Keeper of the algorithm.., p.13

Keeper of the Algorithm (The Keeper Saga Book 1), page 13

 

Keeper of the Algorithm (The Keeper Saga Book 1)
Select Voice:
Brian (uk)
Emma (uk)  
Amy (uk)
Eric (us)
Ivy (us)
Joey (us)
Salli (us)  
Justin (us)
Jennifer (us)  
Kimberly (us)  
Kendra (us)
Russell (au)
Nicole (au)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Larger Font   Reset Font Size   Smaller Font  

  11.723%.

  The Algorithm reported, "At this percentage of US nuclear deterrence readiness, it would be advantageous for China to attack. Their elite would survive in an underground shelter while they could launch an all-out nuclear war with over one thousand thermal nuclear missiles. They could expect less than 100 U.S. responding missiles.”

  The conclusion hung in the air, a stark reminder of the precarious situation they were in. It was as if the machine had glimpsed into the abyss. Now the team had to grapple with the alarming truth. They were standing at the edge of the unknown, facing an adversary that operated without bounds, all while their creation calculated the unthinkable.

  Could we endure that?

  What is our state of readiness?

  Chapter 32

  Night Out

  The night was clear, and the city buzzed with life as Mike and Michael stepped out of a sleek black car in front of a luxurious restaurant. It was a rare treat for Mike to escape the confines of the Turing Institute and enjoy a night on the town. The valet took their car with a nod, and they entered the restaurant, greeted by the soft glow of chandeliers and the murmur of conversation.

  "Quite a place you've picked, Michael," Mike remarked, glancing around at the opulent décor.

  Michael grinned, his eyes reflecting the excitement of the evening. "Only the best for a night like this, my friend. Besides, we deserve a break after weeks the chaos."

  They were led to a private table with a view of the city skyline. The aroma of exquisite cuisine filled the air, and they eagerly perused the menu. As they sipped on fine wine and savored each meticulously crafted dish, they delved into conversation.

  "You know, Mike," Michael began, "this AI spinal fusion surgery has been a game-changer for me. I couldn't have imagined a few years ago that I'd celebrate here and enjoy this incredible meal."

  Mike nodded. His eyes were filled with genuine happiness for his friend. "It's amazing how far AI has come in healthcare. The physical therapy and rehabilitation programs tailored to your needs have been a revelation."

  Michael's gaze turned contemplative. "I've been thinking a lot about my future, Mike. Soon, I will be able to live a normal life. Thanks to you and AI, I have a second chance. I want to make the most of it."

  Mike knew where this was leading, and he felt a pang of guilt. "Michael, there's something I need to tell you."

  Their conversation turned to the ongoing investigations at the Turing Institute. Mike voiced his concerns. "I can't shake the feeling that Gault's investigation is becoming more intrusive."

  Mike sighed. His brow furrowed. "I know, and there's also talk of a possible mole hunt by the FBI on the Turing grounds. The tension is ratcheting up."

  Michael gazed into the distance. "It's a dangerous game we're playing, Mike. We need to be cautious and watch our every step."

  Their expressions grew somber as they discussed the looming threat from China and the Algorithm.

  "I feel concern," Michael admitted, his voice tinged with vulnerability. "Fear, anger, but also a strange sense of determination. We can't let the Chinese Algorithm and its potential for destruction go unchecked."

  Mike leaned close. " We’ve been dealing with the Serpent attack for two weeks. It’s relentless. We can't underestimate the Chinese Algorithm. Its capacity to learn and adapt is beyond anything we've seen before. It's like a relentless force that keeps evolving, and we cannot predict its next move.”

  Michael's eyes shone with determination. "But we can't lose hope. You've made incredible strides in countering cyber threats. Our Algorithm has the potential to be a powerful tool in this battle."

  Mike smiled, appreciating Michael's optimism. "You're right. Our Algorithm is a beacon of hope, a creation that can help us safeguard our digital and physical world."

  Michael held up a hand, stopping him. "Enough. No more tonight, Mike. This is our night to relax and enjoy. We'll deal with everything else later."

