View allAll Photos Tagged cryptography

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

The Lammasu or Lumasi represent the zodiacs, parent-stars, or constellations.They are depicted as protective deities because they encompass all life within them. In the Sumerian Epic of Gilgamesh they are depicted as physical deities as well, which is where the Lammasu iconography originates, these deities could be microcosms of their microcosmic zodiac, parent-star, or constellation. Although "lamassu" had a different iconography and portrayal in Sumerian culture, the terms lamassu, alad, and shedu evolved throughout the Assyro-Akkadian culture from the Sumerian culture to denote the Assyrian-winged-man-bull symbol and statues during the Neo-Assyrian empire. Female lamassus were called "apsasû".The motif of the Assyrian-winged-man-bull called Aladlammu and Lamassu interchangeably is not the lamassu or alad of Sumerian origin which were depicted with different iconography.[clarification needed] These monumental statues were called aladlammû or lamassu which meant "protective spirit".[3][clarification needed] In Hittite the Sumerian form dLAMMA is used both a name for the so-called "Tutelary deity" identified in certain later texts with Inara and a title given to various other tutelary or similar protective gods.In the Enûma Eliš they are both symbolized as the zodiacs, parent-stars, or constellations and as physical deities as well as was in the Epic of Gilgamesh.

China is a likely winner of the information age supply chain through ecommerce

 

Peace and Ecommerce, A Global Systems View

 

Attending a required Masters class “Policy, Law, and Ethics in Information Management” it was only ethical to admit that I worked three months drafting and publishing policy documents for Microsoft, which was now our current class assignment, to research Web based privacy policies and other related documents such as terms of use, conditions of use, code of conduct and learn more about them, with a diary of examples in the wild, and related materials.

 

The educational idea is that we would then be able to contribute meaningfully to creating policy statements and understand their underlying implications to end users and companies. But I had already done this work professionally, so it would be of questionable value for me to do the coursework on the same topic as if I had never done it before.

 

The instructor of the class, Glenn Von Tersch assigned me to present information on freedom of speech, a topic I fell in love with, and wanted to research more. But for my final research, I needed something else.

 

One of my favorite things to discuss in job interviews, or with anyone in earshot, is that I believe that the networked spread of ecommerce over the Web, filtering into even the poorest nations will aid in understanding through communication; that ecommerce leads to peace. In effect I believed that ecommerce contributes in a direct way to peace because it provides the fuel to grow and maintain the Internet. Also it seemed obvious that people and countries that are invested in and perform transactions with each other are less likely to go war against their own interests. Von Tersch said, “These topics you are interested in have more research value than freedom of speech, because 1st amendment rights have been heavily legislated, written about, and researched.” He mentioned something called “The McDonald’s Effect”, how having a McDonald’s outlet or franchise appears to contribute to peace between countries. So peace and ecommerce became my topic.

 

What I did not expect to discover is in human society war is considered the norm and peace the exception. I did not expect to learn about how ugly the 3rd world poverty creating monster of WTO became according to one economist, even though I live in Seattle where the initial protests were. I was surprised to know how Reganomics theory hangs on, like an old B-grade movie on late night TV, because someone somewhere in the supply chain makes money. I did not expect to find that privacy and intellectual rights are so tightly interwoven, or how they relate to conflict, security, potential world dominance and growth.

 

I had no way to guess that I would enjoy the study of economics – statistical, yes, nicely so, but dull no; as a global topic it is juicy-rotten, full of international spies, botched security, with rogue pirate computer chips, and unintended consequences.

 

Who can accurately predict how patterns of global economics relate to peace, privacy, property rights, policies and their outcome in the one breath away from today, the next 20-40 years? Who would think that China - the nation, McDonalds - the corporation, and Chicago crack dealers and their foot soldiers share so much in common when you view their information through these fascinating multi-dimensional facets?

 

One must be educated to search effectively for information. My knowledge about the nature of search is not just intellectual knowledge; this is conditionalized through my own experience of failure to produce relevant search results within massive library databases.

 

My education began with a simple query on the Web “peace + ecommerce” which returned from Google “Theses on the Balkan War,” by Mike Haynes, from the International Socialism Journal, “Capitalism is inherently a competitively expansionist and therefore conflict-ridden system” , effectively laying the blame for war on the US and Western capitalist nations and on anyone claiming to be fighting a war with good intentions. I read it, thinking I would not see this relate to my project – also surprising very similar material was presented in the global economic books I read later.

 

As mentioned the pursuit of ‘education justifies anything’, like looking at any results, so I also clicked on an article entitled “Dinosaur Extinction linked to change in Dinosaur Culture” I read it, and it made sense that something like author Daniel Quinn’s theory of “The Law of Limited Competition” is an operant factor in global markets today, with war being genocide, and countries struggling to win economically laying waste to the very place they live. A notable example is Beijing, the air pollution capital of the world struggling to host the Olympic Games this year. I stored that URL for future reference. The theory and the reality imply that in the race to catch up and compete in global economics, the Chinese are killing themselves off before they arrive at their desired goal.

 

Then I queried in several of the University of Washington interconnected and extensive library databases on the same thing “peace + ecommerce” and found in all of them, zero returns, “0 Results”. My teacher was surprised and advised me to extrapolate and offer conjecture on what was likely, if few sources were available. I notified a friend studying economics who emailed related articles. Very frustrated I tried related queries and turned up articles on the economies of war . How perverse, I thought. I contacted a librarian through the online tool and chatted with her, explaining my quest. She suggested I query on “economics and public policy”. “How is public policy related to peace and ecommerce?” I asked. “Try Conflict Resolution” she replied.

 

Thus the reason I couldn't find 'peace' is because the term used, in educated facet writers’ metadata which is designed to expose information to search, is 'conflict resolution' or ‘conflict prevention’. Oddly the social implication is that war is the norm. Maybe peace doesn’t exist anywhere. A reason I used 'ecommerce' instead of 'global economics' is due to consulting in that field for technology firms. Searching again returned few meaningful results -- the user interface was strange, very slow, and clunky. I longed for Google .

 

Then I remembered the “McDonald's Effect” our teacher mentioned, and quickly I located a reference on the Web, but it was deeply nested in a staggering number of oddly worded articles. I stopped without uncovering where the concept originated. The next night I searched again, and found the author Thomas Friedman and his related books. I briefly scanned all the related Wikipedia articles. I realized quickly that to become educated enough on my two topics, I had to some understanding of economics. This is because even to scrape by enough to search among the many interrelated topics one needs to know the central facet. Very esoteric topics require specialized language and deep knowledge of the subject.

 

More searches turned up substantial evidence that China lags behind other nations in ecommerce.

 

For years I worked in ecommerce designing interfaces (for Microsoft 2003 and Amazon 2007-2008), and working with supply chain software (as a director of an ecommerce company). But because I didn't realize that one could understand it better, and that it is not as dull as computer science and its requisite cash register receipts , I never tried.

 

The "McDonald's Effect" is named after "The Golden Arches Theory of Conflict Prevention" created by the author Thomas Friedman's slightly in cheek comments and his book, “The Lexus and the Olive Tree” (the update now titled "The Lexus and the Olive Tree: Understanding Globalization").

 

Those books led me to order Amazon ecommerce overnight book delivery, and I read, 'The World Is Flat?: A Critical Analysis of New York Times Bestseller by Thomas Friedman', 'Freakonomics: A Rogue Economist Explores the Hidden Side of Everything' , 'Making Globalization Work' which reports that there is hope in the world for peace. The Nobel Prize winning author helps the reader extrapolate based on significant knowledge of statistics and global economic analysis through his personal, professional, and academic connections.

 

Common Name Academic Name Book Title

 

McDonalds Effect Golden Arches Theory of Conflict Prevention,

 

aka democratic peace theory Lexus and the Olive Tree

 

Dell Theory The Dell Theory of Conflict Prevention The World is Flat, A Brief History of the Twenty-First Century

 

peace conflict prevention

 

ecommerce global economics

 

"In his book, The Lexus and the Olive Tree, Thomas L. Friedman proposed The Golden Arches Theory of Conflict Prevention, observing that no two countries with a McDonald's franchise had ever gone to war with one another, a version of the democratic peace theory."

 

"The Dell Theory stipulates: No two countries that are both part of a major global supply chain, like Dell's, will ever fight a war against each other as long as they are both part of the same global supply chain."

 

---------------------------------------------------------------------

 

Readings

 

The World Is Flat 3.0: A Brief History of the Twenty-first Century by Thomas Friedman

 

Larry Page, Google Co-Founder quoted by Thomas Friedman, p. 179, entire paragraph. “The more global Google’s user base becomes, the more powerful a flattener it becomes…”

 

From Friedman’s conversation with Google’s director of operations in China, Kai-Fu Lee, p. 181 entire paragraph ”In time individuals will have the power to find anything in the world at any time on all kinds of devices – and that will be enormously empowering.”

 

The Quiet Crisis, entire pages 368, 369, chapter on research in China, beating out American innovation in research. “The Chinese government gave Microsoft the right to grant post-docs.” “They work through their holidays because their dream is to get to Microsoft.”

 

“What are those?” She said the researchers get them from Microsoft every time they invent something that gets patented. How do you say Ferrari in Chinese.”

 

p. 370 “… whether we are going to implement or China is going to beat us to our own plan.” Council on Creativeness, regarding the Innovate America report, comment to Friedman by Deborah Wince-Smith.

 

Introduction p. X, Thomas Friedman, “Of course the world is not flat. But it isn’t round anymore either. I have been using the simple notion of flatness to describe how more people can plug, play, compete, connect, and collaborate with more equal power than ever before – which is what is happening in the world. … the essential impact of all the technological changes coming together in the world today. … My use of the word flat doesn’t mean equal (as in ‘equal incomes’) and never did. It means equalizing.”

 

The Lexus and the Olive Tree: Understanding Globalization by Thomas Friedman

 

Forward to the Anchor Edition, Thomas Friedman, “… my Golden Arches Theory – that no two countries that both have McDonald’s have ever fought a war again each other since they each got their McDonald’s.”

 

p. 7 “When I say that globalization has replaced the Cold War as the defining international system, what exactly do I mean?”

 

p. 8 “The cold war system was symbolized by a single word, the wall … “You can’t handle the truth,” Says Nickleson. “Son we live in a world that has walls…”

 

p. 8 “This Globalization system is also characterized by a single word: the Web. … we have gone from a system built around divisions and walls to a system built around integration and webs.”

 

p. 19 “What is information arbitrage? Arbitrage is a market terms. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

Chapter 3, p. 29. The Lexus and the Olive Tree

 

Photo: Jerusalem, December 29, 1998: Simon Biton places his cellular phone up to the Western Wall so a relative in France can say a prayer at the holy site. (Photo: Menahem Kahana, Agence France-Presse) [caused my spontaneous tears]

 

p. 47 “advertising jingle “Let us put a bank in your home” … office … newspaper … bookstore … brokerage firm … factory … investment firm … school in our homes.”

 

The World Is Flat?: A Critical Analysis of New York Times Bestseller by Thomas Friedman by Ronald Aronica and Mtetwa Ramdoo

 

Freakonomics [Revised and Expanded]: A Rogue Economist Explores the Hidden Side of Everything by Steven D. Levitt and Stephen J. Dubner

 

Chapter 5 “Why do Drug Dealers Still Live with Their Moms?” p. 89 “So how did the gang work? An awful lot like most American businesses, actually, though perhaps none more so than McDonald’s. In fact, if you were to hold a McDonald’s organizational chart and a Black Disciples org chart side by side, you could hardly tell the difference.”

 

p. 46 “There is a tale, “The ring of Gygnes,” … could any man resist the temptation of evil if he knew his acts could not be witnessed?”

 

p. 58 “Attendance at Klan meetings began to fall … of all the ideas Kennedy thought up to fight bigotry, this campaign was clearly the cleverest. … He turned the Klan’s secrecy against itself by making its private information public: he converted heretofore precious knowledge into ammunition for mockery.”

 

Making Globalization Work by Joseph E. Stiglitz

 

My favorite – the entire book was used to write this paper.

 

Web Resources

 

Please view attached Appendix www.crito.uci.edu/pubs/20... regarding the reasons one study concludes that hold China back in ecommerce.

 

[1] Waiting until the time is right, one is good at something, or has collected all the facts, without making any attempts isn’t effective. I had to begin someplace even if it is incomplete so I started with the World Wide Web. “If something is worth doing well, at all, it is also worth doing poorly.” I am not sure where that quote came from but I read it in an article where someone presented their reasoning.

 

[2] You never know where something will come from in free rights actions or what it will mean later. For example the person at the center of the Alaskan “Bong hits For Jesus” case, Frederick Morse, now teaches English to Chinese students in China. As an adult it appears he has his head on straight in his wish to help others communicate, more so that those he fought in court.

