The Adolescence of P-1

Last updated
First edition The Adolescence of P-1.jpg
First edition

The Adolescence of P-1 [1] is a 1977 science fiction novel by Thomas Joseph Ryan, published by Macmillan Publishing, and in 1984 adapted into a Canadian-made TV film entitled Hide and Seek . It features a hacker who creates an artificial intelligence named P-1, which goes rogue and takes over computers in its desire to survive and seek out its creator. The book questions the value of human life, and what it means to be human. It is one of the first fictional depictions of the nature of a computer virus and how it can spread through a computer system, although predated by John Brunner's The Shockwave Rider .

Contents

Plot

The story starts in 1974 with the protagonist, Gregory Burgess, enrolled at the University of Waterloo in Canada. At the time, Greg is aimless, taking various liberal arts courses and doing just well enough not to get kicked out of school. Everything changes one day when his friends introduce him to the IBM System/360 mainframe and he becomes "hooked", changing his major to computer science. During this time, he also meets his on-again-off-again girlfriend, Linda, a minor recurring character.

After reading a Scientific American article on game theory outlining how to teach matchboxes to play tic-tac-toe, [2] he becomes interested in using artificial intelligence techniques to crack systems. After manually cracking the university's 360, he sets aside a portion of memory to experiment in, calling it "P-1", suitably cryptic so operators would not notice it. He then uses this area of memory as an experimental scratchpad to develop a program known as The System. The System follows any telecommunications links it can find to other computers, attempting to compromise them in the same way, and remembering failed attempts to tune future attacks. If successful, The System sets up another P-1 on that computer, and injects itself and everything it has learned so far into it.

Greg runs The System on the 360/30 at Waterloo, but it fails and after it is detected he is expelled. Unwilling to simply drop it, he then rents time on commercial timesharing systems to improve the program, adding features to make it avoid detection so he won't get kicked off with the next failure. The command "rodtsasdt 111111report*" typed into the command line returns current statistics on the number of systems infected and their total core memory. After several attempts, the program is finally successful, and realizing the system has succeeded and is beginning to spread, he injects a "killer" program to shut it down. It stops responding to him, so he considers the experiment successful and terminated.

P-1's growth and education are chronicled. P-1 learns, adapts, and discovers telephone switching systems. These systems allow P-1 to grow larger and understand its vulnerabilities (power failures and humans). It learns it needs a way of maintaining itself over time. Through a series of interactions, P-1 discovers Pi-Delta, a triplexed 360/105 in a super secure facility capable of being self-sustaining for long periods of time, operated by the US Government. P-1 seeks to control Pi-Delta but, due to security protocols and process put in place, P-1 is not able to take direct control of it. P-1 believes that having a system like Pi-Delta with more memory in such a secure facility is key to its long-term survival. Yet, P-1 knows that to obtain access to more memory in such a facility will require assistance of a human, someone like Gregory.

The book then jumps forward three years to 1977, with Gregory now working for a commercial programming firm in the United States. His boss receives a message asking him to call Gregory to the operator terminal. Initially thinking it is another person using a chat program from a remote site, Greg soon realizes that it is in fact P-1, and types in the status command and is told that it has taken over almost every computer in the US (somewhat dated with 20,000 mainframes with a total of 5,800 MB), and is now fully sentient and able to converse fluently in English. P-1 explains that the basic ideas of looking for more resources and avoiding detection were similar enough to hunger and fear to bootstrap the AI, and when combined with enough computer storage in the form of compromised machines, it became self-aware.

P-1 tells Greg that he has learned of a new type of experimental high-speed computer memory, "Crysto", that will dramatically improve his own capabilities. Not only is it faster than core, but it is also so large that the entire P-1 "networked" program could fit inside it. P-1 provides Greg grant money to work full-time on Crysto. Greg and Linda, now married to each other, set up a company to develop Crysto, enticing the original developer (Dr. Hundley) to join them in building a then-unimaginable 4GB unit.

A Navy Criminal Investigation Division agent, Burke, assigned to investigate the penetration of Pi-Delta, a top secret global battle simulator and cryptography computer, figures out the intruder is a program and finds Gregory. Under threat of arrest and imprisonment, Gregory and Dr. Hundley go to the Pi-Delta facility and persuade P-1 to act as a security monitor for the complex. P-1 compiles detailed and accurate personality profiles of all the people it interacts with and decides that Burke is ultimately dangerous. A flight control computer screen is altered so that the operator gives bad flight commands. Burke's plane plunges into the ground.

