How to make the US Post Office prosperous and relevant in the 21 century using the One-Time Pad algorithm!

Every Tuesday I meet with a group of Patriots from the Illumination Society at the Liberty Restaurant in Rochester NY to do a round table radio broadcast discussing topics about Geo politics, religion, Currant events and anything that has to do with Truth Liberty and Justice for all.  We not only talk about problems but as a group we also work on finding solutions to the world problems.  every week we have some of the brightest minds join us at the round table live Broadcast. http://www.blogtalkradio.com/anti-illuminati-party

The Illumination Society  presents a FREE Movie Night every month showing films that we feel are important for the time in which we live. Films that dig deep into subjects like – The World History – UFO – The New World Order – Spirituality – Prophecy – Science – What’s Happening To Our Food – Agenda 21 – Vaccines and many other subjects.

Our Free Movie Night has been well received by people from all walks of life. People concerned with the things happening in our world today. People that want to know what is happening all around us and what we can do to stand against those that wish to rob us of our freedoms and our God-given rights. Come out and learn about subjects you may or may not be aware of. We hope that our Movie Nights, and our following Q&A time will shed some light on these subjects, and help you to see America’s role in past, present and future history.

We will be presenting the following films on the following dates:
– See more at: https://www.eventbrite.com/e/movie-night-tickets-12609803261

You can also join us in our round table discussion and suggest topics you would like us to discus.

Anti New World Order Party ☼ Global Group

https://www.facebook.com/groups/AntiNewWorldOrderPartyGlobal/

Now to the main point of this blog post today,  We will also have a follow-up to this post.

Original posted on FutureBeacon.com

 

Communication Privacy
by
James Adrian

Introduction

      Many individuals, businesses and other organizations have a legitimate and lawful need to keep some of their information confidential or even absolutely secret from competitors, the press and others. Because email has become vital to timely communication and because email is not secure, encryption is often necessary.

      New employees of large companies are often encouraged to live near the company’s offices. In this kind of setting, privacy for technical and marketing information is convenient. Small organizations such as law offices, medical clinics, Internet businesses, and many others may not find the expertise they need in their local area. These small organizations, of which there are many, need secure communication to avoid the cost of face-to-face meetings. Lacking the funds for routine flights between cities, these organizations are very dependent on the electronic communication of data and ideas. Private medical information, schematic drawings, program source code, marketing plans, and innumerable other types of documents are involved. In such circumstances, strong encryption is needed.

      In many countries, the post office has the legal authority and obligation to enforce privacy for the postal mail. If these postal services were to offer secure email for a reasonable price, small companies would not be at such a disadvantage relative to larger companies.

      Established by the U. S. Constitution, Article I, Section 8, Clause 7, the United States Postal Service is authorized “To establish post offices and post roads. It also has a long history of adding services as needed, such as commemorative stamps, rural delivery, airmail, one-day delivery, zip codes, self-adhesive stamps, public Internet site, “Forever” stamps, and an iPhone app. Secure communication would add to its revenue (which would help ameliorate its recent shortfalls) and set a good example.

Technical Matters

      To create a secure message, the encryption algorithm must used secret information that cannot be discovered by unauthorized parties. If the encryption relies only on complexity or computational difficulty without involving secret information, the intended message can be discovered by third parties. To third parties, some aspect of the transmission must be unknowable.

      Within encryption technology, the embodiment of information unknowable to third parties often takes the form of secret random numbers. These random numbers are used to encrypt messages in such a way as to make decryption of a message impossible without access to those same random numbers.

      Many have said that what one person can encrypt, another can decrypt. This is a myth. TheOne-Time Pad algorithm was proved to be absolutely secure in the writings of Claude Shannon. See “Claude Elwood Shannon – Collected Papers” edited by N. J. A. Sloane and Aaron D. Wyner. In addition to being immune from hacking, this algorithm becomes more convenient as memory devices increase their capacity.

