View allAll Photos Tagged cryptography

"In the history of cryptography, the bombe was an electromechanical device used by British cryptologists to help break German Enigma-machine-generated signals during World War II. The bombe was designed by Alan Turing, with an important refinement suggested by Gordon Welchman.

 

The bombe was named after, and inspired by, a device that had been designed in 1938 by Polish Cipher Bureau cryptologist Marian Rejewski, and known as the "cryptologic bomb" (Polish: "bomba kryptologiczna")."

- Wikipedia entry on the Bombe

China is a likely winner of the information age supply chain through ecommerce

 

Peace and Ecommerce, A Global Systems View

 

Attending a required Masters class “Policy, Law, and Ethics in Information Management” it was only ethical to admit that I worked three months drafting and publishing policy documents for Microsoft, which was now our current class assignment, to research Web based privacy policies and other related documents such as terms of use, conditions of use, code of conduct and learn more about them, with a diary of examples in the wild, and related materials.

 

The educational idea is that we would then be able to contribute meaningfully to creating policy statements and understand their underlying implications to end users and companies. But I had already done this work professionally, so it would be of questionable value for me to do the coursework on the same topic as if I had never done it before.

 

The instructor of the class, Glenn Von Tersch assigned me to present information on freedom of speech, a topic I fell in love with, and wanted to research more. But for my final research, I needed something else.

 

One of my favorite things to discuss in job interviews, or with anyone in earshot, is that I believe that the networked spread of ecommerce over the Web, filtering into even the poorest nations will aid in understanding through communication; that ecommerce leads to peace. In effect I believed that ecommerce contributes in a direct way to peace because it provides the fuel to grow and maintain the Internet. Also it seemed obvious that people and countries that are invested in and perform transactions with each other are less likely to go war against their own interests. Von Tersch said, “These topics you are interested in have more research value than freedom of speech, because 1st amendment rights have been heavily legislated, written about, and researched.” He mentioned something called “The McDonald’s Effect”, how having a McDonald’s outlet or franchise appears to contribute to peace between countries. So peace and ecommerce became my topic.

 

What I did not expect to discover is in human society war is considered the norm and peace the exception. I did not expect to learn about how ugly the 3rd world poverty creating monster of WTO became according to one economist, even though I live in Seattle where the initial protests were. I was surprised to know how Reganomics theory hangs on, like an old B-grade movie on late night TV, because someone somewhere in the supply chain makes money. I did not expect to find that privacy and intellectual rights are so tightly interwoven, or how they relate to conflict, security, potential world dominance and growth.

 

I had no way to guess that I would enjoy the study of economics – statistical, yes, nicely so, but dull no; as a global topic it is juicy-rotten, full of international spies, botched security, with rogue pirate computer chips, and unintended consequences.

 

Who can accurately predict how patterns of global economics relate to peace, privacy, property rights, policies and their outcome in the one breath away from today, the next 20-40 years? Who would think that China - the nation, McDonalds - the corporation, and Chicago crack dealers and their foot soldiers share so much in common when you view their information through these fascinating multi-dimensional facets?

 

One must be educated to search effectively for information. My knowledge about the nature of search is not just intellectual knowledge; this is conditionalized through my own experience of failure to produce relevant search results within massive library databases.

 

My education began with a simple query on the Web “peace + ecommerce” which returned from Google “Theses on the Balkan War,” by Mike Haynes, from the International Socialism Journal, “Capitalism is inherently a competitively expansionist and therefore conflict-ridden system” , effectively laying the blame for war on the US and Western capitalist nations and on anyone claiming to be fighting a war with good intentions. I read it, thinking I would not see this relate to my project – also surprising very similar material was presented in the global economic books I read later.

 

As mentioned the pursuit of ‘education justifies anything’, like looking at any results, so I also clicked on an article entitled “Dinosaur Extinction linked to change in Dinosaur Culture” I read it, and it made sense that something like author Daniel Quinn’s theory of “The Law of Limited Competition” is an operant factor in global markets today, with war being genocide, and countries struggling to win economically laying waste to the very place they live. A notable example is Beijing, the air pollution capital of the world struggling to host the Olympic Games this year. I stored that URL for future reference. The theory and the reality imply that in the race to catch up and compete in global economics, the Chinese are killing themselves off before they arrive at their desired goal.

 

Then I queried in several of the University of Washington interconnected and extensive library databases on the same thing “peace + ecommerce” and found in all of them, zero returns, “0 Results”. My teacher was surprised and advised me to extrapolate and offer conjecture on what was likely, if few sources were available. I notified a friend studying economics who emailed related articles. Very frustrated I tried related queries and turned up articles on the economies of war . How perverse, I thought. I contacted a librarian through the online tool and chatted with her, explaining my quest. She suggested I query on “economics and public policy”. “How is public policy related to peace and ecommerce?” I asked. “Try Conflict Resolution” she replied.

 

Thus the reason I couldn't find 'peace' is because the term used, in educated facet writers’ metadata which is designed to expose information to search, is 'conflict resolution' or ‘conflict prevention’. Oddly the social implication is that war is the norm. Maybe peace doesn’t exist anywhere. A reason I used 'ecommerce' instead of 'global economics' is due to consulting in that field for technology firms. Searching again returned few meaningful results -- the user interface was strange, very slow, and clunky. I longed for Google .

 

Then I remembered the “McDonald's Effect” our teacher mentioned, and quickly I located a reference on the Web, but it was deeply nested in a staggering number of oddly worded articles. I stopped without uncovering where the concept originated. The next night I searched again, and found the author Thomas Friedman and his related books. I briefly scanned all the related Wikipedia articles. I realized quickly that to become educated enough on my two topics, I had to some understanding of economics. This is because even to scrape by enough to search among the many interrelated topics one needs to know the central facet. Very esoteric topics require specialized language and deep knowledge of the subject.

 

More searches turned up substantial evidence that China lags behind other nations in ecommerce.

 

For years I worked in ecommerce designing interfaces (for Microsoft 2003 and Amazon 2007-2008), and working with supply chain software (as a director of an ecommerce company). But because I didn't realize that one could understand it better, and that it is not as dull as computer science and its requisite cash register receipts , I never tried.

 

The "McDonald's Effect" is named after "The Golden Arches Theory of Conflict Prevention" created by the author Thomas Friedman's slightly in cheek comments and his book, “The Lexus and the Olive Tree” (the update now titled "The Lexus and the Olive Tree: Understanding Globalization").

 

Those books led me to order Amazon ecommerce overnight book delivery, and I read, 'The World Is Flat?: A Critical Analysis of New York Times Bestseller by Thomas Friedman', 'Freakonomics: A Rogue Economist Explores the Hidden Side of Everything' , 'Making Globalization Work' which reports that there is hope in the world for peace. The Nobel Prize winning author helps the reader extrapolate based on significant knowledge of statistics and global economic analysis through his personal, professional, and academic connections.

 

Common Name Academic Name Book Title

 

McDonalds Effect Golden Arches Theory of Conflict Prevention,

 

aka democratic peace theory Lexus and the Olive Tree

 

Dell Theory The Dell Theory of Conflict Prevention The World is Flat, A Brief History of the Twenty-First Century

 

peace conflict prevention

 

ecommerce global economics

 

"In his book, The Lexus and the Olive Tree, Thomas L. Friedman proposed The Golden Arches Theory of Conflict Prevention, observing that no two countries with a McDonald's franchise had ever gone to war with one another, a version of the democratic peace theory."

 

"The Dell Theory stipulates: No two countries that are both part of a major global supply chain, like Dell's, will ever fight a war against each other as long as they are both part of the same global supply chain."

 

---------------------------------------------------------------------

 

Readings

 

The World Is Flat 3.0: A Brief History of the Twenty-first Century by Thomas Friedman

 

Larry Page, Google Co-Founder quoted by Thomas Friedman, p. 179, entire paragraph. “The more global Google’s user base becomes, the more powerful a flattener it becomes…”

 

From Friedman’s conversation with Google’s director of operations in China, Kai-Fu Lee, p. 181 entire paragraph ”In time individuals will have the power to find anything in the world at any time on all kinds of devices – and that will be enormously empowering.”

 

The Quiet Crisis, entire pages 368, 369, chapter on research in China, beating out American innovation in research. “The Chinese government gave Microsoft the right to grant post-docs.” “They work through their holidays because their dream is to get to Microsoft.”

 

“What are those?” She said the researchers get them from Microsoft every time they invent something that gets patented. How do you say Ferrari in Chinese.”

 

p. 370 “… whether we are going to implement or China is going to beat us to our own plan.” Council on Creativeness, regarding the Innovate America report, comment to Friedman by Deborah Wince-Smith.

 

Introduction p. X, Thomas Friedman, “Of course the world is not flat. But it isn’t round anymore either. I have been using the simple notion of flatness to describe how more people can plug, play, compete, connect, and collaborate with more equal power than ever before – which is what is happening in the world. … the essential impact of all the technological changes coming together in the world today. … My use of the word flat doesn’t mean equal (as in ‘equal incomes’) and never did. It means equalizing.”

 

The Lexus and the Olive Tree: Understanding Globalization by Thomas Friedman

 

Forward to the Anchor Edition, Thomas Friedman, “… my Golden Arches Theory – that no two countries that both have McDonald’s have ever fought a war again each other since they each got their McDonald’s.”

