How to make the US Post Office prosperous and relevant in the 21 century using the One-Time Pad algorithm!

Every Tuesday I meet with a group of Patriots from the Illumination Society at the Liberty Restaurant in Rochester NY to do a round table radio broadcast discussing topics about Geo politics, religion, Currant events and anything that has to do with Truth Liberty and Justice for all.  We not only talk about problems but as a group we also work on finding solutions to the world problems.  every week we have some of the brightest minds join us at the round table live Broadcast. http://www.blogtalkradio.com/anti-illuminati-party

The Illumination Society  presents a FREE Movie Night every month showing films that we feel are important for the time in which we live. Films that dig deep into subjects like – The World History – UFO – The New World Order – Spirituality – Prophecy – Science – What’s Happening To Our Food – Agenda 21 – Vaccines and many other subjects.

Our Free Movie Night has been well received by people from all walks of life. People concerned with the things happening in our world today. People that want to know what is happening all around us and what we can do to stand against those that wish to rob us of our freedoms and our God-given rights. Come out and learn about subjects you may or may not be aware of. We hope that our Movie Nights, and our following Q&A time will shed some light on these subjects, and help you to see America’s role in past, present and future history.

We will be presenting the following films on the following dates:
– See more at: https://www.eventbrite.com/e/movie-night-tickets-12609803261

You can also join us in our round table discussion and suggest topics you would like us to discus.

Anti New World Order Party ☼ Global Group

https://www.facebook.com/groups/AntiNewWorldOrderPartyGlobal/

Now to the main point of this blog post today,  We will also have a follow-up to this post.

Original posted on FutureBeacon.com

 

Communication Privacy
by
James Adrian

Introduction

      Many individuals, businesses and other organizations have a legitimate and lawful need to keep some of their information confidential or even absolutely secret from competitors, the press and others. Because email has become vital to timely communication and because email is not secure, encryption is often necessary.

      New employees of large companies are often encouraged to live near the company’s offices. In this kind of setting, privacy for technical and marketing information is convenient. Small organizations such as law offices, medical clinics, Internet businesses, and many others may not find the expertise they need in their local area. These small organizations, of which there are many, need secure communication to avoid the cost of face-to-face meetings. Lacking the funds for routine flights between cities, these organizations are very dependent on the electronic communication of data and ideas. Private medical information, schematic drawings, program source code, marketing plans, and innumerable other types of documents are involved. In such circumstances, strong encryption is needed.

      In many countries, the post office has the legal authority and obligation to enforce privacy for the postal mail. If these postal services were to offer secure email for a reasonable price, small companies would not be at such a disadvantage relative to larger companies.

      Established by the U. S. Constitution, Article I, Section 8, Clause 7, the United States Postal Service is authorized “To establish post offices and post roads. It also has a long history of adding services as needed, such as commemorative stamps, rural delivery, airmail, one-day delivery, zip codes, self-adhesive stamps, public Internet site, “Forever” stamps, and an iPhone app. Secure communication would add to its revenue (which would help ameliorate its recent shortfalls) and set a good example.

Technical Matters

      To create a secure message, the encryption algorithm must used secret information that cannot be discovered by unauthorized parties. If the encryption relies only on complexity or computational difficulty without involving secret information, the intended message can be discovered by third parties. To third parties, some aspect of the transmission must be unknowable.

      Within encryption technology, the embodiment of information unknowable to third parties often takes the form of secret random numbers. These random numbers are used to encrypt messages in such a way as to make decryption of a message impossible without access to those same random numbers.

      Many have said that what one person can encrypt, another can decrypt. This is a myth. TheOne-Time Pad algorithm was proved to be absolutely secure in the writings of Claude Shannon. See “Claude Elwood Shannon – Collected Papers” edited by N. J. A. Sloane and Aaron D. Wyner. In addition to being immune from hacking, this algorithm becomes more convenient as memory devices increase their capacity.

