Society X

the Great Universe

Category: Cipher

Political Correctness: Uninstalling the mind virus, one widget at a time with the PC Auto-Translation Service

by 5ocietyx

political-correctness-fascism

Tired of reading the same old loaded PC terms that twist the meaning of words to suit an agenda?

Wouldn’t it be nice not to have to interpret the hidden truths lurking beneath the surface of PC platitudes?

At the Society we can provide a simple yet useful antidote to the nonsense narratives of the cultural marxist social engineers and mind benders.

All you have to do is follow these simple steps (Chrome only)

1.

Copy the following code-block

{
“inputN”: 3,
“values”: [
{
“replaceWith”: “anti-white”,
“replaceWithinWords”: true,
“toReplace”: “anti-racist”
},
{
“replaceWith”: “mass murder”,
“replaceWithinWords”: true,
“toReplace”: “collateral damage”
},
{
“replaceWith”: “marxist mind-control”,
“replaceWithinWords”: true,
“toReplace”: “political correctness”
}
]
}

2

Install the Word Replacer extension from here

3

Go to ‘more settings’ -> ‘extensions’

4

Go to ‘Options’

5

Click ‘Import’

6

Paste the code you copied earlier into the grey box

7

Click ‘Import’

8

Click ‘Save settings’

Now try it out. Go to any website in Chrome and if it contains an infection of PC terminology then you will find it has been magically replaced by plain english.

For instance, any reference to ‘anti-racist’ will instead say ‘anti-white’ in every website you visit (well almost all).

If you have any terms you would like to add to the master-list then please send them to the society in the comments section below. You can always customize your own list to suit your own perspective on things.

Political Correctness: Uninstalling the mind virus, one widget at a time..

Advertisements

Like a Sir: Marconi trolled by magician in world’s first hack 110 years ago

by 5ocietyx

Marconi-Maskelyne

In June 1903, copyright troll Guglielmo Marconi and his partner Ambrose Flemming were about to give the first demonstration of long-range wireless communication at the Royal Institution in London, which, Marconi said, could be sent in complete confidentiality with no fear of the messages being hijacked. Suddenly, the silence was broken by a huge mysterious wireless pulse strong enough to take over the carbon-arc projector and make it sputter messages in Morse Code. First, it repeated the word ‘Rats’ over and over again (abusive at that time). Then it tapped out, ‘There was a young fellow of Italy, who diddled the public quite prettily.’ Further rude epithets followed. It was Nevil Maskelyne, a stage musician and inventor who was annoyed because Marconi’s patents prevented him from using wireless. It was the first hacking, to demonstrate an insecure system.

The 5ociety salutes the stage magus Nevil Maskelyne for his audacious endeavour and deservedly takes his place in the Real-life Heroes of Steampunk Hall of Fame.

For the full remarkable story of the world’s first hack see article in New Scientist here.

Source:
http://www.newscientist.com/article/mg21228440.700-dotdashdiss-the-gentleman-hackers-1903-lulz.html#.UhpqwdLBOSp

The SAVILLE Programme

by 5ocietyx

philips_crypto_logo

SAVILLE is a classified NSA Type 1 encryption algorithm. It is used broadly, often for voice encryption, and implemented in a large number of encryption devices.

Little is known publicly about the algorithm itself due to its classified nature and inclusion in the NSA’s Suite A. Some documentation related to the KYK-13 fill device and statements made by military officials suggest that SAVILLE has a 128-bit key. On the AIM microchip, it runs at 4% of the clock rate (compare DES at 76% and BATON at 129%). The Cypris chip mentions 2 modes; specifications for Windster and Indictor specify that they provide Saville I.

STU-I   KY-70 Secure Telephone

The funky STU-I KY-70 Secure Telephone implemented the SAVILLE cryptographic algorithm

Some devices and protocols that implement SAVILLE:

  • The VINSON family (voice encryption)
  • APCO Project 25 (single-channel land mobile radios) (Saville has algorithm ID 04)
  • Versatile encryption chips: AIM, Cypris, Sierra I/II, Windster, Indictor, Presidio, Railman

Source: 
http://en.wikipedia.org/wiki/SAVILLE

According to cryptomuseum.com

In the Early 1980s, Philips Usfa in Eindhoven (Netherlands) received a first description of SAVILLE, because it was developing its Spendex-40 and Spendex-50 narrow band and wide band secure voice equipment. Unlike before with Aroflex, that used a Philips Usfa designed crypto logic, this time it was decided to implement an existing and already approved NATO crypto logic.

Clearly, this had a number of advantages. First of all interoperability with existing NATO equipment like STU II and VINSON. Secondly, it was anticipated that the NATO approval by SECAN would take much less time, by not having to evaluate the crypto logic.

Rumour had it in those days, that there was a third reason. By implementing SAVILLE in a new national development, the NLNCSA would automatically receive all baseline documentation regarding the crypto logic, which would otherwise not be obvious at all.

