Every Tuesday I meet with a group of Patriots from the Illumination Society at the Liberty Restaurant in Rochester NY to do a round table radio broadcast discussing topics about Geo politics, religion, Currant events and anything that has to do with Truth Liberty and Justice for all. We not only talk about problems but as a group we also work on finding solutions to the world problems. every week we have some of the brightest minds join us at the round table live Broadcast. http://www.blogtalkradio.com/anti-illuminati-party
The Illumination Society presents a FREE Movie Night every month showing films that we feel are important for the time in which we live. Films that dig deep into subjects like – The World History – UFO – The New World Order – Spirituality – Prophecy – Science – What’s Happening To Our Food – Agenda 21 – Vaccines and many other subjects.
Our Free Movie Night has been well received by people from all walks of life. People concerned with the things happening in our world today. People that want to know what is happening all around us and what we can do to stand against those that wish to rob us of our freedoms and our God-given rights. Come out and learn about subjects you may or may not be aware of. We hope that our Movie Nights, and our following Q&A time will shed some light on these subjects, and help you to see America’s role in past, present and future history.
Many individuals, businesses and other organizations have a legitimate and lawful need to keep some of their information confidential or even absolutely secret from competitors, the press and others. Because email has become vital to timely communication and because email is not secure, encryption is often necessary.
New employees of large companies are often encouraged to live near the company’s offices. In this kind of setting, privacy for technical and marketing information is convenient. Small organizations such as law offices, medical clinics, Internet businesses, and many others may not find the expertise they need in their local area. These small organizations, of which there are many, need secure communication to avoid the cost of face-to-face meetings. Lacking the funds for routine flights between cities, these organizations are very dependent on the electronic communication of data and ideas. Private medical information, schematic drawings, program source code, marketing plans, and innumerable other types of documents are involved. In such circumstances, strong encryption is needed.
In many countries, the post office has the legal authority and obligation to enforce privacy for the postal mail. If these postal services were to offer secure email for a reasonable price, small companies would not be at such a disadvantage relative to larger companies.
Established by the U. S. Constitution, Article I, Section 8, Clause 7, the United States Postal Service is authorized “To establish post offices and post roads. It also has a long history of adding services as needed, such as commemorative stamps, rural delivery, airmail, one-day delivery, zip codes, self-adhesive stamps, public Internet site, “Forever” stamps, and an iPhone app. Secure communication would add to its revenue (which would help ameliorate its recent shortfalls) and set a good example.
Technical Matters
To create a secure message, the encryption algorithm must used secret information that cannot be discovered by unauthorized parties. If the encryption relies only on complexity or computational difficulty without involving secret information, the intended message can be discovered by third parties. To third parties, some aspect of the transmission must be unknowable.
Within encryption technology, the embodiment of information unknowable to third parties often takes the form of secret random numbers. These random numbers are used to encrypt messages in such a way as to make decryption of a message impossible without access to those same random numbers.
Many have said that what one person can encrypt, another can decrypt. This is a myth. TheOne-Time Pad algorithm was proved to be absolutely secure in the writings of Claude Shannon. See “Claude Elwood Shannon – Collected Papers” edited by N. J. A. Sloane and Aaron D. Wyner. In addition to being immune from hacking, this algorithm becomes more convenient as memory devices increase their capacity.
Claude Shannon proved that any absolutely secure encryption algorithm must posses these characteristics:
1. The encryption keys must be random numbers of uniform distribution.
2. The keys must be shared in absolute secrecy by the sender and receiver.
3. Any key encrypting a message must be as at least as long as that message.
4. Any key used to encrypt a message must not be reused.
The one-time pad is a famous encryption algorithm having all of these characteristics. By using a random key comprised of random numbers to encrypt a message (the plain text) with the XOR logical operation, the transmitted result (the ciphertext) is rendered as random as the key. The collection of secret keys is called the pad. Keys are of the same length as that of the messages they encrypt. They are erased immediately after their use. The result is that the actual message is as likely as any other message from the point of view of those attempting to decrypt the message without knowing the secret random numbers.
Optionally, encrypted messages can be made to appear to be ordinary messages of a different type, such as pictures or sound files or text messages that contain information that is very different form that in the plain text. This process is called Steganography.
Services
The most important service facilitating secure communication is the shipping of media containing random numbers. The production of truly random numbers for algorithms that encrypt messages by means of random keys is the part of the process most challenging and inconvenient for the customer. The principle service of USPS would be to place random numbers on appropriate media and ship copies to addresses designated by the customer. One shipment might serve the customer for only a few messages or for years worth of messages, depending on the number of random numbers shipped.
