View allAll Photos Tagged cryptography
2011, Mar. 25(Fri)@南海藝廊
入場時間︱19:20入場 19:30準時開始
入場費︱NT$.50
【 柔軟次攻擊 】
演出者︱ Sounds like O.range(聽起來好橘)
看起來很刺鼻
吃起來很低沈
摸起來很過飽和
聞起來很痛
聽起來好橘,創造視覺和聽覺的連串
e-Mail︱o.range.sounds.2O11@gmail.com
Website|sounds-like-orange.com/
表演簡介︱影響
人們會因為"一樣"而有歸屬感,漸漸遺忘"不一樣"的必要,為了安全,多數決將100個人變成1個人,用同一種面貌,做了同一個決定。
但100個人就該有100種樣子,就該存在一些不和諧的畫面與聲音。
演出者︱葉立傅
傅立葉轉換是一種線性的積分轉換。在物理學、聲學、光學、結構動力學、數論、組合數學、機率論、統計學、訊號處理、密碼學、海洋學、通訊等領域都有著廣泛的應用。例如在訊號處理中,傅立葉轉換的典型用途是將訊號分解成幅值分量和頻率分量。
但是你以為把狗倒過來就會變神嗎?
表演簡介︱
∞
f(x) = ∫ (A(u)*cos(ux) + B(u)*sin(ux)) du
-∞
-
Lacking Sound Festival Listen 45
2011, Mar. 25(Fri)@Nan-Hai Gallery
Entrance Time︱19:20 Starts Punctually At 19:30
Entrance Fee︱NT$.50
【 Sub-Attack but Sweet 】
Artist︱ Sounds like O.range
It looks pungent
Tastes deep as bass
Touches more than saturated
Smells pain
It sounds orange, creating a thread between sight and hearing.
e-Mail︱o.range.sounds.2O11@gmail.com
Website|soundslikeOrange.com
Performance Introduction︱ Effect
Many tend to acquire belongingness by being all alike, forgetting the necessity of being different. To feel secure, 100 people have become a single unity, disguised in the same appearance, making the same decision.
100 people should have 100 faces, conflict and discord shall exist.
Artist︱ Reiruof
Fourier transform is a mathematical operation that transforms one complex-valued function of a real variable into another. It is largely applied to physics, acoustics, optics, structural mechanics, number theory, combinatorics, probability theory, statistics, signal processing, cryptography, oceanography, communication…etc. For example, on signal processing the Fourier transform decomposes signal into amplitude and frequency.
Well, you think dog in reverse makes it God?
Performance Introduction︱
∞
f(x) = ∫ (A(u)*cos(ux) + B(u)*sin(ux)) du
-∞
-
Curator︱YAO, Chung-Han
Graphic Design︱Nat NIU
Project Manager︱Liang CHEN
指導單位︱台北市文化局
主辦單位︱失聲祭團隊 lsf-taiwan.blogspot.com/
協辦單位︱國立臺北教育大學 南海藝廊 blog.roodo.com/nanhai/
Supervised by︱ Department of Cultural Affairs Taipei City Government
Organized by︱Lacking Sound Festival Team
In Cooperation with︱National Taipei University of Education Nan-Hai Gallery
Ebers Papyrus is a cryptography project. Please see set page for further information.
|[[|_23_|]]| [] 8
This map - part patchwork quilt, part appliqué - was sewn later in life by a lady who, as a child, had grown up living in a house within the grounds of Bletchley Park during the war. You can see the track round the grounds through the eyes of a child who used to cycle around the place while the code-breakers were at their work. Apparently the security guards used to give the children security passes to get in and out, but they kept losing them, thus presenting an even greater security risk. The guards all knew them anyway, so they gave up with the passes.
Bletchley Park és un dels llocs més fascinants de la historia del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informatica i els ordinadors.
Vista interna d'una maquina 'Bombe'. La 'Bombe' fou creada per Alan Turing i Gordon Welchman a partir d'un model polonès, que permetia ajudar a desxifrar els codis de la famosa maquina Enigma del III Reich. Tot i que foren destruides totes despres de la guerra, amb molt esforç ara han pogut reconstruir-ne una, que funciona com les seves predecesores.
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
This is the back side of a Bombe machine, in Bletchley Park. The Bombe machine was a device created by Alan Turing and Gordon Welchman to help decyphering the famous german Enigma machine. Although all 'bombes' were destroyed after the war, the team in the museum has rebuilt this full-working bombe. That's why has the name "Phoenix".
www.jharper.demon.co.uk/bombe1.htm
en.wikipedia.org/wiki/Bletchley_Park
www.bletchleypark.org/content/museum.rhtm
For an impresive virtual visit, take a look to these videos:
More art on my weblog: uair01.blogspot.com/
= = = = =
SEVEN SECRET ALPHABETS
Anthony Earnshaw
A very remarkable book. The replacement of a conventional capital letter at the beginning of a chapter by some kind of visual pun is as old as the illuminated book, but Earnshaw has succeeded in divorcing it from its customary aesthetic role, stripped it of any scene-setting function. His letters, comic or sinister, exist in their own right. Each image hides its secret until it finds its place. Even then it may prove evasive. The alphabets suggest an alternative reality where humour and disaster are interchangeable and the laws which govern nature are bent certainly, but only very little. An imagination in no way forced selects an apparently arbitrary image at a precise moment . . . Letters, those haphazardly invented signs, those abstract shapes we hear as sounds, take on a concrete meaning of their own.
Guardian
It is fair to say th at the author explores a landscape which suggests Magritte and Monty Python. The humour is austere, bleak and if not black, at least charcoal grey. As a feat of imagination the work is outstanding.
The Times Educational Supplement
Earnshaw has a devious, allusive, surrealist interest in letters. His imagination is full of wit; each image is a humorous vignette, an unlikely collusion of images in the form of a letter. Such shifting of context is the source of all humour. By providing a main-line to the unconscious and suggesting a revaluation of the essential symbols of which language is constituted, he makes his work compulsive and compulsory viewing.
Arts Review
JONATHAN CAPE
THIRTY BEDFORD SQUARE LONDON
by Eric Thacker and Anthony Earnshaw
MUSRUM
WINTERSOL
Corrigendum
THE ISBN FOR THE PAPERBACK EDITION OF
SEVEN SECRET ALPHABETS
BY ANTHONY EARNSHAW
SHOULD READ ISBN 022401383 I
FIRST PUBLISHED 1972
© 1972 BY ANTHONY EARNSHAW
JONATHAN CAPE LTD, 30 BEDFORD SQUARE, LONDON, WCI
ISBN 022400795 5
PRINTED AND BOUND IN GREAT BRITAIN BY
W & J MACKAY LIMITED, CHATHAM
THE STATUE OF LIBERTY
Statue of Liberty The Statue of Liberty in New York harbour was presented in 1884 as a gift from the French Grand Orient Temple Masons to the Masons of America in celebration of the centenary of the first Masonic Republic. She is holding the Masonic "Torch of Enlightenment". Also referred to back in the 1700's by the Illuminati Masons as the "Flaming Torch of Reason". The Torch represents the "Sun" in the sky. The Statue of Liberty's official title is, "Liberty Enlightening the World". The cornerstone of the statue records how it was laid in a Masonic ceremony (see plaque photo above).