 

From the CNN news article, published June 26, 2007, “In dissent, Justice John Paul Stevens said, "This case began with a silly nonsensical banner, (and) ends with the court inventing out of whole cloth a special First Amendment rule permitting the censorship of any student speech that mentions drugs, so long as someone could perceive that speech to contain a latent pro-drug message." He was backed by Justices David Souter and Ruth Bader Ginsburg.” www.cnn.com/2007/LAW/06/2... downloaded March 13, 2008

 

[3] Pentagon attack last June stole an "amazing amount" of data” Joel Hruska Published: March 06, 2008 - 07:13PM CT Pentagon attack last June stole an "amazing amount" of data... from “blueton tips us to a brief story about recent revelations from the Pentagon which indicate that the attack on their computer network in June 2007 was more serious than they originally claimed. A DoD official recently remarked that the hackers were able to obtain an "amazing amount" of data.

 

We previously discussed rumors that the Chinese People's Liberation Army was behind the attack. “CNN has an article about Chinese hackers who claim to have successfully stolen information from the Pentagon.” Quoting Ars Technica: "The intrusion was first detected during an IT restructuring that was underway at the time. By the time it was detected, malicious code had been in the system for at least two months, and was propagating via a known Windows exploit. The bug spread itself by e-mailing malicious payloads from one system on the network to another." Via email from Jeremy Hansen on Slashdot: News for nerds, stuff that matters

 

[4] “Chinese backdoors "hidden in router firmware" Matthew Sparkes, News [Security], Tuesday 4th March 2008 3:17PM, Tuesday 4th March 2008 Chinese backdoors "hidden in router firmware"... The UK's communication networks could be at risk from Chinese backdoors hidden in firmware, according to a security company.

 

SecureTest believes spyware could be easily built into Asian-manufactured devices such as switches and routers, providing a simple backdoor for companies or governments in the Far East to listen in on communications.

 

"Organisations should change their security policies and procedures immediately," says Ken Munro, managing director of SecureTest. "This is a very real loophole that needs closing. The government needs to act fast."

 

"Would they buy a missile from China, then deploy it untested into a Western missile silo and expect it to function when directed at the Far East? That's essentially what they're doing by installing network infrastructure produced in the Far East, such as switches and routers, untested into government and corporate networks."

 

Late last year MI5 sent a letter to 300 UK companies warning of the threat from Chinese hackers attempting to steal sensitive data. Reports at the time suggested that both Rolls Royce and Royal Dutch Shell had been subjected to "sustained spying assaults".

 

The issue has been debated by government for some time. In 2001, the then foreign secretary Robin Cook, warned that international computer espionage could pose a bigger threat to the UK than terrorism.

 

[5] Chip Piracy Might End With Public Key Cryptography. A Web Exclusive from Windows IT Pro Mark Joseph Edwards, Security News, InstantDoc #98491, Windows IT Pro “A group of researchers from two universities have proposed a way to prevent chip piracy. The technique uses public key cryptography to lock down circuitry.

 

In a whitepaper published this month, Jarrod A. Roy and Igor L. Markov (of the University of Michigan) and Farinaz Koushanfar (of Rice University) outline the problem and details of how their proposed technology will help solve it.

 

Chip designers sometimes outsource manufacturing and that opens the door to piracy, should someone copy the design plans. The copied plans are then used to created 'clone' chips for a wide range of devices, including computers, MP3 players, and more.

 

"Pirated chips are sometimes being sold for pennies, but they are exactly the same as normal chips," said Igor Markov, associate professor in the Department of Electrical Engineering and Computer Science at the University of Michigan. "They were designed in the United States and usually manufactured overseas, where intellectual property law is more lax. Someone copies the blueprints or manufactures the chips without authorization."

 

The groups propose the use of public key cryptography, which would be embedded into circuitry designs. Each chip would produce its own random identification number, which would be generated during an activation phase. Chips would not function until activated, and activation would take place in a manner somewhat similar to that seen with many applications in use today. Via email from Jeremy Hansen.Original source - EPIC: Ending Piracy of Integrated Circuits Jarrod A. Roy, Farinaz Koushanfar‡ and Igor L. Markov, The University of Michigan, Department of EECS, 2260 Hayward Ave., Ann Arbor, MI 48109-2121, Rice University, ECE and CS Departments, 6100 South Main, Houston, TX 77005 www.eecs.umich.edu/~imark... March 06, 2008

 

[6] Chapter 5 “Why do Drug Dealers Still Live with Their Moms?” p. 89 “So how did the gang work? An awful lot like most American businesses, actually, though perhaps none more so than McDonald’s. In fact, if you were to hold a McDonald’s organizational chart and a Black Disciples org chart side by side, you could hardly tell the difference.”

 

[7] Mike Haynes, Theses on the Balkan War, “Capitalism is inherently a competitively expansionist and therefore conflict ridden system” Issue 83 of INTERNATIONAL SOCIALISM JOURNAL Published Summer 1999 Copyright © International Socialism, pubs.socialistreviewindex... accessed March 3, 2008.

 

[8] Readings p.7 “When I say that globalization has replaced the Cold War as the defining international system, what exactly do I mean?” p. 8 “The cold war system was symbolized by a single word, the wall … “You can’t handle the truth,” Says Nicholson. “Son we live in a world that has walls…”p. 8 “This Globalization system is also characterized by a single word: the Web. … we have gone from a system built around divisions and walls to a system built around integration and webs.”

 

“What is information arbitrage? Arbitrage is a market term. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

[9] Shared by miles on Feb 13, 2006 3:39 pm that I located through a Gmail...

 

[10] “As it gears up to host the 2008 Olympic Games Beijing has been awarded an unwelcome new accolade: the air pollution capital of the world.Satellite data has revealed that the city is one of the worst environmental victims of China's spectacular economic growth, which has brought with it air pollution levels that are blamed for more than 400,000 premature deaths a year” Satellite data reveals Beijing as air pollution capital of world

 

[11] “What we call ‘war’ is not all bad,” according to Virginia Johnson a former governmental planning consultant, who reminded me, “Without conflict there is no life. You don’t want 'perfect peace' there is no movement. The human standard is actually what we broadly call 'war'; because without conflict, change, motion, growth we would learn nothing, we would have nothing, we would be dead.” Personal conversation, March 14, 2008, Seattle, Washington

 

[12] Readings Larry Page, Google Co-Founder quoted by Thomas Friedman, p. 179, entire paragraph. “The more global Google’s user base becomes, the more powerful a flattener it becomes…”

 

[13] Ranganathan, faceted classification, Five Laws of Library Science, S. R. Ranganathan - Wikipedia, www.boxesandarrows.com/vi... Personality, Matter, Energy, Space, and Time. (PMEST)

 

Personality—what the object is primarily “about.” This is considered the “main facet.”

 

Matter—the material of the object

 

Energy—the processes or activities that take place in relation to the object

 

Space—where the object happens or exists

 

Time—when the object occurs

 

[14] www.crito.uci.edu/pubs/20...

 

[15] I learned about supply chain management mainly from the supply chain wizard Marc Lamonica, Regional Chief Financial Officer at Sutter Connect, Sutter Shared Services, and our mutual friend Web entrepreneur and ecommerce product engineer Adam Kalsey, and Sacramento State University teacher Stuart Williams, of Blitzkeigsoftware.net, blitzkriegsoftware.net/St...

 

[16] Introduction to Computer software classes in the 1970s consisted of FORTRAN cash register receipt programming, which is by implication is what ecommerce actually does.

 

[17] Freakonomics is a must read book of comedy and connections.

 

[18] Golden Arches, definition on Wikipedia, the free encyclopedia Golden Arches - Wikipedia, accessed March 13, 2008

 

[19] Readings “The World Is Flat 3.0: A Brief History of the Twenty-first Century” by Thomas Friedman, p. 421

 

[20] Readings p. 19 “What is information arbitrage? Arbitrage is a market term. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

[21] “Conservation groups say acid rain falls on a third of China's territory and 70% of rivers and lakes are so full of toxins they can no longer be used for drinking water.” Satellite data reveals Beijing as air pollution capital of world, Jonathan Watts in Beijing The Guardian, Monday October 31 2005, Satellite data reveals Beijing as air pollution capital of world

 

[22] “…After watching Jobs unveil the iPhone, Alan Kay, a personal computer pioneer who has worked with him, put it this way who has worked with him, put it this way: "Steve understands desire." ... Fortune CNN Magazine March 5, 2008, http://money.cnn.com/2008/03/02/......

 

accessed March 5, 2008

 

[23] Mac Margolis, “How Brazil Reversed the Curse, Latin America used to suffer the deepest gap between rich and poor. Now it is the only region narrowing the divide. Upwardly Mobile: Middle-class Brazilians” How Brazil Reversed the Curse NEWSWEEK Nov 12, 2007 Issue

 

[24] Mike Haynes, Theses on the Balkan War, “Capitalism is inherently a competitively expansionist and therefore conflict ridden system” Issue 83 of INTERNATIONAL SOCIALISM JOURNAL Published Summer 1999 Copyright © International Socialism, pubs.socialistreviewindex... accessed March 3, 2008. “The optimism that the end of the Cold War might lead to a new world order has been shown to be false. The hope that it would release a peace dividend that would enable a new generosity in international relations has been belied by experience, as some of us sadly predicted it would.3 Though the arms burden has declined, there has been no outpouring of aid to Eastern Europe, no new 'Marshall Plan'. The result has been that the burden of change has fallen on the broad masses of the population, wrecking lives across the old Soviet bloc in general and in one of its poorest components in south eastern Europe in particular. According to the World Bank, the number of people living in poverty (defined as having less than $4 a day) in the former Soviet bloc has risen from 14 million in 1990 to 147 million in 1998.4 Worse still, the advanced countries have continued to reduce further the miserly sums they devote to aid to the even poorer areas of the world. The OECD countries are rhetorically committed to an aid target of 0.7 percent of their output. In 1990 they gave 0.35 percent, and by 1997 the figure had fallen to 0.22 percent, with the United States under this heading giving 0.09 percent of its output, a figure in startling contrast to the expenditure devoted to destruction.”5

 

[25] Readings p. 46 “There is a tale, “The ring of Gygnes,” … could any man resist the temptation of evil if he knew his acts could not be witnessed?”

 

[26] Readings p. 58 “Attendance at Klan meetings began to fall … of all the ideas Kennedy thought up to fight bigotry, this campaign was clearly the cleverest. … He turned the Klan’s secrecy against itself by making its private information public: he converted heretofore precious knowledge into ammunition for mockery.”

 

Some of the research in this paper on piracy was provided by Jeremy Hansen of Seattle, Washington, USA. Mr. Hansen's email regarding economics served to inform me on this topic. Teacher: Glenn Von Tersch.

Description: During the Second World War Ian Fleming served as a Commander in the Royal Navy as assistant to the Director of Naval Intelligence, Rear Admiral John Godfrey. This document outlines Fleming's plan to capture German Engima codebooks which he dubbed 'Operation Ruthless'.

 

Fleming's name for the operation and his description of the man needed as a "tough batchelor" can't help but recall his later creation of James Bond. The document, prepared after the war as a summary of the activities of Naval Intelligence, suggests Fleming volunteered himself for the mission.

 

Date: c.1946

 

Our Catalogue Reference: ADM 223/463 p38

 

This image is from the collections of The National Archives. Feel free to share it within the spirit of the Commons.

 

For high quality reproductions of any item from our collection please contact our image library.

ИN

Deflowering Eyes

Igigi

 

www.saatchiart.com/print/New-Media-Deflowering-Eyes-Inna-...

 

en.wikipedia.org/wiki/Igigi

Igigi are the gods of heaven in the mythology of Mesopotamia.

The name has unknown origin. The signs for the names, and one of the options for the etymology of the igigi are i2-gi3-gi3, which are the same signs for 5-1-1 or 5-60-60 5*(60+60)=600 which are by some traditions All the gods.

Another option is to try to interpret the words themselves. Igi means (eye) in the Sumerian language, and it used as logogram in the Akkadian language, gi stands for (penetrate sexually). Therefore, Igigi could be translated to (Eyes in the sky, the watchers, who deflower).

Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.

 

Igigi/Igigu (a group of gods)

This Semitic term describes a group of possibly seven or eight gods. It is likely that the god Marduk was one of them, but the total membership in this group is unclear and likely changed over time.

Functions

Like the term Anunna, the term Igigu is equally complicated and in need of a comprehensive new study. Igigu, which is likely of Semitic origin, indicates a group of gods in the Mesopotamian pantheon. It is, however, not entirely clear what distinguishes the Igigu from the Anunna.

