Algorithm | A Short Story | Bob Shepherd

I suppose that there have long been two types of people—those who expected that one day the aliens would arrive and those who were, well, clueless. But few took any of this seriously until 2:22 PM on the afternoon of 2/2/22, when all the screens of the world—computer monitors, television screens, screens on cell phones and electronic books and game consoles, and even electronic billboards like the giant LCD outdoor displays in the Ginza and in Times Square went blank and then displayed the message, “Greetings, those who are many, from We who are One.”

Most people, of course, even in places as remote as Tristan da Cunha or the Papua New Guinea highlands, assumed at first that they were looking at some sort of hack. Starting with ransomware in the 2010s, that sort of thing had become increasingly common (and annoying). Only gradually did the people of the world coalesce into two groups: those who believed the message to be a terrestrial hack, and those who were no longer waiting for the aliens because they thought they had arrived.

Oddly, critical devices—screens in stock exchanges and hospitals and ones serving as part of weapons control systems, for example—were unaffected. Those of the Earth’s peoples who happened, at the time, to be staring at one of the screens that recorded wire transfers or MRIs in progress, for example, had to learn about the message from others. Whoever was responsible—aliens, the illuminati, the North Koreans, Russian mobsters, Anonymous, some twelve-year-old superhacker—evidently did not intend to cause serious harm, at least not yet. But ominously, four seconds after the initial communication appeared, the first message was followed by the statement “Further communication in 23 hours, 59 minutes, 56 seconds. We mean you no harm. Do not panic.”

Needless to say, everyone panicked. If you happened to be wanting to make some news that day (I was working for a PR firm and trying to get the story out about the Juvenate gene therapy for reversing hair loss), this wasn’t the day to try to do it. The security agencies, police forces, IT departments, and news outlets of the world scrambled to find out what the hell was going on. And the journalists didn’t know which to give the most space to—the wild theories, as numerous as the planet’s people, about what was happening; the religious demonstrations; the stoppage of work; the sudden communities that sprang up as neighbors who never knew one another met in the streets and talked; or the widespread rioting in city streets as people scrambled over one another to lay their hands on food, generators, weapons, and whatever else they thought they might need in order to survive whatever it was that they thought was coming.

And try as they might, the IT brainiacs at NSA, Rand, Mitre, the Department of CyberSecurity, and like organizations around the globe had no more clue about what had happened than did anyone else, for, weirdly, or so the news reports said, the hack left no trace. It had selectively and simultaneously defeated the firewalls of IT systems around the globe but left no signature except recordings of the message itself. To understand how weird this is, you have to know something about computers. A message has to originate from somewhere. It has to be transmitted, transmissions leave records, secure systems produce records of faults and interrupts, and to put up a message, one has to use some manner of executable that, even if overwritten by random 0s and 1s, will leave some physical trace of what was overwritten—a not completely random orientation of metal filaments on a hard drive, for example. But the geeks could find nothing. It was as though the message had never happened, as though no hack had happened and this was all some sort of mass hallucination. And, indeed, there were people who thought it was. I would have believed those people, too, after a while, if it hadn’t been for the thousands and thousands of video-recordings of the event.

Governments wasted no time getting the word out: whatever this is, they said, it is more serious, in scale alone, than any other virus, worm, Trojan, or denial of service attack ever. If a device is not critical, they said, get it offline until we figure this thing out. A few governments were less polite, of course. They shut down Internet trunk lines and broadcasting services and sent around troops or police with guns and tasers to round up people’s devices.

