Society X

the Great Universe

Category: Technology

D-Wave: The pale blue dot, quantum computing and the black cube of Saturn

by 5ocietyx

d-wave

D-Wave is the first computer to be marketed as ‘quantum’ although doubts remain among some scientists as to the veracity of this claim.

It is said that a genuine quantum computer would be able to break all conventional cyphers instantly.

In May 2013 it was announced that a collaboration between NASAGoogle and the Universities Space Research Association (USRA) launched a Quantum Artificial Intelligence Lab using a 512 qubit D-Wave Two that would be used for research into machine learning, among other fields of study

As discussed in previous posts, the black cube is associated with Saturn.  In a synchromystical twist, around the same time the D-Wave was unveiled, NASA released a photograph of Earth pictured as a blue dot with Saturn and his rings in the foreground.

earth-saturn
Sources:
 https://en.wikipedia.org/wiki/D-Wave_Systems

Advertisements

Occult symbolism of the On/Off button

by 5ocietyx

on-button

According to Wikipedia

The power symbol was the result of the logical evolution of a simple user interface, with most early power controls being simple switches that were toggled between two states demarcated by the words On and Off. As technology became more ubiquitous though, the English words were replaced by the universal numeral symbols 1 and 0 to bypass any possible language barriers. These symbols were later super-imposed on one another when the standard switch for a power control was replaced by a single button which toggled between power states, giving us the universally recognized power symbol we know today.

One and zero are representative of the male-female principle and we also find that the symbol for the ‘On/Off’ or ‘Power’ button incorporates the phallus Yod entering the feminine Yoni in its design. The yoni is the creative power of nature and represents the goddess Shakti.

red-ring-of-death

Red Ring of Death

The XBox 360, which we have discussed previously in the post ‘Consoles of Saturn‘ uses three red lights on the power button’s outer ring indicator to represent a “General Error requiring service of the Console or Power Adapter” commonly nicknamed the “Red Ring of Death.”

It has been noted that the ‘Red Ring of Death’ also resembles HAL 9000 from 2001: A Space Odyssey. It was the monolith from this film that inspired the black XBox 360 units too.

HAL 9000

HAL 9000

Sources:
https://en.wikipedia.org/wiki/Xbox_360_technical_problems
https://en.wikipedia.org/wiki/Power_symbol

The Megalithic Wireless Internet: Cup and ring marked stones and the WiFi logo

by 5ocietyx

wifi-cup-marked-stones

Wherever WiFi is present you will find the WiFi logo. The logo has no functionality, it’s a symbol for the box of tricks doing the work.  The cup and ring marked motif found at all ‘end-points’ on a cup-marked ley resemble the WiFi logo except they are functional and not just symbolic or artistic. The symbol is the component and can connect with self-similar components that are designed the same way creating a wireless comms link that can stretch across the country and around the world.

Are megaliths the hardware; the hard-disks, memory, transmitters, and batteries? Are the cup-marks the industry standard protocols? the telluric energy the power and data combined that uses the backbone of underground streams as carrier waves?

It is suggested that these cup and ring marked networks were not so much for data transfer but acted as some kind of firewall protecting dwellings by diverting negative energy around it.

Drumtroddan

Drumtroddan

It is also noted that cup-marks are nearly always carved where there is an open view. This corresponds with WiFi ‘line of sight’ conditions.

In his book ‘Ley Lines and Earth Energies’ David Cowan mentions that ‘most petroglyphs are positioned so the sun can shine on their surfaces’. This is known as ‘light beam dialling’ although It would be simplistic to think of this as solar power, it is clear that sunlight plays an important part in these ‘spiritual machines’.

According to Carl Munck, our ancient ancestors also built a Global Positioning System by sighting pyramids, temples and stone circles around the globe on specific coordinates to delineate a global coordinate system in relation to the position of the Great Pyramid at Giza.