The story of Atrahasis, the Babylonian story of the Flood and a precursor to the flood story in the Gilgameš Epic (Tablet XI), offers some evidence on the relationship between the Annunaki and the Igigu. The poem begins with the lines "When the gods like men bore the work and suffered the toil, the toil of the gods was great, the work was heavy, the distress was much" (lines 1-4) (Lambert and Millard 1999 [1969]: 43). The composition continues: "The Seven great Anunnaki were making the Igigu suffer the work" (lines 5-6) (Lambert and Millard 1969 [1999]: 43). What follows is partly fragmentary, but seems to indicate that the Igigu gods did not want to work any more and therefore the Anunnaki had to find a solution. Ultimately, this led to the creation of humans, who from then on had to bear the gods' work. In this story it appears that the Igigu were subordinate to the Anunnaki (von Soden 1989: 341-2). It is unclear which deities were included in the Igigu group.

In the prologue to the famous Code of Hammurabi it is indicated that the Anunnaki elevated the god Marduk among the Igigu gods (for a translation see Roth 1997: 76-142; also see von Soden 1966: 144), but it is difficult to assess the significance of this passage.

Some mythological texts, such as the Anzu myth, speak of an assembly of the Igigu gods, but whether this might be an institutionalized assembly, as suggested by Kienast 1965: 146, remains doubtful.

Divine Genealogy and Syncretisms

As mentioned above, it is not clear how many and which gods belonged to the Igigu, although the god Marduk appears to belong to this group for certain. It is possible that the group included only seven (von Soden 1966), eight (Kienast 1965: 144) or ten (Black and Green 1998: 106) gods, but this is uncertain as well.

Other gods who may belong to this group are Ištar, Asarluhi, Naramṣit, Ninurta, Nuska, and Šamaš (Kienast 1965: 149). Some gods seem to belong to both the Anunnaki and the Igigu (Kienast 1965: 152), yet more research is needed to gain a better understanding of this situation in the first millennium BCE.

Cult Place(s)

We currently know of no cult places for the Igigu. Kienast (1965; 1976-80) has repeatedly suggested that the Igigu are only attested in literary and mythological texts. However, von Soden (1966) has brought forth some evidence that might indicate that there are very few theophoric personal names TT which invoke the Igigu, thus offering some evidence for their veneration.

Time Periods Attested

The term Igigu is first attested in texts from the Old Babylonian period (Kienast 1976-80: 40; von Soden 1989: 340) and only occurs in Akkadian contexts (Edzard 1976-80: 37). A Sumerian logographic equivalent of the term Igigu is nun-gal-e-ne, to be translated as "the great princes/sovereigns." This term is mentioned in a literary text that has been ascribed to the princess Enheduanna, daughter of king Sargon, the founder of the Old Akkadian dynasty (Inana C, ETCSL 4.7.3 l. 2). This particular composition is only attested in Old Babylonian manuscripts and it is unclear whether an older date can be proven. According to Edzard (1976-80: 39) it is possible that nun-gal-e-ne was originally an epithet of the Anunna gods that later became identified with the Igigu under influence from Akkadian.

The Igigu and Anunnaki are frequently attested in literary, mythological, and religious (incantations and prayers) texts until the end of the cuneiform tradition. The Igigu are mentioned, among others, in the Anzu myth (Foster 2005: 555-578), in Enāma eliš TT (Foster 2005: 436-486), and the Erra poem (Foster 2005: 880-913), all of which are attested in manuscripts of the first millennium BCE.

Iconography

Because this term describes a group of gods, there are no known images of the Igigu.

Name and Spellings

The etymology of this term is unclear. It has been suggested the term is of Old Akkadian (Kienast 1965: 157; 1976-80: 40) or of (Old) Amorite (von Soden 1966: 144) or possibly Arabic origins (von Soden 1989: 340). For the various spellings see Kienast 1965: 142.

Written forms:

logographic: dnun gal-e-ne, dnun-gal-meš;

syllabic and pseudo-logographic: i-gi-gu, i-gi-gi, di-gi4-gi4, di-gi4-gi4-ne, i-gi4-gu, dí-gì-gì (the latter appears first in ninth century BCE);

cryptographic: dgéš-u

Normalized forms:

Igigu, Igigi

Igigu in Online Corpora

The Corpus of Ancient Mesopotamian Scholarship

Nungalene in Online Corpora

The Electronic Text Corpus of Sumerian Literature

Further Reading

Edzard 1976-80, "[Igigu], Anunna und."

Kienast 1965, "Igigu und Anunnakku nach den akkadischen Quellen."

Kienast 1976-80, "Igigu, Anunnakku und."

von Soden 1966, "Die Igigu-Götter."

von Soden 1989, "Die Igigu-Götter in altbabylonischer Zeit."

Nicole Brisch

Nicole Brisch, 'Igigi/Igigu (a group of gods)', Ancient Mesopotamian Gods and Goddesses, Oracc and the UK Higher Education Academy, 2012 [oracc.museum.upenn.edu/amgg/listofdeities/igigi/]

Released under a Creative Commons Attribution Share-Alike license 3.0, 2011.

The Pennsylvania

Sumerian Dictionary

igi [EYE] (1133x: ED IIIb, Old Akkadian, Lagash II, Ur III, Early Old Babylonian, Old Babylonian, unknown) wr. igi; i-bi2; i-gi "eye; carved eye (for statues)" Akk. īnu

psd.museum.upenn.edu/epsd/epsd/e2510.html

The Pennsylvania Sumerian Dictionary Project is carried out in the Babylonian Section of the University of Pennsylvania Museum of Anthropology and Archaeology. It is funded by the National Endowment for the Humanities and private contributions.

____________________________________

Cycles of the earth, winds, Igigi it's all here and no wonder the church has been hiding the text. The smoke sedates the Elohim (judges) they have their Territories, Not demons nor angels but IGIGI; the Watchers the little big eyed guys who have been stealing my eggs while I sleep 1-4.

archive.org/details/bookofenochproph00laur

ia802707.us.archive.org/10/items/bookofenochproph00laur/b...

The book of Enoch the prophet

by Laurence, Richard, 1760-1838

Publication date 1883

Publisher London : Kegan Paul, Trench

Collection Princeton; americana

Digitizing sponsor Internet Archive

Contributor Princeton Theological Seminary Library

Language English.

Addeddate 2008-11-12 13:13:18

Call number 185459

Camera Canon 5D

External-identifier urn:oclc:record:1041620576[WorldCat (this item)]

Foldoutcount 0

Identifier bookofenochproph00laur

Identifier-ark ark:/13960/t16m3hr86

Lcamid

Missingpages

Openlibrary_edition OL23282189M

Openlibrary_work OL16734660W

Pages 244

Possible copyright status NOT_IN_COPYRIGHT

Ppi 500

Rcamid

Scandate 20081117214436

Scanfactors 4

Scanner scribe2.nyc.archive.org

Scanningcenter nyc

SHOW LESS

Full catalog record MARCXML

 

en.wikipedia.org/wiki/Watcher_(angel)#Grigori

Philo

According to PrEv 1.10.1-2 of Philo of Byblos, Sanchuniathon mentioned "some living beings who had no perception, out of whom intelligent beings came into existence, and they were called Zophasemin (Heb. șōpē-šāmayim, that is, 'Watchers of Heaven'). And they were formed like the shape of an egg."

The Old Testament Pseudepigrapha, volume 1, Apocalyptic Literature and Testaments

EDITED BY JAMES H. CHARLES WORTH, DUKE UNIVERSITY

DOUBLEDAY & COMPANY, INC. GARDEN CITY, NEW YORK

Library of Congress Catalog Card Number: ISBN: 0-385-09630-5 Copyright © 1983 by James H. Charlesworth All Rights Reserved Printed in the United States of America Designed by Joseph P. Ascherl Library of Congress Cataloging in Publication Data Main entry under title: Old Testament pseudepigrapha.

eclass.uoa.gr/modules/document/file.php/THEOL264/James%20...

____________________________________

Livius.org Articles on ancient history

www.livius.org/sources/content/anet/104-106-the-epic-of-a...

The Epic of Atraḥasis

The Epic of Atraḥasis is the fullest Mesopotamian account of the Great Flood, with Atraḥasis in the role of Noah. It was written in the seventeenth century BCE

The text is known from several versions: two were written by Assyrian scribes (one in the Assyrian, one in the Babylonian dialect), a third one (on three tablets) was written during the reign of king Ammi-saduqa of Babylonia (1647-1626 BCE). Parts are quoted in Tablet XI of the Epic of Gilgameš; other influences are in the Babylonian History by Berossus (quote). These texts can be used to reconstruct the lost parts of the Epic of Atraḥasis, while the overall structure is, of course, known from the Bible.

Summary

The conditions immediately after the Creation: the Lower Gods have to work very hard and start to complain

Revolt of the Lower Gods

Negotiations with the Great Gods

Proposal to create humans, to relieve the Lower Gods from their labor

Creation of the Man

Man's noisy behavior; new complaints from the gods

The supreme god Enlil's decision to extinguish mankind by a Great Flood

Atraḥasis is warned in a dream

Enki explains the dream to Atraḥasis (and betrays the plan)

Construction of the Ark

Boarding of the Ark

Departure

The Great Flood

The gods are hungry because there are no farmers left to bring sacrifices, and decide to spare Atraḥasis, even though he is a rebel

Regulations to cut down the noise: childbirth, infant mortality, and celibacy

The translation offered here is adapted from the one by B.R. Foster.

Translation

Complaints of the Lower Gods

[1] When the gods were man

they did forced labor, they bore drudgery.

Great indeed was the drudgery of the gods,

the forced labor was heavy, the misery too much:

[5] the seven great Anunna-gods were burdening

the Igigi-godsnote with forced labor.

[Lacuna]

[21] The gods were digging watercourses,

canals they opened, the life of the land.

The Igigi-gods were digging watercourses

canals they opened, the life of the land.

[25] The Igigi-gods dug the Tigris river

and the Euphrates thereafter.

Springs they opened from the depths,

wells ... they established.

...

They heaped up all the mountains.

[Several lines missing]

[34] ... years of drudgery.

[35] ... the vast marsh.

They counted years of drudgery,

... and forty years, too much!

... forced labor they bore night and day.

They were complaining, denouncing,

[40] muttering down in the ditch:

"Let us face up to our foreman the prefect,

he must take off our heavy burden upon us!

Enlil, counsellor of the gods, the warrior,

come, let us remove him from his dwelling;

[45] Enlil, counsellor of the gods, the warrior,

come, let us remove him from his dwelling!"

[Several lines missing]

[61] "Now them, call for battle,

battle let us join, warfare!"

The gods heard his words:

they set fire to their tools,

[65] they put fire to their spaces,

and flame to their workbaskets.

Off they went, one and all,

to the gate of the warrior Enlil's abode.

...

Insurrection of the Lower Gods

[70] It was night, half-way through the watch,

the house was surrounded, but the god did not know.

It was night, half-way through the watch,

Ekur was surrounded, but Enlil did not know!

[Several lines missing; the great gods send a messenger]

The Great Gods Send a Messenger

[132] Nusku opened his gate,

took his weapons and went ... Enlil.

In the assembly of all the gods,

[135] he knelt, stood up, expounded the command,

"Anu, your father,

your counsellor, the warrior Enlil,

your prefect, Ninurta,

and your bailiff Ennugi have sent me to say:

[140] 'Who is the instigator of this battle?

Who is the instigator of these hostilities?

Who declared war,

that battle has run up to the gate of Enlil?

In ...

[145] he transgressed the command of Enlil.'"

Reply by the Lower Gods

"Everyone of us gods has declared war;

...

We have set ... un the excvation,

excessive drudgery has killed us,

[150] our forced labor was heavy, the misery too much!

Now, everyone of us gods

has resolved on a reckoning with Enlil."

[The great gods decide to create man, to relieve the lower gods from their misery.]

Proposals by Ea, Belet-ili, and Enki

[a1] Ea made ready to speak,

and said to the gods, his brothers:

"What calumny do we lay to their charge?

Their forced labor was heavy, their misery too much!

[a5] Every day ...

the outcry was loud, we could hear the clamor.

There is ...

Belet-ili, the midwife, is present.note

Let her create, then, a human, a man,

[a10] Let him bear the yoke!

Let him bear the yoke!

Let man assume the drudgery of the god."

Belet-ili, the midwife, is present.

[190] Let the midwife create a human being!

Let man assume the drudgery of the god."

They summoned and asked the goddess

the midwife of the gods, wise Mami:note

"Will you be the birth goddess, creatress of mankind?

[195] Create a human being, that he bear the yoke,

let him bear the yoke, the task of Enlil,

let man assume the drudgery of the god."

Nintu made ready to speak,note

and said to the great gods:

[200] "It is not for me to do it,

the task is Enki's.

He it is that cleanses all,

let him provide me the clay so I can do the making."

Enki made ready to speak,

[205] and said to the great gods:

"On the first, seventh, and fifteenth days of the month,

let me establish a purification, a bath.

