View allAll Photos Tagged encryption
Alan Turing (1912-54) was an English mathematician, logician, cryptanalyst and computer scientist of dazzling ability. He was highly influential in the development of computer science and is widely considered to be the father of both computer science and artificial intelligence.
More than that, perhaps, during the Second World War he and his team broke the code of the highly complex Enigma and Lorenz cipher machines, which kept German military and strategic communications secret. This meticulous, painstaking work was done at Bletchley Park, Britain’s code-breaking centre. After the war he worked at the National Physical Laboratory in Teddington, where he created one of the first designs for a stored-program computer, the ACE.
Alan Turing was gay, and was prosecuted in 1952, when homosexual acts (even between adults in private, as in his case) were illegal in the UK. This conviction resulted in his security clearance being removed, and despite his acknowledged brilliance he was barred from continuing with his cryptographic work for GCHQ. He committed suicide in 1954 at the age of 41. Fifty-five years later, in 2009, the British government formally apologised for the way in which he was treated after the war; and in 2013 he received a long overdue royal pardon.
This is a detail from an outstanding life-size sculpture in half a million pieces of slate by Stephen Kettle. It's to be found in the Block B museum at Bletchley Park, near Milton Keynes. Oh, and that's a portrait of Alan Turing in the background. Two heroes for the price of one.
View on black - it looks good.
Vivienne and Mirelle Part 8: The Scope
One last angle. One final silence.
Seraine hadn't spoken her real name in months.
She lived off-grid now—drifting in a ship too small to be scanned, too fast to be tracked.
She had scars she didn’t bandage. A right hand that didn’t close quite right. And an ache that wasn’t pain, just… unfinished.
The Pale Hour was gone. Her reach—cut off. Her court—dismantled. But she still had eyes.
From the far edge of a roof, she set up the scope. No one else could have known that spot. No one else would’ve understood exactly where to be and when to look.
Through the lens of the scope: The Ravenwood.
Alive. Lit. Regal.
And at the very top, framed by warm gold and steel-shadowed glass, sat Vivienne. Alone. As always.
She wasn't looking out the window. She never needed to.
Seraine adjusted the dial. A slight hum of the stabilizer. Her fingertip hovered over the trigger. Just once. That’s all it would take. She could end it.
End her.
But she didn’t.
Because Vivienne had already ended what mattered. The trust. The spark. The illusion that anyone could challenge her and walk away whole.
Seraine lowered the scope.
“You win,” she murmured. “You always did.”
She disassembled the rifle in silence. Piece by piece. Like letting go of a ghost.
Then she slid a small, encrypted packet into the datapad and hit send.
It contained one name. One threat Vivienne didn’t know yet. One gift.
No return message came. There wouldn’t be one.
But far below, the lights of The Ravenwood flickered once—only once—like a nod from someone who never bows.
Seraine turned away.
And never looked back.
Addendum to Part 8
Flagged Transmission – Level Black (Deleted Upon Receipt)
Origin: Unknown
Encryption: Obsolete but familiar
Subject Line: Consider this even.
Vivienne read the name once. Didn’t flinch. Didn’t file it. She memorized it. Then burned the screen.
No reply. No trace.
But later that night, she stood at the window a little longer than usual. No drink. No gloves. Just the weight of something returned—and the quiet knowledge that Seraine still knew where to aim.
She didn’t speak the name aloud.
But she locked the port down two days early for security upgrades no one requested.
Photo by Kassi Aeon www.flickr.com/photos/163927619@N03/
IBM quantum processor internals on display at #MakerFaire 2018 San Mateo, California.
It's a #SignOfTheTimes that this type of processing has the potential to solve currently unsolvable problems at far lower than current power consumption and could render current encryption algorithms obsolete in less than a decade.
The actual processor is in the silver cylinder at the bottom marked with a "Q". In operation it would be in a container chilled to liquid helium temperatures around 4 degrees above absolute zero - much too warm for the processor. The various stages from top to bottom provide additional levels of cooling to bring the processor down to around 0.01 degrees above absolute zero, colder than deep space.
The tubes and rigid coax are part of the cooling system and guides that relay the microwave signals to and from the processor.
Disassembled an old hard drive that had failed. Always wanted to shoot the platters and head stack. These things have a nearly perfect mirrored surface, of course, which allows for some possibilities.
The real original is 18 megapixels (not uploaded here on Flickr), but it's still cool larger.
©2010 David C. Pearson, M.D.
Computers! Don't you love them?! I can't begin to tell you how much fun I'm having with mine at the moment. I keep my photos and lightroom catalogue on an external hard drive so that I can easily use it between systems. Last week I was running out of space so I ordered a larger drive and when it arrived went to copy everything across and it wouldn't. I've now been fighting with it for over a week and I may finally be close to some sort of success. I've lost some images, but nothing crucial I hope. All my images are still on the drive I just can't get it to copy them off. Like everyone I don't back up enough and my last backup was 3 months ago so if worse comes to worst I've only lost 3 months but it's annoying. I havent' totally figured out the problem. I use an encrypted partition and thought it was something to do with the encryption, then I thought it was bad sectors on the drive but now I think it is the drive controller itself. Wish me luck, I've been slowly salvaging folders in between crashes and I think I'm almost there now. Hopefully going to successfully rebuild everything tonight. :o)
I don't get much opportunity for photography and last weekend was one of my rare opportunities. As usual the clouds saw me coming and scooted off but to be honest I quite like nice sunny days and clear skies and it turned into a beautiful autumnal weekend with some of the best weather I've seen in Scotland for a long time.
I think I missed a trick with this shot because afterwards I realised it would probably have made a great vertorama.
This image has been digitally watermarked; unauthorised usage can be detected through Digimarc's Netspider. Digimarc encryption survives digital manipulation and even the printing process.
Some, but not all, of the images on this site can be purchased for reproduction elsewhere. Initial enquiries should be made via email to nirodez@gmail.com
Please remember to quote the image name (preferably with a brief description of the image) and give as much information as possible as to the probable usage. A fee can then be negotiated.
Copyright Protected - Niroshan de Silva 2007
Location: Srilanka
Hebern Electric Code
This is the first encryption machine patented (1912) by Edward Hugh Hebern. Mr Hebern developed this while serving time as a horse thief.
De Girona. DIPA. Aigua, malt d'ordi, civada, blat, llúpol (Mosaic, Citra, Azacca Cryo i Columbus) i llevat. 8%. Vaja, en els ingredients deia que duia gerds i lactosa i m'havia fet a la idea de tastar una Soma diferent, i no, no duu gerds i és de les típiques. Boníssima, això sí, com sempre amb Soma. #soma #dryhopping #IPA #IndiaPaleAle #IndianPaleAle #ale #localbeer #craftbeer #cervesaartesana #cervesaartesanal #beer #pivo #birra #cervesa #cerveza #olut #øl #пиво #bière #beerporn #beergeek #beernerd #craftbeerlive #localbeer#hophead #craftbeernotcrapbeer #craftbeerporn #starkol #piwo #beerpic #bierre
Please give attribution to 'ccPixs.com' (and point the link to www.ccPixs.com). Thanks!
Social Media: www.seywut.com/Chris
The Enigma Machine played a key role in World War II. The German military depended on the Enigma Machine to encrypt communications, but the Allies invested a tremendous amount of effort in decryption and achieved significant success. This provided the Allies a large advantage.
I believe this is a German Wehrmacht (military) Enigma (please let me know if that is not correct). Near the top are the keys pressed by the operator, entering the characters to be encrypted. Beyond the keyboard is the lampboard. As the operator pressed a key, the encrypted version of that letter would light on the lampboard. At the bottom of the photo is the plugboard. Routine wires in different ways on the plugboard contributed to the encryption of characters.
Seen at the National World War II Museum in New Orleans, Louisiana.
"A thermocline (sometimes metalimnion in lakes) is a thin but distinct layer in a large body of fluid (e.g. water, such as an ocean or lake, or air, such as an atmosphere) in which temperature changes more rapidly with depth than it does in the layers above or below."
en.wikipedia.org/wiki/Thermocline
I was taught about this when learning to scuba dive. The strong warm/cool split of this image made me think of it. And then my mind wandered to how strange it is that I can dig up this tiny tidbit of information I heard years ago (and haven't thought much since then) but I can't remember where I put my keys two minutes ago, or the chords to that song I wrote the other day. I think our brains could use a less destructive encryption method and more hard drive space. Hurry up Science, my clock is ticking!
I made this image from 548 photos. I stacked the first 228 using the ultra streaks present in this script, advancedstacker.com and the last 320 photos were stacked "normally" with the lighten layer blending mode. (also automated with the advanced stacker script)
this strange mark appeared on my hand tonight... wish i knew what it meant :-P
photo replaced 8/18 with cropped version that appears in Scientific American magazine, September 2007 issue, p30
Keith Little, one of the last living Navajo Code Talkers, passed away on Tuesday, January 3rd, 2011. His friend, Chester Nez, died last Wednesday, June 4, 2014, and was the last of the Code Talkers. I bumped into Keith and eleven of his fellow Code Talkers on New York's Fifth Avenue located toward the end of the City's 2011 Veteran's Day parade (all I was trying to do was to get across Fifth Avenue to meet friends). I first read about them in the book, "With the Old Breed," by Eugene Sledge. Keith recalls being a young Navajo boy at a reservation school and being reprimanded for speaking his native language. And yet it was this skill -- and his dignity in the face of such prejudice -- that made him and his fellow Code Talkers so exceptional. I feel as if we have lost a special link. He was recruited as a very young man in 1943 to join 420 Navajos in a special encryption unit of the US Marines. The Code Talkers transmitted and received messages in their native Navajo language. They were assigned to all Marine Units and were in the front lines of all of the Pacific battlefields of World War II (Keith was a member of the 4th Marine Division). The code proved unbreakable given its uniqueness and the fact that it was an unwritten language that depended on the tone of a word for its meaning -- so complex that it really needed to be learned in childhood. The specific code eventually grew to include 411 Navajo words.
