zenpundit.com » open-source

Archive for the ‘open-source’ Category

Wikileaks and the Search for a Cryptographic Mythology

Thursday, December 2nd, 2010

[ by Charles Cameron ]

Jean Rosenfeld of the UCLA Center for the Study of Religion just posted a comment on an earlier Zenpundit post of mine, opening up a topic which may interest some readers here: that of Wikileaks founder Julian Assange’s mythological associations.

1

Jean had earlier pointed me to Assange’s use of the name “Marutukku” to describe his encryption program, and a little fishing brought me to these two Assange-related documents:

One Man’s Search for a Cryptographic Mythology
Enuma Elish

2

I’d been idly wondering about cryptographic mythology myself, as it happens, nudged by vague memories of a cache of porno images tweaked by jihadists as encoding devices for steganography.

Steganography is the cryptographic – or is it kabbalistic? — art devised by one Abbot Trithemius, whose 1518 Polygraphia is the first work on cryptography printed in Europe, and whose Steganographia was known in MS to such hermetic philosophers as Cornelius Agrippa, Giordano Bruno and John Dee. Jim Reeds captures the ambiguity of Trithemius’ work nicely in his paper, Solved: The Ciphers in Book III of Trithemius’s Steganographia, when he asks:

Is it [the Steganographia] primarily an exposition of cryptographic techniques disguised as angel magic, or is it primarily a magic work disguised as cryptography?

Readers of Frances Yates and Ioan Couliano will be somewhat familiar with these matters.

And jihadist steganography? The technique itself is described in the al-Fajr Information Center’s Technical Mujahid magazine of Feb. 2007 according to a Jamestown Foundation Terrorism Monitor piece, but the reports of actual jihadist use of the technique may turn out to be fabrications.

3

But it was Julian Assange‘s bliss we were trying to follow, right?

Assange sidekick Suelette Dreyfus wrote The Idiot Savants’ Guide to Rubberhose — which is the manual for Assange’s crypto program… but this business of naming the program gets complicated, eh?

Dreyfus explains:

If you’re wondering about the name of this program, Marutukku is the internal development name (it’s spelled Ru-b-b-e-r-h-o-s-e, but it’s pronounced M-a-r-u-t-u-k-k-u)

In case you didn’t get it, there may be a play on Lewis Carroll there, and the exchange Alice has with the White Knight in Through the Looking-Glass as to what the name of a certain very sad song is called.

Alice aside – and such detours are in fact the very method of discovery in non-linear thinking – Dreyfus offers as an epigraph to her piece the following quote:

The third name is MARUTUKKU, Master of the arts of protection, chained the Mad God at the Battle. Sealed the Ancient Ones in their Caves, behind the Gates.

which she attributes to “The Akkadian Creation Epic”. That would be the Enuma Elish.

Assange, in his One Man’s Search for a Cryptographic Mythology, attributes his choice of the name Marutukku to a conversation he had with a friend concerning the Enuma Elish, telling us (after much other curious and wandering stuff) that his friend recommended the god Marduk’s third name to him, saying

The third name is MARUTUKKU, Master of the arts of protection, chained the Mad God at the Battle. Sealed the Ancient Ones in their Caves, behind the Gates.

Assange liked the idea, observing, “Even the very word MARUTUKKU looked like it had been run through a product cipher”.

A little later in the same document, he quotes from the Enuma Elish, and the phrases given above appear in the quoted excerpts from that text – although they are not present in the version “Based on the translation of E. A. Speiser, with the additions by A. K. Grayson, Ancient Near Eastern Texts Relating to the Old Testament, third edition, edited by James Pritchard (Princeton, 1969), pp. 60-72; 501-503, with minor modifications” that Assange offers us on the sibling-page at Enuma Elish.

As Dr. Rosenberg pointed out to me, “the quote — if it is a translation — differs from other translations I found on the Internet. It is more specific and extensive and ‘mythological.'”

4

Okay, I’ve kept what may be the most practical (ie 21st century) “creative leap” made by my skittish and wandering mind for this, my penultimate paragraph.

Oxford’s Anders Sandberg blogs today about Assange’s application of network theory to conspiracies, quoting Assange as saying:

Conspiracies are cognitive devices. They are able to out think the same group of individuals acting alone Conspiracies take information about the world in which they operate (the conspiratorial environment), pass it around the conspirators and then act on the result. We can see conspiracies as a type of device that has inputs (information about the environment) and outputs (actions intending to change or maintain the environment).

And Anders’ summary of Assange’s position? “In short, conspiracies are a kind of collective intelligence enhancement.”

[ admission: I associate the name Anders Sandberg with some brilliant early net writings on role-playing games and the hermetic tradition – I’m hoping this is the same guy ]

5

Finally, let’s go back to that enhancement of the Enuma Elish text. That phrase, “Sealed the Ancient Ones in their Caves, behind the Gates” struck me, too – it reminded me of the Chthulu Mythos of HP Lovecraft, and its apocalypse:

That cult would never die until the stars came right again and the secret priests would take Cthulhu from His tomb to revive His subjects and resume His rule of earth. The time would be easy to know, for then mankind would have become as the Great Old Ones; free and wild, and beyond good and evil, with laws and morals thrown aside and all men shouting and killing and revelling in joy. Then the liberated Old Ones would teach them new ways to shout and kill and revel and enjoy themselves, and all earth would flame with a holocaust of ecstasy and freedom.

And with that quote from Lovecraft, courtesy of Erik Davis, we have returned by a commodius vicus of recirculation back to the hermetically sealing and revealing world of John Dee.

Enter Stage Right

Tuesday, September 28th, 2010

Good friend and co-author Michael Lotus, a.k.a. “Lexington Green has a feature article as he debuts at The RIGHTNETWORK. Congrats Mike!