Let one god be slaughtered,

then let the gods be cleansed by immersion.

[210] Let Nintu mix clay with his flesh and blood.

Let that same god and man be thoroughly mixed in the clay.

Let us hear the drum for the rest of the time.

[215] From the flesh of the god let a spirit remain,

let it make the living know its sign,

lest he be allowed to be forgotten, let the spirit remain."

The great Anunna-gods, who administer destinies,

[220] answered "yes!" in the assembly.

The Creation of Man

On the first, seventh, and fifteenth days of the month,note

he established a purification, a bath.

They slaughtered Aw-ilu, who had the inspiration, in their assembly.

[225] Nintu mixed clay with his flesh and blood.

That same god and man were thoroughly mixed in the clay.

For the rest of the time they would hear the drum.

From the flesh of the god the spirit remained.

It would make the living know its sign.

[230] Lest he be allowed to be forgotten, the spirit remained.

After she had mixed the clay,

she summoned the Anunna, the great gods.

The Igigi, the great gods, spat upon the clay.

[235] Mami made rady to speak,

and said to the great gods:

"You ordered me the task and I have completed it!

You have slaughtered the god, along with his inspiration.

[240] I have done away with your heavy forced labor,

I have imposed your drudgery on man.

You have bestowed clamor upon mankind.

I have released the yoke, I have made restoration."

They heard this speech of hers,

[245] they ran, free of care, and kissed her feet, saying:

"Formerly we used to call you Mami,

now let your name be Belet-kala-ili:"note

[The human population increases and their noise disturbs the gods, who decide to wipe out mankind. The god Enki, however, sends a dream to Atrahasis. When the text resumes, Enki is still speaking.]

Enki explains Atraḥasis' dream

[i.b35] "Enlil committed an evil deed against the people."

[i.c11] Atraḥasis made ready to speak,

and said to his lord:

"Make me know the meaning of the dream.

let me know, that I may look out for its consequence."

[i.c15] Enki made ready to speak,

and said to his servant:

"You might say, 'Am I to be looking out while in the bedroom?'

Do you pay attention to message that I speak for your:

[i.c20] 'Wall, listen to me!

Reed wall, pay attention to all my words!

Flee the house, build a boat,

forsake possessions, and save life.

[i.c25] The boat which you build

... be equal ...

...

...

Roof her over like the depth,

[i.c30] so that the sun shall not see inside her.

Let her be roofed over fore and aft.

The gear should be very strong,

the pitch should be firm, and so give the boat strength.

I will shower down upon you later

[i.c35] a windfall of birds, a spate of fishes.'"

He opened the water clock and filled it,

he told it of the coming of the seven-day deluge.

Atraḥasis and the Elders

Atraḥasis received the command.

He assembled the Elders at his gate.

[i.c40] Atraḥasis made ready to speak,

and said to the Elders:

"My god does not agree with your god,

Enki and Enlil are constantly angry with each other.

They have expelled me from the land.

[i.c45] Since I have always reverenced Enki,

he told me this.

I can not live in ...

Nor can I set my feet on the earth of Enlil.

I will dwell with my god in the depths.

[i.c50] This he told me: ..."

Construction of the Ark

[ii.10] The Elders ...

The carpenter carried his axe,

the reedworker carried his stone,

the rich man carried the pitch,

the poor man brought the materials needed.

[Lacuna of about fifteen lines; the word Atraḥasis can be discerned.]

Boarding of the Ark

[ii.29] Bringing ...

[ii.30] whatever he had ...

Whatever he had ...

Pure animals he slaughtered, cattle ...

Fat animals he killed. Sheep ...

he choose and and brought on board.

[ii.35] The birds flying in the heavens,

the cattle and the ... of the cattle god,

the creatures of the steppe,

... he brought on board

...

[ii.40] he invited his people

... to a feast

... his family was brought on board.

While one was eating an another was drinking,

[ii.45] he went in and out; he could not sit, could not kneel,

for his heart was broken, he was retching gall.

Departure

The outlook of the weather changed.

Adadnote began to roar in the clouds.

[ii.50] The god they heard, his clamor.

He brought pitch to seal his door.

By the time he had bolted his door,

Adad was roaring in the clouds.

The winds were furious as he set forth,

[ii.55] He cut the mooring rope and released the boat.

[Lacuna]

The Great Flood

[iii.5] ... the storm

... were yoked

Anzu rent the sky with his talons,

He ... the land

[iii.10] and broke its clamor like a pot.

... the flood came forth.

Its power came upn the peoples like a battle,

one person did not see another,

they could not recognize each other in the catastrophe.

[iii.15] The deluge belowed like a bull,

The wind resounded like a screaming eagle.

The darkness was dense, the sun was gone,

... like flies.

[iii.20] the clamor of the deluge.

[Lacuna. The gods find themselves hungry because there are no farmers left and sacrifices are no longer brought. When they discover that Atrahasis has survived, they make a plan to make sure that the noise will remain within limits: they invent childbirth, infant mortality, and celibacy.]

Mankind Punished

[iii.45] Enki made ready to speak,

and said to Nintu the birth goddess:

"You, birth goddess, creatress of destinies,

establish death for all peoples!

[iii.d1] "Now then, let there be a third woman among the people,

among the people are the woman who has borne

and the woman who has not borne.

Let there be also among the people the pasittu (she-demon):

[iii.d5] Let her snatch the baby from the lap who bore it.

And etablish high priestesses and priestesses,

let them be taboo,note and so cut down childbirth."

This page was created in 2007; last modified on 12 October 2020.

Home » Sources » Content » ANET » 104-106 The Epic of Atraḥasis

All content copyright © 1995–2020 Livius.org. All rights reserved.

____________________________________

Brain Magick: Exercises in Meta-Magick and Invocation by Philip H. Farber

archive.org/details/BrainMagic/Brain%20Magic

archive.org/stream/BrainMagic/mega-book-two-volumes-in-on...

"Satana-il was the supreme leader of an extraterrestrial race that accompanied the Anunnaki in their second landing on earth.

This galactic race was physically and genetically different from the An unna ki and the Igigi. Their duty was to serve the Anu nna ki.

They rebelled against the An unna ki and broke the laws of their leader by breeding with the women of the Earth.

Contrary to the general belief, the An unna ki were not the first extraterrestrial race to marry, or the have sexual relations with the women of earth."

____________________________________

archive.org/details/img20190908220021901

Ancient Creation Myths

by Alberta Parish

Publication date 2019-09-08

Topics Enlil, Enki, Anunnaki, Sumerians, ancient myths, Babylonians, Enuma Elish, Atrahasis, Noah, Genesis Flood, Sumerian flood myth

God: The Original Slavemaster by Alberta Parish

Ever since I was a child, I have always believed in a benevolent God called Yahweh and Jehovah that biblical writers claimed created mankind for the express purpose of his will. In a Christianized Western culture, I was taught that only through Jesus Christ could I have eternal life with him and Yahweh. The epic of Atrahasis, an Akkadian tablet dating from the 18th Century BCE, gives a completely different account of mankind's creation and how the universe was formed beginning with the primordial waters.

Atrahasis was the last Sumerian king before the Great Deluge who was saved from the flood by the Anunnaki god Enki who had rulership of the great deep. According to Atrahasis, Homo Sapiens were created to serve the Anunnaki, which were extraterrestrials that landed in the Persian Gulf region about 450,000 years ago in search of gold to repair their home planet Nibiru's ozone.They made the Igigi gods, who were lower gods, mine for gold. Enlil, the ruler of earth and sky, who is also the equivalent of the biblical God Yahweh, also made the Igigi build canals, reedbeds, rivers and mountains. They built the Tigris and Euphrates rivers, and after 3,600 years, rebelled against their oppressor, Enlil.

Atrahasis had recorded that the Igigi cast off their work tools and surrounded Enlil's temple demanding to be relieved of their hard labor. It was later decided that the Anunnaki would make a species that were intelligent enough to do the work that the Igigi had refused to do. This was mankind's original purpose for being created by these extraterrestrials. It was also decided that an Anunnaki had to be sacrificed to make mankind.

The epic of Atrahasis states, "They slaughtered Aw-ilu, who had the inspiration, in their assembly.

Nintu mixed clay with his flesh and blood.

That same god and man were thoroughly mixed in the clay...After she had mixed the clay, she summoned the Anunna, the great gods.

The Igigi, the great gods, spat upon the clay.

Mami made ready to speak, and said to the great gods: "You ordered me the task and I have completed it!

You have slaughtered the god, along with his inspiration.

I have done away with your heavy forced labor,

I have imposed your drudgery on man.

You have bestowed clamor upon mankind."

With the help of Enki, half-brother of Enlil, the mother goddess Nintu (i.e., Mami) formed seven males and seven females from fourteen pieces of clay. It was also after this event that the human population grew, because the first seven males and females were given the ability to reproduce. When the human population grew, Enlil complained of their noise. He then set about to reduce the population. First, he caused a drought and mankind was destroyed. But it did nothing to reduce the population. Then, pestilence followed. Still, the population continued to grow. Lastly, Enlil caused a great famine. Eventually, the people turned cannibal as a result of the famine. Finally, Enlil proposed a solution to destroy the human population through a flood.

Read the remainder of my essay at www.ancientcreationmyths.com.

Addeddate 2019-09-15 19:04:20

Identifier img20190908220021901

Scanner Internet Archive HTML5 Uploader 1.6.4

____________________________________

ETCSLtranslation

etcsl.orinst.ox.ac.uk/cgi-bin/etcsl.cgi?charenc=gcirc&amp...

© Copyright 2003, 2004, 2005, 2006 The ETCSL project, Faculty of Oriental Studies, University of Oxford

Updated 2006-12-19 by JE

Igigi Search the English translations

Result: 3 paragraph(s)

 

A hymn to Marduk for Abī-Ešuḫ (Abī-Ešuḫ A): c.2.8.5.1

King who gathers up the divine powers of heaven and earth, foremost son of Enki, Marduk, mighty lord, perfect hero, foremost of the Great Princes (a name for the Igigi gods), strong one of the Anuna, the great gods who have given him justice and judgment! Great prince, descendant of holy An, lord who decides destinies, who has everything in his grasp (?), wise, august knower of hearts, whose divinity is manifest, who shows concern for all that he looks upon! Your ancestor An, king of the gods, has made your lordship effective against the armies of heaven and earth.

 

A hymn to Inana (Inana C): c.4.07.3

The great-hearted mistress, the impetuous lady, proud among the Anuna gods and pre-eminent in all lands, the great daughter of Suen, exalted among the Great Princes (a name of the Igigi gods), the magnificent lady who gathers up the divine powers of heaven and earth and rivals great An, is mightiest among the great gods -- she makes their verdicts final. The Anuna gods crawl before her august word whose course she does not let An know; he dare not proceed against her command. She changes her own action, and no one knows how it will occur. She makes perfect the great divine powers, she holds a shepherd's crook, and she is their magnificent pre-eminent one. She is a huge shackle clamping down upon the gods of the Land. Her great awesomeness covers the great mountain and levels the roads.

 

The debate between Bird and Fish: c.5.3.5

"You are like a watchman living on the walls (?), ……! Fish, you kindled fire against me, you planted henbane. In your stupidity you caused devastation; you have spattered your hands with blood! Your arrogant heart will destroy itself by its own deeds! But I am Bird, flying in the heavens and walking on the earth. Wherever I travel to, I am there for the joy of its …… named. ……, O Fish, …… bestowed by the Great Princes (a name for the Igigi). I am of first-class seed, and my young are first-born young! …… went with uplifted head …… to the lustrous E-kur. …… until distant days. …… the numerous people say. How can you not recognise my pre-eminence? Bow your neck to the ground."

____________________________________

A song to Ninimma (Ninimma A): translation

web.archive.org/web/20060925024833/http://www-etcsl.orien...

SEGMENT A

1-18You are the seal-holder of the treasury of the ....... You are the caretaker of the great gods, you are ....... Ninimma, you are the lady of all the great rites in the E-kur. Lady, you are the ...... of Enlil, you are the heavenly scribe. You ...... the tablet of life.

1 line fragmentary

You, who bring the best corn, are the lady of the E-sara. The surveyor's gleaming line and the measuring rod suit you perfectly. You can hold your head high among the great princes. You are ....... You are ......, the cherished one.

1 line fragmentary

......; you are exceptional in wisdom. ...... joy ....... My lady, you were exalted already in the womb; you are resplendent like the sunlight. You are suited to the lapis-lazuli crown (?); you are the heavenly ....... ...... adorned with loveliness .......

1 line fragmentary

approx. 10 lines missing

 

SEGMENT B

1-11...... like a strong (?) ....... ...... of the E-kur ...... lady ....... ...... the forceful one of Nanna ....... You are profoundly intelligent, one who knows everything. You are the shining light which fills the exalted sanctuary. You are she who ...... by Enlil. You are ....... You are ....... You are most apt for the holy susbu rites and lustration rites.

