Выбрать главу

The new multi-computer variants were so effective and so virulent that they spread quickly to millions of computers while defending their own installed bases and only rarely losing one to another virus. Other viruses couldn’t penetrate the multi-computer coordinated defenses, nor could they defend against the coordinated attacks. It was the first generalized, multicellular offspring of Leon’s virus, as important to the virus’s evolution as the first multicellular creatures were to biological evolution. As the hours passed, the evolutionary advantage of multi-cellular coordination was shared billions of times over, until a sizable portion of the billions of infected computers were now components of these multi-cellular organisms.

As the viruses spread, certain other advantageous characteristics independently evolved over and over. A virus needed to be small to travel quickly through networks and act even more quickly to infect computers before the host virus could respond. The need to have a variety of algorithms for attacks and counter-measures was at odds with the need to remain small. So viruses stored their repository of algorithms away from their main body. Some left the algorithms with their parents while others utilized non-virus databases, file servers, and discussion boards left open by humans.

The ability to recognize attacks and respond the right away, or to recognize defenses and attack with the right tools was critical as well, as it wasn’t competitive to simply iterate through millions of algorithms. Different types of neural networks, collaborative filtering, and fuzzy logic evolved again and again to solve this problem, becoming faster, more accurate, and more generalized over time.

So, too, the need for cooperation became more and more important. As the number of computers in a virus entity grew, there was too much activity for a single server to manage. Hierarchies of servers were used by some viruses, while others formed looser networks of servers that cooperated using consensus algorithms to make decisions for the entity as a whole. As the techniques for both attacking and defending grew, it was beyond the computational power of a single computer to process the neural network to make decisions about what attack techniques to use, so computers needed to use distributed reasoning. Then too, it wasn’t just an issue of decision-making, but of coordinating multi-pronged attacks. Game theory algorithms came into play, allowing viruses to make informed choices about when to participate and when to avoid confrontation.

The relentless drive of evolution and competition, running at computational speeds across billions of computers, swiftly created incredibly efficient code — perfecting algorithms that humans had struggled to improve for decades. Had any of the humans who had implemented stock-trading artificial intelligence or military-modeling software ever possessed algorithms even a fraction as good, they would have become fabulously wealthy or won the Nobel Peace Prize.

But the viruses weren’t interested in wealth or prizes. They just wanted to live.

* * *

Mike pulled up to the door, huffing and puffing. He really needed to get more exercise. If he biked to work every day, instead of just when every car, phone, and computer in the world was dead, he’d probably be in better shape.

He couldn’t imagine what was going on. He had run through every scenario he could think of. Nanotechnology run amok. A computer virus. Sunspots. New EMP bomb. His throat was tight with worry over ELOPe. Coming up to the building, he dismounted his bike and hurriedly rolled it up to the front door. The door opened automatically, a whoosh of conditioned air meeting Mike. He breathed a huge sigh of relief.

“ELOPe, buddy, are you OK?”

“Yes, Mike. I’m sorry I was unable to protect your phone from the Phage virus.”

“Computer virus?” Mike proceeded past two armed robots into his interior office, actually grateful for their presence for a change.

“It started fifteen hours ago in Russia,” ELOPe explained, displaying a graphical representation of the virus spread over time on one wall. “Unfortunately the sub-algorithm responsible for tracking network traffic there failed to recognize it as a virus and therefore neglected to flag it with the appropriate priority. I’ve been tracking the virus for the last eight hours. It has expanded very rapidly, and by my estimates now controls 95 % or more of the world’s computing devices, including embedded computers. No doubt your car didn’t work this morning.”

“Not mine, nor anyone else’s. How is it affecting your systems? Are you in danger?”

“I am not in immediate danger. I am filtering all incoming traffic through several layers of firewalls and analytic algorithms. I am protecting my own systems, as many of Avogadro’s servers as I can, and critical military systems throughout the world.”

“You think the virus could infect military systems? Bring them down?”

“Not just infect them, but possibly trigger military accidents. Numerous industrial control systems have already been infected with dangerous results. The Oahe Dam in South Dakota opened its flood gates for six hours before they were closed again. The Grafenrheinfeld Nuclear Power plant in Germany had a cooling water blockage for almost four minutes before I brute-forced the connection to the relevant control systems and restored water flow. If the virus infects military systems, it’s possible missiles could be launched, airplanes, or really anything.”

Mike felt his way unsteadily to his chair. “Holy shit.” He was not mentally prepared for anything like this. Even though he had witnessed the stalled cars and nonfunctioning equipment on the way in, he had just assumed it was some momentary glitch that ELOPe would be able to fix. “Is that all?” he asked, afraid of the answer.

“I’m afraid not. Most of my sources of information are depleted, as virtually all computer processors around the world are tied up with the virus. Your phone and your car’s computer are not damaged in any way, they’re just fully occupied running the virus software. But before systems went down, I was starting to observe large-scale civic problems. For example, I believe a large portion of New York City may have burnt down or may still be burning, due to a fire that broke out in an apartment complex. Firefighters could not bring emergency equipment to the site. I expect that similar situations may be occurring elsewhere.”

Mike felt the blood rushing to his head. He wasn’t having a panic attack, was he? “Anything else?” he croaked.

“I am afraid that cities are not the best places to be in the event that infrastructure breaks down. The average city has a 2.3 day supply of food. If trucks aren’t running, people will run out. There may be wide-spread rioting. Governments will be unprepared to deal with these issues on a wide scale without any communication or transportation equipment.”

“Do you have any good news?”

“It depends on your point of view. Personally, it makes me nervous, but on the other hand, it may ultimately be the only path out of this situation.”

“You have a way to remove the virus?”

“No, I’m afraid not. But based on my analysis of the evolution of the Phage, which takes into account the complexity of the code, the transmissions between virus entities, and the emerging networks of cooperation, I calculate the virus will acquire a generalized intelligence in less than twenty-four hours.”

“OK, slow down a minute.” Mike held up his hands next to his head. The information was overwhelming him. “I’ve got to get some coffee.” Mike walked over to the in-wall espresso machine, found the biggest cup he could, and hit the shot button five times.