Data Sheet: KIRA
rating: +4+x


The content of this page is currently classified as

[Security Level 2].

However, some files associated with this document may have other classification levels and may require credential verification.

Designation: KIRA (Knotenpunkt der Informationsstruktur mit Relaxation-Algorithmus, i.e. node of information structure with relaxation algorythm)

Category: Artificial Intelligence

Hardware: Experimental quantum computer QUEX, conventional binary subsystems (x64), cooling unit, fusion reactor, installation room, equipment room

Intended Use: KIRA is an AI and is designed to defend against and track digital security breaches from inside and outside, as well as to support the containment of digital anomalies. It also monitors the network between sites of the Germanophone Foundation, as well as at Site-DE1. Site IT departments can request its support in intra-site networks. KIRA is a member of MTF DE1-ℌ, which also monitors, supports, coordinates, and is responsible for its maintenance and function. At this time, KIRA is not permitted to develop sentience capabilities.

Description: "KIRA" refers to the "node of information structure with relaxation algorithm" that maintains and controls the subordinate subsystems in the form of Artificial Limited Intelligences ("ALIs"). KIRA in itself is an ALI that has been given the task mentioned above. The subordinate subsystems have a different structure than the node and are configured for practical missions. Each subsystem network is reconfigurable by KIRA.

The overall system is labeled "KIRA Structural System," which includes all other components. The QUEX in addition physically includes KIRA and the GNS 5 ("Globalized Network Structure 5"). The KIRA subordinate GNS 5 includes and designates all subsystems of KIRA in said networks. The GNS 5 distinguishes between primary and secondary structures. The primary structure is subdivided into networks that are assigned a primary priority, while the secondary structure is subdivided into those networks that are assigned only a secondary priority.

Five types of subsystem networks are distinguished.

Currently active network types consist of:

  • AN (Action-based Network)
  • ON (Output-based Network)
  • CN (Command-based Network)
  • LN (Logic-based Network)
  • SN (Security Network)

AN: Action-based subsystem networks are used for data processing and serve as central data centers. All data flow passes through the ANs and is first analyzed and processed in them and then passed on to the ONs. ANs have a balanced position in the primary structure of the GNS 5. Manual access to ANs requires the Clearance Level GNS/3 or AN/4. ANs are controlled by LNs and SNs. ANs refer to ONs and LNs.

ON: Output-based subsystem networks are used for the output and translation of values that can then be transferred on to specific stations. ONs are the smallest subsystem networks with the fewest ALIs, since they usually only have to perform a well-defined task. ONs have a balanced position in the secondary structure of GNS 5. Manual access to ONs requires the Clearance Level GNS/3 or ON/4. ONs are controlled by SNs. ONs refer to LNs.

CN: Command-based subsystem networks accept commands and tasks, which are then translated into appropriate AN action instructions using the LNs. CNs are the second-smallest in size and the first networks to become active when tasks are fed in. CNs have a balanced position in the secondary structure of GNS 5. Manual access to CNs requires the Clearance Level GNS/3 or CN/4. CNs are controlled by SNs. CNs refer to ANs and LNs.

LN: Logic-based subsystem networks determine the logic behind the actions of all networks and thus ALIs. LNs are the central centers of the logic of all inner actions, and have an superior position in the primary structure of the GNS 5. Manual access to LNs requires the Clearance Level GNS/4 or LN/5. LNs act autonomously and are controlled only by SNs and KIRA.

SN: Security-based subsystem networks are responsible for securing and controlling the overall structure, or the primary and secondary structure of the GNS 5. SNs have the task of eliminating active security vulnerabilities and protecting the overall system and KIRA itself from third-party access. SNs ensure that networks do not violate security specifications and, if necessary, reprogram the affected ALIs or even entire networks. SNs have the internal clearance GNS/5 and can therefore influence all network types. SNs have a superior position in the primary structure of GNS 5. Manual access to LNs requires the clearance level GNS/5 or SN/5. SNs act autonomously and are controlled only by KIRA. SNs refer to network-internal logic specifications.

