Industrial Strength Cyber Society


By K. J. Hamer-Hodges, FIEE

The progress of industrial societies worldwide demands equality and justice in every way for one and for all. It is the journey called democracy. Equality and fairness is a constant fight between good and evil. Thus it is not a destination but a journey. The evolution of democracy is driven by the development of Civilizations and how each society uses technology. The goal is coloured the power of technology for good and for bad. Enlightened nations use democracy to constrain, not simply dictators, but government in all forms. Computer science introduce new challenges for democracy. Configured as global Cyberspace the hitherto space and time limited interactions of humanity became instantaneous. 

Before Cyberspace the evil in society was always limited by space and time. Now evil can spread instantaneously. This amplifies the danger of evil on a global basis. Industrial society developed demoracy to limit the evil side industry. Enforce laws limit industrial and well as governmental power within each nation. At least that was true before Cyberspace. In Cyberspace power is automated by software that can instantaneously reach distant targets. Life-supporting actions are blinly subcontracted to unreliable Cyberspace. As a technology software is a force for both good and bad. 

Software automation changes the nature of human life. Computers and software extend and increase human abilities. But individuality and independence are lost. Software damages and distorts societies on-mass by the rules of a few blindly trusted software-dictators. Individuals are not equal in Cyberspace. Digital justice is nonexistent and unfair. The nature of equality and the administration of justice is the inherited privilege of Cyber dictators. Unalienable rights and discarded and democracy is thereby decapitated by the Cyber-titans who dictate general-purpose computer science. Civilization is sterilized by unfair privileges that replace the unalienable rights with the preferences of digital dictators. 

Cyber-society is not served by general-purpose computers that lack industrial strength. Instead, Cyberspace serves dictators, criminals, and enemies at the expense of freedom, equality, and the pursuit of happiness. The general-purpose computers are designed as dictatorships run by centralized operating systems and almighty system administrators. The design fails every democratic nation because systemic digital corruption undermines the future of democracy. The future is rewritten by software that is blindly trusted. 

Blind trust evaporated on computers that encourages, dictators, criminals, and enemies to thrive. Corruption on a global scale rewards the few over the many caused by computers leak like a digital sieve. Private data is confiscated by the dictatorial operating system and then stolen on-mass by human or software errors that could be prevented. Consider, for example, the spectacular failures of mission-critical software like Boeing's 737 Max disaster and massive data breaches at the NSA and every industrial giant. Catastrophe lurks throughout Cyberspace. From basic utility services to essential first responders and from the government to national defense must be fail-safe for democracy to survive. Politicians and enemies exploit these digital weaknesses to spread automated false news and targeted malware attacks as well as to remotely hack industrial infrastructure destroying the vitality, dependability, and progress of Cyber-society. 

From WW2 to the first personal computer, the software was defines for time shared batch processing. Then the ubiquitously interconnected semiconductors changed from isolated mainframes in locked rooms to dramatically rewire and surreptitiously rewrite every rule of democratic life. Jefferson's "unalienable right" to "life, liberty, and the pursuit of happiness" protected for over 200 years by a written constitution, is automated by the procedural software of general-purpose computer science that no one understands, no one can fathom and hides undetected corruption.  The business assumptions of stand-alone mainframes that cultivated the isolated computer only worked when batch-processing ruled the day. 

The monstrous, monolithic software for these computers was not engineered for asynchronous parallel processing, on a globally interconnected, active digital surface of computer-science, now called Cyberspace. Procedural programs have no structural stability. They are inflammable match-stick in a crude match-box called a virtual machine. In the shared memory space of a virtual machine, commands can shift and slip as they touch the physical world of procedural software. The match-sticks are indistinguishable and easily confused. Malware and hacks thrive in this volatile virtual machine like damp intrudes and undermines the strongest basement. The binary basement of a virtual machine is both damp and moldy. The first responders are a system administrator and the centralized operating system services.  without any error detection or atomic compartmentalization. Consequently, while A.I. software achievements surpass human intelligence at the highest levels of the application stack, digital stupidity undermines this remarkable achievement in the rotting binary basement of Cyberspace. 

All digital actions take place on the binary surface of computer-science. This is where the laws of mathematical science as taught at school and university should apply. The universal scientific rules of symbolic computation were defined at Princeton University in 1936 by Alonzo Church, Alan Turing's tutor. The logical half of the Church-Turing Thesis is the λ-calculus, the physical half is the Turing Machine. Together an atomic machine is defined that mesh together like clockwork and prevent and unexpected movements between software abstractions and physical hardware. Malware is detected and hacking is prevented by this non-slip surface. The root cause Cyberwar and human disasters like the MCAS dilemma are all prevented by the non-slip mechanisms of a Church-Turing Machine. 

Onesided general-purpose computers began after WW2. They never needed data-tight and function-tight designs because batch processing mainframes worked in eight hour shifts, on just one algorithm at a time. The locked computer room was all that was needed to prevent disruption. This industry exploded and evolved into proprietory versions of the general-purpose computers. Each computer, invented by another team defined a unique binary architecture. Mathematical science and the Church-Turing Thesis were replaced by alternative, unscientific binary details. Software developed for one machine cannot not run on another computer because the binary structure depends on proprietary as opposed to scientific choices made by each hardware supplier. 