The Insurgency

Mass political movements often begin with a single, striking event. The Insurgency began in the fall of 2008, when President Bush, Senator Obama, and Senator McCain appeared together to endorse the TARP bailout.  At that moment the lights came on for many Americans. It was glaringly obvious that both political parties jointly operated the system, and the system existed to protect the well connected at the expense of everyone else. The public opposed the TARP bailouts; the banks got their money anyway. The Insurgency, long brewing, began.

The Insurgency is a movement of citizens directed against unsustainable government taxation and regulation, and spending, both of which benefit insiders rather than ordinary people. The target of the Insurgency is a leviathan in Washington, D.C. that will ruin us all if it is not dismantled. 

The Insurgency is part of a long tradition of mass political movements in our history. It has the potential to make a fundamental change in American life-for the better.

….2.  What is the Insurgency? Why now?

For now the Tea Party movement, ignited by Rick Santelli’s “Rant Heard Round the World,” is the dominant component of the Insurgency; Glenn Beck‘s gathering of hundreds of thousands of people in Washington, D.C. is another, overlapping one. The people who have gathered around Governor Sarah Palin form yet another part of the Insurgency, as do the libertarian-minded citizens who read blogs like Instapundit. Many of Rush Limbaugh‘s, Sean Hannity‘s, and Mark Levin‘s listeners are part of it. Various long-established conservative groups that have always opposed big government are now parts of the Insurgency.

There are appear to be three factors that have caused the rise of the Insurgency now, and the particular form it is taking: 1) technology, 2) a new, heightened awareness of the problem, and 3) the shock of the current crisis.

First, new technology allows massive, decentralized and horizontal organizations to form quickly. The Tea Party is the best current example: There is coordination, but no central direction. There is no one in charge, giving orders, but rather many people and groups cooperating. This is only possible due to current technology. 

“[Technology] enabled the Insurgency,

but it did not cause it.”

Technology, however, cannot by itself explain the rise of the Insurgency. After all, the political Left actually pioneered in this area: MoveOn was a highly effective internet-based organization, for example. It does seem odd, in retrospect, that a tech-savvy Left would cast its lot with a top-down, government-centric political culture. And there may be some overarching affinity between libertarian-style thinking and the new technology. But that technology is ultimately neutral. It enabled the Insurgency, but it did not cause it.

Read the rest here.

UPDATED:

Michael has published the second part of his essay: 

The Insurgency, Part II

….Mass political movements have come along several times in American history.  Some have transformed the country, and others have fizzled out. 

The movement that elected Andrew Jackson, against the vicious opposition of the existing establishment, swept through all levels of American government, rewriting state constitutions and extending the franchise to all adult White males. Jacksonian democracy caused a permanent and irreversible change in American life.  

The Populist movement looked like it would have a similar impact.  Led by the charismatic outsider William Jennings Bryan, this movement held gigantic rallies and seemed like a revolution in the making. It provoked fear and a hostile response from the establishment of its day, in both political parties. Yet the Populists ultimately failed to make a significant impact on national policy, and were absorbed into the Democratic Party. 

Today’s Insurgency could go either way. Success is not inevitable. 

John Robb at BoingBoing

Tuesday, June 15th, 2010

John has a nice interview with futurist and augmented reality pioneer Chris Arkenberg, over at BoingBoing:

John Robb Interview: Open Source Warfare and Resilience

….The United States is suffering both the economic decline of its industry and the ongoing dismantling of the social welfare apparatus supporting the citizenry. In your opinion, will this inevitably lead to some form of armed insurgency in America?

Yes. The establishment of a predatory and deeply unstable global economic system – beyond the control of any group of nations – is in the process of gutting developed democracies. Think in terms of the 2008 crisis, over and over again. Most of what we consider normal in the developed world, from the middle class lifestyle to government social safety nets, will be nearly gone in less than a decade. Most developed governments will be in and out of financial insolvency. Democracy, as we knew it, will wither and the nation-state bureaucracy will increasingly become an enforcer for the global bond market and kleptocratic transnational corporations. Think Argentina, Greece, Spain, Iceland, etc. As a result, the legitimacy of the developed democracies will fade and the sense of betrayal will be pervasive (think in terms of the collapse of the Soviet Union). People will begin to shift their loyalties to any local group that can provide for their daily needs. Many of these groups will be crime fueled local insurgencies and militias. In short, the developed democracies will hollow out

Hat Tip to Charles Cameron.

Hammes – Who Participates in War?

Thursday, April 29th, 2010

From the Strategy Conference…..

Armstrong on Wikileaks

Monday, April 12th, 2010

Matt Armstrong has a must-read, incisive, take on the manipulatively edited propaganda popularly known as the “Wikileaks video”:

The true fiasco exposed by Wikileaks

….The Wikileaks release apparently caught the Defense Department flatfooted. Even today, three days after its release, there is largely silence from DOD, save a brief public comment and a link to documents and photos at http://www.centcom.mil/ (hidden in plain sight through the link labeled “Link to FOIA documents on July 2007 New Baghdad Combat Action“). Don’t bother going to http://www.defense.mil/ as that site, and hence the Pentagon, has nothing readily available either. The April 6 briefing pack did not include the explanatory imagery and there is no news release explanation the Department’s position. It’s as if nothing happened. When asked about the situation, senior official at DOD pointed me to the “great piece” in The New York Times explaining how trained soldiers view and operate in these events differently than civilians. This, however, misses the point.

Despite the vigorous discussion online and over the air whether there was a violation of the laws of war, the old belief that if you ignore a problem it will go away continues to dominate.

Read the rest here.


Switch to our mobile site