How to make the US Post Office prosperous and relevant in the 21 century using the One-Time Pad algorithm!

Every Tuesday I meet with a group of Patriots from the Illumination Society at the Liberty Restaurant in Rochester NY to do a round table radio broadcast discussing topics about Geo politics, religion, Currant events and anything that has to do with Truth Liberty and Justice for all.  We not only talk about problems but as a group we also work on finding solutions to the world problems.  every week we have some of the brightest minds join us at the round table live Broadcast. http://www.blogtalkradio.com/anti-illuminati-party

The Illumination Society  presents a FREE Movie Night every month showing films that we feel are important for the time in which we live. Films that dig deep into subjects like – The World History – UFO – The New World Order – Spirituality – Prophecy – Science – What’s Happening To Our Food – Agenda 21 – Vaccines and many other subjects.

Our Free Movie Night has been well received by people from all walks of life. People concerned with the things happening in our world today. People that want to know what is happening all around us and what we can do to stand against those that wish to rob us of our freedoms and our God-given rights. Come out and learn about subjects you may or may not be aware of. We hope that our Movie Nights, and our following Q&A time will shed some light on these subjects, and help you to see America’s role in past, present and future history.

We will be presenting the following films on the following dates:
– See more at: https://www.eventbrite.com/e/movie-night-tickets-12609803261

You can also join us in our round table discussion and suggest topics you would like us to discus.

Anti New World Order Party ☼ Global Group

https://www.facebook.com/groups/AntiNewWorldOrderPartyGlobal/

Now to the main point of this blog post today,  We will also have a follow-up to this post.

Original posted on FutureBeacon.com

 

Communication Privacy
by
James Adrian

Introduction

      Many individuals, businesses and other organizations have a legitimate and lawful need to keep some of their information confidential or even absolutely secret from competitors, the press and others. Because email has become vital to timely communication and because email is not secure, encryption is often necessary.

      New employees of large companies are often encouraged to live near the company’s offices. In this kind of setting, privacy for technical and marketing information is convenient. Small organizations such as law offices, medical clinics, Internet businesses, and many others may not find the expertise they need in their local area. These small organizations, of which there are many, need secure communication to avoid the cost of face-to-face meetings. Lacking the funds for routine flights between cities, these organizations are very dependent on the electronic communication of data and ideas. Private medical information, schematic drawings, program source code, marketing plans, and innumerable other types of documents are involved. In such circumstances, strong encryption is needed.

      In many countries, the post office has the legal authority and obligation to enforce privacy for the postal mail. If these postal services were to offer secure email for a reasonable price, small companies would not be at such a disadvantage relative to larger companies.

      Established by the U. S. Constitution, Article I, Section 8, Clause 7, the United States Postal Service is authorized “To establish post offices and post roads. It also has a long history of adding services as needed, such as commemorative stamps, rural delivery, airmail, one-day delivery, zip codes, self-adhesive stamps, public Internet site, “Forever” stamps, and an iPhone app. Secure communication would add to its revenue (which would help ameliorate its recent shortfalls) and set a good example.

Technical Matters

      To create a secure message, the encryption algorithm must used secret information that cannot be discovered by unauthorized parties. If the encryption relies only on complexity or computational difficulty without involving secret information, the intended message can be discovered by third parties. To third parties, some aspect of the transmission must be unknowable.

      Within encryption technology, the embodiment of information unknowable to third parties often takes the form of secret random numbers. These random numbers are used to encrypt messages in such a way as to make decryption of a message impossible without access to those same random numbers.

      Many have said that what one person can encrypt, another can decrypt. This is a myth. TheOne-Time Pad algorithm was proved to be absolutely secure in the writings of Claude Shannon. See “Claude Elwood Shannon – Collected Papers” edited by N. J. A. Sloane and Aaron D. Wyner. In addition to being immune from hacking, this algorithm becomes more convenient as memory devices increase their capacity.