      Claude Shannon proved that any absolutely secure encryption algorithm must posses these characteristics:

      1. The encryption keys must be random numbers of uniform distribution.

      2. The keys must be shared in absolute secrecy by the sender and receiver.

      3. Any key encrypting a message must be as at least as long as that message.

      4. Any key used to encrypt a message must not be reused.

      The one-time pad is a famous encryption algorithm having all of these characteristics. By using a random key comprised of random numbers to encrypt a message (the plain text) with the XOR logical operation, the transmitted result (the ciphertext) is rendered as random as the key. The collection of secret keys is called the pad. Keys are of the same length as that of the messages they encrypt. They are erased immediately after their use. The result is that the actual message is as likely as any other message from the point of view of those attempting to decrypt the message without knowing the secret random numbers.

      Optionally, encrypted messages can be made to appear to be ordinary messages of a different type, such as pictures or sound files or text messages that contain information that is very different form that in the plain text. This process is called Steganography.

Services

      The most important service facilitating secure communication is the shipping of media containing random numbers. The production of truly random numbers for algorithms that encrypt messages by means of random keys is the part of the process most challenging and inconvenient for the customer. The principle service of USPS would be to place random numbers on appropriate media and ship copies to addresses designated by the customer. One shipment might serve the customer for only a few messages or for years worth of messages, depending on the number of random numbers shipped.

      Options may include picking up shipments from the local post office, receiving them in the mailbox, or receiving them at the recipient’s door (possibly by special delivery or with a return receipt).

Criminality

      Measures which distinguish legitimate from nefarious use of encryption services need not be publicly discussed.

Contact

      Please feel free to make suggestions by writing to jim@futurebeacon.com.

UNITED STATES OF AMERICA, Inc., located in Washington, DC, or Denver, CO?

Recently John McGuire and I went to the monthly liberty-oriented Movie Nite that the Hope For Rochester Ministry organizes, and as is tradition I streamed the presentation Which You Are You? (a.k.a. Who Are You?, a.k.a. What the Frequently Unanswered Questions?) onto our YouTube Channel, which you can find together with Bernie Wheater‘s presentation that followed in which he showed a short PowerPointed lesson on how the “UNITED STATES OF AMERICA, Inc.” corporate fake shadow-government hides inside our original and legitimate Government and has been used incrementally to strip you of all your rights (I exaggerate not) by making you legally someone other than who you think you are (if common law were in force), namely making you a corporate slave. So John, healthy skeptic that he is, started doing his own research (as Bernie had encouraged us all to do) and found out some really interesting data that we thought you should all probably know about. I have know for years about the Sovereign Citizen Movement (that John is just starting to find out about) and the Shadow Corporate De Facto Government. De facto is Latin for in fact, and in political terms it indicates a government that may have seized power unlawfully. They may not be constitutionally appointed, but are in fact. De jure is the opposite. A de facto government is supported by the people of the state and not by a constitution. A de jure governing body, on the other hand, is supported by a constitution currently in force. Or a de jure government is officially recognized by the constitution and other (neighboring) states, and sometimes even supranational and inter-governmental institutions. De facto governments are not recognized. De facto governments are caused, for example, by a revolution within (i.e. incited by the people of the state). This is what John wrote:

“I can’t believe no one is talking about this. UNITED STATES OF AMERICA, Inc., is in Evergreen, CO, a mere half-hour drive from the Denver Mint, the single largest producer of coins in the world! Does it get any shadier than this?”