Star Trek, First Contact (Paramount, 1996).
youtu.be/wxyZQR2d6yw Trailer
Star Trek - 'Beyond First Contact' The Borg - Making The Movie.
Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.
Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.
Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.
The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.
A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.
On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.
At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.
Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.
On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."
Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.
Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.
Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.
Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.
Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.
Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.
Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.
On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.
An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.
Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.
On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.
As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.
Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.
WWII Code Machine, German Secret Service (Abwehr). Bletchley Park Museum, Milton Keynes, Buckinghamshire, UK,
SEC 280 Final Exam
Purchase here
chosecourses.com/index.php?route=product/category&pat...
Product Description
Product Description
SEC 280 Final Exam
(TCO 2) What is XKMS?
Key Management Specification, which defines services to manage PKI operations within the Extensible Markup Language (XML) environment
An XML standard for e-mail encryption
An XML standard that is used for wireless data exchange
A primary XML standard that is for application development
(TCO 2) All of the following are techniques used by a social engineer EXCEPT for which one?
An attacker replaces a blank deposit slip in a bank lobby with one containing his own account number
An attacker calls up the IT department posing as an employee and requests a password reset
An attacker runs a brute-force attack on a password
An attacker sends a forged e-mail with a link to a bogus website that has been set to obtain personal information
(TCO 2) Attackers need a certain amount of information before launching their attack. One common place to find information is to go through the trash of the target to find information that could be useful to the attacker. This process of going through a target’s trash is known in the community as _____
Trash rummaging
Garbage surfing
Piggy diving
Dumpster diving
(TCO 2) What are the SSL and TLS used for?
A means of securing application programs on the system
To secure communication over the Internet
A method to change from one form of PKI infrastructure to another
A secure way to reduce the amount of SPAM a system receives
(TCO 2) What are the security risks of installing games on an organization’s system?
There are no significant risks
Users can’t always be sure where the software came from and it may have hidden software inside of it.
The users may play during work hours instead of during breaks
The games may take up too much memory on the computer and slow down processing, making it difficult to work
(TCO 2) What is the ISO 17799?
A standard for creating and implementing security policies
A standard for international encryption of e-mail
A document used to develop physical security for a building
A document describing the details of wireless encryption
(TCO 3) A(n) _____ is a network typically smaller in terms of size and geographic coverage, and consists of two or more connected devices. Home or office networks are typically classified as this type of network
Local-area network
Office-area network
Wide-area network
(TCO 3) What is the main difference between TCP and UDP packets?
UDP packets are a more widely used protocol
TCP packets are smaller and thus more efficient to use
TCP packets are connection oriented, whereas UPD packets are connectionless
UDP is considered to be more reliable because it performs error checking
Internal-area network
(TCO 3) Unfortunately, hackers abuse the ICMP protocol by using it to _____.
Send Internet worms
Launch denial-of-service (DoS) attacks
Steal passwords and credit card numbers
Send spam
(TCO 3) Which transport layer protocol is connectionless?
UDP
TCP
IP
ICMP
(TCO 3) Which of the following is a benefit provided by Network Address Translation (NAT)?
Compensates for the lack of IP addresses
Allows devices using two different protocols to communicate
Creates a DMZ
Translates MAC addresses to IP addresses
(TCO 3) Which transport layer protocol is connection oriented?
UDP
RCP
IS
ICMP
(TCO 3) Which of the following is an example of a MAC address?
00:07:H9:c8:ff:00
00:39:c8:ff:00
00:07:e9:c8:ff:00
00:07:59:c8:ff:00:e8
(TCO 4) All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT which one?
The key should be stored securely
The key should be shared only with others whom you trust
Authentication should be required before the key can be used
The key should be transported securely
(TCO 4) It is easier to implement, back up, and recover keys in a _____.
Centralized infrastructure
Decentralized infrastructure
Hybrid infrastructure
Peer-to-peer infrastructure
(TCO 4) When a message sent by a user is digitally signed with a private key, the person will not be able to deny sending the message. This application of encryption is an example of _____.
Authentication
Nonrepudiation
Confidentiality
Auditing
(TCO 4) Outsourced CAs are different from public CAs in what way?
Outsourced services can be used by hundreds of companies
Outsourced services provide dedicated services and equipment to individual companies
Outsourced services do not maintain specific servers and infrastructures for individual companies
Outsourced services are different in name only. They are essentially the same thing
(TCO 4) Cryptographic algorithms are used for all of the following EXCEPT _____.
Confidentiality
Integrity
Availability
Authentication
(TCO 6) A hub operates at which of the following?
Layer 1, the physical layer
Layer 2, the data-link layer
Layer 2, the MAC layer
Layer 3, the network layer
(TCO 6) Alice sends an e-mail that she encrypts with a shared key, which only she and Bob have. Upon receipt, Bob decrypts the e-mail and reads it. This application of encryption is an example of _____.
Confidentiality
Integrity
Authentication
Nonrepudiation
(TCO 6) The following are steps in securing a workstation EXCEPT _____.
Install NetBIOS and IPX
Install antivirus
Remove unnecessary software
Disable unnecessary user accounts
(TCO 8) Which of the following is a characteristic of the Patriot Act?
Extends the tap-and-trace provisions of existing wiretap statutes to the Internet, and mandates certain technological modifications at ISPs to facilitate electronic wiretaps on the Internet
A major piece of legislation affecting the financial industry, and also one with significant privacy provisions for individuals
Makes it a violation of federal law to knowingly use another’s identity
Implements the principle that a signature, contract, or other record may not be deleted
Denies legal effect, validity, or enforceability solely because it is electronic form
(TCO 8) The Wassenaar Arrangement can be described as which of the following?
An international arrangement on export controls for conventional arms as well as dual-use goods and technologies
An international arrangement on import controls
A rule governing import of encryption in the United States
A rule governing export of encryption in the United States
(TCO 8) What is the Convention on Cybercrime?
A convention of black hats who trade hacking secrets
The first international treaty on crimes committed via the Internet and other computer networks
A convention of white hats who trade hacker prevention knowledge
A treaty regulating international conventions
(TCO 8) The electronic signatures in the Global and National Commerce Act _____.
Implement the principle that a signature, contract, or other record may not be denied legal effect, validity, or enforceability solely because it is electronic form
Address a myriad of legal privacy issues resulting from the increased use of computers and other technology specific to telecommunications
Make it a violation of federal law to knowingly use another’s identity
Are a major piece of legislation affecting the financial industry, and contains significant privacy provisions for individuals
(TCO 2) Give an example of a hoax and how it might actually be destructive
(TCO 2) What are the various ways a backup can be conducted and stored?
Backups should include the organization’s critical data, and…
(TCO 2) List at least five types of disasters that can damage or destroy the information of an organization
(TCO 2) List the four ways backups are conducted and stored.
Full back up, differential backup,…
(TCO 2) List at least five types of disasters that can damage or destroy the information of an organization.
Flood, chemical spill…
(TCO 2) Your boss wants you to give him some suggestions for a policy stating what the individual user responsibilities for information security should be. Create a bulleted list of those responsibilities.
Do not divulge sensitive information to individuals…
(TCO 3) What is the difference between TCP and UDP?
UDP is known as a connectionless protocol, as it has very few…
(TCO 3) List three kinds of information contained in an IP packet header
A unique identifier, distinguishing this packet from other packets…
(TCO 4) What are the laws that govern encryption and digital rights management?
Encryption technology is used to protect digital…
(TCO 5) Describe the laws that govern digital signatures
Digital signatures have the same…
(TCO 6) What are some of the security issues associated with web applications and plug-ins?
Web browsers have mechanisms to enable…
(TCO 6) What are the four common methods for connecting equipment at the physical layer?
Coaxial cable, twisted-pair…
(TCO 6) Describe the functioning of the SSL/TLS suite
SSL and TLS use a combination of symmetric and…
(TCO 6) Explain a simple way to combat boot disks
Disable them or… them in the…
(TCO 7) What are some ethical issues associated with information security?
Ethics is the social-moral environment in which a person makes…
(TCO 9) What are password and domain password policies?
Password complexity policies are designed to deter brute force attacks by increasing the number of possible passwords…
The SZ-40 was an electro-mechanical wheel-based cipher machine for teleprinter signals (telex). It was developed by Lorenz and used during WWII by the German Army for communication at the highest level. The machine was improved twice (SZ-42a and SZ-42b) and was broken during WWII by the codebreakers at Bletchley Park (UK) with the aid of Colossus, the first electronic digital computer. The SZ-40/42 was codenamed TUNNY by the codebreakers at Bletchley Park.
During WWII, the German Army used a variety of cipher machines, of which the Enigma machine is probably known best. For secure teleprinter communication (telex) they used the Siemens T-52 Geheimschreiber, the Lorenz SZ-40, and later the Siemens T-43 one-time pad machine.
The Lorenz SZ-40/42 was used by the German Army High Command (Oberst-Kommando der Wehrmacht, or OKW) for communication at the highest level, between Hitler and his Generals. The machine was called Schlüsselzusatz (SZ) which means Encryption Add-on. It was connected between a teleprinter and the line, and was suitable for both online and offline use.
Only a small number of SZ-40 and SZ-42 units were ever built. The image above shows one of the very few machines that have survived. It was found in Germany and is now on public display in the museum at Bletchley Park.
Please note that the Lorenz SZ-40/42 is often mistakenly called Geheimschreiber, for example in the 2012 BBC Documentary The Lost Heroes of Bletchley Park. The name Geheimschreiber was used for the Siemens T-52 and not for the SZ-42. Although the two machines use a similar principle, they are not identical and should not be confused. The T-52 was mostly used on landlines (telex) rather than via radio, making interception far more difficult. Nevertheless it was broken occasionally by Bletchley Park and, on a larger scale, by Swedish codebreakers.
||ALERT:
\\This CIA Emergency Broadcasting Alerts-Encryption 227.6//
Delta has struck! I repeat, Delta has struck!
