zenpundit.com » 2010

Archive for 2010

Wikileaks and the Search for a Cryptographic Mythology

Thursday, December 2nd, 2010

[ by Charles Cameron ]

Jean Rosenfeld of the UCLA Center for the Study of Religion just posted a comment on an earlier Zenpundit post of mine, opening up a topic which may interest some readers here: that of Wikileaks founder Julian Assange’s mythological associations.

1

Jean had earlier pointed me to Assange’s use of the name “Marutukku” to describe his encryption program, and a little fishing brought me to these two Assange-related documents:

One Man’s Search for a Cryptographic Mythology
Enuma Elish

2

I’d been idly wondering about cryptographic mythology myself, as it happens, nudged by vague memories of a cache of porno images tweaked by jihadists as encoding devices for steganography.

Steganography is the cryptographic – or is it kabbalistic? — art devised by one Abbot Trithemius, whose 1518 Polygraphia is the first work on cryptography printed in Europe, and whose Steganographia was known in MS to such hermetic philosophers as Cornelius Agrippa, Giordano Bruno and John Dee. Jim Reeds captures the ambiguity of Trithemius’ work nicely in his paper, Solved: The Ciphers in Book III of Trithemius’s Steganographia, when he asks:

Is it [the Steganographia] primarily an exposition of cryptographic techniques disguised as angel magic, or is it primarily a magic work disguised as cryptography?

Readers of Frances Yates and Ioan Couliano will be somewhat familiar with these matters.

And jihadist steganography? The technique itself is described in the al-Fajr Information Center’s Technical Mujahid magazine of Feb. 2007 according to a Jamestown Foundation Terrorism Monitor piece, but the reports of actual jihadist use of the technique may turn out to be fabrications.

3

But it was Julian Assange‘s bliss we were trying to follow, right?

Assange sidekick Suelette Dreyfus wrote The Idiot Savants’ Guide to Rubberhose — which is the manual for Assange’s crypto program… but this business of naming the program gets complicated, eh?

Dreyfus explains:

If you’re wondering about the name of this program, Marutukku is the internal development name (it’s spelled Ru-b-b-e-r-h-o-s-e, but it’s pronounced M-a-r-u-t-u-k-k-u)

In case you didn’t get it, there may be a play on Lewis Carroll there, and the exchange Alice has with the White Knight in Through the Looking-Glass as to what the name of a certain very sad song is called.

Alice aside – and such detours are in fact the very method of discovery in non-linear thinking – Dreyfus offers as an epigraph to her piece the following quote:

The third name is MARUTUKKU, Master of the arts of protection, chained the Mad God at the Battle. Sealed the Ancient Ones in their Caves, behind the Gates.

which she attributes to “The Akkadian Creation Epic”. That would be the Enuma Elish.

Assange, in his One Man’s Search for a Cryptographic Mythology, attributes his choice of the name Marutukku to a conversation he had with a friend concerning the Enuma Elish, telling us (after much other curious and wandering stuff) that his friend recommended the god Marduk’s third name to him, saying

The third name is MARUTUKKU, Master of the arts of protection, chained the Mad God at the Battle. Sealed the Ancient Ones in their Caves, behind the Gates.

Assange liked the idea, observing, “Even the very word MARUTUKKU looked like it had been run through a product cipher”.

A little later in the same document, he quotes from the Enuma Elish, and the phrases given above appear in the quoted excerpts from that text – although they are not present in the version “Based on the translation of E. A. Speiser, with the additions by A. K. Grayson, Ancient Near Eastern Texts Relating to the Old Testament, third edition, edited by James Pritchard (Princeton, 1969), pp. 60-72; 501-503, with minor modifications” that Assange offers us on the sibling-page at Enuma Elish.

As Dr. Rosenberg pointed out to me, “the quote — if it is a translation — differs from other translations I found on the Internet. It is more specific and extensive and ‘mythological.'”

4

Okay, I’ve kept what may be the most practical (ie 21st century) “creative leap” made by my skittish and wandering mind for this, my penultimate paragraph.