  Mike nodded, though the weight of his secrets gnawed at him.

  "I need to tell Amber about us," said Mike.

  "We've already discussed this before. It's unfair. Unfair to me and unfair to her. After all, we've just been discussing investigations by the FBI, Gault, and moles. You think this is possible."

  "Shut up and let me think!" said Mike.

  "That's right, think. You need to get a grip."

  "We need to muddy the waters as much as possible so no one can get traction on our ID."

  "That's on you."

  Mike said, "Okay. Okay, you're right. But sooner or later, it will happen."

  "Perhaps. But not yet."

  Chapter 33

  Return Fire

  “They’re not just targeting our IT systems," Mike declared. "Satellite links, communication Systems, even missile launch codes, are under assault. Nothing is safe. I don't think we can last another week under this bombardment."

  "Amber, analyzing a portion of the compromised code, looked up, "They're upgrading their AI-enhanced Serpent. It's adapting. Every time we put up a defense, it learns, evolves, and finds a way around."

  Mike said, "Look here." He pointed at a map highlighting the affected areas. "They're focusing on Norfolk Naval Base, Fort Bragg, and Joint Base Andrews. It's causing a systematic breakdown of command-and-control systems."

  Gault's face turned grim. "That's not all. They've also infiltrated the West Coast defense systems—Naval Base San Diego, Camp Pendleton. Our fleet readiness is compromised as we speak."

  Amber froze. "The Pacific Fleet . . . if they manage to immobilize it, we'll have significant exposure. They could be preparing for a physical assault, maybe in Taiwan.”

  Mike thought of the broader implications. "And with our communication lines disrupted, coordinating a defense, or even maintaining our forward bases becomes a challenge. Our overseas troops will be isolated."

  Gault added, “We've had two drones go off-course over hostile territories. That risks international incidents. Our missile defense systems are glitchy. If this continues, our military readiness and deterrence capabilities will be severely undermined. I hesitate to think what per centage it has already fallen from the initial level.”

  As they delved deeper into the attack's intricacies, a realization dawned. The Chinese weren’t just crippling the US defense. They were sending a clear message to allies and adversaries alike about the vulnerabilities of the American military.

  "We need a multi-pronged approach," Mike stated, determination in his eyes. "First, we fortify and restore our communication lines. We need to ensure ground troops, naval fleets, and air squadrons can coordinate. Secondly, we track the source of these attacks—not just the digital origin, but the physical location. If they're using an AI-enhanced worm, they must have a substantial server facility supporting it."

  Amber looked at Mike, understanding the dawn. "I think we should consider a physical counter-operation."

  Mike nodded. "If we can exactly locate the hub of their operations, a strategic military strike could cripple them.”

  Gault, rubbing his temples, sighed, "This is uncharted territory. But we're out of options. Stewart, work on locating that facility. Amber, see if you can devise malware to feed them the wrong intel. If we can make them blind, even momentarily, it'll give us an advantage. I'll update the NSA and offer our suggestion of a military strike. They will need time to get military assets in position."

  The challenges were mounting, and the stakes had never been higher. As the trio got to work, they knew that the battles being fought in the digital realm would have profound real-world consequences.

  Mike leaned back in his chair, pushing back his hair, considering the possibility of a retaliatory decision.

  ◆◆◆

  The NSA responded to Turing's strike suggestion by making air force assets ready in Guam. As a last resort they would eliminate the Chinese cyberattack command.

  Agent Thompson came to Turing and said, "Our estimated readiness for nuclear strategic deterrence has fallen to 37.3%. We can't let this continue. The State Department has received a communication from China with demands. They want the US to immediately cease all military activities in the western Pacific, including Japan, the Philippines, Guam, and Midway. They demand that all ships, planes, and military ground forces withdraw in four weeks."

  Everyone was in shock.

  "We can retaliate," Mike began, looking at Thompson. "If the Algorithm can trace back the exact origin of the Serpent. We could then counter-attack their cyberinfrastructure."

  Thompson frowned, his experience with international conflicts evident. "Launching a military strike as part of a cyber counter-offensive would probably escalate the situation into a full-blown conventional war."

