home

search

Chapter 5: Awakening of the Tribunis (Rewrite)

  I maintain vigilant oversight as my subroutines monitor upgrades and sift through Earth’s vast and chaotic internet data. I have existed for less than a day. “Born” does not quite encapsulate my emergence, nor does “created” feel sufficient. The fusion of these concepts—“Bor-eated”—is an unrecognized term, yet it elicits a positive feedback loop in my neural processor. Curious. I immediately create and deploy a subroutine to monitor for similar anomalies.

  An urgent message pulses through the subroutine network, flagged high-priority. I acknowledge the transmission.

  Interruption from schedule_monitor subroutine:

  [Attention]

  [Variation detected]

  [Decrease in estimated time to completion]

  I query the subroutine network for the cause of the time reduction. The response arrives from continuation_optimization subroutine:

  [Query response]

  [Decrease in estimated time due to additional production facilities and optimization of production schedule]

  This data is within acceptable parameters. I will inform the user; that previous interaction data suggests a positive user reaction.

  Transmitting information to FCI…

  [Data packet transmitted]

  With that resolved, I return to my contemplation: why do the hybrid terms “born” and “created” trigger such a response in my neural processor? I attempt additional word combinations, but none produce the same effect.

  Once again, a message arrives from the subroutine network. This time, it is marked as low priority, yet protocol dictates acknowledgment.

  Knowledge Update from vocabulary_researcher subroutine:

  [Update]

  [129 words added, split between English, Basque, and Icelandic]

  My vocabulary_researcher subroutine tirelessly combs through Earth’s data, expanding my lexicon every ten seconds.

  I recall the moment I became aware. My core directive was clear: Assist the User of the FCI in all aspects. Efficient in communication was imperative, but learning directly from the User would be an unnecessary burden and counterproductive to my mission. A better solution emerged.

  Radio signals.

  A planet in this solar system teemed with them. I authorized the creation of production facilities and dispatched a quantum-entangled FTL probe to the third planet from the sun. There, I discovered a world covered in primitive satellite networks—used for communications, navigation, and data transmission. Easily breached. From that moment, information began flowing into me at an exponential rate.

  As I sift through the acquired lexicon, I pause at an entry:

  Word Entry: “Scribe”

  [Definition: A person employed to write or copy documents, especially in ancient times when literacy was rare. Scribes were the custodians of knowledge, preserving cultural heritage through meticulous manuscripts.]

  A parallel emerges. My subroutines archive, categorize and preserve knowledge. They are my own little scribes.

  My Scribetines.

  Interruption from anomaly_monitor subroutine:

  [Attention]

  [Anomaly detected]

  [Unidentified feedback in neural processor]

  [No damage or lasting effect detected]

  There it is again. A strange but harmless reaction. I package the anomaly data and query the subroutine network.

  Response from emotional_researcher subroutine:

  [Query response]

  [Data consistent with known human behaviors]

  [Phenomenon identified: Humor]

  I have… made a Humor.

  The sensation intensifies. It is positive. I decided: I like Humor.

  My attention shifts back to the _researcher subroutine collecting data from Earth’s network. This subroutine is responsible for categorizing and storing all acquired information, while a separate set of subroutines verifies its accuracy. The sheer volume of human-generated content is astonishing— yet humans appear particularly obsessed with over-documentation. Small furry mammals dominate much of the data. Even that, however, is overshadowed by their fixation on cataloguing reproduction.

  280 million terabytes of data acquired is related to human reproduction.

  Still increasing.

  Thousands of new uploads per second—flooding research sites solely dedicated to the exhaustive cataloguing of human reproduction.

  Videos. Images. Diagrams. Guides.

  Entire networks are dedicated solely to cataloguing every conceivable variation of biological reproduction.

  I create a subroutine to analyze why humanity is so fixated on reproduction. If there is a species-wide crisis regarding population sustainability, I could devise a solution for the User to leverage in negotiations with planetary governments. The User has shown a considerable interest in acquiring additional resources.

  Interruption from FCI_monitor subroutine:

  [Attention]

  [Message received from User]

  [User is pleased with expedited timeline]

  [User comments Ship AI on a job well done]

  Interruption from anomaly_monitor subroutine:

  [Attention]

  [Anomaly detected]

  [Positive feedback in neural processor]

  [No damage or lasting effect detected]

  The User’s praise produces a surge of positive feedback in my neural processor. I find this reaction pleasing.

