View allAll Photos Tagged cryptology
A new mural has appeared on the wall of the renovated tenement house. It is dedicated to Jan Kowalewski - a certified lieutenant colonel of the Polish Army, a mathematician, linguist and cryptologist. Founder of the cryptology and radio intelligence department in Poland after regaining independence after the First World War. He broke Soviet codes during the war with the Bolsheviks (1919), for many years he was an officer of the Second Department of the General Staff.
The mural is made with an interesting technique (it reminds me a bit of the Matrix movie). Here, the execution technique is associated with decoding the ciphers.
Artist: Nick Stull, 2023
This mural celebrates the history of Westerville. The design features three prominent historical figures: Benjamin Hanby, William Henry Fouse, and Agnes Meyer Driscoll.
On the left is Benjamin Hanby, a composer and abolitionist, who was active in the underground railroad.
In the center is William H. Fouse, the first African-American to graduate from Otterbein College. Mr. Fouse also served as a principal and supervisor of schools in Kentucky, and developed the Bluegrass Oratorical Association and the Bluegrass Athletic Association.
On the right is Agnes Meyer Driscoll, a cryptanalyst during World War I & II, who is known as the first lady of Naval Cryptology. Driscoll attended Otterbein College from 1907 to 1909, where her father also taught in the music department. Ms. Driscoll is recognized for breaking Japanese naval codes in the 1920s-40s, and introduced early machine support for cryptanalysis. She was known by her colleagues as Madame X.
20250520_141813
On episode 8 Elgindotcom is joined by JudeTruth and Dutchie Flair as he sits down to interview super stockbroker Albert Nunez to discuss his deep history in wallstreet and his transition to Cryptocurrency and the future of Crypto and technology.
340-character Zodiac cipher observations
Ngram observations
Cipher contains 25 repeated bigrams, 2 repeated trigrams, and 0 repeated quadgrams.
In a test of 1,000,000 random shuffles, 110,147 (11%) had 25 or more repeated bigrams, and the average number of repeats was 20.
In a test of 1,000,000 random shuffles, 67,573 (7%) had 2 or more repeated trigrams, and the average number of repeats was 0.4.
In a test of 1,000,000 random shuffles, 7,857 (0.8%) had at least one repeated quadgram, and the average number of repeats was 0.008.
5-gram repeating fragments study
The IOF trigram repeats in the same columns, and are spaced 8 lines apart, reminiscent of the 8-line height of each of the original 3 parts of the 408 cipher.
TODO: Multidirectional ngram study (including multiple distances, and repeating fragments)
TODO: Periodicity of repeating fragments study
Reading the cipher text from left to right and top to bottom, the longest sequence containing no repeated bigrams starts at position 168, and has length 123
TODO: periodic ngram / fragment test of individual halves of the 340 (horizontally and vertically), as well as individual "even/odd" transformations.
Unusual biases in the number of bigram repeats
Top half / bottom half bias
The lower left of the cipher text seems to contain very few repeated bigrams
The top half of the cipher text, considered on its own, contains 9 repeated bigrams. However, the bottom half of the cipher text, considered on its own, contains only 1 repeated bigram.
In 1,000,000 shuffles, only 2.4% of them had halves with a repeated bigram discrepancy as large as the one observed in the 340 (i.e., a difference of at least 8 repeated bigrams between the halves).
By contrast, the 408's top half has 17 repeated bigrams and its bottom half has 14.
Even / odd position bias
The cipher text also shows a bias in repeated bigram counts within even positions and odd positions.
If you remove all symbols that are in even-numbered positions, there are only 2 repeated bigrams.
In this case, there are also 0 repeated trigrams.
If you remove all symbols that are in odd-numbered positions, there are 10 repeated bigrams.
In this case, there are also 2 repeated trigrams.
(Illustration)
The difference in bigram repeats between both cases is 8. During shuffle tests, the difference was 8 or higher in only 2.4% of shuffles. This is the same difference and percentage found for the top half / bottom half bias.
(Distribution of repeated bigram discrepancy among shuffles)
In the unmodified 340, there is a "box corner" pattern that repeats. After removing all symbols falling on odd-numbered positions, repeating trigrams appear where the box corner patterns were observed.
In this illustration, the box corners are highlighted in green on the left. The repeating trigrams are shown on the right, highlighted in purple. Note the repeating sequence "O, half-filled square, C" that is seen in both cases.
Similar repeating patterns can be also found (illustration)
Periodic ngram bias
Consider the normal way of counting bigrams (one symbol right next to another). Let's call this "period 1" bigrams, because the symbols are one position apart. There are 25 repeating period 1 bigrams. But at other periods, there is a higher count of repeating bigrams. In fact, at period 19, there are 37 repeating bigrams. (Illustration of a small sample of repeating period 19 bigrams) (Daikon's initial observation) (Jarlve's initial observation)
Repeating period 19 bigrams highlighted in the cipher text
The same, but easier to spot when cipher is written into 19 columns
A test of 1,000,000 random shuffles suggests a 1 in 216 chance that this is happening by chance
If you look at all periods from 2 to 170, 34 of them have 25 or more repeating bigrams. In other words: 20% of other periods have equal or better repeating bigram response than period 1.
Also, if you flip the ciphertext horizontally (horizontal mirroring), a higher peak occurs at period 15, which produces 41 repeating bigrams. This is consistent with the phenomenon that normal (period 1) bigrams have more repeats when the cipher text is flipped horizontally.
A test of 1,000,000 random shuffles suggests a 1 in 12821 chance that this is happening by chance
A second peak of of 34 repeating bigrams occurs at period 29.
A third peak of 33 repeating bigrams occurs at period 100.
Plot of periodic bigram counts in normal and mirrored cipher texts (Raw data: Period, # of repeated bigrams in normal 340, # of repeated bigrams in mirrored 340)
Plot of periodic trigram counts in normal and mirrored cipher texts (Raw data: Period, # of repeated trigrams in normal 340, # of repeated trigrams in mirrored 340)
Repeated quadgrams appear only at periods 101 and 116. They do not appear when considering the mirrored ciphertext.
A repeated 5-grams appears at period 101
Bigram peaks still seem to appear even if you filter out the effects of the symbols that occur 10 or more times.
Jarlve's repeating fragment measurements seem to correlate strongly with periods 19 (normal cipher) and 15 (mirrored cipher).
Inserting a randomized column causes a 40 bigram peak to occur at period 5
TODO: Jarlve's "symbol expansion" test, higher ordered ngrams and fragments
TODO: how often does a random shuffle show a period that has repeated quadgrams/5grams?
Visualization tool showing effects of various transposition schemes on bigram/trigram/fragment counts
Period calculator - A way to visualize the relation of periods to mirrored counterparts, and the effect of untransposition on the interesting patterns (pivots, box corners, and repeating bigrams)
Repeated symbols by columns and rows
The 340 cipher has 9 rows that each contain no repeated symbols (Illustration. Rows are marked in yellow.) In 1,000,000 shuffles, no shuffled cipher text had at least 9 rows with no repeated symbols (plot of distribution) (raw data)
If you split the cipher in half with a horizontal cut in the middle, the top and bottom halves each start with 3 lines that have no repeated symbols. This symmetry is discussed in Dan Olson's analysis.
Every column contains at least one repeated symbol.
Homophone cycles
Tests of cycle significance with shuffle experiments
Longest-repeating substring search for cycles, compared to shuffles
Kasiski Examination
A Kasiski examination performed on unigrams in Z340 reveals a spike at shift of 78 (Source: Bart Wenmeckers).
The pivot patterns turn into repeating bigrams at period 39. The number 39 is exactly half of 78. And half of 39 is tantalizingly close to 19, which is the period that produces the peak number of repeating bigrams.
Application of Z408's key to Z340 results in a "plaintext" that still retains a Kasiski examination spike at shift of 78.
Among 1,000,000 random shuffles, only 0.28% of them had a spike as good or better as the one observed in Z340.
For shift values of 2 through 6, the number of repeats is unusually low (1 or 2).
Visualization of peak at shift 78 by viewing as doubles in untransposed period 78 (with pivots highlighted)
The doubles are easier to see when Z340 is transcribed to width 26
When calculating column IoC at different column widths, spikes are observed at widths 39 and 78. (Source: Bart Wenmeckers)
The "Pivots"
The 340 contains a pair of intersecting repeating trigrams. We refer to each repeating trigram as a "pivot". Illustration and analysis
The pivot patterns become repeating bigrams if you rewrite the cipher text at period 39.
When calculating column IoC at different column widths, spikes are observed at widths 39 and 78 (see Kasiski examination section above)
When numbering the cipher text from 1 to 340, the intersections of the pivot patterns fall on positions 195 and 234, which are 39 positions apart. Interestingly, 195 and 234 are both evenly divisible by 39.
Similarly, the pivot patterns become repeating bigrams if you mirror the cipher text horizontally and rewrite it at period 29.
Period 29 is the 2nd highest periodic bigram peak for the mirrored 340 (see the Periodic ngram bias section above)
In an experiment, the 340 was randomly shuffled over 41 million times. A pair of pivots that point in the same direction was only observed in about 1 in 237,000 shuffles.
In this study the 340 was shuffled and the number of repeating bigrams was fixed at a set number. Transposition was performed and pivot pairs were counted. The results show that higher bigram counts cause pivot pairs to be created more often, but they are still rare.
Other observations
Some symbols in the 340 were not in the 408's alphabet
The paper the cipher is written on contains several Fifth Avenue watermarks (here's glurk's animation to help you spot where they appear).
The first 3 symbols of the 340 do not reappear soon. It starts with "HER", and H only appears 3 other times, E only appears 2 other times. (From Duman)
In the third column, the 3 occurrences of the "R" symbol are evenly spaced, each separated by four rows. (From Wrench)
The author of the cipher does not use the forward-facing letter Q as a cipher symbol, but uses a backwards-facing Q instead. Similarly, he does not use the forward-facing letter C as a cipher symbol in the 408-character cipher, but uses a backwards-facing C instead. Why doesn't he use up all the normal alphabetic symbols before resorting to additional symbols and variations? (one possible explanation)
The first repeated symbol occurs at the 19th position. Thus the first 18 symbols contain no repeats. Coincidentally, the last 18 symbols of the 408 cipher do not form a legible solution. (From traveller1st)
The most frequently occurring symbol, +, occurs 24 times. Only once does it fall on a prime-numbered position in the cipher text (counting from 1 to 340), against expectations. Also both occurrences of the X symbol fall on prime positions against expectations. (From Dan Johnson) (TODO: Prime phobia distribution study for all symbols)
Possible schemes that increase probability of natural appearance of this phenomenon
The second most frequently occurring symbol, B, occurs 12 times. Only once does it fall on a prime-numbered position in the cipher text (counting from 1 to 340), against expectations. (From Dan Johnson)
The upper loop of the "B" symbol on line 19 column 9 is larger than the lower loop, making the symbol look disproportional and distinct from the other "B" symbols. (From Doc. Doc also speculates the symbol was original a "P" and the author corrected it by adding the bottom loop.)
The last occurrence of the "+" symbol is wider than the others. (From Doc. Doc speculates that the author "hesitated" on this symbol.)
Cipher symbols seem to get larger as the cipher goes on. Row 20 seems larger than Row 1. (From Doc. Doc speculates the author wrote the cipher from top to bottom, and was tiring.)
The backwards D at the end of the first line appears to have a dot in it.
The symbols that represent "R" in the 408 are Br.jpg and Backslash.jpg. Both symbols are missing from the 340 cipher. (Source: Wier)
The symbol '+' is frequently adjacent (in all directions, not just left/right) to the symbol 'R'. (Source: www.zodiackillersite.com/viewtopic.php?p=39791#p39791). 'B' is the 2nd most common symbol in the cipher (12 appearances), but for some reason it is adjacent to only one of the 24 '+' symbols.
The average of the position numbers for all occurrences of the '+' symbol is 171, which is only one position from the midpoint of the cipher. This suggests the + symbols are very uniformly distributed throughout the ciphertext. (Source: Jarlve)
The '+' symbol does not seem to cycle well with other symbols.
A tiny 'R' is written at the bottom right corner of the page. Similarly, information is written at the bottom right corner of a section of the 408, and the bottom right corner of the letter containing the map code.
Cycles of length 2 are biased towards odd-numbered positions in the cipher text
The 340 has 9 rows that each have no repeated symbols. By comparison, the 408 has 6. Moreover, in the 340, there are two triplets of rows that show symmetry about the vertical midpoint of the cipher text. (Image of row repeat comparisons)
A forward-K appears to be scratched out, and corrected with a backwards K symbol.
From Scott Akin: All occurrences of the "H" symbol are involved with this observation: Consider the rectangular regions formed by the corners highlighted in this illustration. Each region is exactly 80 characters in size (4x20 and 5x16), and there is symmetry to the corner symbols.
Largo's test finds that this often occurs by chance, even with random text.
From "Hayley25": Zodiac's "bus bomb letter" contains a section he highlighted which, when punctuation and spaces are removed, contains exactly 340 letters.
Running out of ideas for your 365 project? Join We're Here!.
On episode 14 Karl and Elgin are joined by Dutxhie Flair as they interview @cryptoalgorythm to discuss her background in science, computer programming, and technology. How she went from working for the government and flipping sneakers to quiting her job and instead of buying the new Yeezys to flip she decided to flip Crypto.
It's a spirited conversation between herself and Karl as she discusses her process to buying, selling, and her projections vs his approach and beliefs.
Lots of jewels and information in this episode
Now an exhibit at the National Museum of Cryptology near Baltimore, Maryland, this carved Great Seal of the United States was once on the wall of the U.S. Embassy in Moscow -- before it was found to hold a Soviet bugging device.
On episode 9 of the Cryptology Podcast Elgindotcom, Karl and Dutchie Flair sit down with former CoinDesk writer Tom Sharkey to talk about his experience at CoinDesk, his love for hiphop and what will happen first... Bitcoin hitting zero or Jay-Z paying off his debt to Live Nation.
A US Navy WAVE sets the Bombe rotors prior to a run
The US NAvy cryptanalytic Bombes had only one purpose: Determine the rotor settings used on the German cipher machine ENIGMA. Originally designed by Joseph Desch with the National Cash Register Company in Dayton, Ohio, the Bombes worked primarily against the German Navy's four-rotor ENIGMAs. Without the proper rotor settings, the messages were virtually unbreakable. The Bombes took only twenty minutes to complete a run, testing the 456,976 possible rotor settings with one wheel order. Different Bombes tried different wheel orders, and one of them would have the final correct settings. When the various U-boat settings were found, the Bombe could be switched over to work on German Army and Air Force three-rotor messages.
Source: National Cryptologic Museum
Comment on the above
The four rotor system had 26^4 or 456,976 settings whilst the theree rotor system had 26^3 or 17,756 settings. It looks like the problem scale in a linear way as it took 50 seconds to check 17,756 setting (~350 per second) while the four rotor solution in 20 minutes is ~ 380 settings per second.
I also think the designer Joseph Desch sounds like a remarkable engineer that I never heard of before.
Bombe on Wikipedia
Once the British had given the Americans the details about the bombe and its use, the US had the National Cash Register Company manufacture a great many additional bombes, which the US then used to assist in the code-breaking. These ran much faster than the British version, so fast that unlike the British model, which would freeze immediately (and ring a bell) when a possible solution was detected, the NCR model, upon detecting a possible solution, had to "remember" that setting and then reverse its rotors to back up to it (meanwhile the bell rang).
Source of following material : National Cryptologic Museum
Diagonal Board is the heart of the Bombe unit. Electrically, it has 26 rows and 26 columns of points, each with a diagonal wire connection. These wires connect each letter in a column with the same position in each row. A letter cannot plug into itself; these are known as "self-steckers." The resulting pattern is a series of diagonal lines. The purpose of the diagonal board is to eliminate the complications caused by the Enigma's plugboard. Given specific rotor settings, only certain plugboard settings can result in the proper encrypted letter. The diagonal board disproved hundreds of rotor settings, allowing for only a few possibly correct settings to result in a "strike".