Evidence also suggests that our ancestors also installed a telephony system, an ancient Skype network that allowed voice messages to be transmitted over vast distances.  The aborigines of Australia for instance called the lines ‘turingas’. We will be investigating these and other possibilities including the similarities between ‘cyberspace’ and the ‘dream-time’ in subsequent posts.

Wireless power transmission coils

TDK Wireless power transmission coils

Related Posts
World’s First Global Positioning System

Renoir: General Network Visualization and Manipulation Program

by 5ocietyx

RENOIR-NSA

With the recent revelations by Edward Snowden regarding the NSA’s domestic spying programmes, a great deal of attention has focused on this clandestine agencies ability to slurp network traffic and decrypt its contents.

How it then analyses and visualises this mountain of data is somewhat more opaque.

One way this is achieved is detailed on their own website’s research section. You can find the link here. A brief description follows:

Renoir is a general-purpose desktop program for manipulating and visualizing networks, otherwise known as graphs. It is written in Java to run on any platform that supports the Java Virtual Machine. Through a well-developed GUI, users can manipulate, analyze, and picture graphs. The program is very general, and applicable to visualizing any information expressing associations.

Renoir offers a variety of both automated and manual layout operations for conveying information. It provides user control of node icons, node color, node labeling, link colors, link styles, link labeling, and a host of other preferences. Graphical elements can have any number of attributes of varying types, including text, numbers, sound, and pictures. Attributes may be local or reside on other computers or in databases. Renoir offers unique capabilities to abstract the graph particularly when the graph gets complex, presenting simplified diagrams with details, which can be expanded and/or contracted real-time.

From what they describe it would appear United States Patent Number 6,515,666 otherwise known as ‘Renoir’ is one way they go about it.

Written in Java, Renoir is network-enabled graphing software, very similar to a tool the 5ociety has itself utilized recently provided by Gephi when attempting to analyse the chatter on the ‘Savile Outed as a Paedo‘ mega-thread on the David Icke Forums.

You can play around with the alpha version here (allow 30 secs to load).

Renoir was of course a famous French Impressionist painter. Impressionist painting characteristics include relatively small, thin, yet visible brush strokes that together form an interpretation of reality. The brush strokes of the NSA’s graphing software are the nodes and the picture of reality they form would appear to be whatever the operative wants to graph.

It is quite easy to see how this would potentially work. The operative could easily scale from a national or even regional level right down to an individual and their associated groups and personal profile that may include real-time communications.  And they could do all this from the comfort of their laptop sat in polo shirt, shorts and sneakers eating doughnuts.

Total Information Awareness logo

For all its generalised power, ‘Renoir’ is merely one small component of the overall capabilities of the U.S.’s  ‘Total Information Awareness’ programme that some say has taken on an artificial intelligence of its own and is known by the nickname ‘Mr Computer’ and is considered to be a digital ‘superconsciousness’.

If you are interested in exploring this technology further, please express your interest in writing to the:

National Security Agency
NSA Technology Transfer Program
9800 Savage Road, Suite 6541
Fort George G. Meade, Maryland 20755-6541

Or simply leave a comment in the section below and we’re sure they’ll pick it up saving you the bother 😉

Sources:
http://www.nsa.gov/research/tech_transfer/fact_sheets/renoir.shtml

Like a Sir: Marconi trolled by magician in world’s first hack 110 years ago

by 5ocietyx

Marconi-Maskelyne

In June 1903, copyright troll Guglielmo Marconi and his partner Ambrose Flemming were about to give the first demonstration of long-range wireless communication at the Royal Institution in London, which, Marconi said, could be sent in complete confidentiality with no fear of the messages being hijacked. Suddenly, the silence was broken by a huge mysterious wireless pulse strong enough to take over the carbon-arc projector and make it sputter messages in Morse Code. First, it repeated the word ‘Rats’ over and over again (abusive at that time). Then it tapped out, ‘There was a young fellow of Italy, who diddled the public quite prettily.’ Further rude epithets followed. It was Nevil Maskelyne, a stage musician and inventor who was annoyed because Marconi’s patents prevented him from using wireless. It was the first hacking, to demonstrate an insecure system.