      Claude Shannon proved that any absolutely secure encryption algorithm must posses these characteristics:

      1. The encryption keys must be random numbers of uniform distribution.

      2. The keys must be shared in absolute secrecy by the sender and receiver.

      3. Any key encrypting a message must be as at least as long as that message.

      4. Any key used to encrypt a message must not be reused.

      The one-time pad is a famous encryption algorithm having all of these characteristics. By using a random key comprised of random numbers to encrypt a message (the plain text) with the XOR logical operation, the transmitted result (the ciphertext) is rendered as random as the key. The collection of secret keys is called the pad. Keys are of the same length as that of the messages they encrypt. They are erased immediately after their use. The result is that the actual message is as likely as any other message from the point of view of those attempting to decrypt the message without knowing the secret random numbers.

      Optionally, encrypted messages can be made to appear to be ordinary messages of a different type, such as pictures or sound files or text messages that contain information that is very different form that in the plain text. This process is called Steganography.

Services

      The most important service facilitating secure communication is the shipping of media containing random numbers. The production of truly random numbers for algorithms that encrypt messages by means of random keys is the part of the process most challenging and inconvenient for the customer. The principle service of USPS would be to place random numbers on appropriate media and ship copies to addresses designated by the customer. One shipment might serve the customer for only a few messages or for years worth of messages, depending on the number of random numbers shipped.

      Options may include picking up shipments from the local post office, receiving them in the mailbox, or receiving them at the recipient’s door (possibly by special delivery or with a return receipt).

Criminality

      Measures which distinguish legitimate from nefarious use of encryption services need not be publicly discussed.

Contact

      Please feel free to make suggestions by writing to jim@futurebeacon.com.

The man who planned 9/11, his name is Mike Harari (now 82 or 83 years old) who is a retired counterintelligence specialist and former Deputy Chief of the Mossad But I can assure you that this was done by the Freemasons.”


by TBFWS

(The Battle For World Supremacy)
April 4, 2010

Updated May 9, 2010

from BattleForWorld Website


Dimitri Khalezov, a former officer of the Soviet nuclear intelligence, expressed his knowledge about the September 11, 2001 so-called terrorist attack on the United States.

In what appears to have been a ‘revenge attack’, which was organized by an elite man with grievances against some of the things the United States has done. What Americans saw on their televisions as the 911 reporting unfolds were attacks contrived by U.S. officials in high places when the plan became known to them so that the ‘revenge attack’ that the elite man had organized could to be masked and explained away by a scripted televised show.

The footage that everyone saw showing the plane crashing into the World Trade Center (WTC) was digitally put together by the team working for the elite man and fed to the U.S. television stations on September 11.

No planes crashed into the WTC; the terrorist attack was all make-believe. And that the U.S. officials were the ones who used the situation to begin launching fake wars in the Middle-East.

Read transcription excerpts below for more information regarding Dimitri’s revelation interviews.


The Third Truth, by Dimitri Khalezov

“I seem to be the only person on this Planet who was able to provide satisfactorily explanation in regard to the WTC-1, 2 and 7 pulverizations, plus satisfactorily explanations regarding the Pentagon attack, anthrax letters, doomsday plane, the true nature of the 9/11 cover-up, and the rest of strange things that happened on that day.

My explanations have no flaws and I can answer any and every question about 9/11 that no other ‘conspiracy theorist’ could ever answer. I know the entire truth about 9/11 whether you like it or not.

To answer the second part of your questions:

Yes, I know the Chief Organizer (of 9/11) personally. Also before the 9/11. Moreover, I was so close to him that he did not invite anyone else but me alone to his early breakfast on the 12thof September 2001 (in Bangkok, while in the United States it was still the 11th of September) and there he shared a bottle from his collection of wines with me to celebrate the 9/11 event.

The chief organizer of 911 invites YOU and YOU only to a breakfast to celebrate the 911 attacks?