This has been CIA Emergency Broadcasting Alerts-Encryption 227.6. Over and Out.//
Mission Brief- At 12:11:23, Delta Operators landed at a remote compound in central-southwest Asia. They stormed the compound, however found no trace of Jade, the target of operative "Specter", however found Specter alive in a cell. They immediately left the compound after confirming that "Jade" was not in the compound. As they were leaving, a small biplane was noted leaving a nearby airfield which was also searched with no sign of Jade. Fighter escorts followed the plane but were unable to board it. A task force has been deployed to search the area. Specter is now safe at CIA Headquarters, preparing for when Jade is located. ||
Review up later.
Also Brickmania's account got deleted!! O_O
» CYBER Fair Open March 5-25 2024
-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-
◥ [ Cyber Fair by Access Page ] ◣
◥[ Cyber Fair flickr ] ◣
www.flickr.com/groups/14644106@N25/
-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-
◥Early shopping on Camsim at 6 am slt
◥more info www.access-sl.com/cyberfair
◥follow us on IG: @access_event
◥twitter: @accessevent_sl
◥FB: www.facebook.com/Access.SecondLife/
-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-
◥◣◥◣◥◣ S T A Y C Y B E R ◥◣◥◣◥◣
Star Trek, First Contact (Paramount, 1996).
youtu.be/wxyZQR2d6yw Trailer
Star Trek - 'Beyond First Contact' The Borg - Making The Movie.
Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.
Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.
Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.
The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.
A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.
On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.
At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.
Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.
On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."
Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.
Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.
Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.
Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.
Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.
Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.
Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.
On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.
An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.
Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.
On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.
As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.
Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.
Maker: C. Cook from a photograph by William Edward Kilburn
Born: UK
Active: UK
Medium: engraving
Size: 5 in x 4 in
Location:
Object No. 2016.953
Shelf: B-40
Publication: The Universal Dictionary of Universal Biography: A series of original memoirs of distinguished men. Published by William MacKenzie, Paternoster Row, London, 1870
Denis Pellerin, Stereoscopy, The Dawn of 3-D, London, Stereoscopic Company, pg 114
Helmut Gernsheim, The Rise of Photography 1850-1880, The Age of Collodion, Thames and Hudson, London, 1988, pg 42
Helmut and Alison Gernsheim, The History of Photography, 1969, McGraw-Hill, New York, fig 115
Other Collections:
Provenance:
Notes: Sir Charles Wheatstone (6 February 1802 – 19 October 1875), was an English scientist and inventor of many scientific breakthroughs of the Victorian era, including the English concertina, the stereoscope (a device for displaying three-dimensional images), and the Playfair cipher (an encryption technique). However, Wheatstone is best known for his contributions in the development of the Wheatstone bridge, originally invented by Samuel Hunter Christie, which is used to measure an unknown electrical resistance, and as a major figure in the development of telegraphy.
To view our archive organized by themes and subjects, visit: OUR COLLECTIONS
For information about reproducing this image, visit: THE HISTORY OF PHOTOGRAPHY ARCHIVE
One-time pads (OTP) are used to encode/decode agent communications. They are issued in matching sets of two: one for the encoder and one for the decoder, and no two pages are alike. Each sheet contains a random key in the form of five-digit groups. Once a sheet has been used to encode a message, it is torn off the pad and destroyed. If used as designed, encryption by OTP is virtually unbreakable.
For more information on CIA history and this artifact please visit www.cia.gov
One of my favourite parts of Worcester Cathedral and certainly one of the oldest and most evocative spaces there. This is the Romanesque crypt beneath the body of the main church and filled with simply carved columns and an intricate network of unadorned vaults.
The low light conditions and slightly jarring artificial lighting made this image a difficult on to know how to process. The format too, square, was not the original intention. The full format image was strong, but confused by wall lights and other furniture and this square crop and duo tone processing was ultimately the best solution all round.
just before shipping the first Signal integration today.
CONGRATS to Joshua Goldbard and his amazing tech team... real artists!
WIRED: "Signal has integrated support for the cryptocurrency MobileCoin, a form of digital cash designed to work efficiently on mobile devices while protecting users' privacy and even their anonymity. Marlinspike says Signal chose to integrate MobileCoin because it has the most seamless user experience on mobile devices, requiring little storage space on the phone and needing only seconds for transactions to be confirmed. Zcash or Monero payments, by contrast, take minutes to complete transactions. "You're using a cryptocurrency with state-of-the-art encryption, but from your perspective, it feels like Venmo," says MobileCoin's founder Josh Goldbard.
The mechanics of how MobileCoin works to ensure its transactions' privacy and anonymity are—even for the world of cryptocurrency—practically a Rube Goldberg machine in their complexity. Like Monero, MobileCoin uses a protocol called CryptoNote and a technique it integrates known as Ring Confidential Transactions to mix up users' transactions, which makes tracing them vastly far more difficult and also hides the amount of transactions. But like Zcash, it also uses a technique called zero-knowledge proofs—specifically a form of those mathematical proofs known as Bulletproofs—that can guarantee a transaction has occurred without revealing its value.
On top of all those techniques, MobileCoin takes advantage of the SGX feature of Intel processors, which is designed to allow a server to run code that even the server's operator can't alter. MobileCoin uses that feature to ensure that servers in its network are deleting all lingering information about the transactions they carry out after the fact and leave only a kind of cryptographic receipt that proves the transaction occurred.”
The Verge: "Signal announced on Tuesday it’s now testing a new peer-to-peer payments system in the beta version of its apps. Appropriately called Signal Payments, the new feature right now supports only one protocol: the MobileCoin wallet and its companion cryptocurrency MOB. MobileCoin’s design means Signal does not have access to your balance, full transaction history, or funds. You can also transfer your funds at any time if you want to switch to another app or service.”
AT&T TSD-3600E Telephone Security Device, an encrypting telephone from 1993 based on the controversial Clipper Chip
The Clipper chip was the flagship component of a controversial National Security Agency-designed "key escrow" cryptography scheme, in which intercepted encrypted traffic could be decrypted easily by law enforcement or intelligence agencies for surveillance purposes. The program was extremely controversial and, in the end, not a success. Aside from the obvious fundamental problems (the security risks of having a large database of citizen's keys, the need to implement cryptography in expensive secret hardware, etc), the Clipper architecture had technical flaws that made it possible to circumvent the escrow features and preclude the possibility of law enforcement access. (See "Protocol Failure in the Escrowed Encryption Standard" [pdf format], for details.)
AT&T (my employer at the time) was the first (and ultimately only) company to produce a product based on the ill-fated system. The AT&T TSD-3600, announced in 1992, was a voice encryption device designed to be installed in a standard telephone (between the phone base and the handset). Calls placed to other TSD-3600-equipped telephones could be automatically digitized (at 4800bps) and encrypted, making eavesdropping on the conversation (by legal or illegal means) effectively infeasible. When the US government learned of AT&T's plans to market the device, it worried that criminals might used them to thwart wiretaps. Plans for a new encryption system with a wiretap backdoor were hurriedly drawn up by the NSA, and AT&T was persuaded to replace the regular (non-escrowed) DES-based encryption scheme in the original TSD product with the new system, called the Clipper chip. The Clipper-based model TSD-3600E hit the market in 1993. As incentive for AT&T's cooperation, the government agreed to purchase a significant quantity of Clipper-equipped TSD-3600Es, which sold for over $1000 each in quantity.
Hobbled by the controversial key escrow features and the high retail price, the government ended up being the TSD's only major customer, and even most of the units they bought sat unopened in storage for over ten years. AT&T, for its part, eventually sold off the division that produced the product.
I'm aware of five different TSD-3600 models produced between 1992 and the product's cancellation, differing in the cipher algorithm used. The TSD-3600D was the original, using standard DES with a 56 bit key. (These were quickly recalled and disappeared from the market after Clipper was announced). The 3600F was an exportable model that used a proprietary 40 bit cipher that, I was told, was "embarassingly" weak even given the short key. The 3600P used a proprietary 56 bit cipher similar to DES (but not inter-operable with the 3600D). The 3600E was the first controversial key escrowed model, with the then-classified Skipjack cipher and key escrow features implemented on a tamper-resistant MYK-78T Clipper chip. A later model, the 3600S, included a Clipper chip but would also downgrade (or upgrade, depending on your opinion of key escrow) to the F or P ciphers when communicating with those models. All five models use a Diffie-Hellman key exchange (768 bit, if I recall correctly) to establish a session key, a 4 character hash of which is displayed on each unit's LCD. To detect "man-in-the-middle" attacks, users could verify (by voice) that their displayed hashes matched.
This photo shows the TSD with an optional acoustic coupler and handset, allowing its use with virtually any telephone. The device can also be wired directly to the telephone.
Rodenstock Gerogon 240mm/9, Sinar P, BetterLight Super 6K-HS. Full resolution (6000x8000) version available.
Disclaimer: No emulsions were harmed in the making of this image.
"Careful when loading that cannister. It might be small, but it has enough explosive power to evaporate this entire hangar."
"Yes sir."
"And don't forget to activate the stasis field once it's in place."
"Oh–"
"You forgot didn't you? Each year you rookies get– Nevermind."
"Sorry sir. I'll fix it right away sir."
"Do you know what happens when you try to fire the charge without the stasis field?Let me tell you about the battle in sector 75 just outside Saturn's gravity well. Our boys got the encryption codes to disable the stasis fields on the enemy munitions just as they were starting their bombing run– now that was a good firework show!"
What may look like a inconspicuous typewriter in a wooden box is actually the legendary Enigma cipher machine.