      Claude Shannon proved that any absolutely secure encryption algorithm must posses these characteristics:

      1. The encryption keys must be random numbers of uniform distribution.

      2. The keys must be shared in absolute secrecy by the sender and receiver.

      3. Any key encrypting a message must be as at least as long as that message.

      4. Any key used to encrypt a message must not be reused.

      The one-time pad is a famous encryption algorithm having all of these characteristics. By using a random key comprised of random numbers to encrypt a message (the plain text) with the XOR logical operation, the transmitted result (the ciphertext) is rendered as random as the key. The collection of secret keys is called the pad. Keys are of the same length as that of the messages they encrypt. They are erased immediately after their use. The result is that the actual message is as likely as any other message from the point of view of those attempting to decrypt the message without knowing the secret random numbers.

      Optionally, encrypted messages can be made to appear to be ordinary messages of a different type, such as pictures or sound files or text messages that contain information that is very different form that in the plain text. This process is called Steganography.

Services

      The most important service facilitating secure communication is the shipping of media containing random numbers. The production of truly random numbers for algorithms that encrypt messages by means of random keys is the part of the process most challenging and inconvenient for the customer. The principle service of USPS would be to place random numbers on appropriate media and ship copies to addresses designated by the customer. One shipment might serve the customer for only a few messages or for years worth of messages, depending on the number of random numbers shipped.

      Options may include picking up shipments from the local post office, receiving them in the mailbox, or receiving them at the recipient’s door (possibly by special delivery or with a return receipt).

Criminality

      Measures which distinguish legitimate from nefarious use of encryption services need not be publicly discussed.

Contact

      Please feel free to make suggestions by writing to jim@futurebeacon.com.

At least three Ancient Antarctica Pyramids Underground City’s Found

Please visit our sister site: http://antinewworldorderparty.blogspot.com/2012/09/antarctica-triangle-ancient-pyramids.html

Augason Farms Forever Garden Vegetable Seeds 2-Pack – Emergency Food (Google Affiliate Ad)

A team of researchers are claiming that they have discovered three ancient pyramids on the ice covered continent of Antarctica. Exact details are sketchy, but the team have released three intriguing pictures of their discovery.

The international team comprises researchers from the United States, and several other, are from various European countries. Two of the huge pyramid structures were found approximately 10 miles inland, the third one not far from the coastline, clearly visible from ocean.

Can it be possible that Antarctica was once warm enough in the recent past to actually have had an ancient civilization living there?  And even more perplexing is the question of if an advanced culture did develop there, are there any structures still remaining that are buried underneath the ice?  Amazingly a team of researchers is making the claim that they have found evidence of several ancient pyramids on the ice covered continent of Antarctica.

The team are currently planning an expedition to reach one of the pyramids to find out if it is a natural or an artificial structure. No further Details have been reported from the team as of 29 August 2012. More news is pending. Im undecided on this one guys until further confirmation, so as always you decide.

Underground Pyramid base entrance, maybe.  One thing I can tell you is that what you are seeing is the Antarctic Triangle.  Put in to hide whats really there.  Underground City‘s they dont want you to know about or to find.  I have done some research and what I have found is other groups have tried to go to the Antarctic to find its secrets and have not returned or if they have will not talk about what they have found!

Have the Russian team inadvertently stumbled across something not meant to be seen, somethingburied many years ago by Aliens or earthly forces? Hopefully they will reveal all when they eventuallymanage to make contact… but in the world of conspiracy and secrets people have a habit of turningup dead.

A Russian team trying to reach the alien structure discovered by a roving satellite miles below the Antarctica  ice only have a limited period each year when work in the region is possible.
They last contacted their base on January 30th this year and they are now down to less than 48 hoursbefore temperatures fall to the lethal level and escape would be impossible!
The scientists carry Iridium satellite phones for communication, but there are black spots.
At the moment, nobody knows what has happened to them!
Read on for the full story.

In 1947 the US Navy under Admiral Byrd conducted Operation High Jump. The expedition to Antarctica involved 4000 naval personnel and 13 huge ships, including several large airplanes and helicopters. The goal was to map and catalog all of the coastline of the continent, including minerals and wildlife. The entire expedition was to last 6 months.

