Wikileaks and the Search for a Cryptographic Mythology

[ cross-posted from Zenpundit ]

Jean Rosenfeld of the UCLA Center for the Study of Religion just posted a comment on an earlier Zenpundit post of mine, opening up a topic which may interest some readers here: that of Wikileaks founder Julian Assange’s mythological associations.

1

Jean had earlier pointed me to Assange’s use of the name “Marutukku” to describe his encryption program, and a little fishing brought me to these two Assange-related documents:

One Man’s Search for a Cryptographic Mythology
Enuma Elish

2

I’d been idly wondering about cryptographic mythology myself, as it happens, nudged by vague memories of a cache of porno images tweaked by jihadists as encoding devices for steganography.

Steganography is the cryptographic – or is it kabbalistic? — art devised by one Abbot Trithemius, whose 1518 Polygraphia is the first work on cryptography printed in Europe, and whose Steganographia was known in MS to such hermetic philosophers as Cornelius Agrippa, Giordano Bruno and John Dee. Jim Reeds captures the ambiguity of Trithemius’ work nicely in his paper, Solved: The Ciphers in Book III of Trithemius’s Steganographia, when he asks:

Is it [the Steganographia] primarily an exposition of cryptographic techniques disguised as angel magic, or is it primarily a magic work disguised as cryptography?

Readers of Frances Yates and Ioan Couliano will be somewhat familiar with these matters.

And jihadist steganography? The technique itself is described in the al-Fajr Information Center’s Technical Mujahid magazine of Feb. 2007 according to a Jamestown Foundation Terrorism Monitor piece, but the reports of actual jihadist use of the technique may turn out to be fabrications.

3

But it was Julian Assange‘s bliss we were trying to follow, right?

Assange sidekick Suelette Dreyfus wrote The Idiot Savants’ Guide to Rubberhose — which is the manual for Assange’s crypto program… but this business of naming the program gets complicated, eh?

Dreyfus explains:

If you’re wondering about the name of this program, Marutukku is the internal development name (it’s spelled Ru-b-b-e-r-h-o-s-e, but it’s pronounced M-a-r-u-t-u-k-k-u)

In case you didn’t get it, there may be a play on Lewis Carroll there, and the exchange Alice has with the White Knight in Through the Looking-Glass as to what the name of a certain very sad song is called.

Alice aside – and such detours are in fact the very method of discovery in non-linear thinking – Dreyfus offers as an epigraph to her piece the following quote:

The third name is MARUTUKKU, Master of the arts of protection, chained the Mad God at the Battle. Sealed the Ancient Ones in their Caves, behind the Gates.

which she attributes to “The Akkadian Creation Epic”. That would be the Enuma Elish.

Assange, in his One Man’s Search for a Cryptographic Mythology, attributes his choice of the name Marutukku to a conversation he had with a friend concerning the Enuma Elish, telling us (after much other curious and wandering stuff) that his friend recommended the god Marduk’s third name to him, saying

The third name is MARUTUKKU, Master of the arts of protection, chained the Mad God at the Battle. Sealed the Ancient Ones in their Caves, behind the Gates.

Assange liked the idea, observing, “Even the very word MARUTUKKU looked like it had been run through a product cipher”.

A little later in the same document, he quotes from the Enuma Elish, and the phrases given above appear in the quoted excerpts from that text – although they are not present in the version “Based on the translation of E. A. Speiser, with the additions by A. K. Grayson, Ancient Near Eastern Texts Relating to the Old Testament, third edition, edited by James Pritchard (Princeton, 1969), pp. 60-72; 501-503, with minor modifications” that Assange offers us on the sibling-page at Enuma Elish.

As Dr. Rosenberg pointed out to me, “the quote — if it is a translation — differs from other translations I found on the Internet. It is more specific and extensive and ‘mythological.'”

4

Okay, I’ve kept what may be the most practical (ie 21st century) “creative leap” made by my skittish and wandering mind for this, my penultimate paragraph.

Oxford’s Anders Sandberg blogs today about Assange’s application of network theory to conspiracies, quoting Assange as saying:

Conspiracies are cognitive devices. They are able to out think the same group of individuals acting alone Conspiracies take information about the world in which they operate (the conspiratorial environment), pass it around the conspirators and then act on the result. We can see conspiracies as a type of device that has inputs (information about the environment) and outputs (actions intending to change or maintain the environment).

And Anders’ summary of Assange’s position? “In short, conspiracies are a kind of collective intelligence enhancement.”

[ admission: I associate the name Anders Sandberg with some brilliant early net writings on role-playing games and the hermetic tradition – I’m hoping this is the same guy ]

5

Finally, let’s go back to that enhancement of the Enuma Elish text. That phrase, “Sealed the Ancient Ones in their Caves, behind the Gates” struck me, too – it reminded me of the Chthulu Mythos of HP Lovecraft, and its apocalypse:

That cult would never die until the stars came right again and the secret priests would take Cthulhu from His tomb to revive His subjects and resume His rule of earth. The time would be easy to know, for then mankind would have become as the Great Old Ones; free and wild, and beyond good and evil, with laws and morals thrown aside and all men shouting and killing and revelling in joy. Then the liberated Old Ones would teach them new ways to shout and kill and revel and enjoy themselves, and all earth would flame with a holocaust of ecstasy and freedom.

