How to make the US Post Office prosperous and relevant in the 21 century using the One-Time Pad algorithm!

Every Tuesday I meet with a group of Patriots from the Illumination Society at the Liberty Restaurant in Rochester NY to do a round table radio broadcast discussing topics about Geo politics, religion, Currant events and anything that has to do with Truth Liberty and Justice for all.  We not only talk about problems but as a group we also work on finding solutions to the world problems.  every week we have some of the brightest minds join us at the round table live Broadcast. http://www.blogtalkradio.com/anti-illuminati-party

The Illumination Society  presents a FREE Movie Night every month showing films that we feel are important for the time in which we live. Films that dig deep into subjects like – The World History – UFO – The New World Order – Spirituality – Prophecy – Science – What’s Happening To Our Food – Agenda 21 – Vaccines and many other subjects.

Our Free Movie Night has been well received by people from all walks of life. People concerned with the things happening in our world today. People that want to know what is happening all around us and what we can do to stand against those that wish to rob us of our freedoms and our God-given rights. Come out and learn about subjects you may or may not be aware of. We hope that our Movie Nights, and our following Q&A time will shed some light on these subjects, and help you to see America’s role in past, present and future history.

We will be presenting the following films on the following dates:
– See more at: https://www.eventbrite.com/e/movie-night-tickets-12609803261

You can also join us in our round table discussion and suggest topics you would like us to discus.

Anti New World Order Party ☼ Global Group

https://www.facebook.com/groups/AntiNewWorldOrderPartyGlobal/

Now to the main point of this blog post today,  We will also have a follow-up to this post.

Original posted on FutureBeacon.com

 

Communication Privacy
by
James Adrian

Introduction

      Many individuals, businesses and other organizations have a legitimate and lawful need to keep some of their information confidential or even absolutely secret from competitors, the press and others. Because email has become vital to timely communication and because email is not secure, encryption is often necessary.

      New employees of large companies are often encouraged to live near the company’s offices. In this kind of setting, privacy for technical and marketing information is convenient. Small organizations such as law offices, medical clinics, Internet businesses, and many others may not find the expertise they need in their local area. These small organizations, of which there are many, need secure communication to avoid the cost of face-to-face meetings. Lacking the funds for routine flights between cities, these organizations are very dependent on the electronic communication of data and ideas. Private medical information, schematic drawings, program source code, marketing plans, and innumerable other types of documents are involved. In such circumstances, strong encryption is needed.

      In many countries, the post office has the legal authority and obligation to enforce privacy for the postal mail. If these postal services were to offer secure email for a reasonable price, small companies would not be at such a disadvantage relative to larger companies.

      Established by the U. S. Constitution, Article I, Section 8, Clause 7, the United States Postal Service is authorized “To establish post offices and post roads. It also has a long history of adding services as needed, such as commemorative stamps, rural delivery, airmail, one-day delivery, zip codes, self-adhesive stamps, public Internet site, “Forever” stamps, and an iPhone app. Secure communication would add to its revenue (which would help ameliorate its recent shortfalls) and set a good example.

Technical Matters

      To create a secure message, the encryption algorithm must used secret information that cannot be discovered by unauthorized parties. If the encryption relies only on complexity or computational difficulty without involving secret information, the intended message can be discovered by third parties. To third parties, some aspect of the transmission must be unknowable.

      Within encryption technology, the embodiment of information unknowable to third parties often takes the form of secret random numbers. These random numbers are used to encrypt messages in such a way as to make decryption of a message impossible without access to those same random numbers.

      Many have said that what one person can encrypt, another can decrypt. This is a myth. TheOne-Time Pad algorithm was proved to be absolutely secure in the writings of Claude Shannon. See “Claude Elwood Shannon – Collected Papers” edited by N. J. A. Sloane and Aaron D. Wyner. In addition to being immune from hacking, this algorithm becomes more convenient as memory devices increase their capacity.

      Claude Shannon proved that any absolutely secure encryption algorithm must posses these characteristics:

      1. The encryption keys must be random numbers of uniform distribution.

      2. The keys must be shared in absolute secrecy by the sender and receiver.

      3. Any key encrypting a message must be as at least as long as that message.

      4. Any key used to encrypt a message must not be reused.

      The one-time pad is a famous encryption algorithm having all of these characteristics. By using a random key comprised of random numbers to encrypt a message (the plain text) with the XOR logical operation, the transmitted result (the ciphertext) is rendered as random as the key. The collection of secret keys is called the pad. Keys are of the same length as that of the messages they encrypt. They are erased immediately after their use. The result is that the actual message is as likely as any other message from the point of view of those attempting to decrypt the message without knowing the secret random numbers.