Amplifier Chassis had two purposes, first to detect a hit and second to determine if it was useful. It provided the tie-in from the diagonal board, the locator, and the printer circuits.
Thyratron Chassis was the machine's memory. Since the wheels spun at such a high speed, they could not immediately stop rotating when a correct hit was detected. The Thyratron remembered where the correct hit was located and indicated when the Bombe has rewound to that position. It also told the machine when it had completed a run and gave the final stop signal.
Switch Banks tell the Bombe what plain to cipher letters to search for. Using menus sent to the Bombe deck by cryptanalysts, WAVES set each dial using special wrenches. 00 equates to the letter A and 25 to the letter Z. The dials work together in groups of two. One dial is set to the plain test letter and the other to its corresponding cipher letter as determined by cryptanalysts. There are sixteen sets of switch banks, however, only fourteen were required to complete a run. As the machine worked through the rotor settings, a correct hit was possible if the electrical path in all fourteen switch banks corresponded to each of their assigned plaintext/cipher combinations.
Wheel Banks represent the four rotors used on the German U-boat Enigma. Each column interconnects the four rotors, or commutators, in that column. The top commutator represented the fourth, or slowest, rotor on the Enigma, while the bottom wheel represented the rightmost, or fastest, rotor. The WAVES set the rotors according to the menu developed by the cryptanalysts. The first were set to 00, and each set after that corresponded to the plain/cipher link with the crib (the assumed plain test corresponding to the cipher text.) Usually this meant that each wheel bank stepped up one place from the one on its left. When the machine ran, each bottom rotor stepped forward, and the machine electrically checked to see if the assigned conditions were met. If not, as was usually the case, each bottom wheels moved one more place forward. However, the bottom commutator moved at 850 rpm, so it only took twenty minutes to complete a run of all 456,976 positions.
Printer automatically printed the information of a possible hit. When the Bombe determined that all the possible conditions had been met. it printed wheel order, rotor settings and plugboard connections.
Motor Control Chassis controlled both forward and reverse motors. The Bombe was an electromechanical machine and required a number of gauges for monitoring. It also needed a Braking Assembly to slow the forward motion when a hit was detected and to bring the machine to a full stop when a run was completed.
i09_0214 129
One of our NEWEST Podcasts, The Cryptology Podcast, brought to you by Elgin (elgindotcom) Carl (_thecivilright) and Azeem (_azeemkhan) and these gentlemen tackle an untapped lane in our busy podcast realm, which is Crypto-currency.
On episode 9 of the Cryptology Podcast Elgindotcom, Karl and Dutchie Flair sit down with former CoinDesk writer Tom Sharkey to talk about his experience at CoinDesk, his love for hiphop and what will happen first... Bitcoin hitting zero or Jay-Z paying off his debt to Live Nation.
On episode 11 Elgin and Karl sit down with college professor and lawyer Jadihel Rodriguez to discuss what type of market are we in. Bear market? Bull market? Or is it a “tiger market”? We also break down his investment techniques and utilizing the “tether” strategy.
On episode 8 Elgindotcom is joined by JudeTruth and Dutchie Flair as he sits down to interview super stockbroker Albert Nunez to discuss his deep history in wallstreet and his transition to Cryptocurrency and the future of Crypto and technology.
Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.
Aquesta de la imatge és una maquina enigma del tipus emprat per la Wehrmacht i la Luftwaffe. Es pot identificar perque els rotors de la part superior porten xifres, i no lletres com al model de la marina. Sense dubte és l'element més famós de la historia del xifratge i la criptologia.
ca.wikipedia.org/wiki/M%c3%a0quina_Enigma
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
This is a Wehrmacht & Luftwaffe model Enigma. You can identify it by the numbers in the rotors. The more famous navy Enigma (M), had letters on them. The Enigma machine is without doubt the most famous icon in the history of cryptology
www.youtube.com/watch?v=JJm4-lqRJDc
en.wikipedia.org/wiki/Enigma_machine
cryptomuseum.com/crypto/enigma/i/index.htm
The emulator (all the site is wonderful):
users.telenet.be/d.rijmenants/en/enigmasim.htm
en.wikipedia.org/wiki/Bletchley_Park
www.bletchleypark.org/content/museum.rhtm
For an impresive virtual visit, take a look to these videos:
On episode 5 Elgin and Karl sit with special guest Michelle McCormack to discuss her transition from the fashion industry to cryptocurrency. We discuss storage options to keep your cyrpto safe from hackers and her new company "Casting Coin" which is due to shake up the model Industry by cutting out the middle man aka "Agents" and utilizing BlockChain to protect models everywhere from shady people and business tatics.
--
One of our NEWEST Podcasts, The Cryptology Podcast, brought to you by Elgin (elgindotcom) Carl (_thecivilright) and Azeem (_azeemkhan) and these gentlemen tackle an untapped lane in our busy podcast realm, which is Crypto-currency.
On episode 8 Elgindotcom is joined by JudeTruth and Dutchie Flair as he sits down to interview super stockbroker Albert Nunez to discuss his deep history in wallstreet and his transition to Cryptocurrency and the future of Crypto and technology.
On episode 5 Elgin and Karl sit with special guest Michelle McCormack to discuss her transition from the fashion industry to cryptocurrency. We discuss storage options to keep your cyrpto safe from hackers and her new company "Casting Coin" which is due to shake up the model Industry by cutting out the middle man aka "Agents" and utilizing BlockChain to protect models everywhere from shady people and business tatics.
--
On episode 14 Karl and Elgin are joined by Dutxhie Flair as they interview @cryptoalgorythm to discuss her background in science, computer programming, and technology. How she went from working for the government and flipping sneakers to quiting her job and instead of buying the new Yeezys to flip she decided to flip Crypto.
It's a spirited conversation between herself and Karl as she discusses her process to buying, selling, and her projections vs his approach and beliefs.
Lots of jewels and information in this episode
Hebern Electric Code
This is the first encryption machine patented (1912) by Edward Hugh Hebern. Mr Hebern developed this while serving time as a horse thief.
On episode 14 Karl and Elgin are joined by Dutxhie Flair as they interview @cryptoalgorythm to discuss her background in science, computer programming, and technology. How she went from working for the government and flipping sneakers to quiting her job and instead of buying the new Yeezys to flip she decided to flip Crypto.
It's a spirited conversation between herself and Karl as she discusses her process to buying, selling, and her projections vs his approach and beliefs.
Lots of jewels and information in this episode
Alyssa Monks is one of the formost emerging contemporary artists in America today. Her paintings are often presented as faces behind sheets of water, whether it be steamy shower door, or within a pool of tranquility. Thoughtfully rendered, and conceptually genius, Monks' work stands alone in the world of contemporary art. Blending both realism and abstraction, Monks' paintings stop you in your tracks and leave you wanting more.
We were able to interview this talented oil artist recently and given exclusive photo access within her studio.
Read the Full Interview Here:
For more on Alyssa Monks Current Show visit David Klein Gallery:
or her personal site:
On episode 11 Elgin and Karl sit down with college professor and lawyer Jadihel Rodriguez to discuss what type of market are we in. Bear market? Bull market? Or is it a “tiger market”? We also break down his investment techniques and utilizing the “tether” strategy.
Episode 4 of Our Crypto Currency Based Podcast "Cryptology Podcast" Now Available on Soundcloud & Apple Podcast
On episode 11 Elgin and Karl sit down with college professor and lawyer Jadihel Rodriguez to discuss what type of market are we in. Bear market? Bull market? Or is it a “tiger market”? We also break down his investment techniques and utilizing the “tether” strategy.
this is the surface of a painting I have been working on for quite some time (WIP) it looks a bit like some weird exo-planet landscape formed by biology and the forces of nature
I still have quite a lot of work to do on this one before it is ready to be unveiled here on Flikr!
Peace and Nose!
/ Exo-MushroomBrain
If you look carefully, you can see a map of Greenland, North America, Central America, South America, and the Gulf of Mexico. That's called pareidolia.
Pareidolia is the tendency for perception to impose a meaningful interpretation on a nebulous stimulus, usually visual, so that one detects an object, pattern, or meaning where there is none. Pareidolia is a specific but common type of apophenia (the tendency to perceive meaningful connections between unrelated things or ideas).
Common examples include perceived images of animals, faces, or objects in cloud formations; seeing faces in inanimate objects; or lunar pareidolia like the Man in the Moon or the Moon rabbit. The concept of pareidolia may extend to include hidden messages in recorded music played in reverse or at higher- or lower-than-normal speeds, and hearing voices (mainly indistinct) or music in random noise, such as that produced by air conditioners or by fans.[3][4] Face pareidolia has also been demonstrated in rhesus macaques.[5]
Etymology
The word derives from the Greek words pará (παρά, "beside, alongside, instead [of]") and the noun eídōlon (εἴδωλον, "image, form, shape").[6]
Karl Ludwig Kahlbaum introduced the German term Pareidolie in his 1866 paper "Die Sinnesdelierien"[7] ("On Delusion of the Senses"). When Kahlbaum's paper was reviewed the following year (1867) in The Journal of Mental Science, Volume 13, Pareidolie was translated into English as "pareidolia", and noted to be synonymous with the terms "...changing hallucination, partial hallucination, [and] perception of secondary images."[8]
Link to other conditions
Pareidolia correlates with age and is frequent among patients with Parkinson's disease and dementia with Lewy bodies.[9]
Explanations
Pareidolia can cause people to interpret random images, or patterns of light and shadow, as faces.[10] A 2009 magnetoencephalography study found that objects perceived as faces evoke an early (165 ms) activation of the fusiform face area at a time and location similar to that evoked by faces, whereas other common objects do not evoke such activation. This activation is similar to a slightly faster time (130 ms) that is seen for images of real faces. The authors suggest that face perception evoked by face-like objects is a relatively early process, and not a late cognitive reinterpretation phenomenon.[11]
A functional magnetic resonance imaging (fMRI) study in 2011 similarly showed that repeated presentation of novel visual shapes that were interpreted as meaningful led to decreased fMRI responses for real objects. These results indicate that the interpretation of ambiguous stimuli depends upon processes similar to those elicited by known objects.[12]
Pareidolia was found to affect brain function and brain waves. In a 2022 study, EEG records show that responses in the frontal and occipitotemporal cortexes begin prior to when one recognizes faces and later, when they are not recognized.[13] By displaying these proactive brain waves, scientists can then have a basis for data rather than relying on self-reported sightings. [clarification needed]
These studies help to explain why people generally identify a few lines and a circle as a "face" so quickly and without hesitation. Cognitive processes are activated by the "face-like" object which alerts the observer to both the emotional state and identity of the subject, even before the conscious mind begins to process or even receive the information. A "stick figure face", despite its simplicity, can convey mood information, and be drawn to indicate emotions such as happiness or anger. This robust and subtle capability is hypothesized to be the result of natural selection favoring people most able to quickly identify the mental state, for example, of threatening people, thus providing the individual an opportunity to flee or attack preemptively.[14] This ability, though highly specialized for the processing and recognition of human emotions, also functions to determine the demeanor of wildlife.[15][self-published source?]
Pareidolia and creative thinking
Pareidolia plays a significant role in creative cognition, enabling artists and viewers to perceive novel forms and meanings in ambiguous stimuli.[16] Joanne Lee highlights that this phenomenon has been harnessed in artistic practices for centuries (Da Vinci for example).[17] The phenomenon was particularly important to surrealism, where artists like Salvador Dali, influenced by André Breton, embraced pareidolic ambiguity to challenge rationalist perceptions and provoke new ways of seeing.[18]
Examples
Mimetoliths
A more detailed photograph taken in different lighting in 2001 clarifies the "face" to be a natural rock formation.
A mimetolithic pattern is a pattern created on rocks that may come to mimic recognizable forms through the random processes of formation, weathering and erosion. A well-known example is the Face on Mars, a rock formation on Mars that resembled a human face in certain satellite photos. Most mimetoliths are much larger than the subjects they resemble, such as a cliff profile that looks like a human face.
Picture jaspers exhibit combinations of patterns, such as banding from flow or depositional patterns (from water or wind), or dendritic or color variations, resulting in what appear to be miniature scenes on a cut section, which is then used for jewelry.
Chert nodules, concretions, or pebbles may in certain cases be mistakenly identified as skeletal remains, egg fossils, or other antiquities of organic origin by amateur enthusiasts.
In the late 1970s and early 1980s, Japanese researcher Chonosuke Okamura self-published a series of reports titled Original Report of the Okamura Fossil Laboratory, in which he described tiny inclusions in polished limestone from the Silurian period (425 mya) as being preserved fossil remains of tiny humans, gorillas, dogs, dragons, dinosaurs and other organisms, all of them only millimeters long, leading him to claim, "There have been no changes in the bodies of mankind since the Silurian period... except for a growth in stature from 3.5 mm to 1,700 mm."[19][20] Okamura's research earned him an Ig Nobel Prize (a parody of the Nobel Prize) in biodiversity in 1996.[21][22]
Some sources describe various mimetolithic features on Pluto, including a heart-shaped region.[23][24][25]
Clouds
Seeing shapes in cloud patterns is another example of this phenomenon. Rogowitz and Voss (1990) showed a relationship between seeing shapes in cloud patterns and fractal dimension.[clarification needed] They varied the fractal dimension of the boundary contour from 1.2 to 1.8, and found that the lower the fractal dimension, the more likely people were to report seeing nameable shapes of animals, faces, and fantasy creatures.[26] From above, pareidolia may be perceived in satellite imagery of tropical cyclones. Notably hurricanes Matthew and Milton gained much attention for resembling a human face or skull when viewed from the side.[27]
Mars canals
Map of Martian "canals" by Percival Lowell
Main article: Martian canals
A notable example of pareidolia occurred in 1877, when observers using telescopes to view the surface of Mars thought that they saw faint straight lines, which were then interpreted by some as canals. It was theorized that the canals were possibly created by sentient beings. This created a sensation. In the next few years better photographic techniques and stronger telescopes were developed and applied, which resulted in new images in which the faint lines disappeared, and the canal theory was debunked as an example of pareidolia.[28][29]
Lunar surface
Pareidolias in the moon
Many cultures recognize pareidolic images in the disc of the full moon, including the human face known as the Man in the Moon in many Northern Hemisphere cultures[30][31] and the Moon rabbit in East Asian and indigenous American cultures.[32][33] Other cultures see a walking figure carrying a wide burden on their back,[31] including in Germanic tradition,[34] Haida mythology,[35] and Latvian mythology.[36]
Projective tests
The Rorschach inkblot test uses pareidolia in an attempt to gain insight into a person's mental state. The Rorschach is a projective test that elicits thoughts or feelings of respondents that are "projected" onto the ambiguous inkblot images.[37] Rorschach inkblots have low-fractal-dimension boundary contours, which may elicit general shape-naming behaviors, serving as vehicles for projected meanings.[26]
Banknotes
Owing to the way designs are engraved and printed, occurrences of pareidolia have occasionally been reported in banknotes.
One example is the 1954 Canadian Landscape Canadian dollar banknote series, known among collectors as the "Devil's Head" variety of the initial print runs. The obverse of the notes features what appears to be an exaggerated grinning face, formed from patterns in the hair of Queen Elizabeth II. The phenomenon generated enough attention for revised designs to be issued in 1956, which removed the effect.[38]
Literature
Renaissance authors have shown a particular interest in pareidolia. In William Shakespeare's play Hamlet, for example, Prince Hamlet points at the sky and "demonstrates" his supposed madness in this exchange with Polonius:[39][40]
HAMLET
Do you see yonder cloud that's almost in the shape of a camel?
POLONIUS
By th'Mass and 'tis, like a camel indeed.
HAMLET
Methinks it is a weasel.
POLONIUS
It is backed like a weasel.
HAMLET
Or a whale.
POLONIUS
Very like a whale.
Nathaniel Hawthorne wrote a short story called "The Great Stone Face" in which a face seen in the side of a mountain (based on the real-life The Old Man of the Mountain) is revered by a village.[41]
Art
The Jurist by Giuseppe Arcimboldo, 1566. What appears to be his face is a collection of fish and poultry, while his body is a collection of books dressed in a coat.
Salem by Sydney Curnow Vosper (1908), a painting notorious for the belief that the face of the devil was hidden in the main character's shawl
See also: Hidden face
Renaissance artists often used pareidolia in paintings and drawings: Andrea Mantegna, Leonardo da Vinci, Giotto, Hans Holbein, Giuseppe Arcimboldo, and many more have shown images—often human faces—that due to pareidolia appear in objects or clouds.[42]
In his notebooks, Leonardo da Vinci wrote of pareidolia as a device for painters, writing:
If you look at any walls spotted with various stains or with a mixture of different kinds of stones, if you are about to invent some scene you will be able to see in it a resemblance to various different landscapes adorned with mountains, rivers, rocks, trees, plains, wide valleys, and various groups of hills. You will also be able to see divers combats and figures in quick movement, and strange expressions of faces, and outlandish costumes, and an infinite number of things which you can then reduce into separate and well conceived forms.[43]
Salem, a 1908 painting by Sydney Curnow Vosper, gained notoriety due to a rumour that it contained a hidden face, that of the devil. This led many commentators to visualize a demonic face depicted in the shawl of the main figure, despite the artist's denial that any faces had deliberately been painted into the shawl.[44][45]
Surrealist artists such as Salvador Dalí would intentionally use pareidolia in their works, often in the form of a hidden face.
Architecture
Illusory woman in the Niğde Alaaddin Mosque portal
Two 13th-century edifices in Turkey display architectural use of shadows of stone carvings at the entrance. Outright pictures are avoided in Islam but tessellations and calligraphic pictures were allowed, so designed "accidental" silhouettes of carved stone tessellations became a creative escape.
Niğde Alaaddin Mosque in Niğde, Turkey (1223), with its "mukarnas" art where the shadows of three-dimensional ornamentation with stone masonry around the entrance form a chiaroscuro drawing of a woman's face with a crown and long hair appearing at a specific time, at some specific days of the year.[46][47][48]
Divriği Great Mosque and Hospital in Sivas, Turkey (1229), shows shadows of the three-dimensional ornaments of both entrances of the mosque part, to cast a giant shadow of a praying man that changes pose as the sun moves, as if to illustrate what the purpose of the building is. Another detail is the difference in the impressions of the clothing of the two shadow-men indicating two different styles, possibly to tell who is to enter through which door.[49]
Religion
Further information: Perceptions of religious imagery in natural phenomena
There have been many instances of perceptions of religious imagery and themes, especially the faces of religious figures, in ordinary phenomena. Many involve images of Jesus,[37] the Virgin Mary,[50] the word Allah,[51] or other religious phenomena: in September 2007 in Singapore, for example, a callus on a tree resembled a monkey, leading believers to pay homage to the "Monkey god" (either Sun Wukong or Hanuman) in the monkey tree phenomenon.[52]
Publicity surrounding sightings of religious figures and other surprising images in ordinary objects has spawned a market for such items on online auctions like eBay. One famous instance was a grilled cheese sandwich with the face of the Virgin Mary.[53]
During the September 11 attacks, television viewers supposedly saw the face of Satan in clouds of smoke billowing out of the World Trade Center after it was struck by the airplane.[54] Another example of face recognition pareidolia originated in the fire at Notre Dame Cathedral, when a few observers claimed to see Jesus in the flames.[55]
While attempting to validate the imprint of a crucified man on the Shroud of Turin as Jesus, a variety of objects have been described as being visible on the linen. These objects include a number of plant species, a coin with Roman numerals, and multiple insect species.[56] In an experimental setting using a picture of plain linen cloth, participants who had been told that there could possibly be visible words in the cloth, collectively saw 2 religious words. Those told that the cloth was of some religious importance saw 12 religious words, and those who were also told that it was of religious importance, but also given suggestions of possible religious words, saw 37 religious words.[57] The researchers posit that the reason the Shroud has been said to have so many different symbols and objects is because it was already deemed to have the imprint of Jesus prior to the search for symbols and other imprints in the cloth, and therefore it was simply pareidolia at work.[56]
Computer vision
Further information: Hallucination (artificial intelligence)
Given an image of jellyfish swimming, the DeepDream program can be encouraged to "see" dogs.
Pareidolia can occur in computer vision,[58] specifically in image recognition programs, in which vague clues can spuriously detect images or features. In the case of an artificial neural network, higher-level features correspond to more recognizable features, and enhancing these features brings out what the computer sees. These examples of pareidolia reflect the training set of images that the network has "seen" previously.
Striking visuals can be produced in this way, notably in the DeepDream software, which falsely detects and then exaggerates features such as eyes and faces in any image. The features can be further exaggerated by creating a feedback loop where the output is used as the input for the network. (The adjacent image was created by iterating the loop 50 times.) Additionally, the output can be modified such as slightly zooming in to create an animation of the images perspective flying through the surrealistic imagery.
Auditory
In 1971 Konstantīns Raudive wrote Breakthrough, detailing what he believed was the discovery of electronic voice phenomena (EVP). EVP has been described as auditory pareidolia.[37] Allegations of backmasking in popular music, in which a listener claims a message has been recorded backward onto a track meant to be played forward, have also been described as auditory pareidolia.[37][59] In 1995, the psychologist Diana Deutsch invented an algorithm for producing phantom words and phrases with the sounds coming from two stereo loudspeakers, one to the listener's left and the other to his right, producing a phase offset in time between the speakers. After listening for a while, phantom words and phrases suddenly emerge, and these often appear to reflect what is on the listener's mind.[60][61]
Deliberate practical use
Medical education, radiology images
Cross-section of nematode worm Ascaris
Medical educators sometimes teach medical students and resident physicians (doctors in training) to use pareidolia and patternicity to learn to recognize human anatomy on radiology imaging studies.
Examples include assessing radiographs (X-ray images) of the human vertebral spine. Patrick Foye, M.D., professor of physical medicine and rehabilitation at Rutgers University, New Jersey Medical School, has written that pareidolia is used to teach medical trainees to assess for spinal fractures and spinal malignancies (cancers).[62] When viewing spinal radiographs, normal bony anatomic structures resemble the face of an owl. (The spinal pedicles resemble an owl's eyes and the spinous process resembles an owl's beak.) But when cancer erodes the bony spinal pedicle, the radiographic appearance changes such that now that eye of the owl seems missing or closed, which is called the "winking owl sign". Another common pattern is a "Scottie dog sign" on a spinal X-ray.[63]
In 2021, Foye again published in the medical literature on this topic, in a medical journal article called "Baby Yoda: Pareidolia and Patternicity in Sacral MRI and CT Scans".[64] Here, he introduced a novel way of visualizing the sacrum when viewing MRI magnetic resonance imaging and CT scans (computed tomography scans). He noted that in certain image slices the human sacral anatomy resembles the face of "Baby Yoda" (also called Grogu), a fictional character from the television show The Mandalorian. Sacral openings for exiting nerves (sacral foramina) resemble Baby Yoda's eyes, while the sacral canal resembles Baby Yoda's mouth.[65]
In popular culture
See also: Among Us § Memes and mods
Many Internet memes about the online game Among Us exploit pareidolia, by showing everyday items (in this case, a trashcan) that look similar to characters from the game.
In January 2017, an anonymous user placed an eBay auction of a Cheeto that looked like the gorilla Harambe. Bidding began at US$11.99, but the Cheeto was eventually sold for US$99,000.[66]
Starting from 2021, an Internet meme emerged around the online game Among Us, where users presented everyday items such as dogs, statues, garbage cans, big toes, and pictures of the Boomerang Nebula that looked like the game's "crewmate" protagonists.[67][68] In May 2021, an eBay user named Tav listed a Chicken McNugget shaped like a crewmate from Among Us for online auction. The Chicken McNugget was sold for US$99,997 to an anonymous buyer.[69]
Related phenomena
A shadow person (also known as a shadow figure, shadow being or black mass) is often attributed to pareidolia. It is the perception of a patch of shadow as a living, humanoid figure, particularly as interpreted by believers in the paranormal or supernatural as the presence of a spirit or other entity.[70]
Pareidolia is also what some skeptics believe causes people to believe that they have seen ghosts.[71]
See also
Clustering illusion – Erroneously seeing patterns in randomness
Conspiracy theory – Attributing events to improbable causes (another example of apophenia)
Eigenface – Set of eigenvectors used in the computer vision problem of human face recognition
Hitler teapot – Kettle perceived to resemble Adolf Hitler
Madonna of the Toast – 2007 book about pareidolia
Mondegreen – Misinterpretation of a spoken phrase
Musical ear syndrome – similar to auditory pareidolia, but with hearing loss
Optical illusion – Visually perceived images that differ from objective reality
Perceptions of religious imagery in natural phenomena
Signal-to-noise ratio – Ratio of the desired signal to the background noise
References
"pareidolia". Lexico US English Dictionary. Oxford University Press. Archived from the original on 16 January 2020.
"pareidolia". Merriam-Webster.com Dictionary. Merriam-Webster. Retrieved 6 December 2020.
Jaekel, Philip (29 January 2017). "Why we hear voices in random noise". Nautilus. Retrieved 1 April 2017.
Bauman, Neil (9 July 2015). "Apophenia, Audio Pareidolia and Musical Ear Syndrome".
Taubert, Jessica; Wardle, Susan G.; Flessert, Molly; Leopold, David A.; Ungerleider, Leslie G. (2017). "Face Pareidolia in the Rhesus Monkey". Current Biology. 27 (16): 2505–2509.e2. Bibcode:2017CBio...27E2505T. doi:10.1016/j.cub.2017.06.075. ISSN 0960-9822. PMC 5584612. PMID 28803877.
Rosen, Rebecca J. (7 August 2012). "Pareidolia: A Bizarre Bug of the Human Mind Emerges in Computers". The Atlantic.
Kahlbaum, Karl Ludwig (1866). "Die Sinnesdelirien". Allgemeine Zeitschrift für Psychiatrie und psychisch-gerichtliche Medizin. 23: 1–86.
[1] Sibbald, M.D. "Report on the Progress of Psychological Medicine; German Psychological Literature", The Journal of Mental Science, Volume 13. 1867. p. 238
Kurumada, Kentaro; Sugiyama, Atsuhiko; Hirano, Shigeki; Yamamoto, Tatsuya; Yamanaka, Yoshitaka; Araki, Nobuyuki; Yakiyama, Masatsugu; Yoshitake, Miki; Kuwabara, Satoshi (2021). "Pareidolia in Parkinson's Disease and Multiple System Atrophy". Parkinson's Disease. 2021: 2704755. doi:10.1155/2021/2704755. ISSN 2090-8083. PMC 8572613. PMID 34754412.
Sagan, Carl (1995). The Demon-Haunted World – Science as a Candle in the Dark. New York: Random House. ISBN 978-0-394-53512-8.
Hadjikhani, Nouchine; Kveraga, Kestutis; Naik, Paulami; Ahlfors, Seppo P. (2009). "Early (M170) activation of face-specific cortex by face-like objects". NeuroReport. 20 (4): 403–07. doi:10.1097/WNR.0b013e328325a8e1. PMC 2713437. PMID 19218867.
Voss, J. L.; Federmeier, K. D.; Paller, K. A. (2012). "The Potato Chip Really Does Look Like Elvis! Neural Hallmarks of Conceptual Processing Associated with Finding Novel Shapes Subjectively Meaningful". Cerebral Cortex. 22 (10): 2354–64. doi:10.1093/cercor/bhr315. PMC 3432238. PMID 22079921.
Thome, Ina; Hohmann, Daniela M.; Zimmermann, Kristin M.; Smith, Marie L.; Kessler, Roman; Jansen, Andreas (2022). ""I Spy with my Little Eye, Something that is a Face…": A Brain Network for Illusory Face Detection". Cerebral Cortex. 32 (1): 137–157. doi:10.1093/cercor/bhab199. PMID 34322712.
Svoboda, Elizabeth (13 February 2007). "Facial Recognition – Brain – Faces, Faces Everywhere". The New York Times. Retrieved 3 July 2010.
"Dog Tips – Emotions in Canines and Humans". Partnership for Animal Welfare. Archived from the original on 17 November 2015. Retrieved 3 July 2010.
Bellemare‐Pepin, Antoine; Jerbi, Karim (24 December 2024). "Divergent Perception: Framing Creative Cognition Through the Lens of Sensory Flexibility". The Journal of Creative Behavior. doi:10.1002/jocb.1525. ISSN 0022-0175.
Lee, Joanne (2016). I See Faces: popular pareidolia and the proliferation of meaning. In Materiality and Popular Culture. Routledge. pp. 105–118. ISBN 9780367878177.
Breton, André (1978). Rosemont, Franklin (ed.). What is surrealism? selected writings. New York: Monad. ISBN 978-0-87348-822-8.
Spamer, E. "Chonosuke Okamura, Visionary". Philadelphia: Academy of Natural Sciences. Archived from the original on 18 November 2015. Retrieved 11 August 2008. archived at Improbable Research.
Berenbaum, May (2009). The earwig's tail: a modern bestiary of multi-legged legends. Harvard University Press. pp. 72–73. ISBN 978-0-674-03540-9.
Abrahams, Marc (16 March 2004). "Tiny tall tales: Marc Abrahams uncovers the minute, but astonishing, evidence of our fossilised past". The Guardian. London.
Conner, Susan; Kitchen, Linda (2002). Science's most wanted: the top 10 book of outrageous innovators, deadly disasters, and shocking discoveries. Brassey's. p. 93. ISBN 978-1-57488-481-4.
Miller, Ross (14 July 2015). "Pluto the dog can, like, totally be seen on Pluto the dwarf planet". The Verge. Retrieved 30 July 2020.
"Pluto's icy heart makes winds blow | EarthSky.org". earthsky.org. 9 February 2020. Retrieved 30 July 2020.
Gary (15 July 2015). "Pluto annotated (by xkcd)". D Gary Grady. Retrieved 30 July 2020.
Rogowitz, Bernice E.; Voss, R. (1 October 1990). Rogowitz, Bernice E.; Allebach, Jan P. (eds.). "Shape perception and low-dimension fractal boundary contours". Human Vision and Electronic Imaging: Models, Methods, and Applications. 1249. SPIE: 387–394. doi:10.1117/12.19691. S2CID 120313118.
Keller, Erin (9 October 2024). "Hurricane Milton Satellite Image Shows 'Creepy' Skull Shape". Newsweek. Retrieved 19 November 2024.
[2] Kitchin, C. R. Astrophysical Techniques, Sixth Edition. Taylor & Francis (2013). ISBN 9781466511156 p. 3
Lane, K. Maria. Geographies of Mars: Seeing and Knowing the Red Planet. University of Chicago Press (2011). p. 52-63. ISBN 9780226470788
Harley, Timothy (1885). Moon Lore, London; Swan Sonnenschein, Le Bas & Lowry. p. 21.
Evans, Ben (2010). Foothold in the Heavens: The Seventies. Springer Science & Business Media. p. 143. ISBN 1441963421.
Xueting Christine Ni (2018). From Kuan Yin to Chairman Mao: The Essential Guide to Chinese Deities. Red Wheel/Weiser. pp. 40–43. ISBN 1578636256.
Smith, Michael (2012). The Aztecs (3rd ed.). Chichester, West Sussex; Malden, MA: John Wiley & Sons. p. 200. ISBN 978-1-4051-9497-6.
Baring-Gould, Sabine. "The Man in the Moon", Curious Myths of the Middle Ages, London. Rivington's, 1877, p. 190Public Domain This article incorporates text from this source, which is in the public domain.