The enigma is a electro-mechanical rotor machine, which can be used for the encryption and decryption of secret text messages. Initially the Enigma was a commercially used ciphering machine which has been patented in 1918 by Arthur Scherbius. Later versions of the Enigma used four scrambling devices (three rotors and a reflector) and an additional plugboard, and performed polyalphabetic substitution. Whenever a letter is typed, a different substitution letter is illuminated on the display. At the same time, the rotors are moved, which yields a different substitution for the next letter.
The Enigma was surely the most legendary ciphering device. However, it possessed some weak points, which could be found and exploited by the codebreakers of Bletchley Park to build an electromechanical device (The Bombe) for deciphering messages encrypted by different versions of Enigma machines.
Depiction in slate at Bletchley Park of the most celebrated cryptographer's of the 2nd World War.
He helped crack the Enigma encryption devices and their later developments including the Lorentz at Bletchley Park.
In 2008 we went to Pueblo Grande for the Annual Indian Market in Phoenix. The Navajo (Diné) Code Talkers played a vital role in winning World War II in the Pacific. Only one of the original 29 Code Talkers is still living. However, after they were established in 1942 there were approximately 400 Code Talkers.
During the early months of WW II Japanese intelligence experts broke every code the US forces devised. They were able to anticipate American actions at an alarming rate. With plenty of fluent English speakers at their disposal, they sabotaged messages and issued false commands to ambush Allied troops. To combat this, increasingly complex codes were initiated. At Guadalcanal, military leaders finally complained that sending and receiving these codes required hours of encryption and decryption—up to two and a half hours for a single message. They rightly argued the military needed a better way to communicate.
When Phillip Johnston, a civilian living in California learned of the crisis, he had the answer. As the son of a Protestant missionary, Johnston had grown up on the Navajo reservation and was one of less than 30 outsiders fluent in their difficult language. He realized that since it had no alphabet and was almost impossible to master without early exposure, the Navajo language had great potential as an indecipherable code. After an impressive demonstration to top commanders, he was given permission to begin a Navajo Code Talker test program.
Their elite unit was formed in early 1942 when the first 29 Navajo Code Talkers were recruited by Johnston. Although the code was modified and expanded throughout the war, this first group was the one to conceive it. Accordingly, they are often referred to reverently as the original 29. Many of these enlistees were just boys; most had never been away from home before. Often lacking birth certificates, it was impossible to verify ages. After the war it was discovered that recruits as young as 15 and as old as 35 had enlisted. Age notwithstanding, they easily bore the rigors of basic training, thanks to their upbringing in the southwestern desert.
The code was as ingenious as it was effective. It originated as approximately 200 terms—growing to over 600 by war's end—and could communicate in 20 seconds what took coding machines of the time 30 minutes to do. It consisted of native terms that were associated with the respective military terms they resembled. For example, the Navajo word for turtle meant tank, and a dive-bomber was a chicken hawk. To supplement those terms, words could be spelled out using Navajo terms assigned to individual letters of the alphabet—the selection of the Navajo term being based on the first letter of the Navajo word's English meaning. For instance, Wo-La-Chee means ant, and would represent the letter A. In this way the Navajo Code Talkers could quickly and concisely communicate with each other in a manner even uninitiated Navajos could not understand.
Once trained, the Navajo Code Talkers were sent to Marine divisions in the Pacific theater of WWII. Despite some initial skepticism by commanding officers, they quickly gained a distinguished reputation for their remarkable abilities. In the field, they were not allowed to write any part of the code down as a reference. They became living codes, and even under harried battle conditions, had to rapidly recall every word with utmost precision or risk hundreds or thousands of lives. In the battle for Iwo Jima, in the first 48 hours alone, they coded over 800 transmissions with perfect accuracy. Their heroism is widely acknowledged as the lynchpin of victory in the pivotal conflict.
Ever since the famous whistleblower, Edward Snowden leaked the significant information of behind the door data snooping on encrypted systems by local government, public privacy via encryption has been a heated topic of debate in the United States.
Several tech giants are fighting against the de...
A Boeing E-3 Sentry "AWACS" (Airborne Warning and Control System) aircraft assigned to Tinker Air Force Base, Okla., tests new hot weather equipment Aug. 19, 2019, at Luke AFB, Ariz. The rotating radar dome, 30 feet in diameter, is held above the fuselage by two struts. The radar subsystem permits surveillance of more than 250 miles from the Earth’s surface up into the stratosphere, over land or water to identify and track friendly and enemy low-flying aircraft.
From Wikipedia, the free encyclopedia
The Boeing E-3 Sentry, commonly known as AWACS, is an American airborne early warning and control (AEW&C) aircraft developed by Boeing. Derived from the Boeing 707, it provides all-weather surveillance, command, control, and communications, and is used by the United States Air Force, NATO, Royal Air Force, French Air Force, and Royal Saudi Air Force. The E-3 is distinguished by the distinctive rotating radar dome (ROTODOME) above the fuselage. Production ended in 1992 after 68 aircraft had been built.
In the mid-1960s, the US Air Force (USAF) was seeking an aircraft to replace its piston-engined Lockheed EC-121 Warning Star, which had been in service for over a decade. After issuing preliminary development contracts to three companies, the USAF picked Boeing to construct two airframes to test Westinghouse Electric and Hughes's competing radars. Both radars used pulse-Doppler technology, with Westinghouse's design emerging as the contract winner. Testing on the first production E-3 began in October 1975.
The first USAF E-3 was delivered in March 1977, and during the next seven years, a total of 34 aircraft were manufactured. NATO, as a single identity, also had 18 aircraft manufactured, basing them in Germany. The E-3 was also sold to the United Kingdom (seven) and France (four) and Saudi Arabia (five, plus eight E-3-derived tanker aircraft). In 1991, when the last aircraft had been delivered, E-3s participated in Operation Desert Storm, playing a crucial role of directing coalition aircraft against the enemy. Throughout the aircraft's service life, numerous upgrades were performed to enhance its capabilities. In 1996, Westinghouse Electric's Defense & Electronic Systems division was acquired by Northrop Corporation, before being renamed Northrop Grumman Mission Systems, which currently supports the E-3's radar.
Development
Background
In 1963, the USAF asked for proposals for an Airborne Warning and Control System (AWACS) to replace its EC-121 Warning Stars, which had served in the airborne early warning role for over a decade. The new aircraft would take advantage of improvements in radar technology and in computer aided radar data analysis and data reduction. These developments allowed airborne radars to "look down", detect the movement of low-flying aircraft (see Look-down/shoot-down), and discriminate, even over land, target aircraft's movements—previously this had been impossible, due to the inability to discriminate an aircraft's track from ground clutter. Contracts were issued to Boeing, Douglas, and Lockheed, the latter being eliminated in July 1966. In 1967, a parallel program was put into place to develop the radar, with Westinghouse Electric and Hughes Aircraft being asked to compete in producing the radar system. In 1968, it was referred to as Overland Radar Technology (ORT) during development tests on the modified EC-121Q. The Westinghouse radar antenna was going to be used by whichever company won the radar competition, since Westinghouse had pioneered in the design of high-power RF phase-shifters, which are used to both focus the RF into a pencil beam, and scan electronically for altitude determination.
Boeing initially proposed a purpose-built aircraft, but tests indicated it would not outperform the already-operational 707, so the latter was chosen instead. To increase endurance, this design was to be powered by eight General Electric TF34s. It would carry its radar in a rotating dome mounted at the top of a forward-swept tail, above the fuselage. Boeing was selected ahead of McDonnell Douglas's DC-8-based proposal in July 1970. Initial orders were placed for two aircraft, designated EC-137D as test beds to evaluate the two competing radars. As the test-beds did not need the same 14-hour endurance demanded of the production aircraft, the EC-137s retained the Pratt & Whitney JT3D commercial engines, and a later reduction in endurance requirement led to retaining the normal engines in production.
The first EC-137 made its maiden flight on 9 February 1972, with the fly-off between the two radars taking place during March–July that year.[5] Favorable test results led to the selection of Westinghouse's radar for the production aircraft. Hughes's radar was initially thought to be a certain winner, simply because much of its design was also going into the new F-15 Eagles radar program. The Westinghouse radar used a pipelined fast Fourier transform (FFT) to digitally resolve 128 Doppler frequencies, while Hughes's radars used analog filters based on the design for the F-15 fighter. Westinghouse's engineering team won this competition by using a programmable 18-bit computer whose software could be modified before each mission. This computer was the AN/AYK-8 design from the B-57G program, and designated AYK-8-EP1 for its much expanded memory. This radar also multiplexed a beyond-the-horizon (BTH) pulse mode that could complement the pulse-Doppler radar mode. This proved to be beneficial especially when the BTH mode is used to detect ships at sea when the radar beam is directed below the horizon.
Full-scale development
Approval was given on 26 January 1973 for full-scale development of the AWACS system. To allow further development of the aircraft's systems, orders were placed for three preproduction aircraft, the first of which performed its maiden flight in February 1975. To save costs, the endurance requirements were relaxed, allowing the new aircraft to retain the four JT3D (U.S. military designation TF33) engines. IBM and Hazeltine were selected to develop the mission computer and display system. The IBM computer was designated 4PI, and the software was written in JOVIAL. A Semi-Automatic Ground Environment (SAGE) or back-up interceptor control (BUIC) operator would immediately be at home with the track displays and tabular displays, but differences in symbology would create compatibility problems in tactical ground radar systems in Iceland, mainland Europe, and South Korea over Link-11 (TADIL-A).
Modifications to the Boeing 707 for the E-3 Sentry included a rotating radar dome (rotodome), uprated hydraulics from 241 to 345 bar (3500 - 5000 PSI) to drive the rotodome, single-point ground refueling, air refueling, and a bail-out tunnel or chute. The original design had two (one forward, and one aft), but the aft bail-out chute was deleted to cut mounting costs. Engineering, test and evaluation began on the first E-3 Sentry in October 1975. Between 1977 and 1992, a total of 68 E-3s were built.