To continue answering your questions. Yes, it was only me alone who was invited and no one else, but it is not the main point of my story at all. The main point is that I know why the WTC was pulverized during its collapse and I can explain the process in precise detail, as well as explain in exact details any other parts of the 9/11 attack, including all seeming ‘inconsistencies’ which no one else could satisfactorily explain so far.

To be honest, I could tell you that a larger half of the Arab and Pakistani communities in Bangkok, not to mention Russian, Serbian, Iranian and others were openly celebrating the 9/11 event because it was love from first sight. The 9/11 attack was ugly judging from the point of view of the American people and from their obedient allies, but when it comes to the rest of the bipeds the 9/11 attack seems a bit beautiful in performance.

The US officials knew perfectly well who did the 9/11 and they even know WHY they were punished in such a manner. But they can not do anything against the real culprits, because it was them – the US officials, who did the most of the actual crimes related to the 9/11 event.

So, there is nothing to complain about.

What the chief organizer (Mike Harari) thinks about you now? I think he does not give a ####, neither do I. As I have told you the Americans can not even bring him (Mike Harari) to the court, because he did not do much in reality.

All he did was this: He rented offices on the necessary floors of the WTC twin towers and had explosives installed to imitate plane impacts and holes, plus he arranged for cameramen to film the ‘planes’ (he means the scenes with stand-in actors where the planes would then be digitally inserted into the video later, TBFWS Editor), plus he arranged for a missile with broken detonators to be fired into the Pentagon. Nothing more than that.

The US officials did the rest.

  • they shoot down two planes (with people onboard to publicly account for the WTC two explosions)

  • they brought remains of one plane to the Pentagon site

  • they demolished the twin towers (with human beings still inside and around)

  • moreover, they demolished the WTC-7 building

  • they sent unprotected workers to clean up ‘ground zero’

  • they sent anthrax letters implying that they were sent by Saddam Hussein emissaries, etc, etc, etc…

Just compare the amount of guilt of the real 9/11 organizers and that of the US officials.

So, the real 9/11 organizer does not give a #### really. Because all the high-ranking US officials know who did it anyway and my book would not add to their knowledge. It would only add to the knowledge of the general public.

If you think I know the entire 9/11 story, of course I do not know the entire chain of events in precise details (such as, for example, the exact details of the plane ‘hijackings’ or the names of the low-ranking Freemasons involved in the setup, or the exact details of how exactly they pressed the red buttons and who exactly convinced them to do so and on which minute and second of the day).”

(TBFWS Editor: The ‘red button’ is a reference to the trigger device built into the World Trade Center foundation just incase the building had to be demolished at a future date. After the chief planner of 911 gave the orders to set off the explosives in both of the WTC top floors, orders were later given by U.S. officials to press the red button to bring down the buildings.)


Who Did 911?

“I also would like to remind you that I am a specialist in nuclear weapons, unlike many of you. It was my profession for several years. (Who did 911?) It is not so simple as you might think.

Because the Mossad did it firstly, but not alone, and secondly not in its entirety. It was only certain individuals from the Mossad, not the entire Mossad. And it is quite complicated, indeed, so it is not so easy to explain it in a few lines.

Besides, the Mossad did only the minor part of the job. French secret service, for example, did much more than the Mossad.

Besides, all those ‘cameramen’ and ‘witnesses’ who ‘saw’ planes were not Mossad operatives, they were members of the Freemasonic sect. As well as ‘passengers’, pilots, stewardesses and many other actors involved. (TBFWS Editor: He is referring to people who were part of the script during the 9/11 operation.)

It is really a very complicated operation and I don’t know even 5% of its details.

Though I know some people from the Mossad and from the French secret services who were involved. I don’t know for sure who exactly fired the missile and from what kind of ship it was fired from.

But I can assure you that this was done by the Freemasons.”

The man who planned 9/11, his name is Mike Harari (now 82 or 83 years old) who is a retired counterintelligence specialist and former Deputy Chief of the Mossad; a former friend of the U.S. PresidentBush Senior and the former Deputy General Manuel Noriega – the Dictator of Panama.

A rare photo is posted below.