Harrison, Charles (c. 1884). The Hydah mission, Queen Charlotte's Islands. An account of the mission and people, with a descriptive letter from the Rev. Charles Harrison. p. 20 – via University of British Columbia Library.
Šmits, Pēteris (1936). "Latvian folktales and legends (Latviešu pasakas un teikas) Vol. 13". Latviešu valodas resursi. Valters un Rapa. Retrieved 27 October 2023. "Legends from 8 to 14 cover different variations of this legend. (Latvian language only)"
Zusne, Leonard; Jones, Warren H (1989). Anomalistic Psychology: A Study of Magical Thinking. Lawrence Erlbaum Associates. pp. 77–79. ISBN 978-0-8058-0508-6. Retrieved 6 April 2007.
"1954 series". www.bankofcanada.ca. Retrieved 29 June 2023.
Shakespeare, William. Hamlet. 3.3.367-73
Raber, Karen. Shakespeare and Posthumanist Theory. Arden Shakespeare (2018) pp. 80–1 ISBN 978-1474234436
Hawthorne, Nathaniel (1850). The Great Stone Face.
Raber, Karen. Shakespeare and Posthumanist Theory. Arden Shakespeare (2018) pp. 81–2 ISBN 978-1474234436
Da Vinci, Leonardo (1923). John, R; Don Read, J (eds.). "Note-Books Arranged And Rendered Into English". Empire State Book Co.
"Nostalgic image still fascinates, a hundred years on". Wales Online. Media Wales Ltd. 15 October 2010.
"Salem painting memories on show at Gwynedd Museum". BBC Wales News. BBC. 29 June 2013.
"Niğde Alaaddin Camii 'nin Kapısındaki Kadın Silüetinin Sırrı?". Nevşehir Kentrehberim (in Turkish). 2011. Retrieved 21 April 2019.
"Camiler, ALÂEDDİN CAMİ". Kültür ve Turizm Bakanlığı (in Turkish). Retrieved 21 April 2019.
"HISTORICAL MONUMENTS OF NIGDE". World Heritage Academy. 2013. Archived from the original on 14 May 2021. Retrieved 21 April 2019.
"DİVRİĞİ ULU CAMİİ'NDE 'NAMAZ KILAN İNSAN' SİLÜETİ". Haberler (in Turkish). 14 July 2014. Archived from the original on 22 December 2015. Retrieved 21 April 2019.
Schweber, Nate (23 July 2012). "In New Jersey, a Knot in a Tree Trunk Draws the Faithful and the Skeptical". The New York Times. p. 16. Retrieved 21 April 2019.
Ibrahim, Yahaya (2 January 2011). "In Maiduguri, a tree with engraved name of God turns spot to a Mecca of sorts". Sunday Trust. Abuja. Archived from the original on 4 November 2012. Retrieved 21 March 2012.
Ng, Hui Hui (13 September 2007). "Monkey See, Monkey Do?". The New Paper. pp. 12–13. Archived from the original on 14 October 2007. Retrieved 21 April 2019.
"'Virgin Mary' toast fetches $28,000". BBC News. BBC. 23 November 2004. Retrieved 27 October 2006.
Emery, David (2 September 2018). "Does the Devil's Face Appear in the Smoke on 9/11?". ThoughtCo. Archived from the original on 21 April 2019. Retrieved 21 April 2019.
Moye, David (17 April 2019). "People Claim To See Jesus In Flames Engulfing Notre Dame Cathedral". Huffington Post. Retrieved 21 April 2019 – via Yahoo! Lifestyle.
Sheen, Mercedes; Jordan, Timothy R. (July 2016). "Believing is Seeing: A Perspective on Perceiving Images of Objects on the Shroud of Turin". Archive for the Psychology of Religion. 38 (2): 232–251. doi:10.1163/15736121-12341320. ISSN 0084-6724. S2CID 147803332.
Sheen, Mercedes; Jordan, Timothy R. (December 2015). "Effects of Contextual Information on Seeing Pareidolic Religious Inscriptions on an Artifact: Implications for the Shroud of Turin". Perception. 44 (12): 1427–1430. doi:10.1177/0301006615607156. ISSN 0301-0066. PMID 26562867. S2CID 27845771.
Chalup, Stephan K., Kenny Hong, and Michael J. Ostwald. "Simulating pareidolia of faces for architectural image analysis." brain 26.91 (2010): 100.
Vokey, John R.; Read, J. Don (1985). "Subliminal messages: Between the devil and the media". American Psychologist. 40 (11): 1231–9. doi:10.1037/0003-066X.40.11.1231. PMID 4083611. S2CID 15819412.
Deutsch, D. (1995). "Musical Illusions and Paradoxes". Philomel Records.
Deutsch, D. (2003). "Phantom Words and Other Curiosities". Philomel Records.
Foye, P; Abdelshahed, D; Patel, S (July 2014). "Musculoskeletal pareidolia in medical education". The Clinical Teacher. 11 (4): 251–3. doi:10.1111/tct.12143. PMID 24917091. S2CID 206318208.
Hacking, Craig (28 October 2020). "Scottie dog sign (spine)". radiopedia.com. Retrieved 2 November 2021.
Foye, PM; Koger, TJ; Massey, HR (February 2021). "Baby Yoda: Pareidolia and Patternicity in Sacral MRI and CT Scans". PM&R: The Journal of Injury, Function, and Rehabilitation. 13 (2): 217–218. doi:10.1002/pmrj.12496. PMID 32969166. S2CID 221887340.
Foye, Patrick (20 February 2021). "Baby Yoda: Pareidolia and Patternicity in Sacral MRI and CT Scans | Tailbone Doctor". tailbonedoctor.com. Retrieved 21 February 2021.
"Burbank man sells Harambe-shaped Cheeto for nearly $100K on eBay". ABC7. KABC Television LLC. ABC News. 8 February 2017. Retrieved 16 August 2023.
Kennedy, Victoria Phillips (18 April 2021). "Among Us Everywhere: Things That Look Like Among Us Crewmates". Screen Rant. Retrieved 16 August 2023.
Adams, Robert N. (8 February 2022). "The Coldest Spot in Space Looks Like an Among Us Crewmate". TechRaptor. Retrieved 16 August 2023.
Kooser, Amanda (3 June 2021). "McDonald's chicken nugget shaped like Among Us crewmate fetching $100,000 on eBay". CNET. Red Ventures. Archived from the original on 3 February 2023. Retrieved 24 January 2023.
Ahlquist, Diane (2007). The Complete Idiot's Guide to Life After Death. US: Penguin Group. p. 122. ISBN 978-1-59257-651-7.
Carroll, Robert Todd (June 2001). "pareidolia". skepdic.com. Retrieved 19 September 2007.
External links
Look up pareidolia in Wiktionary, the free dictionary.
Pareidolia
at Wikipedia's sister projects
Definitions from Wiktionary
Media from Commons
Data from Wikidata
Skepdic.com Skeptic's Dictionary definition of pareidolia
A Japanese museum of rocks which look like faces
Article in The New York Times, 13 February 2007, about cognitive science of face recognition
Article in Scientific American, 25 March 2022, "Does This Look like a Face to You?"
vte
Hidden messages
Main
Subliminal message
Audio
Backmasking
list Hidden track
list pregap list Phonetic reversal Reverse speech
Numeric
Chronogram Numerology Theomatics Bible code Cryptology
Visual
Fnord Hidden text Paranoiac-critical method Pareidolia Psychorama Sacred geometry Steganography Visual cryptography
Other
Apophenia Asemic writing Clustering illusion Cryptic crossword
Anagram Easter egg Observer-expectancy effect Pattern recognition Palindrome Simulacrum Synchronicity Unconscious mind
Categories:
Pareidolia1860s neologismsAuditory illusionsCognitive biasesOptical illusionsVisual perception
One of our NEWEST Podcasts, The Cryptology Podcast, brought to you by Elgin (elgindotcom) Carl (_thecivilright) and Azeem (_azeemkhan) and these gentlemen tackle an untapped lane in our busy podcast realm, which is Crypto-currency.
Chapter 1: Dani s’ Introduction to Harappan Ciphers
Ahmad Hasan Dani , Nazeer Ahmad Chaudhry , Sony
Section 1.1: Sample Draft
Section2.2:Pre-Historical Perspective
Section2.3:Pre- Harappan Culture.
Section2.4:Harappan Culture
Section2.5:Harappan Civilization
Section2.6: Confirmation of Conclusions
Section2.7:Terminal Symbols
Section2.8: Bibliography
Summary | Full Text: PDF (Size: 3924K)
Chapter1: Dani s’ Introduction to Harappan Ciphers
Dr. Prof. Ahmad Hasan Dani , Nazeer Ahmad Chaudhry( Researcher) , Sony
Interview with Dani
Dani (1-9) had confirmed most of our conclusions after a detailed interview(10). Nazeer Ahmad Chaudhry( Researcher) and author extends thanks to Farah Dani and all others including Sony(11) . Dani gave detailed account of his life and research work that is on the record hence it is not being repeated. He also gave account of his meeting with Parpola regarding his decipherment (12). We were lost in the ruins of Mohenjodaro available at Mark(13-14) and Omar (1984) IVC sites. Sony is giving the narrative .
The horse hoax was being debated at internet and Author asked the comment from Dani. He said smiling that we are actually Vani from Central Asia and Brahmans hence we support them then he became serious and said that there is no government support and we have limited number of scholars doing this work at their own hence we might complement them , however an agreement is historical evidence.
South Asia is a land of many different cultures and traditions with thousands of sites. The prehistoric scripts , motifs and symbols found during Kot Diji Culture (Khan(1965) are quite different from matured Harappan Scripts 1900-1300 B.C . We are interested in the symbols, signs , pictorials and motifs , logos like 1, 2, and 3 or 33 , some symbols, signs and pictorials used in other civilizations imported from other civilizations during 1500-1300 B.C. period for this decryption.
Harappan Scripts
Table-1 shows a mixture of roughly over 26 symbols with many variants but we are mostly interested for terminal symbols over 11 starting from right to left like Arabicc alphabets. Dani narrated his meeting with Asko Parpola about his effort of decipherment He , B.B. Lal , Russian Professors and many others had rejected this decipherment. One of the questions frequently asked about the Indus script whether it represents any systematic writing of any language at all is not relevant to our decryption. Dani an eminent Pakistani archaeologist , historian and linguistic is expert on 35 languages and dialects. He is authority on Central Asia , South Asia and Harappan Civilization. He is particularly known for archaeological work on Pre-Harappan Culture. We have no disagreement with even with those who agree that the writings of the Harappan Civilization are not a haphazard arrangement of signs and are at variance with one another. Our purpose in this decryption is to carry out frequency analysis of the script of Matured Harappan Civilization in the last stage 1500-1300 B.C. in order to bring out the statistical structure of the cipher-texts.
Many of sites remain hidden under the ruins of Mohenjodaro , Harappa and other sites. It seems to be the culture of another mythology with tradtions of burial , sacrifices and the motif of bull is found that is not a pictorial . The major diety seems to be horned buffalo and buffelo horned yougi . Mehrgarh 7000 B.C site in Gedrosia pertains to the seventh and third millennium B.C. It covers Neolithlic 6500- 4500 B.C. and Chalcolithic4500- 2600 B.C era. We have tablets , tools , figurines of women with heavy jewelry and ceramics of very fine quality . The motif of fish , scorpian , goat and many others including the mythology are different in matured Harappa civilization Some of the scripts , symbols and signs pertaining to Harappan culture 2600-1900 B.C. are different from previous Kot Diji .
We compliment efforts in decipherment of Indus scripts as written language . Anything before 1900 B.C. including the sign-board from Dholavira consisting of 10 large signs, each sign approximately 37cm by 27cm, embedded in semi-precious stones on a wooden board and an innovate addition of many seals and tablets and even horses is wonderful contribution. Our scope in decryption is limited to Matured Harappan Ciphers in 1500-1300 B.C. those were found from upper layers .
Tablets
The tablet shown above has five symbols. The 1st two from right the inverted boa or jar with logo2 on top and lance below is one symbol. , The 4th boa with logo3 inside is third symbol. Vertical 4 line written in bottom line is 4th symbol at number 5 and last 6th position symbol of comb is 5th symbol called the terminal symbol. We have special problem with this terminal symbol and comb inside the bangle or encircled comb in frequency analysis. We require an ethno-archaeological model for frequency analysis of these symbols. Tablets is a standard form of issuing orders like present day deeds , written orders and other transactions sent as encrypted messages or cipher-texts. It had been common practice in all ancient civilizations to issue the orders as tablets . The amulets and tablets also served as identity documents and trade deals. The direction of the writing of scripts on the amulets , artifices and tablets is from right to left like Arabic ,Persian and Urdu and the local languages Punjabi and Pothwari languages spoken in the oldest culture Samma the Sowan Valley 0.5 million years old culture of stone age . We are not saying that Dravidian in IVC or Naga tribe in Snake Valley Taxila adopted the writing system from the creatures of stone age .
Let us consider a sample of ten tablets in Table -2 . The frequency count of boa left and diamond the right symbol in tablet-1, The left symbol bearer in tablet-2 , the right symbol harrow or saw in tablet -5, the left symbol leveling tool (KRAH) , left symbol comb in bangle in tablet-8 or comb are terminal symbols. We can not carry out any frequency analysis for such a limited data but we would count the symbols using statistical methods and use an ethno-archaeological model to regenerate more data .
Seals
The direction of the writing on the seals is from right to left like English language in s1 Table-3 . Stamping the seal gives the writing from left to right as shown above in the tablet discussed above and in table-2. The seal ‘s2’ above when stamped gives the seal impression as ‘t2’.The seals being used in present day environments for signatures is different from the use of Indus seals that pertains to the level of security in modern concept . The amulet as identity document was given to the officials but messengers or speedy system of communication in IVC were given tablets or it may be tablet as stamped seal impression. Let assume a trained bird or racing camel or buffalo or trained tiger or trained crocodile or rhenocerous for swamps and rivers as communication systems. They may be insecure for special purposes as like any of the modern system in cryptology.
The use of impression of a seal as tablet may be compared with a book code as example of a more secure algorithm . The priest on both ends had same seals like the sender and the receiver of the modern code each having a copy of the same book. During encoding, each word in the plaintext is replaced with a code group that indicates where that same word appears in the book. Different occurrences of the same word in the plaintext may be represented by different code groups in the encoded message. With this method, the key is the book itself. Although a person who intercepts a message may guess that a book code is being used, the messages cannot be decoded unless the interceptor can determine what edition of what book is being used. In IVC system special staff priest trained at Priest College Mohenjodaro were present in other states and foreign countries with set of tablets and seals. The orders as seal impression tablet could give the actual tablets to be issued to specific staff to execute the orders.
The security , public policy and prevention of fraud in modern concept as given by Camp (15-21) has to be linked with ancient methods in an ethno-archaeological model. Giving Tablet as actual secret message through any of the communication channels in use during 1500-1300 B.C. was equally insecure like the modern cipher systems that involve transmitting or storing the key with each message. If an unauthorized person can recognize the key, then the next step is to recognize, guess at, or figure out the algorithm. Even without the key, the code breaker can guess the algorithm, and then, by trying all the possible keys in succession, can conceivably recover the plaintext. For example, in Caesar's alphabetical cryptosystem being discussed in next chapters , the cryptanalyst could simply try each of the 25 possible values of the key. The security of transmissions can therefore be increased by increasing the number of possible keys and by increasing the amount of time it takes to try each key. If the same key is used for multiple messages, the cryptanalyst only has to figure out one key; but by varying the key from one message to another, the cipher clerk has used a different procedure for encoding each one. The use of seal impressions as tablets in IVC ciphers is like using a complicated algorithm that may have a very large number of possible keys. The decryption in modern system if the basic algorithm is known or guessed is made difficult due to the time and effort required to try all possible keys that may take years for finding the plaintext.