Future status
Because the Boeing 707 is no longer in production, the E-3 mission package has been fitted into the Boeing E-767 for the Japan Air Self Defense Forces. The E-10 MC2A was intended to replace USAF E-3s—along with the RC-135 and the E-8, but the E-10 program was canceled by the Department of Defense. The USAF is now performing a series of incremental improvements, mainly to avionics, to bring the E-3 up to current standards of performance. Boeing is flight-testing its Block 40/45 E-3s. This modified E-3 contains upgrades of the mission crew and air battle management sections, as well as significantly upgraded electronic equipment.
Another program that the Air Force is considering is the "Avionics Modernization Program" (AMP). AMP would equip the E-3s with glass cockpits. The Air Force also wants modified E-3s with jet engines that are more reliable than the original ones, and also with at least 19% higher fuel efficiencies. New turbofan engines would give these E-3s longer ranges, longer time-on-station, and a shorter critical runway length. If the modification is carried out, the E-3s could take off with full fuel loads using runways only 10,000 ft (3,000 m) long, and also at higher ambient temperatures and lower barometric pressures, such as from bases in mountainous areas. The E-8 Joint STARS briefly fitted a test aircraft with the new Pratt & Whitney JT8D-219 turbofans, stated as having one-half the cost of the competing engine, the CFM56, the Air Force is again studying the possibility of replacing the E-3's original turbofan engines with more-efficient ones.
NATO intends to extend the operational status of its AWACS until 2035. To comply, fourteen AWACS aircraft will be significantly modified in the Final Lifetime Extension Program (FLEP). Most FLEP modifications will be implemented in the communications and operational systems area e.g. expansion of data capacity, expansion of bandwidth for satellite communications, new encryption equipment, new have quick radios, upgraded mission computing hard- and software and new operator consoles. The supporting groundsystems (mission training center and mission planning and evaluation system) will also be upgraded to the latest configuration. NATO Airborne Early Warning & Control Program Management Agency (NAPMA) is the preparing and executing authority for the FLEP which will be implemented from 2019–2026. To minimize impact on the operational capacity the NAEW&C force commander will be informed in advance. FLEP will be combined with the standard planned higher echelon technical maintenance.
Chapter 1: Dani s’ Introduction to Harappan Ciphers
Ahmad Hasan Dani , Nazeer Ahmad Chaudhry , Sony
Section 1.1: Sample Draft
Section2.2:Pre-Historical Perspective
Section2.3:Pre- Harappan Culture.
Section2.4:Harappan Culture
Section2.5:Harappan Civilization
Section2.6: Confirmation of Conclusions
Section2.7:Terminal Symbols
Section2.8: Bibliography
Summary | Full Text: PDF (Size: 3924K)
Chapter1: Dani s’ Introduction to Harappan Ciphers
Dr. Prof. Ahmad Hasan Dani , Nazeer Ahmad Chaudhry( Researcher) , Sony
Interview with Dani
Dani (1-9) had confirmed most of our conclusions after a detailed interview(10). Nazeer Ahmad Chaudhry( Researcher) and author extends thanks to Farah Dani and all others including Sony(11) . Dani gave detailed account of his life and research work that is on the record hence it is not being repeated. He also gave account of his meeting with Parpola regarding his decipherment (12). We were lost in the ruins of Mohenjodaro available at Mark(13-14) and Omar (1984) IVC sites. Sony is giving the narrative .
The horse hoax was being debated at internet and Author asked the comment from Dani. He said smiling that we are actually Vani from Central Asia and Brahmans hence we support them then he became serious and said that there is no government support and we have limited number of scholars doing this work at their own hence we might complement them , however an agreement is historical evidence.
South Asia is a land of many different cultures and traditions with thousands of sites. The prehistoric scripts , motifs and symbols found during Kot Diji Culture (Khan(1965) are quite different from matured Harappan Scripts 1900-1300 B.C . We are interested in the symbols, signs , pictorials and motifs , logos like 1, 2, and 3 or 33 , some symbols, signs and pictorials used in other civilizations imported from other civilizations during 1500-1300 B.C. period for this decryption.
Harappan Scripts
Table-1 shows a mixture of roughly over 26 symbols with many variants but we are mostly interested for terminal symbols over 11 starting from right to left like Arabicc alphabets. Dani narrated his meeting with Asko Parpola about his effort of decipherment He , B.B. Lal , Russian Professors and many others had rejected this decipherment. One of the questions frequently asked about the Indus script whether it represents any systematic writing of any language at all is not relevant to our decryption. Dani an eminent Pakistani archaeologist , historian and linguistic is expert on 35 languages and dialects. He is authority on Central Asia , South Asia and Harappan Civilization. He is particularly known for archaeological work on Pre-Harappan Culture. We have no disagreement with even with those who agree that the writings of the Harappan Civilization are not a haphazard arrangement of signs and are at variance with one another. Our purpose in this decryption is to carry out frequency analysis of the script of Matured Harappan Civilization in the last stage 1500-1300 B.C. in order to bring out the statistical structure of the cipher-texts.
Many of sites remain hidden under the ruins of Mohenjodaro , Harappa and other sites. It seems to be the culture of another mythology with tradtions of burial , sacrifices and the motif of bull is found that is not a pictorial . The major diety seems to be horned buffalo and buffelo horned yougi . Mehrgarh 7000 B.C site in Gedrosia pertains to the seventh and third millennium B.C. It covers Neolithlic 6500- 4500 B.C. and Chalcolithic4500- 2600 B.C era. We have tablets , tools , figurines of women with heavy jewelry and ceramics of very fine quality . The motif of fish , scorpian , goat and many others including the mythology are different in matured Harappa civilization Some of the scripts , symbols and signs pertaining to Harappan culture 2600-1900 B.C. are different from previous Kot Diji .
We compliment efforts in decipherment of Indus scripts as written language . Anything before 1900 B.C. including the sign-board from Dholavira consisting of 10 large signs, each sign approximately 37cm by 27cm, embedded in semi-precious stones on a wooden board and an innovate addition of many seals and tablets and even horses is wonderful contribution. Our scope in decryption is limited to Matured Harappan Ciphers in 1500-1300 B.C. those were found from upper layers .
Tablets
The tablet shown above has five symbols. The 1st two from right the inverted boa or jar with logo2 on top and lance below is one symbol. , The 4th boa with logo3 inside is third symbol. Vertical 4 line written in bottom line is 4th symbol at number 5 and last 6th position symbol of comb is 5th symbol called the terminal symbol. We have special problem with this terminal symbol and comb inside the bangle or encircled comb in frequency analysis. We require an ethno-archaeological model for frequency analysis of these symbols. Tablets is a standard form of issuing orders like present day deeds , written orders and other transactions sent as encrypted messages or cipher-texts. It had been common practice in all ancient civilizations to issue the orders as tablets . The amulets and tablets also served as identity documents and trade deals. The direction of the writing of scripts on the amulets , artifices and tablets is from right to left like Arabic ,Persian and Urdu and the local languages Punjabi and Pothwari languages spoken in the oldest culture Samma the Sowan Valley 0.5 million years old culture of stone age . We are not saying that Dravidian in IVC or Naga tribe in Snake Valley Taxila adopted the writing system from the creatures of stone age .
Let us consider a sample of ten tablets in Table -2 . The frequency count of boa left and diamond the right symbol in tablet-1, The left symbol bearer in tablet-2 , the right symbol harrow or saw in tablet -5, the left symbol leveling tool (KRAH) , left symbol comb in bangle in tablet-8 or comb are terminal symbols. We can not carry out any frequency analysis for such a limited data but we would count the symbols using statistical methods and use an ethno-archaeological model to regenerate more data .
Seals
The direction of the writing on the seals is from right to left like English language in s1 Table-3 . Stamping the seal gives the writing from left to right as shown above in the tablet discussed above and in table-2. The seal ‘s2’ above when stamped gives the seal impression as ‘t2’.The seals being used in present day environments for signatures is different from the use of Indus seals that pertains to the level of security in modern concept . The amulet as identity document was given to the officials but messengers or speedy system of communication in IVC were given tablets or it may be tablet as stamped seal impression. Let assume a trained bird or racing camel or buffalo or trained tiger or trained crocodile or rhenocerous for swamps and rivers as communication systems. They may be insecure for special purposes as like any of the modern system in cryptology.
The use of impression of a seal as tablet may be compared with a book code as example of a more secure algorithm . The priest on both ends had same seals like the sender and the receiver of the modern code each having a copy of the same book. During encoding, each word in the plaintext is replaced with a code group that indicates where that same word appears in the book. Different occurrences of the same word in the plaintext may be represented by different code groups in the encoded message. With this method, the key is the book itself. Although a person who intercepts a message may guess that a book code is being used, the messages cannot be decoded unless the interceptor can determine what edition of what book is being used. In IVC system special staff priest trained at Priest College Mohenjodaro were present in other states and foreign countries with set of tablets and seals. The orders as seal impression tablet could give the actual tablets to be issued to specific staff to execute the orders.