 

p. 7 “When I say that globalization has replaced the Cold War as the defining international system, what exactly do I mean?”

 

p. 8 “The cold war system was symbolized by a single word, the wall … “You can’t handle the truth,” Says Nickleson. “Son we live in a world that has walls…”

 

p. 8 “This Globalization system is also characterized by a single word: the Web. … we have gone from a system built around divisions and walls to a system built around integration and webs.”

 

p. 19 “What is information arbitrage? Arbitrage is a market terms. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

Chapter 3, p. 29. The Lexus and the Olive Tree

 

Photo: Jerusalem, December 29, 1998: Simon Biton places his cellular phone up to the Western Wall so a relative in France can say a prayer at the holy site. (Photo: Menahem Kahana, Agence France-Presse) [caused my spontaneous tears]

 

p. 47 “advertising jingle “Let us put a bank in your home” … office … newspaper … bookstore … brokerage firm … factory … investment firm … school in our homes.”

 

The World Is Flat?: A Critical Analysis of New York Times Bestseller by Thomas Friedman by Ronald Aronica and Mtetwa Ramdoo

 

Freakonomics [Revised and Expanded]: A Rogue Economist Explores the Hidden Side of Everything by Steven D. Levitt and Stephen J. Dubner

 

Chapter 5 “Why do Drug Dealers Still Live with Their Moms?” p. 89 “So how did the gang work? An awful lot like most American businesses, actually, though perhaps none more so than McDonald’s. In fact, if you were to hold a McDonald’s organizational chart and a Black Disciples org chart side by side, you could hardly tell the difference.”

 

p. 46 “There is a tale, “The ring of Gygnes,” … could any man resist the temptation of evil if he knew his acts could not be witnessed?”

 

p. 58 “Attendance at Klan meetings began to fall … of all the ideas Kennedy thought up to fight bigotry, this campaign was clearly the cleverest. … He turned the Klan’s secrecy against itself by making its private information public: he converted heretofore precious knowledge into ammunition for mockery.”

 

Making Globalization Work by Joseph E. Stiglitz

 

My favorite – the entire book was used to write this paper.

 

Web Resources

 

Please view attached Appendix www.crito.uci.edu/pubs/20... regarding the reasons one study concludes that hold China back in ecommerce.

 

[1] Waiting until the time is right, one is good at something, or has collected all the facts, without making any attempts isn’t effective. I had to begin someplace even if it is incomplete so I started with the World Wide Web. “If something is worth doing well, at all, it is also worth doing poorly.” I am not sure where that quote came from but I read it in an article where someone presented their reasoning.

 

[2] You never know where something will come from in free rights actions or what it will mean later. For example the person at the center of the Alaskan “Bong hits For Jesus” case, Frederick Morse, now teaches English to Chinese students in China. As an adult it appears he has his head on straight in his wish to help others communicate, more so that those he fought in court.

 

From the CNN news article, published June 26, 2007, “In dissent, Justice John Paul Stevens said, "This case began with a silly nonsensical banner, (and) ends with the court inventing out of whole cloth a special First Amendment rule permitting the censorship of any student speech that mentions drugs, so long as someone could perceive that speech to contain a latent pro-drug message." He was backed by Justices David Souter and Ruth Bader Ginsburg.” www.cnn.com/2007/LAW/06/2... downloaded March 13, 2008

 

[3] Pentagon attack last June stole an "amazing amount" of data” Joel Hruska Published: March 06, 2008 - 07:13PM CT Pentagon attack last June stole an "amazing amount" of data... from “blueton tips us to a brief story about recent revelations from the Pentagon which indicate that the attack on their computer network in June 2007 was more serious than they originally claimed. A DoD official recently remarked that the hackers were able to obtain an "amazing amount" of data.

 

We previously discussed rumors that the Chinese People's Liberation Army was behind the attack. “CNN has an article about Chinese hackers who claim to have successfully stolen information from the Pentagon.” Quoting Ars Technica: "The intrusion was first detected during an IT restructuring that was underway at the time. By the time it was detected, malicious code had been in the system for at least two months, and was propagating via a known Windows exploit. The bug spread itself by e-mailing malicious payloads from one system on the network to another." Via email from Jeremy Hansen on Slashdot: News for nerds, stuff that matters

 

[4] “Chinese backdoors "hidden in router firmware" Matthew Sparkes, News [Security], Tuesday 4th March 2008 3:17PM, Tuesday 4th March 2008 Chinese backdoors "hidden in router firmware"... The UK's communication networks could be at risk from Chinese backdoors hidden in firmware, according to a security company.

 

SecureTest believes spyware could be easily built into Asian-manufactured devices such as switches and routers, providing a simple backdoor for companies or governments in the Far East to listen in on communications.

 

"Organisations should change their security policies and procedures immediately," says Ken Munro, managing director of SecureTest. "This is a very real loophole that needs closing. The government needs to act fast."

 

"Would they buy a missile from China, then deploy it untested into a Western missile silo and expect it to function when directed at the Far East? That's essentially what they're doing by installing network infrastructure produced in the Far East, such as switches and routers, untested into government and corporate networks."

 

Late last year MI5 sent a letter to 300 UK companies warning of the threat from Chinese hackers attempting to steal sensitive data. Reports at the time suggested that both Rolls Royce and Royal Dutch Shell had been subjected to "sustained spying assaults".

 

The issue has been debated by government for some time. In 2001, the then foreign secretary Robin Cook, warned that international computer espionage could pose a bigger threat to the UK than terrorism.

 

[5] Chip Piracy Might End With Public Key Cryptography. A Web Exclusive from Windows IT Pro Mark Joseph Edwards, Security News, InstantDoc #98491, Windows IT Pro “A group of researchers from two universities have proposed a way to prevent chip piracy. The technique uses public key cryptography to lock down circuitry.

 

In a whitepaper published this month, Jarrod A. Roy and Igor L. Markov (of the University of Michigan) and Farinaz Koushanfar (of Rice University) outline the problem and details of how their proposed technology will help solve it.

 

Chip designers sometimes outsource manufacturing and that opens the door to piracy, should someone copy the design plans. The copied plans are then used to created 'clone' chips for a wide range of devices, including computers, MP3 players, and more.

 

"Pirated chips are sometimes being sold for pennies, but they are exactly the same as normal chips," said Igor Markov, associate professor in the Department of Electrical Engineering and Computer Science at the University of Michigan. "They were designed in the United States and usually manufactured overseas, where intellectual property law is more lax. Someone copies the blueprints or manufactures the chips without authorization."

 

The groups propose the use of public key cryptography, which would be embedded into circuitry designs. Each chip would produce its own random identification number, which would be generated during an activation phase. Chips would not function until activated, and activation would take place in a manner somewhat similar to that seen with many applications in use today. Via email from Jeremy Hansen.Original source - EPIC: Ending Piracy of Integrated Circuits Jarrod A. Roy, Farinaz Koushanfar‡ and Igor L. Markov, The University of Michigan, Department of EECS, 2260 Hayward Ave., Ann Arbor, MI 48109-2121, Rice University, ECE and CS Departments, 6100 South Main, Houston, TX 77005 www.eecs.umich.edu/~imark... March 06, 2008

 

[6] Chapter 5 “Why do Drug Dealers Still Live with Their Moms?” p. 89 “So how did the gang work? An awful lot like most American businesses, actually, though perhaps none more so than McDonald’s. In fact, if you were to hold a McDonald’s organizational chart and a Black Disciples org chart side by side, you could hardly tell the difference.”

 

[7] Mike Haynes, Theses on the Balkan War, “Capitalism is inherently a competitively expansionist and therefore conflict ridden system” Issue 83 of INTERNATIONAL SOCIALISM JOURNAL Published Summer 1999 Copyright © International Socialism, pubs.socialistreviewindex... accessed March 3, 2008.

 

[8] Readings p.7 “When I say that globalization has replaced the Cold War as the defining international system, what exactly do I mean?” p. 8 “The cold war system was symbolized by a single word, the wall … “You can’t handle the truth,” Says Nicholson. “Son we live in a world that has walls…”p. 8 “This Globalization system is also characterized by a single word: the Web. … we have gone from a system built around divisions and walls to a system built around integration and webs.”

 

“What is information arbitrage? Arbitrage is a market term. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

[9] Shared by miles on Feb 13, 2006 3:39 pm that I located through a Gmail...

 

[10] “As it gears up to host the 2008 Olympic Games Beijing has been awarded an unwelcome new accolade: the air pollution capital of the world.Satellite data has revealed that the city is one of the worst environmental victims of China's spectacular economic growth, which has brought with it air pollution levels that are blamed for more than 400,000 premature deaths a year” Satellite data reveals Beijing as air pollution capital of world

 

[11] “What we call ‘war’ is not all bad,” according to Virginia Johnson a former governmental planning consultant, who reminded me, “Without conflict there is no life. You don’t want 'perfect peace' there is no movement. The human standard is actually what we broadly call 'war'; because without conflict, change, motion, growth we would learn nothing, we would have nothing, we would be dead.” Personal conversation, March 14, 2008, Seattle, Washington

 

[12] Readings Larry Page, Google Co-Founder quoted by Thomas Friedman, p. 179, entire paragraph. “The more global Google’s user base becomes, the more powerful a flattener it becomes…”

 

[13] Ranganathan, faceted classification, Five Laws of Library Science, S. R. Ranganathan - Wikipedia, www.boxesandarrows.com/vi... Personality, Matter, Energy, Space, and Time. (PMEST)

 

Personality—what the object is primarily “about.” This is considered the “main facet.”