      Optionally, encrypted messages can be made to appear to be ordinary messages of a different type, such as pictures or sound files or text messages that contain information that is very different form that in the plain text. This process is called Steganography.

Services

      The most important service facilitating secure communication is the shipping of media containing random numbers. The production of truly random numbers for algorithms that encrypt messages by means of random keys is the part of the process most challenging and inconvenient for the customer. The principle service of USPS would be to place random numbers on appropriate media and ship copies to addresses designated by the customer. One shipment might serve the customer for only a few messages or for years worth of messages, depending on the number of random numbers shipped.

      Options may include picking up shipments from the local post office, receiving them in the mailbox, or receiving them at the recipient’s door (possibly by special delivery or with a return receipt).

Criminality

      Measures which distinguish legitimate from nefarious use of encryption services need not be publicly discussed.

Contact

      Please feel free to make suggestions by writing to jim@futurebeacon.com.

Israel and the Palestinians Gaza conflict nothing more than a False flag iron triangle operations designed to deceive the world

I believe that the Israel and Palestinian Gaza conflict is a false flag operation being carried out by Illuminati family’s and Satanic secret society’s to set up World War 3.   The Illuminati family’s control and have infiltrated just about every facet of society they do control key Government offices as well as private corporations through a type of iron triangle. In United States politics, the iron triangle comprises the policy-making relationship among the congressional committees, the bureaucracy, and interest groups.[1]  Illuminati Satanic secret societies, have been behind a wide range of events and disasters going as far back in history as the French Revolution and possibly even farther.

It is a historical fact the Hamas was founded by the Israel government Israel may want to destroy Hamas now. But it played a key role in the group’s creation. According to JerusalemOnline.com  “Israel actively supported Hamas” Documents show that Israel was interested in empowering Hamas in attempt to end the first Intifada. During Operation “Protective Edge”, news leaks website WikiLeaks exposes secret documents which were passed between American diplomats in the 1980’s. These documents allegedly show that Israel was interested in enabling Hamas activity in its beginning, intending to weaken the Palestine Liberation Organization and ending the first Intifada.  Hamas was established in 1987, and has its origins in Egypt’s Muslim Brotherhood that the United States General Patraeous, the CIA  Creatures of Jesuit Papacy and the Knights of Malta helped to …Israel and Egypt then imposed an economic blockade on Gaza.  Even US Congressman Ron Paul spoke about how  Israel created Hamas to destabilize Arafat who was very powerful at the time.

Army General David Patraeus, 2010

Army General David Patraeus, 2010

Army General David Patraeous is a Jesuit Temporal Coadjutor.  He is beloved by the Jesuits at Georgetown University at the nation’s capital in Washington, District of Columbia Catholics.  General “Betray-us” has spoken at Georgetown several times!  Additionally, the CIA was a creation of the Jesuits in 1947 via the National Security Act signed into law by 33rd Degree “Dirty Harry” Truman!  Since then, the American, British, Soviet/Russian, German, French, Canadian, Israeli, Interpol and all the other intelligence agencies around the world have been working together to form the pope’s modern day Holy Office of the Inquisition!

Thanks to the Mossad, Israel’s “Institute for Intelligence and Special Tasks”, the Hamas was allowed to reinforce its presence in the occupied territories. Meanwhile, Arafat’s Fatah Movement for National Liberation as well as the Palestinian Left were subjected to the most brutal form of repression and intimidation.  Let us not forget that it was Israel, which in fact created Hamas. According to Zeev Sternell, historian at the Hebrew University of Jerusalem, “Israel thought that it was a smart ploy to push the Islamists against the Palestinian Liberation Organisation (PLO)”. The Hamas had built its strength through its various acts of sabotage of the peace process, in a way which was compatible with the interests of the Israeli government. In turn, the latter sought in a number of ways, to prevent the application of the Oslo accords. In other words, Hamas was fulfilling the functions for which it was originally created: to prevent the creation of a Palestinian State. And in this regard, Hamas and Ariel Sharon, see eye to eye; they are exactly on the same wave length. 

A majority of the worlds problems, from poverty to world wars, are the cause of International “satanic secret society,” Banking cartel.  Many or the Worlds religions and their representatives are secretly being controlled by Secret Satanic Society’s such as the most famous Freemasons who have been influencing and trying to control secular society with a Satanic agenda that Albert Pike (December 29, 1809 – April 2, 1891) wrote about in a book he published called Morals and Dogma of the Ancient and Accepted Scottish Rite of Freemasonry in 1871. Albert Pike was an American attorney, Confederate officer, writer, and FreemasonAlbert Pike wrote a letter to Giuseppe Mazzini, dated August 15, 1871.  This letter graphically outlined plans for three world wars that were seen as necessary to bring about the One World Order, and we can marvel at how accurately it has predicted events that have already taken place. 