Options may include picking up shipments from the local post office, receiving them in the mailbox, or receiving them at the recipient’s door (possibly by special delivery or with a return receipt).
Criminality
Measures which distinguish legitimate from nefarious use of encryption services need not be publicly discussed.
I believe that the Israel and Palestinian Gaza conflict is a false flag operation being carried out by Illuminati family’s and Satanic secret society’s to set up World War 3. The Illuminati family’s control and have infiltrated just about every facet of society they do control key Government offices as well as private corporations through a type of iron triangle. In United States politics, the iron triangle comprises the policy-making relationship among the congressional committees, the bureaucracy, and interest groups.[1] Illuminati Satanicsecretsocieties, have been behind a wide range of events and disasters going as far back in history as the French Revolution and possibly even farther.
It is a historical fact the Hamas was founded by the Israel government Israel may want to destroy Hamas now. But it played a key role in the group’s creation. According to JerusalemOnline.com “Israel actively supported Hamas” Documents show that Israel was interested in empowering Hamas in attempt to end the first Intifada. During Operation “Protective Edge”, news leaks website WikiLeaks exposes secret documents which were passed between American diplomats in the 1980’s. These documents allegedly show that Israel was interested in enabling Hamas activity in its beginning, intending to weaken the Palestine Liberation Organization and ending the first Intifada. Hamas was established in 1987, and has its origins in Egypt’s Muslim Brotherhood that the United States General Patraeous, the CIA Creatures of Jesuit Papacy and the Knights of Malta helped to …Israel and Egypt then imposed an economic blockade on Gaza. Even US Congressman Ron Paul spoke about how Israel created Hamas to destabilize Arafat who was very powerful at the time.
Army General David Patraeus, 2010
Army General David Patraeous is a Jesuit Temporal Coadjutor. He is beloved by the Jesuits at Georgetown University at the nation’s capital in Washington, District of Columbia Catholics. General “Betray-us” has spoken at Georgetown several times! Additionally, the CIA was a creation of the Jesuits in 1947 via the National Security Act signed into law by 33rd Degree “Dirty Harry” Truman! Since then, the American, British, Soviet/Russian, German, French, Canadian, Israeli, Interpol and all the other intelligence agencies around the world have been working together to form the pope’s modern day Holy Office of the Inquisition!
Thanks to the Mossad, Israel’s “Institute for Intelligence and Special Tasks”, the Hamas was allowed to reinforce its presence in the occupied territories. Meanwhile, Arafat’s Fatah Movement for National Liberation as well as the Palestinian Left were subjected to the most brutal form of repression and intimidation. Let us not forget that it was Israel, which in fact created Hamas. According to Zeev Sternell, historian at the Hebrew University of Jerusalem, “Israel thought that it was a smart ploy to push the Islamists against the Palestinian Liberation Organisation (PLO)”. The Hamas had built its strength through its various acts of sabotage of the peace process, in a way which was compatible with the interests of the Israeli government. In turn, the latter sought in a number of ways, to prevent the application of the Oslo accords. In other words, Hamas was fulfilling the functions for which it was originally created: to prevent the creation of a Palestinian State. And in this regard, Hamas and Ariel Sharon, see eye to eye; they are exactly on the same wave length.
A majority of the worlds problems, from poverty to world wars, are the cause of International “satanicsecretsociety,” Banking cartel. Many or the Worlds religions and their representatives are secretly being controlled by Secret Satanic Society’s such as the most famous Freemasons who have been influencing and trying to control secular society with a Satanic agenda that Albert Pike (December 29, 1809 – April 2, 1891) wrote about in a book he published called Morals and Dogma of the Ancient and Accepted Scottish Rite of Freemasonry in 1871. Albert Pike was an American attorney, Confederate officer, writer, and Freemason. Albert Pike wrote a letter to Giuseppe Mazzini, dated August 15, 1871. This letter graphically outlined plans for three world wars that were seen as necessary to bring about the One World Order, and we can marvel at how accurately it has predicted events that have already taken place.
Pike’s Letter to Mazzini: It is a commonly believed fallacy that for a short time, the Pike letter to Mazzini was on display in the British Museum Library in London, and it was copied by William Guy Carr, former Intelligence Officer in the Royal Canadian Navy. The British Library has confirmed in writing to me that such a document has never been in their possession. Furthermore, in Carr’s book, Satan, Prince of this World, Carr includes the following footnote:
“The Keeper of Manuscripts recently informed the author that this letter is NOT catalogued in the British Museum Library. It seems strange that a man of Cardinal Rodriguez’s knowledge should have said that it WAS in 1925”.