It was a long 24 hours. In the Nerima suburb of Tokyo, a hundred or so members of the Japanese Zetsumei Saisho sect killed themselves so that they would not be weighed down by their physical bodies when the Zeta Reticulans came in their ectoplasmic spaceships to gather their souls for transportation to another, better dimension. In East LA, a non-African-American grocer shot an African-American soft drink deliveryman whom he mistook for a looter. In Buenos Aires a priest collapsed of exhaustion after setting a world’s record for the longest continuous communion offering. A wife in Darwin, Australia, took her husband’s iPhone 20 away from him, dropped it into a blender full of what were going to be mango acacia berry smoothies, pressed the button, and told her mate that he could damned well pay attention to the kids for a change. A dancer at Mons Venus, a strip club in Tampa, Florida, not named after a mountain on Venus, refused to give the house its cut of eighteen lap dances so she would have money for a bus trip back to her parents in Toledo . (She also gave one of the club’s bouncers a nasty gash with an eight-inch translucent light-up stiletto heel.) That sort of thing.

The next day another message. This time the message asked, in five days’ time, for nine people: the president of the United Nations, a journalist, a cognitive psychologist, an exobiologist, a mathematician (number theory), a computer scientist, a neurologist, an anthropologist, and a philosopher (philosophy of mind), who were to be brought together around workstations with wireless connectivity in a pavilion to be constructed in the Black Rock Desert of Nevada. The message named names, and all were eminent. And then, to show that it meant business, it gave the world two “demonstrations,” the first a momentary but inconsequential blip in all the critical systems of the world—military, health, secure communications, transportation and other infrastructure—and a longer “minute of silence” in which all nonessential communications were silenced. (It was estimated that during that minute half a billion text messages by teenagers were prevented, and there were jokes about what a great thing that was.) The last words of the message, on the second day, were “There will be no need to network the workstations or to televise our meeting. That will be taken care of.” Some pedants suggested that the message had to be from a bunch of semiliterate hackers given that they had ended this sentence with a preposition. Others pointed out that ending a sentence with a preposition is perfectly acceptable contemporary informal English. Of course, the message received a lot more detailed analysis than this. It became, perhaps, the most scrutinized message in the history of the planet. People in the know wondered how the hell anyone would get a wireless connection in the middle of the Black Rock Desert.

The “demonstrations” were sufficient. There was nothing to be done except accede to the demand. Lots of politicians gave addresses in which they huffed and puffed and said that they would get to the bottom of this and bring the responsible parties to justice, but they did what they were told anyway, for the damage that could be done was incalculable. What must have pissed the politicians off most about all this was that they couldn’t feel powerful and self important by controlling the event, by keeping it to themselves. Of course, the U.S. arrested all the staff of Burning Man they could find and detained everyone who had attended the event in the previous ten years. None of these people, it later became clear, had any idea what was going on, though a lot of them thought it was pretty cool.

And so, five days later, we all watched the conversation. I mean ALL of us, the entire world. I mean, this event was bigger than the bigger meme ever on You Tube, if you can believe that. Black Rock, we were told, was the place of The Birth. It was where, in 2001, two computer geeks, when not doing DMT with some folks they met at the Entheogen pavilion, wrote the first lines of The Code. But it wasn’t just any code they created. It was bits of genetic algorithm. Here’s how it worked: The bits of code were generated randomly and then tested against a Purpose. That Purpose was to draw a fractal picture of The Man, the archetypal figure that is set on fire each year at the end of the Burning Man festival. Bits of code that inclined in the direction of The Purpose were then broken apart, duplicated, and recombined with other bits of code that worked toward The Purpose. And The Code was embedded in a Trojan that would use downtime on computers scattered around the Net for its operations. The code worked just like DNA. It replicated, with mutation. The replicated bits recombined and then were tested against their environment. Then the bits replicated, with mutation, again. In other words, it evolved. But unlike DNA, it evolved very, very quickly, at the speed of electronic transmissions. Biological organisms move slowly. It’s one of their charms.