The 5ociety salutes the stage magus Nevil Maskelyne for his audacious endeavour and deservedly takes his place in the Real-life Heroes of Steampunk Hall of Fame.

For the full remarkable story of the world’s first hack see article in New Scientist here.

Source:
http://www.newscientist.com/article/mg21228440.700-dotdashdiss-the-gentleman-hackers-1903-lulz.html#.UhpqwdLBOSp

“The Black Book”: Technical Description of the Marconi-E. M. I. System of Television

by 5ocietyx

black-book-EMI-Marconi

Does this nondescript black book hold the secrets of how television is used to control the minds of viewers world-wide?

“The Black Book”, 1937-1950, including revision pages, No. 119, issued to W. J. Pearce, with 1-12 tab pages, index, preface amendment sheets, pull-out circuit diagram charts, progress and testing tables through sums, definitive explanations from transmission modules to receiving apparatus.

black-book-EMI-Marconi
black-book-EMI-Marconi
S
ource:
http://www.bonhams.com/auctions/17616/lot/756/

A mighty maze of mystic, magic rays: Hayes and the invention of television

by 5ocietyx

BBC Television Service Marconi EMI System
It was here in the sinisterly named ‘Central Research Laboratories’, Hayes (generally known as “CRL”) that Isaac Shoenberg developed  the all-electronic 405-line television system. Called the Marconi-EMI system, it was used by the BBC from 1936 until closedown of the Crystal Palace 405-line transmissions in 1985.

Marconi-EMI system

Doing a good impression of Kraftwerk, technicians at work on a Marconi-EMI system in the control room at the BBC’s first high definition television station at Alexandra Palace, London, 23rd August 1936

Television, the drug of the nation, used by prison governors to keep inmates docile and by the authorities to mind control the world was pioneered in the Robocop industrial landscape of Hayes, Middlesex by EMI who made weapons and music but were unable to distinguish between the two.

The SAVILLE Programme

by 5ocietyx

philips_crypto_logo

SAVILLE is a classified NSA Type 1 encryption algorithm. It is used broadly, often for voice encryption, and implemented in a large number of encryption devices.

Little is known publicly about the algorithm itself due to its classified nature and inclusion in the NSA’s Suite A. Some documentation related to the KYK-13 fill device and statements made by military officials suggest that SAVILLE has a 128-bit key. On the AIM microchip, it runs at 4% of the clock rate (compare DES at 76% and BATON at 129%). The Cypris chip mentions 2 modes; specifications for Windster and Indictor specify that they provide Saville I.

STU-I   KY-70 Secure Telephone

The funky STU-I KY-70 Secure Telephone implemented the SAVILLE cryptographic algorithm

Some devices and protocols that implement SAVILLE:

  • The VINSON family (voice encryption)
  • APCO Project 25 (single-channel land mobile radios) (Saville has algorithm ID 04)
  • Versatile encryption chips: AIM, Cypris, Sierra I/II, Windster, Indictor, Presidio, Railman

Source: 
http://en.wikipedia.org/wiki/SAVILLE

According to cryptomuseum.com

In the Early 1980s, Philips Usfa in Eindhoven (Netherlands) received a first description of SAVILLE, because it was developing its Spendex-40 and Spendex-50 narrow band and wide band secure voice equipment. Unlike before with Aroflex, that used a Philips Usfa designed crypto logic, this time it was decided to implement an existing and already approved NATO crypto logic.

Clearly, this had a number of advantages. First of all interoperability with existing NATO equipment like STU II and VINSON. Secondly, it was anticipated that the NATO approval by SECAN would take much less time, by not having to evaluate the crypto logic.

Rumour had it in those days, that there was a third reason. By implementing SAVILLE in a new national development, the NLNCSA would automatically receive all baseline documentation regarding the crypto logic, which would otherwise not be obvious at all.

Still, to Philips Usfa and its cryptography aware employees it seemed quite peculiar that cryptographic equipment using a foreign, NSA-developed crypto logic, was used to protect top secret information. SAVILLE was implemented in hardware, more precisely in circuits comprising a custom gate array and standard integrated circuits, by Philips Usfa in the first half of the 1980s.

