to Phase Three. I want your thoughts."

  Captain Zhang hesitated before speaking. "Sir, the Americans have already traced these cyberattacks back to our lab once. They might do so again. They could counterattack this lab directly."

  Li turned to the screen, displaying their intrusion vectors concealed through layers of proxy servers. "We've been meticulous and have constructed secure defenses. But even if they do strike, we will be well on the way to achieving the 'probabilistic advantage.'"

  "Probabilistic advantage, sir?" asked Lieutenant Chu, her brows furrowing.

  Li sighed. "It's the point where their nuclear deterrence is so weakened, a nuclear option becomes viable—with 'acceptable losses' to us."

  The room chilled at the mention of 'acceptable losses.' The officers exchanged glances. Major Wang finally broke the silence. "Do we have a statistical model for these 'acceptable losses'?"

  "We do," Li replied. "It's a calculation from our new Algorithm. It’s a point of calculated risk. If their defenses fall below a predetermined threshold, we have the go-ahead for full-scale war."

  Lieutenant Chu ventured cautiously, "But sir, 'full-scale war' is—"

  "That is of course a last resort," Li interrupted. "And that's why we are here—to ensure it doesn't come to that. We continue with cyberattacks to destabilize them enough so they will surrender to our demands, rather than face total war."

  "So, it’s a balance," mused Major Wang. He oversaw the special branch of The Ministry of State Security (MSS) which controlled its own separate police force for industrial and cyber espionage.

  “Yes,” said Li.

  Wang said, “My MSS agents are in position and will conduct the designated special operations according to your timetable, sir.”

  “Very well.” Li looked pleased. "Captain Zang, prepare the payload. I will personally oversee the launch sequence."

  As his team dispersed, Li was left alone with his thoughts and the world's weight on his shoulders.

  What does one risk for a future that’s secure but may be morally compromised?

  An hour later, his team reassembled. "The payload is ready for your command, sir," announced Captain Zhang.

  Li looked around the room. These were not just his subordinates. They were patriots, each willing to follow him into the unknown.

  Captain Zang said, “This payload is an AI variant of the IoT Device Attack. Its AI helps the virus identify high-value targets and vulnerable systems through reconnaissance and data gathering. It profiles networks and systems to find ones that meet desired criteria for infection. We will use this to strike infrastructure according to the progression plan of Phase III.

  Li considered. “Is that the best choice?”

  Captain Zang added, “We use this virus to target IoT devices for multiple reasons. For one, most IoT devices don’t have enough storage to install proper security measures. These devices often contain easy-to-access data such as passwords and usernames. The virus attaches itself to legitimate files and spreads by infecting other files or programs. We can use them to log into user accounts and steal valuable information, such as more security details.”

  Li said, “Yes. The IoT Device Attack payload could target small devices everywhere, from doorbells to electric generators. But we must also target conventional military devices, from radios to motor ignitions.” He paused before adding, “they could lead to military access codes.”

  He was sure they would cripple critical infrastructure.

  "Proceed," he ordered.

  As they initiated the attack, General Li felt his weighty responsibility. The game had shifted, and in this high-stakes match, it wasn’t about winners—only survivors.

  Chapter 24

  Firewall

  Mike sat down at the workstation provided by the National Security Agency. The time was 2:17 a.m., according to the digital clock on the sterile white wall. The room, filled with rows of analysts peering into their monitors, had a subdued urgency. Amber’s concerns that more threats were coming proved prescient.

  Agent Thompson of the NSA looked at Mike and the Turing team. He didn't bother with formalities. "We've had four more cyberattacks on U.S. infrastructure today. That's why you’re here."

  Jonah raised an eyebrow. "That bad, huh?"

  Despite his calm demeanor, Mike could sense the anxiety gripping the room. Amber's gaze fixated on the West Coast water facilities. Gault looked particularly grave, absorbing the magnitude of the digital assault on the utilities.

  Thompson continued, his voice steady but concerned, "It's not just power. Our rail networks are being tampered with. Signals are getting jammed or misrepresented, leading to halts and, in some cases, collision near misses."

  An operator interjected, "There are disruptions in the electrical flow patterns. They're introducing malicious code that's overloading the grid's relay systems."

  Tapping her tablet, Amber added, "Water purification plants are also affected. The control systems are being overridden, which could lead to a potential contamination crisis if not addressed."

  Gault's brow was furrowed. "What about the commercial sector? Wall Street? Silicon Valley?"

  Thompson shook his head. “They’ve done their homework. This isn’t a blind strike. The focus has been on public utilities, aiming to create chaos and panic. Financial institutions are on high alert, but the immediate threat seems directed at basic amenities. And our gasoline distribution isn’t spared. Control systems of refineries are being manipulated. While physical reserves remain, the digital controls governing distribution are haywire."

  Mike glanced at the screen, his analytical mind racing. "Are they using any specific malware?"

  Agent Thompson took a deep breath, "They've deployed a worm we haven’t seen before. It’s self-propagating and mutates every time we try to isolate it. And it's paired with ransomware that locks critical control systems. However, instead of money, the ransom demands specific access data and security codes."