IVC cipher remain as unbreakable system during the century like the most secure encryption method known was the one-time pad. The pad is a long list of different randomly chosen keys. Two and only two identical copies of the list of keys exist . The one for the person enciphering the message like the priest issuing the seal impression as tablet and another for whoever is deciphering it like the priest at the other end who knew the message coded as tablet. In OTP, a key is discarded and never used again after being used for one message but in IVC the same seal can be used again because the ciphers are only taught to specific priests and not the users. In OTP the next message will use the next key on the list. If the algorithm is even moderately complicated and the keys are long enough, cryptanalysis is practically impossible. In IVC ciphers the seal impression as tablet may be same but the tablets issued at other end might be different .
Terminal Symbols
The 1st symbol on the right side of seals and the leftmost symbol on the left the last one are called the terminal symbols We have selected after frequency analysis not given here about 11 terminal symbols shown in line-1 of table-3 appearing as 1st symbol on the right side of the seals.
We may call them as boa the 1st on right , diamond or coin , bearer , comb in bangle or encircled comb , comb , lance or spear , harrow or saw , wheel , level tool ( KRAHA) and riding stripe ( RUKAB).
We assumes the senate of priests holding important duties as VPs assisted by AVPs the headmen of tribes and supervisors from technical workforce from respective fields at execution level. . Dani confirms our conclusions for terminal symbols Mahadevan s’ analysis (1982:316) confirms the concept of priest for our ‘boa’ an his ‘jar’ symbol1 but with Sanskrit equivalent.
We do not require any confirmation in mathematical solution of cryptanalysis. The experts in frequency analysis have empirical solutions accepted by all cryptologists and cryptanalysts. The boa Symbol is confirmed as English letter E according to empirical solutions in cryptanalysis. The priest ruler in our analysis is confirmed by Dani our Sanskrit expert and he said that it had nothing to do with Sanskrit. Mahadevan s’ analysis ( 1982:316) confirms the concept of priest but with Sanskrit equivalent
The symbol 2 has largest frequency occurrence after boa symbol and it is termed as symbol of coin or diamond.
Dani confirms coin or diamond symbol 3 an priest VP with financial duties with no Sanskrit equivalent. Mahadevan s’ analysis ( 1982:316) also confirms symbol 3 as officer with priest duties but with Sanskrit equivalent.
The ciphers, crypto systems , and codes in cryptology or Harappan ciphers 1500-1300 B.C. being considered for our cryptanalysis are just like a mule. Every one agrees that a mule cannot generate a daughter. The mule might be forced to adopt a daughter as unique case after brutal attack for training as we call it brutal attack in cryptanalysis for code breaking The concept of spoken language equivalent like Sanskrit or others may be valid for earlier scripts and we have no objection to such adopted daughters.
Bull Pictorials
The seal on the left becomes tablet in the right side but inscription may be different for seal impression hence above is only an example just to show the direction of terminal symbols. We have large variety of bulls like Zebu or bhahmi bull , short horned bull , humped bull and humpless bull beside the unicorns. Many of the animal systems are used as nick names as a fun in our area of the oldest culture of stone age like bull and Ass for girls .I have retrieved old English Teacher books serial 190-191 from my childhood library that had very interesting (22) history.
Nixon mentioned in his book The Leaders
Boa Motif
Animal Motifs
Conclusions
Long interview with Dani reflecting the confirmation of conclusions by Dani, B.B. Lal, Russian Professors, Tosi, Durani Mughal, Mark and other scholars is not being discussed. We are mentioning some of the conclusions also confirmed or partially confirmed by Asko Parpola and I. Mahadevan through their published work.
The direction of writing on amulets, tablets, and seal impressions is from right to left like Arabic, Persian and Urdu and reversed on the seals like English. Conclusion is agreed by all scholars
Indus ciphers and codes represent system like logo-syllabic writing. This doesn’t constitute a closed system of single-valued graphemes as the syllabic and alphabetic scripts, which could be cracked as wholes. The conclusion is confirmed by Asko Parpola, Dani , Mark and other scholars
The individual symbols may be interpreted one by one, and some of the ciphers may remain eternal mysteries. The conclusion is confirmed by Asko Parpola, Dani, Mark and other scholars.
The Indus Ciphers were essentially similar to the other pictographic ciphers evolved by priests in China , Egypt and others .Many scholars like Dani , Fairservis , Mark and others confirm the conclusion
The Indus Ciphers are like a mule unable to adopt any of ancient language as daughter hence decipherment based on languages was rejected by scholars like Dani, B.B. Lal, and Russian Profs. and many others
The spoken language of the Indus people was Dravidian confirmed by Asko Parpola, Dani, Mark and other scholars. Our cryptanalysis shows that it not found in Script ciphers. This was the system like Liner A codes but no Linear B codes were required.
Harappan professed different religion in Kot Diji culture era that may be genetically related to the religions of both the ancient West Asia and the later India. The mythology of matured Harappan Civilization is different from any other mythology and mythology in ancient India.
The terminal symbols appearing at the left of the writing on amulets, tablets and seal impression are most important in frequency analysis. The right symbol on the seals is the terminal symbol on seal impressions.
Let me complement Possehl , Tosi (1993), Walter, Fairservis, Shaffer ,), B.B.Lal, Durani(1981), Jacobson, Terome(1986), Kenoyer (1985), Ratnagar(1991) and many others who contributed to Indus Valley research. Iravatham Mahadevan seems to be greater scholar when he sys that he could n't decipher the scripts inpite of his over 40 yeras research work. Ahmad Hassan Dani , B.B. Lal and Russian professors are the greates who disagreed to excellent research work by Asko Parpola. Being student of topsecret science Cryptology since childhood , I was associated with code and ciphers. After long discussion with Dani about above researchers and scholars and his work with some of them , we came to the claim of decipherment by Jha N and Rajaram (2000) that I thought the broken seal by Mackay showing rear portion of bull being called hoof of a horse. Dani said smiling , " We am actually Vani from Central Asia hence I would like to apprecite the work by Brahamans ". Then added that government funding is very limited and any effort like the effort of Jha N and Rajaram has to be appreciated but we mightn't agree with decipherment if it is not correct. Then he narrated all the conversation with Parapola and finally he disagreed.
Dried Up River Hakra
Let us run an ethno-archaeological model on the Scripts during 1500-1300B.C. period. We have no comments on any of the efforts of deciphering efforts of IVC scripts as spoken language. IVC existed from Kot D.G era before 2600 B.C. , Harappa 2600-1900 B.C. and matured Harappa 1900-1300 B.C . The direction of shifting from Harappa to Mohenjodaro, and Lothal during 1500-1300 B.C. is assumed . Gedrosia and Kalibangan might have been left due to Aryans but Dholavera, the sites in Cholistan ( Mughal (1997) and Kot D.G. vanished earlier due to heavy floods and climatic changes and the final drying up of the Hakra /Kangra/ Sarasvati in 1900 B.C.
IVC script is found on amulets, tablets and seals. Some of symbols, signs, numerals , pictorials and motif seem to be universal or imported from other civilizations of China , Egypt and in cuneiform texts from Mesopotamia as well as in the ancient Iran. Scholars had been trying to link the scripts to any of the pre-historic languages like Indo-European They provide a reliable basis for this decipherment. The main conclusion is as follows: the Proto-Indian language is the Proto-Indo-Aryan () one. The direction of the writing is right to left like Arabic on amulets and tablets and it may be reversed for seal impressions. Signs depicted on seals and tablets have basically the left-right orientation. It is well to bear in mind that the direction of the reading of a record depends on the context, too. In this work all the texts are transformed so that they have a common direction from left to right. This report contains a number of quasi-bilingual sources that can be the base of the decipherment (Rjabchikov 2006a; 2006b) (1).
Bibliography
1.Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages
2.Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach, 1998, Publishers: The Mathematical Association of America,
3.Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)
4.Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages
5.Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach, 232 pages. Publishers: The Mathematical Association of America; 2nd edition (August 1998)
6.Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)
7.Bard Gregory, Algebraic Cryptanalysis , 2009, 392pages, Publishers Springer US
8.Christopher Swenson, Modern Cryptanalysis: Techniques for Advance Code Breaking, Publishers John Wiley & Sons , 2008, 264 pages
9.Simon Singh , The Code Book , The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Publishers: Anchor; Reprint edition (August 29, 2000), 432 pages
10.Jannik Dewny, Cryptanalysis of RSA & its Variants, CRC Press, Taylor & Francis Group,2009
11.Mark Stamp, Richard M. Low , Stamp(ed) , Applied Cryptanalysis: Breaking Ciphers in the Real World, Published Online: 3 Jan 2007
12.Helen F. Gaines, Cryptanalysis , 1989, Dover Publication, 237 pages
13.Friedrich L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology. publisher: Springer- Verlag Telis; 2nd Rev&Ex edition (February 2000) ,language :English, Hardcover: 470 pages
14.Gaines, Helen Fouche, Cryptanalysis a Study of Ciphers and their Solutions, 1939, 237 pages.
15.Foster , Caxon, Cryptanalysis for Microcomputers, 1982, 333 pages
16.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Machines, History and Methods, 1989 , 520 pages
17.Friedman, William F., Military Cryptanalysis Part I, 1935. 149 pages. Cryptanalysis of Number Theoretic Ciphers
Wag staff Jr., Samuel S. / Attalla, Mikhail J. (Editor), 2003. 318 pages
18.Friedman, William F., Military Cryptanalysis Part II: With Added Problems & Computer Programs 1937.
19.Friedman, William F., Military Cryptanalysis Part III: Simpler Varieties of Periodic Substitution Systems, 1939. 119 pages ,
20.Friedman, William F., Military Cryptanalysis Part IV: Transposition and Fractionating Systems, 1941. 189 pages
21.Ryan, Peter / Schneider, Steve, Modeling and Analysis of Security Protocols
2000. 352 pages.
22.Gaines, Helen Fouche, Cryptanalysis: A Study of Ciphers and their Solution
1939. 237 pages.
23.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Yesterday, Today, and Tomorrow, 1987, 519 pages
24.Pickover, Clifford, Cryptorunes, 2000. 96 pages
25.Poe, Edgar Allan, Gold-Bug and Other Tales, 1991. 121 pages.
26.Johnson, Neil F. / Duric, Zoran / Jajodia, Sushil G., Information Hiding: Stenography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1) 2001. 160 pages.
27.Pfleeger, Charles P. / Pfleeger, Shari Lawrence, Security in Computing. 1997, 2nd edition. 569 pages.
28.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor), Selections from Crypto logia: History, People, and Technology, 1998. 552 pages
29.Yardley, Herbert O., Yardley-grams, 1932 (Currently out of print). 190 pages
30.Wagstaff Jr., Samuel S. / Atallah, Mikhail J. (Editor), Cryptanalysis of Number Theoretic Ciphers, 2003. 318 pages.
31.L. Jean Camp, “Code, Coding and Coded Perspectives”, Journal of Information, Communication and Ethics in Society Vol. 1, Jan. 2003, pp. 49-59. (Previously published in the abstract-refereed conference “Code, Coding, and Coded Perspectives”, Association of Internet Researchers, Lawrence, Kansas, and September 2000.).
32.L. Jean Camp & Serena Syme,” The Governance of Code: Open Land vs. UCITA Land” ACM SIGCAS Computers and Society, September 2002, Vol. 32, No. 3.
33.Serena Syme & L. Jean Camp, The Governance of Code, Code as Governance , Ethicomp: The social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk, Gdansk, Poland, 18-20 June 2001, Vol. 1, pp. 86-101.
34.L. Jean Camp & Serena Syme, “A Coherent Intellectual Property Model of Code as Speech, Embedded Product or Service, Journal of Information Law and Technology, Vol. 2, 2001.
35.L. Jean Camp & B. Anderson, Expansion of Telecommunication Infrastructure in Emerging Nations: The Case of Bangladesh, Telecommunications Policy Research Conference, Alexandria, VA. 25-26 Sept. 1999.
36.L. Jean Camp, “The World in 2010: Many New Entrants”, info: the journal of policy, regulation and strategy for telecommunications, information and media, Vol. 2 No. 2, April 2000, 167-186.
L. Jean Camp & Charles Vincent, Looking to the Internet for Models of Governance , Ethics and Information Technology, 2004, Vol. 6, No. 3, pp. 161-174.
L. Jean Camp, “Community Considered”, democracy.com? Governance in a Networked, World Hollis Publishing (Hollis, NH) 1999.
37.L. Jean Camp, Democratic Implication of Internet Protocols , : Ethical, Social and Political Dimensions of Information Technology, February 28 - March 1, 1998; Princeton University, Department of Computer Science, Princeton NJ.
38.L. Jean Camp, “The Shape of the Network”, Governance in a Globalizing World, ed. J. Donahue, Brookings Press (Washington, DC) summer 2001.
39.L. Jean Camp, “Principles for Design of Digital Rights Management Systems” IEEE Internet Computing Vol. 6, No. 3 pp. 59-65, May 2003.
40.L. Jean Camp & Stephen Lewis, “The Economics of Information Security” Springer-Verlag 2004.
41.L. Jean Camp, “Identity Theft: Causes, Consequences, Possible Cures.” Springer-Verlag 2007.
Farzeneh Asgapour, Debin Liu and L. Jean Camp, “Computer Security Mental Models of Experts and non-Experts”, Usable Security 07, (Tobago) 16 February 2007.
42.L. Jean Camp, “Privacy: from abstraction to applications”, Computers & Society, Sept. 1994, Vol. 24, No. 3, 8-15.
43.L. Jean Camp & Marvin Sirbu, “Critical issues in Internet commerce”, IEEE Communications, May, 1997
44.Marshall, John 1931. Moenjodaro and the Indus Civilization. 3 Vols. London.
45.Ahmad Hasan Dani, New Light on Central Asia, Sang-e-Meel Publication,1996
46.Ihsan H. Nadiem, Moenjodaro , The Heritage of Mankind, Sang-e-Meel Publication,2002
47.Asko Parpola, Deciphering the Indus Script, Cambridge, Cambridge University Press, 1994
48.Mohammed Rafique Mughal ,Ancient Cholistan Art and Architecture, Ferozsons Ltd., Lahore, 1997
49.Asko Parpola ,Deciphering the Indus Script: methods and select interpretations, Occasional Papers Series, Center for South Asia, University of Wisconsin-Madison, 1997
50.Gregory Possehl , The Indus Age: The Writing System , U. of Pennsylvania Press, 1996,
51.Richard Meadow , Harappa Excavations 1986-1990: A Multidisciplinary Approach to Third Millennium Urbanism, Prehistory Press, 1991,
52.Raymond and Bridget All chin, The Rise of Civilization in India and Pakistan,
Cambridge Univ. Press, 1982
53.Gregory Possehl, Harappa Civilization, Science Pub., 1993
54.Naida Kirkpatrick, The Indus Valley Understanding People in the Past,
Heinemann Library, April 2002
55.Iravatham Mahadevan, Terminal Ideograms in the Indus Script, in Gergeory L. Possehl, Harappan Civilization: A Contemporary Perspective, Oxford & IBH Publishing Co., 1982
56.Gregory Possehl ,The Indus Civilization A Contemporary Perspective,
Altamira Press, January
57.Ardeleanu-Jansen, Alexandra 1983. Stone sculptures from Moenjodaro. Interim Reports, Vol. I. ISMEO- Aachen University Mission. Aachen.pp.139-157.
58.Joshi J.P. & Asko Parpola 1987. Corpus of Indus Seals and Inscriptions (=CISI). Vol. I: Collections in India. Helsinki.
59.Knorozov Y.V. et al 1981. Proto-Indica 1979. Moscow.
60.Lal B.B. 1960. From Megalithic to the Harappa: tracing back the graffiti on pottery. Ancient India, 16, pp. 4-24.
61.Mahadevan I. 1977. The Indus Script: Texts, Concordance and Tables (=ISTCT). Archaeological Survey of India. New Delhi.1998.
