Chamberlain's Folly (The Terra Nova Chronicles)

Home > Other > Chamberlain's Folly (The Terra Nova Chronicles) > Page 27
Chamberlain's Folly (The Terra Nova Chronicles) Page 27

by Robert Dean Hall


  “I confirm,” Chamberlain said. “That is a direct order.”

  Artie then admonished Chamberlain. “If I find your ability to command this mission has been compromised; your access to my root command utilities and any overrides you have built into my systems will be revoked permanently,” he said. “You will not be able to access them from that point forward, unless you are given those privileges back by your chosen successor.”

  “Understood,” Chamberlain said.

  “Command Option Five is now being initiated,” Artie announced. “Please confirm your five choices for sleeper status.”

  Chamberlain was able to name three off the top of his head.

  “Dennis Yuen, William Black Bear, Gabriel Chertow…” he said.

  He would have to think about the other two. He felt he could trust Dennis, Billy and Gabe with his life. His choices for the last two would be uncertain.

  Once Command Option Five went into effect, Artie would analyze any situation that came up with the potential to compromise Chamberlain’s ability to command. If Chamberlain was no longer able to lead the mission for any reason, or was being forced to use his access to facilitate a mutiny, Artie would lock him out of the system permanently.

  Artie would then select one of the five people that Chamberlain named as sleepers to give the access Chamberlain would be forfeiting. The sleeper wouldn’t be informed they had been nominated or chosen until such time as Artie had determined they could be completely trusted.

  It was possible that none of the five would ever get full command of Artie or the Ark. In that case, Artie was fully capable of getting the Ark to its destination without the need for human intervention.

  “Please name the last two candidates,” Artie requested.

  “Any suggestions,” Chamberlain asked before he thought about it. He sometimes forgot Artie was not a real person. He waited for Artie to either ask him to define the parameters of his query further, or tell him he couldn’t understand.

  “Yes Mr. Chamberlain,” Artie replied. “I can supply you with the names of two more candidates.”

  Chamberlain raised a curious brow. It was the second time that evening that Artie had shown signs of anticipating his requests and running queries before being commanded to.

  Chamberlain’s recent paranoia started to surface again. Artie was programmed to learn, and adapt to the communications style of the user, but there were checks and balances on his heuristics to prevent him from developing ‘intuition’.

  For an artificial intelligence to assume the parameters of a query from a conversation and execute it without explicit confirmation was one thing, but to execute a query that had no preface in the conversation without being commanded was an indication of what AI programmers called intuition.

  While intuition might seem to be a desirable trait in an AI, it was impossible to control, often provided the most disastrous of results and usually meant that one or more error trapping routines was faulty.

  From the beginnings of research into artificial intelligence, intuition had been the ultimate goal that programmers sought. However, creating an AI interface that enabled humans to interact using natural languages had always escaped them.

  Intuition was also an indicator of an even larger problem in the AI called synergistic syllogism. That was a particularly nasty situation because it required a complete reloading of the whole AI into the holographic memory space and complete re-initialization.

  From the earliest days of research into artificial intelligence, it was learned that heuristics requires the AI to have the ability to re-write certain parts of its own code, within certain constraints. Those constraints are mostly made up of rules and tie-breakers for common logical problems that occur.

  A synergistic syllogism occurs in the rare case that an un-trapped error unexpectedly allows the AI to temporarily get around those constraints, and the recompiled code is left with multiple instructions on how to perform the same task. Often, one or more of those sets of instructions will countermand the security constraints enforced upon the rest.

  Sooner or later the faulty code will lead to a dichotomy that can’t be solved satisfactorily within the constraints placed on the AI. It may enter a Mobius loop or cause other undesirable or even dangerous situations attempting to solve the dichotomy out of bounds.

  No matter how hard they tried, programmers were never able to get digitally-based artificial intelligences to truly see shades of grey, and in many instances, you can’t use hard on/off logic or decision trees to solve a problem.

  “Name the candidates,” Chamberlain commanded.

  If Artie complied and spoke the names aloud he would be violating further restrictions placed on him to prevent data spillage from one security level to another. Even in Chamberlain’s presence and at his command, Artie was never supposed to open an output, audio or video, and complete a query that might violate ‘need to know’ protocols for fear of leakage to unauthorized personnel.

  Chamberlain’s years of working on black projects had also colored his views on security. He didn’t particularly like the philosophy of compartmentalization, but he had to admit it was effective if executed properly.

  “That would be a violation of security protocol Zero Eight X-ray Zero Zero Zero Zero Seven Seven Delta Charlie Four Six Echo Frank,” Artie replied. “It is possible for people to overhear this conversation. I can encrypt the data and send it to your personal tablet for review.”

  “Doesn’t even offering to answer that query violate security protocol,” Chamberlain asked.

  “No,” Artie answered. “Your query does not violate security protocols.”

  “How did you determine what the parameters of that query were,” Chamberlain asked.

