Exposed: Julian Assange’s Secret Intentions
by Chris Canpbell
“The world is not sliding, but galloping into a new transnational dystopia,” Julian Assange wrote in his 2012 book, Cypherpunks: Freedom and the Future of the Internet.
“This development,” Assange goes on, “has not been properly recognized outside of national security circles. It has been hidden by secrecy, complexity and scale. The internet, our greatest tool of emancipation, has been transformed into the most dangerous facilitator of totalitarianism we have ever seen. The internet is a threat to human civilization.”
Since 2006, Wikileaks has had conflicts with all of the most powerful states in the world. It has seen firsthand what the surveillance state is capable of. The surveillance state, he says, “is an invasive parasite, growing fat off societies that merge with the internet. It is rolling over the planet, infecting all states and people before it.”
In the early beginnings of the internet, users and developers had great hope the internet would be able to shift power away from the coercive state and put it into the hands of the people: “The new world of the internet, abstracted from the old world of brute atoms, longed for independence.” But, that didn’t happen. Rather, Assange notes, “states and their friends moved to control our new world — by controlling its physical underpinnings.” And by centralizing the physical infrastructure of the internet, states set a dangerous precedent for humanity’s future.
States, broken down, are systems which determine where and how force should be applied. And, says Assange, as “states merge with the internet and the future of our civilization becomes the future of the internet, we must redefine force relations. If we do not, the universality of the internet will merge global humanity into one giant grid of mass surveillance and control.”
Yet, Assange sees reason for hope once more.
“But,” Assange writes, “we discovered something. Our one hope against total domination. A hope that with courage, insight and solidarity we could use to resist. A strange property of the physical universe that we live in. The universe believes in encryption. It is easier to encrypt information than it is to decrypt it.
“We saw we could use this strange property to create the laws of a new world. To abstract away our new platonic realm from its base underpinnings of satellites, undersea cables and their controllers. To fortify our space behind a cryptographic veil. To create new lands barred to those who control physical reality, because to follow us into them would require infinite resources. And in this manner to declare independence.
“Crypography,” he says, “is the ultimate form of nonviolent direct action.”
Thus, we get a tiny taste of what Assange’s true intentions really are. But this is merely a scratch of the surface. To dig deeper on this subject, and reveal what Assange is really up to, we invite Paul Rosenberg from Freeman’s Perspective fame.
Assange is a chess master. And this, says Rosenberg, is his strategy…
WHAT JULIAN ASSANGE IS REALLY DOING
Most people know the what about Julian Assange and WikiLeaks – that they publish secret information – but they don’t know the why. And that’s a great loss, because the reason behind all the leaks is both brilliant and illuminating.
It Usually Starts with the Cypherpunks
The first thing to understand is that WikiLeaks, like Bitcoin, came from the cypherpunks. In particular, WikiLeaks was spawned by a cypherpunk group that formed (spontaneously) in Melbourne, Australia.
In other words, WikiLeaks is the creation of some smart guys who were inspired by Timothy C. May, Eric Hughes, Murray Rothbard, and a few others. Assange was part of this group and an intriguing thinker in his own right.
Assange explained what WikiLeaks would be doing, and why, back in 2006, and you can still find copies of that work here. Given the worldwide recognition of WikiLeaks, it’s a little crazy that this is so little known and discussed, but I’ll do my part to change that condition.
The Core Ideas
Assange starts out by describing modern governance as conspiracy. He invokes Teddy Roosevelt, who said, “Behind the ostensible government sits enthroned an invisible government owing no allegiance and acknowledging no responsibility to the people.”
Assange calls these conspirators “neocorporatists,” referring to the entire complex of legislators, bureaucrats, and the corporations who purchase laws from them. He goes on to describe them as existing in elaborate networks, a theme that Jonathan Logan and I examined in The New Age of Intelligence and that was the subject of a landmark study in 2011 by Vitali, Glattfelder, and Battiston, entitled The Network of Global Corporate Control.
These networks – the real power behind the apparent power – are WikiLeaks’s actual targets, not the governments they may seem to be addressing. This is the first thing to understand about WikiLeaks.
What Assange wants to affect is communication inside these networks. This passage explains why fairly well:
[W]e see conspiratorial interactions among the political elite… the primary planning methodology behind maintaining or strengthening authoritarian power… these plans are concealed by successful authoritarian powers.
WikiLeaks was designed to hurt power that hides its intentions.
But merely unmasking those intentions is not the goal; Assange, brilliantly, goes after something deeper than that.
Preventing Obscured Power from Using Power
Not every conspirator trusts or knows every other conspirator even though all are connected. Some are on the fringe of the conspiracy, others… [may] be a bridge between important sections or groupings of the conspiracy.
He goes on to say that such a network can be disrupted by “distorting or restricting the information available to it,” by “unstructured attacks on [its] links,” by dividing the network by cutting links. Then he adds this:
A conspiracy sufficiently engaged in this manner is no longer able to comprehend its environment and plan robust action.
This is Assange’s goal: He wants to stop the “conspiracy” from trusting itself. The goal of WikiLeaks is to prevent a network of this type from communicating with itself.
So, when WikiLeaks publishes the Democratic National Committee’s dirty secrets (to pick just one example), it’s not trying to drive public outrage, as reasonable as that might be. Rather, it’s trying to make the conspirators distrust each other, and especially to distrust their communications, because if those links go, networked power goes with them.
And It Gets Even Better
I hope you can see how brilliant the WikiLeaks strategy really is. They’re not reacting after the events, as in exposing dirty laundry. They are acting in advance, disrupting their enemy’s ability to function in the future. And here’s where it gets even better: A network of this type invariably reacts to leaks by closing itself tighter against untrusted links. And so, by closing itself off from intrusion, the network becomes less and less able to engage with anything outside itself. And the less it engages with things outside itself, the less it can enact power outside itself.
Once the obscure conduits of elite power become so paranoid that they can no longer conspire among themselves, WikiLeaks has won. As Assange writes:
The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie… in a world where leaking is easy, secretive or unjust systems are nonlinearly hit….
What Led to This?
As noted above, I find this a brilliant strategy. More than this will be required to bring our world out of its current barbaric age, but this is a fascinating and important part. Before I close, I’d like to acquaint you with the mindset that produced this. And so, here is an edited passage from Assange’s book, Cypherpunks: Freedom and the Future of the Internet:
The new world of the internet longed for independence. But states and their friends moved to control our new world. They leached into the veins and arteries of our new societies, gobbling up every relationship expressed or communicated, every webpage read, every message sent and every thought googled, and then stored this knowledge, undreamed of power, in top secret warehouses, forever.
And then the state reflected what it had learned back into the physical world, to start wars, to target drones, to manipulate UN committees and trade deals, and to do favors for its vast network of industries, insiders and cronies.
If this isn’t the kind of world you want, I encourage you to get busy creating a better one. Watching and complaining will never give you what you want.
This articleis published under a creative commons license here.