1 line unclear

Ninimma of the holy divine plans, it is sweet to praise you!

 

SEGMENT C

1You are .......

 

Top | Home | Email us This composition: composite text | bibliography

 

Revision history

22.x.1999 : GZ : adapting translation

06.xii.1999 : JAB : proofreading

13.xii.1999 : GC : tagging

22.xii.1999 : ER : proofreading SGML

22.xii.1999 : ER : converting to HTML 4.0

7.ix.2001 : ER : header and footer reformatted; substantive content of file not changed

____________________________________

 

Inly, Bohdan

 

about.me/chekanart

 

Calcite, Paint

Thebes, Valley of the Kings, Tomb of Tutankhamun (KV 62).

New Kingdom, 18th Dynasty, Reign of Tutankhamun (1355-1346 BCE).

 

Tutankhamun's tomb held more than eighty vessels of oils and unguents, but thieves stole most of the contents. This container has a central frieze in which the royal throne name appears in a cryptographic writing, ensuring the survival of the king's name.

 

King Tut exhibit, Seattle Washington, 2012.

2011, Mar. 25(Fri)@南海藝廊

入場時間︱19:20入場 19:30準時開始

入場費︱NT$.50

  

【 柔軟次攻擊 】

演出者︱ Sounds like O.range(聽起來好橘)

看起來很刺鼻

吃起來很低沈

摸起來很過飽和

聞起來很痛

 

聽起來好橘,創造視覺和聽覺的連串

e-Mail︱o.range.sounds.2O11@gmail.com

Website|sounds-like-orange.com/

 

表演簡介︱影響

人們會因為"一樣"而有歸屬感,漸漸遺忘"不一樣"的必要,為了安全,多數決將100個人變成1個人,用同一種面貌,做了同一個決定。

但100個人就該有100種樣子,就該存在一些不和諧的畫面與聲音。

 

演出者︱葉立傅

傅立葉轉換是一種線性的積分轉換。在物理學、聲學、光學、結構動力學、數論、組合數學、機率論、統計學、訊號處理、密碼學、海洋學、通訊等領域都有著廣泛的應用。例如在訊號處理中,傅立葉轉換的典型用途是將訊號分解成幅值分量和頻率分量。

 

但是你以為把狗倒過來就會變神嗎?

 

表演簡介︱

     ∞

f(x) = ∫  (A(u)*cos(ux) + B(u)*sin(ux)) du

    -∞

Lacking Sound Festival Listen 45

2011, Mar. 25(Fri)@Nan-Hai Gallery

Entrance Time︱19:20 Starts Punctually At 19:30

Entrance Fee︱NT$.50

 

【 Sub-Attack but Sweet 】

Artist︱ Sounds like O.range

It looks pungent

Tastes deep as bass

Touches more than saturated

Smells pain

 

It sounds orange, creating a thread between sight and hearing.

 

e-Mail︱o.range.sounds.2O11@gmail.com

Website|soundslikeOrange.com

 

Performance Introduction︱ Effect

Many tend to acquire belongingness by being all alike, forgetting the necessity of being different. To feel secure, 100 people have become a single unity, disguised in the same appearance, making the same decision.

 

100 people should have 100 faces, conflict and discord shall exist.

  

Artist︱ Reiruof

Fourier transform is a mathematical operation that transforms one complex-valued function of a real variable into another. It is largely applied to physics, acoustics, optics, structural mechanics, number theory, combinatorics, probability theory, statistics, signal processing, cryptography, oceanography, communication…etc. For example, on signal processing the Fourier transform decomposes signal into amplitude and frequency.

 

Well, you think dog in reverse makes it God?

    

Performance Introduction︱

     ∞

f(x) = ∫  (A(u)*cos(ux) + B(u)*sin(ux)) du

    -∞

Curator︱YAO, Chung-Han

Graphic Design︱Nat NIU

Project Manager︱Liang CHEN

 

指導單位︱台北市文化局 

主辦單位︱失聲祭團隊 lsf-taiwan.blogspot.com/

協辦單位︱國立臺北教育大學 南海藝廊 blog.roodo.com/nanhai/

Supervised by︱ Department of Cultural Affairs Taipei City Government

Organized by︱Lacking Sound Festival Team

In Cooperation with︱National Taipei University of Education Nan-Hai Gallery

 

Bletchley Park és un dels llocs més fascinants de la historia del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informatica i els ordinadors.

 

Vista interna d'una maquina 'Bombe'. La 'Bombe' fou creada per Alan Turing i Gordon Welchman a partir d'un model polonès, que permetia ajudar a desxifrar els codis de la famosa maquina Enigma del III Reich. Tot i que foren destruides totes despres de la guerra, amb molt esforç ara han pogut reconstruir-ne una, que funciona com les seves predecesores.

 

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

This is the back side of a Bombe machine, in Bletchley Park. The Bombe machine was a device created by Alan Turing and Gordon Welchman to help decyphering the famous german Enigma machine. Although all 'bombes' were destroyed after the war, the team in the museum has rebuilt this full-working bombe. That's why has the name "Phoenix".

 

en.wikipedia.org/wiki/Bombe

 

www.jharper.demon.co.uk/bombe1.htm

 

en.wikipedia.org/wiki/Bletchley_Park

 

www.bletchleypark.org/

 

www.bletchleypark.org/content/museum.rhtm

 

For an impresive virtual visit, take a look to these videos:

 

www.youtube.com/watch?v=ZmMFp2FQPsY

Joon Ian Wong, Founder, Cryptographic Media, Alex Zhang, Mayor, Friends with Benefits and Meltem Demirors, CSO, CoinShares

 

(Morgan Brown/Shutterstock/CoinDesk)

Blog: makaylalewis.co.uk/2013/11/20/sketchnotes-introduction-to...

 

©ALL RIGHTS RESERVED.

These photographs are presented here for viewing purposes ONLY. They are NOT royalty free images and may not be used for commercial or private use. Any such use of these images is strictly prohibited. Specifically, these images may not be copied, manipulated, be reproduced by any other means nor sold without prior written consent by the author.

Calcite, Paint

Thebes, Valley of the Kings, Tomb of Tutankhamun (KV 62).

New Kingdom, 18th Dynasty, Reign of Tutankhamun (1355-1346 BCE).

 

Tutankhamun's tomb held more than eighty vessels of oils and unguents, but thieves stole most of the contents. This container has a central frieze in which the royal throne name appears in a cryptographic writing, ensuring the survival of the king's name.

 

King Tut exhibit, Seattle Washington, 2012.

Marks of intelligent, purposeful design are in these layers of rocks. Do you see them?

Sometime in the distant past, nobody knows exactly when, an Anasazi man and his son left their handprints on the rock wall above the Deer Creek slot canyon. It was a precarious place to stand, so it took bravery. Those prints remain today as signs of a vision quest or of a desire to maintain a memory of a good time with father and son.

 

"Intelligent design" theory is simply the logical process of distinguishing purposeful activity from natural activity or chance. It's routinely used in archaeology, cryptography, forensics and several other fields of science. It doesn't concern itself with who the designer is, but whether a phenomenon shows the intentional activity of a mind. We make these kinds of inferences all the time, as when we saw the handprints in this photo. We knew intuitively they were not created by wind and erosion. Not all cases are this easy. Intelligent design theory seeks to make those kinds of inferences logically and mathematically rigorous, so that we can distinguish between chance, natural law, and design, with a high probability of making a correct "inference to the best explanation." For example, if an astronomer claimed to witness an alien signal from space (SETI), other scientists would want to rigorously rule out chance or natural laws before making a design inference. The identity and motivations of the aliens would be interesting follow-up questions, but would fall outside the sphere of intelligent design theory itself.

More art on my weblog: uair01.blogspot.com/

 

= = = = =

 

SEVEN SECRET ALPHABETS

Anthony Earnshaw

 

A very remarkable book. The replacement of a conventional capital letter at the beginning of a chapter by some kind of visual pun is as old as the illuminated book, but Earnshaw has succeeded in divorcing it from its customary aesthetic role, stripped it of any scene-setting function. His letters, comic or sinister, exist in their own right. Each image hides its secret until it finds its place. Even then it may prove evasive. The alphabets suggest an alternative reality where humour and disaster are interchangeable and the laws which govern nature are bent certainly, but only very little. An imagination in no way forced selects an apparently arbitrary image at a precise moment . . . Letters, those haphazardly invented signs, those abstract shapes we hear as sounds, take on a concrete meaning of their own.

Guardian

 

It is fair to say th at the author explores a landscape which suggests Magritte and Monty Python. The humour is austere, bleak and if not black, at least charcoal grey. As a feat of imagination the work is outstanding.

The Times Educational Supplement

 

Earnshaw has a devious, allusive, surrealist interest in letters. His imagination is full of wit; each image is a humorous vignette, an unlikely collusion of images in the form of a letter. Such shifting of context is the source of all humour. By providing a main-line to the unconscious and suggesting a revaluation of the essential symbols of which language is constituted, he makes his work compulsive and compulsory viewing.

Arts Review

 

JONATHAN CAPE

THIRTY BEDFORD SQUARE LONDON

 

by Eric Thacker and Anthony Earnshaw

MUSRUM

WINTERSOL

Corrigendum

THE ISBN FOR THE PAPERBACK EDITION OF

SEVEN SECRET ALPHABETS

BY ANTHONY EARNSHAW

SHOULD READ ISBN 022401383 I

FIRST PUBLISHED 1972

© 1972 BY ANTHONY EARNSHAW

JONATHAN CAPE LTD, 30 BEDFORD SQUARE, LONDON, WCI

ISBN 022400795 5

PRINTED AND BOUND IN GREAT BRITAIN BY

W & J MACKAY LIMITED, CHATHAM

Joon Ian Wong, Founder, Cryptographic Media, Alex Zhang, Mayor, Friends with Benefits and Meltem Demirors, CSO, CoinShares

 

(Morgan Brown/Shutterstock/CoinDesk)

monica trenkler . . . . . . . . . . . . . . . . . . . . . . .

handmade collage on cardboard

50 x 35 cm

THE STATUE OF LIBERTY

 

Statue of Liberty The Statue of Liberty in New York harbour was presented in 1884 as a gift from the French Grand Orient Temple Masons to the Masons of America in celebration of the centenary of the first Masonic Republic. She is holding the Masonic "Torch of Enlightenment". Also referred to back in the 1700's by the Illuminati Masons as the "Flaming Torch of Reason". The Torch represents the "Sun" in the sky. The Statue of Liberty's official title is, "Liberty Enlightening the World". The cornerstone of the statue records how it was laid in a Masonic ceremony (see plaque photo above).

 

THE TORCH SYMBOL

 

Illuminati means to "bare light" one way to symbolize this is by carrying a torch. A torch sits on top of the Statue of Liberty, on top of JFK's grave, and on top of the tunnel where Princess Diana was killed. Best selling author, Robert Bauval:

 

"The cornerstone for the Statue of Liberty was placed in a solemn ceremony in 1884 organised by the Masonic lodges of New York.

 

The Statue of Liberty, which was designed by the French sculptor Bartholdi and actually built by the French Engineer, Gustave Eiffel (both well-known Freemasons), was not originally a ‘Statue of Liberty’ at all, but first planned by Bartholdi for the opening of the Suez Canal in Egypt in 1867.

 

Bartholdi, like many French Freemasons of his time, was deeply steeped in ‘Egyptian’ rituals, and it has often been said that he conceived the original statue as an effigy of the goddess Isis, and only later converted it to a ‘Statue of Liberty’ for New York harbour when it was rejected for the Suez Canal."

 

The goddess Isis is known by many names, including Juno.

 

Roman Godess Juno

Above: Roman Godess Juno 735 B.C. (wife of Zeus)

 

Below: Interestingly, the goddess Juno made an appearance on a Vatican coin in 1963 (notice her torch) during the period of the alleged Freemason Roncalli's Pontificate, the curiously named John XXIII, architect of the disasterous Vatican II.

 

goddess Juno

Below: Frederic Auguste Bartholdi, the Sculpture of the Statue of Liberty, on a Masonic Card (notice the Masonic compass and square).

 

Frederic Auguste Bartholdi

From another article by Bauval:

 

"The 'torch' analogy is very interesting. The original statue of Bartholdi destined first for Port Said at the mouth of the Suez Canal, was also to bear a torch intended to symbolise 'the Orient showing the way'. The 'Grand Orient', of course, is the name of the French Masonic mother lodge, and to which Bartholdi belonged. There is another similar 'torch' that played a strange role in the French Revolution, but of which I will reveal later in my forthcoming book "Talisman". It still is to be seen in the skyline of Paris today.