Source:
http://www.cryptomuseum.com/crypto/usa/saville.htm

Harald Bluetooth

by 5ocietyx

Harald Bluetooth

“Bluetooth” now commonly refers to the Bluetooth wireless specification design started by Ericsson, Nokia, Intel, Toshiba and IBM, to enable cable-free connections between computers, mobile phones, PDAs, printers, etc. The Bluetooth communications protocol in these devices is named after this king, ostensibly due to his abilities to make diverse factions communicate with each other. According to legend, he gained the nickname “Bluetooth” from his love of blueberries, which stained his teeth. The Bluetooth logo consists of the Nordic runes for his initials, H and B (Long-branch runes version).

Bluetooth logo

Bluetooth logo

Source: https://en.wikipedia.org/wiki/Bluetooth#Name_and_logo

The Northala Mounds and the age of digital landscapes

by 5ocietyx

Northala-Mounds

Standing right beside the A40, a short distance from RAF Northolt, are four conical mounds, the the tallest stands at 26 metres. These are part of Northala Fields, one of London’s newest parks, opened in 2008, and were constructed using waste material from the original Wembley Stadium the new Westfields shopping centre.

The mounds shield the rest of the park, created on the former Kensington and Chelsea’s Playing Fields site, which includes a model boating lake, play areas and an amphitheatre, from the noise and pollution of the A40.

Via tiredoflondontiredoflife.com

So the mounds served as a landfill as well as sonic shield, but is there a more mystical reason for their creation?

Are they homages to the great stone and earthworks of the olden days or simply a direct continuation of them disguised by the seemingly mundane and practical municipal services they happened to offer?

Northala-aerial

Visitors ascend the largest mound in a spiral motion in an initiation ritual that represents the long up-hill struggle of life and the reward of illumination and the view from above.

An interesting aspect about these modern earthworks as well as where they are being located or whether their dimensions follow any kind of sacred geometrical pattern, is that they are digital.

They have been designed using CAD. The ancient monuments are analogue designs, as far as we know, created without the assistance of digital computers.

This is what give the new earthworks that slightly artificial, slightly too perfect feel to them that you can’t quite put your finger on but you know it when you see it. It’s the same with cars, planes, boats, houses, buildings, music, photography – everything that has been processed digitally during the design phase.

Northumberlandia

Northumberlandia is another digital earthwork

You sense the signature of the algorithms of the software package used to produce the undulating landscape designs.

To the modern geographer, the ‘lay of the land’ can be explained purely through geological terms having no mystical significance attached to it. Their bible is the Ordnance Survey with its matter-of-fact cartography of material space and although precise and practical lacks any deeper meaning to the places and the planet it describes. The birth of an island is merely the rising peak of volcanic activity from the depths below that has breached the water-line and not a wondrous act of creation and associated mythology and spirit attached to it. The surface of the earth is just a random sprawl of the aftermath of volcanic activity, tectonic shifts, space debris and earth-quakes.

Yet mankind has always placed great importance on the dips and peaks of his surroundings. Mountains are worshipped as gods. Rivers are often-times seen as holy. The river Thames for instance becomes the river Isis as it flows through Oxford. For thousands of years the waters of the river Ganges have been seen as holy.

The multi-dimensional time-river the Nile is seen as the ‘tree of life’ providing fertility above and below a vast continent.

As the modern world developed, nations placed more importance on artificial demarcation lines and borders based on politics, always marked with straight-lines. The continent of Africa was forensically sliced into rectangular blocks. In the olden days, clans, tribes and peoples were separated by natural demarcations governed by the fracticalities of the flow of rivers, mountain ranges, jungles, deserts and oceans. Villages evolved organically and at their own pace compared to the top-down decisions made by town planning committees such as the Milton Keynes Development Corporation who laid out MK as a grid.

Related Posts: Northumberlandia

%d bloggers like this: