Keeper of the algorithm.., p.11
Keeper of the Algorithm (The Keeper Saga Book 1), page 11




Michael leaned forward. His eyes filled with empathy. "Sometimes, Mike, we must bear the weight of our decisions, no matter how heavy. For now, this secret must remain with us. For everyone's sake.”
Chapter 26
Truth
Two weeks later, the NSA operations report highlighted a new sinister dimension of cyberattacks: a flood of disinformation. The Chinese were not just attacking infrastructure; they were waging a psychological war.
The Wall Street Journey published:
. . . social-media platforms are down after an extensive series of cyberattacks. They have been dealing with a flood of misidentified video footage, fabricated information, and violent content. Facebook, X, and TikTok are overwhelmed with false and hateful messages.
The social-media platforms have dedicated large staff and resources to policing false or hateful content, but to no avail. Denial-of-service attacks intermittently knocked out consumer websites across the country. The hackers have targeted electrical grids. We have seen phishing attacks multiple ten-fold.
The attempts involved hackers posing as allies and friends who expressed sympathy for them, purporting to offer links to resources that instead contained malware.
You can’t really trust anything that is being posted these days.
There were posts falsely alleging that U.S. military bases had been compromised, that naval fleets were in disarray, and that the president was in hiding. Fake videos purported to show riots in major cities, military vehicles patrolling American streets, and citizens being forcibly quarantined in undisclosed locations.
At the Turing Institute, Mike evaluated a series of trending topics from social media platforms. "It's not just about breaking the physical and digital structure. They're trying to break the American spirit."
Amber analyzed the data. "These posts and videos are expertly crafted. Deep fakes, realistic CGI, and voice manipulation. They've mastered the art of creating believable falsehoods."
Jonah, rubbing his temples, muttered, "So, while we're scrambling to combat the cyberattacks, they're instilling panic and distrust among our citizens. The worst part is many are believing what they are seeing. It feeds on itself because some are caught in cognitive dissidence and are unable to escape the false illusions."
Agent Thompson chimed in, "Our assets on the ground report that this misinformation campaign is dual-edged. They're feeding their own populace similar tales. Stories of the U.S. admitting defeat, American soldiers defecting, and U.S. citizens praising the Chinese government for 'freeing' them."
Mike pondered aloud, "It’s a classic warfare strategy, reminiscent of the propaganda of World Wars. Break the enemy from within, diminish their morale, while boosting your own."
Gault stood up, pacing the room. "Then we need to counteract it. We have the technology to trace the origins, debunk the fake stories, and expose their lies."
Amber suggested, “We should partner with tech companies and social media platforms. Implement algorithms that can detect these deep fakes in real-time and flag or remove them.”
Thompson spoke up, “On the international front, we need to rally our allies. Share intel, expose the misinformation campaign on a global stage. A united front will discredit their lies.”
Mike, ever the programmer, was already typing away, “I’m crafting a machine-learning antivirus algorithm. With enough training, it will detect these falsified posts and videos at their source, tagging them for review or removal.”
Gault nodded, “Good. But it’s not just about removal. People believe what they want to believe. We need to control the narrative, reassure our citizens, and provide them with accurate information.”
Amber looked at the team, “We also need to address the mental health consequences. Fear and uncertainty can lead to panic. We need public service announcements, helplines, and community outreach. Counteract the fear with facts and support.”
The enormity of the situation was clear. They were not just battling algorithms and servers. They were fighting for the very psyche of their nation.
◆◆◆
The Turing team's plan was now in motion. Deliberate honest information was fed into the Chinese communications. They hoped it would alter the Chinese Algorithm’s predictive models. Mike kept one eye on the monitor and another on the team, each absorbed in the critical task. The room's atmosphere was electric, each minute adding to the tension.
Gault, his eyes never leaving the screen that displayed real-time attack attempts, asked, "Status report?"
Jonah said, "We've successfully rerouted their probes to decoy servers. They're biting."
