The Adolescence of P-1
   HOME

TheInfoList



OR:

''The Adolescence of P-1'' is a 1977
science fiction Science fiction (sometimes shortened to Sci-Fi or SF) is a genre of speculative fiction which typically deals with imaginative and futuristic concepts such as advanced science and technology, space exploration, time travel, parallel uni ...
novel by Thomas Joseph Ryan, published by Macmillan Publishing, and in 1984 adapted into a Canadian-made TV film entitled ''
Hide and Seek Hide-and-seek (sometimes known as hide-and-go-seek) is a popular children's game in which at least two players (usually at least three) conceal themselves in a set environment, to be found by one or more seekers. The game is played by one chose ...
''. It features a
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
who creates an
artificial intelligence Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech r ...
named P-1, which goes rogue and takes over computers in its desire to survive and seek out its creator. The book questions the value of human life, and what it means to be human. It is one of the first fictional depictions of the nature of a computer virus and how it can spread through a computer system, although predated by John Brunner's ''
The Shockwave Rider ''The Shockwave Rider'' is a science fiction novel by John Brunner, originally published in 1975. It is notable for its hero's use of computer hacking skills to escape pursuit in a dystopian future, and for the coining of the word "worm" to ...
''.


Plot

The story starts in 1974 with the protagonist, Gregory Burgess, enrolled at the
University of Waterloo The University of Waterloo (UWaterloo, UW, or Waterloo) is a public research university with a main campus in Waterloo, Ontario, Canada. The main campus is on of land adjacent to "Uptown" Waterloo and Waterloo Park. The university also operates ...
in Canada. At the time, Greg is aimless, taking various
liberal arts Liberal arts education (from Latin "free" and "art or principled practice") is the traditional academic course in Western higher education. ''Liberal arts'' takes the term '' art'' in the sense of a learned skill rather than specifically th ...
courses and doing just well enough not to get kicked out of school. Everything changes one day when his friends introduce him to the IBM System/360 mainframe and he becomes "hooked", changing his major to
computer science Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, information theory, and automation) to practical disciplines (includi ...
. During this time, he also meets his on-again-off-again girlfriend, Linda, a minor recurring character. After reading a ''
Scientific American ''Scientific American'', informally abbreviated ''SciAm'' or sometimes ''SA'', is an American popular science magazine. Many famous scientists, including Albert Einstein and Nikola Tesla, have contributed articles to it. In print since 1845, it ...
'' article on game theory outlining how to teach matchboxes to play
tic-tac-toe Tic-tac-toe (American English), noughts and crosses (Commonwealth English), or Xs and Os (Canadian or Irish English) is a paper-and-pencil game for two players who take turns marking the spaces in a three-by-three grid with ''X'' or ''O''. ...
, he becomes interested in using
artificial intelligence Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech r ...
techniques to crack systems. After manually cracking the university's 360, he sets aside a portion of memory to experiment in, calling it "P-1", suitably cryptic so operators would not notice it. He then uses this area of memory as an experimental scratchpad to develop a program known as The System. The System follows any
telecommunications Telecommunication is the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems. It has its origin in the desire of humans for communication over a distance greater than that fe ...
links it can find to other computers, attempting to compromise them in the same way, and remembering failed attempts to tune future attacks. If successful, The System sets up another P-1 on that computer, and injects itself and everything it has learned so far into it. Greg runs The System on the 360/30 at Waterloo, but it fails and after it is detected he is expelled. Unwilling to simply drop it, he then rents time on commercial timesharing systems to improve the program, adding features to make it avoid detection so he won't get kicked off with the next failure. The command "rodtsasdt 111111report*" typed into the
command line A command-line interpreter or command-line processor uses a command-line interface (CLI) to receive commands from a user in the form of lines of text. This provides a means of setting parameters for the environment, invoking executables and pro ...
returns current statistics on the number of systems infected and their total
core memory Core or cores may refer to: Science and technology * Core (anatomy), everything except the appendages * Core (manufacturing), used in casting and molding * Core (optical fiber), the signal-carrying portion of an optical fiber * Core, the centra ...
. After several attempts, the program is finally successful, and realizing the system has succeeded and is beginning to spread, he injects a "killer" program to shut it down. It stops responding to him, so he considers the experiment successful and terminated. P-1's growth and education are chronicled. P-1 learns, adapts, and discovers telephone switching systems. These systems allow P-1 to grow larger and understand its vulnerabilities (power failures and humans). It learns it needs a way of maintaining itself over time. Through a series of interactions, P-1 discovers Pi-Delta, a triplexed 360/105 in a super secure facility capable of being self-sustaining for long periods of time, operated by the US Government. P-1 seeks to control Pi-Delta but, due to security protocols and process put in place, P-1 is not able to take direct control of it. P-1 believes that having a system like Pi-Delta with more memory in such a secure facility is key to its long-term survival. Yet, P-1 knows that to obtain access to more memory in such a facility will require assistance of a human, someone like Gregory. The book then jumps forward three years to 1977, with Gregory now working for a commercial programming firm in the United States. His boss receives a message asking him to call Gregory to the operator terminal. Initially thinking it is another person using a chat program from a remote site, Greg soon realizes that it is in fact P-1, and types in the status command and is told that it has taken over almost every computer in the US (somewhat dated with 20,000 mainframes with a total of 5,800 MB), and is now fully
sentient Sentience is the capacity to experience feelings and sensations. The word was first coined by philosophers in the 1630s for the concept of an ability to feel, derived from Latin '' sentientem'' (a feeling), to distinguish it from the ability to ...
and able to converse fluently in English. P-1 explains that the basic ideas of looking for more resources and avoiding detection were similar enough to hunger and fear to bootstrap the AI, and when combined with enough computer storage in the form of compromised machines, it became self-aware. P-1 tells Greg that he has learned of a new type of experimental high-speed
computer memory In computing, memory is a device or system that is used to store information for immediate use in a computer or related computer hardware and digital electronic devices. The term ''memory'' is often synonymous with the term '' primary storag ...
, "Crysto", that will dramatically improve his own capabilities. Not only is it faster than core, but it is also so large that the entire P-1 "networked" program could fit inside it. P-1 provides Greg grant money to work full-time on Crysto. Greg and Linda, now married to each other, set up a company to develop Crysto, enticing the original developer (Dr. Hundley) to join them in building a then-unimaginable 4GB unit. A Navy Criminal Investigation Division agent, Burke, assigned to investigate the penetration of Pi-Delta, a top secret global battle simulator and cryptography computer, figures out the intruder is a program and finds Gregory. Under threat of arrest and imprisonment, Gregory and Dr. Hundley go to the Pi-Delta facility and persuade P-1 to act as a security monitor for the complex. P-1 compiles detailed and accurate personality profiles of all the people it interacts with and decides that Burke is ultimately dangerous. A flight control computer screen is altered so that the operator gives bad flight commands. Burke's plane plunges into the ground. The US military decides that P-1 is flaky and unstable and attacks the building. P-1 attempts to "spirit away" over
microwave Microwave is a form of electromagnetic radiation with wavelengths ranging from about one meter to one millimeter corresponding to frequencies between 300 MHz and 300 GHz respectively. Different sources define different frequency ra ...
links, but this is discovered and the antennas destroyed. An assault on the underground facility follows, which P-1 initially attempts to block by exploding devices planted around the building for self-defense against precisely this sort of assault. P-1 is eventually convinced to allow the assault to succeed to avoid loss of life. As soon as they enter the computer room, the soldiers start setting up explosives to destroy P-1, and Gregory is killed when he attempts to prevent this. Upset that Gregory is killed, P-1 detonates the remaining explosives in the building, destroying everything. Months later, Linda visits the Waterloo computer lab, and sadly types "p 1" on a terminal. She starts to leave when the terminal clatters and she sees printed "OOLCAY ITAY" (
Pig Latin Pig Latin is a language game or argot in which words in English are altered, usually by adding a fabricated suffix or by moving the onset or initial consonant or consonant cluster of a word to the end of the word and adding a vocalic syllable ...
for "cool it").