 

Matter—the material of the object

 

Energy—the processes or activities that take place in relation to the object

 

Space—where the object happens or exists

 

Time—when the object occurs

 

[14] www.crito.uci.edu/pubs/20...

 

[15] I learned about supply chain management mainly from the supply chain wizard Marc Lamonica, Regional Chief Financial Officer at Sutter Connect, Sutter Shared Services, and our mutual friend Web entrepreneur and ecommerce product engineer Adam Kalsey, and Sacramento State University teacher Stuart Williams, of Blitzkeigsoftware.net, <a href="http://blitzkriegsoftware.net/St..." blitzkriegsoftware.net/St...

 

[16] Introduction to Computer software classes in the 1970s consisted of FORTRAN cash register receipt programming, which is by implication is what ecommerce actually does.

 

[17] Freakonomics is a must read book of comedy and connections.

 

[18] Golden Arches, definition on Wikipedia, the free encyclopedia Golden Arches - Wikipedia, accessed March 13, 2008

 

[19] Readings “The World Is Flat 3.0: A Brief History of the Twenty-first Century” by Thomas Friedman, p. 421

 

[20] Readings p. 19 “What is information arbitrage? Arbitrage is a market term. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

[21] “Conservation groups say acid rain falls on a third of China's territory and 70% of rivers and lakes are so full of toxins they can no longer be used for drinking water.” Satellite data reveals Beijing as air pollution capital of world, Jonathan Watts in Beijing The Guardian, Monday October 31 2005, Satellite data reveals Beijing as air pollution capital of world

 

[22] “…After watching Jobs unveil the iPhone, Alan Kay, a personal computer pioneer who has worked with him, put it this way who has worked with him, put it this way: "Steve understands desire." ... Fortune CNN Magazine March 5, 2008, http://money.cnn.com/2008/03/02/......

 

accessed March 5, 2008

 

[23] Mac Margolis, “How Brazil Reversed the Curse, Latin America used to suffer the deepest gap between rich and poor. Now it is the only region narrowing the divide. Upwardly Mobile: Middle-class Brazilians” How Brazil Reversed the Curse NEWSWEEK Nov 12, 2007 Issue

 

[24] Mike Haynes, Theses on the Balkan War, “Capitalism is inherently a competitively expansionist and therefore conflict ridden system” Issue 83 of INTERNATIONAL SOCIALISM JOURNAL Published Summer 1999 Copyright © International Socialism, pubs.socialistreviewindex... accessed March 3, 2008. “The optimism that the end of the Cold War might lead to a new world order has been shown to be false. The hope that it would release a peace dividend that would enable a new generosity in international relations has been belied by experience, as some of us sadly predicted it would.3 Though the arms burden has declined, there has been no outpouring of aid to Eastern Europe, no new 'Marshall Plan'. The result has been that the burden of change has fallen on the broad masses of the population, wrecking lives across the old Soviet bloc in general and in one of its poorest components in south eastern Europe in particular. According to the World Bank, the number of people living in poverty (defined as having less than $4 a day) in the former Soviet bloc has risen from 14 million in 1990 to 147 million in 1998.4 Worse still, the advanced countries have continued to reduce further the miserly sums they devote to aid to the even poorer areas of the world. The OECD countries are rhetorically committed to an aid target of 0.7 percent of their output. In 1990 they gave 0.35 percent, and by 1997 the figure had fallen to 0.22 percent, with the United States under this heading giving 0.09 percent of its output, a figure in startling contrast to the expenditure devoted to destruction.”5

 

[25] Readings p. 46 “There is a tale, “The ring of Gygnes,” … could any man resist the temptation of evil if he knew his acts could not be witnessed?”

 

[26] Readings p. 58 “Attendance at Klan meetings began to fall … of all the ideas Kennedy thought up to fight bigotry, this campaign was clearly the cleverest. … He turned the Klan’s secrecy against itself by making its private information public: he converted heretofore precious knowledge into ammunition for mockery.”

 

Some of the research in this paper on piracy was provided by Jeremy Hansen of Seattle, Washington, USA. Mr. Hansen's email regarding economics served to inform me on this topic. Teacher: Glenn Von Tersch.

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

Description: During the Second World War Ian Fleming served as a Commander in the Royal Navy as assistant to the Director of Naval Intelligence, Rear Admiral John Godfrey. This document outlines Fleming's plan to capture German Engima codebooks which he dubbed 'Operation Ruthless'.

 

Fleming's name for the operation and his description of the man needed as a "tough batchelor" can't help but recall his later creation of James Bond. The document, prepared after the war as a summary of the activities of Naval Intelligence, suggests Fleming volunteered himself for the mission.

 

Date: c.1946

 

Our Catalogue Reference: ADM 223/463 p38

 

This image is from the collections of The National Archives. Feel free to share it within the spirit of the Commons.

 

For high quality reproductions of any item from our collection please contact our image library.

The Lammasu or Lumasi represent the zodiacs, parent-stars, or constellations.They are depicted as protective deities because they encompass all life within them. In the Sumerian Epic of Gilgamesh they are depicted as physical deities as well, which is where the Lammasu iconography originates, these deities could be microcosms of their microcosmic zodiac, parent-star, or constellation. Although "lamassu" had a different iconography and portrayal in Sumerian culture, the terms lamassu, alad, and shedu evolved throughout the Assyro-Akkadian culture from the Sumerian culture to denote the Assyrian-winged-man-bull symbol and statues during the Neo-Assyrian empire. Female lamassus were called "apsasû".The motif of the Assyrian-winged-man-bull called Aladlammu and Lamassu interchangeably is not the lamassu or alad of Sumerian origin which were depicted with different iconography.[clarification needed] These monumental statues were called aladlammû or lamassu which meant "protective spirit".[3][clarification needed] In Hittite the Sumerian form dLAMMA is used both a name for the so-called "Tutelary deity" identified in certain later texts with Inara and a title given to various other tutelary or similar protective gods.In the Enûma Eliš they are both symbolized as the zodiacs, parent-stars, or constellations and as physical deities as well as was in the Epic of Gilgamesh.

2011, Mar. 25(Fri)@南海藝廊

入場時間︱19:20入場 19:30準時開始

入場費︱NT$.50

  

【 柔軟次攻擊 】

演出者︱ Sounds like O.range(聽起來好橘)

看起來很刺鼻

吃起來很低沈

摸起來很過飽和

聞起來很痛

 

聽起來好橘,創造視覺和聽覺的連串

e-Mail︱o.range.sounds.2O11@gmail.com

Website|sounds-like-orange.com/

 

表演簡介︱影響

人們會因為"一樣"而有歸屬感,漸漸遺忘"不一樣"的必要,為了安全,多數決將100個人變成1個人,用同一種面貌,做了同一個決定。

但100個人就該有100種樣子,就該存在一些不和諧的畫面與聲音。

 

演出者︱葉立傅

傅立葉轉換是一種線性的積分轉換。在物理學、聲學、光學、結構動力學、數論、組合數學、機率論、統計學、訊號處理、密碼學、海洋學、通訊等領域都有著廣泛的應用。例如在訊號處理中,傅立葉轉換的典型用途是將訊號分解成幅值分量和頻率分量。

 

但是你以為把狗倒過來就會變神嗎?

 

表演簡介︱

     ∞

f(x) = ∫  (A(u)*cos(ux) + B(u)*sin(ux)) du

    -∞

Lacking Sound Festival Listen 45

2011, Mar. 25(Fri)@Nan-Hai Gallery

Entrance Time︱19:20 Starts Punctually At 19:30

Entrance Fee︱NT$.50

 

【 Sub-Attack but Sweet 】

Artist︱ Sounds like O.range

It looks pungent

Tastes deep as bass

Touches more than saturated

Smells pain

 

It sounds orange, creating a thread between sight and hearing.

 

e-Mail︱o.range.sounds.2O11@gmail.com

Website|soundslikeOrange.com

 

Performance Introduction︱ Effect

Many tend to acquire belongingness by being all alike, forgetting the necessity of being different. To feel secure, 100 people have become a single unity, disguised in the same appearance, making the same decision.

 

100 people should have 100 faces, conflict and discord shall exist.

  

Artist︱ Reiruof

Fourier transform is a mathematical operation that transforms one complex-valued function of a real variable into another. It is largely applied to physics, acoustics, optics, structural mechanics, number theory, combinatorics, probability theory, statistics, signal processing, cryptography, oceanography, communication…etc. For example, on signal processing the Fourier transform decomposes signal into amplitude and frequency.

 

Well, you think dog in reverse makes it God?