The security , public policy and prevention of fraud in modern concept as given by Camp (15-21) has to be linked with ancient methods in an ethno-archaeological model. Giving Tablet as actual secret message through any of the communication channels in use during 1500-1300 B.C. was equally insecure like the modern cipher systems that involve transmitting or storing the key with each message. If an unauthorized person can recognize the key, then the next step is to recognize, guess at, or figure out the algorithm. Even without the key, the code breaker can guess the algorithm, and then, by trying all the possible keys in succession, can conceivably recover the plaintext. For example, in Caesar's alphabetical cryptosystem being discussed in next chapters , the cryptanalyst could simply try each of the 25 possible values of the key. The security of transmissions can therefore be increased by increasing the number of possible keys and by increasing the amount of time it takes to try each key. If the same key is used for multiple messages, the cryptanalyst only has to figure out one key; but by varying the key from one message to another, the cipher clerk has used a different procedure for encoding each one. The use of seal impressions as tablets in IVC ciphers is like using a complicated algorithm that may have a very large number of possible keys. The decryption in modern system if the basic algorithm is known or guessed is made difficult due to the time and effort required to try all possible keys that may take years for finding the plaintext.
IVC cipher remain as unbreakable system during the century like the most secure encryption method known was the one-time pad. The pad is a long list of different randomly chosen keys. Two and only two identical copies of the list of keys exist . The one for the person enciphering the message like the priest issuing the seal impression as tablet and another for whoever is deciphering it like the priest at the other end who knew the message coded as tablet. In OTP, a key is discarded and never used again after being used for one message but in IVC the same seal can be used again because the ciphers are only taught to specific priests and not the users. In OTP the next message will use the next key on the list. If the algorithm is even moderately complicated and the keys are long enough, cryptanalysis is practically impossible. In IVC ciphers the seal impression as tablet may be same but the tablets issued at other end might be different .
Terminal Symbols
The 1st symbol on the right side of seals and the leftmost symbol on the left the last one are called the terminal symbols We have selected after frequency analysis not given here about 11 terminal symbols shown in line-1 of table-3 appearing as 1st symbol on the right side of the seals.
We may call them as boa the 1st on right , diamond or coin , bearer , comb in bangle or encircled comb , comb , lance or spear , harrow or saw , wheel , level tool ( KRAHA) and riding stripe ( RUKAB).
We assumes the senate of priests holding important duties as VPs assisted by AVPs the headmen of tribes and supervisors from technical workforce from respective fields at execution level. . Dani confirms our conclusions for terminal symbols Mahadevan s’ analysis (1982:316) confirms the concept of priest for our ‘boa’ an his ‘jar’ symbol1 but with Sanskrit equivalent.
We do not require any confirmation in mathematical solution of cryptanalysis. The experts in frequency analysis have empirical solutions accepted by all cryptologists and cryptanalysts. The boa Symbol is confirmed as English letter E according to empirical solutions in cryptanalysis. The priest ruler in our analysis is confirmed by Dani our Sanskrit expert and he said that it had nothing to do with Sanskrit. Mahadevan s’ analysis ( 1982:316) confirms the concept of priest but with Sanskrit equivalent
The symbol 2 has largest frequency occurrence after boa symbol and it is termed as symbol of coin or diamond.
Dani confirms coin or diamond symbol 3 an priest VP with financial duties with no Sanskrit equivalent. Mahadevan s’ analysis ( 1982:316) also confirms symbol 3 as officer with priest duties but with Sanskrit equivalent.
The ciphers, crypto systems , and codes in cryptology or Harappan ciphers 1500-1300 B.C. being considered for our cryptanalysis are just like a mule. Every one agrees that a mule cannot generate a daughter. The mule might be forced to adopt a daughter as unique case after brutal attack for training as we call it brutal attack in cryptanalysis for code breaking The concept of spoken language equivalent like Sanskrit or others may be valid for earlier scripts and we have no objection to such adopted daughters.
Bull Pictorials
The seal on the left becomes tablet in the right side but inscription may be different for seal impression hence above is only an example just to show the direction of terminal symbols. We have large variety of bulls like Zebu or bhahmi bull , short horned bull , humped bull and humpless bull beside the unicorns. Many of the animal systems are used as nick names as a fun in our area of the oldest culture of stone age like bull and Ass for girls .I have retrieved old English Teacher books serial 190-191 from my childhood library that had very interesting (22) history.
Nixon mentioned in his book The Leaders
Boa Motif
Animal Motifs
Conclusions
Long interview with Dani reflecting the confirmation of conclusions by Dani, B.B. Lal, Russian Professors, Tosi, Durani Mughal, Mark and other scholars is not being discussed. We are mentioning some of the conclusions also confirmed or partially confirmed by Asko Parpola and I. Mahadevan through their published work.
The direction of writing on amulets, tablets, and seal impressions is from right to left like Arabic, Persian and Urdu and reversed on the seals like English. Conclusion is agreed by all scholars
Indus ciphers and codes represent system like logo-syllabic writing. This doesn’t constitute a closed system of single-valued graphemes as the syllabic and alphabetic scripts, which could be cracked as wholes. The conclusion is confirmed by Asko Parpola, Dani , Mark and other scholars
The individual symbols may be interpreted one by one, and some of the ciphers may remain eternal mysteries. The conclusion is confirmed by Asko Parpola, Dani, Mark and other scholars.
The Indus Ciphers were essentially similar to the other pictographic ciphers evolved by priests in China , Egypt and others .Many scholars like Dani , Fairservis , Mark and others confirm the conclusion
The Indus Ciphers are like a mule unable to adopt any of ancient language as daughter hence decipherment based on languages was rejected by scholars like Dani, B.B. Lal, and Russian Profs. and many others
The spoken language of the Indus people was Dravidian confirmed by Asko Parpola, Dani, Mark and other scholars. Our cryptanalysis shows that it not found in Script ciphers. This was the system like Liner A codes but no Linear B codes were required.
Harappan professed different religion in Kot Diji culture era that may be genetically related to the religions of both the ancient West Asia and the later India. The mythology of matured Harappan Civilization is different from any other mythology and mythology in ancient India.
The terminal symbols appearing at the left of the writing on amulets, tablets and seal impression are most important in frequency analysis. The right symbol on the seals is the terminal symbol on seal impressions.
Let me complement Possehl , Tosi (1993), Walter, Fairservis, Shaffer ,), B.B.Lal, Durani(1981), Jacobson, Terome(1986), Kenoyer (1985), Ratnagar(1991) and many others who contributed to Indus Valley research. Iravatham Mahadevan seems to be greater scholar when he sys that he could n't decipher the scripts inpite of his over 40 yeras research work. Ahmad Hassan Dani , B.B. Lal and Russian professors are the greates who disagreed to excellent research work by Asko Parpola. Being student of topsecret science Cryptology since childhood , I was associated with code and ciphers. After long discussion with Dani about above researchers and scholars and his work with some of them , we came to the claim of decipherment by Jha N and Rajaram (2000) that I thought the broken seal by Mackay showing rear portion of bull being called hoof of a horse. Dani said smiling , " We am actually Vani from Central Asia hence I would like to apprecite the work by Brahamans ". Then added that government funding is very limited and any effort like the effort of Jha N and Rajaram has to be appreciated but we mightn't agree with decipherment if it is not correct. Then he narrated all the conversation with Parapola and finally he disagreed.
Dried Up River Hakra
Let us run an ethno-archaeological model on the Scripts during 1500-1300B.C. period. We have no comments on any of the efforts of deciphering efforts of IVC scripts as spoken language. IVC existed from Kot D.G era before 2600 B.C. , Harappa 2600-1900 B.C. and matured Harappa 1900-1300 B.C . The direction of shifting from Harappa to Mohenjodaro, and Lothal during 1500-1300 B.C. is assumed . Gedrosia and Kalibangan might have been left due to Aryans but Dholavera, the sites in Cholistan ( Mughal (1997) and Kot D.G. vanished earlier due to heavy floods and climatic changes and the final drying up of the Hakra /Kangra/ Sarasvati in 1900 B.C.
IVC script is found on amulets, tablets and seals. Some of symbols, signs, numerals , pictorials and motif seem to be universal or imported from other civilizations of China , Egypt and in cuneiform texts from Mesopotamia as well as in the ancient Iran. Scholars had been trying to link the scripts to any of the pre-historic languages like Indo-European They provide a reliable basis for this decipherment. The main conclusion is as follows: the Proto-Indian language is the Proto-Indo-Aryan () one. The direction of the writing is right to left like Arabic on amulets and tablets and it may be reversed for seal impressions. Signs depicted on seals and tablets have basically the left-right orientation. It is well to bear in mind that the direction of the reading of a record depends on the context, too. In this work all the texts are transformed so that they have a common direction from left to right. This report contains a number of quasi-bilingual sources that can be the base of the decipherment (Rjabchikov 2006a; 2006b) (1).
Bibliography
1.Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages
2.Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach, 1998, Publishers: The Mathematical Association of America,
3.Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)
4.Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages
5.Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach, 232 pages. Publishers: The Mathematical Association of America; 2nd edition (August 1998)
6.Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)
7.Bard Gregory, Algebraic Cryptanalysis , 2009, 392pages, Publishers Springer US
8.Christopher Swenson, Modern Cryptanalysis: Techniques for Advance Code Breaking, Publishers John Wiley & Sons , 2008, 264 pages
9.Simon Singh , The Code Book , The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Publishers: Anchor; Reprint edition (August 29, 2000), 432 pages
10.Jannik Dewny, Cryptanalysis of RSA & its Variants, CRC Press, Taylor & Francis Group,2009
11.Mark Stamp, Richard M. Low , Stamp(ed) , Applied Cryptanalysis: Breaking Ciphers in the Real World, Published Online: 3 Jan 2007
12.Helen F. Gaines, Cryptanalysis , 1989, Dover Publication, 237 pages
13.Friedrich L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology. publisher: Springer- Verlag Telis; 2nd Rev&Ex edition (February 2000) ,language :English, Hardcover: 470 pages
14.Gaines, Helen Fouche, Cryptanalysis a Study of Ciphers and their Solutions, 1939, 237 pages.