THE TORCH SYMBOL
Illuminati means to "bare light" one way to symbolize this is by carrying a torch. A torch sits on top of the Statue of Liberty, on top of JFK's grave, and on top of the tunnel where Princess Diana was killed. Best selling author, Robert Bauval:
"The cornerstone for the Statue of Liberty was placed in a solemn ceremony in 1884 organised by the Masonic lodges of New York.
The Statue of Liberty, which was designed by the French sculptor Bartholdi and actually built by the French Engineer, Gustave Eiffel (both well-known Freemasons), was not originally a ‘Statue of Liberty’ at all, but first planned by Bartholdi for the opening of the Suez Canal in Egypt in 1867.
Bartholdi, like many French Freemasons of his time, was deeply steeped in ‘Egyptian’ rituals, and it has often been said that he conceived the original statue as an effigy of the goddess Isis, and only later converted it to a ‘Statue of Liberty’ for New York harbour when it was rejected for the Suez Canal."
The goddess Isis is known by many names, including Juno.
Roman Godess Juno
Above: Roman Godess Juno 735 B.C. (wife of Zeus)
Below: Interestingly, the goddess Juno made an appearance on a Vatican coin in 1963 (notice her torch) during the period of the alleged Freemason Roncalli's Pontificate, the curiously named John XXIII, architect of the disasterous Vatican II.
goddess Juno
Below: Frederic Auguste Bartholdi, the Sculpture of the Statue of Liberty, on a Masonic Card (notice the Masonic compass and square).
Frederic Auguste Bartholdi
From another article by Bauval:
"The 'torch' analogy is very interesting. The original statue of Bartholdi destined first for Port Said at the mouth of the Suez Canal, was also to bear a torch intended to symbolise 'the Orient showing the way'. The 'Grand Orient', of course, is the name of the French Masonic mother lodge, and to which Bartholdi belonged. There is another similar 'torch' that played a strange role in the French Revolution, but of which I will reveal later in my forthcoming book "Talisman". It still is to be seen in the skyline of Paris today.
People today do not realise the power of such symbolism, and how they can be used with devastating effect on the minds of the unsuspecting masses. And this is worrying. The SS Nazi movement made prolific use of all these 'symbol games', and wreeked havoc in the world."
Below: "The Illuminati" Enlightening the World (and keeping the rest of us in the dark) - Pre 9-11 picture, showing WTC towers & Statue of Liberty's Torch.
Torch
Partager12
baphomet
'Baphomet'
Baphomet, the name of the severed head the Knights Templar worshiped, translates into English from Latin as 'Temple of the Father of Peace of all Men' via the reverse anagram Green Language technique known as Anastrophe [David Ovason: Author 'The Notradamus Code' and 'The Secret Zodiac's of Washington DC']. This is what the Temple of the Caananites Capital City of Salem was known as before it was captured by the tribes of Abraham, who renamed it Jerusalem.
Peeling the Occult Onion further we apply the more sophisticated Masonic/Templar/Kabbalist cryptographic method known as the Atbash Cipher to Baphomet and arrive at it's innermost meaning and translation - SOPHIA [David Ovason: Author 'The Notradamus Code' and 'The Secret Zodiac's of Washington DC'].
Sophia is often illustrated with a beard due to her having gone through the Alchemical 'Blackening' Sex Magic Ritual known as the 'Great Work' which transformed her into an immortal, all powerful Hermaphrodite.
Sophia is Astoreth/Lilith/Mari the worship of whom was secretly re-introduced by King Soloman - who Freemasonry says was their first Grand Master - against the expressed wishes of God through Moses. Ashtoreth required human burnt offerings - preferably babies of prominent families - which was performed in the Valley of Hinnom/Gehenna/Hell at the base of Mount Zion/Sion.
lucifera
ANNONA --- The goddess of the wheat harvest, and the deity over-seeing the grain imports from Africa. Attributes: grain stalks, prow modius, cornucopia.
BRITANNIA --- The personification of the British Province. Antoninus Pius issued a set of bronze coins in Rome to be circulated in Britian.
CERES --- The Hellenistic goddess of grain (Demeter). Depicted on bronze/brass coins to suggest a plentiful food supply to the masses. Attributes: holds grain, torch, and veiled head
CYBELE --- The mother of the gods, Mother earth. Also known as Magna Mater (the Great Mother). Attributes: turreted and veiled head, lions; often riding a lion-drawn cart. Titles: MAGNA MATER, MATER DEI
DIANA, DIANA LVCIFERA --- The Hellenistic goddess of the hunt and the moon goddess (Artemis); also the patroness of children. Attributes: crescent moon, torch, bow and arrow, hunting dog, stag. Titles: LUCIFERA (light-bringer), CONSERVATRIX, VICTRIX.
ISIS --- An Egyptian goddess of the underworld and the wife of Osiris, who represented the birth and death of one year. Attributes: rattle (sistrum), bucket.
IVNO, IVNONIS --- Juno (Hera), the consort of Jupiter, and the patroness of child birth. Attributes: peacock, scepter, patera. Titles: CONSERVATRIX, LVCINA, REGINA
IVNO FELIX --- Happy Juno.
IVNO LVCINA --- Goddess of light.
IVNO REGINA --- Juno the Queen.
IVNONI MARTIALI --- The war like Juno.
LIBER --- The Hellenistic goddess of wine (Bacchus/Dionysios). Attributes: wine cup, thyrsos (a staff ornamented with grape leaves), crown of ivy leaves, panther.
LIBERALITAS --- The personification of generosity, and frequently, an indirect reference to a specific Imperial donative to the urban population. Attributes: tessera, cornucopia.
LIBERTAS --- The personification of liberty. Often used by usurpers claiming to restore the liberty of the Roman Republic. Attributes: pileus (pointed hat), scepter.
LVNA --- An alternative manifestation of the moon goddess, as used by Julia Domna and Gallienus; more appropriately a personification of the moon.
MATER MAGNA --- see CYBELE
PAX --- The personification of peace. Attributes: olive branch, scepter, cornucopia, caduceus.