    

Performance Introduction︱

     ∞

f(x) = ∫  (A(u)*cos(ux) + B(u)*sin(ux)) du

    -∞

Curator︱YAO, Chung-Han

Graphic Design︱Nat NIU

Project Manager︱Liang CHEN

 

指導單位︱台北市文化局 

主辦單位︱失聲祭團隊 lsf-taiwan.blogspot.com/

協辦單位︱國立臺北教育大學 南海藝廊 blog.roodo.com/nanhai/

Supervised by︱ Department of Cultural Affairs Taipei City Government

Organized by︱Lacking Sound Festival Team

In Cooperation with︱National Taipei University of Education Nan-Hai Gallery

 

Calcite, Paint

Thebes, Valley of the Kings, Tomb of Tutankhamun (KV 62).

New Kingdom, 18th Dynasty, Reign of Tutankhamun (1355-1346 BCE).

 

Tutankhamun's tomb held more than eighty vessels of oils and unguents, but thieves stole most of the contents. This container has a central frieze in which the royal throne name appears in a cryptographic writing, ensuring the survival of the king's name.

 

King Tut exhibit, Seattle Washington, 2012.

This map - part patchwork quilt, part appliqué - was sewn later in life by a lady who, as a child, had grown up living in a house within the grounds of Bletchley Park during the war. You can see the track round the grounds through the eyes of a child who used to cycle around the place while the code-breakers were at their work. Apparently the security guards used to give the children security passes to get in and out, but they kept losing them, thus presenting an even greater security risk. The guards all knew them anyway, so they gave up with the passes.

Bletchley Park és un dels llocs més fascinants de la historia del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informatica i els ordinadors.

 

Vista interna d'una maquina 'Bombe'. La 'Bombe' fou creada per Alan Turing i Gordon Welchman a partir d'un model polonès, que permetia ajudar a desxifrar els codis de la famosa maquina Enigma del III Reich. Tot i que foren destruides totes despres de la guerra, amb molt esforç ara han pogut reconstruir-ne una, que funciona com les seves predecesores.

 

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

This is the back side of a Bombe machine, in Bletchley Park. The Bombe machine was a device created by Alan Turing and Gordon Welchman to help decyphering the famous german Enigma machine. Although all 'bombes' were destroyed after the war, the team in the museum has rebuilt this full-working bombe. That's why has the name "Phoenix".

 

en.wikipedia.org/wiki/Bombe

 

www.jharper.demon.co.uk/bombe1.htm

 

en.wikipedia.org/wiki/Bletchley_Park

 

www.bletchleypark.org/

 

www.bletchleypark.org/content/museum.rhtm

 

For an impresive virtual visit, take a look to these videos:

 

www.youtube.com/watch?v=ZmMFp2FQPsY

Blog: makaylalewis.co.uk/2013/11/20/sketchnotes-introduction-to...

 

©ALL RIGHTS RESERVED.

These photographs are presented here for viewing purposes ONLY. They are NOT royalty free images and may not be used for commercial or private use. Any such use of these images is strictly prohibited. Specifically, these images may not be copied, manipulated, be reproduced by any other means nor sold without prior written consent by the author.

More art on my weblog: uair01.blogspot.com/

 

= = = = =

 

SEVEN SECRET ALPHABETS

Anthony Earnshaw

 

A very remarkable book. The replacement of a conventional capital letter at the beginning of a chapter by some kind of visual pun is as old as the illuminated book, but Earnshaw has succeeded in divorcing it from its customary aesthetic role, stripped it of any scene-setting function. His letters, comic or sinister, exist in their own right. Each image hides its secret until it finds its place. Even then it may prove evasive. The alphabets suggest an alternative reality where humour and disaster are interchangeable and the laws which govern nature are bent certainly, but only very little. An imagination in no way forced selects an apparently arbitrary image at a precise moment . . . Letters, those haphazardly invented signs, those abstract shapes we hear as sounds, take on a concrete meaning of their own.

Guardian

 

It is fair to say th at the author explores a landscape which suggests Magritte and Monty Python. The humour is austere, bleak and if not black, at least charcoal grey. As a feat of imagination the work is outstanding.

The Times Educational Supplement

 

Earnshaw has a devious, allusive, surrealist interest in letters. His imagination is full of wit; each image is a humorous vignette, an unlikely collusion of images in the form of a letter. Such shifting of context is the source of all humour. By providing a main-line to the unconscious and suggesting a revaluation of the essential symbols of which language is constituted, he makes his work compulsive and compulsory viewing.

Arts Review

 

JONATHAN CAPE

THIRTY BEDFORD SQUARE LONDON

 

by Eric Thacker and Anthony Earnshaw

MUSRUM

WINTERSOL

Corrigendum

THE ISBN FOR THE PAPERBACK EDITION OF

SEVEN SECRET ALPHABETS

BY ANTHONY EARNSHAW

SHOULD READ ISBN 022401383 I

FIRST PUBLISHED 1972

© 1972 BY ANTHONY EARNSHAW

JONATHAN CAPE LTD, 30 BEDFORD SQUARE, LONDON, WCI

ISBN 022400795 5

PRINTED AND BOUND IN GREAT BRITAIN BY

W & J MACKAY LIMITED, CHATHAM

THE STATUE OF LIBERTY

 

Statue of Liberty The Statue of Liberty in New York harbour was presented in 1884 as a gift from the French Grand Orient Temple Masons to the Masons of America in celebration of the centenary of the first Masonic Republic. She is holding the Masonic "Torch of Enlightenment". Also referred to back in the 1700's by the Illuminati Masons as the "Flaming Torch of Reason". The Torch represents the "Sun" in the sky. The Statue of Liberty's official title is, "Liberty Enlightening the World". The cornerstone of the statue records how it was laid in a Masonic ceremony (see plaque photo above).

 

THE TORCH SYMBOL

 

Illuminati means to "bare light" one way to symbolize this is by carrying a torch. A torch sits on top of the Statue of Liberty, on top of JFK's grave, and on top of the tunnel where Princess Diana was killed. Best selling author, Robert Bauval:

 

"The cornerstone for the Statue of Liberty was placed in a solemn ceremony in 1884 organised by the Masonic lodges of New York.

 

The Statue of Liberty, which was designed by the French sculptor Bartholdi and actually built by the French Engineer, Gustave Eiffel (both well-known Freemasons), was not originally a ‘Statue of Liberty’ at all, but first planned by Bartholdi for the opening of the Suez Canal in Egypt in 1867.

 

Bartholdi, like many French Freemasons of his time, was deeply steeped in ‘Egyptian’ rituals, and it has often been said that he conceived the original statue as an effigy of the goddess Isis, and only later converted it to a ‘Statue of Liberty’ for New York harbour when it was rejected for the Suez Canal."

 

The goddess Isis is known by many names, including Juno.

 

Roman Godess Juno

Above: Roman Godess Juno 735 B.C. (wife of Zeus)

 

Below: Interestingly, the goddess Juno made an appearance on a Vatican coin in 1963 (notice her torch) during the period of the alleged Freemason Roncalli's Pontificate, the curiously named John XXIII, architect of the disasterous Vatican II.

 

goddess Juno

Below: Frederic Auguste Bartholdi, the Sculpture of the Statue of Liberty, on a Masonic Card (notice the Masonic compass and square).

 

Frederic Auguste Bartholdi

From another article by Bauval:

 

"The 'torch' analogy is very interesting. The original statue of Bartholdi destined first for Port Said at the mouth of the Suez Canal, was also to bear a torch intended to symbolise 'the Orient showing the way'. The 'Grand Orient', of course, is the name of the French Masonic mother lodge, and to which Bartholdi belonged. There is another similar 'torch' that played a strange role in the French Revolution, but of which I will reveal later in my forthcoming book "Talisman". It still is to be seen in the skyline of Paris today.

 

People today do not realise the power of such symbolism, and how they can be used with devastating effect on the minds of the unsuspecting masses. And this is worrying. The SS Nazi movement made prolific use of all these 'symbol games', and wreeked havoc in the world."

 

Below: "The Illuminati" Enlightening the World (and keeping the rest of us in the dark) - Pre 9-11 picture, showing WTC towers & Statue of Liberty's Torch.

 

Torch

  

Partager12

  

baphomet

 

'Baphomet'

Baphomet, the name of the severed head the Knights Templar worshiped, translates into English from Latin as 'Temple of the Father of Peace of all Men' via the reverse anagram Green Language technique known as Anastrophe [David Ovason: Author 'The Notradamus Code' and 'The Secret Zodiac's of Washington DC']. This is what the Temple of the Caananites Capital City of Salem was known as before it was captured by the tribes of Abraham, who renamed it Jerusalem.

Peeling the Occult Onion further we apply the more sophisticated Masonic/Templar/Kabbalist cryptographic method known as the Atbash Cipher to Baphomet and arrive at it's innermost meaning and translation - SOPHIA [David Ovason: Author 'The Notradamus Code' and 'The Secret Zodiac's of Washington DC'].

Sophia is often illustrated with a beard due to her having gone through the Alchemical 'Blackening' Sex Magic Ritual known as the 'Great Work' which transformed her into an immortal, all powerful Hermaphrodite.

Sophia is Astoreth/Lilith/Mari the worship of whom was secretly re-introduced by King Soloman - who Freemasonry says was their first Grand Master - against the expressed wishes of God through Moses. Ashtoreth required human burnt offerings - preferably babies of prominent families - which was performed in the Valley of Hinnom/Gehenna/Hell at the base of Mount Zion/Sion.

  

lucifera

ANNONA --- The goddess of the wheat harvest, and the deity over-seeing the grain imports from Africa. Attributes: grain stalks, prow modius, cornucopia.