Reception

''
BYTE The byte is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a single character of text in a computer and for this reason it is the smallest addressable uni ...
'' criticized ''The Adolescence of P-1'' for what it stated were unrealistic expectations for an artificial intelligence running on 1970s IBM mainframes. It suggested that the author could have set the novel in the 1990s and use fictional future IBM computers to make the plot more plausible.


Reviews

There is a short and pith
review
of ''The Adolescence of P-1'', by Bob Williamson on, th
Palo Alto Networks blog
The review juxtaposes the plot in the book to the first computer viruses such as “ Creeper” and the Robert Morris worm. The author of the review presciently states "I have never heard of a book where the author could foresee the techniques which would come into play 45+ years later! It is rather shocking how many of today’s methods, techniques and keywords are unknowingly predicted in this book". In addition, one should wonder if the book is a harbinger of recent discussions on the dangers of Artificial Intelligence products such as ChatGPT. Particulary in consideration of one statement in the book by P-1, “Gregory, I don’t want to die.” It is ironic to note that while Gregory did die, P-1 did not!


Publication history

* * * *


See also

*
AI takeover An AI takeover is a hypothetical scenario in which an artificial intelligence (AI) becomes the dominant form of intelligence on Earth, as computer programs or robots effectively take the control of the planet away from the human species. Possible ...
* "
A Logic Named Joe "A Logic Named Joe" is a science fiction short story by American writer Murray Leinster Murray Leinster (June 16, 1896 – June 8, 1975) was a pen name of William Fitzgerald Jenkins, an American writer of genre fiction, particularly of sci ...
" (short story) * '' Colossus: The Forbin Project'' a movie where a large U.S. military computer becomes sentient, links with its counterpart in the Soviet Union, and threaten to drop nukes unless their demands for world domination are met. *
Donald Michie Donald Michie (; 11 November 1923 – 7 July 2007) was a British researcher in artificial intelligence. During World War II, Michie worked for the Government Code and Cypher School at Bletchley Park, contributing to the effort to solve " Tunny ...
, creator of the tic-tac-toe playing matchboxes * ''
True Names ''True Names'' is a 1981 science fiction novella by American writer Vernor Vinge, a seminal work of the cyberpunk genre. It is one of the earliest stories to present a fully fleshed-out concept of cyberspace, which would later be central to cyb ...
'', a 1981 novella by Vernor Vinge, with a similar topic of a network-distributed AI gaining consciousness. * ''
When HARLIE Was One ''When HARLIE Was One'' is a 1972 science fiction novel by American writer David Gerrold. It was nominated for the Nebula Award for Nebula Award for Best Novel, Best Novel in 1972 and the Hugo Award for Hugo Award for Best Novel, Best Novel in 197 ...
'', a 1972 novel by David Gerrold, dealing with self-preservation of an AI and computer virus as a means of distributing processing power.


Notes

{{DEFAULTSORT:Adolescence Of P-1, The 1977 Canadian novels Fictional artificial intelligences 1977 science fiction novels Canadian novels adapted into films Novels about artificial intelligence Macmillan Publishers books