“Chairman, we have so named this in honor of the Chinese Bai Hu or White Tiger. I would be most pleased if this was for your white tiger, Nikkei.
“Our work on the BAI HU project has yielded some very positive results, Chairman. The first proof of concepts showed that our mutating code, genetically engineered for infiltrating host systems, can then assemble itself and grow dynamically to complete the embedded tasks.
“Our original prototype code is now greatly enhanced to penetrate every defense system we have introduced it into. The BAI HU project has been greatly accelerated with the access to the supercomputer that you arranged. The first generation of our code, as you will remember, was simply encrypted with self-destructing algorithms to be launched if it was detected.
“This new generation of code is self-generating, opportunistically adaptive, and self-propagating, which is very much more to our purposes. We can program in the ultimate assignment, the time parameters, mile-stones, and exit protocol and simply launch it. It builds with internally generated material and grows at a rate suitable to meet the time deadlines."
Chairman enthusiastically asked, "And what of the forensics team efforts after the fact? Can the digital fingerprints be re-assembled to understand how it is put together or where it came from? Most importantly, can it be traced back to us?"
Prudence smiled a Cheshire cat smile as she responded, "We have seen to it that the dispatched code suffers from digital decomposition the same as its biological counterparts. Basically, nothing is left to analyze since part of its genetic makeup is to remove all traces of itself from the point of its inception to the last digital breath that it takes. It comes from nowhere and leaves without a trace. Genetically engineered code designed to vanish when complete."
Chairman was thoughtful for a few minutes, then asked, "And what of the BAI HU project while it is operating on its mission? How does it defend itself while it is operating on assignment and thus essentially vulnerable?"
Prudence confidently replied, "We have given it a couple of defense mechanisms which includes functioning at the operating system level, much like a standard rootkit in encrypted mode. It is, though, greatly enhanced by the IQ 5678 supercomputer. You would have to know when and where the vanishing code had been introduced and have an equally powerful Chinese supercomputer to be able to try and break the encryption algorithm.
“To vet our encryption algorithm, after we built it, we fed it into the IQ 5678 supercomputer to see how long it would take. Because of its genetic design and adaptability, the Chinese supercomputer had no small amount of difficulty in breaking it. Basically, the IQ 5678 consumed all its processor resources, which was undoubtedly what Professor Lin was referring to with regards to consuming all his resources.
“We had to terminate the program request to break the encryption algorithm and requested an estimated projection of processing time to do the job. The IQ system indicated that it would take two to the twenty fourth power in centuries to break the code. I am quite confident that we should be done with our program objective by then."
Click Follow to receive emails when this author adds content on Bublish