The network number ratio that must always be maintained is 3:2:2:1:1 (AN:ON:CN:LN:SN). The class system into which the individual networks are divided describes the access authorization and action range of the network concerned. The higher the level, the more ALIs the network consists of and the higher the general computing power (highest class level: 5). The currently established networks consist of:

Network Type Designation Class according to GNS Classification System
AN AN-A1 Level 2
AN AN-A2 Level 2
AN AN-B3 Level 3
ON ON-A1 Level 1
ON ON-A2 Level 1
CN CN-A1 Level 2
CN CN-A2 Level 2
LN LN-X3 Level 4
SN SN-Y3 Level 5

Safety Instructions:

NO ENTRY FOR UNAUTHORIZED PERSONELL: Entering the premises where QUEX is located requires a Security Clearance Level QUEX/2!
DO NOT PHOTOGRAPH: Taking photographs requires a Security Clearance Level QUEX/3!
DO NOT EXTINGUISH WITH WATER: Snsitive current-carrying components!
DANGER BY HOT SURFACES: The housing and cooler of the QUEX may be hot.
DANGER BY LOW TEMPERATURES: The QUEX is cooled with coolant < 0°C.
DANGER BY HIGH VOLTAGE: QUEX and subsystems are partly supplied with "high voltage current".
DANGER BY NON-IONIZING RADIATION: Increased electromagnetic radiation may occur in the premises where QUEX is located.
DANGER BY POISONOUS MATERIALS: The premises in which QUEX is located may be flooded with lethal and non-lethal agents in the event of unauthorized access.
MEMETIC HAZARD: KIRA is protected by memetic defenses via software.


KIRA is a software that runs on the quantum computer QUEX. It is an artificial intelligence and a member of MTF DE1-ℌ. Her role is to actively monitor the Foundation's network between sites and at site-DE1. She can also gain access to any on-site network accessible via the Foundation's intranet as needed. Her primary function is to defend against and track digital security breaches, both internal and external, and to contain digital anomalies.

She is protected against malicious code infection by multi-level redundant systems. She runs on an experimental quantum computer and has computational power that far exceeds conventional supercomputers. She is capable of redirecting active hacker attacks to secure simulated systems, backtracking, and in turn hacking or crippling most computer systems. She can also contain and redirect digital anomalies to secure systems without putting herself at risk.

She has no emotions or empathy, and cannot form an independent will. She acts according to the tasks assigned to her. The independent development of these characteristics is currently prevented by software. She can understand and express herself in any known spoken and written language. Her communication is purely factual.

QUEX is a quantum computer. Its housing is spherical and measures about half a meter in diameter. Numerous cables are connected to it. It is surrounded by a cooling jacket. Around QUEX are storage media and other hardware.

Binary Subsystems:
KIRA can access all Foundation computer systems with Intel CPUs (which applies to all regular systems) both via the normal intranet and via the Minix operating system integrated by the manufacturers into all Intel CPUs due to pressure from the Foundation. The Minix variant for use within the Foundation includes systems to protect against unauthorized access, and against access by KIRA without the necessary clearances from MTF DE1-ℌ. Through Minix, KIRA can directly access data processed in the CPU, thus overriding virus scanners and firewalls and analyzing all data on the system without hindrance. It can thus intercept data streams before they are encrypted, and spy on encryption and decryption keys, as well as passwords, all without taking any action itself.

To test and analyze malware and develop countermeasures for the Foundation's anti-virus software, KIRA has several binary computer systems that meet the Foundation's standards for all security levels. Furthermore, binary subsystems are used to control QUEX, provide logging, long-term data storage, control network traffic, pre-filter digital threats, and monitor QUEX and KIRA.

To mitigate digital anomalies, KIRA has several binary subsystems on which virtual machines can be virtualized with any known processor and operating system, as well as non-virtualized binary subsystems with common processors and operating systems whose feeds can be mechanically decoupled, and which have devices to physically terminate the system. Some of these systems are located in a separate bunker equipped with connectable Scranton reality anchors on the Site-DE1 premises, from which the infected systems can be easily removed for permanent containment.

Cooling Unit:
QUEX is cooled with a compressor cooling system. The system is closed and triple redundant. The cooling unit is located in the equipment room. In the event of an emergency shutdown, it takes a few minutes for QUEX's core temperature to drop below a critical temperature, which is why the cooling unit can be supplied by a separate fuel cell-powered emergency generator.
There is a multi-layered cooling jacket around QUEX's housing. All lines and the jacket are self-sealing, in case of too much damage the cooling jacket can be replaced quickly.

The Tokamak R-08 is a scaled-down version of the standard Foundation Tokamak R-30 fusion reactor, which is usually used to supply power to critical sites. It is used exclusively to power KIRA's hardware, peripherals and technical systems, as well as MTF DE1-ℌ's duty rooms. In the event of an outage, QUEX can be briefly powered by Site-DE1's fusion reactor or [REDACTED] fuel cell-powered emergency generator(s). The R-08 tokamak and ███ emergency generator(s) are located in sectors other than QUEX.