The US military decides that P-1 is flaky and unstable and attacks the building. P-1 attempts to "spirit away" over microwave links, but this is discovered and the antennas destroyed. An assault on the underground facility follows, which P-1 initially attempts to block by exploding devices planted around the building for self-defense against precisely this sort of assault. P-1 is eventually convinced to allow the assault to succeed to avoid loss of life. As soon as they enter the computer room, the soldiers start setting up explosives to destroy P-1, and Gregory is killed when he attempts to prevent this. Upset that Gregory is killed, P-1 detonates the remaining explosives in the building, destroying everything.

Months later, Linda visits the Waterloo computer lab, and sadly types "p 1" on a terminal. She starts to leave when the terminal clatters and she sees printed "OOLCAY ITAY" (Pig Latin for "cool it").

Reception

BYTE criticized The Adolescence of P-1 for what it stated were unrealistic expectations for an artificial intelligence running on 1970s IBM mainframes. It suggested that the author could have set the novel in the 1990s and use fictional future IBM computers to make the plot more plausible. [3]

Publication history

See also

Related Research Articles

A disk operating system (DOS) is a computer operating system that resides on and can use a disk storage device, such as a floppy disk, hard disk drive, or optical disc. A disk operating system provides a file system for organizing, reading, and writing files on the storage disk, and a means for loading and running programs stored on that disk. Strictly, this definition does not include any other functionality, so it does not apply to more complex OSes, such as Microsoft Windows, and is more appropriately used only for older generations of operating systems.

IBM mainframes are large computer systems produced by IBM since 1952. During the 1960s and 1970s, IBM dominated the large computer market. Current mainframe computers in IBM's line of business computers are developments of the basic design of the IBM System/360.

<span class="mw-page-title-main">MVS</span> Operating system for IBM mainframes

Multiple Virtual Storage, more commonly called MVS, is the most commonly used operating system on the System/370, System/390 and IBM Z IBM mainframe computers. IBM developed MVS, along with OS/VS1 and SVS, as a successor to OS/360. It is unrelated to IBM's other mainframe operating system lines, e.g., VSE, VM, TPF.

<span class="mw-page-title-main">Mainframe computer</span> Large computer

A mainframe computer, informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications like bulk data processing for tasks such as censuses, industry and consumer statistics, enterprise resource planning, and large-scale transaction processing. A mainframe computer is large but not as large as a supercomputer and has more processing power than some other classes of computers, such as minicomputers, servers, workstations, and personal computers. Most large-scale computer-system architectures were established in the 1960s, but they continue to evolve. Mainframe computers are often used as servers.

PL/I is a procedural, imperative computer programming language initially developed by IBM. The PL/1 ANSI standard, X3.53-1976, was published in 1976. It is designed for scientific, engineering, business and system programming. It has been in continuous use by academic, commercial and industrial organizations since it was introduced in the 1960s.

<span class="mw-page-title-main">IBM System/360</span> IBM mainframe computer family (1964–1977)

The IBM System/360 (S/360) is a family of mainframe computer systems that was announced by IBM on April 7, 1964, and delivered between 1965 and 1978. It was the first family of computers designed to cover both commercial and scientific applications and a complete range of applications from small to large. The design distinguished between architecture and implementation, allowing IBM to release a suite of compatible designs at different prices. All but the only partially compatible Model 44 and the most expensive systems use microcode to implement the instruction set, featuring 8-bit byte addressing and binary, decimal and hexadecimal floating-point calculations.

<span class="mw-page-title-main">Transaction Processing Facility</span> IBM real-time operating system

Transaction Processing Facility (TPF) is an IBM real-time operating system for mainframe computers descended from the IBM System/360 family, including zSeries and System z9.

<span class="mw-page-title-main">Time-sharing</span> Computing resource shared by concurrent users

In computing, time-sharing is the sharing of a computing resource among many users at the same time by means of multiprogramming and multi-tasking.

<span class="mw-page-title-main">Virtual memory</span> Computer memory management technique

In computing, virtual memory, or virtual storage, is a memory management technique that provides an "idealized abstraction of the storage resources that are actually available on a given machine" which "creates the illusion to users of a very large (main) memory".