SALVS --- The goddess of health and safety. On the basis from an old Italic custom of pleasing the gods by sacrificing a virgin to the sacred snakes. Salus usually appears on a coin after suppression of a coup against the emperor, or when an emperor recovers from an illness. Attributes: sacrificing to snake from patera. The snake is usually rising from the altar or being held in arms.
SEGENTIA --- The Roman goddess of the ripening of wheat, or crops.
VENVS, VENERIS ---The Hellenistic goddess of love and beauty (Aphrodite). She was the patron goddess of Julius Caesar and then the Julian line (Venus Genetrix). (VENERIS is the genative form) Attributes: apple, small figure of Victory. Titles: CAELESTIS (of the skies), FELIX, GENETRIX, VICTRIX.
VICTORIA --- The Hellenistic goddess of Victory (Nike). Frequently appears as an attribute to other deities, such as Roma, Jupiter and Venus. Attributes: wreath, wings.
VVLCAN --- The Hellenistic goddess of iron, fire and wepons (Hephaistos). Attributes: hammer, tongs, anvil.
GLORIA NOVI SAECVLI --- The glory of the new age.
The Virgin is consicrated to Isis, just as Leo is consecrated to her husband Osiris... The sphinx, composed of a Lion and a Virgin, was used as a symbol to designate the overflowing Nile... they put a wheat-ear in the hand of a virgin, to express the idea of the months, perhaps because the sign of Virgin was called by the Orientals, Sounbouleh or Schibbolet, that is to say, epi or wheat ear.
Brother Joseph Jerome de Lalande
Founder Lodge Des Neuf Soers (Nine Sisters), Paris
Astronomie par M. de la Lande, 1731
Gimel, the 13th Path
The High Priestess
The 13th Path
Gimel
G
"Lucifer represents.. Life.. Thought.. Progress.. Civilization.. Liberty.. Independence.. Lucifer is the Logos.. the Serpent, the Savior." pages 171, 225, 255 (Volume II)
"It is Satan who is the God of our planet and the only God." pages 215, 216, 220, 245, 255, 533, (VI)
"The Celestial Virgin which thus becomes the Mother of Gods and Devils at one and the same time; for she is the ever-loving beneficent Deity...but in antiquity and reality Lucifer or Luciferius is the name. Lucifer is divine and terrestial Light, 'the Holy Ghost' and 'Satan' at one and the same time." page 539
Helena Petrovna Blavatsky 32°
The Secret Doctrine
virgo
'The Sign of Virgo'
The Weeping Virgin
'Virgo, the Weeping Virgin'
Masonry still retains among its emblems one of a woman weeping over a broken column, holding in her hand a branch of acacia, myrtle, or tamarisk, while Time, we are told, stands behind her combing out the ringlets of her hair. We need not repeat the vapid and trivial explanation... given, of this representation of Isis, weeping at Byblos, over the column torn from the palace of the King, that contained the body of Osiris, while Horus, the God of Time, pours ambrosia on her hair.
Illustrious Albert Pike 33°
Morals and Dogma, page 379
Sub Rosa
Under the Rose...
Gimel, the 13th Path
The Illuminatrix
'Isis'
'Mari'
'Kali'
'Ceres'
'Virgo'
'Lilith'
'Diana'
'Venus'
'Sophia'
'Ishtar'
'Hathor'
'Ostara'
'Lucifera'
'Astoreth'
'Angerona'
'Semiramis'
'Baphomet'
'Head 58m'
'The Widow'
'CAPUT LVIIIm'
'The Black Virgin'
'The Scarlet Woman'
'The Weeping Virgin'
'The Celestial Virgin'
'The Green Man's Bride'
'The Underworld Queen'
'Mystery Babylon' her name...
Lucifera
>
And upon her forehead was a name written, MYSTERY, BABYLON THE GREAT, THE MOTHER OF HARLOTS AND ABOMINATIONS OF THE EARTH...
Bartholdi was deeply steeped in ritual "Egyptians" and often said he designed the original statue as an effigy of the goddess Isis.The lighting of a torch with a religious intention is analogous to a prayer and always determines an energy outpouring from above.
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.
monica trenkler . . . . . . . . . . . . . . . . . . . . . . .
handmade collage on cardboard
50 x 35 cm
banabila.bandcamp.com/album/more-research-from-the-same-dept
Include Me Out blog:
Here is Michel Banabila's future music. Yes, we know The Future is now, but he calls tracks A Giant Cyborg And Tiny Insect Drones, Cricket Robotics and Alien World, so he is thinking way ahead, as far as I know. Unless he's developed such things in his research department and been far Out There. This is what they sound like, anyway. Here is the crackle and blip of things to come. No dramatic drones of whooshing spaceships or colliding planets here. Instead, subtle tones and clicks, with occasional heavy buzzing and the drama of an intense but temporary jolt to the system. Cryptography is particularly effective, summing up the method and means by which Banabila sends his messages, like coded alien language.
Inactuelles Blog:
Michel Banabila, sculpteur de l'imperceptible sonore.
Musicien, artiste sonore, friand de collaborations diverses qui mélangent disciplines et styles, auteur de musiques pour des films, documentaires, chorégraphies, le néerlandais Michel Banabila a participé à plus de trente albums. Je l'ai connu grâce à son travail sur Travelog avec Machinefabriek, pseudonyme de Rutger Zuydervelt, autre musicien important de la scène électronique néerlandaise. Avec More research from the same dept., il rompt clairement avec une approche musicale encore traditionnelle, où mélodies et rythmes renvoient à une expressivité plus ou moins sentimentale.
Huit titres sans pratiquement aucun instrument, tout au plus de brefs passages de piano ou clavier sur "Tesla's lab" ou "Sunbeams", respectivement titres six et sept. Pour le reste, huit titres résolument électroniques, bruitistes : sons de réfrigérateurs, de tubes luminescents, d'objets trouvés, enregistrements divers, et, bien sûr, échantillonneur, modulateur, synthétiseurs et autres logiciels de traitement du son. On pourrait s'attendre à une musique glaciale, désincarnée. Il n'en est rien. Comme d'autres partisans de la musique électronique, expérimentale, je pense par exemple à Morton Subotnick, ou encore à Mathias Delplanque, Pierre-Yves Macé en France, il parvient à rendre passionnante son odyssée vers l'intérieur des sons du quotidien, à peine écoutés, qui peuplent notre univers. Mais ici, tout s'écoute à fort volume, c'est conseillé pour s'immerger dans ce monde étrange.
