Notes On Encryption

Just as divine authority was legitimized by religious mythologies, and human authority was legitimized by humanist ideologies, so high-tech gurus and Silicon Valley prophets are creating a new universal narrative that legitimizes the authority of algorithms and Big Data. This novel creed may be called “Dataism”. In its extreme form, proponents of the Dataist worldview perceive the entire universe as a flow of data, see organisms as little more than biochemical algorithms and believe that humanity’s cosmic vocation is to create an all-encompassing data-processing system—and then merge into it.1

In....Anarchy, State and Utopia, Robert Nozick described a utopian vision-a world of communities, each set up under its own rules, with members free to move among communities or start their own. Within the limits of cyberspace, that vision already exists in the form of mail groups and will exist, within a few decades, in the form of virtual communities. Each community will have its own rules, enforced by a single ultimate sanction: expulsion. The result will be a world defined by a single rule: freedom of association. Encryption is the essential defensive technology for such a world, the technology that gives individuals the power to set up and maintain virtual communities inhabited by willing citizens, whether or not other individuals, or governments, approve. Think of it as crypto-anarchy 2

This utopian vision of crypto-anarchy is what I contend is the logical extension of the Hallaqian critique of modernity which is quintessentially all about the technology of the State that has only been made possible because the culture of narcissism we inhabit provides the incentive to part with sensitive data. The parting with sensitive data to accumulate greater social standing is done with a zealous religious fervour that forms part of the communal and religious dimensions of liberalism, which I have elaborated on here.

What keeps liberalism going is Technology - it is the constant flow of sensitive data, information - seamlessly integrating private and public institutions, blurring and deliberately corroding the lines between civilian and military until it all becomes one cohesive organic whole with the Godhead of the Deep State firmly in control. The Deep State is not a conspiratorial cabal of sinister people (although spiritually they may well be) but rather is a critical component central to the longevity of the Liberal State. Electoral politics on its own is far too chaotic and at times messy to guarantee longevity for a political project. The genius of the liberal project is to allow electoral politics to be arena of competing trivial political passions whilst the Deep State in a very Fukuyaman sense continues the reign of History's End. Fukyama mentions it as explicitly as this in his paper on the topic, that having a competent bureaucracy autonomous and to some degree immune to the tussles of the public arena is necessary to keep the project going:

That bureaucracy necessarily operates independently of its political masters, however, since elected leaders cannot possibly specify the thousands of daily decisions that are needed to keep the government running. They delegate authority to bureaucrats, which is what we call bureaucratic autonomy.3

It is thus no surprise that in order to continue the long march of the State, that American Empire and its vassal states have launched another series of legislative attacks against encryption.4 These attempts have come broadly at a time that American Empire is trying to run damage control for the Israeli Genocide with Big Tech doing its bidding whilst also using it to perpetuate new forms of industrialised violence at a hitherto unprecedented scale. In conjunction with deploying these capabilities abroad, American Empire is now rushing to draft new forms of legislation that can be considered spiritual successors of the Patriot Act. These include wide ranging surveillance powers5 forcing privacy conscious companies to bend the knee on encrypted messaging and considering new forms of invasive financial surveillance. Surveillance is not an end in itself - surveillance allows for the harvesting of data at a massive scale to allow bureaucratic entities to centrally plan the next chapters of the liberal project. Without surveillance, it is not an understatement to suggest that the liberal project would collapse in on itself.

Julian Assange, is a present day cypherpunk currently being persecuted by American Empire who crystallises the importance of encryption:

Cryptography can protect not just the civil liberties and rights of individuals, but the sovereignty and independence of whole countries, solidarity between groups with common cause, and the project of global emancipation. It can be used to fight not just the tyranny of the state over the individual but the tyranny of the empire over smaller states.6

Encryption is what allows for genuine discourse - it allows participants to argue, debate and discuss without the prying eyes of the bureaucracies of the Deep State which invariably taken on a deeply militaristic bent often interlinked with intelligence agencies. The reality of the modern State today is far removed from the lofty academic critiques offered by religious traditionalists,7 Marxists8 or today's populist ethnonationalists like Orban who do not have a philosophical project as such but command significant electoral success - the critique which is most insightful is that offered by the cypherpunk. What is curious unlike say religious critiques of liberalism which are grounded in sophisticated theology and philosophy, the cypherpunk are more grounded describing the architecture and machinery of the State with unerring accuracy. What they lack in philosophical sophistication and theological training they make up for technical domain knowledge of how the State imposes its will today moving beyond the abstract and theoretical. For Muslims, I think there is something there in terms of the way our illustrious predecessors imagined the Self fundamentally differently - a project of continuous purification, edification through a complex set of patterned legal obligations couched with spiritual meaning - an example of this can be seen in the projects of numerous Muslim revivalists. 9