Nuclear Device For Building Demolition

Many years ago Rayelan Allen of RumorMillNews was told by her former husband Gunther Russbacher a CIA agent that a nuclear device was built into the United Nations foundation for its eventual demolition.

(And here we have Dimitri Khalezov of Russia revealing that it is standard policy in the United States to use such a device when constructing very large buildings.)

Dimitri replied:

“About the nuclear device under the U.N. building, I did not know that before, but it sounds reasonable to me. Because since the Controlled Demolition Inc. has patented nuclear technique for demolition, it would be reasonable to expect that they would promote it to get more contracts to secure more work for the future. This is capitalism, after all and everyone is after profits…

It should be noted that the nuclear weapons manufacturers are not ‘commercialized’ and to use nuclear devices on some commercial projects is a rare opportunity for them to get into some commerce too. So, why not use such an opportunity? So, I would not be surprised at all if this is true as reported by Russbacher.

Moreover, since the publication of my 9/11 movie, I’ve read even stranger news on the Internet regarding a Japanese architect who claimed that at least two skyscrapers in Japan also have nuclear devices installed under them by the Controlled Demolition Inc. (not surprising, considering that the initial architect of the WTC was a Japanese guy and he understandably brought this kind of idea back to Japan).

It looks awful, to be honest… I do remember that the U.N. building was promptly evacuated on 9/11 and it was also reported on television as a piece of important news.”

An alternative for the ‘Dimitri Khalezov Telephone Interview’ in below video:

911 Nuclear Demolition

Telephone interview to Dimitri Khalezov

http://blip.tv/play/AYHhlyUC


NOTE

Something mysterious has happened to Dimitri’s original Youtube channel.

Video links disabled by Israeli agent Owen Mark Le Winton:

All his videos were flagged to the ‘private’ setting and are no longer available to the public.

 

An imposter and obstructionist by the name of ‘Owen Mark Le Winton’ is claiming copyright on behalf of the Israeli government and Youtube believes him. Dimitri said that ‘Big Brother’ is extremely unhappy with his movie, and that hopefully the problem with the Israeli agent imposter Owen will be settled soon.

 

(Anyone can declare another person’s work as their own on Youtube. And in this case they are helping an imposter to suppress and steal another person’s original work).


“The Third Truth” by Dimitri Khalezov, Publisher: Lulu.com, ISBN: 1409288536; Edition: Paperback; 2009-11-25. (His book is not yet published. If you’re interested in a copy, email us and your contact information will be sent to an agent of the publisher.)


News

Note: Is there a connection between the Somali pirates hijacking the Russian oil tanker, the Israeli Mossad and the Russian government? Rumor has it that the Israelis are involved in the Somali pirate setup. Are members of the Mossad sending a warning to the Russian government regarding the Dimitri Khalezov revelation videos? 

Manuel Noriega Extradited To France

May 10, 2010
HUFFINGTONPOST.COM

The U.S. extradited former Panamanian dictator Manuel Noriega to France on Monday, clearing the way for him to stand trial there on money laundering charges.

The former strongman, who had been held in a federal prison just outside Miami, was placed on an overnight Air France flight to Paris, according to a Justice Department official who spoke anonymously because he was not authorized to comment on the case.

Noriega was ousted as Panama’s leader and put on trial following a 1989 U.S. military invasion ordered by President George H.W. Bush Sr. Noriega was brought to Miami and was convicted of drug racketeering and related charges in 1992.


Videos

from DiscloseTV Website

911 Nuclear Demolition

Dimitri Khalezov’s Nuclear Demolition Videos Being Scrubbed Off Web!

Part 1

Part 2

Part 3

Part 4

Part 5

Part 6

Part 7

Part 8

Part 9

Part 10

Part 11

Part 12

Part 13

Part 14

Part 15

Part 16

Part 17

Part 18

Part 19

Part 20

Part 21

Part 22

Part 23

Part 24

Part 25

Part 26

 

Additional Information

Could 2012 NLE Cyber Attack DRILL be the Next 911 False Flag, Will This Years Drill Go Live?