"Cricket robotics" donne le ton : des sons amplifiés, fortement stratifiés par des coupures multiples, des sons qui tourbillonnent, surgissent en grésillant, des silences, un peu comme si l'on écoutait une bande d'ondes courtes, mais tout cela orienté par la captation d'une montée inexorable de sons qui oscillent à grande vitesse, sombrent dans une sorte de trou noir démultipliant les graves, tout cela sous-tendu par des sons courbes de drones qui s'agitent sous la surface. Étonnant, et vivant ! Le titre éponyme sonne très industriel : signaux de machines qui s'entrechoquent, se mélangent..."The Magnifying Transmitter" amplifie des bruits lumineux ( si j'ose dire !), nous plaçant au cœur des émissions sonores, dans la matrice trouble des bruits plus complexes qu'on ne le pense, le tout animé par des ponctuations sourdes paradoxalement beaucoup plus fines que bien des battements techno. À nouveau, comme le premier titre "Cricket robotics" le titre suivant, "A giant cyborg and tiny insect drones" renvoie aux insectes. Ce n'est pas un hasard. Ces micro buits amplifiés nous plongent dans le monde de l'imperceptible, du minuscule, celui des vibrations élémentaires, des frictions d'ailes multiples, des montées et baisses de tension. Quelque chose se tord, s'agite entre les fréquences, une musique ténue, têtue, désireuse de venir au jour. Morceau énigmatique et superbe !
Tout le reste s'écoutera d'autant mieux que vous aurez supporté ces prolégomènes intransigeants. "Alien world" est une merveille de dentelle électronique, jouant du contraste entre fond dense de drones et sons cristallins, fins et transparents, comme irisés par une lumière rasante, avant une fin marquée par des sons percussifs graves, sourds, tandis que des poussières sonores forment un gravier mœlleux. "Tesla's lab" nous plonge dans la tourmente élémentaire des drones : on voit les planètes s'éloigner les unes des autres, les particules s'agiter dans le vide intersidéral. Car ce monde infime, c'est le même que celui des espaces cosmiques, d'une certaine manière, même si Michel Banabila s'en défend dans la présentation de sa musique, ce sont les rayonnements mutiples des astres, des corps, des particules, essentiellement comparables, l'infiniment petit consonant avec l'infiniment grand. Un piano s'invite dans ce laboratoire extraordinaire, pose des notes parcimonieuses, curieusement décalées, étrangères, dans une lumière pulsante de forces antagonistes et solidaires. Écoutez au casque, vous y serez !! "Sunbeams" rejoint les visions éthérées d'un Chas Smith, réjouira les amateurs de musique électronique ambiante : pièce plus onctueuse en raison des claviers en nappes radieuses, mais cependant également parcourue par la folie douce des mouvements de particules. Au total, une pièce enivrante, une pièce de transe lente, une des plus rythmées, envahie sur la fin par des traversées sonores crépitantes. "Cryptography" parachève cette belle trajectoire : palpitations, petits marteaux piqueurs, interrruptions, court circuits sonores, déflagrations, disent la vie secrète et merveilleuse des choses. Lumière de l'obscur, beauté des chocs et des convergences, Michel Banabila conduit un fascinant orchestre subliminal.
Un grand disque de musique électronique, expérimentale, pour les amateurs d'autres paysages sonores. (Dionys)
12 September 2020
Souvenir coffee mug from 1993 CRYPTO IACR cryptography research conference, shown with the KSD-64A "Crypto Ignition Key" that it depicts.
The KSD-64A Crypto Ignition Key ("CIK") is a 64K bit EEPROM chip packed in a physical key form factor with electrical contacts along each edge. It has no internal CPU or secure storage itself; it is simply a memory storage device. It was used, among other applications, to store key material for and enable calls with the NSA-designed "STU-III" secure encrypted telephone used by US Government agencies for classified voice calls. It was sometimes called the "Fisher-Price key" for its resemblance to an oversized pre-school toy key on the market at the time. It was introduced in the mid 1980's, and only discontinued in 2014.
Rodenstock 120mm/5.6 APO Macro Sironar lens (@f/8). Phase One IQ4-150 digital back (@ ISO 50), Cambo Ultima D monorail camera modified with servo-controlled focus. Focus stacked composite of 68 images.
Michele Reilly is a scientist, an artist, and a systems thinker whose work resists easy classification. She trained in architecture and art at Cooper Union, where she began building intelligent machines and quickly became fascinated by the logic behind them. That curiosity drew her into mathematics, cryptography, macroeconomics, and eventually quantum physics. Her path has been shaped less by credentials than by the depth of her questions.
At MIT, where she teaches in the Department of Mechanical Engineering, Michele works at the intersection of computation and the structure of spacetime. She explores how information flows through the universe, drawing from Claude Shannon’s foundational theories and extending them into the quantum realm. Her research is ambitious, but it is rooted in careful thinking. She is not interested in speculation for its own sake. She wants to know what can be built, what can be measured, and what will last.
In 2016, she co-founded Turing, a quantum technology startup focused on building portable quantum memories and tools for long-distance quantum communication. She works closely with physicist Seth Lloyd on designing the scalable, robust systems needed to move quantum computing from theory into practice. The work is intricate and deliberate, building slowly toward a future that she sees as both beautiful and unfamiliar.
Michele is also a storyteller. Her science fiction series Steeplechase has received awards at Cannes and other international festivals. It reflects her belief that narrative and science are not separate pursuits, but parallel ways of exploring the unknown. In her teaching, she brings these strands together, guiding students through exercises that combine quantum theory, creative writing, and world-building. One of her courses, supported by MIT’s Center for Art, Science and Technology, invites students to imagine speculative futures grounded in scientific inquiry.
On her arm is a tattoo of Alan Turing. It is not ornamental. It is a quiet tribute to a thinker whose life and work continue to shape her own. Turing’s dedication to truth, structure, and the ethical weight of technology is a constant presence in her thinking. She carries it with her, quite literally.
The portrait above was made at The Interval at the Long Now Foundation in San Francisco. Michele is seated beside a polished table that reflects her image. Behind her stands the Orrery, a planetary model designed to keep time for ten thousand years. The setting reflects the spirit of her work. She is grounded in the present but always thinking forward, asking how we might live in ways that honor complexity, care, and continuity. She does not speak often about legacy. She speaks about attention, about precision, and about the discipline of staying with difficult questions until they begin to yield something real.
More art on my weblog: uair01.blogspot.com/
= = = = =
SEVEN SECRET ALPHABETS
Anthony Earnshaw
A very remarkable book. The replacement of a conventional capital letter at the beginning of a chapter by some kind of visual pun is as old as the illuminated book, but Earnshaw has succeeded in divorcing it from its customary aesthetic role, stripped it of any scene-setting function. His letters, comic or sinister, exist in their own right. Each image hides its secret until it finds its place. Even then it may prove evasive. The alphabets suggest an alternative reality where humour and disaster are interchangeable and the laws which govern nature are bent certainly, but only very little. An imagination in no way forced selects an apparently arbitrary image at a precise moment . . . Letters, those haphazardly invented signs, those abstract shapes we hear as sounds, take on a concrete meaning of their own.