 

People today do not realise the power of such symbolism, and how they can be used with devastating effect on the minds of the unsuspecting masses. And this is worrying. The SS Nazi movement made prolific use of all these 'symbol games', and wreeked havoc in the world."

 

Below: "The Illuminati" Enlightening the World (and keeping the rest of us in the dark) - Pre 9-11 picture, showing WTC towers & Statue of Liberty's Torch.

 

Torch

  

Partager12

  

baphomet

 

'Baphomet'

Baphomet, the name of the severed head the Knights Templar worshiped, translates into English from Latin as 'Temple of the Father of Peace of all Men' via the reverse anagram Green Language technique known as Anastrophe [David Ovason: Author 'The Notradamus Code' and 'The Secret Zodiac's of Washington DC']. This is what the Temple of the Caananites Capital City of Salem was known as before it was captured by the tribes of Abraham, who renamed it Jerusalem.

Peeling the Occult Onion further we apply the more sophisticated Masonic/Templar/Kabbalist cryptographic method known as the Atbash Cipher to Baphomet and arrive at it's innermost meaning and translation - SOPHIA [David Ovason: Author 'The Notradamus Code' and 'The Secret Zodiac's of Washington DC'].

Sophia is often illustrated with a beard due to her having gone through the Alchemical 'Blackening' Sex Magic Ritual known as the 'Great Work' which transformed her into an immortal, all powerful Hermaphrodite.

Sophia is Astoreth/Lilith/Mari the worship of whom was secretly re-introduced by King Soloman - who Freemasonry says was their first Grand Master - against the expressed wishes of God through Moses. Ashtoreth required human burnt offerings - preferably babies of prominent families - which was performed in the Valley of Hinnom/Gehenna/Hell at the base of Mount Zion/Sion.

  

lucifera

ANNONA --- The goddess of the wheat harvest, and the deity over-seeing the grain imports from Africa. Attributes: grain stalks, prow modius, cornucopia.

 

BRITANNIA --- The personification of the British Province. Antoninus Pius issued a set of bronze coins in Rome to be circulated in Britian.

 

CERES --- The Hellenistic goddess of grain (Demeter). Depicted on bronze/brass coins to suggest a plentiful food supply to the masses. Attributes: holds grain, torch, and veiled head

 

CYBELE --- The mother of the gods, Mother earth. Also known as Magna Mater (the Great Mother). Attributes: turreted and veiled head, lions; often riding a lion-drawn cart. Titles: MAGNA MATER, MATER DEI

 

DIANA, DIANA LVCIFERA --- The Hellenistic goddess of the hunt and the moon goddess (Artemis); also the patroness of children. Attributes: crescent moon, torch, bow and arrow, hunting dog, stag. Titles: LUCIFERA (light-bringer), CONSERVATRIX, VICTRIX.

 

ISIS --- An Egyptian goddess of the underworld and the wife of Osiris, who represented the birth and death of one year. Attributes: rattle (sistrum), bucket.

 

IVNO, IVNONIS --- Juno (Hera), the consort of Jupiter, and the patroness of child birth. Attributes: peacock, scepter, patera. Titles: CONSERVATRIX, LVCINA, REGINA

 

IVNO FELIX --- Happy Juno.

 

IVNO LVCINA --- Goddess of light.

 

IVNO REGINA --- Juno the Queen.

 

IVNONI MARTIALI --- The war like Juno.

 

LIBER --- The Hellenistic goddess of wine (Bacchus/Dionysios). Attributes: wine cup, thyrsos (a staff ornamented with grape leaves), crown of ivy leaves, panther.

 

LIBERALITAS --- The personification of generosity, and frequently, an indirect reference to a specific Imperial donative to the urban population. Attributes: tessera, cornucopia.

 

LIBERTAS --- The personification of liberty. Often used by usurpers claiming to restore the liberty of the Roman Republic. Attributes: pileus (pointed hat), scepter.

 

LVNA --- An alternative manifestation of the moon goddess, as used by Julia Domna and Gallienus; more appropriately a personification of the moon.

 

MATER MAGNA --- see CYBELE

 

PAX --- The personification of peace. Attributes: olive branch, scepter, cornucopia, caduceus.

 

SALVS --- The goddess of health and safety. On the basis from an old Italic custom of pleasing the gods by sacrificing a virgin to the sacred snakes. Salus usually appears on a coin after suppression of a coup against the emperor, or when an emperor recovers from an illness. Attributes: sacrificing to snake from patera. The snake is usually rising from the altar or being held in arms.

 

SEGENTIA --- The Roman goddess of the ripening of wheat, or crops.

 

VENVS, VENERIS ---The Hellenistic goddess of love and beauty (Aphrodite). She was the patron goddess of Julius Caesar and then the Julian line (Venus Genetrix). (VENERIS is the genative form) Attributes: apple, small figure of Victory. Titles: CAELESTIS (of the skies), FELIX, GENETRIX, VICTRIX.

 

VICTORIA --- The Hellenistic goddess of Victory (Nike). Frequently appears as an attribute to other deities, such as Roma, Jupiter and Venus. Attributes: wreath, wings.

 

VVLCAN --- The Hellenistic goddess of iron, fire and wepons (Hephaistos). Attributes: hammer, tongs, anvil.

  

GLORIA NOVI SAECVLI --- The glory of the new age.

  

The Virgin is consicrated to Isis, just as Leo is consecrated to her husband Osiris... The sphinx, composed of a Lion and a Virgin, was used as a symbol to designate the overflowing Nile... they put a wheat-ear in the hand of a virgin, to express the idea of the months, perhaps because the sign of Virgin was called by the Orientals, Sounbouleh or Schibbolet, that is to say, epi or wheat ear.

 

Brother Joseph Jerome de Lalande

Founder Lodge Des Neuf Soers (Nine Sisters), Paris

Astronomie par M. de la Lande, 1731

  

Gimel, the 13th Path

 

The High Priestess

The 13th Path

Gimel

G

  

"Lucifer represents.. Life.. Thought.. Progress.. Civilization.. Liberty.. Independence.. Lucifer is the Logos.. the Serpent, the Savior." pages 171, 225, 255 (Volume II)

"It is Satan who is the God of our planet and the only God." pages 215, 216, 220, 245, 255, 533, (VI)

"The Celestial Virgin which thus becomes the Mother of Gods and Devils at one and the same time; for she is the ever-loving beneficent Deity...but in antiquity and reality Lucifer or Luciferius is the name. Lucifer is divine and terrestial Light, 'the Holy Ghost' and 'Satan' at one and the same time." page 539

Helena Petrovna Blavatsky 32°

The Secret Doctrine

  

virgo

'The Sign of Virgo'

  

The Weeping Virgin

 

'Virgo, the Weeping Virgin'

  

Masonry still retains among its emblems one of a woman weeping over a broken column, holding in her hand a branch of acacia, myrtle, or tamarisk, while Time, we are told, stands behind her combing out the ringlets of her hair. We need not repeat the vapid and trivial explanation... given, of this representation of Isis, weeping at Byblos, over the column torn from the palace of the King, that contained the body of Osiris, while Horus, the God of Time, pours ambrosia on her hair.

 

Illustrious Albert Pike 33°

Morals and Dogma, page 379

  

Sub Rosa

 

Under the Rose...

  

Gimel, the 13th Path

  

The Illuminatrix

 

'Isis'

'Mari'

'Kali'

'Ceres'

'Virgo'

'Lilith'

'Diana'

'Venus'

'Sophia'

'Ishtar'

'Hathor'

'Ostara'

'Lucifera'

'Astoreth'

'Angerona'

'Semiramis'

'Baphomet'

'Head 58m'

'The Widow'

'CAPUT LVIIIm'

'The Black Virgin'

'The Scarlet Woman'

'The Weeping Virgin'

'The Celestial Virgin'

'The Green Man's Bride'

'The Underworld Queen'

'Mystery Babylon' her name...

  

Lucifera

 

>

And upon her forehead was a name written, MYSTERY, BABYLON THE GREAT, THE MOTHER OF HARLOTS AND ABOMINATIONS OF THE EARTH...

  

Bartholdi was deeply steeped in ritual "Egyptians" and often said he designed the original statue as an effigy of the goddess Isis.The lighting of a torch with a religious intention is analogous to a prayer and always determines an energy outpouring from above.

www.freemasonrywatch.org/statue_of_liberty.html

banabila.bandcamp.com/album/more-research-from-the-same-dept

 

Include Me Out blog:

Here is Michel Banabila's future music. Yes, we know The Future is now, but he calls tracks A Giant Cyborg And Tiny Insect Drones, Cricket Robotics and Alien World, so he is thinking way ahead, as far as I know. Unless he's developed such things in his research department and been far Out There. This is what they sound like, anyway. Here is the crackle and blip of things to come. No dramatic drones of whooshing spaceships or colliding planets here. Instead, subtle tones and clicks, with occasional heavy buzzing and the drama of an intense but temporary jolt to the system. Cryptography is particularly effective, summing up the method and means by which Banabila sends his messages, like coded alien language.

 

Inactuelles Blog:

Michel Banabila, sculpteur de l'imperceptible sonore.

Musicien, artiste sonore, friand de collaborations diverses qui mélangent disciplines et styles, auteur de musiques pour des films, documentaires, chorégraphies, le néerlandais Michel Banabila a participé à plus de trente albums. Je l'ai connu grâce à son travail sur Travelog avec Machinefabriek, pseudonyme de Rutger Zuydervelt, autre musicien important de la scène électronique néerlandaise. Avec More research from the same dept., il rompt clairement avec une approche musicale encore traditionnelle, où mélodies et rythmes renvoient à une expressivité plus ou moins sentimentale.

Huit titres sans pratiquement aucun instrument, tout au plus de brefs passages de piano ou clavier sur "Tesla's lab" ou "Sunbeams", respectivement titres six et sept. Pour le reste, huit titres résolument électroniques, bruitistes : sons de réfrigérateurs, de tubes luminescents, d'objets trouvés, enregistrements divers, et, bien sûr, échantillonneur, modulateur, synthétiseurs et autres logiciels de traitement du son. On pourrait s'attendre à une musique glaciale, désincarnée. Il n'en est rien. Comme d'autres partisans de la musique électronique, expérimentale, je pense par exemple à Morton Subotnick, ou encore à Mathias Delplanque, Pierre-Yves Macé en France, il parvient à rendre passionnante son odyssée vers l'intérieur des sons du quotidien, à peine écoutés, qui peuplent notre univers. Mais ici, tout s'écoute à fort volume, c'est conseillé pour s'immerger dans ce monde étrange.

"Cricket robotics" donne le ton : des sons amplifiés, fortement stratifiés par des coupures multiples, des sons qui tourbillonnent, surgissent en grésillant, des silences, un peu comme si l'on écoutait une bande d'ondes courtes, mais tout cela orienté par la captation d'une montée inexorable de sons qui oscillent à grande vitesse, sombrent dans une sorte de trou noir démultipliant les graves, tout cela sous-tendu par des sons courbes de drones qui s'agitent sous la surface. Étonnant, et vivant ! Le titre éponyme sonne très industriel : signaux de machines qui s'entrechoquent, se mélangent..."The Magnifying Transmitter" amplifie des bruits lumineux ( si j'ose dire !), nous plaçant au cœur des émissions sonores, dans la matrice trouble des bruits plus complexes qu'on ne le pense, le tout animé par des ponctuations sourdes paradoxalement beaucoup plus fines que bien des battements techno. À nouveau, comme le premier titre "Cricket robotics" le titre suivant, "A giant cyborg and tiny insect drones" renvoie aux insectes. Ce n'est pas un hasard. Ces micro buits amplifiés nous plongent dans le monde de l'imperceptible, du minuscule, celui des vibrations élémentaires, des frictions d'ailes multiples, des montées et baisses de tension. Quelque chose se tord, s'agite entre les fréquences, une musique ténue, têtue, désireuse de venir au jour. Morceau énigmatique et superbe !

Tout le reste s'écoutera d'autant mieux que vous aurez supporté ces prolégomènes intransigeants. "Alien world" est une merveille de dentelle électronique, jouant du contraste entre fond dense de drones et sons cristallins, fins et transparents, comme irisés par une lumière rasante, avant une fin marquée par des sons percussifs graves, sourds, tandis que des poussières sonores forment un gravier mœlleux. "Tesla's lab" nous plonge dans la tourmente élémentaire des drones : on voit les planètes s'éloigner les unes des autres, les particules s'agiter dans le vide intersidéral. Car ce monde infime, c'est le même que celui des espaces cosmiques, d'une certaine manière, même si Michel Banabila s'en défend dans la présentation de sa musique, ce sont les rayonnements mutiples des astres, des corps, des particules, essentiellement comparables, l'infiniment petit consonant avec l'infiniment grand. Un piano s'invite dans ce laboratoire extraordinaire, pose des notes parcimonieuses, curieusement décalées, étrangères, dans une lumière pulsante de forces antagonistes et solidaires. Écoutez au casque, vous y serez !! "Sunbeams" rejoint les visions éthérées d'un Chas Smith, réjouira les amateurs de musique électronique ambiante : pièce plus onctueuse en raison des claviers en nappes radieuses, mais cependant également parcourue par la folie douce des mouvements de particules. Au total, une pièce enivrante, une pièce de transe lente, une des plus rythmées, envahie sur la fin par des traversées sonores crépitantes. "Cryptography" parachève cette belle trajectoire : palpitations, petits marteaux piqueurs, interrruptions, court circuits sonores, déflagrations, disent la vie secrète et merveilleuse des choses. Lumière de l'obscur, beauté des chocs et des convergences, Michel Banabila conduit un fascinant orchestre subliminal.

