by Hans Ulrich Obrist
Hans Ulrich Obrist: How did it all begin?
Julian Assange: I grew up in Australia in the 1970s. My parents were in the theatre, so I lived everywhere—in over fifty different towns, attending thirty-seven different schools. Many of these towns were in rural environments, so I lived like Tom Sawyer—riding horses, exploring caves, fishing, diving, and riding my motorcycle. I lived a classical boyhood in this regard. But there were other events, such as in Adelaide, where my mother was involved in helping to smuggle information out of Maralinga, the British atomic bomb test site in the outback. She and I and a courier were detained one night by the Australian Federal Police, who told her that it could be said that she was an unfit mother to be keeping such company at 2:00 a.m., and that she had better stay out of politics if she didn’t want to hear such things.
I was very curious as a child, always asking why, and always wanting to overcome barriers to knowing, which meant that by the time I was around fifteen I was breaking encryption systems that were used to stop people sharing software, and then, later on, breaking systems that were used to hide information in government computers. Australia was a very provincial place before the internet, and it was a great delight to be able to get out, intellectually, into the wider world, to tunnel through it and understand it. For someone who was young and relatively removed from the rest of the world, to be able to enter the depths of the Pentagon’s Eighth Command at the age of seventeen was a liberating experience. But our group, which centered on the underground magazine I founded, was raided by the Federal Police. It was a big operation. But I thought that I needed to share this wealth that I had discovered about the world with people, to give knowledge to people, and so following that I set up the first part of the internet industry in Australia. I spent a number of years bringing the internet to the people through my free speech ISP and then began to look for something with a new intellectual challenge.
HUO: So something was missing.
JA: Something was missing. This led me to using cryptography to protect human rights, in novel ways, and eventually as a result of what I was doing in mathematics and in physics and political activism, things seemed to come together and show that there was a limit to what I was doing—and what the rest of the world was doing. There was not enough information available in our common intellectual record to explain how the world really works. These were more the feelings and process, but they suggested a bigger question, with a stronger philosophical answer for explaining what is missing. We are missing one of the pillars of history. There are three types of history. Type one is knowledge. Its creation is subsidized, and its maintenance is subsidized by an industry or lobby: things like how to build a pump that pumps water, how to create steel and build other forms of alloys, how to cook, how to remove poisons from food, etc. But because this knowledge is part of everyday industrial processes, there is an economy that keeps such information around and makes use of it. So the work of preserving it is already done.
HUO: It’s kind of implicit.
JA: There is a system that maintains it. And there’s another type of information in our intellectual record. (This is a term I interchange freely with “historical record.” When I say “historical record,” I don’t mean what happened a hundred years ago, but all that we know, including what happened last week.) This second type of information no longer has an economy behind it. It has already found its way into the historical record through a state of affairs which no longer exists. So it’s just sitting there. It can be slowly rotting away, slowly vanishing. Books go out of print, and the number of copies available decreases. But it is a slow process, because no one is actively trying to destroy this type of information.
And then there is the type-three information that is the focus of my attention now. This is the information that people are actively working to prevent from entering into the record. Type-three information is suppressed before publication or after publication. If type-three information is spread around, there are active attempts to take it out of circulation. Because these first two pillars of our intellectual record either have an economy behind them, or there are no active attempts to destroy them, they do not call to me as loudly. But, this third pillar of information has been denied to all of us throughout the history of the world. So, if you understand that civilized life is built around understanding the world, understanding each other, understanding human institutions and so forth, then our understanding has a great hole in it, which is type-three history. And we want a just and civilized world—and by civilized I don’t mean industrialized, but one where people don’t do dumb things, where they engage in more intelligent behavior.
HUO: Do you mean a more complex behavior?
JA: Right, more complex and layered behavior. There are many analogies for what I mean by that, but I’ll just give a simple one, which is the water ritual. If you sit down with a friend, and there’s a pitcher of water on the table, and there are two glasses, then you pour the other person’s water before your own. This is a very simple ritual. But, this is better than the obvious step, which is to pour your own water before the other person’s. If we can see a few steps ahead, the water ritual is a more intelligent way to distribute water at a table. That’s what I mean by civilization—we gradually build up all these processes and understandings so we don’t need to make bad moves with each other or the natural world. So with regard to all this suppressed information, we’ve never had a proper understanding of it because it has never entered our intellectual record, and if we can find out about how complex human institutions actually behave, then we have a chance to build civilized behavior on top of it. This is why I say that all existing political theories are bankrupt, because you cannot build a meaningful theory without knowledge of the world that you’re building the theory about. Until we have an understanding of how the world actually works, no political theory can actually be complete enough to demand a course of action.
HUO: So that clearly maps out how you came to where you are today. Since many people now refer to you as one of their heroes, I was wondering who inspired you at the beginning.
JA: There have been heroic acts that I have appreciated, or some systems of thought, but I think it’s better to say that there are some people I had an intellectual rapport with, such as Werner Heisenberg and Niels Bohr. That comes when you’re doing mathematics. The mathematics of Heisenberg and Bohr is a branch of natural philosophy. They developed a system or epistemology for understanding quantum mechanics, but encoded within this intellectual tradition are methods to think clearly about cause and effect. When reading mathematics you must take your mind through each intellectual step. In this case, the steps of Heisenberg or Bohr. Because good proofs are very creative, it takes the full energies of your mind to reach through one step to another. Your whole mind must be engaged in a particular state of thought, and you realize that this mental arrangement is the same as the author’s at the moment of writing, so the feeling of mental similarity and rapport becomes strong. Quantum mechanics and its modern evolution left me with a theory of change and how to properly understand how one thing causes another. My interest was then in reversing this thought process and adapting it to another realm. We have an end state that we want, and I looked at all the changes that are needed to get to this end state from where we are now. I developed this analogy to explain how information flows around the world to cause particular actions. If the desired end state is a world that is more just, then the question is: What type of actions produce a world that is more just? And what sort of information flows lead to those actions? And then, where do these information flows originate? Once you understand this, you can see it is not just starting somewhere and ending elsewhere, but rather that cause and effect is a loop; here we are today, and we want to create an end state as a result of action. We act and by doing so bring the world into a new state of affairs, which we can consider our new starting point, and so this process of observe, think, act continues.
HUO: Science, mathematics, quantum theory—all of these come together in your work. If one reads about your beginnings before WikiLeaks, one finds that you were not only instrumental in bringing the internet to Australia, but that you were also one of the pioneering, early hackers. You co-authored this book called Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier. I’m curious about your hacker background, and this book as well, since it seems to be a sort of fundament on which a lot of things were based afterwards.
JA: In my late teenage years, up until the age of twenty, I was a computer hacker and a student in Melbourne. And I had an underground magazine called International Subversive. We were part of an international community of underground computer hackers. This was before the internet connected continents, but we had other ways of making international connections. So each country had its own internet, of a sort, but the world as a whole was intellectually balkanized into distinct systems and networks.
HUO: Like The WELL in the States.
JA: Right, that kind of thing, or ARPANET, which connected universities in the States. And something called x.25, run by the telecommunications companies, that banks and major companies used to link systems together. We, the underground community, sometimes bumped into each other deep inside these computer networks. Or we would meet at underground watering holes like QSD in France or ALTOS in Germany. But it was a very small community, with perhaps only twenty people at the elite level that could move across the globe freely and with regularity. The community was small and involved and active just before the internet, but then crossed into the embryonic internet, which was still not available to people outside of university research departments, US military contractors, and the pentagon. It was a delightful international playground of scientists, hackers, and power. For someone who wanted to learn about the world, for someone who was developing their own philosophy of power, it was a very interesting time. Eventually our phones were tapped and there were multiple, simultaneous raids that resulted in close to six years of legal proceedings. The book covers my case, but I deliberately minimized my role so we could pull in the whole community, in the United States, in Europe, in England, and in Australia.
HUO: it also created a kind of connection between all these different local scenes? At that time, you were also known as an ethical hacker.
JA: Right, though I actually think most computer hackers back then were ethical, since that was the standard of the best people involved. Remember, this was an intellectual frontier, and it had very young people in it. It needed young people for the degree of mental adaptation necessary. Because it was an intellectual frontier, we had a range of people who were very bright, though not necessarily formally educated.
HUO: Was there a connection to America, to the beginnings of The WELL, to people like Stewart Brand, Bruce Sterling, or Kevin Kelly?
JA: There was almost no connection. The WELL had influenced some parts of the computer hacking community in the United States, but we were deep underground, so most of our connections didn’t rise above the light and we were proud of that discipline. Those who knew did not speak. Those who spoke did not know. The result was a distorted US-centric perception of the underground. In the United States, in particular, you had quite marginal computer hackers engaging in conferences but the people engaged in the really serious business, because of the risks involved, were almost completely invisible until they were arrested. The entry points into it were the bulletin boards—these were the central places, places like P-80 in the United States, and Pacific Island in Australia, which had public cover for a private side. But then, once reaching a certain level, people only used completely underground bulletin boards. There were on x.25 networks places like ALTOS in Hamburg where we would go to talk. ALTOS was one of the first, if not the first, multi-party chat system, but in order to get into it, you had to have x.25 credentials. While some bank workers and telecommunications workers would have access to these, teenagers would only have them if they were decent computer hackers, or if their fathers worked for the telecommunications company.
HUO: In a previous issue of e-flux journal I discussed a lot of the history of anarchists and piracy with Hakim Bey, who mentioned that as an anarchist he has never fetishized democracy, saying that “democracy, to be interesting for an anarchist, has to be direct democracy.”When you worked as a hacker, were you inspired by anarchistic ideas?
JA: I wasn’t personally. The anarchists’ tradition revolving around figures like Pierre-Joseph Proudhon and Peter Kropotkin was not something on my horizon. My personal political inspirations were people like Aleksandr Solzhenitsyn, anti-Stalinists in The God That Failed, and US radical traditions all the way up to the Black Panthers.
HUO: Liberation movements.
JA: Yes, the various liberation movements—in their emotional tone and force of will, not in intellectual content. That tradition really spread into some other things I did later, like the Cypherpunks, in 1993 and ‘94. 1994 was probably the peak of the Cypherpunk micro movement. Cypherpunk is a wordplay on Cyberpunk, the latter was always viewed as nonsense by real computer hackers—we were the living Cyberpunks while others were just talking about it, making artistic pastiche on our reality. We viewed the better books as a nice showing of the flag to the general public, but like most causes that are elitist and small, we had contempt for bowdlerized popularizations. The Cypherpunks were a combination of people from California, Europe, and Australia. We saw that we could change the nature of the relationship between the individual and the state using cryptography. I wouldn’t say that we came from a libertarian political tradition as much as from a libertarian temperament, with particular individuals who were capable of thinking in abstractions, but wanting to make them real. We had many who were comfortable with higher mathematics, cryptography, engineering or physics who were interested in politics and felt that the relationship between the individual and the state should be changed and that the abuse of power by states needed to be checked, in some manner, by individuals.
HUO: Is this the fundament of WikiLeaks?
JA: Yes and no. There are many different intellectual strands that ended up in WikiLeaks that are unrelated to ideas swirling around the Cypherpunk community. But the use of mathematics and programming to create a check on the power of government, this was really the common value in the Cypherpunk movement.
HUO: And you were one of the protagonists?
JA: I was. There wasn’t really a founding member or a founding philosophy but there were some initial principles, people like John Young, Eric Huges, and Timothy C. May from California. We were a discussion group like the Vienna school of logical positivism. From our interactions certain ideas and values took form. The fascination for us was simple. It was not just the intellectual challenge of making and breaking these cryptographic codes and connecting people together in novel ways. Rather, our will came from a quite extraordinary notion of power, which was that with some clever mathematics you can, very simply—and this seems complex in abstraction but simple in terms of what computers are capable of—enable any individual to say no to the most powerful state. So if you and I agree on a particular encryption code, and it is mathematically strong, then the forces of every superpower brought to bear on that code still cannot crack it. So a state can desire to do something to an individual, yet it is simply not possible for the state to do it—and in this sense, mathematics and individuals are stronger than superpowers.
Read the whole interview
Taken from e-flux.com/