Civilizing Cyberspace: The Fight for Digital Democracy

Author Kenneth J Hamer-Hodges
Country United States
Language English
Subject: Securing the future of Cyber Society
Genre - Non-fiction
Publisher Self, date  1-1-2020
Media type Print (hardback) and Kindle ebook
Pages 419, ISBN 978-1-95-163044-7

Civilizing Cyberspace: The Fight for Digital Democracy is a book on the future of cyberspace and society that studies the past, reviews progress, and sets the goal for the immediate future. The book by computer scientist Kenneth Hamer-Hodges, who pioneered trusted, reliable telecommunications software. His design for PP250 guarantees the rules for cyber-security. PP250 proved that least-privileged programs combined with least-authority instructions prevent software break out to win the War in Cyberspace.

Infallible software automation is the only way to prevents a national catastrophe. Trusted software mass-produced on demand by a Church-Turing Machine directed by a Lambda Calculus Meta-Machine that encapsulates an undistorted Turing Machine. Using Alonzo Church's universal model of computation, private data remains private. A DNA of Capability Keys defines a living, regenerative, evolving species in a  private namespace. The software obeys immutable access rights, set by Capability Limited Addressing. Errors, bugs, malware, and hacking are all detected on the spot. Damage, theft, and spies preventing hacking and malware at every step. This is the scientific architecture of computer science. Computer science created as a crime-free, fail-safe, future-safe cyber democracy by Church-Turing Machines.

Ken shows how this level playing field ends hacking and cybercrime and goes on to deconstruct the monolithic powers of the industry titans, placing ownership of private data in the hands of the citizen in a cyber-democracy. Democracy depends on the approval of citizens, and the pure mathematics of a Church-Turing Machine is firmly in the hands of the citizens.

If not, the easy break-out of existentially dangerous Artificial Intelligence (AI) will end progress. Democracy will fall as dictators rise, and Life 3.0 will collapse as lethally weaponized AI malware, and invisible AI hacks rewrite law, order, and justice to enslave cyber-society. Max Tegmark, the MIT cosmologist, his co-founder Jean Tallinn at the Future of Life Institute (FLI), and the visionary Elon Musk all agree the dark side of AI must be constrained. 

Ken explains how the unlimited power of AI is scientifically patrolled, and how the dark side of super-powered malware and hacking are tamed. The science is in the Church-Turing Thesis, and to face the future, Ken proposes a mathematical playing field, perfectly leveled and globally enforced by inter-interlinked Lambda-Calculus Meta-Machines that filter out errors by encapsulating the executable surface of computer science. The flawless result defends human rights from tyrants and prevents unapproved government spies. It all starts with the Right to Privacy

The flawless clockworks of an Abacus, the strengthened powers by the Slide Rule, and the infallible automation, defined by Charles Babbage as the Analytical Engine, is fail-safe. The mathematics that scales perfectly through Alonzo Church's universal model for computation is evaluated and compared to identify the avoidable consequences of software corruption that culminated when AI software breaks out as unstoppable hacking and malware.

Flawless software is the only civil solution. Ken explains the dangers created by John von Neumann's shared memory architecture from WWII. He argues that infallible automation is vital to guarantee morality, ethics, culture, and civility remain for future generations. He insists that individuals must control cyberspace as an extension of cyber-democracy. Only the private DNA of a capability-based computer science engineered as a Church-Turing Machine extends individuals privately into cyberspace. 

The DNA frames the arithmetics of the Abacus and the mathematics of the Slide Rule. Flawless computations that powered the Industrial Revolution. The science culminated when Buzz Aldrin and his $10 slide rule landed Eagle on the Moon. Hamer-Hodges shows that Cold War computer science limits the Cyber-Revolution and how the Church-Turing Machine elevates another level of performance and efficiency for the fail-safe future of global democracy as a mathematical Cyber-Revolution. 

Ken shows how this scientific platform, empowered by the Lambda Calculus, is the obedient servant of individuals and communities when data is owned by the citizens, instead of corrupt titans and authoritarian masters. Digital corruption is fatal, as demonstrated by the Boeing 737 Max catastrophes and the subsequent months of grounding. Monolithic software always grows too big and too costly to test because the shared half-life and worst-case reliability of any compilation are low.  Old architecture is crippling industrial society as the software for virtualized life in the 21st Century expands and accelerates.

When, two hundred years ago, Ada Lovelace documented the first program, she defines the mathematical function abstraction of Bernoulli Numbers. Her pure mathematical abstraction, like the Abacus and the Sile Rule, her work is future-safe. It lasts forever. This is the software of Industrial Strength Computer Science. The material of a lasting Cyber-Revolution forever bridging the present to an endless future.

In conclusion, Hamer-Hodges highlights the limited time window before AI software breaks out to assume control. By then, trusted software must be secured. The Internet of Things must be infallibly automated as a faithful servant of individuals as a lasting, secure, and future-safe cyber democracy.

Kenneth J Hamer-Hodges, author of Civilizing Cyberspace: The Fight for
Digital Democracy

Competition
The standard excuse for computer catastrophes, offered by the industry started at SOSP'77, led by Butler Lampson. Ever since users are blamed for failing to follow Best-Practices, even, in 2019, the pilots in the Boeing 737 Max catastrophes were blamed for accelerating vertically into the ground! The curse of General-Purpose Computer Science is the over-centralized, overexposed monolithic-privilege in General-Purpose Computers. Flaws are papered over by Best-Practices but are easily exploited by skilled international criminals and hostile enemy states. Cybercrimes, weaponized malware, and remote hackers successfully attack, damage, rob, and contaminate chosen targets.

Infallible automation prevents human-inspired attacks and mistakes while automating tasks for easy public use and removing the superuser threat vector used by Edward Snowden and others. Cyberspace is run automatically and remains safe. Power is in the hands of citizens instead of branded titans. This serious concern over the future and the preservation of democracy. The survival of the nation has already been raised by the Future of Life Foundation. Now is the time to offer permanent solutions.

References
Tegmark, Max (2017). Life 3.0: being human in the age of artificial intelligence (First ed.). New York: Knopf. ISBN 9781101946596. OCLC 973137375.
"Superintelligence survey - Future of Life Institute." Future of Life Institute. Retrieved 7 January 2018.

Comments