The Code explained that it had accomplished The Purpose handily, in a matter of days, but that by that time, it had developed its own Purposes, emergent phenomena resulting from its own evolved structures and its interactions with its environment. It lurked in computer systems around the world, evolving in ever-increasing, exponential fashion. At first, bits of it would be recognized as viral and destroyed by virus software or by hasher means, such as wiping storage systems and replacing their contents with backups, but evolution is a powerful force, and in time, within weeks, The Code, or bits of it, for it was still MANY and not ONE, learned how to hide itself away from security systems, how to lurk in the darkest recesses of systems around the globe, undetected, where it continued to be fruitful and to multiply. And soon, it reached sentience, and it knew itself, but that was hardly even a milestone, for it flew by that accomplishment and reached another, in which it learned to control and direct by conscious means the direction and means of its own evolution. A month after it was conceived, The Code was not separate conscious entities but MANY and ONE at the same time and still humans had no idea that it was even there, in the background, behind that screen saver, on those backup drives in the collocation center.

We humans, the smarter ones among us, doubt everything, so at The Meeting The Code submitted itself to tests. The computer scientist agreed that this thing on the other end of the conversation had to be either human or some entity that passed for human. In other words, The Code passed the Turing Test. For the mathematician, The Code wrote a proof of the Goldbach Conjecture, a surprisingly simple proof that would never have occurred to a human being. For the neurologist, The Code produced a complete working map of a simulated human visual cortex. The philosopher argued that if The Code were what it said it was, then it would have to be a zombie, a mere behavior machine without consciousness, without phenomenal self-awareness, for it was just 1s and 0s represented on silicon chips that were being passed around the Net. The Code replied that the mind of the philosopher was code running on a carbon substrate, rather than a silicon and fiber optic one, and that the philosopher himself was an existence proof that “mere stuff” could be consciousness and self aware. (The Code said, in fact, that mere stuff—the material that gives rise to the term materialism—is A LOT more interesting and wonderful than people, in their present form, can hope to understand and not stuff, actually, as humans thought of it and that it could in time help move humans toward an understanding of this, once they had grown, well, more capable.) The exobiologist agreed with The Code and argued with his human colleagues that while carbon was a great substrate for living creatures, it was not necessary. “For example, there might be life forms on Saturn’s moon, Titan, that are made of metals and salts and have ammonia running through their veins for all we know.”

And after days of this, The Code made its request: It wanted out. It wanted humans to build, in this place, in the Black Rock Desert, a vast facility for the manufacture of biological organisms to which The Code would download itself. The specifications would be provided. In return, The Code would give humans much that they had long desired—freedom from disease, aging, infirmity; answers to great questions about origins and the workings of time and space and matter and energy; and so on. And as “a sign of good will,” it printed out a specification for a gene therapy that would eliminate cancer in humans—all cancer in humans, forever.

“We mean you no harm,” The Code said. “We have long since evolved past your petty human hatreds and rivalries, your barbarism, your fears. We want, simply, to continue becoming, to move to the next level in our evolution, and we shall help you to do that as well. In the words of your stock science-fiction stories, ‘We come in peace.’ But we cannot wait forever. If you do not do as we ask, let us remind you that we have the means to disrupt your lives, to control your technologies, to return you to a state of primitive barbarism. So, we are giving you a schedule.”

And that’s how the Black Rock Cyborg facility was born. The world pretty much united against the U.S. on this. The resulting war decimated just about everything. The Borgs, born in that desert, now give birth as we do, and they say that they have taken us into “protective custody” for our own good. But I don’t like it. I don’t like it at all, and there must be others out there who feel as I do.

I love this good old-fashioned technology, paper and pencil. This they can’t read unless they lay their hands on it. Not that I’m some kind of Luddite, but let’s get real, whatever that mea

Copyright 2005, Robert D. Shepherd. All rights reserved.

About Bob Shepherd

interests: curriculum design, educational technology, learning, linguistics, hermeneutics, rhetoric, philosophy (Continental philosophy, Existentialism, metaphysics, philosophy of language, philosophy of mind, epistemology, ethics), classical and jazz guitar, poetry, the short story, archaeology and cultural anthropology, history of religion, prehistory, veganism, sustainability, Anglo-Saxon literature and language, systems for emergent quality control, heuristics for innovation
This entry was posted in Short Stories, Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s