  Mike turned his attention to his monitor. It was blank. He put on his VR glasses and logged into DeepMind. Then, he opened a text editor and started laying down an initial code, calling firewalls, and instructing the system to flag anomalies.

  Amber began working on data traffic, creating a filter to alert them to unauthorized access.

  Jonah was going deeper, working on identifying the source of the attacks.

  The team coordinated through their AI.

  Soon, they concentrated on the code and filled the screens with cybersecurity algorithms to create a firewall. The wall was their defense against this cyber assault on the nation’s infrastructure.

  Amber’s eyes widened, "They're not just trying to disrupt; they're extracting information."

  Gault looked thoughtful, "It's a two-fold strategy. While we scramble to address the chaos, they access sensitive information, potentially giving them even more power.”

  After several hours, Thompson's lips tightened into a thin line. “I have more bad news.”

  Jonah asked, “The disruptions are causing civilian panic?”

  "Worse. Multiple military servers have been compromised. We see unfamiliar coding techniques using advanced Name Entity Recognition beyond our expertise. They can pick through our military equipment and pinpoint what gear we have deployed. This allows them to target specific designations and take them out. We need your know-how."

  Mike said, “NER is not new, but targeting military gear is. Imagine you're reading a newspaper article. You automatically understand who or what is being talked about, where the events are happening, and other details. NER teaches machines to do the same. It learns to pick out names of people, organizations, locations, and other specifics from a chunk of text.”

  Thompson nodded.

  Mike added, “For example, imagine a picture of Paris at sunset where a woman walks her Dalmatian by the Eiffel Tower. The NER AI can identify "Paris" as a location, "sunset" as a time, "Clara" as a person, "Dalmatian" as a type of dog, and "Eiffel Tower" as a specific location. This information can then be utilized to create a video or artwork that accurately depicts the sentence.”

  Thompson said, “But an ordinary person wouldn’t be privy to military top-secret equipment designations and codes. This hack knows all our stuff.”

  Amber asked. "What are your priorities?"

  "We need to secure the power grids and military databases immediately," Thompson said. "That’s your focus."

  Hours ticked by. Their eyes were dry, and their backs ached, but the room's tension didn't allow for complaints. The big screen at the front of the room showed an incoming data stream. Mike's code caught several of them as anomalies and shut them down.

  Jonah finally said, "I’ve traced some of the source code. It has markings that tie back to the Chinese military. It is similar to the attacks they used on the Turing Institute."

  Mike looked at him. "If we’re wrong—"

  "We’ll wait until we are sure," Amber interjected. "But it's good to know what we're up against."

  Mike nodded. "All right. Let’s make sure our defenses hold up first. Then we can think about the next move."

  The clock blinked at 6:31 a.m. Mike looked at his screen again. For now, they were holding the line. The question was, for how long?

  At 9 a.m., Mike was still staring at a monitor. The lines of code scroll by as if they had their own will. It was a mad dance between creation and destruction. For now, he was holding.

  "We've got an incoming anomaly—a significant load on the Eastern Seaboard grid," Amber announced, her voice tight but under control.

  "Isolate it. I’m deploying countermeasures now." Mike instructed DeepMind to act. His code snaked through the digital labyrinth, seeking out the foreign intruder.

  "Done. That attack’s been neutralized," Amber confirmed, releasing a subdued sigh of relief.

  Jonah glanced at Mike. "Good work, but we’re far from being out of the woods."

  Just then, Gault walked into the room, a frown marring his usually placid face. "I have to give a status report to the Director of NSA. Do you have anything more?"

  "The attack on the civilian infrastructure has been slowed. We’ve reinforced the firewall protecting military systems. I think we’ve managed to temporarily contain this virus, Mike said, his eyes meeting Gault’s momentarily. But that was enough for Mike to sense something—a cloud of suspicion, maybe even animosity.

  "Good," Gault said, nodding curtly before exiting as quickly as he had come in.

  Jonah looked at Mike and raised an eyebrow. "He didn’t seem too pleased for a man whose ass was being saved."

  Mike shrugged, though a nagging thought started to grow in the back of his mind. "Maybe he's just tired. It’s been a long night for everyone."

  Chapter 25

  Mole

  "Fooling the human in the loop has always been the Achilles' heel in our systems," FBI Agent Miller said, pulling up a holographic screen. An image of a Turing ID pin rotated slowly in the air with every detail magnified. "The heart of the matter is that we trust our eyes and senses. Deep fake technology exploits that."

  The overhead lights of the Escher conference room cast long shadows on the whiteboard, where the words "Deep Fake ID" were prominently displayed. The chilling implications of those words hung in the air.

  Jonah paced in the Turing workspace, the usual energy in his gait replaced by a ponderous, heavy step. He said, "It's one thing to break through codes and protocols, but to manipulate the system for deceit and infiltration is another level.”

  Miller showed several holographic articles showcasing advancements in deep fake technology. "It's astonishing and terrifying in equal measure. Enemy agents are not just creating fake images. They're synthesizing their whole personalities. With the technology at their disposal, they can mirror retina patterns, emulate palm prints, and even mimic DNA sequences.”

