Winning World War III


The new book frames the concept of Safeguarding Democracy and Cybersociety as the central objective of Winning World War III: Industrial-Strength Computer Science (ISCS). The conflict is characterised as the endless digital struggle between democracy and dictatorship that is unfolding in cyberspace because it is an Orwellian digital dystopia that poses an existential threat to democratic principles worldwide.

The Context of World War III in Cyberspace

World War III is currently being fought in cyberspace, where the weapons are abstract digital implementations, programs, data, and malware exposed by the fundamentally flawed binary computer architecture. Cyberspace, in its current binary form, is described as a dangerous, dictatorial, global platform that threatens society, the Bill of Rights, and every democracy globally. In contrast, authoritarian surveillance states such as Russia, China, Iran, and North Korea (the CRINK Gang) thrive under this system, utilising it as an infrastructure for unelected bureaucrats and digital dictators.

The urgency of achieving ISCS is underscored by the threats posed by centralised binary computers, including Ransomware and the emergence of superhuman AI malware, which accentuate the moral and political consequences of inaction. The goal of winning this digital war requires a strategic shift to ensure the U.S.A. remains a constitutional democracy and avoids a catastrophic end to the grand American Experiment.

The Binary Threat to Democracy and Cybersociety

The sources argue that binary computers, designed during the Mechanical Age of World War II, fundamentally fail to meet the needs of the Information Age because they ignore the symbolic logic of the Lambda-Calculus. This architectural flaw creates systemic vulnerabilities that undermine democratic governance and individual rights.

Five significant problems of binary computers directly threaten democracy and cybersociety:

  1. Single Point of Failure (SPOF) Problem: Centralised operating systems, which exist in every mobile device and personal computer, create a single, exploitable weakness highly vulnerable to cybercriminals, enemies, and unelected forces. This flaw allows network administrators, acting as superusers, to become a centralised, dictatorial single point of failure across the global network.
  2. Undetected Error Problem: Binary computers are prone to undetected errors that facilitate hidden theft, fraud, forgery, and outside attacks, disrupting essential services.
  3. Ransomware Problem: Ransomware attacks the SPOF (the centralised operating system) to lock users out of their data, posing existential risks to life, businesses, and national interests.
  4. Deep State Problem: The reliance on these dictatorial systems permits unelected bureaucrats to misuse superuser privileges, leading to opaque complexity and unrecognised surveillance, which undermines democracy.
  5. Dictatorship Problem: The existence of undetected errors accelerates digital corruption and the erosion of democracy, leading to digital dictatorship as Orwellian surveillance expands in and beyond cyberspace. The lack of trust resulting from these flaws causes a breakdown of democratic institutions.

Ultimately, the author asserts that centralisation is the driving force behind today's binary computer science, an unscientific path that inevitably leads to dictatorship.

Safeguarding Democracy through Industrial-Strength Computer Science

Industrial-Strength Computer Science (ISCS) is presented as the only way to save the nation and safeguard democracy by adopting the flawless science of Church-Turing Machines. This transition involves replacing the mechanical design of binary computers with hardware defined by the Church-Turing Thesis, which enforces the laws of the lambda-calculus using Capability-Limited-Object-Oriented-Machine-Code (CLOOMC).

Key aspects of how ISCS safeguards democracy and civilises cyberspace include:

Decentralisation and Distribution of Power

The core scientific solution involves rejecting centralised control. CLOOMC automates the detection of errors and replaces centralised operating systems with symbolic, atomic controls of the lambda-calculus. This architecture distributes and decentralises power, which is essential to democracy, rather than relying on centralised, privileged authority. This mechanism ensures that there cannot be a single point of failure when using a Church-Turing Machine.

Protecting Individual Rights and Privacy

CLOOMC secures the symbols of the lambda-calculus as immutable golden tokens that grant capability-limited access to digital objects. This framework provides program-controlled digital security, preventing unauthorised access and outside interference. The golden tokens distribute power incrementally, guaranteeing individual privacy and information security programmatically, contrasting sharply with the centralised dictatorships of binary computers.

This decentralised approach empowers individuals, restoring their power to govern functionality through the tokens they inherit. The "need-to-know" principle, enforced by CLOOMC, restricts information access only to those with approved need, minimising exposure to sensitive data and unauthorised actions, which preserves the privacy and integrity of computations across cyberspace.

Achieving Democratic Cyberspace

The sources stress that democracy must be abstracted nationally in cyberspace, following each nation's specific laws and customs. This allows nations to control their destiny and protect themselves from external interference and subservience to unelected central powers.

CLOOMC supports this by creating networked function abstractions that are free and equal, where the hardware enforces digital justice. The system facilitates a transition from a centralised dictatorial cybersociety to one based on the U.S. Constitution, where the goal is a government "of the people, for the people, and by the people" in cyberspace. The shift also democratises computer science itself, making it transparent, readable, and comprehensible for everyone, from amateurs to experts, without the risk of malware or errors.

Winning World War III

Ultimately, adopting CLOOMC is presented as the vital action required to win World War III. The investment in this technology is trivial compared to the cost of inaction, which risks the nation's demise and an Orwellian endgame. By using the flawless science of the lambda-calculus, democratic computer science solves the problems of centralisation, malware, and dictatorship, thus immunising civilisation against enemy digital advancements and enabling "a future-safe, fail-safe cyberspace for the endless future of national democracies worldwide". The implementation of the PP250 proved that this scientific approach works, providing decades of engineered software reliability without single points of failure.

Comments