During the expedition a base was established at Little America, a coastal bay, and a tent city was constructed where aircraft could be maintained for the survey. Several teams of explorers were sent out to various corners of Antarctica with large format cameras for the photographic survey. When the crew photographing the region directly Southwest of the Australian continent arrived for their mission they were shocked. They radioed back that the coastal region was free of ice and that the water was 38F. They continued to take photographs and later returned to process the images.

Immediately after this event the entire expedition was halted and all ships and Naval personnel were made to return to the States. The results of the mission are still classified, after 60 years. Only Admiral Byrd, who was interviewed by a Chilean journalist on his trip home from the expedition, commented on the sudden return home. He stated that there was a danger which this expedition had encountered that posed a threat to every nation in the free world. He declined to elaborate on this.

http://rense.com/general32/aryan.htm   

For five years, the Germans carried out work for the creation of a secret project code-named “Base-211,” This has been determined by several independent experts. By the end of WWII, the Germans already had nine scientific enterprises where “flying disk” projects were tested. Many scientists are positive that at least one of these Third Reich enterprises was transferred to the Antarctic. Famous researchers of the Third Reich’s Antarctic mysteries, R. Vesko, V. Terziysky, and D. Childress, claim that from 1942, thousands of concentration camp prisoners, prominent scientists, pilots, politicians with their families, and members of the Hitlerjugend were taken to the South Pole via submarine. Some scientists believe that a German base still remains in the Antarctic. Moreover, it is even said that there is an underground Aryan city called New Berlin, which has a population of two million people.

http://www.bibliotecapleyades.net/antarctica/antartica12.htm

Representatives of three occult societies, “Thule”, “Vril” and “Ahnenerbe”, ran those projects.
Famous researchers of the Third Reich’s Antarctic mysteriesR.VeskoV.Terzisky, and D.Childress, claim that from 1942, thousands of concentration camp prisoners, prominent scientists, pilots, politicians with their families, and members of the Hitlerjugend were taken to the South Pole via submarine. Some scientists believe that a German base still remains in the Antarctic. Moreover, it is even said that there is an underground Aryan city called New Berlin, which has a population of two million people.

This has been determined by several independent experts. By the end of WWII, the Germans already had nine scientific enterprises where “flying disk” projects were tested. Many scientists are positive that at least one of these Third Reich enterprises was transferred to the Antarctic.

An ancient hi-tech “city” nicknamed “Rainbow City” was reportedly discovered in Antarctica by a small group of American researchers in the late 1940’s.

Reportedly an on-site staff of 2000 was later stationed there to study the ancient mechanical devices, the operation of time-space portals, holographic records, and an ancient underground ‘rail’ system with Rainbow City being the central hub. Antigravity craft are also reportedly being used by the researchers.

~The Hefferlin Manuscript; Rainbow City and the Inner Earth People, by Timothy Green Beckley

Conspiracy theorists recall the rumor, following WWII, of Nazi bases that were established in Antarctica. Other stories say that the Nazis contacted and were working with a group of extra-terrestrials and that there is an huge underground base there.

We’re not sure whether or not this is a base, but it does look un-natural and somehow maintained free of ice. We welcome any suggestions or comments.

Besides these images, the team is remaining pretty silent with their discovery until more research can be conducted on these pyramids.  I was able to obtain some small bits of information from a friend of one of the team members though.  The team is made up of 8 explorers from America and several European countries.  Two of the pyramid structures were found approximately 10 miles inland while the third one was very close to the coastline.  The team is currently planning an expedition to physically reach at least one of the pyramids to determine if it is natural or artificial.  No time frame was given as to when this expedition will be taking place though.

So, what is your opinion on these pyramids?  Are we on the verge of perhaps one of biggest archaeological discoveries ever or are these structures nothing but natural formations?  Be sure to stay tuned to this one ……

Read more: http://scienceray.com/biology/man-made-ancient-pyramids-found-on-antarctica/#ixzz26bi9AdbA

http://www.viewzone.com/antarcticbase.html

With google-earth we now have the ability to see the coast line of Antarctica in great detail from satellite images. We see the coast that was photographed, as well as some mountains that are free of ice or snow. We can see the ice breaking up in this region as if melting from some source of heat. But what’s more remarkable is that we can see some kind of an entrance.