Evolution of Ethno-Archaeological Model
1.Nazeer Ahmad Chaudhry, Integration of TCP/IP Protocol Suites with Cryptographic Security approved Ph. D. Electrical & Electronics Engg.) In Total Technology thesis at University of Bradford U.K.
2.Nazeer Ahmad , Secure MIS book draft sent to Artic House Norwood
3.Nazeer Ahmad, Secure MIS in Business Communication, B.M.A. Preston University Research Paper in MIS subject.
4.Nazeer Ahmad ,Protection of Radio Tele-printing Circuits, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1987,pp 25-29
5.Nazeer A. Chaudhry ,Protection of Speech and Data Communication Circuits , The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1988,pp 52-56
6.Nazeer Ahmad ,Neo-Communication Security Environments, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1990,pp 25-29
7.Nazeer Ahmad Chaudhry ,Communication Systems , MS Thesis MUET Jamshoro 1990-1992,
8.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
9.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Hilal Magazine , ISPR Publication , January 1995
10.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1994
11.N. A. Chaudhry , Tactical Nuclear Operations : Indian Option for 21st Century, Pakistan Defence Review, Volume 6, 1994, pp 80-92
12.N. A. Chaudhry , Integrated National Defence , Pakistan Army Green Book, 1991, pp343-346
13.N. A. Chaudhry , Safety Equipment for Nuclear Operations , T.S.O. Research Paper , E.M.E. College NUST Campus Rawalpindi, 1985
14.Nazeer Ahmad. Chaudhry , Pre- Evolution History Corps of Signals 1847-1947, SRC Publishers Hyderabad, 1992
15.Nazeer Ahmad. Chaudhry, Design and Development of Secrecy Electronics Communication System, M. Phil. ( Electronics Engg. ) thesis at MUET Jamshoro, 1993-1995
16.Nazeer Ahmad. Chaudhry , Electronics Warfare Doctrine Under Hostile Environments , Pakistan Army Green Book, 1991, pp 287-290
17.N. A. Chaudhry , Cryptographic and Computer Security , The Hilal Magazine , ISPR Publication , volume 24 , 19 January 1995
18.N. A. Chaudhry ,Evolution of Codes and Ciphers , The Hilal Magazine , ISPR Publication , 8 February 1995
19.N. A. Chaudhry , Cryptographic Security Systems , The Hilal Magazine , ISPR Publication , volume 20 , 15 December 1994
20.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
21.N. A. Chaudhry , Axiomatic Educational Strategy for 21st Century , Research Paper presented at IEEEP Lahore ,1995 and published in local press
22.Nazeer Ahmad , Quality Education , Pakistan Observer Daily, 18 November 1998
23.Nazir Ahmad Chaudhry, Education System & National Development , The Jung Daily, 6 February 1995
24.Nazir Ahmad Chaudhry , A Short History Of Lahore & Its Monuments, 2000, Sang-e-Meel Publisher Lahore
25.Nazeer Ahmad, Legal Settlement of Kashmir Problem , Pakistan Army Journal , U.N. and Kashmir Issue , Pakistan Observer Daily, 15 November 1994
26.Nazeer Chaudhry , Islamic Requirements of Justice System, , Daily Markaz, 22 February1998 Islamabad
27.Nazeer Chaudhry , Islamic System of Saudi Arabia , Daily Markaz, 8 September 1998 Islamabad
28.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Bazem –i- Alm –o-Fun Islamabad 2000
29.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 21 September,1998
30.Nazeer Chaudhry, How to Reduce Budget Deficit , Daily Markaz, 3 April,1999, 4 April,1999, 11 April,1999, Islamabad
31.Nazeer Ahmad , Solution to Public Problems , The Exclusive Weekly, Islamabad, 26 September 1996
32.Nazeer Chaudhry, Budget and Unemployment , Asas Daily , 20 June 1999
33.Nazeer Ahmad , Time to Shake Hands With India , The Exclusive Weekly, Islamabad, 16 July 1991
34.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Defense Digest Monthly, October 1992, pp 53-87
35.Nazeer Ahmad, Constitution of Pakistan and Peoples’ rights , 2004
36.Nazeer Ahmad , We can’t Progress Without Science Education, Pakistan Observer Daily, 2 November 1994
37.Nazeer Chaudhry, South Asian Economy and Kashmir , Al Akhbar Daily, 16 October 1999
38.Nazir Ahmad Chaudhry, Peace, Security &Development, Daily Markaz, 17 Agust,1998, Islamabad
39.Nazir Ahmad Chaudhry, Harappa : the cradle of our civilization , Sang-e-Meel Publication,2002
40.N. A. Chaudhry , Modern Technology Impacts of Defence , Pakistan Army Journal , 1994, pp62-74
41.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
42.Nazir Ahmad Chaudhry, Multan :glimpses, Sang-e-Meel Publication,2002
43.N.A. Chaudhry , Tourism Development in Pakistan , Friday News Weekly, 6 July 1999
44.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, September 1999
45.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
46.Nazir Ahmad Chaudhry, Basanat :a cultural festival of Lahore , Sang-e-Meel Publication,2001
47.Nazir Ahmad , Academic libraries in a developing society ,1984, Sang-e-Meel Publication
48.Nazeer Ahmad , 21st Century Challenges for Our Engineers, Pakistan Observer Daily, 11 December 1994
49.Nazir Ahmad , University library practices in developing countries ,1984, Sang-e-Meel Publication
50.Nazeer Ahmad , New Trends in Energy Generation, Pakistan Observer Daily, 2 November 1994
51.Nazir Ahmad, Oriental presses in the world ,1985, Sang-e-Meel Publication
52.Nazir Ahmad Chaudhry, Eastern Science of Medicine, Pakistan Observer Daily, 18 March 1995
53.N.A. Chaudhry, Kala Bagh Dam , Niwa –i- Waqat Daily, 14 July 1998
54.Nazir Ahmad Chaudhry , Ghulam Rasul Chaudhry , Irrigated Agriculture in Pakistan , Sang-e-Meel Publication,1988
55.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 22 July 1998, Islamabad
56.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 28 July 1998, Islamabad
57.Nazir Ahmad Chaudhry, Anarkali, archives and tomb of Sahib Jamal : a study in perspective , Sang-e-Meel Publication,2002,
58.Nazir Ahmad Chaudhry, Ground Water Resources in Pakistan, Sang-e-Meel Publication, 1974.Nazeer Chaudhry, Expected Attack on Atomic Instillations Pakistan , Osaf Daily 5June 1998, Islamabad
59.Nazeer Chaudhry, Regional Cooperation and Pakistani Forces, Markaz Daily 30 June 1999, Islamabad
60.Nazeer Chaudhry, Circulation of Money Al Akhbar Daily 17 February 2003, Islamabad
61.Nazeer Chaudhry, Solution of Unemployment Problem , Daily Subha, , 17 April 2004, Islamabad
62.Nazeer Chaudhry, Inflation, Unemployment and Terrorism, Daily Subha, , 9 August 2004, Islamabad
63.Nazeer Chaudhry, Social and Economic Welfare of Society , Daily Ehsas , 6 April 1999, Islamabad
64.Nazeer A. Chaudhry, Strategic Dimension of Pakistan, Submitted to Pakistan Defence Review, 2005
65.Nazeer A. Chaudhry, Solution to Kashmir Problem, Submitted to Pakistan Defence Review
66.Nazeer Chaudhry, How to End Terrorism, Daily Markaz , 8 November 1998 , Islamabad
From: N.A. Chaudhry : My thanks to A. Times for registration . Decrypted Secrets of Harappan Civilization 19oo-1300 B.C. can be used for peace and security in Asia and end of terrorism.Global trade through IVC ( Indus Valley Civilization) worth $7.5 billions and trading of largest oil & gas reserves worth over $ 15 Trillions from central Asia is being blocked because , presnt Asians are not so civlized as compared with the Senate of tragers of Harappan States : Harappa , Mohenjodaro, Dholavera , Lothal and Gedrosia . Dani said during very long interview with me for approval of conclusions on 1st cryptanalysis model on IVC script. ,"South Asia was termed as golden sparrow and every one got the job at his door step . Grains and water was protected and we find best model of social security and protection of human rights.Many scholars tried the kicking mule ( IVC scripts ) to accept the daughter ( any of ancient language like Dravidian , Brahvi, and many others ) or at least to adopt it. Many scholars including Dani, B. B. Lal , Russian Professors , Steve Farmer and Michael from Harvard University , Fairservis and others who confirm our conclusions that we might stop forcing the mule to accept the given daughter. Sunskrit literature evolved in Ganga valley even ignores events like attack by Alender in Indus Valley but the literature evolved in1300-1000 B.C. era according to new dating was made to mention the dried up river Hakrra/ Kangra or Srawati( Mughal -1997) in 1990B.C. as flowing big river. After extensive travelling and research work and spending in 5 years including 7 day journey on helicopter , I conclude that this was excessive floods over 18 recorded by Mark & Possehl and change of coarse by indus that shifted Harappa culture to 2600-1900 B.C. to matured Harappan civilzation. Kot Diji culture (Khan -1965) 3500-2600B.C. was quite diffent culture with differnt mythology motifs and symbols having burials sacrfices and divine god like others. Matured Harappan civilization is different adopting global cult of sun god and King Priest was not a divine god. We are not including methimatical cryptanalysis and we ware not diagreeing to anything.. Dravidian the sopken language was not required to be in written form. Do we have any of local languages in written scripts. The answer on record is no . The oldest culture of stone age is Suma ( Sownan Valley ) 0.5 -2.5 million yera old along with bone of Peking man 0.5 m , Iwaja in Japan , a city under the sea at Indian Gujrat coast , oldest city near dead sea in Jordan and Mehrgarh in Gedrosia of 8000 B.C. We had history as sing subject in oldest culture of the world till 1960s and we have elders using counting system of 20s till 1970s in Suma. According to the research by General Kungham Aryan had left Suma ( the salt range & Kashmir in 1426 B.C. and it was being ruled by Anavas tribe. Aran started arriving around 2500 B.C. in small grups as cattle grazers but they had evolved sunskrit before 1900 B.C. seening a big flowing river Hakra. Dani, Mughal and others call it a seperate river but we call it previous alignment of Indus. The concept of roads and rivers is different for people like us actually moving the troops and their suppies. Let us consider my claim that global trading route and attacking route in South Asia before Grand Trunk road was rougly 10 km wide on both sides of G.T. road. Any one who disagree is posted as logistic commader. I ask him to move the treasure of Alender 7 tons of god and silver. Eva our VP on control desk give him published data that this treasure required 26000 mules and 5000 camels. One unit is 33 men and you require over dozen units for many purposes . Two camel load is required for one man. Muhammad of Ghazni attack for Somnat had 30000 troops and 2 camels were required for one soldier for water and rations. We requre the grazing grounds for cattle, local labour , water replenshment and replacement for sick animals . We require a herd of cattles for ration. It may requre few months to get the convoy moved after prepration of many months.
The terms Block Cipher and Stream Cipher are borrowed from modern cryptanalysis (1). The methods and maxims of cryptology were reviewed to find the decrypted secrets of Let us take a very simple example of a message to be encrypted 46 words and 252 characters with spaces and 204 without spaces.
“His Excellency The King Priest of Harappa State as Chairman of Senate for Global Trading Coordinator in South Asia is pleased to order the new seal and signatures to be taken as final orders for all priests to be enforced from 1 January 1900 B.C. “
Let me complement Marshal (1931) , Wheeler (1956), Mackay , Magan, Ghosh, Wolley , Ghosh, Roy (1953), Possel , Tosi (1993), Walter, Fairservis, Sfaffer , Vats(1940), B.B.Lal, Durani(1981), Jacobson, Terome(1986), Kenoyer (1985), Khan F.A.(1965), Ratnagar(1991) and many others who contributed to Indus Valley research. Iravatham Mahadevan seems to be greater scholar when he sys that he could n't decipher the scripts inpite of his over 40 yeras research work. Ahmad Hassan Dani , B.B. Lal and Russian professors are the greates who disagreed to excellent research work by Asko Parpola. Being student of topsecret science Cryptology since childhood , I was associated with code and ciphers. After long discussion with Dani about above researchers and scholars and his work with some of them , we came to the claim of decipherment by Jha N and Rajaram (2000) that I thought the broken seal by Mackay showing rear portion of bull being called hoof of a horse. Dani said smiling , " We am actually Vani from Central Asia hence I would like to apprecite the work by Brahamans ". Then added that government funding is very limited and any effort like the effort of Jha N and Rajaram has to be appreciated but we mightn't agree with decipherment if it is not correct. Then he narrated all the conversation with Parapola and finally he disagreed
One of our NEWEST Podcasts, The Cryptology Podcast, brought to you by Elgin (elgindotcom) Carl (_thecivilright) and Azeem (_azeemkhan) and these gentlemen tackle an untapped lane in our busy podcast realm, which is Crypto-currency.
On episode 5 Elgin and Karl sit with special guest Michelle McCormack to discuss her transition from the fashion industry to cryptocurrency. We discuss storage options to keep your cyrpto safe from hackers and her new company "Casting Coin" which is due to shake up the model Industry by cutting out the middle man aka "Agents" and utilizing BlockChain to protect models everywhere from shady people and business tatics.
--
My highest compliments to all concerned for excellent site."Sir, You have taken a right step to get those Swings removed from site of Harrapa" , Visitors thanked great scholar Dani when I visited his house in 2005. I had taken years to get it done by publishing many articles requesting peoples to create more facilities at cultural heritage sites. My kids and wife would had been cursing me for taking them to Harrapa quite often , My family was not craking Indus Scripts in 1989 because I had more than one computer as Manager Army Computer Club Okara but they had to crack Indus Scripts in 1995 becaue we had just one 486 computer for 3 kids and myself. What attraction kids and families had in ruins visiting 7th time.
“ What you think about round stone with stone round rod in the center and other on the top with hole in the center like grinding stone on top” , my expert visitor Egyptian asked on my 7th visit to Museum of Sasi & Punu two lovers near Twin port Karachi. Being from stone age cultural area , still using hand grinding in 1980 , acting as guide to my guest during last 6 tours , I thought it some sort of grinding though grinding stone are opposite to this , top has a wooen handle to move the stone , hole in the center has wooden piece a slot to where fulcrum from lower stone stone rest. Lower stone has a hole and tappered wooden piece is used for adjust ment of fuckrum. “ But how you would move this set for grinding , this is from tepmle used by issueless women “ , my expert visitor guided me on 7th visit.
My compliments to Thailand tourism , Ms Nani and the driver , she guided me in such an excellent fashon in 1995 that I still remember her. “ No guidence in the way , I would sit with driver , you have to be VIP not speaking a word “ , Nani gave the briefing on a cup of coffe before we started for visit of Royal Palace. She was such an excellent guide that she even gave out out cost of golden budda’s constume , golden bricks on the outer wall of golden temple. They had even kept book on Bhuddaism in my room. Bhudaism started from Taxila Pakistan but we have to make living model of previous prehistoric cultures of snake worshipers and other
Historical Perspective
1st success decryption of Indus Scripts confirmed through works of Dani, B B Lal , Mehdewan, Fair Server , Mark, Russian Professoers and many others in the century was approved by Dani in 2005. South Asia as most peaceful global trader and protector of global trading routes was known as ‘golden sparrow’.Everyone got job at his home and economy was stable. “ We must share our research work because there is no government support” Dani said . We have many secrets from Indus Script decryption that can make South Asia as most peaceful region for global trading. Global Peace Mega Project at. twitter.com/#!/nazeeraahmadch. We salute Anhazari for greatmove against anti corruption
Harappan civilization reached improbable heights and evolved amazing scripts .