15.Foster , Caxon, Cryptanalysis for Microcomputers, 1982, 333 pages
16.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Machines, History and Methods, 1989 , 520 pages
17.Friedman, William F., Military Cryptanalysis Part I, 1935. 149 pages. Cryptanalysis of Number Theoretic Ciphers
Wag staff Jr., Samuel S. / Attalla, Mikhail J. (Editor), 2003. 318 pages
18.Friedman, William F., Military Cryptanalysis Part II: With Added Problems & Computer Programs 1937.
19.Friedman, William F., Military Cryptanalysis Part III: Simpler Varieties of Periodic Substitution Systems, 1939. 119 pages ,
20.Friedman, William F., Military Cryptanalysis Part IV: Transposition and Fractionating Systems, 1941. 189 pages
21.Ryan, Peter / Schneider, Steve, Modeling and Analysis of Security Protocols
2000. 352 pages.
22.Gaines, Helen Fouche, Cryptanalysis: A Study of Ciphers and their Solution
1939. 237 pages.
23.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Yesterday, Today, and Tomorrow, 1987, 519 pages
24.Pickover, Clifford, Cryptorunes, 2000. 96 pages
25.Poe, Edgar Allan, Gold-Bug and Other Tales, 1991. 121 pages.
26.Johnson, Neil F. / Duric, Zoran / Jajodia, Sushil G., Information Hiding: Stenography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1) 2001. 160 pages.
27.Pfleeger, Charles P. / Pfleeger, Shari Lawrence, Security in Computing. 1997, 2nd edition. 569 pages.
28.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor), Selections from Crypto logia: History, People, and Technology, 1998. 552 pages
29.Yardley, Herbert O., Yardley-grams, 1932 (Currently out of print). 190 pages
30.Wagstaff Jr., Samuel S. / Atallah, Mikhail J. (Editor), Cryptanalysis of Number Theoretic Ciphers, 2003. 318 pages.
31.L. Jean Camp, “Code, Coding and Coded Perspectives”, Journal of Information, Communication and Ethics in Society Vol. 1, Jan. 2003, pp. 49-59. (Previously published in the abstract-refereed conference “Code, Coding, and Coded Perspectives”, Association of Internet Researchers, Lawrence, Kansas, and September 2000.).
32.L. Jean Camp & Serena Syme,” The Governance of Code: Open Land vs. UCITA Land” ACM SIGCAS Computers and Society, September 2002, Vol. 32, No. 3.
33.Serena Syme & L. Jean Camp, The Governance of Code, Code as Governance , Ethicomp: The social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk, Gdansk, Poland, 18-20 June 2001, Vol. 1, pp. 86-101.
34.L. Jean Camp & Serena Syme, “A Coherent Intellectual Property Model of Code as Speech, Embedded Product or Service, Journal of Information Law and Technology, Vol. 2, 2001.
35.L. Jean Camp & B. Anderson, Expansion of Telecommunication Infrastructure in Emerging Nations: The Case of Bangladesh, Telecommunications Policy Research Conference, Alexandria, VA. 25-26 Sept. 1999.
36.L. Jean Camp, “The World in 2010: Many New Entrants”, info: the journal of policy, regulation and strategy for telecommunications, information and media, Vol. 2 No. 2, April 2000, 167-186.
L. Jean Camp & Charles Vincent, Looking to the Internet for Models of Governance , Ethics and Information Technology, 2004, Vol. 6, No. 3, pp. 161-174.
L. Jean Camp, “Community Considered”, democracy.com? Governance in a Networked, World Hollis Publishing (Hollis, NH) 1999.
37.L. Jean Camp, Democratic Implication of Internet Protocols , : Ethical, Social and Political Dimensions of Information Technology, February 28 - March 1, 1998; Princeton University, Department of Computer Science, Princeton NJ.
38.L. Jean Camp, “The Shape of the Network”, Governance in a Globalizing World, ed. J. Donahue, Brookings Press (Washington, DC) summer 2001.
39.L. Jean Camp, “Principles for Design of Digital Rights Management Systems” IEEE Internet Computing Vol. 6, No. 3 pp. 59-65, May 2003.
40.L. Jean Camp & Stephen Lewis, “The Economics of Information Security” Springer-Verlag 2004.
41.L. Jean Camp, “Identity Theft: Causes, Consequences, Possible Cures.” Springer-Verlag 2007.
Farzeneh Asgapour, Debin Liu and L. Jean Camp, “Computer Security Mental Models of Experts and non-Experts”, Usable Security 07, (Tobago) 16 February 2007.
42.L. Jean Camp, “Privacy: from abstraction to applications”, Computers & Society, Sept. 1994, Vol. 24, No. 3, 8-15.
43.L. Jean Camp & Marvin Sirbu, “Critical issues in Internet commerce”, IEEE Communications, May, 1997
44.Marshall, John 1931. Moenjodaro and the Indus Civilization. 3 Vols. London.
45.Ahmad Hasan Dani, New Light on Central Asia, Sang-e-Meel Publication,1996
46.Ihsan H. Nadiem, Moenjodaro , The Heritage of Mankind, Sang-e-Meel Publication,2002
47.Asko Parpola, Deciphering the Indus Script, Cambridge, Cambridge University Press, 1994
48.Mohammed Rafique Mughal ,Ancient Cholistan Art and Architecture, Ferozsons Ltd., Lahore, 1997
49.Asko Parpola ,Deciphering the Indus Script: methods and select interpretations, Occasional Papers Series, Center for South Asia, University of Wisconsin-Madison, 1997
50.Gregory Possehl , The Indus Age: The Writing System , U. of Pennsylvania Press, 1996,
51.Richard Meadow , Harappa Excavations 1986-1990: A Multidisciplinary Approach to Third Millennium Urbanism, Prehistory Press, 1991,
52.Raymond and Bridget All chin, The Rise of Civilization in India and Pakistan,
Cambridge Univ. Press, 1982
53.Gregory Possehl, Harappa Civilization, Science Pub., 1993
54.Naida Kirkpatrick, The Indus Valley Understanding People in the Past,
Heinemann Library, April 2002
55.Iravatham Mahadevan, Terminal Ideograms in the Indus Script, in Gergeory L. Possehl, Harappan Civilization: A Contemporary Perspective, Oxford & IBH Publishing Co., 1982
56.Gregory Possehl ,The Indus Civilization A Contemporary Perspective,
Altamira Press, January
57.Ardeleanu-Jansen, Alexandra 1983. Stone sculptures from Moenjodaro. Interim Reports, Vol. I. ISMEO- Aachen University Mission. Aachen.pp.139-157.
58.Joshi J.P. & Asko Parpola 1987. Corpus of Indus Seals and Inscriptions (=CISI). Vol. I: Collections in India. Helsinki.
59.Knorozov Y.V. et al 1981. Proto-Indica 1979. Moscow.
60.Lal B.B. 1960. From Megalithic to the Harappa: tracing back the graffiti on pottery. Ancient India, 16, pp. 4-24.
61.Mahadevan I. 1977. The Indus Script: Texts, Concordance and Tables (=ISTCT). Archaeological Survey of India. New Delhi.1998.
Evolution of Ethno-Archaeological Model
1.Nazeer Ahmad Chaudhry, Integration of TCP/IP Protocol Suites with Cryptographic Security approved Ph. D. Electrical & Electronics Engg.) In Total Technology thesis at University of Bradford U.K.
2.Nazeer Ahmad , Secure MIS book draft sent to Artic House Norwood
3.Nazeer Ahmad, Secure MIS in Business Communication, B.M.A. Preston University Research Paper in MIS subject.
