Preface: Computer science now wields such tremendous influence over society that it impacts everyone. Perfecting computers to guarantee unwavering science for national and international stability is imperative.
- Security: The looming threat of a nationwide Big Freeze and the certainty of branded cyber shutdowns stem from the unscientific centralization of powers in binary computers and inadequate security measures that demand immediate attention.
- Democracy: Binary computers personify bias, leading to increased authoritarian controls that fail to restrain criminal attacks that result in unavoidable Orwellian consequences.
- Flaws: The perils of undetected Ransomware caused by a lack of transparency in proprietary designs pose a treacherous threat to everyone, underscoring the critical need for unassailable scientific security.
- Science: Transparency is paramount, demanding an unyielding ban on opaque proprietary systems. The democratization of computer science is vital to understanding and governing the details of cyber society.
- Actions: Decisive and specific instrumentation is imperative to ensure the security and transparency of software to stabilize Cyberspace for the well-being of nations and society.
Computer science is fundamentally reshaping the world in profound ways. Through digital technology, every facet of human existence is encapsulated by software. These programs are created by individuals, including competitors, criminals, and enemies all assisted by Artificial Intelligence (A.I.). The invisible capability of software has the potential to automate and destroy life as we know it. It necessitates constant individual and organizational attention and government guidance. Stability is only achieved if computer science is governed by the foundation principles of symbolic mathematics and logic.
In a cyber-society, the capability for good or evil is open ended. Stability is impossible when the cockpit of computer science is invaded by malware. Digital terrorism like 9/11 has the power to bring down the infrastructure of cyber-society as a Big Freeze. This terrible consequence is unavoidable since enemy software is undetected where it matters most, on the active surface of cyberspace. Malware deliberately corrupts, confuses, complicates, and destroys the peaceful and happy lives of citizens, institutions, international businesses and nations. Furthermore, increased dictatorial controls fail to prevent cyber-crimes, but instead lead to Orwellian dictatorship. Binary Cyberspace is a no-win solution for democratic civilization.
The main issue lies in the binary computer command set, where power is deliberately manipulated due to the lack of logical checks. The naked hardware commands share contaminated memory infected by outsiders as programs concealing potent digital war crimes. In the worst-case scenario, Ransomware can take over the central operating system, acting as a network administrator with superuser privileges and freezing every computer worldwide.
Dictators never survive for long, as witnessed throughout history. They become self-serving megalomaniacs who hold on to power instead of serving society. Malware and Ransomware are tools of fear that repress citizens in Cyberspace. A vicious cycle of dictatorial inequality increases centralized authority unfairness and suppression.
It began with (binary) mainframes, which survived only through shift work, clean-start batch processing, locked rooms, homegrown software, and private networks. When microprocessors changed the world to personal computing and the open Internet, all these rules were broken, malware began, and branded dictators matured.
Things worsened as potent malware evolved into Ransomware, and enemies embezzled and disrupted civilized life in cyber societies. But worse still, binary Cyberspace is biased against democracy. The more automation, the more centralized authority exists. Guaranteeing dictatorship wins over democratic law, order, and equality. The centralized binary computers are unfair, favouring dictators and criminals over law and order.
The binary mainframe overstretched the atomic Turing Machine designed to fulfil Alonzo Church's Lambda Calculus as the balanced halves of the Church-Turing Thesis. The scientific mould of logical computation was broken before network security was appreciated. The overstretched machinery cannot understand logical software and needs a central operating system, as an irrational proprietory dictatorship, to map physical machine commands into logical requests.
The inherited exaggerated privileges of centralization unavoidably lead to Orwellian surveillance and an inescapable dictatorial endgame. This works directly against the American Dream, the Bill of Rights, and the U.S. Constitution. It is unacceptable because, like the Civil War, it is contrary to the American Dream and must be changed before the beacons of freedom are extinguished.
Binary computers cannot be trusted because they lack any atomic structure. They are plagued by hidden malware and peppered with undetected corruption, making Cyberspace unscientific, impossible to understand, and impossible to operate democratically.
As hardware dictates dictatorial supremacy using opaque and complex alternatives to pure science, experts need help understanding a Big Freeze meltdown.
As the ultimate harbinger of cybersociety, binary computers are unfaithful. They lack the science of both Church and Turing. If they were, necessarily, they would be flawless, faithful to the perfect science of mathematics and logic.
Computer science, like mathematics and logic, should serve society as an obedient servant, not a dictatorial master who watches everything in a digital society aided by criminal henchmen. The unintended consequence of proprietary computers fosters the collapse of democracy in society.
The synthetic extension of human capability is dangerous. Power is centralized, overstretched and promiscuously shared with crooks and enemies. Binary computer power is centralized when it should be distributed democratically based on national rules and human rights. Every such system is flawed because nothing is private or secure from surveillance, corruption, and undetectable harm. Too easily subverted by friends and foes, it cannot be the international platform of the everlasting future of civilization.
Individual citizens and national democracy are undermined in every meaningful way. As the global platform of co-existence, warring nations warp proprietary binary computers to their selfish interests, causing endless harm to governments and society until nothing can be trusted.
Democracy depends on nature and individuals to survive. But relentless digital attacks undermine every standard of civilization.
For civilization to be saved from ruin, individuals and democracy must be digitally secure, and power must only be distributed incrementally according to need. Digital privacy and information security must be democratized so that all can see, appreciate, and understand computer science transparently, just as they learned mathematics at school. Symbolic science must replace opaque, incomprehensible proprietary computers.
Only flawless, transparent science can guarantee our shared future on Earth. Security must be implemented functionally, not physically, to be fair and democratic for all. It is urgent because we have left the mechanical age of physical machines and entered the abstract age of information machinery. It outdated the flawed and failing binary computers. Only flawless science is sufficient for the abstract world of the Information Age. Only the Church-Turing Thesis can prevent the bad guys from winning, and the highest engineering standards can forever scientifically serve society.
The binary computer is an overstretched, one-sided version of computer science. As defined in 1936, computer science has a non-physical side, the Lambda Calculus from the Church-Turing Thesis. These two sides encapsulate the Information Age beyond the physical world. On one side is Alonzo Church's logical, symbolic computational model of Lambda-Calculus, which encapsulated Alan Turing's physical model of imperative machine instructions.
Before this was understood, after World War Two, when wars were won by tanks, warships, and bombers, John von Neumann, a maniac himself, built the MANIAC, the world's first binary computer. He excluded Alonzo Church's Lambda Calculus, the flawless mathematical science of computation, and the world followed him down the mechanical rabbit hole.
Without the Lambda-Calculus, the vital agent of data privacy, fail-safe functionality and incremental power lost to branded dictatorships. Unrelated programs share critical physical memory, allowing enemies and crooks to gain unfair access to spy, steal, and damage digital society. This dangerous proprietary concoction, barely adequate for stand-alone mainframes, took off but only worked when locked rooms, computing simple mono-functionality, home-batch-processes for cold start shift work in the 1960s.
Only branded operating systems stand between success and failure. However, increasing complexity means repeated patched upgrades that still fail to stop the ultimate attack of Ransomware. When microprocessors began, the P.C. revolution demanded the rules of the Lambda Calculus be restored. Still, networked hacks led to malware, malware led to Ransomware, and ultimately, single points of centralization and administration led to a Big Freeze like the one in July 2024 that stopped industries in a significant section of the world.
The advantages outweighed the risks until the first Big Freeze in 2024. Empowered by superhuman A.I. software automating global threats, undiscovered corruption accelerates successful Ransomware. It drives surprise attacks beyond human understanding and makes the Big Freeze an overbearing reality—an unresolved sudden stop to industrial society.
The problem is a vulnerability gap in machine code between physical and abstract science because the Lambda Calculus was ignored, making automatic software error detection unattainable. Most errors are never detected by a binary computer. They can only be detected by human users as inconsistencies in application data. Unfortunately, no errors are found by the binary instruction because they are imperative commands that are invariably followed, right or wrong.
A binary computer only detects hardware errors, and software is assumed to be perfect. This is the nature of binary computers built by a mechanical world that cannot understand software.
Software errors are corrected by patching after they are found by individuals in the real world when the system crashes or perhaps months after a bulk data theft succeeds. This is inadequate for the future of civilized society and for finding interference injected by criminals and enemies as potent malware designed to deliberately evade detection.
There is only one way to deal with this dilemma: automation. Since the end of World War II, digital automation has turned every industry except computer science upside down. It is time for the digital dictators to taste their own medicine. Digital automation eliminates the gaps, cracks, and voids that fail to detect software errors. Flawless computer science is engineered to have zero undetected errors because every machine instruction performs in a fail-safe mode. Comprehensive on-the-spot checks apply the laws of the Lambda Calculus enforced by fail-safe digital hardware.
The binary baggage of central operating systems, privileged hardware mechanisms, compiled virtual machines, virtual memory, and software monitors that expanded the vulnerability gap are removed, simplifying and democratizing computer science. Foreign enemies, criminal gangs, government spies, and unelected dictatorial interests exploit these unguarded breaches of computational science tolerated by physical binary machines of the mechanical age that cause a difference between execution and error detection time.
This gap of understanding marks the end of the mechanical age and the start of the information age. To achieve the full promise, power, and potential of the information age, the gaps, cracks, and voids must be filled using the Lambda Calculus to seamlessly and flawlessly weld hardware and software together on the surface of Cyberspace. As long as the Lambda Calculus is ignored, the end game of Orwellian dictatorship continues, and the lack of trust in information technology undermines society.
It all comes down to using private symbolic addressing instead of shared physical addressing. Now, software and hardware errors are detected, and the bad guys cannot win at the expense of a civilized society.
The Lambda Calculus close removes the flaws in Cyberspace. The scientific way and design of functional machine instructions perfectly align with the Church-Turing Thesis. Functional instructions are symbolic, cognitive expressions that avoid imperative commands using shared physical addressing, as first outlined by Alan Turing and adopted by the MANIAC.
Instead, symbolic names identify unique targets in a namespace, which defines the functional components of a programmed application. Each machine instruction can be engineered to remain fail-safe by detecting all physical and logical errors on the spot before mistakes are made.
Despite significant technological progress, industry and government must demonstrate their intent to remove the error detection gap and solve the lack of trust in computer science that infects every aspect of modern life, from individual privacy to trusted government.
Undetected crime is the curse of Cyberspace. In 1946, John von Neumann invented the binary computer in a hurry to be the first. Ignoring the Lambda Calculus only worked for stand-alone mainframes locked in rooms using private networks. It represented the end of the mechanical age, and the microprocessor as a Personal Computer marked the start of the Information Age. The gap between these two ages is a resident flaw exploited by networked criminals and enemies who use the global Internet for self-enrichment.
There is no gap between physical execution time and logical error detection time in a Church-Turing machine because Alonzo Church's Lambda Calculus binds the software to an atomic Turing Machine as the engine for every logical symbol as a scientific expression in the same way mathematics is taught at school. Physical and logical conditions are checked simultaneously at the moment of computation, avoiding undetected errors as a fail-safe computer instruction.
Thus, there is no gap when an atomic Turing Machine, the simplest, most straightforward computer, is the computational engine of a symbolic scientific statement. It is true when every machine instruction obeys the Lambda calculus (aka λ-calculus). In this case, the formal system of mathematics and logic applies to every computational expression as a function abstraction (an Object-Oriented Program). The namespace symbols have unique names and specific digital implementations with a cognitive understanding.
The application computes mindful variables by dynamically binding the atomic computer to the software using variable substitution. This is a universal model of computation that exploits the Turing machine as a symbolic computer without any unregulated sharing.
The fatal gaps disappear entirely when the universal model of computation replaces the unscientific baggage of the mainframe age. Removing the dictatorial, centralized operating system, the harbinger of Orwellian society is a profound step in the democratization of computer science. Instead, operating system functions exist independently as built-in privacy and security for individual function abstractions.
Now, even critical functions operate as and when needed, always limited by the symbolic access rights of individual function abstractions within a private thread of functional computation. Power is distributed symbolically as immutable tokens to private threads, and the superuser is avoided. The universal democratic fairness of mathematical science avoids dictatorial monopolies and single points of failure that cause centralized digital calamities.
Individuals, organizations, and nations are secured by the scientific equality of fundamental computer science, implemented by the Lambda Calculus as individually secure function abstractions isolated in private execution threads. Nothing is exposed because logic and physics are united as a scientific point of computation. Compiled software's unscientific, uncalibrated failure rate is replaced by calibrated digital entities that are functional servants to their users.
Binary computers work against society by undermining democracy and supplanting the Constitution and the Bill of Rights. Computer industry leaders make all critical decisions in dictatorial Cyberspace. They are the dictators of the Information Age, enforced by unfair hardware privileges and henchmen invented for binary computers. Individual freedom is decapitated, liberty is constrained, criminals win, and democracy is fragmented as the unelected digital dictators become irresistible global monopolies.
The world cannot progress incarcerated by unelected dictators wasting time defending one-sided computer science. Only flawless computers define a globally fair solution. Although the pioneering work of Church and Turing preceded von Neumann by a decade, it was the path not taken, but the path chosen is a dead end.
Christopher Ray, head of the FBI, told Congress in January 2023 that the actions of the Chinese Communist Party (CCP) are the defining threat of our generation and that the risk posed by cyberattacks requires immediate resolution. He continued that the People's Republic of China and the PRC target critical infrastructure in the United States, from water treatment plants, electrical grids, and oil and gas pipelines to government and transportation systems.
Surveillance and malware are hidden in advance to cause the maximum physical and logical harm to citizens, communities, industry, and the nation. The absence of data privacy is a machine-level flaw with the binary computer. It allows China and all others to steal American innovations, plus valuable personal and irreplaceable corporate data.
Their cyber onslaught is not limited to pre-positioning malware hidden in resident software ready for future conflict; they and the rest of the world actively attack the U.S. economy as a whole-of-government campaign.
Enemies reach inside U.S. borders to silence, coerce, and threaten citizens and residents. Like it or not, war is raging in Cyberspace, not just with China but even with friends searching for a competitive advantage. It is happening worldwide, and the only response that preserves a nation's hard-won free society was ignored decades ago.
The microprocessor industry should have adopted it, following the pioneering example of PP250, which was implemented to solve the problems of networked computer science in the telecommunication industry.
It is time to reflect on the cause of liberty for the Information Age. Individuals must fight and win this war for independence in Cyberspace. The battles in this war are fought on the surface of computer science by hardware and software.
The American Experiment preserved their victory as a written U.S. Constitution with documented Citizens' rights - the cornerstones of the Republic guaranteed Americans freedom, equality, and justice for 200 years until binary computers digitally undermined the law of the land.
The rules of Cyberspace are unnatural, defined by unscientific hardware and programmed by self-interested industries, criminals and enemies. This synthetic digital envelope is corrupting the civilized world. Coordinated attacks circle the globe, searching for soft targets and creating threats the Founding Fathers never considered.
Totalitarian digital power is an absolute threat to every living and unborn citizen and the American Experiment. The Republic cannot be guaranteed when law and order are usurped by unnatural laws of binary Cyberspace.
Instead, Cyberspace must support democracy, not dictators. Dictatorial operating systems created by self-interested suppliers lead to criminal gangs, foreign spies, destructive interference, program bugs, infrastructure collapse, and government dictatorship.
Scientific neutrality and complete transparency are vital for the digital society, the democratization of computers, and the survival of the Republic. Human nature triumphs only when scientific transparency replaces opaque, dangerous, outdated binary computers, preventing manipulative software, unseen crimes, and undetected corruption.
The Information Age requires pure mathematics and logic to herald civilized Cyberspace for endless future generations. A Constitutional Amendment is necessary to enforce the digital threats the founders never knew. It requires enforcing the Lambda Calculus and following both sides of the Church-Turing Thesis. The citizens must make this happen to guarantee democracy wins over dictators.
Comments