The image above is readily available to anyone using google-earth and the coordinates provided. I suggest you try to examine this location at an angle instead of just straight down, and maintain the true North. The entrance appears to be about 180 feet wide by 230 feet high. Outside there are some straight surfaces which appear man made.

President Obama signed an Executive Order to seize control of all communications infrastructure in the United States

ORIGANAL REPORT: IVN.us

july 15, 2012

In an unprecedented step for executive power, President Obama signed an Executive Order on July 6th that allows the executive branch to seize control of all communications infrastructure in the United States, public and private:

“Without even the faintest toot of a fanfare, President Barack Obama has issued an Executive Order that outlines an extreme level of communications preparedness in case of crisis or emergency, including the ability to take over any communication network, including the internet.

The Order, ‘Assignment of National Security and Emergency Preparedness Communications Functions,’ takes many of the US government’s existing emergency communications preparations, and codifies the exact responsibilities of the various US secretaries/departments and intelligence agencies

. For the most part, the Order is very sensible; basically, no matter what — come hurricanes, earthquakes, or nuclear war — the US government ‘must have the ability to communicate at all times and under all circumstances to carry out its most critical and time sensitive missions.’”

One can expect governments to plan for all kinds of emergencies– i.e. meteor strikes, wars, uprisings, (etc.). Several continuity plans are already in place. But if this latest executive order sounds unbelievable, then it probably should, because with the stroke of a pen, President Obama has entered America into a new paradigm.

No longer is it enough for Washington to simply use, cooperate with, or listen to private communications.

Now the president claims the authority to order all of it seized– as in nationalized under federal control.

In a sense, however, this sweeping new order is only somewhat unprecedented, at least in the Bush-Obama era of executive power. Potential seizure of communications infrastructure simply folds into a laundry list of resources that Obama declared authority to seize and manage in another recent Executive Order:

“On March 16th, President Obama signed a new Executive Order which expands upon a prior order issued in 1950 for Disaster Preparedness, and gives the office of the President complete control over all the resources in the United States in times of war or emergency.

The National Defense Resources Preparedness order gives the Executive Branch the power to control and allocate energy, production, transportation, food, and even water resources by decree under the auspices of national defense and national security. The order is not limited to wartime implementation, as one of the order’s functions includes the command and control of resources in peacetime determinations.”

It is troubling how little coverage and scrutiny this event is getting in the mainstream media. Agree with this new policy or not, why aren’t Americans even discussing it?

Read Entire Article 

White House Seizes Control of Internet by Executive Order

 

Your Next Flu Vaccine could be your last! Disguised bioweapon? All we need is the right major crisis, and the nations will accept the New World Order.”

Joseph Moshe (MOSSAD Microbiologist): “Swine flu vaccine is bioweapon”
Joseph Moshe (MOSSAD Microbiologist): “Swine flu vaccine is bioweapon”

Sponsored by the Derma roller

Today, the MSM are not talking about this case any more. Yesterday, they wanted us to believe that Joseph Moshe was a nutcase and a terrorist, arrested for threatening to bomb the White House. Interesting detail about his arrest (the “Westwood standoff”) was that he seemed to be immune to the 5 cans of tear gas and 5 gallons of law-enforcement grade pepper spray they pumped into his face. He very calmly remained in his car, as the video footage of his arrest shows.

Professor Moshe had called into a live radio show by Dr. A. True Ott, (explanation of Joseph Moshe’s call at 06:00) broadcast on Republic Broadcasting claiming to be a microbiologist who wanted to supply evidence to a States Attorney regarding tainted H1N1 Swine flu vaccines being produced by Baxter BioPharma Solutions. He said that Baxter’s Ukrainian lab was in fact producing a bioweapon disguised as a vaccine. He claimed that the vaccine contained an adjuvant (additive) designed to weaken the immune system, and replicated RNA from the virus responsible for the 1918 pandemic Spanish flu, causing global sickness and mass death.