4.Nazeer Ahmad ,Protection of Radio Tele-printing Circuits, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1987,pp 25-29
5.Nazeer A. Chaudhry ,Protection of Speech and Data Communication Circuits , The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1988,pp 52-56
6.Nazeer Ahmad ,Neo-Communication Security Environments, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1990,pp 25-29
7.Nazeer Ahmad Chaudhry ,Communication Systems , MS Thesis MUET Jamshoro 1990-1992,
8.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
9.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Hilal Magazine , ISPR Publication , January 1995
10.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1994
11.N. A. Chaudhry , Tactical Nuclear Operations : Indian Option for 21st Century, Pakistan Defence Review, Volume 6, 1994, pp 80-92
12.N. A. Chaudhry , Integrated National Defence , Pakistan Army Green Book, 1991, pp343-346
13.N. A. Chaudhry , Safety Equipment for Nuclear Operations , T.S.O. Research Paper , E.M.E. College NUST Campus Rawalpindi, 1985
14.Nazeer Ahmad. Chaudhry , Pre- Evolution History Corps of Signals 1847-1947, SRC Publishers Hyderabad, 1992
15.Nazeer Ahmad. Chaudhry, Design and Development of Secrecy Electronics Communication System, M. Phil. ( Electronics Engg. ) thesis at MUET Jamshoro, 1993-1995
16.Nazeer Ahmad. Chaudhry , Electronics Warfare Doctrine Under Hostile Environments , Pakistan Army Green Book, 1991, pp 287-290
17.N. A. Chaudhry , Cryptographic and Computer Security , The Hilal Magazine , ISPR Publication , volume 24 , 19 January 1995
18.N. A. Chaudhry ,Evolution of Codes and Ciphers , The Hilal Magazine , ISPR Publication , 8 February 1995
19.N. A. Chaudhry , Cryptographic Security Systems , The Hilal Magazine , ISPR Publication , volume 20 , 15 December 1994
20.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
21.N. A. Chaudhry , Axiomatic Educational Strategy for 21st Century , Research Paper presented at IEEEP Lahore ,1995 and published in local press
22.Nazeer Ahmad , Quality Education , Pakistan Observer Daily, 18 November 1998
23.Nazir Ahmad Chaudhry, Education System & National Development , The Jung Daily, 6 February 1995
24.Nazir Ahmad Chaudhry , A Short History Of Lahore & Its Monuments, 2000, Sang-e-Meel Publisher Lahore
25.Nazeer Ahmad, Legal Settlement of Kashmir Problem , Pakistan Army Journal , U.N. and Kashmir Issue , Pakistan Observer Daily, 15 November 1994
26.Nazeer Chaudhry , Islamic Requirements of Justice System, , Daily Markaz, 22 February1998 Islamabad
27.Nazeer Chaudhry , Islamic System of Saudi Arabia , Daily Markaz, 8 September 1998 Islamabad
28.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Bazem –i- Alm –o-Fun Islamabad 2000
29.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 21 September,1998
30.Nazeer Chaudhry, How to Reduce Budget Deficit , Daily Markaz, 3 April,1999, 4 April,1999, 11 April,1999, Islamabad
31.Nazeer Ahmad , Solution to Public Problems , The Exclusive Weekly, Islamabad, 26 September 1996
32.Nazeer Chaudhry, Budget and Unemployment , Asas Daily , 20 June 1999
33.Nazeer Ahmad , Time to Shake Hands With India , The Exclusive Weekly, Islamabad, 16 July 1991
34.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Defense Digest Monthly, October 1992, pp 53-87
35.Nazeer Ahmad, Constitution of Pakistan and Peoples’ rights , 2004
36.Nazeer Ahmad , We can’t Progress Without Science Education, Pakistan Observer Daily, 2 November 1994
37.Nazeer Chaudhry, South Asian Economy and Kashmir , Al Akhbar Daily, 16 October 1999
38.Nazir Ahmad Chaudhry, Peace, Security &Development, Daily Markaz, 17 Agust,1998, Islamabad
39.Nazir Ahmad Chaudhry, Harappa : the cradle of our civilization , Sang-e-Meel Publication,2002
40.N. A. Chaudhry , Modern Technology Impacts of Defence , Pakistan Army Journal , 1994, pp62-74
41.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
42.Nazir Ahmad Chaudhry, Multan :glimpses, Sang-e-Meel Publication,2002
43.N.A. Chaudhry , Tourism Development in Pakistan , Friday News Weekly, 6 July 1999
44.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, September 1999
45.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
46.Nazir Ahmad Chaudhry, Basanat :a cultural festival of Lahore , Sang-e-Meel Publication,2001
47.Nazir Ahmad , Academic libraries in a developing society ,1984, Sang-e-Meel Publication
48.Nazeer Ahmad , 21st Century Challenges for Our Engineers, Pakistan Observer Daily, 11 December 1994
49.Nazir Ahmad , University library practices in developing countries ,1984, Sang-e-Meel Publication
50.Nazeer Ahmad , New Trends in Energy Generation, Pakistan Observer Daily, 2 November 1994
51.Nazir Ahmad, Oriental presses in the world ,1985, Sang-e-Meel Publication
52.Nazir Ahmad Chaudhry, Eastern Science of Medicine, Pakistan Observer Daily, 18 March 1995
53.N.A. Chaudhry, Kala Bagh Dam , Niwa –i- Waqat Daily, 14 July 1998
54.Nazir Ahmad Chaudhry , Ghulam Rasul Chaudhry , Irrigated Agriculture in Pakistan , Sang-e-Meel Publication,1988
55.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 22 July 1998, Islamabad
56.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 28 July 1998, Islamabad
57.Nazir Ahmad Chaudhry, Anarkali, archives and tomb of Sahib Jamal : a study in perspective , Sang-e-Meel Publication,2002,
58.Nazir Ahmad Chaudhry, Ground Water Resources in Pakistan, Sang-e-Meel Publication, 1974.Nazeer Chaudhry, Expected Attack on Atomic Instillations Pakistan , Osaf Daily 5June 1998, Islamabad
59.Nazeer Chaudhry, Regional Cooperation and Pakistani Forces, Markaz Daily 30 June 1999, Islamabad
60.Nazeer Chaudhry, Circulation of Money Al Akhbar Daily 17 February 2003, Islamabad
61.Nazeer Chaudhry, Solution of Unemployment Problem , Daily Subha, , 17 April 2004, Islamabad
62.Nazeer Chaudhry, Inflation, Unemployment and Terrorism, Daily Subha, , 9 August 2004, Islamabad
63.Nazeer Chaudhry, Social and Economic Welfare of Society , Daily Ehsas , 6 April 1999, Islamabad
64.Nazeer A. Chaudhry, Strategic Dimension of Pakistan, Submitted to Pakistan Defence Review, 2005
65.Nazeer A. Chaudhry, Solution to Kashmir Problem, Submitted to Pakistan Defence Review
66.Nazeer Chaudhry, How to End Terrorism, Daily Markaz , 8 November 1998 , Islamabad
From: N.A. Chaudhry : My thanks to A. Times for registration . Decrypted Secrets of Harappan Civilization 19oo-1300 B.C. can be used for peace and security in Asia and end of terrorism.Global trade through IVC ( Indus Valley Civilization) worth $7.5 billions and trading of largest oil & gas reserves worth over $ 15 Trillions from central Asia is being blocked because , presnt Asians are not so civlized as compared with the Senate of tragers of Harappan States : Harappa , Mohenjodaro, Dholavera , Lothal and Gedrosia . Dani said during very long interview with me for approval of conclusions on 1st cryptanalysis model on IVC script. ,"South Asia was termed as golden sparrow and every one got the job at his door step . Grains and water was protected and we find best model of social security and protection of human rights.Many scholars tried the kicking mule ( IVC scripts ) to accept the daughter ( any of ancient language like Dravidian , Brahvi, and many others ) or at least to adopt it. Many scholars including Dani, B. B. Lal , Russian Professors , Steve Farmer and Michael from Harvard University , Fairservis and others who confirm our conclusions that we might stop forcing the mule to accept the given daughter. Sunskrit literature evolved in Ganga valley even ignores events like attack by Alender in Indus Valley but the literature evolved in1300-1000 B.C. era according to new dating was made to mention the dried up river Hakrra/ Kangra or Srawati( Mughal -1997) in 1990B.C. as flowing big river. After extensive travelling and research work and spending in 5 years including 7 day journey on helicopter , I conclude that this was excessive floods over 18 recorded by Mark & Possehl and change of coarse by indus that shifted Harappa culture to 2600-1900 B.C. to matured Harappan civilzation. Kot Diji culture (Khan -1965) 3500-2600B.C. was quite diffent culture with differnt mythology motifs and symbols having burials sacrfices and divine god like others. Matured Harappan civilization is different adopting global cult of sun god and King Priest was not a divine god. We are not including methimatical cryptanalysis and we ware not diagreeing to anything.. Dravidian the sopken language was not required to be in written form. Do we have any of local languages in written scripts. The answer on record is no . The oldest culture of stone age is Suma ( Sownan Valley ) 0.5 -2.5 million yera old along with bone of Peking man 0.5 m , Iwaja in Japan , a city under the sea at Indian Gujrat coast , oldest city near dead sea in Jordan and Mehrgarh in Gedrosia of 8000 B.C. We had history as sing subject in oldest culture of the world till 1960s and we have elders using counting system of 20s till 1970s in Suma. According to the research by General Kungham Aryan had left Suma ( the salt range & Kashmir in 1426 B.C. and it was being ruled by Anavas tribe. Aran started arriving around 2500 B.C. in small grups as cattle grazers but they had evolved sunskrit before 1900 B.C. seening a big flowing river Hakra. Dani, Mughal and others call it a seperate river but we call it previous alignment of Indus. The concept of roads and rivers is different for people like us actually moving the troops and their suppies. Let us consider my claim that global trading route and attacking route in South Asia before Grand Trunk road was rougly 10 km wide on both sides of G.T. road. Any one who disagree is posted as logistic commader. I ask him to move the treasure of Alender 7 tons of god and silver. Eva our VP on control desk give him published data that this treasure required 26000 mules and 5000 camels. One unit is 33 men and you require over dozen units for many purposes . Two camel load is required for one man. Muhammad of Ghazni attack for Somnat had 30000 troops and 2 camels were required for one soldier for water and rations. We requre the grazing grounds for cattle, local labour , water replenshment and replacement for sick animals . We require a herd of cattles for ration. It may requre few months to get the convoy moved after prepration of many months.
The terms Block Cipher and Stream Cipher are borrowed from modern cryptanalysis (1). The methods and maxims of cryptology were reviewed to find the decrypted secrets of Let us take a very simple example of a message to be encrypted 46 words and 252 characters with spaces and 204 without spaces.
“His Excellency The King Priest of Harappa State as Chairman of Senate for Global Trading Coordinator in South Asia is pleased to order the new seal and signatures to be taken as final orders for all priests to be enforced from 1 January 1900 B.C. “
Let me complement Marshal (1931) , Wheeler (1956), Mackay , Magan, Ghosh, Wolley , Ghosh, Roy (1953), Possel , Tosi (1993), Walter, Fairservis, Sfaffer , Vats(1940), B.B.Lal, Durani(1981), Jacobson, Terome(1986), Kenoyer (1985), Khan F.A.(1965), Ratnagar(1991) and many others who contributed to Indus Valley research. Iravatham Mahadevan seems to be greater scholar when he sys that he could n't decipher the scripts inpite of his over 40 yeras research work. Ahmad Hassan Dani , B.B. Lal and Russian professors are the greates who disagreed to excellent research work by Asko Parpola. Being student of topsecret science Cryptology since childhood , I was associated with code and ciphers. After long discussion with Dani about above researchers and scholars and his work with some of them , we came to the claim of decipherment by Jha N and Rajaram (2000) that I thought the broken seal by Mackay showing rear portion of bull being called hoof of a horse. Dani said smiling , " We am actually Vani from Central Asia hence I would like to apprecite the work by Brahamans ". Then added that government funding is very limited and any effort like the effort of Jha N and Rajaram has to be appreciated but we mightn't agree with decipherment if it is not correct. Then he narrated all the conversation with Parapola and finally he disagreed