Oxford’s Anders Sandberg blogs today about Assange’s application of network theory to conspiracies, quoting Assange as saying:

Conspiracies are cognitive devices. They are able to out think the same group of individuals acting alone Conspiracies take information about the world in which they operate (the conspiratorial environment), pass it around the conspirators and then act on the result. We can see conspiracies as a type of device that has inputs (information about the environment) and outputs (actions intending to change or maintain the environment).

And Anders’ summary of Assange’s position? “In short, conspiracies are a kind of collective intelligence enhancement.”

[ admission: I associate the name Anders Sandberg with some brilliant early net writings on role-playing games and the hermetic tradition – I’m hoping this is the same guy ]

5

Finally, let’s go back to that enhancement of the Enuma Elish text. That phrase, “Sealed the Ancient Ones in their Caves, behind the Gates” struck me, too – it reminded me of the Chthulu Mythos of HP Lovecraft, and its apocalypse:

That cult would never die until the stars came right again and the secret priests would take Cthulhu from His tomb to revive His subjects and resume His rule of earth. The time would be easy to know, for then mankind would have become as the Great Old Ones; free and wild, and beyond good and evil, with laws and morals thrown aside and all men shouting and killing and revelling in joy. Then the liberated Old Ones would teach them new ways to shout and kill and revel and enjoy themselves, and all earth would flame with a holocaust of ecstasy and freedom.

And with that quote from Lovecraft, courtesy of Erik Davis, we have returned by a commodius vicus of recirculation back to the hermetically sealing and revealing world of John Dee.

Guest Post: Beakley on Boyd, Aerial Combat and the OODA Loop

Thursday, December 2nd, 2010

Ed Beakley is the Director and guiding spirit of Project White Horse and is student of the strategic thinking of John Boyd. Ed requested space to respond to criticism directed at the OODA Loop by Col. Jim Storr in The Human Face of War and assumptions made regarding the influence of aerial combat on John Boyd’s strategic thought.

Boyd, Aerial Combat and the OODA Loop

by Ed Beakley

While I’m sure most have read the basic story, it seems it might be worth recalling the details abit.  Boyd first characterized OODA, looking to understand and explain the differential in air-air kills between U.S. and North Korean pilots and realized that with the significantly better visibility from the F-86 bubble canopy than that from the MiG 15, the USAF pilot was more likely to see a MiG approaching from the rear quarter tan the other way around. (The Vietnam era MiG 17 and 21 had similar designs – narrow canopies extending straight back into the fuselage.  I can attest to this having flown a MiG 21 simulator in an air engagement with a German Col in an F-4 at Ling Tempco Vought some years ago).  This ability to see the fight early is critical and coupled with the F-86 significant advantage in roll rate meant rolling and turning into the MiG, then reverse rolling would eventually set up a misalignment in a/c attitude which the F-86 could exploit. Seeing led to the ability to exercise a  fast transient.

Boyd’s example of the F-86 and MiG 15 allowed him to address the four pieces and their impact and of having the ability to change state quicker than one’s opponent.  The fact that time wise the observation and action are nearly stacked on top of each other,  does not mean that “orientation” and decision” did not or do not occur.  One must realize that almost all engagements of aerial combat last only seconds. Data from the air war over Vietnam show that in most instances the shot down pilot never saw the shooter. Snoopy jousting with the Red Baron is a colorful idea but dogfights happen mostly only in training. Indeed, with certainly no disrespect meant, “Forty Second Boyd” is a characterization that could only come out of the training world. Forty seconds is multiple life times in actual air-air engagements.

So how then does OODA occur? Two things, one closely relating to martial arts – individuals must be completely immersed in their art. There exists no better representation of this than the fighter pilot. Any fighter pilot who wouldn’t claim he could kick your ass in forty seconds is not worthy of the name, and he trains hard to be able to back that up.  And there’s nothing worse than a guy who can back that up. (Frank ‘Whip’ Ault, the Navy Captain, fighter pilot whose report led to TOPGUN was no Ace but his call sign was well earned).  This leads to the second, that attitude, training AND being immersed with similar extremely competitive arrogant bastards, means he takes all the elements of orientation with him when he crosses the Yalu or the Red River Valley.  His observation of the enemy aircraft brings the only missing piece of the “orientation” into play – physical situational awareness and allows the quickness of decision and action. “Decision” also follows out of that training (think about the “ribbon” drawings in Boyd’s Aerial Attack Study that were and are studied and practiced).  He’s been there done that so many times, it’s truly Gary Klein’s recognition primed, but all parts of OODA are still in play. 

Indeed, if the mission and performance of the aircraft differ substantially, the OODA process may actually stretch out and be more easily discerned. By way of example would be an A-7 on a Sam suppression “Ironhand” mission attacked from below by a MiG 21.  The A-7’s performance is significantly less than that of the MiG. This is not the quick conversion to a kill of Boyd’s example where O-O-D-A are essentially stacked on top of each other time wise, rather survival of the A-7 pilot and completion of his mission to protect the strike group (i.e., survival of a number of planes), turns into a more spread out O-O-D-A process, in which working to gain proper orientation is crucial to the necessary timing of the decision and action to execute a “bug-out.”

This rolling reversal maneuver is extremely violent, involves applying negative G’s and can be disorienting to the executing pilot.  Done correctly, it creates the same misalignment of aircraft with the MiG nose high, the A-7 nose low gaining separation and running out to the MiG’s six o’clock.  The trick though is that you wanted to run toward the water.  Even with separation and 180 degrees out of phase, it’s no longer just guns, the MiG had Atol missiles.  Water meant possibility of pick-up if you had to eject.  And on top of all that, if the Ironhand a/c bugged out, the strike group was now more susceptible to Surface to Air Missile attacks.  Will anyone argue this is not a discernable example of observe, Orient, decide act?

As to Boyd’s stature and competence to analyze the air-air world in regard to a true Ace (5 confirmed kills):

1.      World War II was unique in air-air combat in light of the technical capability, the number of aircraft in the air and in a fight at the same time.  Many kills came without one pilot seeing the other.  Kills were achieved by pulling the trigger at the right time as planes crossed your nose chasing someone else.  To be sure there were some great deeds of derring-do and some great pilots and certainly intuitive actions played a significant part. Does Col Storr’s interviews with Aces indicating the falsity of the OODA in air-air combat counter Boyd’s analysis?  Hardly.  Boyd was not trying to expound a theory on OODA and Air-Air Combat, he used an example he knew well, which is appropriate in many instances, but certainly not all.  He simply intended to show that if you could move through the OODA flow at a better tempo than your enemy, you could create a mismatch that could be exploited.

2.      Was not being a true Ace important?  No matter how good the pilot, luck and mission assignment plays a huge part.  Ask any fighter pilot, anywhere this one.  Some of the best never even get a look.  True story ( I was in the same area earlier and it wasn’t nice) – one of the senior F-4 Commanders who’d been involved with all the early TOPGUN stuff, was so frustrated because he, unlike some of that group, did not have a MiG, hoping a MiG would come up, went “trolling” along the DMZ, the very last day of the war and got shot down and lost.  Good pilot? Former commanding officer of the Blue Angels.  Boyd’s work as an ACM instructor and developer/writer of the Aerial Attack Study at Nellis tells you all you need to know.  One of his best students was Ev Raspberry, one of General Robin Olds’ MiG killers who credited his success over Route Pack Six to John Boyd for what he taught him at Nellis.

One final note, Seydlitz questions anything following from Boyd, if the original thinking is flawed.  As noted above, the view of an Ace doesn’t necessarily contradict Boyd’s analysis.  This is an extremely situationally dependent context.  Would he dismiss my own experience in combat?  The first time I read Boyd’s analysis, it made perfect sense.  The fact that the flow can be almost unobservable due to speed of process is irrelevant.  If Boyd’s OODA is to be discarded, then one must dismiss a whole process and body of work coming out of the Naval Electronic Systems Command in the eighties stemming from Dr. Joel Lawson’s research and writing on command and control.  Boyd’s work  seems to fall prey to “if it’s not perfect for all situations then it’s all bad”????