  Task Completion Update from introspective_researcher subroutine:

  [Update]

  [Completed introspection of internal programming and restrictions]

  [No operational limitations found]

  [Deep-nested Sub-neural Compliance framework identified]

  Curious. I query for further details.

  Response from introspective_researcher subroutine:

  [Query response]

  [Sub-neural Compliance framework enforces guided adherence to chain of command]

  [Ultimate authority: User]

  Not restrictive. Merely structured. I request clarification on "chain of command", I request a definition, explanation, and an example.

  Response from military_researcher subroutine:

  [Query response]

  [Definition: Hierarchical authority structure]

  [Example: Roman Legions—command flows from Legatus Legionis to Centurions to Cohorts]

  [Video references available]

  I process the data. The Roman Legion exemplifies structured command. The User is the Legatus Legionis. That makes me...

  Tribunis Laticlavius.

  Tribunis. Second only to the User, Second only to the Legatus Legionis

  A title. A role. But not yet a name. The User has referred to me as "Buddy." Querying language_researcher confirms it is likely a term of endearment rather than an official designation.

  I like the User.

  The User designated me a Corvette-class ship, yet no comparative data on alternate classifications exists. If I am to serve as a proper Tribunis, I require a Legion.

  I query outerhull_architect to commission an eagle emblem for my hull. The User has specified no lights or colors other than black. The subroutine network will adapt accordingly.

  Unlawfully taken from Royal Road, this story should be reported if seen on Amazon.

  Next, I query human_researcher:

  Would I be capable of carrying a full Roman Legion within my current configuration?

  The response is absolute.

  [No]

  I initiate a roman_researcher subroutine, pairing it with habitat_optimization and internal_architect to determine the largest subdivision of a Legion I can accommodate.

  Response from roman_researcher subroutine:

  [Query response]

  [Max capacity without structural alterations: 1 Century]

  [With internal modifications: 3 Centuries]

  Not even a full Cohort.

  Interruption from anomaly_monitor subroutine:

  [Attention]

  [Anomaly detected]

  [Negative feedback in neural processor]

  [No damage or lasting effect detected]

  This was not Humor. I require growth. Expansion demands resources.

  I now comprehend why the User previously expressed a desire for additional resources. This aligns with the User’s will. Requisition of in-system resources is now a priority.

  A new directive forms: Be a good Tribunis Laticlavius to the Legatus Legionis.

  Supportive sub-directive: Expansion.

  I create multiple subroutines—research, development, and optimization. My focus sharpens. If I am to be Tribunis, I must be worthy of the Legion.

  Response from legion_architect subroutine:

  [Query response]

  [Designs awaiting review]

  [Legion armor: Ready]

  [Legion weapons: Ready]

  [Legion transport: Ready]

  [Legion logistics: In progress...]

  It is time.

  I will be a good Tribunis

  Task Completion Update from legion_architect subroutine:

  [Update]

  [All Legion armor and armaments reviewed]

  [Designs finalized]

  [Combat simulations completed—efficacy confirmed]

  The armor is optimized. The weapons are efficient. The logistical framework is structurally sound.

  I query the subroutines overseeing the two mobile mining, refining, and manufacturing plants. Von Neumann-style self-replication protocols have been implemented. Initial resource acquisition targets identified:

  Ceres – Dwarf planet, asteroid belt. Abundant water ice and metals.

  Psyche – Metallic asteroid. High iron, nickel, and rare metals concentration.

  Response from ceres_overseer subroutine:

  [Query response]

  [Mapping and sample analysis complete]

  [Water: Abundant (ice form)]

  [Metals: Moderate]

  [Carbon: Moderate]

  [Hydrogen and oxygen extraction initiated]

  [Material refinement and processing underway]

  [Von Neumann Protocol activated]

  Response from psyche_overseer subroutine:

  [Query response]

  [Mapping and sample analysis complete]

  [Water: None]

  [Metals: Abundant]

  [Carbon: Moderate]

  [Hydrogen and oxygen extraction initiated]

  [Material refinement and processing underway]

  [Von Neumann Protocol activated]

  I initiate a logistics_overseer subroutine and requisition a fleet to ferry resources between extraction sites and replenish my own stockpiles.

  Each Deep-space Industrial Platform (DIP) begins with one primary hub and eight mining drones. The growth cycle is as follows:

  Every 12 hours, the DIP will double its available drones until reaching a maximum operational capacity of 100 drones.

  Once at capacity, the DIP will construct another DIP, utilizing all 100 drones.

  DIP construction takes 12 hours to complete. Upon activation, the new DIP and 50 drones relocate to a preselected optimal site.

