Industrial Strength Cyber Society

 


By K. J. Hamer-Hodges, FIEE

The progress of industrial society strives for equality and justice. It is the never ending journey of democracy. Equality and fairness is destinations but a goal for humanity. The goal remains unmet and constant effort in needed to progress. Humanity is flawed by envy, wrath, gluttony, pride, lust, sloth and greed, the seven deadly sins. Every generation fights to overcome these flaws. Citizens suffer and die when these sins have free reign. Because humanity is imperfect democracy is also imperfect. Laws are broken and advantages are unfairly taken. From the birth of Civilization technology is used to take advantage over others. Civilizations driven by technology must changes laws to improve their democratic order. The goal is constant but the means change with the technology. Computers introduce software as the latest challenge for democracy. Automation subcontracts life-supporting reliability from industrial operators to blindly trusted software. As a force for good and bad software that runs independently contributes to Jefferson's oft-quoted "unalienable right" to "life, liberty, and the pursuit of happiness."

Software automation changes the nature of human life. Computers and software extend and increase human abilities. But individuality and independence are lost. Software damages and distorts societies on-mass by the rules of a few blindly trusted software-dictators. Individuals are not equal in Cyberspace. Digital justice is nonexistent and unfair. The nature of equality and the administration of justice is the inherited privilege of Cyber dictators. Unalienable rights and discarded and democracy is thereby decapitated by the Cyber-titans who dictate general-purpose computer science. Civilization is sterilized by unfair privileges that replace the unalienable rights with the preferences of digital dictators. 

Cyber-society is not served by general-purpose computers that lack industrial strength. Instead, Cyberspace serves dictators, criminals, and enemies at the expense of freedom, equality, and the pursuit of happiness. The general-purpose computer cannot support a democratic nation. It is unequipped to function as the digital platform for the future of Civilization. The future will be rewritten by software. This software must be trusted. It cannot run on digital hardware that tolerates, dictatorship, criminals, and enemies because it leaks like a digital sieve. Private data is confiscated and stolen while mission-critical applications suffer spectacular failures. Infinite variations to Boeing's 737 Max software disaster lurk throughout Cyberspace. Basic services from food and water to first responders and government must be fail-safe. Enemies exploit every digital weakness to spread malware and remotely hack software worldwide destroying the vitality, dependability of security in Cyber-society. 

Before the ubiquitously interconnected semiconductors of Cyberspace dramatically rewired and surreptitiously rewrote every rule of life, the business assumptions of stand-alone mainframes cultivated the general-purpose computer. for time shared batch-processing using procedural programs as a centralized, privileged operating system. This software augmented the limited hardware available for the decades prior to the semiconductor explosion.  These monstrous machines were not designed for asynchronous parallel processing, on the active digital surface of computer-science. Procedural programs lack stability in the shared memory space, commands can shift and slip when they touch the physical world in a general-purpose computer. Malware and hacks thrive on this porous surface like water leaks in a dilapidated home. The binary basement is damp and moldy without any error detection or atomic compartmentalization. Consequently, while A.I. software achievements surpasses human intelligence at the highest levels of the application stack, digital stupidity undermines this remarkable achievement in the rotting binary basement of Cyberspace. 

All digital actions take place on the binary surface of computer-science. This is where the laws of mathematical science as taught at school and university should apply. The universal scientific rules of symbolic computation were defined at Princeton University in 1936 by Alonzo Church, Alan Turing's tutor. The logical half of the Church-Turing Thesis is the λ-calculus, the physical half is the Turing Machine. Together an atomic machine is defined that mesh together like clockwork and prevent and unexpected movements between software abstractions and physical hardware. Malware is detected and hacking is prevented by this non-slip surface. The root cause Cyberwar and human disasters like the MCAS dilemma are all prevented by the non-slip mechanisms of a Church-Turing Machine. 

Onesided general-purpose computers began after WW2. They never needed data-tight and function-tight designs because batch processing mainframes worked in eight hour shifts, on just one algorithm at a time. The locked computer room was all that was needed to prevent disruption. This industry exploded and evolved into proprietory versions of the general-purpose computers. Each computer, invented by another team defined a unique binary architecture. Mathematical science and the Church-Turing Thesis were replaced by alternative, unscientific binary details. Software developed for one machine cannot not run on another computer because the binary structure depends on proprietary as opposed to scientific choices made by each hardware supplier. 

At first, the compiled programs sharing common memory to store the monolithic binary image of many indistinguishable procedures was bound statically as a concrete binary image. For batch processing this worked well but introducing dynamic interactions with the physical world from dynamic popup messages to email, browsing and instant messaging cracked the concrete image preordained by a compiler.  The gener-purpose computer from WW2 was never designed for dynamic networked interaction. The accumulated effort to prevent dynamic errors is huge and unreliable. Corruption caused by slipping and sliding between hardware and software on the active surface of computer science cannot be resolved by procedural software. The laws of time and space prevent sequential procedures from checking themselves. 

Corruption is caused by individual lines of imperfect code, introduced by accident or deliberately by design. Shared, unregulated privileges discombobulate binary proceedures. Attacks that originate from the far side of the world exploit this lack of engineered alignment between hardware and software. A binary computer is only data tight for one proceedure at a time, run in shifts, or perhaps a few procedures run by a single time-shared operating system. When stretched by a half century of networking without concern for software security it is unsurprising that cyberwars have grown out of unrestrained cybercrime. Binary computers are unscientific, pecular digital contraptions without consistent surface traction to prevent accidents. Especially accidents to complex mission-critical applications. Massive data breaches steal personal, industrial and national secrets without detection and without punishment. The disruption of Cyber-society will only be resolved when the surface of computer-science applies both sets of laws from the Church-Turing Thesis. 

Non-slip interactions are both data-tight and function-tight. It is how mathematics is taught on a chalkboard at school. Like Mathematics, trusted software is stabile across space and time. The pecular binary assumptions of general-purpose computers must be hidden by the object oriented boundaries of machine code abstractions created by a Church-Turing machine. Object-oriented machine code does not slip or slide because the boundary between individual abstractions and corresponding reality are hard wired. Object-oriented machine code detects errors that cause slips. Undetected error, dynamically introduced by A.I., by deliberate malware, by remote hackers, and by software flaws collectively sabotage Cyberspace. Alternatives to the 737 Max doom Cyber-society because untimatly all software in Cyberspace is life threatening. Undetected corruption  by a trivial game program can guarantee a violent reentry from virtual reality by another program. The unyielding physical nature of life caused by uncontrolled corruption cause innocent citizens to perish in a computer crash. 

Sudden death is not insured, a thousand cuts over extended time is equally undesirable. Unlike an aircraft crash, the decline and fall of America. All used by lost Cyberwars, uncontrolled growth in cybercrime, and the loss of individual, democratic rights including privacy and freedom. Ultimately the general-purpose computer science is run by binary dictators. Their solution is medieval, farming citizens as sheep. In every case, individual life becomes unbearable. 

The level-playing field of mathematical science is not defined by binary data, but by mathematics and  computational science in encapsulated in the Church-Turing Thesis. John von Neumann cut corners with his WW2 proprietory architecture for binary computers. Atomically, both Turing and von Neumann's binary computations implement physical realizations of Alonzo Church's universal model of computation.  

When the atomic nature of mathematics was distorted and stretched as a bigger binary computer beyond simple batch processing, the level playing field of science became the cyber-titans' branded dictatorships. Unfair privileges destroy mathematical integrity in an overstretched binary computer. The smallest crack or gap gaps in the mathematical logic allow undetected corruption to multiply. 

The incomplete implementation of the Church-Turing Thesis allows flawed and overstretched assumptions to be misused by America's global enemies, international criminals, and home-grown but poor quality binary software to exist and remain undetected. This digital corruption is the rust of industrial Cyberspace. Rust can be solved at higher levels of abstraction using encryption and block chain technology, but at the binary level of a general-purpose computer, corruption can only be solved by pure mathematical science. Machine level corruption stole control from the pilots to chash two 737 Max aircraft and ground the fleet. Hillary Clinton's presidential campaign was stalled by a targeted email and unexpected but massive data loss hurts every automated business. Finally, endless cases of Identity Theft cap individual creativity, stalling industrial investments, and small business growth. 

Branded binary conventions and procedural software at the machine level must be handcrafted by cult experts. This cottage-industry process lacks industrial strength that cannot be restored by the higher levels of abstraction. Binary computing is an unwitting willing promoter of global Cyberwar. Organized gangs, remote data breaches, crafted crimes, targeted phishing attacks are all undetected, executed by undisciplined binary machines that lack a cohesive architecture, further spoiled by the destructive assumptions of tyrannical, privileged operating systems. 

Self-interested Cyber-titans rule their digital kingdoms with the iron fists of medieval barons. Binary data rightfully belongs to individuals, but it is confiscated on sight, easily stolen, and slavishly resold for naked profit. Corruption hides in the cracks linking branded assumptions of proprietory binary data. General-purpose computers were designed for stand-alone mainframes then locked in splendid isolation. Networking changed the rules required for industrial-strength Cyber-society. 

Life in Cyberspace is dominated by fear of cybercrime. Individuality is suppressed by parochial rules of dictatorial titans fighting among themselves for global domination.  Cyber-citizens are cannon fodder, digital peasants, tithed as indentured servants of digital landlords. Freedom and individuality are lost because independence is suppressed. The outdated mainframe architecture imprisons software functionality. 