Amber added, "And our information payload was delivered. They'll miscalculate their next move if their Algorithm takes the bait."
It was a silent waiting game now, a nerve-wracking lull that had everyone on edge.
Mike read the prompt on his screen aloud, "Incoming communication from NSA. The Chinese are pulling back on some of their more aggressive dispatches."
Gault raised an eyebrow, a glimmer of approval crossing his eyes, "Seems like the bait is working."
But Mike was pensive, "Yes, but why? Their Algorithm is advanced enough to sense a trap. Unless they want us to think we've succeeded."
Frowning while considering the implications, Gault finally spoke, "You think this is a double bluff?"
Mike shrugged, "In a world where AI learns from human behavior and evolves, we can't rule it out. It might be learning to adapt."
Amber looked concerned, "That's a chilling thought. Deceptive algorithms could make cyber warfare unpredictable, turning it into a never-ending game of cat and mouse."
Jonah interjected, "We need to adapt just as fast. The next generation of AI algorithms will likely involve more self-directed machine learning, making them even harder to anticipate."
Gault, standing tall, said, "Then we better make sure we're cats and not mice. We've bought some time. Let's use it wisely."
Chapter 27
Enough
Mike settled into his Turing office chair. Its cushion was still molded to the shape of his recent anxiety-ridden fight against hackers. He took a great gulp of coffee and looked at the three monitors displaying various states of the ongoing simulations. One graph was especially troubling—it indicated a spike in cyber activities originating from China.
The sound of a vibrating phone interrupted his troubled thoughts. Gault's terse text message was clear, “Come to my office. Now.”
Mike hurriedly saved his work and locked his computer, mentally preparing himself for whatever awaited him. As he navigated the hallways, he couldn’t help but anticipate a new crisis.
He knocked on Gault's door and entered. Inside, Gault was not alone. Beside him stood Agent Thompson of the NSA, whose cold, sharp gaze assessing Mike.
Thompson spoke up, his tone crisp and devoid of pleasantries. "Your simulations are edging closer to what we've termed . . . a Pandora's Box."
Gault's hand moved instinctively to straighten a paper on his desk, a simple act revealing his anxiety. “Explain.”
Mike interrupted, “My analysis suggests adjustments to the firewall. It’s paramount that the entire team is briefed.”
Thompson sighed with a hint of exasperation in his eyes. "I don’t think we can afford the luxury of team consensus."
Not one to back down, Mike responded, "Blind haste could prove costlier."
After a tense pause, Gault said, “I have to agree.”
He called an emergency briefing.
Soon, the cream of the Turing team assembled in the Escher conference room with its advanced technology displays.
Mike launched into his presentation. The screen flashed graphs of covert operations and infographics. There were hacking signatures sprawled on the display. He dove into the clandestine world of cyber espionage. He asked Thompson to lay bare the contrasting strategies of the world’s superpowers.
Thompson said, "In cyberspace, borders dissolve, and nations engage in a constant silent war. It is a complex web of espionage, deception, and strategy. It is led by the USA, China, and Russia."
Amber and Jonah sat up front and looked intently at the screen.
Thompson continued. "The National Security Agency (NSA) and Cyber Command (USCYBERCOM) lead the charge on defense and offensive, respectively. The NSA programs focus on safeguarding critical infrastructure. It combats cyberterrorism and protects national secrets."
The audience was intrigued, watching closely.
Mike took over. "China's cyber approach is best described as stealthy and opportunistic. Their operations are notorious for their well-orchestrated disinformation campaigns. In comparison, Russia's expertise lies in its disinformation warfare. They have mastered creating chaos. They influence political narratives and destabilize adversaries without firing a bullet. Their tactics are not just about hacking systems but hacking minds."
He paused.