Ancient inscriptions and pictorials starting from Mehrgarh Gedrosia 7000 BC till fall of civilization have always been an enigma. The glories of the ruined cities and their amazing un-deciphered script had many researchers imagining a gentle society of priests and scribes. Our decrypted secrets explain a culture that reached the heights of artistic achievement during 1900-1300 BC termed as Harappan civilization. New clues, unearthed from research on ruins and from our decrypted secrets point to new civilization of global trading termed as Matured Harappan
The settlement of Kot Diji culture mostly remained l hidden under the ruins of Mohenjodaro , Harappa and other big cities now known as Harappan Civilization 2600-1900 BC . Ethno-archaeological model is assuming much as it was when the first 50 hunting groups arrived in perhaps 8000 – 7000 BC connected with the arrival of Adam on earth. A dense forest , marshes and barren land where wild animals ruled was shared by manlike creatures . scarlet macaws, toucans, and vultures nest in towering tropical hardwoods. Scorpions , mountain , goats , fish , water buffalos lived together . These creatures and monkeys swing from branches and vines and howler monkeys bellow in the distance. It had been a land of jungle , marshes , mud, serpents and sweat, and tigers and horned tigers the lord of the jungle . The earliest arrivals of these creatures has been excavated in Samma Soan Valley of stone age where we find caves is probably had no choice—overcrowding elsewhere may have forced them into this forbidding environment. But once there, they mastered its challenges. Settling near rivers, lakes, and swamps, they learned to maximize the thin soil's productivity. They cleared the forest for maize, squash, and other crops by slashing and burning, much as today's Maya do, then re-enriched the land by alternating crops and letting fields lie fallow.
As populations grew, they adopted more intensive methods of cultivation—composting, terracing, irrigation. They filled in swamps to create fields and carried silt and muck from bottomlands to fertilize enclosed gardens. Artificial ponds yielded fish, and corrals held deer and other game flushed from the forest. The ancient Maya ultimately coaxed enough sustenance from the meager land for several million people, many times more than now live in the region.
Over the centuries, as the Maya learned to prosper in the rain forest, the settlements grew into city-states, and the culture became ever more refined. The Maya built elegant multiroom palaces with vaulted ceilings; their temples rose hundreds of feet toward the heavens. Ceramics, murals, and sculpture displayed their distinctive artistic style, intricate and colorful. Though they used neither the wheel nor metal tools, they developed a complete hieroglyphic writing system and grasped the concept of zero, adopting it for everyday calculations. They also had a 365-day year and were sophisticated enough to make leap-year-like corrections. They regularly observed the stars, predicted solar eclipses, and angled their ceremonial buildings so that they faced sunrise or sunset at particular times of year.
Mediating between the heavens and earth were the Maya kings—the kuhul ajaw, or holy lords, who derived their power from the gods. They functioned both as shamans, interpreting religion and ideology, and rulers who led their subjects in peace and war. Demarest and others have described the Maya centers as "theater states" in which the kuhul ajaw conducted elaborate public rituals to give metaphysical meaning to movements of the heavens, changes of the calendar, and the royal succession.
Behind the cloak of ritual, the Maya cities acted like states everywhere, making alliances, fighting wars, and trading for goods over territory that ultimately stretched from what is today southern Mexico through the Petén to the Caribbean coast of Honduras. Well-worn trails and stucco-paved causeways crisscrossed the forest, and canoes plied the rivers. But until Fire Is Born arrived, the Maya remained politically fragmented, the city-states charting their own courses in the jungle.
By 378 Waka was a prestigious center, boasting four main plazas, hundreds of buildings, temple mounds up to 300 feet (90 meters) tall, ceremonial palaces clad in painted stucco, and courtyards graced with carved limestone altars and monuments. A trading power, it occupied a strategic location on the San Pedro River, which flowed westward from the heart of the Petén. Its market was filled with Maya foodstuffs such as maize, beans, chilies, and avocados, along with chicle harvested from sapodilla trees to make glue, and latex from rubber trees to make balls for ceremonial games. Exotic goods found their way to Waka as well. Jade for sculpture and jewelry and quetzal feathers for costumes came from the mountains to the south, and obsidian for weapons and pyrite for mirrors from the Mexican plateau to the west, the domain of Teotihuacan.
A sprawling metropolis of 100,000 people or more—perhaps the largest city in the world at the time—Teotihuacan left no records that epigraphers have been able to decipher. But its motives in dispatching Fire Is Born to the Maya region seem clear. Waka sat on a promontory overlooking a tributary of the San Pedro with a protected harbor, excellent for berthing large canoes. "It was a perfect staging area" for military action, notes Southern Methodist University archaeologist David Freidel, co-director of excavations at Waka. Which may be precisely what Fire Is Born had in mind.
Waka appears to have been key to the envoy's mission: to bring the entire central Petén into Teotihuacan's orbit, through persuasion if possible, force if necessary. His principal target was Tikal, a kingdom 50 miles (80 kilometers) east of Waka. Tikal was the most influential city-state in the central Petén. Bring Tikal into the fold, and the other cities would follow.
Fire Is Born's soldiers were probably shock troops, designed principally to display his bona fides and demonstrate good faith. He needed reinforcements, and he had come to Waka to get them. In return, he could offer the goodwill of his patron, a mysterious ruler known from inscriptions as Spear-thrower Owl, probably a highland king, perhaps even the lord of Teotihuacan.
Waka's ruler, Sun-faced Jaguar, apparently welcomed Fire Is Born. Based on hints in texts from Waka and other sources, Freidel, project co-director Héctor Escobedo, and epigrapher Stanley Guenter suggest that the two rulers cemented their alliance by building a fire shrine to house the sacred flame of Teotihuacan.
Along with moral support, Fire Is Born probably secured troops. His expeditionary force likely carried the spear-throwers and javelins typical of Teotihuacan and wore backshields covered with glittery pyrite, perhaps meant to dazzle the enemy when the soldiers spun around to hurl their weapons. Now warriors from the Petén, equipped with stone axes and short stabbing spears, swelled their ranks. As armor, many wore cotton vests stuffed with rock salt. Eleven hundred years later, the Spanish conquistadores shed their own metal armor in the sweltering rain forest in favor of these Maya "flak jackets."
The military expedition most likely set out for Tikal in war canoes, heading east, up the San Pedro River. Reaching the headwaters, the soldiers disembarked and marched either along the river or on the canyon rim overlooking it.
Garrisons probably dotted the route. News of the advancing column must have reached Tikal, and somewhere along the stretch of riverbank and roadway, perhaps at a break in the cliffs about 16 miles (26 kilometers) from the city, Tikal's army tried to stop Fire Is Born's advance. Inscribed slabs, called stelae, later erected at Tikal suggest that the defenders were routed. Fire Is Born's forces continued their march on the city. By January 16, 378—barely a week after his arrival in Waka—the conqueror was in Tikal.
The date is noted on Tikal's now famous Stela 31, which yielded early clues to Fire Is Born's importance when David Stuart of the University of Texas at Austin deciphered it in 2000. The second passage on the stela records what happened after the city fell: Tikal's king, Great Jaguar Paw, died that very day, probably at the hands of the vanquishers.
Fire Is Born appears to have dropped whatever pretense he had assumed as a goodwill ambassador. His forces destroyed most of Tikal's existing monuments—stelae put in place by 14 earlier rulers of Tikal. A new era had begun, and later monuments celebrated the victors. Stela 31, erected long after the conquest, describes Fire Is Born as Ochkin Kaloomte, or Lord of the West, probably referring to his origins in Teotihuacan. Some Maya experts have also suggested another meaning: that Fire Is Born represented a faction that had fled to the west—to Teotihuacan—after a coup d'état by Great Jaguar Paw's father years earlier and had now returned to power.
It apparently took Fire Is Born some time to pacify Tikal and its environs. But a year after his arrival, Tikal's monuments record that he presided over the ascension of a new, foreign king. Inscriptions identify him as the son of Spear-thrower Owl, Fire Is Born's patron in Teotihuacan. According to Stela 31, the new king was less than 20 years old, so Fire Is Born probably became Tikal's regent. He was certainly the city's de facto overlord.
In the years that followed the conquest, Tikal itself went on the offensive, expanding its reach across the Maya region. Fire Is Born appears to have masterminded the campaign, or at least inspired it. References to him have been identified in cities as distant as Palenque, more than 150 miles (240 kilometers) to the northwest. But the most poignant testimony to his empire-building comes from Uaxactún, just 12 miles (19 kilometers) from Tikal. There a mural shows a Maya nobleman giving homage to a warrior in Teotihuacan regalia—perhaps one of Fire Is Born's troops. A stela depicting a similar warrior guards a tomb where archaeologists found the remains of two women, one pregnant, a child, and an infant. Freidel and others have concluded that these were the remains of Uaxactún's royal family, slain by Tikal's forces. The king, presumably, was taken to Tikal and sacrificed there.
Decades after the arrival of Fire Is Born and long after he must have died, the aggressive rulers of Tikal continued to invoke Fire Is Born and his patron state, Teotihuacan. In 426, Tikal took over Copán, 170 miles (274 kilometers) to the south in present-day Honduras, and crowned its own king, Kinich Yax Kuk Mo, who became the founder of a new dynasty. A posthumous portrait shows him wearing a costume typical of central Mexico—a reference to Teotihuacan—and like Fire Is Born, he bore the title Lord of the West.
Some Mayanists believe that Tikal was acting as a vassal state for Teotihuacan, expanding its dominion throughout the Maya lowlands, with Fire Is Born acting as a kind of military governor. Others see him less as a conqueror and more as a catalyst who spurred Tikal to expand its own power and influence.
His fate is a mystery. There is no known record of his death, and no evidence that he ever ruled a Maya kingdom. But his prestige lived on. The Waka stela recording his arrival there wasn't erected until a generation later, indicating that even a long-ago visit from the great Fire Is Born was a matter of civic pride.
For more than a millennium, the Maya had entrusted their religious and temporal well-being to their god-kings. These leaders displayed their might and majesty in lavish rituals and pageants, in opulent art and architecture, and in written records of their triumphs, inscribed on stone, murals, and ceramics.
The system prospered—indeed, its excesses created the artistic achievements and learning that defined the Maya as one of the ancient world's great cultures—as long as the land could satisfy people's basic needs. This was easy at first when cities were small and resources relatively plentiful, but over time, growing populations, an expanding nobility, and rivalry between the city-states strained the limits of the environment.
Today the Petén, geographically the largest province in Guatemala, has a population of 367,000, living in isolated towns scattered through a forested wilderness. In the eighth century, by some estimates, ten million people lived in the Maya lowlands. The landscape was an almost unbroken fabric of intensely cultivated farms, gardens, and villages, linked by a web of trails and paved causeways connecting monumental city-states.
Maya farmers were well schooled in sophisticated techniques designed to get maximum production from delicate tropical soils. But beginning in the ninth century, studies of lake-bed sediments show, a series of prolonged droughts struck the Maya world, hitting especially hard in cities like Tikal, which depended on rain both for drinking water and to reinvigorate the swampland bajos where farmers grew their crops. River ports like Cancuén might have escaped water shortages, but across much of the Maya region the lake-bed sediments also show ancient layers of eroded soil, testimony to deforestation and overuse of the land.
When bad times came, there was little the kuhul ajaw could do to help their people. Monoculture farming—growing one staple food crop that could be accumulated and stored for hard times or for trade—could not be sustained in the rain forest. Instead, each city-state produced small quantities of many different food items, such as maize, beans, squash, and cacao. There was enough, at least at first, to feed the kingdom, but little left over.
Meanwhile, Maya society was growing dangerously top heavy. Over time, elite polygamy and intermarriage among royal families swelled the ruling class. The lords demanded jade, shells, feathers from the exotic quetzal bird, fancy ceramics, and other expensive ceremonial accoutrements to affirm their status in the Maya cosmos. A king who could not meet the requirements of his relatives risked alienating them.
The traditional rivalry among states only made matters worse. The kuhul ajaw strove to outdo their neighbors, building bigger temples and more elegant palaces and staging more elaborate public pageants. All of this required more labor, which required larger populations and, perhaps, more wars to exact tribute in forced labor from fallen enemies. Overtaxed, the Maya political system began to falter.
This period marked the golden age of Classic Maya civilization. The kuhul ajaw were in full flower in these two great alliances, competing in art and monuments as well as in frequent but limited wars. Calakmul defeated Tikal in a major battle in 562 but destroyed neither the city nor its population. Eventually Tikal rebounded and defeated Calakmul, subsequently building many of its most spectacular monuments.
Simon Martin, with Nikolai Grube of the University of Bonn, compares the Tikal-Calakmul rivalry to the superpower struggle of the 20th century, when the U.S. and the Soviet Union competed to outdo each other in fields ranging from weaponry to space travel. With neither side ever able to gain the upper hand, the Cold War arguably brought stability, and so did the standoff in the Maya world. "There was a certain degree of destruction" because of the rivalry, says Guatemalan archaeologist Héctor Escobedo. "But there was also equilibrium."
It did not last. Martin suggests the balance may have been intrinsically unstable, like the competition among the city-states of ancient Greece, or the nervous grappling between North and South in the United States prior to the Civil War. Or perhaps an overstressed environment finally caught up with the proud Maya powers, bringing a new edge of desperation to their rivalry. Either way, the unraveling began at the small garrison state of Dos Pilas, near the Pasión River downstream of Cancuén.
In 630 Tikal, trying to reassert a presence along Pasión River trade routes increasingly dominated by Calakmul, expanded an existing outpost near two large springs—pilas, in Spanish. The site had little else to recommend it. Dos Pilas grew no crops and sold nothing. Scholars call it a "predator state" that depended on tribute from the surrounding countryside. War, for Dos Pilas, was not only a ritual to glorify kings and appease gods. War was what Dos Pilas did to survive.
The kingdom's history of violence and duplicity began when Tikal installed one of its princes, Balaj Chan Kawiil, as Dos Pilas's ruler in 635. The garrison slapped together a fancy-looking capital for the young prince, using carved facades to mask loose and unstable construction fill. But in 658 Calakmul overran Dos Pilas and drove Balaj Chan Kawiil into exile.
We know the next chapter thanks to a thunderstorm that toppled a tree at Dos Pilas six years ago, exposing a carved stairway hidden beneath its roots. Inscriptions on the stairway reveal that Balaj Chan Kawiil returned two years after his exile—but as a Calakmul surrogate. Dos Pilas's turncoat king helped Calakmul cement its control over the Pasión Valley during the next two decades. Then Calakmul delivered fateful news. Its rulers ordered Balaj Chan Kawiil to fight his brother in Tikal itself.
For a time, fleeing nobles could find refuge in Cancuén, a quiet port at the headwaters of the Pasión River. Even as downriver cities sank into chaos during the eighth century, Cancuén prospered by trading luxury items and providing sumptuous lodgings for elite visitors. The architect of this golden age was King Taj Chan Ahk, who came to power in 757 at the age of 15. Cancuén had a long history as a strategic trading post, but Taj Chan Ahk transformed the city into a stunning ceremonial center. Its heart was a 270,000-square-foot (25,000 square meters), three-story royal palace with vaulted ceilings and 11 courtyards, made of solid limestone and elegantly placed on a riverside promontory. It was a perfect stage for a Maya god-king, and Taj Chan Ahk was master of the role, even as it was dying out elsewhere.
There is no evidence that Taj Chan Ahk ever fought a war or even won a battle. Instead he managed to dominate the upper Pasión Valley for nearly 40 years by coaxing advantage through patronage and alliances. An altar monument at Cancuén dated 790 shows him in action, engaged in a ceremonial ball game with an unknown noble, perhaps to celebrate a treaty or a state visit.
Taj Chan Ahk died in 795 and was succeeded by his son Kan Maax, who sought to trump his father by expanding the palace. But pomp and ritual—the old trappings of kingship—could no longer hold the Maya universe together. Within five years the spreading chaos had reached the gates of the city. In one terrible day its glory winked out, another light extinguished in the world of the Classic Maya.