Still, to Philips Usfa and its cryptography aware employees it seemed quite peculiar that cryptographic equipment using a foreign, NSA-developed crypto logic, was used to protect top secret information. SAVILLE was implemented in hardware, more precisely in circuits comprising a custom gate array and standard integrated circuits, by Philips Usfa in the first half of the 1980s.

Source:
http://www.cryptomuseum.com/crypto/usa/saville.htm

What did Ira Levin know?

by 5ocietyx

Ira Levin

Far from being a prolific author Ira Levin wrote only seven novels, but they included one that prompted the late 1960’s gothic revival, Rosemary’s Baby, as well as the transhuman nightmare The Stepford Wives, cloning thriller The Boys from Brazil and Sliver, all of which were made into films – and made their author a great deal of money. Along with these he also wrote the long-running Broadway comic thriller Deathtrap (which was also later made into a film). His major works, those that were transposed to the silver screen intertwine in a strange, occult way, almost suggesting Levin knew something unspoken, and had encoded it into his works, much the same way as it is alleged Stanley Kubrick had.

When he was twelve Ira Levin said he was fascinated by the magicians of Tannen’s Magic Shop in Times Square and he learned about concealing reality behind illusion. He liked detective stories and had a collection of mystery books. Anagrams played major roles in Rosemary’s Baby and Son of Rosemary. Ira Levin continued the tradition of  using the transposition of letters (Lon Chaney Jr. in Son of Dracula) and basics of cryptology (Poe in The Gold Bug).

The first book we’ll look at, ‘The Stepford Wives’ (1972) was supposedly a satire on American culture, its anti-feminist theme subtly poking an eye of the recently liberated women of the world. It was a patriarchal wet-dream of the future, centred around a seemingly normal suburban town where the men attend secret meetings, during which they plot with a neighbour and ex-employee of Disneyland (a specialist in animatronics)  to replace their wives with robotic doubles, obedient housewives and grateful sex kittens ready to perform their duties at a moment’s notice, with no complaints.

The second book, ‘Rosemary’s Baby’ (1967) was a diabolic tale involving the implanting of the seed of a demon in a young woman. A young couple – Guy and Rosemary – move into an apartment block (the Dakota building, New York, famous for being the scene of John Lennon’s assassination) where they befriend an eccentric elderly couple, who initiate the Guy into a secret occult group based within the building. With Guy’s consent, they drug Rosemary, and through a satanic ritual involving sex (rumoured to have been scripted by Church of Satan leader Anton Le Vey) they impregnate Rosemary with the seed of the Anti-Christ, in much the same way as Aleister Crowley suggested was possible with his Moon Child ritual. Incidentally, the film was directed by certified child pest Roman Polanski. (see this post at vigilantcitizen for more details on Rosemary’s Baby and its occult links)

The third book is ‘The Boys From Brazil’ (1976) in which a German scientist – who escaped prosecution after WW2 by hiding out in South America – implants dozens of women with the genetic descendants of the German beast, Adolf Hitler. These little Hitler clones would grow up to become the new leaders of the Third Reich, the thousand year empire of the Nazis.

Three different books, that all seem to have something in common. The Boys From Brazil and Rosemary’s Baby are both about implanting women with a demon seed, with the intention of having them take over – and presumably enslave – the world. The Stepford Wives relates to both the others in that it also is about enslaving the world – this time the world of women – by replacing them not with genetic clones but with Disney-tech robotic clones. It also has in common with Rosemary’s Baby the idea that people are meeting in secret to implement their plans.

We have yet to discover any links to secret services with Ira Levin – although he was drafted into the US army signal corps (1953-55), where, whilst stationed in Queens, he wrote and produced training films. But considering nearly everything he wrote was immediately pushed into the public consciousness and popularised (some creepier elements of which still linger with us today) he is to us an intriguing character. The occult links to Rosemary’s Baby alone – both its story and the controversy surrounding director Roman Polanski – coupled with Levin’s fascination for magic, ciphers and, as he described it, the concealing of reality behind illusion, are enough to suggest something else was going on below the surface with his work.

for more see –

http://www.bellenews.com/2011/08/27/arts-culture/ira-levin-interesting-facts-about-his-work/#ixzz2V9edhEVs

Etymology of the word ‘Code’

by 5ocietyx

code (n.) c.1300, “systematic compilation of laws,” from Old French code “system of laws, law-book” (13c.), from Latin codex, earlier caudex “book, book of laws,” literally “tree trunk,” hence, book made up of wooden tablets covered with wax for writing. Meaning “cipher” (the sense in secret code) is from 1808.

presumably the ‘cau-‘ in the word ‘caudex’ comes from the latin caulis (n.) meaning stem or stalk of a plant, from where we get the word ‘cauliflower’.