“Economically, Russia does not have a comparable technology. This often limits the scale of its operations. International sanctions have isolated Russia digitally. This has led to a technological gap. However, this week, the President of Russia is in Beijing to lend his support to its signature Belt and Road Initiative, which for past decades has used railroads, ports, and other projects to expand Chinese economic influence abroad. We are skeptical of the Chinese initiative’s intentions.”
Gault said, getting straight to the point. "We're facing an unprecedented crisis. We've learned that Russia may be supporting China's cyberattacks. We don't know how far they are willing to go. But everything is now even more complicated. The Algorithm that China has developed by stealing our technology helps develop the cyberattacks. This could bring us to the brink of a war."
He paused, letting the weight of his words sink in. Jonah spoke out, "So, we're talking about a game theory strategy from the enemy Algorithm?"
"Exactly," Mike confirmed. "But that's not all. There are indications of an unknown variable within the Algorithm that we don’t fully comprehend.”
The room was thick with concern about the potential problem they were grappling with.
Amber broke the silence. "What can we do?"
“That’s why I’m here. To ask you that question,” said Thompson.
There was a long silence that seemed to stretch beyond endurance.
Then Mike said, "We need to make a significant revision to our Algorithm. It must become our primary antivirus cybersecurity. The new version should withstand the escalating attacks and be flexible enough to adapt."
Gault chimed in from the back of the room. "That would give the Algorithm a measure of autonomy that we have tried to avoid.”
Mike said, “I agree. It’s a fine line between protecting us from outsiders to protecting us from the Algorithm itself.”
The words hung ominously throughout the room.
“Do you have a plan for this highly ambitious endeavor?" asked Gault.
Mike gazed at Gault, sensing his skepticism. I propose we develop real-time human-in-the-loop Deep Reenforcement Learning. It will train the next Algorithm iteration. This will allow us to incorporate our newly learned insights. It will stop hackers and adapt quickly."
Gault raised an eyebrow. "Real-time Human-supervised? Are you suggesting we continuously update and instruct the Algorithm on specific anti-hacking tools?"
"Given the stakes, yes, I am.”
“The last thing we need is an autonomous Algorithm making decisions that could lead to a military confrontation,” insisted Gault.
The room was still for a moment, each member of the Turing team wrestling with the problem.
Thompson interjected, “I don’t think we have an alternative. Do we?”
Finally, Gault nodded. "Alright, we can work toward that goal, but no changes will be made without full review and evaluation by our engineering team of Dr. Helen Martinez and Dr. Chetna Wu.”
Mike frowned. “Time is not on our side.”
Gault said, “Full review and evaluation!”
As the team dispersed to their respective stations, Mike felt the world's weight on his shoulders. But he sensed a collective resolve in the room for the first time. They were a united front in the face of an impending disaster. But he still had to create the code that would achieve his goals.
Will it be enough?
Chapter 28
Dangling Over the Edge
Amber, Mike, and Jonah teetered over the edge of the high building terrace, legs dangling into the void as the city's underbelly pulsed below them. Amber's hair quivered under the caress of the clandestine wind. City lights blinked like dying stars, vying for attention in the evening haze.
Breaking through the hush, Mike offered, "It’s peculiar how shifting your vantage point can obliterate the problems you thought were insurmountable."
Jonah glanced sideways, his eyebrows knitting together.
"Are we back to AI existentialism?" Amber prodded, her head tipping just so.
"Touché!” A grin flickered across Mike’s face. “I am recalling Einstein from our university days."
Jonah smirked. "Ah, yes. The puzzle of spacetime—on a rooftop. Classic you."
Mike said, "Einstein reconciled Newtonian mechanics and Maxwell's equations by swapping out the constancy of time for the constancy of light. His brilliant trick was to displace one's focus to see things anew. Much like the difficulties we are encountering with the Chinese Algorithm."
Amber’s eyes grew somber. "A compelling analogy. Reframe the problem."
“Exactly. Our gaze needs readjusting,” Jonah contributed, rubbing his chin in a bemused fashion.