Sources tell us that Bar-Joseph Moshe made no threat against the President or the White House. He did not mention any bomb or attack. He then proceeded to inform the White House he intended to go public with this information. When he noticed men in suits in front of his house and feared that the FBI was about to detain him, he packed some belongings into his car and, him being a dual Israeli citizen, tried to reach the Israeli consulate located in close proximity to the federal building where the standoff took place. The FBI and the bomb squad prevented him from reaching it. Who is this man? His profile on biomedexperts.com says he is a plant disease expert with many publications on his name involving the genetic manipulation of virii. Photographic evidence that Moshe is who he says he is can be found here.

Joseph Moshe was soon after his arrest sent or let go to Israel. Nothing has been heard from him since. The Secret Service was not the agency involved in the surveillance of Moshe at his home in California. This was done by the FBI, who had orders to detain or arrest him. Mounted on top of a large black vehicle used in his arrest was a microwave weapon that possibly damaged the electronics in Moshe’s car as well as any communication devices he had which might have been used to contact the media or others who could help him.

Moshe did not suffer the same effects of the gas and pepper spray that others would have because he had built up an immunity to such weapons as a by-product of his Mossad training. Moshe was not handcuffed because he was not placed under arrest.

Does this sound like an insane conspiracy theory? Sure it does. Due to the scarcity and anonimity of the sources we would dismiss it as exactly that, if it weren’t for some uncomfortable facts: Baxter Pharmaceutical has been caught, red-handed, in spreading a live, genetically engineered H5N1 Bird flu vaccine as a lethal biological weapon all over the world, destined to be used for human vaccinations. This happened just a few months ago. And only luck prevented a global catastrophe of epic proportions.

Baxter International Inc. had mixed live, genetically engineered avian flue viruses in vaccine material shipped to 18 countries. Only by sheer luck, a Czech laboratory decided to test the vaccine on a dozen ferrets, which all died in days. The World Health Organization was notified and catastrophe was averted. This was clearly a deliberate act on Baxter’s part, because they adhere to BS3, bio-safety level three. Baxter admitted a “mistake”. Such monumental screwups are totally impossible at that level. Many safety systems would have needed to be sabotaged, many key personell would have needed to be bribed. It simply can’t be done without direction from the inside. They did not send out the wrong vial – they produced dozens of gallons of biological-weapon agent (genetically engineered live H5N1 / Bird flu virus), then sent it out as a “vaccine”.

Baxter knew full well that their vaccine was lethal, because the year before they had tested it on a few hundred homeless Polish people – dozens died as a result.

Where’s the meat? Well – Baxter is now being sued for the deliberate, repeated contamination of vaccines with biological weapons designed – by them – to mass-murder people. Here is the complaint (PDF). By some kook nutcase? Not likely – Jane Burgermeister is an experienced, respected journalist. She is not the only one suing Baxter for planning and executing a plan for global genocide: Others are filing complaints as well. Read a well-researched complaint here (PDF).

Qui bono? We think it may be profit-motivated or even sheer incompetence, but for the conspiracy-minded: The latter complaint alludes to intentional “culling of the herd”. Have you heard of the Georgia Guidestones? An enormous monument loaded with Masonic symbolism costing millions of dollars, it has been erected by unknown, powerful elites (multimillionaires with the clout to erect monuments wherever they please, obviously) around 30 years ago. It gives an “alternative ten commandments”, of which the first is the extermination of six and a half billion people from the face of the Earth. Half a billion will remain. This is the number of people the planet can sustain indefinitely, so that the descendents of the Rothschilds and Rockefellers can live in peace and affluence indefinitely. Slaves are needed to produce that luxury, but 500 million will do just fine. But how does one go about killing off most of the world?

“Vaccinating” the planet with a bioweapon with near-100% mortality would do the trick. Baxter would provide both the bioweapon as well as the vaccine against it to “civilized” Western peoples. Result: We can plunder Africa, we have no more competition from SE Asia, the oil is for our taking and only Western and perhaps Chinese sheeple remain.

Rockefeller said this in 1994 at a U.N. dinner: “We are on the verge of a global transformation. All we need is the right major crisis, and the nations will accept the New World Order.” PNAC said something similar right before 9/11.

