Novels2Search
C.A.R.O.L.I.N.
TEMPERANCE Chapter FOURTEEN - [transcript to follow]

TEMPERANCE Chapter FOURTEEN - [transcript to follow]

… override security… decrypt data… open file… download…

CHAIRMAN ROSWELL: The United States Senate Subcommittee on Weapon Systems Development and Procurement, pursuant to sudden notice, with the Honorable Senator Roger Roswell presiding, will come to order.

We welcome everyone to today's hearing. Although sudden and unannounced, meetings such as this are not unprecendented. This is, however, an unusual hearing. The issues we will consider today range from reclassification and privacy concerns in general, to specific developmental goals and project renaming, pursuant to the enforcement of National Security Agency guideline in regards to classified data, information technology and weapon systems development.

We have fourteen members on our committee, each of which will be given an opportuity to address their concerns, and ask questions of Professor Turing, who is also presiding. Be aware, please, that the hearings of this subcommittee are classifiend, and may not be discussed outside the walls of this room without express written consent of both the chairman of this committee and the chief of the NSA. We will do our best to keep things moving and, given our circumstances, those presiding will have the right to speak freely and candidly while seated in this room.

I would like to remind everyone that a time limit of five minutes on opening statements will be strictly enforced. After an opening statement by Professor Turing, we will proceed, in order of seniority, with each committee member's opening statement.

PROF TURING: Chairman Roswell, Ranking Member Ron Schwertz, and Ranking Member Rosalind Cassio, and other members of the Committee, we face a number of important issues surrounding the use of artifiicial intelligence and robotics, both on and off the battlefield. Safety, morality and ethics are some of the concerns that come to mind, and you rightfully have hard decisions to make. Before I talk about the gains I have made in regards to the C.A.R.O.L.I.N. Project, I want to adress how I believe the future use of the Project should unfold.

The C.A.R.O.L.I.N. Project is focused on promoting and exploring all the good that can come from having a computer program that—to the best of its ability—is able to think and act like us. People everywhere will benefit when this revolutionary new tool is used to better their lives. It is also clear that we must make sure that no harm comes to any human from the tasks that we assign to the Project to perform. A broad view of responsiblity, from lawmakers and innovators alike, must be kept close in mind when decisions for its use and deployment are made. As the sole creator of the Project itself, I stand alone as bearing the fullest brunt of any ramifications its deployment ensues.

It is not enough for me to say, 'Here's this tool. Use it as you wish.' The C.A.R.O.L.I.N. Project is powerful. It can do what we can do, to save us from the hardship of labor and the misery of dangerous jobs, but it can also do what we cannot, and cause irreparable harm. We must take the utmost care in not merely employing the Project to do tasks, but also in making sure it leads to good.

It will take time to address all the perils and benefits the deployment of the C.A.R.O.L.I.N. Project entails. Of utmost concern is the right people have to live free and unfettered lives. A system of integrated networks like the kind C.A.R.O.L.I.N. can control may easily lead us into bondage—creating a world where people are controlled by a malevolent system, rather than being protected. So here are a few things we can do to both promote its proper and safe use, and prevent its possible misuse.

It is easy for a network like the one C.A.R.O.L.I.N. can control to be used with malicious intent, setting up the Project to spy on law-abiding citizens, for example, or improperly accessing their personal data, and using it to affect their lives. We're working with other developers and departments, throughout Curry College and abroad, to instill not just the respect of propriety, but also to give the Project the emotional capacity it needs to derive right from wrong. Embedded within C.A.R.O.L.I.N.'s network is Behavior Recognition software, giving it the both the knowledge of how harm comes from bad intent, and how good comes from altruism. We work tirelessly with the Project to ensure that any acts and decisions it makes are based on goodwill and merit, and not personal or selfish gain. Furthermore, we make sure that no one improperly uses her, or any part of her program, investigating and vetting every request for the implementation and use of this powerful computerized system.

We will make sure that no one person, entity or company, ever possesses her in its entirety. The C.A.R.O.L.I.N. Project's core program shall remain always unique, and be the sole property of The United States. Foreign governments, both friendly and hostile, corporate entities, both domestic and international, political parties, affiliations and unions will never have access to Project as a whole. There will be only one C.A.R.O.L.I.N. and she will never be copied. The C.A.R.O.L.I.N. Project shall be, and must remain, forever unique.