Mike lifted his drink. "Like our continual tweaking of the Algorithm. What if we're not up against a mounting war of innumerable cyberattacks but a limited perspective?”
Amber leaned closer. Her interest piqued. "You’re suggesting that the enemy’s intentions are not limited to cyberattacks?"
Mike shrugged. "We're too enmeshed in the minutiae to see the Chinese Algorithm for what it is. We are thinking of it as a benign servant, like our Algorithm."
Amber exhaled deeply. "So how do we adjust our view? How do we discern the Chinese Algorithm anew?"
Jonah’s eyes narrowed, a glint of realization dawning. "Yes, maybe our fundamental understanding is misaligned. How do you see the Chinese Algorithm?”
"As an indifferent autonomous War Gamer!” said Mike.
A colder and more insistent wind surged around them, whispering veiled menaces. It seemed like something nefarious was beckoning them into a deeper game.
Mike's forehead tightened. "What if these cyberattacks and paradox anomalies are smokescreens masking a deeper intrusion?"
Amber’s eyes widened. "That would signify an orchestrated campaign beyond crippling our national grid. These attacks might be just red herrings. What do you think their real intentions are?"
Mike's jaw set firm. "A cyber offensive on conventional military target so demanding that it may cloak a deeper cyber threat to our nuclear deterrence.”
Amber said, “That would be an act of war."
Jonah's voice grew thick. "But who stands to gain from destabilizing us?"
Amber's fingers trembled. "China could be inundating our system with cyberattacks, ensnaring us in a computational quagmire. Then they could make a move, leveraging their nuclear arsenal."
Jonah clenched his fists. "A subversive strategy to blindside us, keeping us preoccupied with data decoy attacks."
Mike’s eyes smoldered. "So, in grappling with these paradox anomalies, we're just pawns in their larger scheme?"
Amber nodded gravely. "We need to trace this malignancy to its root and sever it before it metastasizes further."
Mike said, "We may have kept them off so far, but I can't shake the feeling that they're adapting faster. Their Algorithm is like an evolving predator. We're playing by someone else's rules. It’s time to make our own."
Amber nodded, sharing his concern. "So, what do we do? The NSA is already stretched thin. Our virtual firewall is about as robust as it's going to get."
Gazing upwards, he added, "To stop the Chinese Algorithm, we must manipulate it. We change tactics." Mike's eyes narrowed. "Instead of just defending, we figure out a way to disable the Chinese Algorithm, or at least impede its learning and adapting capabilities."
Jonah said, “We can barely understand our own Algorithm. We are constantly concerned with making changes that can lead to unwanted consequences.”
Amber considered this momentarily, and then her eyes brightened. "What if we introduced an element it couldn't predict? Something so illogical and human that it would send their Algorithm into a loop, trying to understand it? Can we do that?"
Mike sighed. "I don't know yet, but we must think of something soon. If we're playing a game of illusions with an AI, we'll eventually lose."
He gazed into her eyes and added, "It can think faster and adapt quicker."
Chapter 29
Diabolus Ex Machina
General Li sat rigid in his chair, staring at the encrypted message flashing on his computer screen. The corners of his lips tightened. The report said, “China's cyberspace approach reflects an ambitious, centralized, and relentless national strategy.”
He turned his gaze to the three officers standing before him. They led his elite Unit 398. It had a reputation for advanced persistent threats to infiltrate foreign networks. It had been repeatedly singled out by the West. A fact they took pride in.
"High command has issued new orders," General Li began, locking eyes with each subordinate. "We are transitioning from cyber chaos measures to Phase IV. I want your thoughts."
Captain Zhang's worry was printed on his face. He said, "Our new AI system will learn to mutate and change the code of the virus to avoid signature-based anti-virus detection. It could also learn which behaviors and payloads are more likely to avoid triggering heuristic and behavioral detection systems. However, Phase IV includes direct attacks on America's nuclear deterrent air, sea, and land facilities, sir.”