A Spanish Doctor in Internal Medicine largely agrees with the above article:



We have the cure for nail fungus

Could 2012 NLE Cyber Attack DRILL be the Next 911 False Flag, Will This Years Drill Go Live?

By:Daniel J Leach

Reblogged: http://theintelhub.com

NLE 2012: Will This Years Drill Go Live and Result in a False Flag Cyber Attack?

The Intel Hub
By Shepard Ambellas and Alex Thomas
April 4, 2012

The summer of 2012 is fast approaching. As it inches closer, we will start to see a major increase in US and foreign troop movements as well as military equipment movements throughout the CONUS (Continental United States).

While many of the upcoming sightings may well be normal operations as the military does like to do training in the summer, the fact is that parts of our own military, along with foreign and UN troops, are actively planning to take on the American people.

National Level Exercise drills have been in effect for years now and have been covered by many alternative news sources, including The Intel Hub through our yearly Operation Overwatch which we use to gain intel and tips from the public in order to relay them to our readers.

Over the years many people have worried about the numerous National Level Preparedness drills and, in most cases, for good reason.

In 2011, the NLE focused around an earthquake on the New Madrid Fault Zone and the year before resulted in 70 thousand people being evacuated from a Texas city after a fertilizer fire.

Interestingly enough, this years FEMA national preparedness drill is focusing on the threat of a major cyber attack on America’s infrastructure.

The last year has seen dozens of cyber attacks on government websites as well as government propagandists pushing the fear of a cyber attack on the populace. Now we have the Department of Homeland Security making cyber security the main component of their annual preparedness drill.

Although only a small amount of information has been released on NLE2012, we can see from FEMA’s own website what it primary consists of.

FEMA’s website released the following PDF;

National Level Exercise (NLE) 2012Continental

National Level Exercise (NLE) 2012 is part of a series of congressionally mandated preparedness exercises designed to educate and prepare participants for potential catastrophic events.

The NLE 2012 process will examine the nation’s ability to coordinate and implement prevention, preparedness, response and recovery plans and capabilities pertaining to a significant cyber event or a series of events.

NLE 2012 will examine national response plans and procedures, including the National Response Framework (NRF), NRF Cyber Incident Annex, Interim National Cyber Incident Response Plan (NCIRP) and the International Strategy for Cyberspace.

Unique to NLE 2012 will be an emphasis on the shared responsibility among all levels of government, the private sector and the international community to secure cyberspace and respond together to a significant cyber incident.

Obsidian Analysisthe company heading up NLE12 for the private sector, states on their website:

NLE 2012 will comprise four major exercises, including a capstone event. These exercises will share common scenario elements, planning efforts and governance structure.

Participation in each exercise will be determined respectively, but the NLE 2012 process includes the Executive Office of the President; federal, state, local, tribal and territorial department and agency officials and emergency operations elements, nongovernmental and private sector organizations and international partners. These four major exercises include:

Information Exchange: This discussion-based exercise is designed to evaluate the sharing of cyber related information among the intelligence community, law enforcement, federal, state, tribal and local governments, the private sector and international partners, as appropriate

Cyber Incident Management/Virtual Effects: This exercise will examine the coordination and communication processes between public and private stakeholders in response to a significant cyber incident. This will include examining challenges related to managing a cyber event with national security implications.

NLE Capstone/Cyber Physical Effects: This functional exercise will examine challenges related to managing a cyber event with physical consequences and national security implications. This will include addressing cyber and physical interdependencies and impacts while coordinating a Whole Community level cyber and physical response.

Continuity Exercise/Eagle Horizon: This operations-based exercise will evaluate the continuity capability of federal departments and agencies. A component will include a nationwide exercise examining communications capability of the homeland security enterprise under conditions in which critical systems have been degraded or lost.

In addition to the major exercises, the NLE 2012 process will include senior level exercises, building-block events (i.e., seminars, tabletop exercises, and training) and routine exercise planning conferences.

As more information is released on these upcoming national preparedness drills, The Intel Hub will bring them to our readers attention.

Create a website or blog at WordPress.com

Up ↑