At first, the compiled programs sharing common memory to store the monolithic binary image of many indistinguishable procedures was bound statically as a concrete binary image. For batch processing this worked well but introducing dynamic interactions with the physical world from dynamic popup messages to email, browsing and instant messaging cracked the concrete image preordained by a compiler.  The gener-purpose computer from WW2 was never designed for dynamic networked interaction. The accumulated effort to prevent dynamic errors is huge and unreliable. Corruption caused by slipping and sliding between hardware and software on the active surface of computer science cannot be resolved by procedural software. The laws of time and space prevent sequential procedures from checking themselves. 

Corruption is caused by individual lines of imperfect code, introduced by accident or deliberately by design. Shared, unregulated privileges discombobulate binary proceedures. Attacks that originate from the far side of the world exploit this lack of engineered alignment between hardware and software. A binary computer is only data tight for one proceedure at a time, run in shifts, or perhaps a few procedures run by a single time-shared operating system. When stretched by a half century of networking without concern for software security it is unsurprising that cyberwars have grown out of unrestrained cybercrime. Binary computers are unscientific, pecular digital contraptions without consistent surface traction to prevent accidents. Especially accidents to complex mission-critical applications. Massive data breaches steal personal, industrial and national secrets without detection and without punishment. The disruption of Cyber-society will only be resolved when the surface of computer-science applies both sets of laws from the Church-Turing Thesis. 

Non-slip interactions are both data-tight and function-tight. It is how mathematics is taught on a chalkboard at school. Like Mathematics, trusted software is stabile across space and time. The pecular binary assumptions of general-purpose computers must be hidden by the object oriented boundaries of machine code abstractions created by a Church-Turing machine. Object-oriented machine code does not slip or slide because the boundary between individual abstractions and corresponding reality are hard wired. Object-oriented machine code detects errors that cause slips. Undetected error, dynamically introduced by A.I., by deliberate malware, by remote hackers, and by software flaws collectively sabotage Cyberspace. Alternatives to the 737 Max doom Cyber-society because untimatly all software in Cyberspace is life threatening. Undetected corruption  by a trivial game program can guarantee a violent reentry from virtual reality by another program. The unyielding physical nature of life caused by uncontrolled corruption cause innocent citizens to perish in a computer crash. 

Sudden death is not insured, a thousand cuts over extended time is equally undesirable. Unlike an aircraft crash, the decline and fall of America. All used by lost Cyberwars, uncontrolled growth in cybercrime, and the loss of individual, democratic rights including privacy and freedom. Ultimately the general-purpose computer science is run by binary dictators. Their solution is medieval, farming citizens as sheep. In every case, individual life becomes unbearable. 

The level-playing field of mathematical science is not defined by binary data, but by mathematics and  computational science in encapsulated in the Church-Turing Thesis. John von Neumann cut corners with his WW2 proprietory architecture for binary computers. Atomically, both Turing and von Neumann's binary computations implement physical realizations of Alonzo Church's universal model of computation.  

When the atomic nature of mathematics was distorted and stretched as a bigger binary computer beyond simple batch processing, the level playing field of science became the cyber-titans' branded dictatorships. Unfair privileges destroy mathematical integrity in an overstretched binary computer. The smallest crack or gap gaps in the mathematical logic allow undetected corruption to multiply. 

The incomplete implementation of the Church-Turing Thesis allows flawed and overstretched assumptions to be misused by America's global enemies, international criminals, and home-grown but poor quality binary software to exist and remain undetected. This digital corruption is the rust of industrial Cyberspace. Rust can be solved at higher levels of abstraction using encryption and block chain technology, but at the binary level of a general-purpose computer, corruption can only be solved by pure mathematical science. Machine level corruption stole control from the pilots to chash two 737 Max aircraft and ground the fleet. Hillary Clinton's presidential campaign was stalled by a targeted email and unexpected but massive data loss hurts every automated business. Finally, endless cases of Identity Theft cap individual creativity, stalling industrial investments, and small business growth. 

Branded binary conventions and procedural software at the machine level must be handcrafted by cult experts. This cottage-industry process lacks industrial strength that cannot be restored by the higher levels of abstraction. Binary computing is an unwitting willing promoter of global Cyberwar. Organized gangs, remote data breaches, crafted crimes, targeted phishing attacks are all undetected, executed by undisciplined binary machines that lack a cohesive architecture, further spoiled by the destructive assumptions of tyrannical, privileged operating systems. 

Self-interested Cyber-titans rule their digital kingdoms with the iron fists of medieval barons. Binary data rightfully belongs to individuals, but it is confiscated on sight, easily stolen, and slavishly resold for naked profit. Corruption hides in the cracks linking branded assumptions of proprietory binary data. General-purpose computers were designed for stand-alone mainframes then locked in splendid isolation. Networking changed the rules required for industrial-strength Cyber-society. 