This section Copied from: Rense.com

Pike’s Letter to Mazzini: It is a commonly believed fallacy that for a short time, the Pike letter to Mazzini was on display in the British Museum Library in London, and it was copied by William Guy Carr, former Intelligence Officer in the Royal Canadian Navy. The British Library has confirmed in writing to me that such a document has never been in their possession. Furthermore, in Carr’s book, Satan, Prince of this World, Carr includes the following footnote:

“The Keeper of Manuscripts recently informed the author that this letter is NOT catalogued in the British Museum Library. It seems strange that a man of Cardinal Rodriguez’s knowledge should have said that it WAS in 1925”.

It appears that Carr learned about this letter from Cardinal Caro y Rodriguez of Santiago, Chile, who wrote The Mystery of Freemasonry Unveiled.

To date, no conclusive proof exists to show that this letter was ever written. Nevertheless, the letter is widely quoted and the topic of much discussion.

Following are apparently extracts of the letter, showing how Three World Wars have been planned for many generations.

“The First World War must be brought about in order to permit the Illuminati to overthrow the power of the Czars in Russia and of making that country a fortress of atheistic Communism. The divergences caused by the “agentur” (agents) of the Illuminati between the British and Germanic Empires will be used to foment this war. At the end of the war, Communism will be built and used in order to destroy the other governments and in order to weaken the religions.” 2

Students of history will recognize that the political alliances of England on one side and Germany on the other, forged between 1871 and 1898 by Otto von Bismarck, co-conspirator of Albert Pike, were instrumental in bringing about the First World War.

“The Second World War must be fomented by taking advantage of the differences between the Fascists and the political Zionists. This war must be brought about so that Nazism is destroyed and that the political Zionism be strong enough to institute a sovereign state of Israel in Palestine. During the Second World War, International Communism must become strong enough in order to balance Christendom, which would be then restrained and held in check until the time when we would need it for the final social cataclysm.” 3

After this Second World War, Communism was made strong enough to begin taking over weaker governments. In 1945, at the Potsdam Conference between Truman, Churchill, and Stalin, a large portion of Europe was simply handed over to Russia, and on the other side of the world, the aftermath of the war with Japan helped to sweep the tide of Communism into China.

(Readers who argue that the terms Nazism and Zionism were not known in 1871 should remember that the Illuminati invented both these movements. In addition, Communism as an ideology, and as a coined phrase, originates in France during the Revolution. In 1785, Restif coined the phrase four years before revolution broke out. Restif and Babeuf, in turn, were influenced by Rousseau – as was the most famous conspirator of them all, Adam Weishaupt.)

 

“The Third World War must be fomented by taking advantage of the differences caused by the “agentur” of the “Illuminati” between the political Zionists and the leaders of Islamic World. The war must be conducted in such a way that Islam (the Moslem Arabic World) and political Zionism (the State of Israel) mutually destroy each other. Meanwhile the other nations, once more divided on this issue will be constrained to fight to the point of complete physical, moral, spiritual and economical exhaustion We shall unleash the Nihilists and the atheists, and we shall provoke a formidable social cataclysm which in all its horror will show clearly to the nations the effect of absolute atheism, origin of savagery and of the most bloody turmoil. Then everywhere, the citizens, obliged to defend themselves against the world minority of revolutionaries, will exterminate those destroyers of civilization, and the multitude, disillusioned with Christianity, whose deistic spirits will from that moment be without compass or direction, anxious for an ideal, but without knowing where to render its adoration, will receive the true light through the universal manifestation of the pure doctrine of Lucifer, brought finally out in the public view. This manifestation will result from the general reactionary movement which will follow the destruction of Christianity and atheism, both conquered and exterminated at the same time.” 4

 

Since the terrorist attacks of Sept 11, 2001, world events, and in particular in the Middle East, show a growing unrest and instability between Modern Zionism and the Arabic World. This is completely in line with the call for a Third World War to be fought between the two, and their allies on both sides. This Third World War is still to come, and recent events show us that it is not far off.

We have been given warnings over the years by credible sources such as JFK’s Speech about Secret Societies that probably cost him his life….but, that’s what heroes do like Dwight D. Eisenhower  farewell address  speech on Jan.17,1961 also gives a warning of the military industrial complex that is controlled by the Satanic Zionists secret societies. Military Industrial Complex (MIC): is concept commonly used to refer to policy relationships between governments, national armed forces, and industrial support they obtain from the commercial sector in political approval for research, development, production, use, and support for military training, weapons, equipment, and facilities within the national defense and security policy.

It is our mission to give solutions and a platform to those Patriots who oppose to the Illuminati Satanic agenda of a One World Order.  Anti-Illuminati Party, should God deign to avail us, is to defend and promote real “Liberty and Justice for all,” formed by the wisdom contained in the United States Constitution, particularly its Bill of Rights, and inspired by the U. S. way of “Life, Liberty and the pursuit of Happiness.”

– Our strategy for promoting these consists in grassroots educational and political campaigns.
– Crucially, we of the Anti-Illuminati Party reject any unthinkingly trendy denial or politically expedient downplaying of the well-established fact that the N.W.O. Globalists, or “Illuminati,” do in fact occupy key offices and abuse their clout to promote the goals of their élitist cabal.
– Because of their powerful members they can, and in fact do, silence and manipulate the American People.
– To indict, counter, undermine, block and expose these tactics of theirs constitutes our mission, and our lifeblood.

– If sound government is to be restored, all the New World Order Globalists must have all their cheaply-bought authority pulled: “We must remove the weeds from public office: they are choking Freedom and the Tree of Liberty” (Daniel J Leach, Jr.).
– The Anti-Illuminati Party identifies the N.W.O. as “an élitist association that exploits the commoner and violates the United States Republic’s first principles.”
– We deem it imperative that every United Statesman must organize to indict, counter, undermine, block and expose these High Traitors.
– We the members of the Anti-Illuminati Party resolve to support no N.W.O. globalist or Illuminist/Illuminatus in any way or sense.
– Under the “Anti-Illuminati Party” banner we aim to unite those who are too often disenfranchised by the current political climate.

– We of the Anti-Illuminati Party are dedicated to revitalizing our communities by speaking Truth, Hope, Goodwill, Unity and Peace.
– We shall work tirelessly to cultivate “Life, Liberty and the pursuit of Happiness” wherever and whenever we can.
– To best find and implement solutions to this end, we place a high value on Party-wide collaboration.
– We shall operate lawfully and respectfully in all matters at all times.
– We shall not profit from our endeavors.
– We believe in “Liberty and Justice for all.”
– With the help of God—that is of supreme Love, Light, Spirit and Truth—we shall not waver in this mission to collaborate with all citizens toward the construction of a better community.

 John Fitzgerald “Jack” Kennedy speech also  (May 29, 1917 — November 22, 1963)


This section copied from: Wikipedia 

False flag (or black flag) describes covert military or paramilitary operations designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups or nations other than those who actually planned and executed them. Operations carried out during peace-time by civilian organizations, as well as covert government agencies, may by extension be called false flag operations if they seek to hide the real organization behind an operation. Geraint Hughes uses the term to refer to those acts carried out by “military or security force personnel, which are then blamed on terrorists.”[1]

In its most modern usage, the term may also refer to those events which governments are cognizant of and able to stop but choose to allow to happen (or “stand down”), as a strategy to entangle or prepare the nation for war. Furthermore, the term “false flag terrorism” may even be used in those instances when violence is carried out by groups or organizations which, whether they know it or not, are being supported or controlled by the “victim” nation. deHaven-Smith argues that the terminology has become looser in recent years due to the increasingly complex levels of “duplicity” and “international intrigue” between states.[2] Some argue that false flags are methods used by deep states as a form of deep politics.[3]

The name “false flag” has its origins in naval warfare where the use of a flag other than the belligerent’s true battle flag as a ruse de guerre, before engaging the enemy, has long been acceptable.[4] Such operations are also acceptable in certain circumstances in land warfare, to deceive enemies in similar ways providing that the deception is not perfidious and all such deceptions are discarded before opening fire upon the enemy.


All about Re-Education Camps In America

Leaked U.S. Army Document Outlines Plan For Re-Education Camps In America

By Paul Joseph Watson

A leaked U.S. Army document prepared for the Department of Defense contains shocking plans for “political activists” to be pacified by “PSYOP officers” into developing an “appreciation of U.S. policies” while detained in prison camps inside the United States.

The document, entitled FM 3-39.40 Internment and Resettlement Operations (PDF) was originally released on a restricted basis to the DoD in February 2010, but has now been leaked online.
The manual outlines policies for processing detainees into internment camps both globally and inside the United States. International agencies like the UN and the Red Cross are named as partners in addition to domestic federal agencies including the Department of Homeland Security and FEMA.
The document makes it clear that the policies apply “within U.S. territory” and involve, “DOD support to U.S. civil authorities for domestic emergencies, and for designated law enforcement and other activities,” including “man-made disasters, accidents, terrorist attacks and incidents in the U.S. and its territories.”
The manual states, “These operations may be performed as domestic civil support operations,” and adds that “The authority to approve resettlement such operations within U.S. territories,” would require a “special exception” to The Posse Comitatus Act, which can be obtained via “the President invoking his executive authority.” The document also makes reference to identifying detainees using their “social security number.”
Aside from enemy combatants and other classifications of detainees, the manual includes the designation of “civilian internees,” in other words citizens who are detained for, “security reasons, for protection, or because he or she committed an offense against the detaining power.”
Once the detainees have been processed into the internment camp, the manual explains how they will be “indoctrinated,” with a particular focus on targeting political dissidents, into expressing support for U.S. policies.
The re-education process is the responsibility of the “Psychological Operations Officer,” whose job it is to design “PSYOP products that are designed to pacify and acclimate detainees or DCs to accept U.S. I/R facility authority and regulations,” according to the document.

Political activists would be pacified to sympathize with the government

Paul Joseph Watson
Infowars.com
Thursday, May 3, 2012

RELATED: Yes, The Re-Education Camp Manual Does Apply Domestically to U.S. Citizens

A leaked U.S. Army document prepared for the Department of Defense contains shocking plans for “political activists” to be pacified by “PSYOP officers” into developing an “appreciation of U.S. policies” while detained in prison camps inside the United States.

The document, entitled FM 3-39.40 Internment and Resettlement Operations (PDF) was originally released on a restricted basis to the DoD in February 2010, but has now been leaked online.

The manual outlines policies for processing detainees into internment camps both globally and inside the United States. International agencies like the UN and the Red Cross are named as partners in addition to domestic federal agencies including the Department of Homeland Security and FEMA.

The document makes it clear that the policies apply “within U.S. territory” and involve, “DOD support to U.S. civil authorities for domestic emergencies, and for designated law enforcement and other activities,” including “man-made disasters, accidents, terrorist attacks and incidents in the U.S. and its territories.”

The manual states, “These operations may be performed as domestic civil support operations,” and adds that “The authority to approve resettlement such operations within U.S. territories,” would require a “special exception” to The Posse Comitatus Act, which can be obtained via “the President invoking his executive authority.” The document also makes reference to identifying detainees using their “social security number.”

Aside from enemy combatants and other classifications of detainees, the manual includes the designation of “civilian internees,” in other words citizens who are detained for, “security reasons, for protection, or because he or she committed an offense against the detaining power.”

Once the detainees have been processed into the internment camp, the manual explains how they will be “indoctrinated,” with a particular focus on targeting political dissidents, into expressing support for U.S. policies.

The re-education process is the responsibility of the “Psychological Operations Officer,” whose job it is to design “PSYOP products that are designed to pacify and acclimate detainees or DCs to accept U.S. I/R facility authority and regulations,” according to the document.

The manual lists the following roles that are designated to the “PSYOP team”.

– Identifies malcontents, trained agitators, and political leaders within the facility who may try to organize resistance or create disturbances.

– Develops and executes indoctrination programs to reduce or remove antagonistic attitudes.

– Identifies political activists.

– Provides loudspeaker support (such as administrative announcements and facility instructions when necessary).

– Helps the military police commander control detainee and DC populations during emergencies.

– Plans and executes a PSYOP program that produces an understanding and appreciation of U.S. policies and actions.

Remember, this is not restricted to insurgents in Iraq who are detained in prison camps – the manual makes it clear that the policies also apply “within U.S. territory” under the auspices of the DHS and FEMA. The document adds that, “Resettlement operations may require large groups of civilians to be quartered temporarily (less than 6 months) or semipermanently (more than 6 months).”

  • A D V E R T I S E M E N T

The historical significance of states using internment camps to re-educate detainees centers around the fact that it is almost exclusively practiced by repressive and dictatorial regimes like the former Soviet Union and Stalinist regimes like modern day North Korea.

We have exhaustively documented preparations for the mass internment of citizens inside America, but this is the first time that language concerning the re-education of detainees, in particular political activists, has cropped up in our research.

In 2009, the National Guard posted a number of job opportunities looking for “Internment/Resettlement Specialists” to work in “civilian internee camps” within the United States.

In December last year it was also revealed that Halliburton subsidiary KBR is seeking sub-contractors to staff and outfit “emergency environment” camps located in five regions of the United States.

In 2006, KBR was contracted by Homeland Security to build detention centers designed to deal with “an emergency influx of immigrants into the U.S,” or the rapid development of unspecified “new programs” that would require large numbers of people to be interned.

Rex 84, short for Readiness Exercise 1984, was established under the pretext of a “mass exodus” of illegal aliens crossing the Mexican/US border, the same pretense used in the language of the KBR request for services.

During the Iran-Contra hearings in 1987, however, it was revealed that the program was a secretive “scenario and drill” developed by the federal government to suspend the Constitution, declare martial law, assign military commanders to take over state and local governments, and detain large numbers of American citizens determined by the government to be “national security threats.”

Under the indefinite detention provision of the National Defense Authorization Act, which was signed by Barack Obama on New Year’s Eve, American citizens can be kidnapped and detained indefinitely without trial.

Read a portion of the Internment and Resettlement Operations manual below.

The following portions of the document make it clear that the policies apply “within U.S. territory” (as well as abroad in countries like Iraq and Afghanistan) and that domestic federal agencies are involved.

*********************

Paul Joseph Watson is the editor and writer for Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a regular fill-in host for The Alex Jones Show and Infowars Nightly News.

Could 2012 NLE Cyber Attack DRILL be the Next 911 False Flag, Will This Years Drill Go Live?

By:Daniel J Leach

Reblogged: http://theintelhub.com

NLE 2012: Will This Years Drill Go Live and Result in a False Flag Cyber Attack?

The Intel Hub
By Shepard Ambellas and Alex Thomas
April 4, 2012

The summer of 2012 is fast approaching. As it inches closer, we will start to see a major increase in US and foreign troop movements as well as military equipment movements throughout the CONUS (Continental United States).

While many of the upcoming sightings may well be normal operations as the military does like to do training in the summer, the fact is that parts of our own military, along with foreign and UN troops, are actively planning to take on the American people.

National Level Exercise drills have been in effect for years now and have been covered by many alternative news sources, including The Intel Hub through our yearly Operation Overwatch which we use to gain intel and tips from the public in order to relay them to our readers.

Over the years many people have worried about the numerous National Level Preparedness drills and, in most cases, for good reason.

In 2011, the NLE focused around an earthquake on the New Madrid Fault Zone and the year before resulted in 70 thousand people being evacuated from a Texas city after a fertilizer fire.

Interestingly enough, this years FEMA national preparedness drill is focusing on the threat of a major cyber attack on America’s infrastructure.

The last year has seen dozens of cyber attacks on government websites as well as government propagandists pushing the fear of a cyber attack on the populace. Now we have the Department of Homeland Security making cyber security the main component of their annual preparedness drill.

Although only a small amount of information has been released on NLE2012, we can see from FEMA’s own website what it primary consists of.

FEMA’s website released the following PDF;

National Level Exercise (NLE) 2012Continental

National Level Exercise (NLE) 2012 is part of a series of congressionally mandated preparedness exercises designed to educate and prepare participants for potential catastrophic events.

The NLE 2012 process will examine the nation’s ability to coordinate and implement prevention, preparedness, response and recovery plans and capabilities pertaining to a significant cyber event or a series of events.

NLE 2012 will examine national response plans and procedures, including the National Response Framework (NRF), NRF Cyber Incident Annex, Interim National Cyber Incident Response Plan (NCIRP) and the International Strategy for Cyberspace.

Unique to NLE 2012 will be an emphasis on the shared responsibility among all levels of government, the private sector and the international community to secure cyberspace and respond together to a significant cyber incident.

Obsidian Analysisthe company heading up NLE12 for the private sector, states on their website:

NLE 2012 will comprise four major exercises, including a capstone event. These exercises will share common scenario elements, planning efforts and governance structure.

Participation in each exercise will be determined respectively, but the NLE 2012 process includes the Executive Office of the President; federal, state, local, tribal and territorial department and agency officials and emergency operations elements, nongovernmental and private sector organizations and international partners. These four major exercises include:

Information Exchange: This discussion-based exercise is designed to evaluate the sharing of cyber related information among the intelligence community, law enforcement, federal, state, tribal and local governments, the private sector and international partners, as appropriate

Cyber Incident Management/Virtual Effects: This exercise will examine the coordination and communication processes between public and private stakeholders in response to a significant cyber incident. This will include examining challenges related to managing a cyber event with national security implications.

NLE Capstone/Cyber Physical Effects: This functional exercise will examine challenges related to managing a cyber event with physical consequences and national security implications. This will include addressing cyber and physical interdependencies and impacts while coordinating a Whole Community level cyber and physical response.

Continuity Exercise/Eagle Horizon: This operations-based exercise will evaluate the continuity capability of federal departments and agencies. A component will include a nationwide exercise examining communications capability of the homeland security enterprise under conditions in which critical systems have been degraded or lost.

In addition to the major exercises, the NLE 2012 process will include senior level exercises, building-block events (i.e., seminars, tabletop exercises, and training) and routine exercise planning conferences.

As more information is released on these upcoming national preparedness drills, The Intel Hub will bring them to our readers attention.

Absolutely know the the Truth about the Shroud of Turin

By:Daniel J Leach

Many claim that The Shroud of Turin is Jesus Christ but the  Knights Templar claim that this is Jacques de Molay.  I myself would like to think that this is Jesus Christ but with my research and understanding of history tend to lead me to believe that this is indeed Jacques de Molay and not Jesus Christ.

Geoffroi de Charny (the French Knight who died at the 1356 battle of Poitiers) and his wife Jeanne de Vergy are the first reliably recorded owners of the Turin Shroud. This Geoffroi participated in a failed crusade under Humbert II of Viennois in the late 1340s.[26] He is sometimes confused with Templar Geoffroi de Charney.[27]

This Section Copied from: http://blog.templarhistory.com/2010/03/the-templars-and-the-shroud-of-turin/

Any discussion of the Shroud of Turin is bound to be controversial. Those who view this sacred and holy relic fall into two camps, those that believe it to be the undisputed earthly evidence of a Christ risen and those who believe it to be a medieval forgery.

It is not the intention of this web site to cast doubt on or support the authenticity of the shroud, but rather to show its possible relationship to the Knights Templar. We receive many letters from angry people who wish to enter into lengthy debates about carbon 14 reliability. We are aware of new evidence that puts the reliability of carbon 14 dating in question, so please refrain from telling us of the findings or directing us to URLs that make the claims.

There are two theories that relate to the Templars having been involved with the Shroud, one, which would support the authenticity of the Shroud and another, which would refute it.

In 1204 the Crusaders sacked the city of Constantinople. Among them were the Knights Templar, whom some scholars contend took the Burial shroud of Jesus from the city. To support this theory, author Ian Wilson who wrote the book “The Shroud of Turin: Burial Cloth Of Jesus?” makes the claim that the head that the Templars were accused of worshipping was none other than that of Jesus. His belief is that the Shroud when folded depicted the head of Christ and was referred to as the “Mandylion.” There is a painted panel at Templecombe in England that shows a bearded head like that, which is depicted on the Mandylion.

In their two books, “The Hiram Key” and “The Second Messiah,” authors Christopher Knight and Robert Lomas paint a contrasting picture to the Mandylion theory. The authors theorize that the image on the Shroud of Turin is in fact that of the last Grand Master of the order, Jacques de Molay, who was tortured some months before his execution in 1307. The image on the shroud certainly does fit the description of de Molay as depicted in medieval wood cuts, a long nose, hair shoulder length and parted in the center, a full beard that forked at its base, not to mention the six-foot frame. De Molay was said to be quite tall.

However, many have criticized the theory on the basis that the Templar rule of order forbade the Templars from growing their hair long. What critics of the theory overlook is that during DeMolay’s seven years in prison it is highly unlikely that he would have been afforded such luxuries as good grooming.

Knight and Lomas claim that the shroud figured in the Templars rituals of figurative resurrection and that DeMolay’s tortured body was wrapped in a shroud, which the Templars kept after his death. Lomas and Knight further believe that lactic acid and blood from DeMolay’s tortured body mixed with frankincense (used to whiten the cloth) etching his image into the shroud.

When the shroud was first put on display in 1357 (50 years after the disbanding of the order) by the family of Geoffrey de Charney who was also burned at the stake with de Molay, the first people viewing the shroud recognized the image to be that of Christ.

The authors theorize that Jacques de Molay may have been tortured in a manner similar to Christ as a mockery. Certainly then, the wounds suffered by de Molay where the same as those of Jesus Christ on the Cross.

Today it is commonly believed by many, through carbon dating, that the shroud dates to the late 13th century and not to the date of Christ’s supposed crucifixion. It is interesting that the church revealed these carbon dating results on October 13th, 1989, which is the same day the Templars were arrested by Church and State. According to the authors:

“Carbon dating has conclusively shown that the Shroud of Turin dates from between 1260 and 1380, precisely as we would expect if it were the image of Jacques de Molay. There is no other known theory that fits the scientifically established facts. Through experimentation, we know that the figure on the Shroud was on a soft bed of some kind, which strongly suggests that the victim was not dead and was expected to recover.”

The Second Messiah pg. 161 – Christopher Knight and Robert Lomas

Regardless of whether the findings of Ian Wilson or Knight and Lomas are correct, it is evident that this most holy and venerated relic has found its way into the Templar mythos.

Lynn Picknet and Clive Prince, authors of “Turin Shroud: In Whose Image?” present another theory of interest on the matter. Readers will recognize the authors from the book, “The Templar Revelation.” In the authors’ earlier book the duo claim that Leonardo Da Vinci who created an early photographic technique manufactured the image on the shroud of Turin.

Stephanie Pappas
Live Science
Thu, 05 Apr 2012 17:01 CDT
Print

Shroud of Turin

© Public domain
Full-length negative photograph of the Shroud of Turin.

A hoax or a miracle? The Shroud of Turin has inspired this question for centuries. Now, an art historian says this piece of cloth, said to bear the imprint of the crucified body of Jesus Christ, may be something in between.

According to Thomas de Wesselow, formerly of Cambridge University, the controversial shroud is no medieval forgery, as a 1989 attempt at radiocarbon dating suggests. Nor is the strange outline of the body on the fabric a miracle, de Wesselow writes in his new book, The Sign: The Shroud of Turin and the Secret of the Resurrection (Dutton Adult, 2012). Instead, de Wesselow suggests, the shroud was created by natural chemical processes – and then interpreted by Jesus’ followers as a sign of his resurrection.

“People in the past did not view images as just the mundane things that we see them as today. They were potentially alive. They were seen as sources of power,” de Wesselow told LiveScience. The image of Jesus found on the shroud would have been seen as a “living double,” he said. “It seemed like they had a living double after his death and therefore it was seen as Jesus resurrected.”

Believing the shroud

As de Wesselow is quick to admit, this idea is only a hypothesis. No one has tested whether a decomposing body could leave an imprint on shroud-style cloth like the one seen on the shroud. A 2003 paper published in the journal Melanoidins in Food and Health, however, posited that chemicals from the body could react with carbohydrates on the cloth, resulting in a browning reaction similar to the one seen on baked bread. (De Wesselow said he knows of no plans to conduct an experiment to discover if this idea really works.)

Perhaps more problematic is the authenticity of the shroud itself. Radiocarbon dating conducted in 1988 estimated the shroud to medieval times, between approximately A.D. 1260 and 1390. This is also the same time period when records of the shroud begin to appear, suggesting a forgery.

Critics have charged that the researchers who dated the shroud accidentally chose asample of fabric added to the shroud during repairs in the medieval era, skewing the results. That controversy still rages, but de Wesselow is convinced of the shroud’s authenticity from an art history approach.

“It’s nothing like any other medieval work of art,” de Wesselow said. “There’s just nothing like it.”

Among the anachronisms, de Wesselow said, is the realistic nature of the body outline. No one was painting that realistically in the 14th century, he said. Similarly, the body image is in negative (light areas are dark and vice versa), a style not seen until the advent of photography centuries later, he said.

“From an art historian’s point of view, it’s completely inexplicable as a work of art of this period,” de Wesselow said.

Resurrection: spiritual or physical?

If de Wesselow’s belief in the shroud’s legitimacy is likely to rub skeptics the wrong way, his mundane explanation of how the image of Jesus came to be is likely to ruffle religious feathers. According to de Wesselow, there’s no need to invoke a miracle when simple chemistry could explain the imprint. It’s likely, he says, that Jesus’ female followers returned to his tomb to finish anointing his body for burial three days after his death. When they lifted the shroud to complete their work, they would have seen the outline of the body and interpreted it as a sign of Jesus’ spiritual revival.

From there, de Wesselow suspects, the shroud went on tour around the Holy Land, providing physical proof of the resurrection to Jesus’ followers. When the Bible talks about people meeting Jesus post-resurrection, de Wesselow said, what it really means is that they saw the shroud. He cites the early writings of Saint Paul, which focus on a spiritual resurrection, over the gospels of Mark, Matthew, Luke and John, which were written later and invoke physical resurrection.

“The original conception of the resurrection was that Jesus was resurrected in a spiritual body, not in his physical body,” de Wesselow said.

These ideas are already receiving pushback, though de Wesselow says he’s yet to get responses from people who have read his entire book. Noted skeptic Joe Nickell toldMSNBC’s Alan Boyle that de Wesselow’s ideas were “breathtakingly astonishing,” and not in a good way; Nickell has argued on multiple occasions that the shroud’s spotty historical record and too-perfect image strongly suggest a counterfeit.

On the other end of the religious spectrum, former high-school teacher and Catholic religious speaker David Roemer believes in Jesus’ resurrection, but not the shroud’s authenticity. The image is too clear and the markings said to be blood aren’t smeared as they would be if the cloth had covered a corpse, Roemer told LiveScience.

“When you get an image this detailed, it means it was done by some kind of a human being,” Roemer said.

Unlike many “shroudies,” as believers are deprecatingly called, Roemer suspects the shroud was deliberately created by Gnostic sects in the first or second century. A common religious explanation for the markings is that a flash of energy or radiation accompanied Christ’s resurrection, “burning” his image onto the cloth.

If anything is certain about de Wesselow’s hypothesis, it’s that it is not likely to settle the shroud controversy. Scientific examinations of the delicate cloth are few and far between – and so are disinterested parties. Roemer, for example, recently arrived at a scheduled talk at a Catholic church in New York only to find the talk had been canceled when the priest learned of Roemer’s shroud skepticism. (The Catholic Church has no official position on the shroud’s authenticity.)

Meanwhile, de Wesselow said, people who aren’t driven by faith to accept the cloth as real generally don’t care about the shroud at all.

“The intellectual establishment, if you like, is not interested in shroud science,” he said. “It regards it as fringe and it’s not interested.”

Create a website or blog at WordPress.com

Up ↑