Un grand disque de musique électronique, expérimentale, pour les amateurs d'autres paysages sonores. (Dionys)

More art on my weblog: uair01.blogspot.com/

 

= = = = =

 

SEVEN SECRET ALPHABETS

Anthony Earnshaw

 

A very remarkable book. The replacement of a conventional capital letter at the beginning of a chapter by some kind of visual pun is as old as the illuminated book, but Earnshaw has succeeded in divorcing it from its customary aesthetic role, stripped it of any scene-setting function. His letters, comic or sinister, exist in their own right. Each image hides its secret until it finds its place. Even then it may prove evasive. The alphabets suggest an alternative reality where humour and disaster are interchangeable and the laws which govern nature are bent certainly, but only very little. An imagination in no way forced selects an apparently arbitrary image at a precise moment . . . Letters, those haphazardly invented signs, those abstract shapes we hear as sounds, take on a concrete meaning of their own.

Guardian

 

It is fair to say th at the author explores a landscape which suggests Magritte and Monty Python. The humour is austere, bleak and if not black, at least charcoal grey. As a feat of imagination the work is outstanding.

The Times Educational Supplement

 

Earnshaw has a devious, allusive, surrealist interest in letters. His imagination is full of wit; each image is a humorous vignette, an unlikely collusion of images in the form of a letter. Such shifting of context is the source of all humour. By providing a main-line to the unconscious and suggesting a revaluation of the essential symbols of which language is constituted, he makes his work compulsive and compulsory viewing.

Arts Review

 

JONATHAN CAPE

THIRTY BEDFORD SQUARE LONDON

 

by Eric Thacker and Anthony Earnshaw

MUSRUM

WINTERSOL

Corrigendum

THE ISBN FOR THE PAPERBACK EDITION OF

SEVEN SECRET ALPHABETS

BY ANTHONY EARNSHAW

SHOULD READ ISBN 022401383 I

FIRST PUBLISHED 1972

© 1972 BY ANTHONY EARNSHAW

JONATHAN CAPE LTD, 30 BEDFORD SQUARE, LONDON, WCI

ISBN 022400795 5

PRINTED AND BOUND IN GREAT BRITAIN BY

W & J MACKAY LIMITED, CHATHAM

Title:Zimmermann Telegram, 1917

 

From: Decimal File, 1910-1929, 862.20212/82A (1910-1929); General Records of the Department of State; Record Group 59; National Archives.

 

Production Date:January 19, 1917

 

This telegram, written by German Foreign Secretary Arthur Zimmermann and received by the German Ambassador to Mexico on January 19, 1917, is a coded message sent to Mexico, proposing a military alliance against the United States. The obvious threats to the United States contained in the telegram inflamed American public opinion against Germany and helped convince Congress to declare war against Germany in 1917.

 

Persistent URL: arcweb.archives.gov/arc/action/ExternalIdSearch?id=302025

 

Access Restrictions: Unrestricted

Use Restrictions: Unrestricted

My first attempt at a 'connected reading list'. I like to read factual books and often find myself jumping from one subject area to the next either through direct quotation, a reference or bibliography entry, a reviewer's comment or simply from a Google search. If you hover your mouse pointer over the photo I've added notes which are links to each title on Amazon.co.uk

 

Working up the stack we start with

- Joe McNally's The Moment It Clicks; Photography secrets from one of the world's top shooters. He takes an interesting approach and it reads somewhere between a heavily illustrated autobiography and a how-to manual and that, somehow, is a perfect combination! (I found this and the next two from Thom Hogan's excellent Nikon centric website)

 

- Light Science and Magic. So you like taking photographs? This is the book that explains all about why light itself acts the way it does.

 

- Out of the Blue, So you like taking photographs or you just enjoy being outside! Read this great book to get an understanding on the weather and its visual phenomenon.

 

- A Short History of Nearly Everything by Bill Bryson. The title says it all - A huge undertaking that Bryson pulls off with aplomb. Get some sense of scale. This should be required reading for everybody!

 

- Visual Explanations: Images and Quantities, Evidence and Narrative is my favourite book on displaying information by Tufte.

 

- Universal Principles of Design is a collection of 125 design concepts draw from a wide range of disciplines from graphic design to architecture to user-interface design.

 

- Security Engineering by Ross Anderson is THE book on the subject. Most engineers in any field spend their time trying to get things to work well, Security Engineers need to spend their time thinking about how to break things. This book looks at everything from Cash Machines to Nuclear Command and Control, Door Locks to Cryptography and reminds you that you are only as secure as the weakest link.

 

- A Pattern Language by Christopher Alexander. Despite appearances this actually has more pages than Anderson's Security tome. The title refers to a structured method of describing good design practices within Architecture, however it has been applied to numerous other fields since. If our modern era planning control adopted more of these 'patterns' we would live in far more pleasant built environs.

 

- Patterns of Home is a distillation of the domestic scale patterns suggested by Alexander et al in Pattern Language by two of the original collaborators, Silverstein and Jacobson, based on their experiences of applying them to houses over years of architectural practice.

 

- The Housebuilder's Bible by Mark Brinkley is how to Self-Build you own house in the UK.

 

- Designing a house to build inevitable brings you around to considering energy usage and supply. Sustainable Energy Without The Hot Air looks at this challenge on an individual household, national and global level, considering energy use and how to reduce it and energy supply options.

 

- A Place of My Own is the story of one man's desire to build his own space, in this case a writing studio. A fascinating narrative.

 

- Rich Dad, Poor Dad. At first and probably second glance the odd one out in this stack. It is over simplistic, over familiar, over American and a lot of what it details is common sense or should be. However the more financial titles I read the more I find myself coming back to it and re-reading it with modified perspectives.

 

- The Long and The Short of It: A Guide to Finance and Investment for Normally Intelligent People Who Aren't in the Industry is a perfect antidote to the financial services industry and mainstream press personal finance output. The book to read if you don't trust the banking and investment industry and suspect you could probably do a better job yourself. It suggests you probably can and tells you how.

Bletchley Park és un dels llocs més fascinants de la historia del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informatica i els ordinadors.

 

Vista d'una maquina Enigma model M3 de 3 rotors, emprada per l'exèrcit alemany. Posteriorment la Kriegsmarine la complicaria amb un quart rotor (model M4).

 

ca.wikipedia.org/wiki/M%c3%a0quina_Enigma

 

Aqui a sota teniu un video, en anglès sobre el seu funcionament:

 

www.youtube.com/watch?v=JJm4-lqRJDc

 

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

The Enigma M3 is the famous german cypher machine, with 3 rotors (later a 4 rotor, M4 model, was produced for the Kriegsmarine). Although it produced literally millions of millions of possible combinations, the codebreakers cracked it, with their brains, the Bombe machine, and a lof of hard work.

 

Here you have more information about Enigma, and a wonderful emulator program:

 

www.youtube.com/watch?v=JJm4-lqRJDc

 

en.wikipedia.org/wiki/Enigma_machine

 

The emulator (all the site is wonderful):

users.telenet.be/d.rijmenants/en/enigmasim.htm

 

en.wikipedia.org/wiki/Bombe

 

www.jharper.demon.co.uk/bombe1.htm

 

en.wikipedia.org/wiki/Bletchley_Park

 

www.bletchleypark.org/

 

www.bletchleypark.org/content/museum.rhtm

 

For an impresive virtual visit, take a look to these videos:

 

www.youtube.com/watch?v=ZmMFp2FQPsY

12 September 2020

 

Souvenir coffee mug from 1993 CRYPTO IACR cryptography research conference, shown with the KSD-64A "Crypto Ignition Key" that it depicts.

 

The KSD-64A Crypto Ignition Key ("CIK") is a 64K bit EEPROM chip packed in a physical key form factor with electrical contacts along each edge. It has no internal CPU or secure storage itself; it is simply a memory storage device. It was used, among other applications, to store key material for and enable calls with the NSA-designed "STU-III" secure encrypted telephone used by US Government agencies for classified voice calls. It was sometimes called the "Fisher-Price key" for its resemblance to an oversized pre-school toy key on the market at the time. It was introduced in the mid 1980's, and only discontinued in 2014.

 

Rodenstock 120mm/5.6 APO Macro Sironar lens (@f/8). Phase One IQ4-150 digital back (@ ISO 50), Cambo Ultima D monorail camera modified with servo-controlled focus. Focus stacked composite of 68 images.

 

U-505, a German submarine captured at sea by the US Navy during World War II. U-505 is one of very few German U-boats on public display, and the only one in the United States.

 

Holes remain in the superstructure from combat. The crew was abandoning the disabled submarine when a US Navy boarding party prevented it from being scuttled. Significant cryptographic equipment and information was recovered from the submarine.

 

U-505 Exhibit:

www.msichicago.org/whats-here/exhibits/u-505/

 

Museum of Science and Industry, Chicago:

www.msichicago.org

The facade of the Chanel building in Ginza is quite spectacular. Seen here with white characters in a cryptographic shuffle against a sleek black background.

 

I wish I could play breakout on it.

From Russia with love.

 

From Russia with Love is a 1963 spy film and the second in the James Bond series produced by Eon Productions, as well as Sean Connery's second role as MI6 agent James Bond. It was directed by Terence Young, produced by Albert R. Broccoli and Harry Saltzman, and written by Richard Maibaum and Johanna Harwood, based on Ian Fleming's similarly named 1957 novel. In the film, Bond is sent to assist in the defection of Soviet consulate clerk Tatiana Romanova in Turkey, where SPECTRE plans to avenge Bond's killing of Dr. No.

 

Following the success of Dr. No, United Artists greenlit a sequel and doubled the budget available for the producers. In addition to filming on location in Turkey, the action scenes were shot at Pinewood Studios, Buckinghamshire, and in Scotland. Production ran over budget and schedule, and was rushed to finish by its scheduled October 1963 release date.

 

From Russia with Love was a critical and commercial success. It took in more than $78 million in worldwide box-office receipts, far more than its $2 million budget and more than its predecessor Dr. No, thereby becoming a blockbuster in 1960s cinema.

 

This film also marked the debut of Desmond Llewelyn as Q, a role he would play for 36 years (and seventeen films) until The World Is Not Enough in 1999

 

Plot

Seeking revenge against MI6 Agent 007 James Bond for the death of their agent Dr. No in Jamaica,[N 1] international criminal organisation SPECTRE begins training agents to kill him. Irish assassin Donald "Red" Grant proves himself by quickly killing a Bond impostor with a garrote concealed in his wristwatch.

 

SPECTRE's chief planner, Czech chess grandmaster Kronsteen (Number 5), devises a plan to play British and Soviet intelligence against each other to procure a Lektor cryptography device from the Soviets and lure Bond to his assassination. SPECTRE's chief executive (Number 1) puts Rosa Klebb (Number 3), a former SMERSH (Soviet counter-intelligence) colonel, in charge of the mission. Klebb chooses Grant to protect Bond until he acquires the Lektor, then eliminate 007 and steal the machine for SPECTRE (to be eventually sold back to its legitimate owner). Klebb also recruits Tatiana Romanova, a cipher clerk at the Soviet consulate in Istanbul, who believes Klebb is still working for SMERSH.

 

In London, M informs Bond that Romanova has contacted "Station T" in Turkey, offering to defect with a top-secret Lektor on the condition that Bond handle her case personally. M decides the chance of obtaining a Lektor is worth the risk, and Q gives Bond an attaché case with concealed throwing knife, gold sovereigns, a tear gas booby trap, and an ArmaLite AR-7 sniper rifle.

 

In Istanbul, Bond meets station head Ali Kerim Bey, tailed by Bulgarian agents working for Russia, who are, in turn, tailed by Grant; he kills one agent and dumps their car outside the Soviet Consulate. The Soviets bomb Kerim's office with a limpet mine, but he is away from his desk with his mistress. He and Bond spy on a Soviet consulate meeting through a periscope in the aqueducts beneath Istanbul, and learn that Soviet agent Krilencu is responsible for the bombing. Kerim and Bond lay low at a rural gypsy settlement, where Krilencu attacks them with a band of Bulgarians; Bond is saved by a sniper shot from Grant. Bond and Kerim track down Krilencu, and Kerim kills him with Bond's rifle.