Life in Cyberspace is dominated by fear of cybercrime. Individuality is suppressed by parochial rules of dictatorial titans fighting among themselves for global domination.  Cyber-citizens are cannon fodder, digital peasants, tithed as indentured servants of digital landlords. Freedom and individuality are lost because independence is suppressed. The outdated mainframe architecture imprisons software functionality. 

When low-cost semiconductors replaced mainframes, science was left behind. Private data is deliberately trapped by web searching, app stores, payment channels, data warehouses, and proprietary operating systems. Cyber-society lists like a sinking ship highjacked by pirates demanding ransom. Criminals are ignored by paid henchmen. Plagued by digital leaks, intimidated by fear of attack, slaved to serve the branded interests of Cyber-titans the nation staggers from crisis to crisis. 

In binary Cyberspace, rights evaporate. The memorialized constitution, consecrated by bloody wars, is shredded. Freedom must be preserved by every generation for innocent descendants to survive in Cyberspace at peace with the past and the future. Every generation benefits if hidden threats, naked bias, criminal intimidation, and dictatorial corruption is purged forever. Transparency from scientifically engineered rules levels the playing field for worst-case conditions. 

Undetected crime, opaque authority, crafted crimes, and global hacking is created on outdated computer-science.  The software requires computers to act as first responders for both program errors and crafted attacks. John von Neumann's architecture for binary computers implements only half of the Church-Turing Thesis. The missing half is Alonzo Church's universal computational model for networked abstractions that integrate with the physical world. 

Cyber-society cannot be run by branded digital dictators. Cyber-titans like Google, Amazon, Apple, and Microsoft must convert to the universal computational model that implements the scientific model taught to children at school. Free and independent computations that work symbolically, asynchronously, privately, distributed, and in parallel. One child's mistake does not infect another and the data they substitute in symbolic expressions is always private instead of public. This is nature's, scientific solution to complexity. This universal solution works in every language from Kindergarten to the greatest universities in the world. To share mathematical machine code guarantees the written constitution and a bill of rights for Cyberspace as the monumental achievement of the 21st Century. To fail will lead to a national catastrophe. 

The explicit rights of democracy belong to 'We the people' not to Cyber-titans, criminals, enemies, and trouble makers. These rights must remain certain for every citizen of the free world. This generation, like all others, must win the fight for equality and justice, at home and abroad, in Cyberspace and in the natural world because the evil side of human nature is reborn with every generation. Equality and freedom are endless fights that have moved from the street into global software to return as monstrous Cyber-dictatorships. 

Transparent computer science is a fight for the infallible automation of mathematics. Error-free mathematics calculated from symbols on a teacher's chalkboard. Symbolic computations infallibly automate by at school demonstrates the power of mathematical perfection from flawless expressions, purged of human error. This schoolroom model of computer science is devoid of malware and hacking. 

Released from the authoritarien controls needed for binary operating systems to work at all, individuals acquire infallibly automated, mathematical perfection. Individual symbols deconstruct software into protected function abstractions. Each represents a symbol in a scientific namespace of related function abstractions. Mathematics computed this way at school as (a + b = c) or later in university as E=m*c^2. 

Computer science implemented this way, used object-oriented machine code. Infallibly automation is achieved by flawless expressions of logic as a DNA tree of computations. Each mathematical namespace has hierarchical computational paths, navigated by calculations made along the way. An object-oriented namespace is modular. The atomic, molecular components in precise scientific equations. The DNA structure is computed in parallel, for example by children at school, navigating the expressions on the chalkboard. This fully transparent model purges all opaque power and eradicates malware. Power is decentralized as a level playing field of individual namespace systems.  Hackers and dictators can only attack themselves. Freedom exists for every individuals to flawlessly automate mathematical needs of infinite complexity for any private need. 

Cutting to the chase, democracy in Cyberspace depends on the infallible automation of mathematics. Like the Abacus and the slide, rule software must adopt the schoolroom model. Flawless mathematical calculations level the playing field equal for all. The universal computational model is the digital solution of scaleable Cyber-democracy worldwide. 

Nature's universal model of computation replaces the well-intentioned, best-effort of John von Neumann after WW2. Pervasive malware, unrestrained hacking, and dictatorial architectures are unacceptable characteristics for the survival of democracy morphed into Cyberspace. The criminal framework is inadequate for global Cyber-society to interact, grow, prosper. Cyber-society is the future of Civilization. It must be purged of crime and dictators. The future depends on trusted software, industrial-strength software that automatically resists malware and prevents dictatorial hacks. The schoolroom model of computer science is nature's only acceptable approach. 

Trusted software uses secure, hardware protected function abstractions to enforce national standards of law and order as enshrined by the constitution in Cyberspace. Each nation can protect its own standards independently on a common scientific platform. Extending laws of the land into Cyberspace is vital for nations and individuals to blossom as a Cyber-democracy instead of a Cyber-dictatorship. Trust depends on the full force of engineered science to enforce the schoolroom model.