 

BRITANNIA --- The personification of the British Province. Antoninus Pius issued a set of bronze coins in Rome to be circulated in Britian.

 

CERES --- The Hellenistic goddess of grain (Demeter). Depicted on bronze/brass coins to suggest a plentiful food supply to the masses. Attributes: holds grain, torch, and veiled head

 

CYBELE --- The mother of the gods, Mother earth. Also known as Magna Mater (the Great Mother). Attributes: turreted and veiled head, lions; often riding a lion-drawn cart. Titles: MAGNA MATER, MATER DEI

 

DIANA, DIANA LVCIFERA --- The Hellenistic goddess of the hunt and the moon goddess (Artemis); also the patroness of children. Attributes: crescent moon, torch, bow and arrow, hunting dog, stag. Titles: LUCIFERA (light-bringer), CONSERVATRIX, VICTRIX.

 

ISIS --- An Egyptian goddess of the underworld and the wife of Osiris, who represented the birth and death of one year. Attributes: rattle (sistrum), bucket.

 

IVNO, IVNONIS --- Juno (Hera), the consort of Jupiter, and the patroness of child birth. Attributes: peacock, scepter, patera. Titles: CONSERVATRIX, LVCINA, REGINA

 

IVNO FELIX --- Happy Juno.

 

IVNO LVCINA --- Goddess of light.

 

IVNO REGINA --- Juno the Queen.

 

IVNONI MARTIALI --- The war like Juno.

 

LIBER --- The Hellenistic goddess of wine (Bacchus/Dionysios). Attributes: wine cup, thyrsos (a staff ornamented with grape leaves), crown of ivy leaves, panther.

 

LIBERALITAS --- The personification of generosity, and frequently, an indirect reference to a specific Imperial donative to the urban population. Attributes: tessera, cornucopia.

 

LIBERTAS --- The personification of liberty. Often used by usurpers claiming to restore the liberty of the Roman Republic. Attributes: pileus (pointed hat), scepter.

 

LVNA --- An alternative manifestation of the moon goddess, as used by Julia Domna and Gallienus; more appropriately a personification of the moon.

 

MATER MAGNA --- see CYBELE

 

PAX --- The personification of peace. Attributes: olive branch, scepter, cornucopia, caduceus.

 

SALVS --- The goddess of health and safety. On the basis from an old Italic custom of pleasing the gods by sacrificing a virgin to the sacred snakes. Salus usually appears on a coin after suppression of a coup against the emperor, or when an emperor recovers from an illness. Attributes: sacrificing to snake from patera. The snake is usually rising from the altar or being held in arms.

 

SEGENTIA --- The Roman goddess of the ripening of wheat, or crops.

 

VENVS, VENERIS ---The Hellenistic goddess of love and beauty (Aphrodite). She was the patron goddess of Julius Caesar and then the Julian line (Venus Genetrix). (VENERIS is the genative form) Attributes: apple, small figure of Victory. Titles: CAELESTIS (of the skies), FELIX, GENETRIX, VICTRIX.

 

VICTORIA --- The Hellenistic goddess of Victory (Nike). Frequently appears as an attribute to other deities, such as Roma, Jupiter and Venus. Attributes: wreath, wings.

 

VVLCAN --- The Hellenistic goddess of iron, fire and wepons (Hephaistos). Attributes: hammer, tongs, anvil.

  

GLORIA NOVI SAECVLI --- The glory of the new age.

  

The Virgin is consicrated to Isis, just as Leo is consecrated to her husband Osiris... The sphinx, composed of a Lion and a Virgin, was used as a symbol to designate the overflowing Nile... they put a wheat-ear in the hand of a virgin, to express the idea of the months, perhaps because the sign of Virgin was called by the Orientals, Sounbouleh or Schibbolet, that is to say, epi or wheat ear.

 

Brother Joseph Jerome de Lalande

Founder Lodge Des Neuf Soers (Nine Sisters), Paris

Astronomie par M. de la Lande, 1731

  

Gimel, the 13th Path

 

The High Priestess

The 13th Path

Gimel

G

  

"Lucifer represents.. Life.. Thought.. Progress.. Civilization.. Liberty.. Independence.. Lucifer is the Logos.. the Serpent, the Savior." pages 171, 225, 255 (Volume II)

"It is Satan who is the God of our planet and the only God." pages 215, 216, 220, 245, 255, 533, (VI)

"The Celestial Virgin which thus becomes the Mother of Gods and Devils at one and the same time; for she is the ever-loving beneficent Deity...but in antiquity and reality Lucifer or Luciferius is the name. Lucifer is divine and terrestial Light, 'the Holy Ghost' and 'Satan' at one and the same time." page 539

Helena Petrovna Blavatsky 32°

The Secret Doctrine

  

virgo

'The Sign of Virgo'

  

The Weeping Virgin

 

'Virgo, the Weeping Virgin'

  

Masonry still retains among its emblems one of a woman weeping over a broken column, holding in her hand a branch of acacia, myrtle, or tamarisk, while Time, we are told, stands behind her combing out the ringlets of her hair. We need not repeat the vapid and trivial explanation... given, of this representation of Isis, weeping at Byblos, over the column torn from the palace of the King, that contained the body of Osiris, while Horus, the God of Time, pours ambrosia on her hair.

 

Illustrious Albert Pike 33°

Morals and Dogma, page 379

  

Sub Rosa

 

Under the Rose...

  

Gimel, the 13th Path

  

The Illuminatrix

 

'Isis'

'Mari'

'Kali'

'Ceres'

'Virgo'

'Lilith'

'Diana'

'Venus'

'Sophia'

'Ishtar'

'Hathor'

'Ostara'

'Lucifera'

'Astoreth'

'Angerona'

'Semiramis'

'Baphomet'

'Head 58m'

'The Widow'

'CAPUT LVIIIm'

'The Black Virgin'

'The Scarlet Woman'

'The Weeping Virgin'

'The Celestial Virgin'

'The Green Man's Bride'

'The Underworld Queen'

'Mystery Babylon' her name...

  

Lucifera

 

>

And upon her forehead was a name written, MYSTERY, BABYLON THE GREAT, THE MOTHER OF HARLOTS AND ABOMINATIONS OF THE EARTH...

  

Bartholdi was deeply steeped in ritual "Egyptians" and often said he designed the original statue as an effigy of the goddess Isis.The lighting of a torch with a religious intention is analogous to a prayer and always determines an energy outpouring from above.

www.freemasonrywatch.org/statue_of_liberty.html

monica trenkler . . . . . . . . . . . . . . . . . . . . . . .

handmade collage on cardboard

50 x 35 cm

banabila.bandcamp.com/album/more-research-from-the-same-dept

 

Include Me Out blog:

Here is Michel Banabila's future music. Yes, we know The Future is now, but he calls tracks A Giant Cyborg And Tiny Insect Drones, Cricket Robotics and Alien World, so he is thinking way ahead, as far as I know. Unless he's developed such things in his research department and been far Out There. This is what they sound like, anyway. Here is the crackle and blip of things to come. No dramatic drones of whooshing spaceships or colliding planets here. Instead, subtle tones and clicks, with occasional heavy buzzing and the drama of an intense but temporary jolt to the system. Cryptography is particularly effective, summing up the method and means by which Banabila sends his messages, like coded alien language.

 

Inactuelles Blog:

Michel Banabila, sculpteur de l'imperceptible sonore.

Musicien, artiste sonore, friand de collaborations diverses qui mélangent disciplines et styles, auteur de musiques pour des films, documentaires, chorégraphies, le néerlandais Michel Banabila a participé à plus de trente albums. Je l'ai connu grâce à son travail sur Travelog avec Machinefabriek, pseudonyme de Rutger Zuydervelt, autre musicien important de la scène électronique néerlandaise. Avec More research from the same dept., il rompt clairement avec une approche musicale encore traditionnelle, où mélodies et rythmes renvoient à une expressivité plus ou moins sentimentale.

Huit titres sans pratiquement aucun instrument, tout au plus de brefs passages de piano ou clavier sur "Tesla's lab" ou "Sunbeams", respectivement titres six et sept. Pour le reste, huit titres résolument électroniques, bruitistes : sons de réfrigérateurs, de tubes luminescents, d'objets trouvés, enregistrements divers, et, bien sûr, échantillonneur, modulateur, synthétiseurs et autres logiciels de traitement du son. On pourrait s'attendre à une musique glaciale, désincarnée. Il n'en est rien. Comme d'autres partisans de la musique électronique, expérimentale, je pense par exemple à Morton Subotnick, ou encore à Mathias Delplanque, Pierre-Yves Macé en France, il parvient à rendre passionnante son odyssée vers l'intérieur des sons du quotidien, à peine écoutés, qui peuplent notre univers. Mais ici, tout s'écoute à fort volume, c'est conseillé pour s'immerger dans ce monde étrange.

"Cricket robotics" donne le ton : des sons amplifiés, fortement stratifiés par des coupures multiples, des sons qui tourbillonnent, surgissent en grésillant, des silences, un peu comme si l'on écoutait une bande d'ondes courtes, mais tout cela orienté par la captation d'une montée inexorable de sons qui oscillent à grande vitesse, sombrent dans une sorte de trou noir démultipliant les graves, tout cela sous-tendu par des sons courbes de drones qui s'agitent sous la surface. Étonnant, et vivant ! Le titre éponyme sonne très industriel : signaux de machines qui s'entrechoquent, se mélangent..."The Magnifying Transmitter" amplifie des bruits lumineux ( si j'ose dire !), nous plaçant au cœur des émissions sonores, dans la matrice trouble des bruits plus complexes qu'on ne le pense, le tout animé par des ponctuations sourdes paradoxalement beaucoup plus fines que bien des battements techno. À nouveau, comme le premier titre "Cricket robotics" le titre suivant, "A giant cyborg and tiny insect drones" renvoie aux insectes. Ce n'est pas un hasard. Ces micro buits amplifiés nous plongent dans le monde de l'imperceptible, du minuscule, celui des vibrations élémentaires, des frictions d'ailes multiples, des montées et baisses de tension. Quelque chose se tord, s'agite entre les fréquences, une musique ténue, têtue, désireuse de venir au jour. Morceau énigmatique et superbe !

Tout le reste s'écoutera d'autant mieux que vous aurez supporté ces prolégomènes intransigeants. "Alien world" est une merveille de dentelle électronique, jouant du contraste entre fond dense de drones et sons cristallins, fins et transparents, comme irisés par une lumière rasante, avant une fin marquée par des sons percussifs graves, sourds, tandis que des poussières sonores forment un gravier mœlleux. "Tesla's lab" nous plonge dans la tourmente élémentaire des drones : on voit les planètes s'éloigner les unes des autres, les particules s'agiter dans le vide intersidéral. Car ce monde infime, c'est le même que celui des espaces cosmiques, d'une certaine manière, même si Michel Banabila s'en défend dans la présentation de sa musique, ce sont les rayonnements mutiples des astres, des corps, des particules, essentiellement comparables, l'infiniment petit consonant avec l'infiniment grand. Un piano s'invite dans ce laboratoire extraordinaire, pose des notes parcimonieuses, curieusement décalées, étrangères, dans une lumière pulsante de forces antagonistes et solidaires. Écoutez au casque, vous y serez !! "Sunbeams" rejoint les visions éthérées d'un Chas Smith, réjouira les amateurs de musique électronique ambiante : pièce plus onctueuse en raison des claviers en nappes radieuses, mais cependant également parcourue par la folie douce des mouvements de particules. Au total, une pièce enivrante, une pièce de transe lente, une des plus rythmées, envahie sur la fin par des traversées sonores crépitantes. "Cryptography" parachève cette belle trajectoire : palpitations, petits marteaux piqueurs, interrruptions, court circuits sonores, déflagrations, disent la vie secrète et merveilleuse des choses. Lumière de l'obscur, beauté des chocs et des convergences, Michel Banabila conduit un fascinant orchestre subliminal.

Un grand disque de musique électronique, expérimentale, pour les amateurs d'autres paysages sonores. (Dionys)

More art on my weblog: uair01.blogspot.com/

 

= = = = =

 

SEVEN SECRET ALPHABETS

Anthony Earnshaw

 

A very remarkable book. The replacement of a conventional capital letter at the beginning of a chapter by some kind of visual pun is as old as the illuminated book, but Earnshaw has succeeded in divorcing it from its customary aesthetic role, stripped it of any scene-setting function. His letters, comic or sinister, exist in their own right. Each image hides its secret until it finds its place. Even then it may prove evasive. The alphabets suggest an alternative reality where humour and disaster are interchangeable and the laws which govern nature are bent certainly, but only very little. An imagination in no way forced selects an apparently arbitrary image at a precise moment . . . Letters, those haphazardly invented signs, those abstract shapes we hear as sounds, take on a concrete meaning of their own.

Guardian

 

It is fair to say th at the author explores a landscape which suggests Magritte and Monty Python. The humour is austere, bleak and if not black, at least charcoal grey. As a feat of imagination the work is outstanding.

The Times Educational Supplement

 

Earnshaw has a devious, allusive, surrealist interest in letters. His imagination is full of wit; each image is a humorous vignette, an unlikely collusion of images in the form of a letter. Such shifting of context is the source of all humour. By providing a main-line to the unconscious and suggesting a revaluation of the essential symbols of which language is constituted, he makes his work compulsive and compulsory viewing.

Arts Review

 

JONATHAN CAPE

THIRTY BEDFORD SQUARE LONDON

 

by Eric Thacker and Anthony Earnshaw

MUSRUM

WINTERSOL

Corrigendum

THE ISBN FOR THE PAPERBACK EDITION OF

SEVEN SECRET ALPHABETS

BY ANTHONY EARNSHAW

SHOULD READ ISBN 022401383 I

FIRST PUBLISHED 1972

© 1972 BY ANTHONY EARNSHAW

JONATHAN CAPE LTD, 30 BEDFORD SQUARE, LONDON, WCI

ISBN 022400795 5

PRINTED AND BOUND IN GREAT BRITAIN BY

W & J MACKAY LIMITED, CHATHAM

Detail from the Enigma machine on display at the International Spy Museum

A roll of the dice, a cryptographic key, the images on my photostream; if they appear random it is because we do not, will not, or can not understand the underlying explanation.

---

Created for Utata IP92 consisting of:

1 - a key

2 - a thing meant to be thrown

3 - close up

 

12 September 2020

 

Souvenir coffee mug from 1993 CRYPTO IACR cryptography research conference, shown with the KSD-64A "Crypto Ignition Key" that it depicts.

 

The KSD-64A Crypto Ignition Key ("CIK") is a 64K bit EEPROM chip packed in a physical key form factor with electrical contacts along each edge. It has no internal CPU or secure storage itself; it is simply a memory storage device. It was used, among other applications, to store key material for and enable calls with the NSA-designed "STU-III" secure encrypted telephone used by US Government agencies for classified voice calls. It was sometimes called the "Fisher-Price key" for its resemblance to an oversized pre-school toy key on the market at the time. It was introduced in the mid 1980's, and only discontinued in 2014.

 

Rodenstock 120mm/5.6 APO Macro Sironar lens (@f/8). Phase One IQ4-150 digital back (@ ISO 50), Cambo Ultima D monorail camera modified with servo-controlled focus. Focus stacked composite of 68 images.

 

My first attempt at a 'connected reading list'. I like to read factual books and often find myself jumping from one subject area to the next either through direct quotation, a reference or bibliography entry, a reviewer's comment or simply from a Google search. If you hover your mouse pointer over the photo I've added notes which are links to each title on Amazon.co.uk

 

Working up the stack we start with

- Joe McNally's The Moment It Clicks; Photography secrets from one of the world's top shooters. He takes an interesting approach and it reads somewhere between a heavily illustrated autobiography and a how-to manual and that, somehow, is a perfect combination! (I found this and the next two from Thom Hogan's excellent Nikon centric website)

 

- Light Science and Magic. So you like taking photographs? This is the book that explains all about why light itself acts the way it does.

 

- Out of the Blue, So you like taking photographs or you just enjoy being outside! Read this great book to get an understanding on the weather and its visual phenomenon.

 

- A Short History of Nearly Everything by Bill Bryson. The title says it all - A huge undertaking that Bryson pulls off with aplomb. Get some sense of scale. This should be required reading for everybody!

 

- Visual Explanations: Images and Quantities, Evidence and Narrative is my favourite book on displaying information by Tufte.

 

- Universal Principles of Design is a collection of 125 design concepts draw from a wide range of disciplines from graphic design to architecture to user-interface design.

 

- Security Engineering by Ross Anderson is THE book on the subject. Most engineers in any field spend their time trying to get things to work well, Security Engineers need to spend their time thinking about how to break things. This book looks at everything from Cash Machines to Nuclear Command and Control, Door Locks to Cryptography and reminds you that you are only as secure as the weakest link.

 

- A Pattern Language by Christopher Alexander. Despite appearances this actually has more pages than Anderson's Security tome. The title refers to a structured method of describing good design practices within Architecture, however it has been applied to numerous other fields since. If our modern era planning control adopted more of these 'patterns' we would live in far more pleasant built environs.

 

- Patterns of Home is a distillation of the domestic scale patterns suggested by Alexander et al in Pattern Language by two of the original collaborators, Silverstein and Jacobson, based on their experiences of applying them to houses over years of architectural practice.

 

- The Housebuilder's Bible by Mark Brinkley is how to Self-Build you own house in the UK.

 

- Designing a house to build inevitable brings you around to considering energy usage and supply. Sustainable Energy Without The Hot Air looks at this challenge on an individual household, national and global level, considering energy use and how to reduce it and energy supply options.

 

- A Place of My Own is the story of one man's desire to build his own space, in this case a writing studio. A fascinating narrative.

 

- Rich Dad, Poor Dad. At first and probably second glance the odd one out in this stack. It is over simplistic, over familiar, over American and a lot of what it details is common sense or should be. However the more financial titles I read the more I find myself coming back to it and re-reading it with modified perspectives.

 

- The Long and The Short of It: A Guide to Finance and Investment for Normally Intelligent People Who Aren't in the Industry is a perfect antidote to the financial services industry and mainstream press personal finance output. The book to read if you don't trust the banking and investment industry and suspect you could probably do a better job yourself. It suggests you probably can and tells you how.