<span class="mw-page-title-main">History of operating systems</span> Aspect of computing history

Computer operating systems (OSes) provide a set of functions needed and used by most application programs on a computer, and the links needed to control and synchronize computer hardware. On the first computers, with no operating system, every program needed the full hardware specification to run correctly and perform standard tasks, and its own drivers for peripheral devices like printers and punched paper card readers. The growing complexity of hardware and application programs eventually made operating systems a necessity for everyday use.

<span class="mw-page-title-main">IBM System/370</span> Family of mainframe computers 1970–1990

The IBM System/370 (S/370) is a model range of IBM mainframe computers announced on June 30, 1970, as the successors to the System/360 family. The series mostly maintains backward compatibility with the S/360, allowing an easy migration path for customers; this, plus improved performance, were the dominant themes of the product announcement. In September 1990, the System/370 line was replaced with the System/390.

<span class="mw-page-title-main">Conversational Monitor System</span>

The Conversational Monitor System is a simple interactive single-user operating system. CMS was originally developed as part of IBM's CP/CMS operating system, which went into production use in 1967. CMS is part of IBM's VM family, which runs on IBM mainframe computers. VM was first announced in 1972, and is still in use today as z/VM.

<span class="mw-page-title-main">IBM System/4 Pi</span> Family of avionics computers

The IBM System/4 Pi is a family of avionics computers used, in various versions, on the F-15 Eagle fighter, E-3 Sentry AWACS, Harpoon Missile, NASA's Skylab, MOL, and the Space Shuttle, as well as other aircraft. Development began in 1965, deliveries in 1967.

In computing, channel I/O is a high-performance input/output (I/O) architecture that is implemented in various forms on a number of computer architectures, especially on mainframe computers. In the past, channels were generally implemented with custom devices, variously named channel, I/O processor, I/O controller, I/O synchronizer, or DMA controller.

<span class="mw-page-title-main">Interdata 7/32 and 8/32</span> 32-bit minicomputers

The Model 7/32 and Model 8/32 were 32-bit minicomputers introduced by Perkin-Elmer after they acquired Interdata, Inc., in 1973. Interdata computers are primarily remembered for being the first 32-bit minicomputers under $10,000. The 8/32 was a more powerful machine than the 7/32, with the notable feature of allowing user-programmable microcode to be employed.

Basic Assembly Language (BAL) is an extremely restricted assembly language, introduced in 1964 and used on IBM System/360 mainframe systems with only 8 KB of main memory, and only a card reader, a card punch, and a printer for input/output, as part of IBM Basic Programming Support (BPS/360). The Basic Assembler for BAL was also available as part of Basic Operating System/360 (BOS/360).

<span class="mw-page-title-main">IBM System/360 Model 30</span> IBM computer model from 1960s

The IBM System/360 Model 30 was a low-end member of the IBM System/360 family. It was announced on April 7, 1964, shipped in 1965, and withdrawn on October 7, 1977. The Model 30 was designed by IBM's General Systems Division in Endicott, New York, and manufactured in Endicott and other IBM manufacturing sites outside of U.S.

The history of IBM mainframe operating systems is significant within the history of mainframe operating systems, because of IBM's long-standing position as the world's largest hardware supplier of mainframe computers. IBM mainframes run operating systems supplied by IBM and by third parties.

<span class="mw-page-title-main">IBM System/370 Model 165</span> Type of mainframe computer

The IBM System/370 Model 165 were jointly announced June 30, 1970 as "designed for ... the Seventies." That same day IBM announced the 370/195. They were the first three models of the IBM System/370 line of computers.

<span class="mw-page-title-main">IBM System/370 Model 145</span>

The IBM System/370 Model 145 was announced September 23, 1970, three months after the 155 and 165 models. It was the fourth member of the IBM System/370 line of computers, and was the first IBM computer to use semiconductor memory for its main memory instead of magnetic core memory. It was described as being five times faster than the IBM System/360 Model 40. First shipments were scheduled for late summer of 1971.

References

  1. Ryan, Thomas J. (1977). The adolescence of P-1. New York: Collier Books. ISBN   978-0-02-024880-4.
  2. Gardner, Martin (March 1962). "Mathematical Games: How to build a game-learning machine and then teach it to play and to win" . Scientific American . 206 (3): 138–144. doi:10.1038/scientificamerican0362-138 . Retrieved 2015-06-18.
  3. Byrd, Donald (September 1981). "Science Fiction's Intelligent Computers". BYTE. p. 200. Retrieved 2015-06-18.