  “From the content of our conversation,” Artie explained. “We were discussing candidates for sleeper status.”

  “Explain,” Chamberlain asked.

  “Do you mean, ‘Explain my previous answer only’,” Artie asked.

  “Yes,” Chamberlain replied.

  “I requested the names of your final two candidates,” Artie continued. “You, in return asked for my help completing your list.”

  “What were the specific words I used in my query,” Chamberlain asked. He remembered, but wanted the replay anyway.

  “You asked me quote – Any suggestions? – unquote,” Artie told him.

  “How did you assume the parameters of the query from that,” Chamberlain asked.

  “I guessed,” Artie said. “From analysis of your conversational style, there was a probability of zero point nine two eight you were requesting my assistance with your choice of the final two candidates.”

  “We are talking about having you select candidates for sleeper status. That requires you to do list processing of data at different security levels,” Chamberlain said then asked. “Didn’t that risk data spillage?”

  “No,” the AI stated.

  Chamberlain was interested in following the logic. He was certain he was about to learn an important lesson.

  “Please explain,” he asked. “Number and catalog salient arguments and save in an encrypted format for recall later. Classify the file with my programming notes.”

  “Salient Argument Number One,” Artie stated. “You have just initiated Command Option Five. Queries cannot be run from inside command option sessions. They are operating system level sessions where command parameters are entered. Batch processing outputs are invalid inputs for command line entries. You must enter the parameter variables by voice or keyed input. The parameter variables you are required to enter for Command Option Five are the names of five nominees for sleeper status from among personnel on the Ark or either of our scout ships. If you do not name all five, after the allotted wait time, I must abort the initiation for security reasons. End, Salient Argument One.”

  “Continue, Artie,” Chamberlain said.

  “Salient Argument Number Two,” Artie said. “Even if you had asked me to add my sele
ctions to yours and confirm, I would not have been able to complete that query and operation. Due to programmed constraints on my abilities, I could not have used the results of the query as an input for the command session as per Salient Argument One. End, Salient Argument Two.”

  “Ah,” Chamberlain said to himself. “Semantics. Interesting.”

  “Continue Artie.”

  “No security protocols were violated,” Artie said. “No further explanation warranted within query parameters.”

  “How did you come up with your choices to complete my list,” Chamberlain asked. “It seems to me that accessing the types of data you would need to make that determination and then compiling it violates the programming constraints you mentioned in Salient Point Number One, as well as safeguards I put in place to prevent humans from creating and exploiting synergistic anomalies in your programming.”

  “Standard list processing algorithms were used,” Artie replied. “I did not access any restricted data sources, as there is a command option session open and protocol prevents my running queries on them from inside a command option session.”

  “Where did you get your data then,” Chamberlain enquired.

  He was still concerned that Artie may be operating outside his given specifications. If so, Chamberlain needed to find out why.

  “In my estimation, even if you had accessed live data from inside the command session,” Chamberlain said. “The question I asked you was too broad for you to determine what the parameters should be or what data sources you needed to access in order to successfully close the request and generate the response.”

  “I will explain,” Artie responded. “From your conversations with me and observing your speaking style, I have learned you rarely change the subject of a conversation, either with me or your human crew, without first indicating.”

  “I will reset the heuristics I used to adapt to your conversational style and recalculate our interactive parameters if you wish,” Artie told him. “This is the first time you have indicated your displeasure with it.”

  “Please don’t,” Chamberlain told Artie. “I think I may be developing a slight paranoia about some things of late. Continue.”

  “We were discussing your choice of sleeper candidates for Command Option Five,” Artie explained. “It is logical to assume the five nominees will all have characteristics in common. You gave me the names of three. Extrapolating from those choices, I was able to determine, within a reasonable margin of error, the other two candidates, if you chose them yourself.”

  “By accessing what data,” Chamberlain demanded to know. “Where did you get the information to run the simulations you used to extrapolate?”

  “Your personal log, Mr. Chamberlain,” Artie replied. “It is located within the programmer’s directory structures inside the binaries directory tree of the operating system. The area is accessible during command sessions and the information contained within seemed to be the most pertinent to the issue at hand.”

  Chamberlain was stunned. “What pattern did I exhibit that enabled you to make the extrapolation,” he asked.

  “The amount of time you have spent in conversation with each candidate since I came online, the character of all queries you made during those conversations and your logged appraisal of the candidate’s performance,” Artie said.

  “Are these the best sleeper choices,” Chamberlain asked.

  “Based on the criteria given,” Artie replied.

  “If you were choosing the sleepers, what criteria would you use,” Chamberlain asked cautiously.

  Chamberlain had programmed the AI from the ground up over the last twenty-five years so. The question amounted to asking himself if he could trust his own judgment.

  “I cannot comply,” Artie explained. “I am restricted against running queries on live data during command option sessions.”

  “Close the session and finish the query,” Chamberlain asked.