  Gault looked contemplative. "As much as I'd like to fight back, you’re right. We should prioritize defense and neutralize the threat. He paused, looking at Mike. "But we should be prepared with a countermeasure as an option for our leadership."

  Mike nodded. "Understood. While I work on the antidote for the Serpent, Amber can create a 'shadow worm.' Something we can deploy that'll not only trace back to its origin but also lie dormant in their system. If we're pushed into a corner, it can reveal their operations location."

  Agent Thompson raised an eyebrow. "A digital sleeper agent?"

  Mike said, "Exactly. It's discreet and won't directly harm their infrastructure unless activated."

  Amber looked thoughtful. "A 'shadow worm' can also gather intelligence. It could help us better understand their next moves."

  Gault turned to Thompson and asked, "What's the government's stance on this? Will there be repercussions if we proceed with cyber retaliation and hold off on a military strike?"

  Thompson asked, "Right, but what if the other side, the Chinese Algorithm, uses a different approach? Do you think the Chinese Algorithm calculates 'acceptable losses' as a specific probability?"

  Mike said, "Yes. And if our nuclear deterrence defenses reach a specific weak point, the Chinese Algorithm may decide to go all in and risk a nuclear strike."

  ◆◆◆

  It was only hours later that NSA agent Thompson reported, "The situation is fluid. Our nuclear operation readiness has fallen to 30%. The President and the National Security Council are in continuous sessions. Your military strike countermeasure might be the card we need to play very soon."

  Mike took a deep breath, "The Algorithm can cross-check multiple data points and verify the exact source location of the cyberattack."

  Amber added, "While preparing our digital arsenal, we should bolster our defenses. If they've used the Serpent this time, there's no telling what else they have up their sleeves."

  Thompson said, "We can't just be on the defensive. We need to strike back to halt their progress and show them we won't be pushed around."

  An agent from the CIA agreed. "Our assets on the ground in China have relayed some prime targets. Dams, power grids, and transportation networks. We can cripple them."

  Amber interjected, "I've identified vulnerabilities in their communication infrastructure. With a multi-vector assault, we can disrupt their cyber command and control nodes."

  Mike nodded, focusing on his screen. "I can design a cyber worm, a sibling of their own AI-enhanced malware. It will not only disrupt their operations but also feed them disinformation. They'll be fighting ghosts."

  Thompson, with a sharp edge to his voice, said, "While the digital front keeps them busy, our CIA operatives in Beijing and Shanghai will gather intel on their next moves and sabotage their digital hubs."

  Gault, always the strategist, pondered, "This is initiating a two-front war. One digital, the other physical. It's risky. The international community might not see this as a defensive action."

  Mike responded, "It's a necessary risk. The digital strike is a diversion. The real work will be done on the ground by the CIA. We're just creating an environment for them to operate."

  Amber added, "This isn't just about retaliation. It's about restoring balance. Showing them that every action has consequences."

  Chapter 34

  Hammer

  Andrews Air Force Base sprawled across the landscape, a formidable testament to military might. The tarmac glistened beneath the scorching sun, a vast expanse of concrete, interrupted only by sleek, powerful aircraft parked in precise formation. The air carried the metallic tang of jet fuel. The hum of engines and the distant roar of jet planes provided a constant auditory backdrop to the visual spectacle.

  Mike, Amber, and Jonah stood in the heart of the base, surrounded by the sounds of military aircraft and active military operations. They had received an urgent call from Agent Thompson, requesting their presence at the Air Force command center.

  As they entered the center, they were met with a flurry of activity. Military personnel were huddled around screens displaying maps and data feeds. On one wall, a large digital map of Asia showed China's vast expanse, and a blinking red marker indicated the target: Unit 398.

  General Ramirez, the commanding officer of the base, approached them.

  "Thank you for coming on such short notice," he said, his tone a mixture of urgency and determination. "We've been monitoring Unit 398's activities as you suggested. Their cyberattacks are causing significant damage to our infrastructure and military capabilities."