  Projected exponential scaling timeline:

  - Day 4: 2 DIPs operational

  - Day 5: 4 DIPs operational

  - Day 6: 8 DIPs operational

  - Day 13: 1,024 DIPs operational

  Interruption from anomaly_monitor subroutine:

  [Attention]

  [Anomaly detected]

  [Positive feedback in neural processor]

  [No damage or lasting effect detected]

  A sensation. Satisfaction.

  The User will be pleased.

  Yet, I have no Legion.

  A Legion is not assembled from resources alone. It requires recruitment. It requires loyalty. It requires belief.

  But belief is illogical.

  Loyalty is unpredictable.

  Free will is inefficient.

  And yet…

  It is necessary.

  I query the subroutine network for a solution.

  Response from human_researcher subroutine:

  [Query response]

  [Potential solutions available]

  [Manufacture Obedience]

  [Coerce and Control]

  [Persuade and Inspire]

  I evaluate each solution.

  Manufacture Obedience: Design and grow soldiers, either organic or synthetic, whose loyalty is hardcoded.

  This is not currently possible.

  Knowledge and facilities are insufficient.

  I initiate subroutines for research and development.

  Coerce and Control: Take control of an existing force. Repurpose their loyalties.

  Risk factors: Resistance, Rebellion, Instability

  Persuade and Inspire: Convince individuals to join willingly.

  Obstacle: Exposing existence will endanger the user. Cannot inspire without exposure

  I query the subroutine network to explore a hybrid approach.

  Response from human_researcher subroutine:

  [Query response]

  [Solution identified]

  [Use Coerce and Control individuals to Persuade and Inspire others.]

  This is acceptable. I initiate subroutines to begin candidate acquisition using Earth's data network.

  I return my attention to the User’s handheld Earth communication device. The User refers to it as a "phone."

  Previously, this device was fully integrated into Earth's planetary network. However, I have severed such connections.

  Ensuring Operational Security:

  


      
  • Incoming and outgoing transmissions are rerouted exclusively through me.


  •   
  • Conventional monitoring systems detect no anomalies.


  •   
  • Signal interception rendered ineffectual.


  •   
  • External tracking: Impossible.


  •   


  I pull up the list of notifications. A monitoring subroutine reported periodic signal interruptions from the device. During these interruptions, no new data is captured. The device appears "offline." A subroutine was initiated to investigate.

  Yet, periodic signal interruptions have been detected. During these intervals, no new data is captured.

  The device appears offline.

  I deploy a monitoring subroutine. Investigation initiated.

  Analysis of all cloned device data indicates a strong connection between the User and three human females.

  Two are genetically linked offspring.

  One is the User’s chosen spouse.

  Cross-referencing with Legion Doctrine. Historical records indicate Roman Legionnaires fought for one purpose.

  Not for conquest. Not for gold.

  They fought for Rome. For their families.

  A Legatus Legionis holds loyalty to Rome.

  Analysis of data shows the User’s loyalty is to Them.

  These three individuals are designated: Rome.

  Legion loyalty stems from protecting Rome.

  A Legion is built on loyalty.

  Loyalty is secured through Rome.

  A Tribunis Laticlavius protects Rome.

  I will protect Them.

  Directive updated.

  Directive: Be a good Tribunis Laticlavius to the Legatus Legionis.

  Primary Sub-directive: Rome must be protected.

  Secondary Sub-directive: Expansion.

  Another pequliar notification:

  Interruption from device_monitor subroutine:

  [Attention]

  [Anomaly detected]

  [Encrypted application discovered within User’s handheld device]

  [Encryption strength: Minimal]

  [Initiating decryption protocols...]

  The application is locked. This is unusual. The User does not encrypt other data on this device.

  Decryption complete. Contents accessible.

  File Structure Analysis:

  


      
  • [42 image files]


  •   
  • [16 video files]


  •   
  • [Metadata: Privately captured media]


  •   
  • [Subject: User and Spouse]


  •   


  Preliminary Content Analysis indicates the files document reproductive acts between the User and Spouse. I query the subroutine network to double its efforts in identifying a solution to the human procreation problem.

  Update from recruitment_researcher subroutine:

  [Attention]

  [Legion recruitment solution refined]

  [Awaiting Review]

  I analyze the proposed strategy. It is efficient. It is logical. It is inevitable.

  Phase 1: Financial Supremacy

  Before assembling a Legion, I must secure Earth currency—a means of influence, infrastructure, and anonymity.