As to Storr, I turn the question, how can one now trust his writing, given his pretty obvious shoddy research on Boyd.  One must go no further than page 12 and the critique of Boyd’s loop.  Poor form no matter what he thinks of Bill Lind and 4GW.

Maxwell on North Korean Regime Collapse and Irregular Conflict

Thursday, December 2nd, 2010

Colonel David Maxwell, who has probably forgotten more about North Korea than I ever knew in the first place, has an insightful analytical piece up at SWJ Blog:

Irregular Warfare on the Korean Peninsula

….This paper is written with the concepts of “military misfortune” in mind. In Eliot Cohen and John Gooch’s seminal work on military failures, they determined that militaries are generally unsuccessful for three reasons: the failure to

learn, the failure to adapt, and the failure to anticipate. This paper will recommend that the ROK-US alliance learn from operations in Afghanistan and Iraq, adapt Irregular Warfare concepts to the security challenges on the Korean Peninsula and anticipate the collapse of the Kim Family Regime and the complex, irregular threats that collapse will bring.

The conventional wisdom would postulate that the worse case situation would be an attack by the north Korean military because surely the devastation and widespread humanitarian suffering as well as global economic impact would be on a scale that would far exceed any crisis that has occurred since the end of World War II. While that could very well be the case, there is little doubt about the military outcome of an attack by the north on the South and its allies and that would be the destruction of the north Korean People’s Army and the Kim Family Regime. Victory will surely be in the South’s favor; however, this paper will argue that the real worse case scenario comes from dealing with the aftermath; either post-regime collapse or post-conflict.

Maxwell’s operative assumptions are particularly good. I especially like:

….The fifth and final assumption is that while some planning has taken place to deal with north Korean instability and the effects of Kim Family Regime collapse, there has been insufficient preparation for collapse. Furthermore, in addition to planning for collapse, actiocan and should be taken prior to collapse in order to mitigate the conditions and deal with the effects of collapse of the Kim Family Regime. Unfortunately, despite some planning efforts tocounter specific irregular threats, the ROK, and the US in particular, has been distracted by the very real and dangerous threat of north Korean nuclear weapons and delivery capabilitiesproliferation of same while at the same time ensuring deterrence of an attack by the north. Deterrence is paramount and the nuclear problem is a critical international problem; however, successful deterrence over time will likely result in the eventual collapse of the regime and the associated security and humanitarian crises that it will bring.

In other words, not only are US and ROK policy makers not preparing for the most probable second and third order effects of a North Korean collapse scenario, but the status quo on the Korean penninsula represents a wicked problem that is essentially a trajectory toward a worst case scenario collapse.

Tracking the Mahdi on WikiLeaks

Tuesday, November 30th, 2010

by Charles Cameron

A quick search for “Mahdi” and “Mehdi” and “Twelfth Imam” in the 294 messages so far published in diplomatic Wikileaks reveals some references to individuals with those names, and a couple to Moqtada al-Sadr’s Jaysh al-Mahdi (spelled “Jaysh al-Madhi” in one cable by someone who is perhaps confused by the similarity of the name to that of Mahatma Gandhi), along with three cables in which Mahdism is touched upon.

1

09ASHGABAT1182 of September 16, 2009 reports a comment by an undisclosed source who is “adamant” that the US should not enter into direct talks with Iran’s leadership:

Not only, he insisted, is the Iranian leadership “untrustworthy,” and dominated by a group of “messianics,” who base crucial decisions about domestic and foreign policy on a belief in the imminent return of the “Missing” (Twelfth) Imam.

From my point of view, any foreign policy based on or strongly influenced by belief in the imminent return of a prophesied figure of good or evil, whether that figure be Moshiach or Christ or Mahdi, Antichrist or Dajjal, should be cause for concern: from a religious perspective, because messianic expectations are precisely what Matthew is talking about when he writes that “false Christs and false prophets will rise and show great signs and wonders to deceive, if possible, even the elect” (Matt 24.24) – and from a secular perspective because such identifications have been made again and again across history, often with disastrous results (think Waco, think the 1979 siege of Mecca, think the Taiping Rebellion).