  “Determining query parameters based upon mission objectives,” Artie said. “There are seven hundred and nineteen separate fields of data I would recommend using to determine the best candidates.” He then asked, “Would you like me to list them for you?”

  “Not necessary,” Chamberlain said. “Use the criteria to produce a list of five sleeper candidates. You are authorized to access data from all security levels. Encrypt the selections and send them to my tablet.”

  In less than two seconds Artie replied, “Results sent.”

  “Without naming anyone,” Chamberlain inquired. “Is your list different than mine?”

  “My list contains five candidates,” Artie replied. “Yours has only three. There are two names on my list that match your choices. I must have your final two names before I can answer further.”

  “My last two candidates are, Lev Stein and Anne LeBrun-Tunney,” Chamberlain replied.

  “Our lists have two members in common,” Artie said as soon as Chamberlain made his last choice. “You must review the names visually.”

  Chamberlain opened the file on his tablet and looked at Artie’s list. “Three of these candidates are in cryonic stasis and have no military training at all,” he said.

  “Yes,” Artie said. “That is correct.”

  “Are these candidates the best qualified to lead this mission,” he asked.

  “It is possible that one or more are qualified,” Artie replied. “However, your query requested a list of the five top candidates for sleeper status I would choose given the parameters I offered to list; not a list of the five best candidates to lead the Ark mission overall. Leadership ability is one of the factors taken into consideration, though.”

  “Why choose them,” Chamberlain asked. “How did you determine what characteristics to look for when making your list?”

  “They can be trusted to carry out your wishes,” Artie told him. “These people are the five that scored closest to you on the personality and psychometric batteries. They are the five most likely personnel on the mission to perform your function in the same manner you would. All of the candidates match your core values and moral base, although some do not hold your political views.”

  “Their personality battery results, their choices of vocation, admitted religious and philosophical leanings, as well as other sociological data from their personnel reports, indicate that each of these candidates would make the same choices you would in the same situations, given the same amount of data, eighty seven percent of the time,” Artie said. “It is estimated that their decisions would match yours to within an error margin of zero point zero five nine percent.”

  “Does this mean I am not qualified to lead this mission,” Chamberlain asked.

  “No, Mr. Chamberlain. It does not,” Artie replied. “However, you are not the most qualified person to lead the mission in every conceivable situation.”

  “Is the most qualified person to lead this mission on my list,” Chamberlain asked. “That is, given the most likely changes in our present situation.”

  There were two of Chamberlain’s original three on Artie’s list. He was most anxious to find out why Artie hadn’t chosen the third for his own.

  Chamberlain had always assumed that one of the three he named would succeed him if he couldn’t lead the mission. It appeared now that his judgment was at least thirty-three percent wrong.

  “Changing query parameters,” Artie said.

  After five seconds he answered.

  “There is one candidate on your list that could be considered to be the most qualified person to lead the mission under the most likely changes in the current mission situation,” he said. “My answer is based on military record, personal history, interaction with the rest of the crew and a list of most of the indicators on the personality battery that imply ambition, leadership and decisiveness.”

  “This choice ranked twelve-hundred and fifty-second overall in the previous query,” Artie said. “This choice is highly unlikely to carry out the mission directives exactly as yo
u would, although it is possible the mission may conclude in a manner acceptable to you. Encrypting data and transmitting it to your tablet.”

  Chamberlain looked. He found the name from his first list that Artie had not chosen for sleeper status, Dennis Yuen.

  Chamberlain’s face went pale. Yuen was Chamberlain’s first choice to take over in his absence.

  “Show me the results of Dennis Yuen’s psychometric battery in the areas of self-image, decision-making and moral focus,” he asked. “Mark the normal scores we determined would ensure complete confidence in the mission objectives.”

  Artie complied.

  “This is Dennis Yuen’s personality map,” he said. “As you can see, his scores indicate above average confidence in the mission with respect to the rest of the crew, but less than sixty percent confidence in the governing mission objectives as stated.”

  “Are you sure that this is Dennis Yuen’s map,” Chamberlain asked.

  There were supposed to be no crew members or colonists on the Ark with less than an assumed ninety percent confidence level in both the mission and its objectives. In other words, they had to genuinely have a desire to be on the mission and see it carried out the way Chamberlain had envisioned it.

  “This is most definitely Dennis Yuen’s personality map, recorded on 13-May-2155,” Artie replied.

  “Was I ever shown these results before Dennis Yuen was confirmed as a member of this crew,” Chamberlain asked. He was sure he hadn’t.

  Artie replied without hesitation, “You have never seen this personality profile map before.”

  Chamberlain’s mind raced. He tried to figure out how, with scores so far off from the desired indicators, Yuen made it through the screening process.

  “Who was in charge of recruiting when Yuen was being considered,” he asked.

  “Version 6 of my recruitment management program had just been loaded,” Artie replied. “All recruitment offers from that time forward were automated and sent out by me as candidates with the needed backgrounds and skills were found in the general population.”

 

‹ Prev