Published on Jun 27, 2012

EXECUTIVE ORDER, NATIONAL DEFENSE RESOURCES PREPAREDNESS in Words http://www.whitehouse.gov/the-press-o… Obama Executive Order Seizes U.S. Infrastructure & Citizens for Military Preparedness & Slavery Details Explained Video! http://www.youtube.com/watch?v=myPEND… The Defense Production Act of 1950. The Federal Restricted Buildings and Grounds Improvement Act that effortlessly passed the House and the Senate is a law that most Americans don’t know about but could put them behind bars for up to 10 years. The law states it is a prosecutable offense to without lawful authority enter a building or grounds of a special event of national significance or enter a building or grounds where the President or other person protected by the Secret Service is or will be temporarily visiting. Your Employers “Gov’t Servants “can kill you legally for no reason “or if you know the TRUTH”. If you don’t fire them your DEAD ! Legalizing Holocaust. Under National Defense Authorization Act S 1867 U.S. military can (1) arrest U.S. Citizens without any charges (or evidence) (2) Can do it secretly (Just disappear you) (3) Can hold you indefinitely (4) With No Right to a Trial. (5) Can torture. (6) Can assassinate U.S. Citizens. Stop them NOW or DIE ! Your All Terrorists(TRUTHERS), going to take Gov’t Word No DUE Process ! National Defense Authorization Act S 1867 http://en.wikipedia.org/wiki/National… S 1867 NDAA End of Human Rights Petition http://www.change.org/petitions/stop-…… FAIR USE NOTICE: This video may contain copyrighted material. Such material is made available for educational purposes only. Martial Law Bill Passes Congress Allows Military to Arrest, Permanently Detain, Torture, Kill American Citizens without Trial. The National Defense Authorization Act. America is a War Zone. Romney Ron Paul http://www.campaignforliberty.org/ .Know who runs the World the Federal Reserve system was fraudulently created & it’s Counterfeiting Notes “the Dollar” is illegal & Unconstitutional. Become a Freeman on the Land & know the Deceptions of the Law. Statues & Acts are not law & need your consent (like stating your name or showing ID) Don’t enter the Law Society. lawyer society unalienable rights commerce maritime admiralty common ucc uniform commercial code contract consent civil corruption central bank karma reincarnation enlightenment united states passport legal fiction register court judge property imf wto foreclosure social security Medicaid Medicare debt consent blacks law society sovereignty Osama bin laden death Al Qaeda terrorist haarp chemtrails fema coast to coast am gas oil price middle east 2012 conspiracy terror food crisis gold silver revolution inflation Ron Paul Obama zeitgeist disaster riots protests jobs alex jones prison planet info wars nature corporation wikileaks climate change police state meditation constitutional Jesus Christ ufo’s aliens tea party rand paul Jesse Ventura David Icke max Kaiser Mayan spirituality free Tibet china tyranny terrorism consciousness world war 3 Buddhism Tao Zen god truth justice knowledge wise slavery history freedom fluoride peace love history terrorism occupation information deception paradigm matrix law America recession inflation economy stock market bush depression nwo space mac mind control Hinduism meditation Egypt Libya Jews Israel Mayan new York 911 lies conspiracy theory sovereign state imf wto world bank apply federal reserve slavery Islamic Yemen Pakistan Afghanistan Syria Saudi Arabia Persians Sunni Shiite Islam Iran Iraq Israel 9/11 maritime admiralty law Monsanto seeds farms fda fbi cia homeland security sovereignty graham Hancock Peter Shiff sovereignty earthquake tsunami nuclear japan radiation precession of the equinox prophecy revelation apocalypse rapture bible Christian Pakistan Fukushima default debt stock market crash Peter Schiff max Kaiser rt Oath Keepers tsar ion Occupy Wall Street End the Fed Alan Watts truth movement we are the 99% we are change anonymous marine soldier occupy marines a new alliance Tear Gas OWS Zuccotti park TSA

Ever Wonder why having that Birth Certificate was so important? Why a Certified Certificate of Live Birth from the Hospital wasn’t sufficient enough? I didn’t have a Birth Certificate until I was 12 years old, when suddenly it was required to play Bobbysocks, even after already joining the previous year. Some time in the 1980’s, it was required that you have a Social Security Number for your children in order to claim them on your taxes. Of course, a Birth Certificate is required to obtain an SSN. This video is posted for educational purposes only. No copyright infringement intended.

USC “law” is fictional law. It is 100% color of law no matter how the “government” put it. ALL, and I mean ALL of our judges and representative are not qualified by the constitution to even be in office remember that these people CHOOSE to take an OATH to those “laws” by their own recognition (see 18 USC 1918, 18 USC 241, 18 USC 242, 5 USC 7311, 18 USC 1621 and 5 USC 3333.)
<a>Gnarly Carly</a>
On March 28th, 1861 Congress adjourned sine die and never has reconvened de jure…

What you think is the Government of the United States of America is, in fact, THE UNITED STATES OF AMERICA INC., and the Congress and Senate are STOCKHOLDERS or CORPORATE OFFICERS. The real United States of America Government died (sine die) and never returned.