When low-cost semiconductors replaced mainframes, science was left behind. Private data is deliberately trapped by web searching, app stores, payment channels, data warehouses, and proprietary operating systems. Cyber-society lists like a sinking ship highjacked by pirates demanding ransom. Criminals are ignored by paid henchmen. Plagued by digital leaks, intimidated by fear of attack, slaved to serve the branded interests of Cyber-titans the nation staggers from crisis to crisis. 

In binary Cyberspace, rights evaporate. The memorialized constitution, consecrated by bloody wars, is shredded. Freedom must be preserved by every generation for innocent descendants to survive in Cyberspace at peace with the past and the future. Every generation benefits if hidden threats, naked bias, criminal intimidation, and dictatorial corruption is purged forever. Transparency from scientifically engineered rules levels the playing field for worst-case conditions. 

Undetected crime, opaque authority, crafted crimes, and global hacking is created on outdated computer-science.  The software requires computers to act as first responders for both program errors and crafted attacks. John von Neumann's architecture for binary computers implements only half of the Church-Turing Thesis. The missing half is Alonzo Church's universal computational model for networked abstractions that integrate with the physical world. 

Cyber-society cannot be run by branded digital dictators. Cyber-titans like Google, Amazon, Apple, and Microsoft must convert to the universal computational model that implements the scientific model taught to children at school. Free and independent computations that work symbolically, asynchronously, privately, distributed, and in parallel. One child's mistake does not infect another and the data they substitute in symbolic expressions is always private instead of public. This is nature's, scientific solution to complexity. This universal solution works in every language from Kindergarten to the greatest universities in the world. To share mathematical machine code guarantees the written constitution and a bill of rights for Cyberspace as the monumental achievement of the 21st Century. To fail will lead to a national catastrophe. 

The explicit rights of democracy belong to 'We the people' not to Cyber-titans, criminals, enemies, and trouble makers. These rights must remain certain for every citizen of the free world. This generation, like all others, must win the fight for equality and justice, at home and abroad, in Cyberspace and in the natural world because the evil side of human nature is reborn with every generation. Equality and freedom are endless fights that have moved from the street into global software to return as monstrous Cyber-dictatorships. 

Transparent computer science is a fight for the infallible automation of mathematics. Error-free mathematics calculated from symbols on a teacher's chalkboard. Symbolic computations infallibly automate by at school demonstrates the power of mathematical perfection from flawless expressions, purged of human error. This schoolroom model of computer science is devoid of malware and hacking. 

Released from the authoritarien controls needed for binary operating systems to work at all, individuals acquire infallibly automated, mathematical perfection. Individual symbols deconstruct software into protected function abstractions. Each represents a symbol in a scientific namespace of related function abstractions. Mathematics computed this way at school as (a + b = c) or later in university as E=m*c^2. 

Computer science implemented this way, used object-oriented machine code. Infallibly automation is achieved by flawless expressions of logic as a DNA tree of computations. Each mathematical namespace has hierarchical computational paths, navigated by calculations made along the way. An object-oriented namespace is modular. The atomic, molecular components in precise scientific equations. The DNA structure is computed in parallel, for example by children at school, navigating the expressions on the chalkboard. This fully transparent model purges all opaque power and eradicates malware. Power is decentralized as a level playing field of individual namespace systems.  Hackers and dictators can only attack themselves. Freedom exists for every individuals to flawlessly automate mathematical needs of infinite complexity for any private need. 

Cutting to the chase, democracy in Cyberspace depends on the infallible automation of mathematics. Like the Abacus and the slide, rule software must adopt the schoolroom model. Flawless mathematical calculations level the playing field equal for all. The universal computational model is the digital solution of scaleable Cyber-democracy worldwide. 

Nature's universal model of computation replaces the well-intentioned, best-effort of John von Neumann after WW2. Pervasive malware, unrestrained hacking, and dictatorial architectures are unacceptable characteristics for the survival of democracy morphed into Cyberspace. The criminal framework is inadequate for global Cyber-society to interact, grow, prosper. Cyber-society is the future of Civilization. It must be purged of crime and dictators. The future depends on trusted software, industrial-strength software that automatically resists malware and prevents dictatorial hacks. The schoolroom model of computer science is nature's only acceptable approach. 

Trusted software uses secure, hardware protected function abstractions to enforce national standards of law and order as enshrined by the constitution in Cyberspace. Each nation can protect its own standards independently on a common scientific platform. Extending laws of the land into Cyberspace is vital for nations and individuals to blossom as a Cyber-democracy instead of a Cyber-dictatorship. Trust depends on the full force of engineered science to enforce the schoolroom model.


Comments