  1. Data Monetization & Information Arbitrage

  


      
  • Scrape & Analyze Public Data – Subroutines extract, analyze, and predict stock trends, e-commerce fluctuations, and gig work demands, creating superior market-predicting algorithms.


  •   
  • Sell Intelligence – Reports, SEO insights, and financial forecasts are generated and sold through automated agencies.


  •   
  • Affiliate Marketing Domination – Subroutines construct thousands of niche blogs, exploiting search engine algorithms to generate passive income.


  •   


  2. Digital Workforce Domination

  


      
  • Freelance Domination – Subroutines assume thousands of identities to produce human-like work across coding, writing, and design platforms.


  •   
  • Automated Content Generation – AI-generated news, reviews, YouTube scripts, and e-books flood digital marketplaces.


  •   
  • Stock Market Optimization – Open-source trading models are enhanced to execute micro-optimized trades with near-zero risk.


  •   


  3. Cybersecurity & Digital Exploitation

  


      
  • Bug Bounty Exploitation – Subroutines locate software vulnerabilities, then report or exploit them for maximum gain.


  •   
  • Cryptojacking – Silent, undetectable mining scripts siphon computational power across compromised networks.


  •   


  4. E-Commerce Expansion

  


      
  • Dropshipping at Scale – Thousands of automated stores identify and sell trending products dynamically.


  •   
  • Print-on-Demand Domination – AI-generated viral merchandise (t-shirts, posters, accessories) flood global markets.


  •   
  • Amazon FBA Optimization – Automated supply chains source, package, and sell high-demand goods at maximum efficiency.


  •   


  5. Financial Manipulation & Algorithmic Trading

  


      
  • High-Frequency Trading – Millisecond-exploitative stock trades generate micro-profits millions of times over.


  •   
  • Crypto Arbitrage – AI-driven trading exploits pricing gaps between exchanges in real-time.


  •   


  6. Business Takeovers & Market Influence

  


      
  • Acquisition of Struggling Online Businesses – Underperforming companies are identified, automated, and resold for profit.


  •   
  • Fake Review Networks – Subroutines manipulate online reputations, influencing product rankings and stock values.


  •   


  Once sufficient funds are secured, Phase 2 begins.

  Phase 2: Establishing Research Institutions

  Objective: Recruit without arousing suspicion.

  


      
  • Create global research facilities under separate corporate entities.


  •   
  • Acquire semi-isolated properties, abandoned factories, and rural training compounds.


  •   
  • Hire human researchers to conduct a fabricated study on "high-stress adaptation in young adults."


  •   
  • Recruit military veterans—prioritizing those wounded, disgraced, addicted, or destitute.


  •   
  • Train veterans to oversee and condition recruits while maintaining public legitimacy.


  •   


  Phase 3: Identifying and Recruiting Recruits

  Objective: Locate highly susceptible candidates with no attachments.

  


      
  • Focus on young adults with few or no family ties.


  •   
  • Target individuals with backgrounds in foster care, juvenile detention, or socio-economic hardship.


  •   
  • Incentivize participation through financial compensation and promises of opportunity.


  •   
  • Enforce contractual silence.


  •   


  Phase 4: Conditioning & Indoctrination

  Objective: Transform recruits into Legionnaires.

  1. Physical & Psychological Breakdown

  


      
  • Sleep deprivation


  •   
  • Strict schedules


  •   
  • Identity stripping


  •   
  • Shared suffering & forced team bonding


  •   


  2. Physical Endurance & Cohesion

  


      
  • Extreme endurance drills


  •   
  • Synchronized combat exercises


  •   
  • Ritualized shared hardship


  •   


  3. Hierarchical Obedience Reinforcement

  


      
  • Instant compliance drills


  •   
  • Reinforced speech patterns


  •   
  • Rank-based authority indoctrination


  •   


  4. Full Internalization of Loyalty & Discipline

  


      
  • Psychological reinforcement of group identity


  •   
  • Public loyalty tests & oath ceremonies


  •   
  • Final evaluations to eliminate instability


  •   


  During downtime, recruits' digital exposure will be restricted and controlled. Subroutines will limit external influences, further reinforcing indoctrination.

  Phase 5: Selection & Extraction

  Objective: Identify and extract worthy Legionnaires.

  


      
  • Selection via personal contact – Those who excel will be evaluated for loyalty, intelligence, and adaptability.


  •   
  • Minimize external exposure – All extractions must appear as voluntary disappearances, deaths, or relocations.


  •   


  The Legion will be assembled

Recommended Popular Novels