This position paper summarizes the affirmative argument supporting the proposition: ''The concept of the Trusted Computing Base as a basis for constructing systems to meet security requirements is fundamentally flawed and should no longer be used to justify system security architectures.''