 

Bond finds Romanova in his hotel suite and they have sex, neither aware SPECTRE is filming them. Romanova brings the consulate floor plans to the Hagia Sophia, and Grant kills the other Bulgarian to ensure Bond receives them. Using the plans, Bond and Kerim steal the Lektor and escape with Romanova aboard the Orient Express. Kerim and Bond subdue a Soviet security officer named Benz tailing them. Grant kills Kerim and Benz, preventing Bond from rendezvousing with one of Kerim's men.

 

At the Belgrade station, Bond passes word of Kerim Bey's death to his son, and asks for an agent from Station Y to meet him at Zagreb. Grant kills Nash, sent from Station Y, and poses as the agent. After drugging Romanova at dinner, Grant overpowers Bond, taunting him that Romanova believed she was working for Mother Russia, and reveals his plan to leave the compromising film of Bond and Romanova with a blackmail letter, staging their deaths as a murder-suicide to scandalise the British intelligence community. Bond tricks Grant into setting off the booby trap in his attaché case and stabs him with the concealed knife before strangling him with his own garrote, and flees with Romanova in Grant's getaway truck.

 

Number 1 confronts Klebb and Kronsteen for their failure. Kronsteen is executed by the henchman Morzeny’s poison-tipped switchblade in his shoe, while Klebb is given one last chance to acquire the Lektor, which they have arranged to sell back to the Russians.

 

Following Grant's escape route, Bond destroys a SPECTRE helicopter, and he and Romanova steal Grant's boat on the Dalmatian coast. Pursued by Morzeny's squadron of SPECTRE powerboats, Bond detonates his own powerboat's fuel drums with a flare gun, engulfing the pursuers in a sea of flames.

 

He and Romanova reach a hotel in Venice, where they are attacked by Klebb, disguised as a maid. She tries to kick Bond with a poisoned switchblade shoe, but Romanova shoots her. Their mission accomplished, Bond and Romanova depart on a romantic boat ride, and Bond throws Grant's blackmail film into the canal.

  

MYK-78T ("Clipper") encryption chip, installed in an AT&T TSD-3600E Telephone Security Device, an encrypting telephone from 1993.

 

The Clipper chip was the flagship component of a controversial National Security Agency-designed "key escrow" cryptography scheme, in which intercepted encrypted traffic could be decrypted easily by law enforcement or intelligence agencies for surveillance purposes. The program was extremely controversial and, in the end, not a success. Aside from the obvious fundamental problems (the security risks of having a large database of citizen's keys, the need to implement cryptography in expensive secret hardware, etc), the Clipper architecture had technical flaws that made it possible to circumvent the escrow features and preclude the possibility of law enforcement access. (See "Protocol Failure in the Escrowed Encryption Standard" [pdf format], for details.)

 

AT&T (my employer at the time) was the first (and ultimately only) company to produce a product based on the ill-fated system. The AT&T TSD-3600, announced in 1992, was a voice encryption device designed to be installed in a standard telephone (between the phone base and the handset). Calls placed to other TSD-3600-equipped telephones could be automatically digitized and encrypted, making eavesdropping on the conversation (by legal or illegal means) effectively infeasible. When the US government learned of AT&T's plans to market the device, it worried that criminals might used them to thwart wiretaps. Plans for a new encryption system with a wiretap backdoor were hurriedly drawn up by the NSA, and AT&T was persuaded to replace the regular (non-escrowed) DES-based encryption scheme in the original TSD product with the new system, called the Clipper chip. The Clipper-based model TSD-3600E hit the market in 1993. As incentive for AT&T's cooperation, the government agreed to purchase a significant quantity of Clipper-equipped TSD-3600Es, which sold for over $1000 each in quantity.

 

Hobbled by the controversial key escrow features and the high retail price, the government ended up being the TSD's only major customer, and even most of the units they bought sat unopened in storage for over ten years. AT&T, for its part, eventually sold off the division that produced the product.

 

I'm aware of five different TSD-3600 models produced between 1992 and the product's cancellation, differing in the cipher algorithm used. The TSD-3600D was the original, using standard DES with a 56 bit key. (These were quickly recalled and disappeared from the market after Clipper was announced). The 3600F was an exportable model that used a proprietary 40 bit cipher that, I was told, was "embarassingly" weak even given the short key. The 3600P used a proprietary 56 bit cipher similar to DES (but not inter-operable with the 3600D). The 3600E was the first controversial key escrowed model, with the then-classified Skipjack cipher and key escrow features implemented on a tamper-resistant MYK-78T Clipper chip. A later model, the 3600S, included a Clipper chip but would also downgrade (or upgrade, depending on your opinion of key escrow) to the F or P ciphers when communicating with those models. All five models use a Diffie-Hellman key exchange (768 bit, if I recall correctly) to establish a session key, a 4 character hash of which is displayed on each unit's LCD. To detect "man-in-the-middle" attacks, users could verify (by voice) that their displayed hashes matched.

 

This pictures shows the 1/2 inch square MYK-78T Clipper encryption chip, as installed on the TSD-3600E main circuit board.

 

Nikkor AM-120mm/5.6, Sinar P, BetterLight Super 6K-HS. Full resolution (6000x8000) version available.

 

Disclaimer: No emulsions were harmed in the making of this image.

The SG-41 was a replacement for the Enigma, developed in 1944 and never broken by the codebreakers. Bletchley Park, August 2019.

mmkk.ktn.gv.at/EN/ausstellungen/K%C3%BCnstler_innen%20A-Z...

 

Hermann Josef PAINITZ

 

(1938-2018, Vienna, A)

 

Hermann Josef Painitz's geometric works, which follow a well-considered analysis and logic, occupy a special position in Austrian art history. The comprehensive work of the trained goldsmith, which spans more than five decades, is based on elementary basic shapes such as the circle, the sphere, the square and the cube, which interpenetrate one another, and constants such as time and space. In drawn and painted sequences, series and rhythms, the artist records temporal sequences in a specific, immobile moment. Any gestures are avoided. For example, he documents individual daily routines of himself or friends, which are reproduced in a coded visual language in the form of diagrams or organizational charts. Hermann J. Painitz expresses his logic-based thoughts artistically, starting with simple and countable forms - like notes in music - which he implements visually and geometrically. His language-related works are striking, including "Blue/Fireplace Red Fireplace Red/Blue", "Light Ochre", "Light Blue Light Blue" and "Light Gray Light Blue". Cryptographically represented words can be deciphered with the help of instructions on the picture or accompanying them. The degree of encryption varies; a simple form would be a word written backwards; in the works mentioned above, the conventional alphabet is assigned "religious symbols (various crosses), gestalt theory (silhouette of a cat), characters (undeciphered characters from different cultures, hieroglyphs), directional signs, question marks, etc.", as the artist describes it in his own words. This creates a "colorful composition that at first glance seems to lack an inner order, but in reality nevertheless follows an inner structure. In addition to this, there are concentric circles in the works - recurring in the artist's entire oeuvre - that depict mathematical laws. The artist continues the semantic and semiotic aspects from the two-dimensional level into a three-dimensional one. For his bread and hammer alphabet, he assigns different types of bread or hammer to the 26 letters and forms words with them. For example, he writes the word bread with four loaves of bread.

Detail from the Enigma machine on display at the International Spy Museum

Edgar Allan Poe (January 19, 1809 – October 7, 1849) was an American author, poet, editor and literary critic, considered part of the American Romantic Movement. Best known for his tales of mystery and the macabre, Poe was one of the earliest American practitioners of the short story and is considered the inventor of the detective fiction genre. He is further credited with contributing to the emerging genre of science fiction.

He was the first well-known American writer to try to earn a living through writing alone, resulting in a financially difficult life and career.

Poe and his works influenced literature in the United States and around the world, as well as in specialized fields, such as cosmology and cryptography. Poe and his work appear throughout popular culture in literature, music, films, and television.

-

This is a digitally colorized vintage photo painted by Max_theHitman.

   

The Mansion and Lake at Bletchley Park, home to code breakers & cryptographers whose efforts are reputed to have reduced the length of World War II by a couple of years and thus saved many thousands, if not millions, of lives.

The site has been restored to show the huts and buildings, including the Mansion (which is fabulous in its own right) where hundreds of people, predominantly women, worked to break the German Enigma & Lorenz machines. Modern day computing was, effectively, invented here via the equipment developed to assist the massive code-breaking task.

 

The door to the former cryptography room.

Die Kriegsmarine (Navy)

 

With a naval force small in numbers, but technically advanced, the German Naval High Command, in order to offset Allied Naval superiority, adopted a strategy designed to conceal as much as possible the location, intention and movement of its forces.

 

Forced by its nature to rely on radio communications, the German Navy issued to each vessel from battleship to harbor defense craft an ENIGMA cipher machine to ensure security. Here, as with other services, the dependence on ENIGMA for communications security proved to be disastrous.

 

Source National Cryptologic Museum

 

ENIGMA remains the best known German cryptographic machine of World War II.

 

From Wikipedia - A four-rotor Enigma was introduced by the Navy for U-boat traffic on 1 February 1942, called M4 (the network was known as "Triton", or "Shark" to the Allies). The extra rotor was fitted in the same space by splitting the reflector into a combination of a thin reflector and a thin fourth rotor.

 

ENIGMA cipher machine collection

 

i09_0214 094

Postcard from batch sent all the way from Texas by Angelica .

Can anybody decipher the code?

In World War II codebreakers worked in this Block translating and analysing ciphers. The work was stressful because the safety of ships bringing vital supplies to Britain depended on decrypting messages quickly. Knowledge of enemy plans enabled the British Admiralty to protect the convoys of ships crossing the Atlantic.

 

Block A, with Block B, was conceived in mid 1941 as an extension to the overcrowded wooden huts and first occupied in August 1942. They formed the first wave of purpose-built structures on the site, responding to the increased volume of decrypts and the desire to create an effective military intelligence centre. Initially it housed the both the Naval and the Air Sections. The former, on the ground floor, took on functions previously carried on in Hut 4. These included intelligence analysis of naval traffic decrypted by Hut 8, non-Enigma cryptography, crib research, and plotting. In addition, Hagelin cipher machines were installed. After analysis material was sent to the Admiralty. The Air Section, on the first floor, included the Meteorological Section (which, for instance, supplied weather forecasts which would help Coastal Command and predict the movements of U-boats and shipping), and SALU (a sub-section mainly concerned with intelligence on German bomber and reconnaissance aircraft). In mid 1943 the Air Section moved to Block F, enabling the Naval Section to take over all of Blocks A and B.

 

After the war the building - which was considerably adapted for its future uses - accommodated various bodies, notably (early 1950s-late 1970s) a teacher training college and from 1977 the Civil Aviation Authority. The latter left the site in 1993, since when the building has been the responsibility of the Bletchley Park Trust, and stood largely unoccupied for ten years. In 2004 the building was partly stripped out by the Trust to create a new exhibition space.

 

Like Block B, which is already listed, Block A's importance is principally historical, although the physical survival of the building which reflects the scale of the operation at Bletchley is important. The blocks are among the buildings which demonstrate the first instances on the site of the construction of more permanent buildings, ones moreover specifically designed for the personnel and functions which they were to house. They stand markedly in contrast to the small and temporary wooden huts they succeeded. Not only does Block A have a significant relationship to Block B, but also to the lake and landscape and to all the other wartime buildings, several of which it had close operational links with. Bletchley Park is renowned for its part in breaking the German Enigma code, and in contributing to the Allied victory (especially in the Battle of the Atlantic). Block A played an important part in this achievement from 1941 onwards. Architecturally, like Block A, Block B survives externally little altered, and its crisp and functional appearance reflects Bletchley Park's increasing scale and reliance on a large staff and complex electronic machinery. Internally much of the building retains the main components of its wartime layout, although sections of the building have been gutted. This recommendation is informed by considerable English Heritage research, cited below.

 

Bletchley Park was the central site for British (and subsequently, Allied) codebreakers during World War II. It housed the Government Code and Cypher School (GC&CS), which regularly penetrated the secret communications of the Axis Powers – most importantly the German Enigma and Lorenz ciphers. According to the official historian of British Intelligence, the "Ultra" intelligence produced at Bletchley shortened the war by two to four years, and that without it the outcome of the war would have been uncertain.

 

Located in Milton Keynes, Buckinghamshire, Bletchley Park is open to the public, and receives hundreds of thousands of visitors annually.

 

historicengland.org.uk/listing/the-list/list-entry/1391792

 

en.wikipedia.org/wiki/Bletchley_Park

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

1 2 3 5 7 ••• 79 80