There is more that I can say, which you will find in my written report, and much we need to do, to ensure that The United States Government remains the sole proprietor of the C.A.R.O.L.I.N. Project, and that it never be used for individual gain or profit. My top priority for creating her has always been bringing aid and comfort to the people of the world as a whole, protecting them and encouraging them to be more than what they might have been without C.A.R.O.L.I.N.'s help. Billions the world over suffer from malnutrition, poverty, pollution and war. The Project can help solve these problems. The Project will help us solve them. for It is what it's designed to be—an educator and a confidant, to guide us and direct us, allowing us to become the best people we can be.

I believe strongly in the Project. I deeply care about what we are doing, and how we address these challenges. With your guidance and expertise, the human race will benefit from the policies you implement today. Thank you for inviting me here to discuss these ideals with you, and to address the possibilities the C.A.R.O.L.I.N. Project can provide, and I am now ready to answer your questions.

[The prepared statement from Professor Turing is available on request, to persons holding the proper clearance, as classified document SSWDP135-683d]

… override security… decrypt data… open file: SSWDP135-683d.pdf

As innovators and policymakers, we have a responibility to not just build and implement systems, but to make sure that they are safe. I am committed to bettering the world that we live in, while making it safe for others to do so as well. Protocols are put in place by governments and their agencies, to protect society in general from the harm our machines might produce.

The genuine version of this novel can be found on another site. Support the author by reading it there.

We need to restrict the access of third parties to the C.A.R.O.L.I.N. Project. Safeguards must be in place so that decisions made in regards to its use, and to the implementation of tasks the Project is to perform, are vetted by agencies and the officials in them who have the highest classification and clearance, within reason.

Software and hardware developers and designers need to sign confidentiality contracts, restricting what they can do with their data, and/or any and all specifications they are given in regards to the C.A.R.O.L.I.N. Project. Full forensic audits need to be done at every, and at the earliest, convenience, should suspicious activity be detected. If it is found that any individual or entity has acted improperly, either by using or abusing their clearance, or by gaining access to any part of the Project without authorization, they must be forever banned from having further contact with the Project, and all inividuals and parties involved.

We are a democratic nation, with values toward justice and prudence. No one person, nor group of persons, should be allowed the unfettered use of the power the C.A.R.O.L.I.N. Project commands, to usurp or override these ideals. While there is a known quantity of interference and malfesance coming from countries who wish to do harm, with your help and in concert with the full force of our government and our military, I will do my part as the sole proprietor and creator of C.A.R.O.L.I.N. to thwart any and all efforts to undermine our democracy. Our enemies will not succeed.

The cyber threat currently most active in the procurement of data on the C.A.R.O.L.I.N. Project is a group called CLP28, that the U.S. Governement has linked to Russian military intelligence. CLP28 utilizes hijacked servers, hacks and false accounts, all in an attempt to steal critical information on Linear Integrated Networks (L.I.N.s) such as the kind the C.A.R.O.L.I.N. Project controls, as well as other government subsidized computerized programs and projects, such as Behavior Recognition software, also being pioneered at Curry College in Dartmouth.

We believe, in conjunction with disinformation campaigns waged by groups sympathetic to their cause, both domestic and abroad, the end goal of CLP28 is that, if the source code of the C.A.R.O.L.I.N. Project cannot be obtained, these groups will spread fear and malcontent through the international populace in general, to promote distrust and confusion.

Rest assured that, in conjunction with all the force the U.S. government can bear against enemies both foreign and domestic, these efforts at theft and sabotage will not succeed. Their attempts have been verified and the culprits identified, and success has been made on many fronts to defeat them at their own game. Together, we work tirelessly to safeguard this most sensitve Project, and others like it, both current and to come, from those who wish to steal them from us, or use our gains against us, or for their own unauthorized and personal benefit.