It appears that Carr learned about this letter from Cardinal Caro y Rodriguez of Santiago, Chile, who wrote The Mystery of Freemasonry Unveiled.
To date, no conclusive proof exists to show that this letter was ever written. Nevertheless, the letter is widely quoted and the topic of much discussion.
Following are apparently extracts of the letter, showing how Three World Wars have been planned for many generations.
“The First World War must be brought about in order to permit the Illuminati to overthrow the power of the Czars in Russia and of making that country a fortress of atheistic Communism. The divergences caused by the “agentur” (agents) of the Illuminati between the British and Germanic Empires will be used to foment this war. At the end of the war, Communism will be built and used in order to destroy the other governments and in order to weaken the religions.” 2
Students of history will recognize that the political alliances of England on one side and Germany on the other, forged between 1871 and 1898 by Otto von Bismarck, co-conspirator of Albert Pike, were instrumental in bringing about the First World War.
“The Second World War must be fomented by taking advantage of the differences between the Fascists and the political Zionists. This war must be brought about so that Nazism is destroyed and that the political Zionism be strong enough to institute a sovereign state of Israel in Palestine. During the Second World War, International Communism must become strong enough in order to balance Christendom, which would be then restrained and held in check until the time when we would need it for the final social cataclysm.” 3
After this Second World War, Communism was made strong enough to begin taking over weaker governments. In 1945, at the Potsdam Conference between Truman, Churchill, and Stalin, a large portion of Europe was simply handed over to Russia, and on the other side of the world, the aftermath of the war with Japan helped to sweep the tide of Communism into China.
(Readers who argue that the terms Nazism and Zionism were not known in 1871 should remember that the Illuminati invented both these movements. In addition, Communism as an ideology, and as a coined phrase, originates in France during the Revolution. In 1785, Restif coined the phrase four years before revolution broke out. Restif and Babeuf, in turn, were influenced by Rousseau – as was the most famous conspirator of them all, Adam Weishaupt.)
“The Third World War must be fomented by taking advantage of the differences caused by the “agentur” of the “Illuminati” between the political Zionists and the leaders of Islamic World. The war must be conducted in such a way that Islam (the Moslem Arabic World) and political Zionism (the State of Israel) mutually destroy each other. Meanwhile the other nations, once more divided on this issue will be constrained to fight to the point of complete physical, moral, spiritual and economical exhaustion We shall unleash the Nihilists and the atheists, and we shall provoke a formidable social cataclysm which in all its horror will show clearly to the nations the effect of absolute atheism, origin of savagery and of the most bloody turmoil. Then everywhere, the citizens, obliged to defend themselves against the world minority of revolutionaries, will exterminate those destroyers of civilization, and the multitude, disillusioned with Christianity, whose deistic spirits will from that moment be without compass or direction, anxious for an ideal, but without knowing where to render its adoration, will receive the true light through the universal manifestation of the pure doctrine of Lucifer, brought finally out in the public view. This manifestation will result from the general reactionary movement which will follow the destruction of Christianity and atheism, both conquered and exterminated at the same time.” 4
Since the terrorist attacks of Sept 11, 2001, world events, and in particular in the Middle East, show a growing unrest and instability between Modern Zionism and the Arabic World. This is completely in line with the call for a Third World War to be fought between the two, and their allies on both sides. This Third World War is still to come, and recent events show us that it is not far off.
We have been given warnings over the years by credible sources such as JFK’s Speech about Secret Societies that probably cost him his life….but, that’s what heroes do like Dwight D. Eisenhower farewell address speech on Jan.17,1961 also gives a warning of the military industrial complex that is controlled by the Satanic Zionists secretsocieties. Military Industrial Complex(MIC): is concept commonly used to refer to policy relationships between governments, national armed forces, and industrial support they obtain from the commercial sector in political approval for research, development, production, use, and support for military training, weapons, equipment, and facilities within the national defense and security policy.
It is our mission to give solutions and a platform to those Patriots who oppose to the Illuminati Satanic agenda of a One World Order. Anti-Illuminati Party, should God deign to avail us, is to defend and promote real “Liberty and Justice for all,” formed by the wisdom contained in the United States Constitution, particularly its Bill of Rights, and inspired by the U. S. way of “Life, Liberty and the pursuit of Happiness.”