Guardian
It is fair to say th at the author explores a landscape which suggests Magritte and Monty Python. The humour is austere, bleak and if not black, at least charcoal grey. As a feat of imagination the work is outstanding.
The Times Educational Supplement
Earnshaw has a devious, allusive, surrealist interest in letters. His imagination is full of wit; each image is a humorous vignette, an unlikely collusion of images in the form of a letter. Such shifting of context is the source of all humour. By providing a main-line to the unconscious and suggesting a revaluation of the essential symbols of which language is constituted, he makes his work compulsive and compulsory viewing.
Arts Review
JONATHAN CAPE
THIRTY BEDFORD SQUARE LONDON
by Eric Thacker and Anthony Earnshaw
MUSRUM
WINTERSOL
Corrigendum
THE ISBN FOR THE PAPERBACK EDITION OF
SEVEN SECRET ALPHABETS
BY ANTHONY EARNSHAW
SHOULD READ ISBN 022401383 I
FIRST PUBLISHED 1972
© 1972 BY ANTHONY EARNSHAW
JONATHAN CAPE LTD, 30 BEDFORD SQUARE, LONDON, WCI
ISBN 022400795 5
PRINTED AND BOUND IN GREAT BRITAIN BY
W & J MACKAY LIMITED, CHATHAM
A roll of the dice, a cryptographic key, the images on my photostream; if they appear random it is because we do not, will not, or can not understand the underlying explanation.
---
Created for Utata IP92 consisting of:
1 - a key
2 - a thing meant to be thrown
3 - close up
From Russia with love.
From Russia with Love is a 1963 spy film and the second in the James Bond series produced by Eon Productions, as well as Sean Connery's second role as MI6 agent James Bond. It was directed by Terence Young, produced by Albert R. Broccoli and Harry Saltzman, and written by Richard Maibaum and Johanna Harwood, based on Ian Fleming's similarly named 1957 novel. In the film, Bond is sent to assist in the defection of Soviet consulate clerk Tatiana Romanova in Turkey, where SPECTRE plans to avenge Bond's killing of Dr. No.
Following the success of Dr. No, United Artists greenlit a sequel and doubled the budget available for the producers. In addition to filming on location in Turkey, the action scenes were shot at Pinewood Studios, Buckinghamshire, and in Scotland. Production ran over budget and schedule, and was rushed to finish by its scheduled October 1963 release date.
From Russia with Love was a critical and commercial success. It took in more than $78 million in worldwide box-office receipts, far more than its $2 million budget and more than its predecessor Dr. No, thereby becoming a blockbuster in 1960s cinema.
This film also marked the debut of Desmond Llewelyn as Q, a role he would play for 36 years (and seventeen films) until The World Is Not Enough in 1999
Plot
Seeking revenge against MI6 Agent 007 James Bond for the death of their agent Dr. No in Jamaica,[N 1] international criminal organisation SPECTRE begins training agents to kill him. Irish assassin Donald "Red" Grant proves himself by quickly killing a Bond impostor with a garrote concealed in his wristwatch.
SPECTRE's chief planner, Czech chess grandmaster Kronsteen (Number 5), devises a plan to play British and Soviet intelligence against each other to procure a Lektor cryptography device from the Soviets and lure Bond to his assassination. SPECTRE's chief executive (Number 1) puts Rosa Klebb (Number 3), a former SMERSH (Soviet counter-intelligence) colonel, in charge of the mission. Klebb chooses Grant to protect Bond until he acquires the Lektor, then eliminate 007 and steal the machine for SPECTRE (to be eventually sold back to its legitimate owner). Klebb also recruits Tatiana Romanova, a cipher clerk at the Soviet consulate in Istanbul, who believes Klebb is still working for SMERSH.
In London, M informs Bond that Romanova has contacted "Station T" in Turkey, offering to defect with a top-secret Lektor on the condition that Bond handle her case personally. M decides the chance of obtaining a Lektor is worth the risk, and Q gives Bond an attaché case with concealed throwing knife, gold sovereigns, a tear gas booby trap, and an ArmaLite AR-7 sniper rifle.
In Istanbul, Bond meets station head Ali Kerim Bey, tailed by Bulgarian agents working for Russia, who are, in turn, tailed by Grant; he kills one agent and dumps their car outside the Soviet Consulate. The Soviets bomb Kerim's office with a limpet mine, but he is away from his desk with his mistress. He and Bond spy on a Soviet consulate meeting through a periscope in the aqueducts beneath Istanbul, and learn that Soviet agent Krilencu is responsible for the bombing. Kerim and Bond lay low at a rural gypsy settlement, where Krilencu attacks them with a band of Bulgarians; Bond is saved by a sniper shot from Grant. Bond and Kerim track down Krilencu, and Kerim kills him with Bond's rifle.
Bond finds Romanova in his hotel suite and they have sex, neither aware SPECTRE is filming them. Romanova brings the consulate floor plans to the Hagia Sophia, and Grant kills the other Bulgarian to ensure Bond receives them. Using the plans, Bond and Kerim steal the Lektor and escape with Romanova aboard the Orient Express. Kerim and Bond subdue a Soviet security officer named Benz tailing them. Grant kills Kerim and Benz, preventing Bond from rendezvousing with one of Kerim's men.
At the Belgrade station, Bond passes word of Kerim Bey's death to his son, and asks for an agent from Station Y to meet him at Zagreb. Grant kills Nash, sent from Station Y, and poses as the agent. After drugging Romanova at dinner, Grant overpowers Bond, taunting him that Romanova believed she was working for Mother Russia, and reveals his plan to leave the compromising film of Bond and Romanova with a blackmail letter, staging their deaths as a murder-suicide to scandalise the British intelligence community. Bond tricks Grant into setting off the booby trap in his attaché case and stabs him with the concealed knife before strangling him with his own garrote, and flees with Romanova in Grant's getaway truck.
Number 1 confronts Klebb and Kronsteen for their failure. Kronsteen is executed by the henchman Morzeny’s poison-tipped switchblade in his shoe, while Klebb is given one last chance to acquire the Lektor, which they have arranged to sell back to the Russians.
Following Grant's escape route, Bond destroys a SPECTRE helicopter, and he and Romanova steal Grant's boat on the Dalmatian coast. Pursued by Morzeny's squadron of SPECTRE powerboats, Bond detonates his own powerboat's fuel drums with a flare gun, engulfing the pursuers in a sea of flames.