Bletchley Park és un dels llocs més fascinants de la historia del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informatica i els ordinadors.

 

Vista d'una maquina Enigma model M3 de 3 rotors, emprada per l'exèrcit alemany. Posteriorment la Kriegsmarine la complicaria amb un quart rotor (model M4).

 

ca.wikipedia.org/wiki/M%c3%a0quina_Enigma

 

Aqui a sota teniu un video, en anglès sobre el seu funcionament:

 

www.youtube.com/watch?v=JJm4-lqRJDc

 

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

The Enigma M3 is the famous german cypher machine, with 3 rotors (later a 4 rotor, M4 model, was produced for the Kriegsmarine). Although it produced literally millions of millions of possible combinations, the codebreakers cracked it, with their brains, the Bombe machine, and a lof of hard work.

 

Here you have more information about Enigma, and a wonderful emulator program:

 

www.youtube.com/watch?v=JJm4-lqRJDc

 

en.wikipedia.org/wiki/Enigma_machine

 

The emulator (all the site is wonderful):

users.telenet.be/d.rijmenants/en/enigmasim.htm

 

en.wikipedia.org/wiki/Bombe

 

www.jharper.demon.co.uk/bombe1.htm

 

en.wikipedia.org/wiki/Bletchley_Park

 

www.bletchleypark.org/

 

www.bletchleypark.org/content/museum.rhtm

 

For an impresive virtual visit, take a look to these videos:

 

www.youtube.com/watch?v=ZmMFp2FQPsY

From Russia with love.

 

From Russia with Love is a 1963 spy film and the second in the James Bond series produced by Eon Productions, as well as Sean Connery's second role as MI6 agent James Bond. It was directed by Terence Young, produced by Albert R. Broccoli and Harry Saltzman, and written by Richard Maibaum and Johanna Harwood, based on Ian Fleming's similarly named 1957 novel. In the film, Bond is sent to assist in the defection of Soviet consulate clerk Tatiana Romanova in Turkey, where SPECTRE plans to avenge Bond's killing of Dr. No.

 

Following the success of Dr. No, United Artists greenlit a sequel and doubled the budget available for the producers. In addition to filming on location in Turkey, the action scenes were shot at Pinewood Studios, Buckinghamshire, and in Scotland. Production ran over budget and schedule, and was rushed to finish by its scheduled October 1963 release date.

 

From Russia with Love was a critical and commercial success. It took in more than $78 million in worldwide box-office receipts, far more than its $2 million budget and more than its predecessor Dr. No, thereby becoming a blockbuster in 1960s cinema.

 

This film also marked the debut of Desmond Llewelyn as Q, a role he would play for 36 years (and seventeen films) until The World Is Not Enough in 1999

 

Plot

Seeking revenge against MI6 Agent 007 James Bond for the death of their agent Dr. No in Jamaica,[N 1] international criminal organisation SPECTRE begins training agents to kill him. Irish assassin Donald "Red" Grant proves himself by quickly killing a Bond impostor with a garrote concealed in his wristwatch.

 

SPECTRE's chief planner, Czech chess grandmaster Kronsteen (Number 5), devises a plan to play British and Soviet intelligence against each other to procure a Lektor cryptography device from the Soviets and lure Bond to his assassination. SPECTRE's chief executive (Number 1) puts Rosa Klebb (Number 3), a former SMERSH (Soviet counter-intelligence) colonel, in charge of the mission. Klebb chooses Grant to protect Bond until he acquires the Lektor, then eliminate 007 and steal the machine for SPECTRE (to be eventually sold back to its legitimate owner). Klebb also recruits Tatiana Romanova, a cipher clerk at the Soviet consulate in Istanbul, who believes Klebb is still working for SMERSH.

 

In London, M informs Bond that Romanova has contacted "Station T" in Turkey, offering to defect with a top-secret Lektor on the condition that Bond handle her case personally. M decides the chance of obtaining a Lektor is worth the risk, and Q gives Bond an attaché case with concealed throwing knife, gold sovereigns, a tear gas booby trap, and an ArmaLite AR-7 sniper rifle.

 

In Istanbul, Bond meets station head Ali Kerim Bey, tailed by Bulgarian agents working for Russia, who are, in turn, tailed by Grant; he kills one agent and dumps their car outside the Soviet Consulate. The Soviets bomb Kerim's office with a limpet mine, but he is away from his desk with his mistress. He and Bond spy on a Soviet consulate meeting through a periscope in the aqueducts beneath Istanbul, and learn that Soviet agent Krilencu is responsible for the bombing. Kerim and Bond lay low at a rural gypsy settlement, where Krilencu attacks them with a band of Bulgarians; Bond is saved by a sniper shot from Grant. Bond and Kerim track down Krilencu, and Kerim kills him with Bond's rifle.

 

Bond finds Romanova in his hotel suite and they have sex, neither aware SPECTRE is filming them. Romanova brings the consulate floor plans to the Hagia Sophia, and Grant kills the other Bulgarian to ensure Bond receives them. Using the plans, Bond and Kerim steal the Lektor and escape with Romanova aboard the Orient Express. Kerim and Bond subdue a Soviet security officer named Benz tailing them. Grant kills Kerim and Benz, preventing Bond from rendezvousing with one of Kerim's men.

 

At the Belgrade station, Bond passes word of Kerim Bey's death to his son, and asks for an agent from Station Y to meet him at Zagreb. Grant kills Nash, sent from Station Y, and poses as the agent. After drugging Romanova at dinner, Grant overpowers Bond, taunting him that Romanova believed she was working for Mother Russia, and reveals his plan to leave the compromising film of Bond and Romanova with a blackmail letter, staging their deaths as a murder-suicide to scandalise the British intelligence community. Bond tricks Grant into setting off the booby trap in his attaché case and stabs him with the concealed knife before strangling him with his own garrote, and flees with Romanova in Grant's getaway truck.

 

Number 1 confronts Klebb and Kronsteen for their failure. Kronsteen is executed by the henchman Morzeny’s poison-tipped switchblade in his shoe, while Klebb is given one last chance to acquire the Lektor, which they have arranged to sell back to the Russians.

 

Following Grant's escape route, Bond destroys a SPECTRE helicopter, and he and Romanova steal Grant's boat on the Dalmatian coast. Pursued by Morzeny's squadron of SPECTRE powerboats, Bond detonates his own powerboat's fuel drums with a flare gun, engulfing the pursuers in a sea of flames.

 

He and Romanova reach a hotel in Venice, where they are attacked by Klebb, disguised as a maid. She tries to kick Bond with a poisoned switchblade shoe, but Romanova shoots her. Their mission accomplished, Bond and Romanova depart on a romantic boat ride, and Bond throws Grant's blackmail film into the canal.

  

Michele Reilly is a scientist, an artist, and a systems thinker whose work resists easy classification. She trained in architecture and art at Cooper Union, where she began building intelligent machines and quickly became fascinated by the logic behind them. That curiosity drew her into mathematics, cryptography, macroeconomics, and eventually quantum physics. Her path has been shaped less by credentials than by the depth of her questions.

 

At MIT, where she teaches in the Department of Mechanical Engineering, Michele works at the intersection of computation and the structure of spacetime. She explores how information flows through the universe, drawing from Claude Shannon’s foundational theories and extending them into the quantum realm. Her research is ambitious, but it is rooted in careful thinking. She is not interested in speculation for its own sake. She wants to know what can be built, what can be measured, and what will last.

 

In 2016, she co-founded Turing, a quantum technology startup focused on building portable quantum memories and tools for long-distance quantum communication. She works closely with physicist Seth Lloyd on designing the scalable, robust systems needed to move quantum computing from theory into practice. The work is intricate and deliberate, building slowly toward a future that she sees as both beautiful and unfamiliar.

 

Michele is also a storyteller. Her science fiction series Steeplechase has received awards at Cannes and other international festivals. It reflects her belief that narrative and science are not separate pursuits, but parallel ways of exploring the unknown. In her teaching, she brings these strands together, guiding students through exercises that combine quantum theory, creative writing, and world-building. One of her courses, supported by MIT’s Center for Art, Science and Technology, invites students to imagine speculative futures grounded in scientific inquiry.

 

On her arm is a tattoo of Alan Turing. It is not ornamental. It is a quiet tribute to a thinker whose life and work continue to shape her own. Turing’s dedication to truth, structure, and the ethical weight of technology is a constant presence in her thinking. She carries it with her, quite literally.

 

The portrait above was made at The Interval at the Long Now Foundation in San Francisco. Michele is seated beside a polished table that reflects her image. Behind her stands the Orrery, a planetary model designed to keep time for ten thousand years. The setting reflects the spirit of her work. She is grounded in the present but always thinking forward, asking how we might live in ways that honor complexity, care, and continuity. She does not speak often about legacy. She speaks about attention, about precision, and about the discipline of staying with difficult questions until they begin to yield something real.

U-505, a German submarine captured at sea by the US Navy during World War II. U-505 is one of very few German U-boats on public display, and the only one in the United States.

 

Holes remain in the superstructure from combat. The crew was abandoning the disabled submarine when a US Navy boarding party prevented it from being scuttled. Significant cryptographic equipment and information was recovered from the submarine.