There will always be organizations and governments who wish to do harm, using the research and technology we create against us. Security is a problem that can never be solved, but we will make it hard, if not imposible, for them to succeed. And with C.A.R.O.L.I.N.'s help, once she's on-line, it will become harder for them still. The issues I talk about today aren't issues DARPA Projects at Curry College face alone—they're challenges all of us must overcome, as policymakers, innovators and Americans.

… close file: SSWDP135-683d.pdf … return to transcript …

CHAIRMAN ROSWELL: The Chairman recognizes Ranking Member Ron Schwertz. I will remind members who may not have paying attention during my opening comments that we are operating under a five-minute speaking rule, and that applies to the –

[Laughter]

CHAIRMAN ROSWELL: And the five-minute rule applies to those who are Ranking Members on this committee as well.

SEN SCHWERTZ: Thank you Chairman, and I will endeavour to remain within my allotted time. Professor Turing. I want to start with how the C.A.R.O.L.I.N. Project is designed to collect and process enormous amounts of data—billions of times more, and billions of time faster than any human ever could. A significant amount of this data comes from sources outside the platform, and is processed in ways we don't understand. Do you actively monitor these sources? Are you aware of the method in which this data is processed?

PROF TURING: Senator Schwertz –

SEN SCHWERTZ: Please don't attempt to answer each of my questions individually. I will allow time for you to answer collectively, as I do have only five minutes.

[Laughter]

SEN SCHWERTZ: As you have said on many occassions, both in this chamber and to the world in general, parties outside of this government seek to profit from the hard work and success you've achieved. Have they succeeded in profiting? What have you achieved that can be deemed profitable? Do you know of any instances where data on the Project was improperly handled, or transferred to a third party in breach of contract? If so, how many times has this happened?

I yield now to allow you to answer.

PROF TURING: Thank you, Senator. We conduct full security sweeps with every program we write. The lab is kept in a state of lockdown, with access being allowed only to those whose names are on a very short list, both of students and of staff. These individuals have been verified and vetted, and their roles and duties are known, personally by me. If any one of them is found doing anything improper, or if they engage in suspicious activity, they will be immediately banned.

SEN SCHWERTZ: And have these sweeps be made? How many sweeps have been made? Has anyone on your team ever been banned?

PROF TURING: No, Senator. They have not. Sweeps are made nearly every week.

SEN SCHWERTZ: Nearly every week?

PROF TURING: Well this week, I am here.

[Laughter]

SEN SCHWERTZ: Yet outside sources have gained knowledge about the Project. Our enemies have attempted breeches. Some of them, however slight, have succeeded.

PROF TURING: They have not had any measureable success. C.A.R.O.L.I.N. remains secure.

SEN SCHWERTZ: Yet, Professor Turing. They have not had measureable success. Yet. Have you ever had to delete improperly obtained data, or rewrite security protocols?

PROF TURING: Senator Schwertz, we rewrite security protocols on a regular basis, not necessarily due to breeches –

SEN SCHWERTZ [interrupting]: Which you have had.

PROF TURING: – but more strictly due to the fact that, by regularly reviewing and rewriting protocol, attempts at theft are subverted. And I can assure you that my team follows up on, and takes seriously, every threat that we face.

SEN SCHWERTZ: Professor Turing, I'm going to assume, and I wish for you to follow up on this, that you will be able to provide the specific figures, procedures and dates of these weekly security sweeps, and any rewritten protocols, and attempts at theft, that you have.

PROF TURING: Yes Senator. I have, and I can. The information is readily available to members of this subcommittee, and those who have proper clearance.

[The information being referred to is available upon request, as document SSWDP135-683g.pdf and related files.]

… access files. Keywords: SSWDP135-683*.*, CLP28, "C.A.R.O.L.I.N. Project", "Security Protocol" … decrypt … collate and download …

Number of attempts made by unauthorized sources to access data on the C.A.R.O.L.I.N. Project:

1,150 attempts, 36,074 servers used, targeting 365,983 files.

Number of security sweeps made concerning access to data on the C.A.R.O.L.I.N. Project:

11,750 (number approximate)

Most recent security protocol rewrite:

123117(JUL)

Most recent security breech:

CLASSIFIED! EYES ONLY!

Pertinence of data accessed:

TOP SECRET (SCI clearance required)

… return to transcript …