He and Romanova reach a hotel in Venice, where they are attacked by Klebb, disguised as a maid. She tries to kick Bond with a poisoned switchblade shoe, but Romanova shoots her. Their mission accomplished, Bond and Romanova depart on a romantic boat ride, and Bond throws Grant's blackmail film into the canal.
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.
Michele Reilly is a scientist, an artist, and a systems thinker whose work resists easy classification. She trained in architecture and art at Cooper Union, where she began building intelligent machines and quickly became fascinated by the logic behind them. That curiosity drew her into mathematics, cryptography, macroeconomics, and eventually quantum physics. Her path has been shaped less by credentials than by the depth of her questions.
At MIT, where she teaches in the Department of Mechanical Engineering, Michele works at the intersection of computation and the structure of spacetime. She explores how information flows through the universe, drawing from Claude Shannon’s foundational theories and extending them into the quantum realm. Her research is ambitious, but it is rooted in careful thinking. She is not interested in speculation for its own sake. She wants to know what can be built, what can be measured, and what will last.
In 2016, she co-founded Turing, a quantum technology startup focused on building portable quantum memories and tools for long-distance quantum communication. She works closely with physicist Seth Lloyd on designing the scalable, robust systems needed to move quantum computing from theory into practice. The work is intricate and deliberate, building slowly toward a future that she sees as both beautiful and unfamiliar.
Michele is also a storyteller. Her science fiction series Steeplechase has received awards at Cannes and other international festivals. It reflects her belief that narrative and science are not separate pursuits, but parallel ways of exploring the unknown. In her teaching, she brings these strands together, guiding students through exercises that combine quantum theory, creative writing, and world-building. One of her courses, supported by MIT’s Center for Art, Science and Technology, invites students to imagine speculative futures grounded in scientific inquiry.
On her arm is a tattoo of Alan Turing. It is not ornamental. It is a quiet tribute to a thinker whose life and work continue to shape her own. Turing’s dedication to truth, structure, and the ethical weight of technology is a constant presence in her thinking. She carries it with her, quite literally.
The portrait above was made at The Interval at the Long Now Foundation in San Francisco. Michele is seated beside a polished table that reflects her image. Behind her stands the Orrery, a planetary model designed to keep time for ten thousand years. The setting reflects the spirit of her work. She is grounded in the present but always thinking forward, asking how we might live in ways that honor complexity, care, and continuity. She does not speak often about legacy. She speaks about attention, about precision, and about the discipline of staying with difficult questions until they begin to yield something real.
U-505, a German submarine captured at sea by the US Navy during World War II. U-505 is one of very few German U-boats on public display, and the only one in the United States.
Holes remain in the superstructure from combat. The crew was abandoning the disabled submarine when a US Navy boarding party prevented it from being scuttled. Significant cryptographic equipment and information was recovered from the submarine.
U-505 Exhibit:
www.msichicago.org/whats-here/exhibits/u-505/
Museum of Science and Industry, Chicago:
My first attempt at a 'connected reading list'. I like to read factual books and often find myself jumping from one subject area to the next either through direct quotation, a reference or bibliography entry, a reviewer's comment or simply from a Google search. If you hover your mouse pointer over the photo I've added notes which are links to each title on Amazon.co.uk
Working up the stack we start with
- Joe McNally's The Moment It Clicks; Photography secrets from one of the world's top shooters. He takes an interesting approach and it reads somewhere between a heavily illustrated autobiography and a how-to manual and that, somehow, is a perfect combination! (I found this and the next two from Thom Hogan's excellent Nikon centric website)
- Light Science and Magic. So you like taking photographs? This is the book that explains all about why light itself acts the way it does.
- Out of the Blue, So you like taking photographs or you just enjoy being outside! Read this great book to get an understanding on the weather and its visual phenomenon.
- A Short History of Nearly Everything by Bill Bryson. The title says it all - A huge undertaking that Bryson pulls off with aplomb. Get some sense of scale. This should be required reading for everybody!
- Visual Explanations: Images and Quantities, Evidence and Narrative is my favourite book on displaying information by Tufte.
- Universal Principles of Design is a collection of 125 design concepts draw from a wide range of disciplines from graphic design to architecture to user-interface design.
- Security Engineering by Ross Anderson is THE book on the subject. Most engineers in any field spend their time trying to get things to work well, Security Engineers need to spend their time thinking about how to break things. This book looks at everything from Cash Machines to Nuclear Command and Control, Door Locks to Cryptography and reminds you that you are only as secure as the weakest link.
- A Pattern Language by Christopher Alexander. Despite appearances this actually has more pages than Anderson's Security tome. The title refers to a structured method of describing good design practices within Architecture, however it has been applied to numerous other fields since. If our modern era planning control adopted more of these 'patterns' we would live in far more pleasant built environs.
- Patterns of Home is a distillation of the domestic scale patterns suggested by Alexander et al in Pattern Language by two of the original collaborators, Silverstein and Jacobson, based on their experiences of applying them to houses over years of architectural practice.
- The Housebuilder's Bible by Mark Brinkley is how to Self-Build you own house in the UK.
- Designing a house to build inevitable brings you around to considering energy usage and supply. Sustainable Energy Without The Hot Air looks at this challenge on an individual household, national and global level, considering energy use and how to reduce it and energy supply options.
- A Place of My Own is the story of one man's desire to build his own space, in this case a writing studio. A fascinating narrative.
- Rich Dad, Poor Dad. At first and probably second glance the odd one out in this stack. It is over simplistic, over familiar, over American and a lot of what it details is common sense or should be. However the more financial titles I read the more I find myself coming back to it and re-reading it with modified perspectives.
- The Long and The Short of It: A Guide to Finance and Investment for Normally Intelligent People Who Aren't in the Industry is a perfect antidote to the financial services industry and mainstream press personal finance output. The book to read if you don't trust the banking and investment industry and suspect you could probably do a better job yourself. It suggests you probably can and tells you how.
Bletchley Park és un dels llocs més fascinants de la historia del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informatica i els ordinadors.
Vista d'una maquina Enigma model M3 de 3 rotors, emprada per l'exèrcit alemany. Posteriorment la Kriegsmarine la complicaria amb un quart rotor (model M4).
ca.wikipedia.org/wiki/M%c3%a0quina_Enigma
Aqui a sota teniu un video, en anglès sobre el seu funcionament:
www.youtube.com/watch?v=JJm4-lqRJDc
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
The Enigma M3 is the famous german cypher machine, with 3 rotors (later a 4 rotor, M4 model, was produced for the Kriegsmarine). Although it produced literally millions of millions of possible combinations, the codebreakers cracked it, with their brains, the Bombe machine, and a lof of hard work.
Here you have more information about Enigma, and a wonderful emulator program:
www.youtube.com/watch?v=JJm4-lqRJDc
en.wikipedia.org/wiki/Enigma_machine
The emulator (all the site is wonderful):
users.telenet.be/d.rijmenants/en/enigmasim.htm
www.jharper.demon.co.uk/bombe1.htm
en.wikipedia.org/wiki/Bletchley_Park
www.bletchleypark.org/content/museum.rhtm
For an impresive virtual visit, take a look to these videos:
MYK-78T ("Clipper") encryption chip, installed in an AT&T TSD-3600E Telephone Security Device, an encrypting telephone from 1993.
The Clipper chip was the flagship component of a controversial National Security Agency-designed "key escrow" cryptography scheme, in which intercepted encrypted traffic could be decrypted easily by law enforcement or intelligence agencies for surveillance purposes. The program was extremely controversial and, in the end, not a success. Aside from the obvious fundamental problems (the security risks of having a large database of citizen's keys, the need to implement cryptography in expensive secret hardware, etc), the Clipper architecture had technical flaws that made it possible to circumvent the escrow features and preclude the possibility of law enforcement access. (See "Protocol Failure in the Escrowed Encryption Standard" [pdf format], for details.)
AT&T (my employer at the time) was the first (and ultimately only) company to produce a product based on the ill-fated system. The AT&T TSD-3600, announced in 1992, was a voice encryption device designed to be installed in a standard telephone (between the phone base and the handset). Calls placed to other TSD-3600-equipped telephones could be automatically digitized and encrypted, making eavesdropping on the conversation (by legal or illegal means) effectively infeasible. When the US government learned of AT&T's plans to market the device, it worried that criminals might used them to thwart wiretaps. Plans for a new encryption system with a wiretap backdoor were hurriedly drawn up by the NSA, and AT&T was persuaded to replace the regular (non-escrowed) DES-based encryption scheme in the original TSD product with the new system, called the Clipper chip. The Clipper-based model TSD-3600E hit the market in 1993. As incentive for AT&T's cooperation, the government agreed to purchase a significant quantity of Clipper-equipped TSD-3600Es, which sold for over $1000 each in quantity.
Hobbled by the controversial key escrow features and the high retail price, the government ended up being the TSD's only major customer, and even most of the units they bought sat unopened in storage for over ten years. AT&T, for its part, eventually sold off the division that produced the product.
I'm aware of five different TSD-3600 models produced between 1992 and the product's cancellation, differing in the cipher algorithm used. The TSD-3600D was the original, using standard DES with a 56 bit key. (These were quickly recalled and disappeared from the market after Clipper was announced). The 3600F was an exportable model that used a proprietary 40 bit cipher that, I was told, was "embarassingly" weak even given the short key. The 3600P used a proprietary 56 bit cipher similar to DES (but not inter-operable with the 3600D). The 3600E was the first controversial key escrowed model, with the then-classified Skipjack cipher and key escrow features implemented on a tamper-resistant MYK-78T Clipper chip. A later model, the 3600S, included a Clipper chip but would also downgrade (or upgrade, depending on your opinion of key escrow) to the F or P ciphers when communicating with those models. All five models use a Diffie-Hellman key exchange (768 bit, if I recall correctly) to establish a session key, a 4 character hash of which is displayed on each unit's LCD. To detect "man-in-the-middle" attacks, users could verify (by voice) that their displayed hashes matched.
This pictures shows the 1/2 inch square MYK-78T Clipper encryption chip, as installed on the TSD-3600E main circuit board.
Nikkor AM-120mm/5.6, Sinar P, BetterLight Super 6K-HS. Full resolution (6000x8000) version available.
Disclaimer: No emulsions were harmed in the making of this image.
The facade of the Chanel building in Ginza is quite spectacular. Seen here with white characters in a cryptographic shuffle against a sleek black background.
I wish I could play breakout on it.
Edgar Allan Poe (January 19, 1809 – October 7, 1849) was an American author, poet, editor and literary critic, considered part of the American Romantic Movement. Best known for his tales of mystery and the macabre, Poe was one of the earliest American practitioners of the short story and is considered the inventor of the detective fiction genre. He is further credited with contributing to the emerging genre of science fiction.
He was the first well-known American writer to try to earn a living through writing alone, resulting in a financially difficult life and career.
Poe and his works influenced literature in the United States and around the world, as well as in specialized fields, such as cosmology and cryptography. Poe and his work appear throughout popular culture in literature, music, films, and television.
-
This is a digitally colorized vintage photo painted by Max_theHitman.
The SG-41 was a replacement for the Enigma, developed in 1944 and never broken by the codebreakers. Bletchley Park, August 2019.
Title:Zimmermann Telegram, 1917
From: Decimal File, 1910-1929, 862.20212/82A (1910-1929); General Records of the Department of State; Record Group 59; National Archives.
Production Date:January 19, 1917
This telegram, written by German Foreign Secretary Arthur Zimmermann and received by the German Ambassador to Mexico on January 19, 1917, is a coded message sent to Mexico, proposing a military alliance against the United States. The obvious threats to the United States contained in the telegram inflamed American public opinion against Germany and helped convince Congress to declare war against Germany in 1917.
Persistent URL: arcweb.archives.gov/arc/action/ExternalIdSearch?id=302025
Access Restrictions: Unrestricted
Use Restrictions: Unrestricted
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.
The Mansion and Lake at Bletchley Park, home to code breakers & cryptographers whose efforts are reputed to have reduced the length of World War II by a couple of years and thus saved many thousands, if not millions, of lives.
The site has been restored to show the huts and buildings, including the Mansion (which is fabulous in its own right) where hundreds of people, predominantly women, worked to break the German Enigma & Lorenz machines. Modern day computing was, effectively, invented here via the equipment developed to assist the massive code-breaking task.
Die Kriegsmarine (Navy)
With a naval force small in numbers, but technically advanced, the German Naval High Command, in order to offset Allied Naval superiority, adopted a strategy designed to conceal as much as possible the location, intention and movement of its forces.
Forced by its nature to rely on radio communications, the German Navy issued to each vessel from battleship to harbor defense craft an ENIGMA cipher machine to ensure security. Here, as with other services, the dependence on ENIGMA for communications security proved to be disastrous.
Source National Cryptologic Museum
ENIGMA remains the best known German cryptographic machine of World War II.
From Wikipedia - A four-rotor Enigma was introduced by the Navy for U-boat traffic on 1 February 1942, called M4 (the network was known as "Triton", or "Shark" to the Allies). The extra rotor was fitted in the same space by splitting the reflector into a combination of a thin reflector and a thin fourth rotor.
ENIGMA cipher machine collection
i09_0214 094
In World War II codebreakers worked in this Block translating and analysing ciphers. The work was stressful because the safety of ships bringing vital supplies to Britain depended on decrypting messages quickly. Knowledge of enemy plans enabled the British Admiralty to protect the convoys of ships crossing the Atlantic.
Block A, with Block B, was conceived in mid 1941 as an extension to the overcrowded wooden huts and first occupied in August 1942. They formed the first wave of purpose-built structures on the site, responding to the increased volume of decrypts and the desire to create an effective military intelligence centre. Initially it housed the both the Naval and the Air Sections. The former, on the ground floor, took on functions previously carried on in Hut 4. These included intelligence analysis of naval traffic decrypted by Hut 8, non-Enigma cryptography, crib research, and plotting. In addition, Hagelin cipher machines were installed. After analysis material was sent to the Admiralty. The Air Section, on the first floor, included the Meteorological Section (which, for instance, supplied weather forecasts which would help Coastal Command and predict the movements of U-boats and shipping), and SALU (a sub-section mainly concerned with intelligence on German bomber and reconnaissance aircraft). In mid 1943 the Air Section moved to Block F, enabling the Naval Section to take over all of Blocks A and B.
After the war the building - which was considerably adapted for its future uses - accommodated various bodies, notably (early 1950s-late 1970s) a teacher training college and from 1977 the Civil Aviation Authority. The latter left the site in 1993, since when the building has been the responsibility of the Bletchley Park Trust, and stood largely unoccupied for ten years. In 2004 the building was partly stripped out by the Trust to create a new exhibition space.
Like Block B, which is already listed, Block A's importance is principally historical, although the physical survival of the building which reflects the scale of the operation at Bletchley is important. The blocks are among the buildings which demonstrate the first instances on the site of the construction of more permanent buildings, ones moreover specifically designed for the personnel and functions which they were to house. They stand markedly in contrast to the small and temporary wooden huts they succeeded. Not only does Block A have a significant relationship to Block B, but also to the lake and landscape and to all the other wartime buildings, several of which it had close operational links with. Bletchley Park is renowned for its part in breaking the German Enigma code, and in contributing to the Allied victory (especially in the Battle of the Atlantic). Block A played an important part in this achievement from 1941 onwards. Architecturally, like Block A, Block B survives externally little altered, and its crisp and functional appearance reflects Bletchley Park's increasing scale and reliance on a large staff and complex electronic machinery. Internally much of the building retains the main components of its wartime layout, although sections of the building have been gutted. This recommendation is informed by considerable English Heritage research, cited below.
Bletchley Park was the central site for British (and subsequently, Allied) codebreakers during World War II. It housed the Government Code and Cypher School (GC&CS), which regularly penetrated the secret communications of the Axis Powers – most importantly the German Enigma and Lorenz ciphers. According to the official historian of British Intelligence, the "Ultra" intelligence produced at Bletchley shortened the war by two to four years, and that without it the outcome of the war would have been uncertain.
Located in Milton Keynes, Buckinghamshire, Bletchley Park is open to the public, and receives hundreds of thousands of visitors annually.
According to the Web site www.navajocodetalkers.org, more than 400 Navajo warriors were trained to use the Navajo language to pass messages via radio during World War II.
It is the only unbroken code in modern military history. It baffled the Japanese forces of WWII. It was even indecipherable to a Navajo soldier taken prisoner and tortured on Bataan. In fact, during test evaluations, Marine cryptologists said they couldn't even transcribe the language, much less decode it.
The secret code created by the Navajo Code Talkers was a surprisingly simple marvel of cryptographic innovation. It contained native terms that were associated with specialized or commonly used military language, as well as native terms that represented the letters in the alphabet.
In cryptography, Fialka (M-125) is the name of a Cold War-era Soviet cipher machine. A rotor machine, the device uses 10 rotors, each with 30 contacts along with mechanical pins. “Fialka” means “violet” in Russian. Information regarding the machine was quite scarce until circa 2005 because the device had been kept secret.
Fialka contains a five-level paper tape reader on the right hand side at the front of the machine, and a paper tape punch and tape printing mechanism on top. The punched-card input for keying the machine is located on the left hand side.
This example is currently on display at Bletchley Park near Milton Keynes, home of the Enigma code breakers of World War II.
Blogged at www.lockergnome.com/news/2010/05/27/major-step-ahead-for-...
and emir-dynamite.tumblr.com/post/15746693388/coldwarera-in-c...
207,010 items / 1,691,050 views
I dedicate this picture and text to Dr Glenn Losack MD ..
This is Appu my friend shot a few years back in June 2003 on slide.
I have not met Appu since the time we shot him jointly at St Michaels Church Mahim.
Appu means a lot to me, he is an epitome of struggle , and once you meet him you will change your entire view of living.. on a precipice.
Living on the edge we all do..quite comfortably.
When I met Appu with Dr Glenn Losack MD he had already changed, a Muslim stubble a Muslim skull cap..
These are Appus early pictures where one saw him beyond the parameters of enforced religiosity.
Here he is human...
I have never , never asked Appu how he became limbless.
was never curious about his story , but that he existed carrying this huge burden of a torso was all that mattered..
And I am happy I am blogging this a few minutes away from my 28 th fast..I was awake till 3 am - yes letting you feel scanned memories my earliest travails and my passage into dimensional purposeful cryptography.
You dont just shoot pictures, its pictures that shoot you down, photography is a pre-destined form of creativity.. what you have to shoot you will shoot..leading a trail when others too will walk your path and shoot the same thing..
Our pictures take you away from home on the eagle spread out wings , these wings are powered by the soul of a blog..
Every picture tells you the recorded story of man.. and woman she is the epicenter of mans volcanic history.
Tom Andrews , Friar Tuck, Dread Heading, Yorrik Benn Bell Anthony Posey, Marius Muscalu, Designldg, and so many others here on Flickr..displaying a world according to Garp...
Dr Glenn Losack MD my mentor, my friend my guide and now my family.. we are one through the nature of our conjoined pictorial soul.. that adds text less poetry to a blog..
I am not much of a writer, I never was but the Blog did me in..I dont have a single poem in hand writing everything on the net..I am what I am because of my spirit that is cyberspace.
This is my 4927 Blog at Flickr for the month ending September.
And my 41910 blog in 15 months -Since I joined Flickr in June 2007.
Update
207,010 items / 1,691,045 views
Appu has disappeared I tried to find him at his usual haunts but no luck..I had given him my visiting card too just in case..
After a four year absence from etsy, I decided to open my storefront again. Specializing in lunch bag designs, I thought it'd be fun to illustrate an author series. This is one of many author portraits I plan to offer. www.etsy.com/shop/sammo