The original 13th Amendment prohibits “Esquires” (Attorneys) from holding positions of public office. Read the only one I could find,inside Texas, and look at the date!!!!! ..1819 not recognized by the CORPORATE (defacto) UNITED STATES.

U.S. Citizens were declared enemies of the U.S. CORPORATION by F.D.R. by Executive Order No. 2040 and ratified by Congress on March 9th, 1933, 48 Stat. 1, resulting in use of the Rules of Land Warfare being part and party to their Constitution. ‘FOR THEIR PROTECTION’

F.D.R. changed the meaning of The Trading with the Enemy Act of December 6th, 1917 by changing the word “without” to CITIZENS “within” the United States. The multi-nation Bankruptcy and Great Depression changed our world. The Bankers and Attornies of England took over completely. Thank you F.D.R. …you are hereby assigned 2nd in line to the burn pile…ain’t enough duck tape for that guy!!

Today, almost all mothers unknowingly inform on their own babies. Take a look at the so-called “Birth Certificate” CERTIFICATE OF LIVE BIRTH where the mother signs and you’ll see the title of the box stating in small print: “MOTHER OR OTHER INFORMANT.”

The word “OTHER” makes the mother an “informant.” By signing the “Birth Certificate” as an informer, she contracts with the government putting her child and her child’s future labor AND SERVICE IN THE ARMED FORCES as collateral for the national debt (servitude-slavery.)

RED ALERT Private Spanish Company Will “Count” 2012 presidential election Votes!

English: Electoral college map for the 2012, 2...

Its an outrage that a foreign company will count the 2012 presidential election.  That right a  Spanish Company Will “Count” American Votes Overseas In November!  If you want to put salt in the wounds the foreign company is owned by NWO card carrying Communist party member George Soros.  This story was Broadcast Sept 11, 2012 on coast to coast am.  Its looking  like a two headed snake is what we have to vote for, once again the NWO has both of their dogs in this fight.  Now that Ron Paul is out of the fight and Gary Johnson of the Libertarian Party is not given a voice on the Main Stream Media stage.

Scytl - smartcard reader
Scytl – smartcard reader (Photo credit: ACC1Ó – Competitivitat per l’empresa)

This same company also is counting votes for many other countries around the world.  Bain alumni, now raising big money as Romney bundlers are also in the electronic voting machine business. This appears to be a repeat of the the infamous former CEO of Diebold Wally O’Dell, who raised money for Bush while his company supplied voting machines and election management software in the 2004 election.

  Perhaps Obama had reason for supreme confidence when he said “after my election” rather than “in case of” to Russian President Medvedev!  It was once said  “It doesn’t matter who votes, it only matters who counts the votes”. Joseph Stalin 

This section copied from:http://www.setyoufreenews.com

Spanish online voting company SCYTL bought the largest vote processing corporation in the United States, it also acquired the means of manufacturing the outcome of the 2012 election. For SOE, the Tampa based corporation purchased by SCYTL in January, supplies the election software which records, counts, and reports the votes of Americans in 26 states–900 total jurisdictions–across the nation.

And although the votes will be cast in hometown, American precincts on Election Day, with the Barcelona-based SCYTL taking charge of the process, they will be routed and counted overseas.

SCYTL itself is a leader in internet voting technology and in 2010 was involved in modernizing election systems for the midterm election in 14 American states.

But although SCYTL’s self-proclaimed reputation for security had won the company the Congressionally approved task of handling internet voting for American citizens and members of the military overseas, upon opening the system for use in the District of Columbia, the University of Michigan fight song “The Victors” was suddenly heard after the casting of each ballot. The system had been hacked by U of M computer teachers and students in response to a challenge by SCYTL that anyone who wished to do so, might try!

Nevertheless, in spite of warnings by experts across the nation, American soldiers overseas will once again vote via the internet in 2012. And because SCYTL will control the method of voting and—thanks to the purchase of SOE–the method of counting the votes as well, there “…will be no ballots, no physical evidence, no way for the public to authenticate who actually cast the votes…or the count.”

The American advocacy group Project Vote has concluded that SCYTL’s internet voting system isvulnerable to attack from the outside AND the inside, a situation which could result in “…an election that does not accurately reflect the will of the voters…” Talk about having a flair for understatement!

Create a website or blog at WordPress.com

Up ↑