By:Daniel J Leach

Reblogged: http://theintelhub.com

NLE 2012: Will This Years Drill Go Live and Result in a False Flag Cyber Attack?

The Intel Hub
By Shepard Ambellas and Alex Thomas
April 4, 2012

The summer of 2012 is fast approaching. As it inches closer, we will start to see a major increase in US and foreign troop movements as well as military equipment movements throughout the CONUS (Continental United States).

While many of the upcoming sightings may well be normal operations as the military does like to do training in the summer, the fact is that parts of our own military, along with foreign and UN troops, are actively planning to take on the American people.

National Level Exercise drills have been in effect for years now and have been covered by many alternative news sources, including The Intel Hub through our yearly Operation Overwatch which we use to gain intel and tips from the public in order to relay them to our readers.

Over the years many people have worried about the numerous National Level Preparedness drills and, in most cases, for good reason.

In 2011, the NLE focused around an earthquake on the New Madrid Fault Zone and the year before resulted in 70 thousand people being evacuated from a Texas city after a fertilizer fire.

Interestingly enough, this years FEMA national preparedness drill is focusing on the threat of a major cyber attack on America’s infrastructure.

The last year has seen dozens of cyber attacks on government websites as well as government propagandists pushing the fear of a cyber attack on the populace. Now we have the Department of Homeland Security making cyber security the main component of their annual preparedness drill.

Although only a small amount of information has been released on NLE2012, we can see from FEMA’s own website what it primary consists of.

FEMA’s website released the following PDF;

National Level Exercise (NLE) 2012Continental

National Level Exercise (NLE) 2012 is part of a series of congressionally mandated preparedness exercises designed to educate and prepare participants for potential catastrophic events.

The NLE 2012 process will examine the nation’s ability to coordinate and implement prevention, preparedness, response and recovery plans and capabilities pertaining to a significant cyber event or a series of events.

NLE 2012 will examine national response plans and procedures, including the National Response Framework (NRF), NRF Cyber Incident Annex, Interim National Cyber Incident Response Plan (NCIRP) and the International Strategy for Cyberspace.

Unique to NLE 2012 will be an emphasis on the shared responsibility among all levels of government, the private sector and the international community to secure cyberspace and respond together to a significant cyber incident.

Obsidian Analysisthe company heading up NLE12 for the private sector, states on their website:

NLE 2012 will comprise four major exercises, including a capstone event. These exercises will share common scenario elements, planning efforts and governance structure.

Participation in each exercise will be determined respectively, but the NLE 2012 process includes the Executive Office of the President; federal, state, local, tribal and territorial department and agency officials and emergency operations elements, nongovernmental and private sector organizations and international partners. These four major exercises include:

Information Exchange: This discussion-based exercise is designed to evaluate the sharing of cyber related information among the intelligence community, law enforcement, federal, state, tribal and local governments, the private sector and international partners, as appropriate

Cyber Incident Management/Virtual Effects: This exercise will examine the coordination and communication processes between public and private stakeholders in response to a significant cyber incident. This will include examining challenges related to managing a cyber event with national security implications.

NLE Capstone/Cyber Physical Effects: This functional exercise will examine challenges related to managing a cyber event with physical consequences and national security implications. This will include addressing cyber and physical interdependencies and impacts while coordinating a Whole Community level cyber and physical response.

Continuity Exercise/Eagle Horizon: This operations-based exercise will evaluate the continuity capability of federal departments and agencies. A component will include a nationwide exercise examining communications capability of the homeland security enterprise under conditions in which critical systems have been degraded or lost.

In addition to the major exercises, the NLE 2012 process will include senior level exercises, building-block events (i.e., seminars, tabletop exercises, and training) and routine exercise planning conferences.

As more information is released on these upcoming national preparedness drills, The Intel Hub will bring them to our readers attention.

Create a website or blog at WordPress.com

Up ↑