I do not expect everyone to read, understand, agree, or enjoy every chapter in this book. The subject of cybersecurity is too extensive, while a readable text is too short. Instead, I hope to provoke a debate on the future and the urgent need for Industrial Strength Computer Science. Everyone should be concerned; damaging cyber-society by accident is one thing, but the critical flaws in the vital technology of the 21st Century are visible to one and all, and a scientific solution exists.
I attempt to attract all readers to discover something about the black art of the 21st Century. It is important to us all. There are several chapters anyone can read without any great technical skills. The last chapter, in particular, is for all to understand. The message I hope is clear. There are other more technical chapters, but I do not write them for a technical review. They are there to make a point, not to define a solution. The reader should know solutions exist while the details must be refurnished by today’s experts and the latest technology. This time directed by some greater patriotic force. Commercial computer science will not do the trick. So, I hope that legislators will find this book instructive. They must turn a new page to save democracy, or the same old results will disappoint, and the end game will be equally unacceptable.
Software unreliability, cyber insecurity, unexpected digital catastrophes, the tragic loss of intellectual property, service outages and continuous software upgrades is a wooden bridge to an industrial society, that cannot sustain a virtualized industrial world. The unfair and unelected privileges in a General-Purpose Computer are antithetical to the progress of democracy. The General-Purpose Computer is changing the grand experiment of America. Law and order cannot fall to super-intelligent malware in Life 3.023 when super-human software roams wild. Cyberdemocracy will only exist when citizens govern privacy in cyberspace.
Within a decade, software automation in every conceivable form will dominate life in the globally interconnected electronic village of the 21st Century. For society to survive the software must be trusted. A Church-Turing Machine responds to the challenge; it is the only proven way to guarantee trusted software throughout cyberspace.
General-Purpose Computer Science began in the pre-electronic age of WWII and the Cold War. It grew like Jekyll and Hyde24 into an international weapon of mass destruction disguised as a recreational stimulant. Through digital convergence, this WMD is already in the hands of criminals and enemies. The added threat of a breakout of super-intelligent malware creates scenarios which are too horrific to contemplate. The point of singularity when Artificially Intelligent Malware is both unspeakable and unstoppable is already in sight. The solution is urgently needed. Industrial Strength Computer Science must be a national priority.
Therefore, this book is deliberately provocative; it is intended to incite a reaction to a dilemma which faces us all, citizens as well as experts in computer science. At the risk of repetition, the essays are self-standing with footnotes, but I leave out explaining the Byzantine and opaque software security systems created by General-Purpose Computer Science. Not even experts can explain how they work, they must be blindly trusted. It is only necessary to appreciate the inherent weakness and unavoidable threats to the survival of cyber-society.
I do not worship the dictatorial Gods of General-Purpose Computer Science. I am an atheist, and like Richard Dawkins25, I believe in a gene-centered view of evolution using the universal model of computation. This natural model of productive life translates to software in a Church-Turing Machine. Turing’s α-machine becomes a digital gene. A digital survival machine for the cellular organs of software in hostile cyberspace, it leads to the infallible automation pioneered by Charles Babbage as computer science without human errors. Each species of software is a private λ-calculus Namespace that evolves through a directional DNA hierarchy using the same universal model of computation that creates life from mathematics. These software machines are the individual cyber suits for the safe colonization of dangerously hostile cyberspace.
General-Purpose Computer Science still hopes, in vain, that urgently patched and re-patched software upgrades will achieve stability, but it cannot. If that were true, patching would have ended with epic cybersecurity. However, instability, successful attacks, and patching continue. Cyber insecurity destabilizes industrial society and progress eventually grinds to a halt or will be replaced by cyber dictatorships.
Experts dismiss my doomsday scenario, as it was in 1977. Institutions and individuals depend on General-Purpose Computers for jobs, profit, or crime and spying, and they all want things to remain the same, it is inexcusable. Ethics alone should lead to considering the harm, inflicted on generations, yet to come when Artificially Intelligent Malware breakout takes place. Creating a weapon of mass destruction should be a crime. Unavoidably, they harm civilization by escalating global wars through crafted cyber catastrophes.
Students of computer science should heed the warning signs, and research the Church-Turing Thesis, Church-Turing Machines, Capability Limited Addressing and Industrial Strength Computer Science. Industrial Strength Computer Science is the vital next step for the mature software industry and a survivable cyber-society. It is a massive undertaking and a life-long pursuit with many facets. It continues to grow as cybercrimes increase, and as Artificially Intelligent Malware is used in ways beyond our expectation and understanding or reasoned human reaction. As nations, industries, agencies, individuals, and suppliers, all struggle in this new age of global digital convergence where super-smart software, weaponized malware, global cyber wars, and super intelligent software roam free, only a Church-Turing Machine offers the solution for the survival of cyber society.
Fixing this cornerstone of future society is the essential prerequisite to constructive progress as a virtualized democracy where a government of the people, by the people, and for the people survives. The foundation stones of freedom, justice, and equality must be secured if cyber society is to work. It requires a reliable global software machine defined by pure mathematics as understood by every school child. Then and only then can future generations trust and safely evolve both democratically and scientifically.
For those who are interested in more detail on the PP250 through published and unpublished working papers and other references, feel free to contact me at email@example.com or visit my blog at www.sipantic.com for help.
I also recommend computer scientists, and digital engineers register and support the Foundation of Life26 movement to prevent all forms of A.I. software break-out. Action is needed to prevent a tragic endgame, and the loss of all freedoms won throughout the history of civilization. Digital technology must shelter users from attacks, and computer science must protect society from self-inflicted human failures.