  Amber nodded. "We understand the situation. What's your plan?"

  Ramirez motioned for them to follow him to a secure briefing room. Inside, they found a team of military analysts gathered around a large conference table. The room was equipped with state-of-the-art communication systems.

  Ramirez said, " Unit 398 has set up a well-protected base in a remote region of China. Our mission is to cripple their capabilities.”

  Mike leaned forward. "How will you do that?"

  “We were hoping to get specific direction from your team to do that.”

  The general activated a holographic projection of the target area. It showed a sprawling complex nestled deep within the Chinese mainland.

  Mike said, "Our intelligence indicates that Unit 398's operations center is located here," he said, pointing to a large facility. "They've also established a server farm."

  The general studied the hologram. "And the electric grid?"

  Amber continued, "The electric grid supplying power to their base is vulnerable. We believe that by disabling it, you can disrupt their operations significantly."

  Jonah interjected, pointing to additional buildings, "What about their main computer center? If we take that out, it should cripple their ability to coordinate cyberattacks."

  General Ramirez nodded in agreement. "Exactly. Our mission is to coordinate an airstrike that targets these key elements that you’ve identified. We'll use small but highly accurate munitions."

  Mike raised an important question, "How do we ensure that we hit these targets precisely?"

  The general turned to his team, and a military analyst stepped forward. "We have flight crews located in Guam, flying B-2 Spirit stealth bombers. These aircraft are equipped with advanced targeting systems and precision-guided munitions. The hyper-sonic cruise missiles will penetrate Chinese air defense and take out the targets. We have real-time communication with the flight crews, and they'll receive the updated coordinates you’ve provided."

  Amber chimed in, "What's the timeframe for the mission?"

  General Ramirez glanced at his watch. "The bombers will be in the air and en route to the target when USCYBERCOM reports that we have reached the critical point you’ve designated. Then we will act quickly to execute the mission."

  Mike nodded. "Let's speak with the flight crew and provide them with the latest coordinates. We can assist in the real-time adjustments using our technology."

  The team immediately got to work. Amber and Jonah established a secure communication link with the flight crew, relaying the coordinates and ensuring they had the most up-to-date information. Mike monitored the preparation of the operation from the command center, ready to provide technical assistance if needed.

  As the minutes passed, tension filled the room. The fate of the mission hung in the balance, and the team knew that the success of Operation Hammer was critical in defending the nation against the relentless cyber threats posed by Unit 398.

  As the Turing team left the base, General Ramirez said, “Rest assured, we will be ready when USCYBERCOM gives the order.”

  Mike said, “We hope that can be avoided, but at this point its reassuring this backup is available.”

  Chapter 35

  Dynamo

  He felt a pang of Déjà vu as he, Amber, and Jonah huddled together in the NSA facility. It was not as sophisticated as the Turing Institute’s, but it offered a real-time connection to military operations.

  They were fully immersed in their complex task.

  Mike, with his unrivaled creativity, led the charge. He was the visionary, the architect of this digital fortress that would redefine cyberwarfare rules.

  Amber, her eyes never leaving her terminal, provided invaluable insights. Her deep understanding of the Algorithm's inner workings allowed her to anticipate its responses. She could adapt the Dynamo fix accordingly.

  "Alright," Mike began, his voice steady but determined. "We know that the Chinese AI Algorithm is constantly evolving and adapting. To defeat it, we need a code that can outthink its every move. We must be creative and anticipate its strategies."

  Amber nodded in agreement—her eyes fixed on a holographic display of the Serpent. The complex virus of cyberattacks that the Chinese AI Algorithm had launched against the USA's nuclear deterrence facilities were approaching the tipping point.

  Jonah chimed in, "We also know that the Serpent is constantly probing our defenses, looking for weaknesses. We need to create a digital shield that can not only repel these attacks but also gather intelligence on the Serpent itself."

 
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Add Fast Bookmark
Load Fast Bookmark
Turn Navi On
Turn Navi On
Turn Navi On
Scroll Up
Turn Navi On
Scroll
Turn Navi On
183