Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

truly the purveyors of complex policy on behalf of the individual person. Such use and orientation of responsibility are really not feasible with today’s high security computing platforms. They are too big, too expensive and too complex for the ubiquitous personal prosthesis role. Once such systems are required to service the policy requirements, including personal security characteristics, of more than one person, their very nature becomes suspect.

Our recurring example of an iconic personal electronic device in use today is the mobile cellular telephone. The GSM variant of mobile phones is comprised of a dual anatomy: the handset and the Subscriber Identity Module (SIM). The Subscriber Identity Module is a secure core that provides a degree of intrinsic security through its tamper-resistant and tamper-evident construction. The handset, on the other hand, encompasses a much more powerful but complex, and hence more vulnerable, set of capabilities; a powerful processor, lots of memory and a preferably intuitive and powerful user interface. Unlike the SIM, the handset has the more general characteristics we might expect from a personal computer, including its vulnerabilities to attack from malicious hackers. In the article Malware Goes Mobile in the November, 2006 issue of Scientific American, Mikko Hypponen indicated that malicious software akin to the viruses that have proven such a bane to personal computer systems was beginning to show up on mobile phone handsets. Given the much more structured and protected facilities for software modification on SIMs, the same types of attacks have not proven generally successful there. Another incarnation of a personal electronic device is the Blackberry, a device that enables the user to send and receive e-mail, along with performing a variety of other personal convenience functions. Both the mobile phone and the Blackberry make use of radio frequency channels to allow the user to connect to ubiquitous communication networks. Indeed, the latest incarnations of the latter include a variant of the former. All types of such devices make use of rechargeable batteries to effect portable, local power. The devices are small, aimed at being carried on the person of their user and effecting interactions between the user and other entities through radio frequency based connections. Both use a secure core for extended communications though GSM networks. Such wireless connectivity offers enhanced convenience, as the device does not have to leave the bearer’s direct, physical possession to be used. This greatly facilitates enhanced security and thereby enhanced trust characteristics. Consequently, we will assume a two-element architecture through which to consider the enhanced capabilities of the transcendent personal device; a sensori-motor body coupled to a protected, trusted core agent; a cognitive element that allows for some degree of trust establishment for the transcendent personal device as a whole. In drawing a parallel to evolutionary development leading to the human species, this suggests that current personal electronic devices are comparable to the hominids in general, if not to more specific precursors to Homo sapiens. But all this now leads us to perhaps the greatest departure from current architectures; a mutational leap in the vein of the emergence of modern humans some 50,000 years ago or more.

Self-Actualization

In most systems today, a personal electronic device secure core functions as a server to the system to which it connects. More strongly stated, the secure core is a slave to the external system’s mastery. When used as an admittance token, an employee card embedding a secure core may be inserted into or brought close to a turnstile, which is the interface point for a physical entry control system. When this system wants a bit of information from the employee card, it issues a command to retrieve it from the card. For some operations, the card bearer is asked to enter some identifying information, for example a Personal Identification Number (PIN) directly into the interface point for the control system. This system then conveys this personal identification number over to the

 

9 Mutation

321

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)