And with that quote from Lovecraft, courtesy of Erik Davis, we have returned by a commodius vicus of recirculation back to the hermetically sealing and revealing world of John Dee.

Our Lost Competitiveness In Energy Construction

Due to a failure of our “de-regulation” initiative (I put it in quotes because we just re-regulated differently) with energy the United States has basically ceased investing in base-load power plants, which are comprised of 1) nuclear 2) coal 3) large-scale hydroelectric.  Instead we have been generally just extending the lives of our existing assets and building natural gas fired peaking plants and letting our reserve margins erode.

While this has many impacts to the United States over the long term (in the short term we benefit from lower rates as we delay the reckoning of having to invest massive amounts in capital construction in the future rather than starting it now and spreading it out over many years) one other extremely bad negative element has not been adequately discussed.  The United States is frankly losing any ability to construct or build nuclear or coal plants efficiently while China is using their scale and continued capital investment to refine construction techniques and standardize processes to build an industry that will be miles ahead of their US equivalent.

The December, 2010 issue of the magazine “The Atlantic” has an article titled “Why the Future of Clean Energy is Dirty Coal”.  While I don’t share their focus on “clean” energy, they did have a section on the scale of investment in China that was staggering.  From the article:

China is preparing, by 2025, for 350 million people that don’t exist now.  They have to build the equivalent of the US electrical system, that is almost as much added capacity as the entire US grid – by 2025.  It took us 120 years…As China meets its capacity, it is likely that the best technologies will be commercialized and applied here faster than everywhere else.

In addition to the scale of their investment, their specific investments are also growing more advanced:

For the last 30 years we have not been able to build a coal-to-gas conversion plant in this country… China has done many.  That is what we need to learn from them, all that production and operating experience.

Why are they able to get so much done?  Well for one thing they don’t have a lawyer and regulation plagued “system” that adds billions (literally) to the cost of a plant without necessarily improving its efficiency or safety; and it punishes new designs that might be INHERENTLY safer than older, operating designs by limiting the ability to move forward in the first place.

In America, it takes a decade to get a permit for a plant… Here, they build the whole thing in 21 months.

Read more

“Why Does the Media Love to Pick On Palin?”

John Lott gets it:

Unfortunately, over the last couple of weeks, even conservative media pundits such as Mona Charen, Peggy Noonan, George Will, Joe Scarborough and Matt Labash see these attacks and warn that she can’t win the presidency. They even buy into the attacks on her judgment, intelligence, and competence. But what these conservatives don’t appreciate is that Palin is being attacked because she is smart and effective, not because she is dumb.
 
[. . .]
 
What Palin’s conservative critics need to recognize is that any other candidate who posed the same threat to Democrats would also be attacked as viciously. The desire to give up on Palin and move on to another potential Republican presidential nominee is understandable. But there is a reason why the media wants to take Palin out.

His column is worth reading in full.

Anyone who thinks that a turning away from Palin by libertarian/conservative/independent voters would bolster prospects for other Republicans is delusional. The abandonment under fire of a candidate by her erstwhile supporters would merely confirm the effectiveness of the media-Democratic strategy and encourage similar attacks against whichever remaining prospective Republican candidates appear to have the best chances of defeating Obama. Mitt Romney? The media love to treat him as the Republican front-runner when, in reality, his failure to repudiate his Massachusetts health-care “reform” disaster probably dooms his candidacy. But watch someone like Mitch Daniels or Chris Christie start to poll well against Obama and the smear machine will be turned on with full force. It’s already going after Christie with recycled bogus accusations of expense-account padding. No doubt if Daniels starts to poll well his eccentric marital history will be twisted to make him seem strange.

Palin was an obscure libertarian governor with wide popularity in her home state before McCain picked her as his VP. Nobody cared about her except Alaskans and her national libertarian fans. As Lott points out, she was attacked because she is effective, not because of her supposed personal failings. (Did the media care about Obama’s personal failings?)

Don’t believe for a moment that any Republican candidate who is half as politically effective as Palin is won’t get the same treatment that she has received. There may be valid reasons to reject her as a presidential candidate, but the fact that she has been the target of unprecedented smear campaigns isn’t one of them.

Quote of the Day

And I don’t want no pussyfooting. You can’t succeed in tech by playing it safe, by taking baby steps. If you could, Sony and Microsoft would rule digital music. But they don’t, because they were so worried about rights holders, they forgot about users. And it’s all about users.
 
The users used to be excited about music.
 
Now they’re thrilled with offers on Groupon.
 
Shopping has become exciting!
 
Music is boring.

Bob Lefsetz