Can we then also presume that ‘-dex’ comes from the Latin ‘dexter’, meaning “skillful, but also “right (hand) the root of which comes from the PIE ‘*deks-‘. meaning on the right hand (see also Sanskrit ‘daksinah’ “on the right hand, southern, skillful;” Avestan ‘dashina’- “on the right hand;” Greek ‘dexios’ “on the right hand,” also “fortunate, clever;” Old Irish ‘dess’ “on the right hand, southern;” Welsh ‘deheu’; Gaulish ‘Dexsiva’, name of a goddess of fortune; Gothic ‘taihswa’; Lithuanian ‘desinas’; Old Church Slavonic ‘desnu’, Russian ‘desnoj’).

So the word ‘code’ breaks down as ‘the stem (of the body) of the skillful right hand’.

 

taken from – http://www.etymonline.com/index.php?term=code&allowed_in_frame=0

Crypto-Smasher V3.10 and the black cube of Saturn

by 5ocietyx

Crypto-Smasher

Crypto-Smasher V3.10

Crypto-Smasher V3.10 appears in John Hughes’ Weird Science when Gary and Wyatt hack into military networks in order to have enough computational power to create their ideal woman. Ridiculous, we know, even with today’s technology, but we noticed Crypto-Smasher took the form of the black cube and hexagon. They enter a sprawling 16bit version of cyberspace via the black cube that morphs into a hexagon.  A whirlpool vortex even makes an appearance within the black cube.

WEIRD-SCIENCE-CUBE1

WEIRD-SCIENCE-CUBE2

Decode path: 1111

WEIRD-SCIENCE-CUBE3

Decode path: 1111

WEIRD-SCIENCE-CUBE8

whirpool vortex appears in black hexagon-cube

WEIRD-SCIENCE-CUBE4 WEIRD-SCIENCE-CUBE5 WEIRD-SCIENCE-CUBE6 WEIRD-SCIENCE-CUBE7 WEIRD-SCIENCE-CUBE9Golden ring clock-face, both symbolic of Saturn

Golden ring clock-face, rings and time are symbolic of Saturn

WEIRD-SCIENCE-CUBE11

The language of flowers

by 5ocietyx

The language of flowers

The language of flowers

The language of flowers, sometimes called floriography , was a Victorian-era means of communication in which various flowers and floral arrangements were used to send coded messages, allowing individuals to express feelings which otherwise could not be spoken. This language was most commonly communicated through tussie-mussies (small flower bouquets), an art which has a following today.

language-flowers-wordcloud1

The nuances of the language are now mostly forgotten, but red roses still imply passionate, romantic love and pink roses a lesser affection; white roses suggest virtue and chastity and yellow roses still stand for friendship or devotion. Also commonly known meanings are sunflowers, which can indicate either haughtiness or respect – they were the favourite flower of St. Julie Billiart for this reason.

Inevitably there are geographic variances.

Source

The language of flowers

The language of flowers

Barbury Castle crop circle decoded

by 5ocietyx

Barbary castle crop circle

Barbary Castle crop circle, photo by 5ocietyx

A crop circle appeared on the 1st of June 2008 in a barley field near Barbury Castle in Wiltshire, England, measuring 150 feet in diameter and correctly representing the first 10 digits of the irrational constant pi.

The grooves in the circle spiral outwards with steps at various points along the way. These steps occur at particular angles — the circle is divided into 10 equal segments of 36 degrees each. Starting at the centre, you can see that the first section is 3 segments wide. Then there is a step and underneath this step is a small circle. This is the decimal point. The next section is 1 segment wide and then there is another step. The following section is 4 segments wide, and so on until the final number encoded is 3.141592654.

“The fact that the Pi decimal point is included and there is rounding up to 10 decimal places is to me a little mind boggling!” – Michael Reed,  astrophysicist

The location of the Pi crop circle was 51.488258 degrees north, 1.771964 west

“You can do it on a computer, but you try putting that in a field in the middle of the night and achieving that degree of mathematical accuracy.” Lucy Pringle, crop circle expert

Pringle’s theory is that crop circles are created by a spiralling electromagnetic force that hits the ground for a nanosecond.

Source

Barbary Castle crop circle, Pi diagram

Barbary Castle crop circle, Pi diagram

Barbary castle crop circle

Croppies investigating Barbary Castle crop circle, photo by 5ocietyx

Barbary castle crop circle

Barbary Castle crop circle outer edge, photo by 5ocietyx

Barbary castle crop circle

Barbary Castle crop circle, photo by 5ocietyx

Barbary castle crop circle

Barbary Castle crop circle, photo by 5ocietyx

Barbary castle crop circle

Barbary Castle crop circle, aerial view

Barbary castle crop circle

Barbary castle crop circle

Barbary Castle crop circle Pi diagram

Barbary Castle crop circle Pi diagram

National Security Agency HQ

by 5ocietyx

NSA HQ

http://en.wikipedia.org/wiki/National_Security_Agency

Malevolent Machines: National Security Agency Servers

by 5ocietyx

NSA servers

Late 1999: NSA Begins ‘Trailblazer’ Data Mining Program
The National Security Agency begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace.

http://www.historycommons.org/context.jsp?item=civilliberties_115#civilliberties_115

%d bloggers like this: