Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

was a consistent understanding of the end points of the connection; that is, all calls went from one fixed point to another fixed point. This had the great merit, from a business standpoint, of clearly defining who was going to pay the bill for the call time; that is, the caller, unless one reversed the charges by calling collect, in which case the call receiver paid for the call. The terrestrial lines to the local telephone were always available, meaning that the capacity of the system was limited by the number of switch to switch circuits that could be created.

In the 1970’s, technology was developed that would provide for a switch to telephone connection made by way of a radio frequency channel that did not require a fixed, terrestrial line; the concept was termed cellular telephony. In the United States, a section of the radio frequency spectrum in the range of 800 MHz was allocated for mobile telephony. Communication in this frequency range is rather limited, with distances between the end-point telephone and the switching station that it talked to being typically in the 10 to 30 kilometer range. Given this range limitation and the rather minimal allocation of total radio frequency spectrum, an architecture was devised that allowed individual switching stations to use a variety of frequencies, with the available spectrum divided up into many carrier channels, each capable of supporting a single voice call. Each switching station was said to support a cell, with adjacent cells alternating frequencies to minimize cross channel interference for telephones equidistant from two or more different receivers. The switch to which the end-point telephones, now termed handsets, would connect was termed a cell base-station. Handsets, as it turns out, would be the first personal electronic devices, and, to this day, the most numerous.

As the network developed, phone companies, and later countries, entered into agreements for charging each other their respective share of the technical consumables associated with each phone call. All these agreements were implemented in central switches which routed the calls to their proper destination while at the same time, accounting for them.

In the 1980’s, electronics had gotten to a point where it was possible to put, in a cost effective manner, a mobile phone handset in the hands of the general public. Each handset would communicate by radio to nearby antennas that would be associated with equipment allowing the routing of voice to the telephone operator company office, and from there to the general telephony network.

By far the most successful system is GSM (Global System Mobile), whose users had passed 1 billion in numbers at the turn of the XXIst century, and passed 2 billion a few years later. If you own a mobile phone, it is most likely a GSM phone. As we’ve seen in Chapter 4, the GSM network was, from the start, designed with a trusted computer component at its heart; a smart card called a Subscriber Identity Module (SIM). Every GSM phone has one. The mobile telecommunication network was in fact, the first general network to have addressed straight on the issue of security. This actually became necessary for the simple reason that as long as the telephony network had been relying on a physical cable to the house, hacking into the network would call for tapping into that wire somewhere, something which was not impossible to do, and was actually done, but something that required a physical intervention that could relatively easily be detected and dealt with by the existing legal systems.

When communities were established in a wide manner over the air, the story changed. It would now be possible for somebody to hack into the system by simply communicating via radio with the antenna of the telephone. Henceforth came the idea of associating with the handset the Subscriber Identity Module, i.e. a secure repository of user information. If the mobile phone

176

5 Fabric of Society

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)