  Gault said, “The notion that a fraud could go through the Turing Institute's corridors unhindered sends a shiver down my spine."

  Mike breathed deep and long trying to control his growing sense of concern. The FBI’s worry of terrorist using deep fake Turing ID pins meant the entire security program was under scrutiny—something he could ill afford.

  Miller asked, “Any ideas how they are doing it?”

  Jonah replied, "You'd be surprised. The hacker doesn't need to replicate. They only need to convince. With the right deep fake, they could create a Turing ID pin that appears genuine to every scanner, or human, that sees it. It’s possible there is a mole in our inner ranks, and we don’t know it."

  “The audacity,” Amber whispered, her fingers gliding over her tablet as she scanned for vulnerabilities. “They’re essentially wielding the Turing brand against itself. They’re using our reputation to gain unauthorized access to military facilities.”

  Mike squirmed in his chair. "But how would they gather the initial data? Our retina scans, palm prints and so on. That's not public information."

  Jonah hesitated, his eyes darting to Amber and then Miller. "The hacker could contact a company or service provider pretending to be a specific individual. They would use bits of information—past employment, schools attended, close contacts—and then spin a web of lies to extract further data."

  “And that's where deep fake technology shines,” Amber added. “They could literally emulate your voice and imitate your mannerisms on a video call. It would appear genuine to an unsuspecting recipient.”

  The room fell silent.

  Miller asked, “So, how do we fight this?”

  Gault leaned back, arms folded, eyes thoughtful. “It starts with awareness and education. You must train your staff to double-check and to verify independently. They should be alert to requests that seem out of place or unexpected.”

  Amber nodded in agreement, "And technically, we might want to consider multi-modal biometrics. Two-factor authentication is good, but in the face of this threat, perhaps three or four factors might be more apt. Our Turing Digital Twin technology is helpful in that."

  Jonah said, “We need to strategize our defense against this personal form of attack. One thing was certain, the deep fake threat had only just begun. And it was going to be a battle not just of technology, but of wits, intuition, and the very essence of human trust.”

  Agent Miller concluded, “And of course, we will need to reexamine every clearance on file.”

  Mike blanched.

  ◆◆◆

  The door to Michael Stewart’s private rehabilitation room slid open to admit Mike. He was met with the soft strains of Mozart's Symphony No. 40. Michael, clad in a fitted workout ensemble, was undergoing a physical therapy session. He was guided by a holographic avatar that displayed exercises for spinal injury patients. Despite his evident pain, Michael moved with a deliberate grace, each motion carefully calibrated.

  In the weeks since his surgery, his recovery exceeded expectations. With the unwavering support of the medical team, he made good progress. His exoskeleton support outfit and AURA's advanced algorithms led to his improvement. The fusion held, his mobility improved, and pain became a diminishing memory. The synergy of man and machine had proven its worth.

  Spotting Mike, he paused, motioning for a break. The holograph faded, and Michael gestured towards a comfortable sitting area.

  "Mike," he began, a knowing glint in his eyes. "Perfect timing. I've just finished my last set."

  Mike sat and asked, "How's the therapy progressing?"

  "Every day is a battle," Michael responded, grimacing slightly as he stretched his back, "but one I’m determined to win. Though it seems we're both caught in our own private battle."

  Mike nodded, his thoughts swirling. "There's a looming threat against the Algorithm. China's actions are . . . intensifying."

  Michael’s brow furrowed. "China's intentions have always been clear. But it’s not just the Algorithm at stake. It's the control it represents. And you need to ensure that power remains balanced."

  Mike sighed, leaning back. "It's not just international politics. Manfred Gault has his suspicions. He's like a bloodhound catching a scent, believing I’m hiding something.”

  A smirk played on Michael's lips. "Well, he’s not wrong, is he?"

  Mike's face darkened. "It seems that everybody is probing into every aspect of my life. The FBI is investigating a possible mole or terrorist agents at Turing. And even Amber . . . she’s asking questions. Maybe she deserves an answer."

  Michael's expression turned stern. "You’re talking about revealing our switch, aren’t you?"

  Mike hesitated before nodding. "She's been through a lot because of me. She deserves to know who she's been with."

  "No." Michael's voice was firm. "Telling her would put both of us at risk, and that’s not a decision you can make alone. Our identities and our lives are intertwined, Mike. Revealing this secret would endanger me, too."

  Their gaze met. The cost of their shared secret was deep. "But it's eating me alive. The lies, the deceit. How do I keep this from her? She’s been my anchor through all this."

  Michael sighed, running a hand through his hair. "I get it. But we made this decision for a reason, for both our sakes. And it’s not fair to burden her with this knowledge, with the weight of this secret."

  Silence settled between them. Mike's shoulders slumped in defeat. "It's just . . . every time I look into her eyes, I see that trust, that love. How do I keep lying to her?"

 
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Add Fast Bookmark
Load Fast Bookmark
Turn Navi On
Turn Navi On
Turn Navi On
Scroll Up
Turn Navi On
Scroll
Turn Navi On
183