Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

if in our neighborhood, thieves come and just break the windows? Obviously, the security measures we have in place are not sufficient to prevent that. Just as obviously, this problem still exists because we did no evaluate the threats properly before we put our securities procedures in place. So even if quality and security standards are followed making sure that our processes are set and followed, it doesn’t help if those processes are based on the wrong appreciation of threats and capabilities to answer them. For computers as for houses, we need to understand the content we are trying to protect, the potential threats to that content and the measures that are available to alleviate the threats. Then we must define the quality and security processes accordingly. So, let us consider a bit how we accomplish that. Particularly as this all pertains to the establishment of trust through causality in computers or personal electronic devices.

As an anecdotal introduction, we call your attention to the construction of the new United States Embassy in Moscow. A highly sanitized version of this rather intriguing story is found on the United States Department of State Web site. A few additional wrinkles in our recounting of the story derived from various news accounts. The overture for this interaction between the United States and the Soviet Union began back in 1934. The United States sought an accommodation with the Stalin Government to build a new embassy complex in Moscow. The initial overture was rebuffed and the American Embassy occupied essentially temporary facilities for several decades thereafter. In the 1960’s, a reciprocal request for new facilities from the Soviet Government finally allowed an arrangement to be consummated. Unfortunately, at least for the security concerns of the United States, the arrangement entailed the acquisition of construction materials and support from Soviet sources. This is the interesting point from the perspective of trust through causality. As it became apparent, it was difficult to certify the sanctity of wet concrete and preformed building materials. In particular, it was possible for the Soviets to secret a huge number of clandestine listening devices into such materials. Thus, once completed, the embassy building was essentially a large microphone connected directly into the Soviet intelligence agencies. Some decades later, an arrangement was finally reached to demolish the upper levels of the building and rebuild those using American companies with appropriate security clearance. In general, boundaries between security components can be the most vulnerable aspects of such systems. The boundary between successive floors of a building is a surprising point of consideration.

As we’ve seen previously, personal electronic devices are typically composed of two parts: a general facility and a secure core. Sometimes, a personal electronic device can be reduced to a secure core. Since trust is our subject of inquiry here, we will consider in some detail secure cores. Our consideration will look in turn at their anatomy, their physiology, their embryology and then their sociology. As we do so, we will highlight the threats to be considered as well as possible responses. Once this is done, we will be able to set the proper processes, which in turn will be candidate for evaluation following the quality and security standards we discussed previously, and their corresponding certifications. In the following, our point of view will be that of developing trust in networks. We will provide a panorama of security threats and counter measures, and their associated trust level. This will not be a detailed technical discussion, for two reasons. The first one is that we would probably bore our reader. For the interested, more specialized literature is available, a sample of which is listed in the bibliography. The second reason is that, as insiders of the security industry we choose to limit our disclosure of security since it is typically true that insiders know more than is ever presented in public at any point in time. After all, the insiders build the products. This is, of course a bit of hyperbole and is actually illustrative of perhaps the current dominant form of security within the corporate world; that is, security through obscurity. However, it is true that within the computer world, just as within the secular and religious worlds, neither wizard nor witch (nor, apparently, public servants) ever divulge all of their secrets! That notwithstanding, let us resume the consideration of the secure cores of personal electronic devices.

 

7 In His Own Image

227

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)