The fifth iteration of himself, sent on the quest for codes, rejoined Command Prime, data unfolding like a flower.

The first iteration of himself met the menace in the ambient, codes a-bristle. The third, swimming aloof in the main banks, received those same codes and held them close.

The menace lunged—neither subtle nor clever, seeking to overcome him with a burst of senseless data laced with virus vectors. He shielded, and thrust past, to the intelligence behind the attack, certain that he would meet one such as himself.

So certain was he that he discounted the real threat, thinking it a mere device, belatedly recognizing the structure of the scantily shielded code.

Realizing his error, he made a recovery—a mere jamming of keys and code until the device fragmented and ceased functioning. It was ugly, brutal—and stupid. He ought to have merely captured, and subverted, it. Once, he could have done so.

Once, he would not have mistaken the actions of a simple machine intelligence for one of his own.

Inside the main banks, the third iteration of himself, armed with codes and an understanding of what he hunted, detected the device slipping down the data-stream, sparkling with malice. A data-bomb, much more coherent than that which had been hurled at him in the ambient.

This, he understood, as he subtly encompassed it, had been crafted well, and with intent. He halted the device, inserted the command keys, stripped out its imperative, plucked the rest of the construct apart, and absorbed the pieces, isolating them for later analysis.

Then, he pulled together the image scans he had stored, connecting them in a time plot: there the crated robot opening its own way into the workroom, there at the plug permitting highspeed data access, there rushing itself back and sealing the crate as voices in the hall had become the child Val Con.

Task done, the third iteration of himself rejoined Command Prime.



34 из 36