 

U-505 Exhibit:

www.msichicago.org/whats-here/exhibits/u-505/

 

Museum of Science and Industry, Chicago:

www.msichicago.org

The facade of the Chanel building in Ginza is quite spectacular. Seen here with white characters in a cryptographic shuffle against a sleek black background.

 

I wish I could play breakout on it.

The SG-41 was a replacement for the Enigma, developed in 1944 and never broken by the codebreakers. Bletchley Park, August 2019.

Michele Reilly is a scientist, an artist, and a systems thinker whose work resists easy classification. She trained in architecture and art at Cooper Union, where she began building intelligent machines and quickly became fascinated by the logic behind them. That curiosity drew her into mathematics, cryptography, macroeconomics, and eventually quantum physics. Her path has been shaped less by credentials than by the depth of her questions.

 

At MIT, where she teaches in the Department of Mechanical Engineering, Michele works at the intersection of computation and the structure of spacetime. She explores how information flows through the universe, drawing from Claude Shannon’s foundational theories and extending them into the quantum realm. Her research is ambitious, but it is rooted in careful thinking. She is not interested in speculation for its own sake. She wants to know what can be built, what can be measured, and what will last.

 

In 2016, she co-founded Turing, a quantum technology startup focused on building portable quantum memories and tools for long-distance quantum communication. She works closely with physicist Seth Lloyd on designing the scalable, robust systems needed to move quantum computing from theory into practice. The work is intricate and deliberate, building slowly toward a future that she sees as both beautiful and unfamiliar.

 

Michele is also a storyteller. Her science fiction series Steeplechase has received awards at Cannes and other international festivals. It reflects her belief that narrative and science are not separate pursuits, but parallel ways of exploring the unknown. In her teaching, she brings these strands together, guiding students through exercises that combine quantum theory, creative writing, and world-building. One of her courses, supported by MIT’s Center for Art, Science and Technology, invites students to imagine speculative futures grounded in scientific inquiry.

 

On her arm is a tattoo of Alan Turing. It is not ornamental. It is a quiet tribute to a thinker whose life and work continue to shape her own. Turing’s dedication to truth, structure, and the ethical weight of technology is a constant presence in her thinking. She carries it with her, quite literally.

 

The portrait above was made at The Interval at the Long Now Foundation in San Francisco. Michele is seated beside a polished table that reflects her image. Behind her stands the Orrery, a planetary model designed to keep time for ten thousand years. The setting reflects the spirit of her work. She is grounded in the present but always thinking forward, asking how we might live in ways that honor complexity, care, and continuity. She does not speak often about legacy. She speaks about attention, about precision, and about the discipline of staying with difficult questions until they begin to yield something real.

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

Title:Zimmermann Telegram, 1917

 

From: Decimal File, 1910-1929, 862.20212/82A (1910-1929); General Records of the Department of State; Record Group 59; National Archives.

 

Production Date:January 19, 1917

 

This telegram, written by German Foreign Secretary Arthur Zimmermann and received by the German Ambassador to Mexico on January 19, 1917, is a coded message sent to Mexico, proposing a military alliance against the United States. The obvious threats to the United States contained in the telegram inflamed American public opinion against Germany and helped convince Congress to declare war against Germany in 1917.

 

Persistent URL: arcweb.archives.gov/arc/action/ExternalIdSearch?id=302025

 

Access Restrictions: Unrestricted

Use Restrictions: Unrestricted

Edgar Allan Poe (January 19, 1809 – October 7, 1849) was an American author, poet, editor and literary critic, considered part of the American Romantic Movement. Best known for his tales of mystery and the macabre, Poe was one of the earliest American practitioners of the short story and is considered the inventor of the detective fiction genre. He is further credited with contributing to the emerging genre of science fiction.

He was the first well-known American writer to try to earn a living through writing alone, resulting in a financially difficult life and career.

Poe and his works influenced literature in the United States and around the world, as well as in specialized fields, such as cosmology and cryptography. Poe and his work appear throughout popular culture in literature, music, films, and television.

-

This is a digitally colorized vintage photo painted by Max_theHitman.

   

The door to the former cryptography room.

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

The Mansion and Lake at Bletchley Park, home to code breakers & cryptographers whose efforts are reputed to have reduced the length of World War II by a couple of years and thus saved many thousands, if not millions, of lives.

The site has been restored to show the huts and buildings, including the Mansion (which is fabulous in its own right) where hundreds of people, predominantly women, worked to break the German Enigma & Lorenz machines. Modern day computing was, effectively, invented here via the equipment developed to assist the massive code-breaking task.

 

Die Kriegsmarine (Navy)

 

With a naval force small in numbers, but technically advanced, the German Naval High Command, in order to offset Allied Naval superiority, adopted a strategy designed to conceal as much as possible the location, intention and movement of its forces.

 

Forced by its nature to rely on radio communications, the German Navy issued to each vessel from battleship to harbor defense craft an ENIGMA cipher machine to ensure security. Here, as with other services, the dependence on ENIGMA for communications security proved to be disastrous.

 

Source National Cryptologic Museum

 

ENIGMA remains the best known German cryptographic machine of World War II.

 

From Wikipedia - A four-rotor Enigma was introduced by the Navy for U-boat traffic on 1 February 1942, called M4 (the network was known as "Triton", or "Shark" to the Allies). The extra rotor was fitted in the same space by splitting the reflector into a combination of a thin reflector and a thin fourth rotor.

 

ENIGMA cipher machine collection

 

i09_0214 094

Window Rock, Navajo Nation

Postcard from batch sent all the way from Texas by Angelica .

Can anybody decipher the code?

In World War II codebreakers worked in this Block translating and analysing ciphers. The work was stressful because the safety of ships bringing vital supplies to Britain depended on decrypting messages quickly. Knowledge of enemy plans enabled the British Admiralty to protect the convoys of ships crossing the Atlantic.

 

Block A, with Block B, was conceived in mid 1941 as an extension to the overcrowded wooden huts and first occupied in August 1942. They formed the first wave of purpose-built structures on the site, responding to the increased volume of decrypts and the desire to create an effective military intelligence centre. Initially it housed the both the Naval and the Air Sections. The former, on the ground floor, took on functions previously carried on in Hut 4. These included intelligence analysis of naval traffic decrypted by Hut 8, non-Enigma cryptography, crib research, and plotting. In addition, Hagelin cipher machines were installed. After analysis material was sent to the Admiralty. The Air Section, on the first floor, included the Meteorological Section (which, for instance, supplied weather forecasts which would help Coastal Command and predict the movements of U-boats and shipping), and SALU (a sub-section mainly concerned with intelligence on German bomber and reconnaissance aircraft). In mid 1943 the Air Section moved to Block F, enabling the Naval Section to take over all of Blocks A and B.

 

After the war the building - which was considerably adapted for its future uses - accommodated various bodies, notably (early 1950s-late 1970s) a teacher training college and from 1977 the Civil Aviation Authority. The latter left the site in 1993, since when the building has been the responsibility of the Bletchley Park Trust, and stood largely unoccupied for ten years. In 2004 the building was partly stripped out by the Trust to create a new exhibition space.

 

Like Block B, which is already listed, Block A's importance is principally historical, although the physical survival of the building which reflects the scale of the operation at Bletchley is important. The blocks are among the buildings which demonstrate the first instances on the site of the construction of more permanent buildings, ones moreover specifically designed for the personnel and functions which they were to house. They stand markedly in contrast to the small and temporary wooden huts they succeeded. Not only does Block A have a significant relationship to Block B, but also to the lake and landscape and to all the other wartime buildings, several of which it had close operational links with. Bletchley Park is renowned for its part in breaking the German Enigma code, and in contributing to the Allied victory (especially in the Battle of the Atlantic). Block A played an important part in this achievement from 1941 onwards. Architecturally, like Block A, Block B survives externally little altered, and its crisp and functional appearance reflects Bletchley Park's increasing scale and reliance on a large staff and complex electronic machinery. Internally much of the building retains the main components of its wartime layout, although sections of the building have been gutted. This recommendation is informed by considerable English Heritage research, cited below.

 

Bletchley Park was the central site for British (and subsequently, Allied) codebreakers during World War II. It housed the Government Code and Cypher School (GC&CS), which regularly penetrated the secret communications of the Axis Powers – most importantly the German Enigma and Lorenz ciphers. According to the official historian of British Intelligence, the "Ultra" intelligence produced at Bletchley shortened the war by two to four years, and that without it the outcome of the war would have been uncertain.

 

Located in Milton Keynes, Buckinghamshire, Bletchley Park is open to the public, and receives hundreds of thousands of visitors annually.

 

historicengland.org.uk/listing/the-list/list-entry/1391792

 

en.wikipedia.org/wiki/Bletchley_Park

According to the Web site www.navajocodetalkers.org, more than 400 Navajo warriors were trained to use the Navajo language to pass messages via radio during World War II.

 

It is the only unbroken code in modern military history. It baffled the Japanese forces of WWII. It was even indecipherable to a Navajo soldier taken prisoner and tortured on Bataan. In fact, during test evaluations, Marine cryptologists said they couldn't even transcribe the language, much less decode it.

 

The secret code created by the Navajo Code Talkers was a surprisingly simple marvel of cryptographic innovation. It contained native terms that were associated with specialized or commonly used military language, as well as native terms that represented the letters in the alphabet.

1 2 3 5 7 ••• 79 80