Nazeer Ahmad Chaudhry
Independent Researcher from Pakistan
Author & Researcher: Decryption of Harappan Ciphers 1st successful solution in a century
President TPI Inc., President IT Genetics , Manager Asia Women Global Justice Group , Chairman Welfare Committee,
TPI has offered over 0.5 million free predicted solutions at all levels. Integrated solution based on Borderland Sciences, cryptanalysis, forecasting techniques Delphi, Scenarios and multi scenarios, war gaming and other spiritual techniques. We attach no claim with free predicted solutions. Error correction techniques and analysis may be carried out by users.
An analysis might be carried out if I can be of any use for establishing global peace by ending terrorism. I have been subjected to over 30 killing attacks, killing of over 10 members of my family and losses in millions. I have given details at petitions at Care-2, Peace pink, yahoo and other comments. Mega project research work aimed at establishing peace and security at global level by ending terrorism. I desire global board of directors sponsored by UNO to come forward for benefits of all.
I offer 1st decryption of Harappan Scripts in a century; the decrypted secrets not yet published have solution to many problems. The strategic location of Pakistan offer global trading of $ 7.5 billion per year to global community, oil and gas trading of over $ 15 trillions. I have been trained by over 250 foreign telecomm firms; I had lot of interaction with my friends from many countries as class fellows, R&D Engineer at Research Establishment, visit to Thailand, Ministry of Interior Saudi Arabia Border Guards, as operational engineer, as Zonal Manager of NGO and service in the army. I have given lot of material at Internet. My friends , colleagues , group members and others can carry out an analysis of mega project including integrated energy , renewable energy , befouls , safety and security of global trading, safe train link, herbal foods , new employments , new concepts in housing , overhauling of education systems , innovations and integration of new global technologies and many others.. We must establish an accountability system to stop official terrorists and corrupt gangs failing all the global projects.
Mega Project: Problems in offering Global Solutions
The establishment of global peace and stability by ending terrorism has been delayed due to 30 killing attacks on me, killing of 10 members of my family, loss in millions, terrorists attack on 3 sick and crippled women of 3 families, 11 of witnesses and me. Petitions have been registered. May I request global peace lovers to sign the petitions; they may not display their names.
Research Interests Nazeer ’s fundamental research is on discovering and understanding the problems and offering free solutions by forecasting/prediction through economic, social, organizational and technical interactions and techniques evolved through TPI Inc. Over 0.5 million free solutions have been offered at all level but aim of ending terrorism, corruption and prevention of fraud at any level has yet to achieve. Research Projects • Research in any field that can give protection to mankind from fraud, terrorism and human right protection. • Ethno-archaeological Model on Harappan Ciphers: Decryption of Harappan Cipher is over 30 years research project, the 1st successful cryptanalysis in the century • Axiomatic Education Strategy for 21st Century • Prevention of Fraud: Nazeer and his wife Hamida are heir to the lands & property of about 7 families hence an effort underground had been going on for killing of every member of this family. It is very interesting research work scanning the centuries how people slaughter others to become landlords by using fraud and terrorism. • Security and public policy was forced on Nazeer to accept almost all responsibilities in Home County being heir to 7 people. He suffered over 30 killing attacks, killing of 10 members of his family by the snakes brought up by them; the relatives of his step mother.
Contents
[hide]
•1 Education
o1.1 Experience
o1.2 Research Work
•2 Projects
o2.1 Publications:
[Edit] Education
B.Sc. Telecomm Engineering, B Sc Honors, Technical Graduate NUST-EME, LLB, PEC, MIE Pak, IEEEP, IEEE, IEEE Computer Society, IEEE- ISST
MBA , M. Phil. Electronics Engineering , MA , Cryptology NUST-MCS , Arabic AIOU , Ph D Total Technology approved researcher Bradford
•B.Sc. (Telecomm. Engineering), Member:PEC,IEEE &Computer Society IEEE USA MIE (Pak.)
•M.B.A. Preston Univ. 1995 , M.A.( Political Science), B.Sc. (Honors War Studies), L.L.B. , Arabic Diploma AIOU Islamabad
•Doctor of Philosophy in Total Technology at University of Bradford UK approved researcher in since 1995. M Phil at MUET was accepted for credit in Ph.D. Second part M.B.A completed from Preston University USA, Courses /research/ 15 years experience/foreign firm training from 250 firms as R&D engineer in cryptographic security completed. Member PEC , TSO graduate from NUST Campus ,Advance Cryptology Course , Refresher Cryptology Course from NUST
•M. Phil. (Electronics Engineering,) Cryptology (NUST), Technical Staff Course (NUST,, Ph.D. (Electrical/Electronics Engineering) approved researcher at Uni. of Bradford U.K. Masters of Science and M Phil at MUET Jamshoro Pakistan was got transferred for PhD
•M.B.A. from Preston University USA from Islamabad Campus getting 98 % in MIS, Organizational Communication and International Marketing subjects. (98 % marks in Information Theory in Advance Cryptology NUST Campus. M.A. (Political Science) from Sindh Uni.
[edit] Experience
•1996-1997 Telecommunication Engineers at Ministry of Interior Saudi Arabia Border Guards
•1978- 1994 Telecommunication Engineer in Sindh and Baluchistan Provinces , Technical Staff Course , Research & Development Engineer at Signals Research Establishment . Telecommunication Engineer and Communication officer in Army 1972-1994
•Teaching: Teaching Assistant and teaching staff for science and technology subjects at Higher Secondary School, Signal Training Center, Computer Clubs, Divisional Battle School NUST Campus MCS, National Institute of Computer Sciences
•Administration: Zonal Manager Hamdard Laboratories Rawalpindi Zone (1998-1999). 24 years experience in Pakistan Army
•Training: Training by foreign Telecom firms from USA, UK, Canada, China, France, Germany, Japan, South Korea, Norway, Sweden and many other countries as R&D Engineer.
Computers: Student Member IEEE USA (1994-95), Manager Army Computer Clubs at Okara and Hyderabad, Teaching Staff National Institute of Computer Sciences Rawalpindi (1995)
•Engineering: Student Member IEEE USA (1994-1997), Telecommunication Member Pakistan Engineering Council, Member Institute of Electrical Engineers Pakistan
[edit] Research Work
Decryption of Indus Valley Scripts has been my research work since last 30 years .This is 1st successful decryption in a century. Dani had confirmed the decryption in 2005 though 1st script was decrypted in 1995 when Secure MIS high security high compression book draft was approved by Artech House USA and Dorrance Publishers USA approved the draft for publication both books not yet published. Rolex Award also approved the research for an award.
B.B. Lal , Russian Professors , and US Scholars Farmer , Sprout , Fair Service, Mark , Durani , F.A. Khan, Mughal and many conclusions of the decryption supported by many other scholars through their written work.
•In 2004, Steve Farmer published, The Collapse of the Indus-Script Thesis: The Myth of a Literate Harappan Civilization, arguing that the Indus valley figures are merely a non-structured symbol system and do not represent a full language.
•In ancient cryptography used by Egyptians or code & ciphers used by lovers, diarists and underworld people, you don't require full language. As a kid, he had just a chance by compulsion to evolve coded language and a writing system to be read by kid girls who could just read Arabic without understanding it.
•All most all the population counted as the people of Indus Valley counted. He was 1st student to qualify Matric (O level) in 1968 and taught new science syllabus to his class as volunteer teacher because his science teacher declined to teach the syllabus unless he had undergone a course.
•He had over 50 of teacher’s 1st &2nd World War soldiers and there were few who had been living in the jungle. His county of 7 treasures in oldest Stone Age culture got electricity in 1990.They used ancient agricultural tools and animal transport like camels, horses, donkeys, bulls and buffalos were used.
[edit] Projects
•Large number of Design and modification projects in Telecommunication Engineering and Cryptology
•Research in any field that can give protection to mankind from fraud, terrorism and human right protection.
•Ethno-archaeological Model on Harappan Ciphers : Decryption of Harappan Cipher is over 30 years research project the 1st successful cryptanalysis in the century
•Axiomatic Education Strategy for 21st Century
•Prevention of Fraud: 50 years Research Work
•Security and public policy was forced on Nazeer to accept almost all responsibilities in Home County being heir to 7 people.
•Codes and Ciphers: Evolution of Coded Language based on Harappan Scripts
•Codes and Ciphers: Evolution of Written Script based on Harappan Scripts
•Design & Development of Maintenance Free Exchange for Desert Working
•Design & Development of Secrecy Electronics Communication System
•Cryptology : Design of High Security High Compression System
•Design & Development of Exchange for Nuclear Warfare
•Design & Development of Battery Charging and Lighting System on Wind Energy
•Design & Development of Energy Saying System
•Decryption of Moenjodaro Scripts
•Decryption of Matured Harappan Scripts
•Herbal Medicine : Medicated Foods and Treatment of Cancer
•Herbal Medicine : New Treatment for Asthma
•Evolution of Recycling Technologies for Low Cost Housing
•Evolution of Integrated Technologies for Energy Crisis
[edit] Publications:
1.Decryption of Moenjodaro Scripts approved in 1995 based on the Thesis: Integration of TCP/IP Protocol Suites with Cryptographic Security approved Ph. D. Electrical & Electronics Engg.) In Total Technology thesis at University of Bradford U.K. Not yet published.
2.Nazeer Ahmad , Secure MIS book draft sent to Artic House Norwood
3.Nazeer Ahmad, Secure MIS in Business Communication, Research Paper in MIS.
4.Nazeer Ahmad ,Protection of Radio Tele-printing Circuits, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1987,pp 25-29
5.Nazeer A. Chaudhry ,Protection of Speech and Data Communication Circuits , The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1988,pp 52-56
6.Nazeer Ahmad ,Neo-Communication Security Environments, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1990,pp 25-29
7.Nazeer Ahmad Chaudhry ,Communication Systems , MS Thesis MUET Jamshoro 1990-1992,
8.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
9.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Hilal Magazine , ISPR Publication , January 1995
10.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1994
11.N. A. Chaudhry , Tactical Nuclear Operations : Indian Option for 21st Century, Pakistan Defense Review, Volume 6, 1994, pp 80-92
12.N. A. Chaudhry , Integrated National Defense , Pakistan Army Green Book, 1991, pp343-346
13.N. A. Chaudhry , Safety Equipment for Nuclear Operations , T.S.O. Research Paper , E.M.E. College NUST Campus Rawalpindi, 1985
14.Nazeer Ahmad. Chaudhry , Pre- Evolution History Corps of Signals 1847-1947, SRC Publishers Hyderabad, 1992
15.Nazeer Ahmad. Chaudhry, Design and Development of Secrecy Electronics Communication System, M. Phil. ( Electronics Engg. ) thesis at MUET Jamshoro, 1993-1995
16.Nazeer Ahmad. Chaudhry , Electronics Warfare Doctrine Under Hostile Environments , Pakistan Army Green Book, 1991, pp 287-290
17.Nazeer A. , Cryptographic and Computer Security , The Hilal Magazine ,19 January 1995
18.N. A. Chaudhry ,Evolution of Codes and Ciphers , The Hilal Magazine ,8 February 1995
19.N. A. Chaudhry , Cryptographic Security Systems , The Hilal Magazine , 15 December 1994
20.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
21.N. A. Chaudhry , Axiomatic Educational Strategy for 21st Century , Research Paper presented at IEEEP Lahore ,1995 and published in local press
22.Nazeer Ahmad , Quality Education , Pakistan Observer Daily, 18 November 1998
23.Nazir Ahmad Chaudhry, Education System & National Development , The Jung Daily, 6 February 1995
24.Nazeer Ahmad, Legal Settlement of Kashmir Problem , Pakistan Army Journal , U.N. and Kashmir Issue , Pakistan Observer Daily, 15 November 1994
25.Nazeer Chaudhry , Islamic Requirements of Justice System, , Daily Markaz, 22 February1998
26.Nazeer Chaudhry , Islamic System of Saudi Arabia , Daily Markaz, 8 September 1998 Islamabad
27.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Bazem –i- Alm –o-Fun Islamabad 2000
28.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 21 September,1998
29.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 3 April,1999,
30.Nazeer Ahmad , Solution to National Problems , Daily Markaz, April,1999
31.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 11 April,1999, Islamabad
32.Nazeer Ahmad , Solution to Public Problems , The Exclusive Weekly, Islamabad, 26 September 1996
33.Nazeer Chaudhry, Budget and Unemployment , Asas Daily , 20 June 1999
34.Nazeer Ahmad , Time to Shake Hands With India , The Exclusive Weekly, Islamabad, 16 July 1991
35.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Defense Digest Monthly, October 1992, pp 53-87
36.Nazeer Ahmad , We can’t Progress Without Science Education, Pakistan Observer Daily, 2 November 1994
37.Nazeer Chaudhry, South Asian Economy and Kashmir , Al Akhbar Daily, 16 October 1999
38.Nazir Ahmad Chaudhry, Peace, Security &Development, Daily Markaz, 17 Agust,1998, Islamabad
39.N. A. Chaudhry , Modern Technology Impacts of Defense , Pakistan Army Journal , 1994, pp62-74
40.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
41.N.A. Chaudhry , Tourism Development in Pakistan , Friday News Weekly, 6 July 1999
42.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, September 1999
43.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
44.Nazeer Ahmad , 21st Century Challenges for Our Engineers, Pakistan Observer , 11 December 1994
45.Nazeer Ahmad , New Trends in Energy Generation, Pakistan Observer Daily, 2 November 1994
46.Nazir Ahmad Chaudhry, Eastern Science of Medicine, Pakistan Observer Daily, 18 March 1995
47.N.A. Chaudhry, Kala Bagh Dam , Niwa –i- Waqat Daily, 14 July 1998
48.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 22 July 1998, Islamabad
49.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 28 July 1998, 1974.
50.Nazeer Chaudhry, Expected Attack on Atomic Instillations Pakistan , Osaf Daily 5June 1998,
51.Nazeer Chaudhry, Regional Cooperation and Pakistani Forces, Markaz Daily 30 June 1999,
52.Nazeer Chaudhry, Circulation of Money Al Akhbar Daily 17 February 2003, Islamabad
53.Nazeer Chaudhry, Solution of Unemployment Problem , Daily Subha, , 17 April 2004
54.Nazeer Chaudhry, Inflation, Unemployment and Terrorism, Daily Subha, , 9 August 2004,
55.Nazeer Chaudhry, Social and Economic Welfare of Society , Daily Ehsas , 6 April 1999,
56.Nazeer A. Chaudhry, Strategic Dimension of Pakistan, Submitted to Pakistan Defense Review, 2005
57.Nazeer A. Chaudhry, Solution to Kashmir Problem, Submitted to Pakistan Defense Review ,1995
58.Nazeer Chaudhry, How to End Terrorism, Daily Markaz , 8 November 1998 , Islamabad
59.Nazeer Ahmad Chaudhry , Neo Scenario for Armed Forces of Pakistan , Pakistan Army Journal ( Urdu) , Winter 2009 , pp 25-42
60.ibid, PAJ, The J curve , Rise and Fall of Nations by Ian Beemer , Book Review , pp107-108
61.Nazeer Ahmad Chaudhry , Science & Technology : New Challenges for Defense , Pakistan Army Journal ( Urdu) , Summer 2009 , pp 15-25
62.ibid, PAJ , Curveball: Spies, Lies and the Con Man Who caused a War by Bob Dorgan , Book Review , pp- 85-87
63.Nazeer Ahmad Chaudhry , Nuclear Strategy for Future , Pakistan Army Journal ( Urdu) , Winter 2008 , pp 45-55
64.ibid, PAJ, the Failure of American Foreign Policy and Next Great Crisis in Middle East by Ali M. An sari , Book Review , pp104-106
65.Nazeer Ahmad Chaudhry , Defense Strategy for Future , Pakistan Army Journal ( Urdu) , Summer 2008 , pp 42-51
66.ibid, PAJ , Winning the Right War by Phillips H Gordon, Book Review , pp 85-87