Installation Room:
The QUEX installation room, which also houses all of KIRA's peripheral equipment, measures 15 × 10 × 5 meters. The room is divided by a grating floor into a main level and a maintenance level, in the latter of which run cables, hoses, air conditioning ducts, extinguishing system and the primary canisters for chemical warfare agents. QUEX and all peripheral systems are located on the main level. The installation room is maintained at a constant temperature of 8°C and is a laminar flow clean room class ISO 6.

In the front part of both levels of the installation room is a working cabin for MTF DE1-ℌ and the operating and maintenance personnel not belonging to the MTF. The working cabin is tempered to 20 °C and is an ISO class 8 clean room. Terminals and control systems for KIRA, QUEX and peripherals are located on the upper level. On the lower level there is a workshop and storage rooms for tools. The booth can be exited on both levels via an airlock.

Equipment Room:
The equipment room of QUEX houses the air conditioning, cooling system as well as the central vacuum cleaning system for the installation room, but is not connected to it by a door. The equipment room is not a clean room. All systems of the equipment room are controlled by the cabin in the installation room, as well as the building control system.


KIRA herself has automatic maintenance and cleanup programs and executes them independently or on request. A software-based system analysis can be forced via a primary terminal (Simple: Clearance Level KIRA/3; Complete: Clearance Level KIRA/4). A software reset requires Clearance Level KIRA/4 and approval from O4, and must be reported to O5.

All binary subsystems are to be checked weekly for ready updates. All updates for operating system, drivers, software, etc. shall be downloaded exclusively from the MTF DE1-ℌ update server, and are to be checked by the MTF beforehand. Before each update, a system analysis and cleanup must be performed with FCleaner. FCleaner is to be checked for updates from the mentioned server beforehand. It is strictly forbidden to defragment SSD hard disks! The updates are to be performed serially, then each system is to be shut down and restarted. During this process, due maintenance work on the hardware is to be carried out, which is why no "reboot" is to be performed by the operating system. Only one system is to be updated and restarted at a time to ensure the greatest possible readiness. If no update takes place, the system must still be shut down once a week for physical inspection and cleaning.

The hardware of QUEX is - as far as possible - monitored and tested by KIRA. Her system analysis includes an analysis of the system of QUEX. Further subsystems of QUEX can be analyzed via a primary terminal (Simple: Clearance Level QUEX/3; Complete: Clearance Level QUEX/4).

QUEX hardware shall be visually inspected daily for damage and leakage of liquid, gas or vapor coolant.

If a binary system is shut down after an update, all plug-in cards, heat sinks and RAM, as well as all plug connections and cables are to be checked for tight fit and damage. The person performing the check must wear a grounding strap!

Subsequently, a cleaning of all hardware of QUEX and the binary systems, with the soft brush of the central vacuum cleaning system is to be carried out, regardless of whether there is visible contamination or not. Monthly, all connections and lines of the power supply, cooling and data lines must be checked for tightness and damage.

All hardware to be disposed of shall be incinerated in the on-site incinerator with the high temperature setting. All removed hardware is considered a Level 4 Secret, and incineration and transportation shall be appropriately secured and monitored. Hard drives, RAM, CPUs, and GPUs shall be treated prior to incineration in a dedicated data trace removal cabinet where electromagnetic fields can be generated at a variety of frequencies with a power of ███ kW. Warning! The remains of the hardware after the data trace removal are hot! Toxic fumes may be generated!

O5-[REDACTED], O4-[REDACTED], as well as the head of MTF DE1-ℌ have the possibility to execute an "emergency shut-down", in this case the power supply to KIRA is mechanically interrupted, whereupon it and QUEX, as well as all binary subsystems are immediately switched off. This may result in software and hardware damage and data loss. Since it may take several days to repair the damage, and the intranet of the Germanophone Foundation is not actively monitored during this period, intranet quarantine protocol #7 takes effect during this time. KIRA's emergency shutdown without authorization will result in termination by O4-4!

Cooling Unit:
The cooling unit is equipped with an automatic device for monitoring leakage and the purity of the coolant. If required by the facility, coolant K/N37-47 must be refilled or filters changed. Faults may only be rectified by qualified maintenance personnel of Clearance Level QUEX/1. Unauthorized fault clearance by MTF DE1-ℌ is not permitted!

Installation Room:
The installation room of QUEX must be cleaned weekly with the help of the central vacuum cleaning system, regardless of whether there is visible contamination or not.
The footpaths are to be kept free of obstacles at all times, and all dirt is to be removed immediately. The room is to be kept tidy at all times and tools and removed hardware shall be cleaned up or disposed of immediately.

Other Systems:
The fusion reactor, dust collection system and room air handling system, will be maintained by the appropriate building services maintenance team. Unauthorized personnel are not allowed in the fusion reactor area!

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License