Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

likely be enabled through wireless RF channels rather than wired connections. If this capability were to be blended with an enhanced understanding of the brain’s memory mechanisms, then it might well be possible to establish a direct communication channel between the transcendent personal device and discrete brain functions. One might speculate that this would represent the definitive interconnection mechanism. Moreover, should it become possible, it would seem that the establishment of a trust infrastructure encompassing both the brain and the external device would be a distinct possibility.

Widespread computer networks such as the Internet present something of an altered sensori-motor experience for the human users of computer tools. Specifically, the characteristics of spatial and temporal locality are more difficult to establish than is the case in the purely physical ecosystem. Despite the admonition of the AT&T advertising campaign to “reach out and touch someone,” tactile response is not readily available through a telephonic connection. The establishment of a policy infrastructure, however, quite often requires the detailed location of any transaction participants in order to fully define the rules of the transaction. For example, in transactions through which a sale of content is concluded, the governing social ecosystem may well establish a tax on the amount of the transaction based on location. Consider that in Texas, sales taxes are applied on transactions by at least three distinct taxing authorities in each county: the county itself, the applicable school district, and the applicable city. Each of these is a taxing authority delineated by geography; hence, by physical location. While sales taxes are not required on all Internet purchases at the present time, there is a very strong likelihood that this will become the norm within a few years. So, applying the correct rules for a transaction may require a determination of physical location. Perhaps a more pressing need, however, is the determination of physical location as a means to ward off threats.

At the 16th USENIX Security Symposium in September, 2007, Saar Drimer and Steven Murdoch of the Cambridge University Computer Laboratory presented the specification of a “man-in-the-middle” type computer attack that they claim can succeed against certain financial transaction systems based on bank chip cards and point-of-sale terminals. Their paper was entitled Keep your enemies close: Distance bounding against smartcard relay attacks. This attack makes use of malevolent equipment to intercept the protocols involved in one transaction and to apply those to a second, fraudulent transaction at some associated location. The end result of the attack is that a person assumes they’re paying one amount for an item purchased in one store when in fact they end up providing payment for a different item at a different store. One means suggested for countering such an attack is to measure the delay time associated with various steps in the protocols in order to confirm that both ends of the transaction are within a known distance of each other. This approach is a very indirect approach to determination of both time and location. The direct establishment of both time and location as a trusted characteristic of the transaction would be a significant enhancement to the transcendent personal device.

Perhaps the most significant long term benefit to be gained from a capability on the part of the transcendent personal device to determine its physical location is the support it will then provide in the use of deictic discourse in the communication of policy. Such discourse is a very natural aspect of languages used by humans in their interactions with each other. The term refers to the ability on the part of distinct parties within a given interaction to determine relationships and hence to use language constructs that are based on these relationships. Consider the request that could be used to initiate a transaction between two people; “Please sell me this book and send it here.” This statement uses a number of words, called deictic words, which can only be correctly interpreted through contextual relationships implicit in the statement, but necessary to the ensuing transaction. The word “please” infers a second party in the transaction, a bookseller of some type

 

9 Mutation

337

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)