– Our strategy for promoting these consists in grassroots educational and political campaigns. – Crucially, we of the Anti-Illuminati Party reject any unthinkingly trendy denial or politically expedient downplaying of the well-established fact that the N.W.O. Globalists, or “Illuminati,” do in fact occupy key offices and abuse their clout to promote the goals of their élitist cabal. – Because of their powerful members they can, and in fact do, silence and manipulate the American People. – To indict, counter, undermine, block and expose these tactics of theirs constitutes our mission, and our lifeblood.
– If sound government is to be restored, all the New World Order Globalists must have all their cheaply-bought authority pulled: “We must remove the weeds from public office: they are choking Freedom and the Tree of Liberty” (Daniel J Leach, Jr.). – The Anti-Illuminati Party identifies the N.W.O. as “an élitist association that exploits the commoner and violates the United States Republic’s first principles.” – We deem it imperative that every United Statesman must organize to indict, counter, undermine, block and expose these High Traitors. – We the members of the Anti-Illuminati Party resolve to support no N.W.O. globalist or Illuminist/Illuminatus in any way or sense. – Under the “Anti-Illuminati Party” banner we aim to unite those who are too often disenfranchised by the current political climate.
– We of the Anti-Illuminati Party are dedicated to revitalizing our communities by speaking Truth, Hope, Goodwill, Unity and Peace. – We shall work tirelessly to cultivate “Life, Liberty and the pursuit of Happiness” wherever and whenever we can. – To best find and implement solutions to this end, we place a high value on Party-wide collaboration. – We shall operate lawfully and respectfully in all matters at all times. – We shall not profit from our endeavors. – We believe in “Liberty and Justice for all.” – With the help of God—that is of supreme Love, Light, Spirit and Truth—we shall not waver in this mission to collaborate with all citizens toward the construction of a better community.
John Fitzgerald “Jack” Kennedy speech also (May 29, 1917 — November 22, 1963)
False flag (or black flag) describes covert military or paramilitary operations designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups or nations other than those who actually planned and executed them. Operations carried out during peace-time by civilian organizations, as well as covert government agencies, may by extension be called false flag operations if they seek to hide the real organization behind an operation. Geraint Hughes uses the term to refer to those acts carried out by “military or security force personnel, which are then blamed on terrorists.”[1]
In its most modern usage, the term may also refer to those events which governments are cognizant of and able to stop but choose to allow to happen (or “stand down”), as a strategy to entangle or prepare the nation for war. Furthermore, the term “false flag terrorism” may even be used in those instances when violence is carried out by groups or organizations which, whether they know it or not, are being supported or controlled by the “victim” nation. deHaven-Smith argues that the terminology has become looser in recent years due to the increasingly complex levels of “duplicity” and “international intrigue” between states.[2] Some argue that false flags are methods used by deep states as a form of deep politics.[3]
The name “false flag” has its origins in naval warfare where the use of a flag other than the belligerent’s true battle flag as a ruse de guerre, before engaging the enemy, has long been acceptable.[4] Such operations are also acceptable in certain circumstances in land warfare, to deceive enemies in similar ways providing that the deception is not perfidious and all such deceptions are discarded before opening fire upon the enemy.
During our weekly meeting we will now start to use a simple form of Roberts Rules to keep our meeting orderly so that we don’t waste our time . http://www.robertsrules.org/
We are tired of meetings that waste our time? That is why we have decided to implement a simple form of Roberts Rules in our live Meet and Greet Round Table Broadcast ! For me bringing order out of the chaos started with a very personal mission. Our mission is simple We are dedicated to using Roberts Rules by helping our members understand how to use Robert’s Rules of Order to get more work done! Remember, these processes are designed to ensure that everyone has a chance to participate and to share ideas in an orderly manner. Parliamentary procedure should not be used to prevent discussion of important issues This blog post is an overview of Roberts Rules of order. Follow through this presentation to learn the basic process that you will need to be successful in our meetings or convention by using the rules.
Every Tuesday Meet and Greet Round Table Broadcast in Current Events LIVE AND UPCOMING PODCAST Starts at 6:30 Pm to 7pm Call in to speak with the group (718) 508-9594
April 29 – July 1
Starts at 6:00pm · Ends at 8:00pm
Show Map
Liberty Family Restaurant
160 Winton Rd N, Rochester, New York 14610
April 29 – July 1
Starts at 6:00pm · Ends at 8:00pm
Liberty Family Restaurant 160 Winton Rd N, Rochester, NY 14610
Every Tuesday Meet and Greet Round Table Broadcast in Current Events LIVE AND UPCOMING PODCAST Call in to speak with the group (718) 508-9594 http://www.blogtalkradio.com/anti-illuminati-party/2014/05/06/every-tuesday-meet-and-greet-round-table
Check Out Current Events Podcasts at Blog Talk Radio with AntiNewWorldOrderParty on BlogTalkRadio
Roberts Rules
July 8, 2014 at 4:22pm
Guidelines
Obtain the floor (the right to speak) by being the first to stand when the person speaking has finished; state Mr./Madam Chairman. Raising your hand means nothing, and standing while another has the floor is out of order! Must be recognized by the Chair before speaking!Debate can not begin until the Chair has stated the motion or resolution and asked “are you ready for the question?” If no one rises, the chair calls for the vote!Before the motion is stated by the Chair (the question) members may suggest modification of the motion; the mover can modify as he pleases, or even withdraw the motion without consent of the seconder; if mover modifies, the seconder can withdraw the second.The “immediately pending question” is the last question stated by the Chair! Motion/Resolution – Amendment – Motion to PostponeThe member moving the “immediately pending question” is entitled to preference to the floor!No member can speak twice to the same issue until everyone else wishing to speak has spoken to it once!All remarks must be directed to the Chair. Remarks must be courteous in language and deportment – avoid all personalities, never allude to others by name or to motives!The agenda and all committee reports are merely recommendations! When presented to the assembly and the question is stated, debate begins and changes occur!The Rules
Point of Privilege: Pertains to noise, personal comfort, etc. – may interrupt only if necessary!Parliamentary Inquiry: Inquire as to the correct motion – to accomplish a desired result, or raise a point of orderPoint of Information: Generally applies to information desired from the speaker: “I should like to ask the (speaker) a question.”Orders of the Day (Agenda): A call to adhere to the agenda (a deviation from the agenda requires Suspending the Rules)Point of Order: Infraction of the rules, or improper decorum in speaking. Must be raised immediately after the error is madeMain Motion: Brings new business (the next item on the agenda) before the assemblyDivide the Question: Divides a motion into two or more separate motions (must be able to stand on their own)Consider by Paragraph: Adoption of paper is held until all paragraphs are debated and amended and entire paper is satisfactory; after all paragraphs are considered, the entire paper is then open to amendment, and paragraphs may be further amended. Any Preamble can not be considered until debate on the body of the paper has ceased.Amend: Inserting or striking out words or paragraphs, or substituting whole paragraphs or resolutionsWithdraw/Modify Motion: Applies only after question is stated; mover can accept an amendment without obtaining the floorCommit /Refer/Recommit to Committee: State the committee to receive the question or resolution; if no committee exists include size of committee desired and method of selecting the members (election or appointment).Extend Debate: Applies only to the immediately pending question; extends until a certain time or for a certain period of timeLimit Debate: Closing debate at a certain time, or limiting to a certain period of timePostpone to a Certain Time: State the time the motion or agenda item will be resumedObject to Consideration: Objection must be stated before discussion or another motion is statedLay on the Table: Temporarily suspends further consideration/action on pending question; may be made after motion to close debate has carried or is pendingTake from the Table: Resumes consideration of item previously “laid on the table” – state the motion to take from the tableReconsider: Can be made only by one on the prevailing side who has changed position or viewPostpone Indefinitely: Kills the question/resolution for this session – exception: the motion to reconsider can be made this sessionPrevious Question: Closes debate if successful – may be moved to “Close Debate” if preferredInformal Consideration: Move that the assembly go into “Committee of the Whole” – informal debate as if in committee; this committee may limit number or length of speeches or close debate by other means by a 2/3 vote. All votes, however, are formal.Appeal Decision of the Chair: Appeal for the assembly to decide – must be made before other business is resumed; NOT debatable if relates to decorum, violation of rules or order of businessSuspend the Rules: Allows a violation of the assembly’s own rules (except Constitution); the object of the suspension must be specified
Some of the of the best citizen investigators that I know have put together and compiled one of the best detailed independent investigations Iv seen. They have compiled 100+ clips regarding anomalies about the April 15th 2013 Boston Bombing this is some of the most powerful stuff Iv seen in the search for truth in this independent investigation about the Bombing Boston.
“Knowing the lie travels around the world before the truth can tie it’s shoelaces, I decided to share again a year later after citizen investigators unearthed the truth”. John Etter
John Etter“Plasma Burn” did a very good job exposing Jeff the other day on his YouTube channel.
Now second on my list of clips:
Boston WEAK – Bauman Fraudster…See More
Latest in this series of powerful storms could trigger a moderate radio blackout
Tonight a report from George Noory of Coast to coast that the sun fired off yet another intense solar flare , the latest in a series of storms from a busy sunspot being closely watched by space telescopes and astronomers.
Solar storm is a serious threat around 2012. Both NASA and ESA confirmed the next huge solar storm between September 2012 and May 2013. We all heard about the big one in 1859 and it looks like we are not far away from another one coming our way.
Revelation 16:8-9 “And they fourth poured out his bowl upon the sun; and it was given to it to burn men with fire. And men were burned with great heat; and the blasphemed the name of God Who has the authority over these plagues; and they did not repent to give Him glory.”
The sun-worshiping Mayans decided that the year 2012 is the end of this age. The Bible Codes hold cluster after cluster describing a nasty solar event, as well as a terrible disaster in 2012. Even scientist agree that every 100 years or so, the sun flares up and fries the solar system. Please read on for the Bible Codes and an article published in News Scientist magazine that indicate that a solar eruption event will cause terrible destruction on Earth.
Isaiah 30:26-27 â€Moreover the light of the moon shall be as the light of the sun, and the light of the sun shall be sevenfold, as the light of seven days, in the day that the LORD bindeth up the breach of his people, and healeth the stroke of their wound. Behold, the name of the LORD cometh from far, burning with his anger, and the burden thereof is heavy: his lips are full of indignation, and his tongue as a devouring fire: …”
Tonight a report from George Noory of Coast to coast that the sun fired off yet another intense solar flare , the latest in a series of storms from a busy sunspot being closely watched by space telescopes and astronomers.
NASA’s Solar Dynamics Observatory snapped a daunting new image of a strong M-class solar flare that peaked again. The M6.1 flare could trigger a moderate radio blackout that , according to officials at NASA and the National Oceanic and Atmospheric Administration (NOAA).
The eruption came from a sprawling sunspot, called Active Region 1515, which has been particularly dynamic this mounth. In fact, the sunspot region has now spewed over 12 M-class solar flares , NASA officials said in a statement. The sunspot region is huge, stretching more than 62,137 miles long (100,000 kilometers) in length, they added.
This sunspot region has also produced several coronal mass ejections (CMEs), which are clouds of plasma and charged particles that are hurled into space during solar storms. Powerful CMEs have the potential to disrupt satellites in their path and, when aimed directly at Earth, can wreak havoc on power grids and communications infrastructure.
The CMEs that were triggered by solar flares, however, are thought to be moving relatively slowly, and will likely not hit Earth since the active region is located so far south on the face of the sun, NASA officials said. [ More Solar Flare Photos from Sunspot AR1515
But, the sunspot is slowly rotating toward Earth, and scientists are still monitoring its activity.
“Stay tuned for updates as Region 1515 continues its march across the solar disk,” officials at the Space Weather Prediction Center, a joint service of NOAA and the National Weather Service, wrote in an update.
X-class solar flares are the strongest sun storms, with M-class flares considered medium-strength, and C-class the weakest. Today’s M6.1 eruption is a little over half the size of the weakest X-class flare, NASA officials said.
Radio blackouts can occur when a layer of Earth’s atmosphere, called the ionosphere, is bombarded with X-rays or extreme ultraviolet light from solar eruptions. Disturbances in the ionosphere can change the paths of high and low frequency radio waves, which can affect information carried along these channels.
Radio blackouts are categorized on a scale from R1 (minor) to R5 (extreme). An R2 radio blackout can result in limited degradation of both high- and low-frequency radio communication and GPS signals, NASA officials said.
The sun is currently in an active phase of its roughly 11-year solar weather cycle. The current cycle, known as Solar Cycle 24, is expected to peak in mid-2013.
Many claim that The Shroud of Turin is Jesus Christ but the Knights Templar claim that this is Jacques de Molay. I myself would like to think that this is Jesus Christ but with my research and understanding of history tend to lead me to believe that this is indeed Jacques de Molay and not Jesus Christ.
Geoffroi de Charny (the French Knight who died at the 1356 battle of Poitiers) and his wife Jeanne de Vergy are the first reliably recorded owners of the Turin Shroud. This Geoffroi participated in a failed crusade under Humbert II of Viennois in the late 1340s.[26] He is sometimes confused with Templar Geoffroi de Charney.[27]
Any discussion of the Shroud of Turin is bound to be controversial. Those who view this sacred and holy relic fall into two camps, those that believe it to be the undisputed earthly evidence of a Christ risen and those who believe it to be a medieval forgery.
It is not the intention of this web site to cast doubt on or support the authenticity of the shroud, but rather to show its possible relationship to the Knights Templar. We receive many letters from angry people who wish to enter into lengthy debates about carbon 14 reliability. We are aware of new evidence that puts the reliability of carbon 14 dating in question, so please refrain from telling us of the findings or directing us to URLs that make the claims.
There are two theories that relate to the Templars having been involved with the Shroud, one, which would support the authenticity of the Shroud and another, which would refute it.
In 1204 the Crusaders sacked the city of Constantinople. Among them were the Knights Templar, whom some scholars contend took the Burial shroud of Jesus from the city. To support this theory, author Ian Wilson who wrote the book “The Shroud of Turin: Burial Cloth Of Jesus?” makes the claim that the head that the Templars were accused of worshipping was none other than that of Jesus. His belief is that the Shroud when folded depicted the head of Christ and was referred to as the “Mandylion.” There is a painted panel at Templecombe in England that shows a bearded head like that, which is depicted on the Mandylion.
In their two books, “The Hiram Key” and “The Second Messiah,” authors Christopher Knight and Robert Lomas paint a contrasting picture to the Mandylion theory. The authors theorize that the image on the Shroud of Turin is in fact that of the last Grand Master of the order, Jacques de Molay, who was tortured some months before his execution in 1307. The image on the shroud certainly does fit the description of de Molay as depicted in medieval wood cuts, a long nose, hair shoulder length and parted in the center, a full beard that forked at its base, not to mention the six-foot frame. De Molay was said to be quite tall.
However, many have criticized the theory on the basis that the Templar rule of order forbade the Templars from growing their hair long. What critics of the theory overlook is that during DeMolay’s seven years in prison it is highly unlikely that he would have been afforded such luxuries as good grooming.
Knight and Lomas claim that the shroud figured in the Templars rituals of figurative resurrection and that DeMolay’s tortured body was wrapped in a shroud, which the Templars kept after his death. Lomas and Knight further believe that lactic acid and blood from DeMolay’s tortured body mixed with frankincense (used to whiten the cloth) etching his image into the shroud.
When the shroud was first put on display in 1357 (50 years after the disbanding of the order) by the family of Geoffrey de Charney who was also burned at the stake with de Molay, the first people viewing the shroud recognized the image to be that of Christ.
The authors theorize that Jacques de Molay may have been tortured in a manner similar to Christ as a mockery. Certainly then, the wounds suffered by de Molay where the same as those of Jesus Christ on the Cross.
Today it is commonly believed by many, through carbon dating, that the shroud dates to the late 13th century and not to the date of Christ’s supposed crucifixion. It is interesting that the church revealed these carbon dating results on October 13th, 1989, which is the same day the Templars were arrested by Church and State. According to the authors:
“Carbon dating has conclusively shown that the Shroud of Turin dates from between 1260 and 1380, precisely as we would expect if it were the image of Jacques de Molay. There is no other known theory that fits the scientifically established facts. Through experimentation, we know that the figure on the Shroud was on a soft bed of some kind, which strongly suggests that the victim was not dead and was expected to recover.”
The Second Messiah pg. 161 – Christopher Knight and Robert Lomas
Regardless of whether the findings of Ian Wilson or Knight and Lomas are correct, it is evident that this most holy and venerated relic has found its way into the Templar mythos.
Lynn Picknet and Clive Prince, authors of “Turin Shroud: In Whose Image?” present another theory of interest on the matter. Readers will recognize the authors from the book, “The Templar Revelation.” In the authors’ earlier book the duo claim that Leonardo Da Vinci who created an early photographic technique manufactured the image on the shroud of Turin.
Stephanie Pappas
Live Science
Thu, 05 Apr 2012 17:01 CDT
A hoax or a miracle? The Shroud of Turin has inspired this question for centuries. Now, an art historian says this piece of cloth, said to bear the imprint of the crucified body of Jesus Christ, may be something in between.
According to Thomas de Wesselow, formerly of Cambridge University, the controversial shroud is no medieval forgery, as a 1989 attempt at radiocarbon dating suggests. Nor is the strange outline of the body on the fabric a miracle, de Wesselow writes in his new book, The Sign: The Shroud of Turin and the Secret of the Resurrection (Dutton Adult, 2012). Instead, de Wesselow suggests, the shroud was created by natural chemical processes – and then interpreted by Jesus’ followers as a sign of his resurrection.
“People in the past did not view images as just the mundane things that we see them as today. They were potentially alive. They were seen as sources of power,” de Wesselow told LiveScience. The image of Jesus found on the shroud would have been seen as a “living double,” he said. “It seemed like they had a living double after his death and therefore it was seen as Jesus resurrected.”
Believing the shroud
As de Wesselow is quick to admit, this idea is only a hypothesis. No one has tested whether a decomposing body could leave an imprint on shroud-style cloth like the one seen on the shroud. A 2003 paper published in the journal Melanoidins in Food and Health, however, posited that chemicals from the body could react with carbohydrates on the cloth, resulting in a browning reaction similar to the one seen on baked bread. (De Wesselow said he knows of no plans to conduct an experiment to discover if this idea really works.)
Perhaps more problematic is the authenticity of the shroud itself. Radiocarbon dating conducted in 1988 estimated the shroud to medieval times, between approximately A.D. 1260 and 1390. This is also the same time period when records of the shroud begin to appear, suggesting a forgery.
Critics have charged that the researchers who dated the shroud accidentally chose asample of fabric added to the shroud during repairs in the medieval era, skewing the results. That controversy still rages, but de Wesselow is convinced of the shroud’s authenticity from an art history approach.
“It’s nothing like any other medieval work of art,” de Wesselow said. “There’s just nothing like it.”
Among the anachronisms, de Wesselow said, is the realistic nature of the body outline. No one was painting that realistically in the 14th century, he said. Similarly, the body image is in negative (light areas are dark and vice versa), a style not seen until the advent of photography centuries later, he said.
“From an art historian’s point of view, it’s completely inexplicable as a work of art of this period,” de Wesselow said.
Resurrection: spiritual or physical?
If de Wesselow’s belief in the shroud’s legitimacy is likely to rub skeptics the wrong way, his mundane explanation of how the image of Jesus came to be is likely to ruffle religious feathers. According to de Wesselow, there’s no need to invoke a miracle when simple chemistry could explain the imprint. It’s likely, he says, that Jesus’ female followers returned to his tomb to finish anointing his body for burial three days after his death. When they lifted the shroud to complete their work, they would have seen the outline of the body and interpreted it as a sign of Jesus’ spiritual revival.
From there, de Wesselow suspects, the shroud went on tour around the Holy Land, providing physical proof of the resurrection to Jesus’ followers. When the Bible talks about people meeting Jesus post-resurrection, de Wesselow said, what it really means is that they saw the shroud. He cites the early writings of Saint Paul, which focus on a spiritual resurrection, over the gospels of Mark, Matthew, Luke and John, which were written later and invoke physical resurrection.
“The original conception of the resurrection was that Jesus was resurrected in a spiritual body, not in his physical body,” de Wesselow said.
These ideas are already receiving pushback, though de Wesselow says he’s yet to get responses from people who have read his entire book. Noted skeptic Joe Nickell toldMSNBC’s Alan Boyle that de Wesselow’s ideas were “breathtakingly astonishing,” and not in a good way; Nickell has argued on multiple occasions that the shroud’s spotty historical record and too-perfect image strongly suggest a counterfeit.
On the other end of the religious spectrum, former high-school teacher and Catholic religious speaker David Roemer believes in Jesus’ resurrection, but not the shroud’s authenticity. The image is too clear and the markings said to be blood aren’t smeared as they would be if the cloth had covered a corpse, Roemer told LiveScience.
“When you get an image this detailed, it means it was done by some kind of a human being,” Roemer said.
Unlike many “shroudies,” as believers are deprecatingly called, Roemer suspects the shroud was deliberately created by Gnostic sects in the first or second century. A common religious explanation for the markings is that a flash of energy or radiation accompanied Christ’s resurrection, “burning” his image onto the cloth.
If anything is certain about de Wesselow’s hypothesis, it’s that it is not likely to settle the shroud controversy. Scientific examinations of the delicate cloth are few and far between – and so are disinterested parties. Roemer, for example, recently arrived at a scheduled talk at a Catholic church in New York only to find the talk had been canceled when the priest learned of Roemer’s shroud skepticism. (The Catholic Church has no official position on the shroud’s authenticity.)
Meanwhile, de Wesselow said, people who aren’t driven by faith to accept the cloth as real generally don’t care about the shroud at all.
“The intellectual establishment, if you like, is not interested in shroud science,” he said. “It regards it as fringe and it’s not interested.”