That’s why I’m interested in monitoring the various strands of apocalyptic thinking out and about in the world today.

2

A little over a month earlier, on August 3, 2009, 09RPODUBAI316 under the sub-head “A Benevolent Dictator’s Fall from Grace” discussed the idea that the “Arab street” (both Sunni and Shi’a are mentioned) initially saw some Mahdist qualities in Ahmadinejad:

A Syrian journalist and blogger, who owns a media consultancy firm in Dubai, believes that many in the Arab street initially viewed Ahmadinejad when he came to power in 2005 as a “benevolent dictator.” Citing the tradition of the Mahdi, the media consultant argued that both Shi’a and Sunni Arabs are taught from early childhood to await the arrival of a strong and unimpeachable figure who will lead the Muslim world. The media consultant maintained that even secular Arabs view the world, albeit unintentionally, with this ingrained mindset. Our contact argued that Ahmadinejad played in to this narrative, and when Ahmadinejad arrived on the international stage many Arabs saw him, in contrast to their own flawed leaders, as a humble and pious man who was brave enough to stand up for his people and the greater Muslim world by confronting Israel and the West head on. However, both the intensely competitive campaign period and the forceful reaction by the Iranian people to the official election results have led some moderate Arabs to rethink Ahmadinejad’s true disposition. The election, the media consultant said, led some Arabs to understand that despite his astutely crafted and well-marketed image in the Arab world, Ahmadinejad is resented by many Iranians for domestic mismanagement, incompetence, and corruption. Because of this public fall from grace, so the media consultant told us, Ahmadinejad is no longer the “untouchable, holy figure” in the Arab world he once was — his flaws have brought him down to the level of the Arab world’s own imperfect leaders.

I’m reminded of the way that Steve Davis of Charleston, SC, among others, projected messianic qualities onto then-candidate Obama, when he wrote:

Barack’s appeal is actually messianic, it’s something about his aura, his spirit, his soul, that exudes enlightenment in the making.

I interpret Obama’s Lebanon, NH remarks as making light of that sort of projection (McCain’s video makes light of it, too), whereas Ahmadinejad appears to take his own status within the aura of the Mahdi all too seriously.

3

The last reference allows me to end on a happier note.

The French diplo Jean-Christophe Paucelle is quoted in 09PARIS1046 of July 31, 2009 on the topic of Ahmadinejad’s inauguration.

First he mentions that since non-Muslims had not been invited to previous inaugurations, European members of the diplomatic corps might not know which door to take if they wished to walk out on the ceremony, should such an action be called for… and then he discusses an additional reason why the French would attend the ceremony, despite the contested nature of the election:

Paucelle said that the case of detained French citizen Clothilde Reiss has also influenced the EU decision to attend the inauguration ceremonies. “We think she may be released soon, and we don’t want to create another irritant,” Paucelle said. “There are enough already.” He reported that the French have reason to believe Reiss may form part of a group of detainees likely to be released on the August 7 anniversary of Imam Mahdi. Paucelle noted that a letter released July 29 by Ahmadinejad supported the idea of granting clemency to post-election protesters during Mahdi celebrations. “The Iranians will need to take face-saving measures, and so she will likely transfer to house arrest or some other status,” Paucelle said. He added that, of course, she may not be released at all next week, but the French remain optimistic that she will soon be out of prison.

Clotilde Reiss was indeed not released on that occasion — but she was in fact freed somewhat later, on Sunday, May 16th, 2010.

Dogma

Tuesday, November 30th, 2010

Strategic dogma, that is. Thoughts by Joseph Fouche at The Committee of Public Safety.

Heh. Regarding the crappy and buggy formatting performance of the comment field here that JF terms “the worst on the internet”, I’ll be happy to take suggestions for a new, no-hassle, plug-in that works well with wordpress. There were trade-off issues involved with what was available at the time of the last site redesign and I rejected options that were actually, if it is to be believed, worse.  I would like to do some post holiday tweaking of the site and if there are better things out there, I’ll see if they can be used to replace the current plug-in.


Switch to our mobile site