From a more profane perspective, lack of encryption capabilities for Muslim actors who invariably are pitted against wanton American militaristic expansion leaves them vulnerable to leaking metadata which allows for profiling and exposure to assassinations from the skies above.:

As the Snowden documents showed, during the Obama years, the National Security Agency’s global metadata surveillance program would geolocate a SIM card or handset of a suspect, and then the U.S. military would conduct drone strikes to kill the individual in possession of the device. “We kill people based on metadata,” said General Michael Hayden, former director of the NSA and the CIA. The NSA’s Geo Cell division was reported to use more colorful language: “We track ’em, you whack ’em 10

Invariably, the theatre of war will move towards digital forms. If there is any hope for genuine Muslim movements geared towards establishing Islamicate Sovereignty there has to be an end to the crippling addiction of the masses to the popular platforms of Big Tech which I've elaborated here are deeply immersed in the American war machine. There is no feasible scenario where Meta, Google and Amazon will allow for genuine Islamicate dissent and the development of organic online networks of resistance against American Empire. Sovereignty must be grounded in having infrastructure that you own, that is under your control and that you can deploy. Renting out the digital infrastructure of your foes is not a long term sustainable solution towards reanchoring the Islamicate.

And God knows best

Footnotes


  1. Yuval Harari, “Yuval Noah Harari on Big Data, Google and the End of Free Will,” Financial Times, August 26, 2016, https://www.ft.com/content/50bb4830-6a4c-11e6-ae5b-a7cc5dd5a28chttps://www.nytimes.com/2013/02/05/opinion/brooks-the-philosophy-of-data.html 

  2. David Friedman, A World of Strong Privacy: Promises and Perils of Encryption. Accessed: Jan. 07, 2024. [Online]. Available:http://www.daviddfriedman.com/Academic/StrongPrivacy/StrongPrivacy.html 

  3. Full article: In Defense of the deep state. Accessed: Jan. 07, 2024. [Online]. Available: https://www.tandfonline.com/doi/full/10.1080/23276665.2023.2249142 

  4. A good introduction to understanding encryption in all its political dimensions can be found in my tweet where I highlight salient works aimed at those looking at this topic for the first time - Ibn Maghreb, Encryption Reading List. [Online]. Available: https://x.com/IbnMaghrebi/status/1735733201862058460?s=20 

  5. For a reasonable history of government surveillance in American Empire see The History and Future of Mass Metadata Surveillance, POGO. Accessed: Jan. 07, 2024. [Online]. Available: https://www.pogo.org/analysis/the-history-and-future-of-mass-metadata-surveillance 

  6. ‘How cryptography is a key weapon in the fight against empire states |…’, archive.fo. Accessed: Jan. 07, 2024. [Online]. Available: https://archive.fo/Mbsx4 

  7. See: P. J. Deneen, Why liberalism failed, Paperback edition. New Haven ; London: Yale University Press, 201 

  8. See: Amadeo Bordiga, ‘The Democratic Principle’. Accessed: Jan. 07, 2024. [Online]. Available: https://www.marxists.org/archive/bordiga/works/1922/democratic-principle.htm and M. Horkheimer, T. W. Adorno, and G. Schmid Noerr, Dialectic of enlightenment: philosophical fragments. in Cultural memory in the present. Stanford, Calif: Stanford University Press, 2002. 

  9. See A. F. Buehler, Revealed grace: the juristic sufism of Ahmad Sirhindi (1564 - 1624). Louisville, Ky: Fons Vitae, 2011 and M. I. Cug̲h̲tāʼī, Ed., Shah Waliullah (1703 - 1762): his religious and political thought. Lahore: Sang-e-Meel Publications, 2005. 

  10. ‘Hitting the Books: How IBM’s metadata research made US drones even deadlier’, Engadget. Accessed: Jan. 07, 2024. [Online]. Available: https://www.engadget.com/hitting-the-books-atlas-of-ai-kate-crawford-yale-university-press-153041441.html 


You'll only receive email when they publish something new.

More from The Iqra Files
All posts