AFIO Disclaimer

AFIO DISCLAIMER:
The author of this blog is a member of the Association of Former Intelligence Officers and as such the views and opinions expressed here are those of the author and do not represent the views and opinions of the Association of Former Intelligence Officers, its staff or Directors.
Learn more about the Association including membership requirements at www.afio.com.

A WARNING: Those site visitors of Aboriginal and Torres Straight Islander Culture should be aware that there are photographs and images of the deceased.

Sunday, 7 February 2016

Somerton Man: Code Page cracked open, Yes, it has been done and here's proof positive that the techniques used really do work..


Code Page Cracked Open, Techniques Proven Successful
Proof Positive..



This demonstration shows just how the details of the code can be recovered. To be more precise, it is another way that the code details can be recovered. The use of digital forensic methods has been dealt with earlier. 

Whilst finding the real code is very important and gives the case a whole new direction, the impact goes beyond that. It means that whoever worked on the code page, would have seen what was really there and it was literally covered up and then released for the public to see. It must throw doubt on the other aspects of the case including the suitcase, the story surrounding the man's arrival and the tickets. 

For some years now, working on the code page and other items has consumed a great deal of time. It hasn't been just a question of taking lots of photographs, much more a question of learning and researching widely into the topic of code writing techniques and especially concealment methods. I figured that if I knew how they hid codes in days gone by then I would have a reasonable chance of finding them.So amongst the things I have studied are things like advanced image editing techniques, clandestine communication methods, espionage in WW2 and the Cold War, SOE methods and techniques and of course forensic examination of documents which includes photographs. Last but not least, I also made an extensive study of micro writing.

After many hours reading and searching the web on this wide range of topics associated with 'tradecraft', the work that I was doing finally started to come together and, whilst the project still has much work to be done, I have been able to demonstrate the use of a particular concealment technique known as INK H as developed by the British Intelligence services, (SOE) in WW2. 

At the risk of boring the many who have read this here before, the process was devastatingly simple, write normal sized letters in ink, add micro code in pencil in some or all of those letters, add another layer of ink to all of the letters to properly conceal the micro code and that's stage 1. The reason a second layer of ink is added is because if you did not do that and a sharp eyed enemy used oblique lighting on the page containing your letters/code, then they would pick up the tell tale glint from the pencil marks. The ink prevents that. The final step in this clandestine method of communication was to immerse the page containing the letters and code into a strong bleach solution. This had the effect of removing the ink but leaving the tiny pencilled code visible. You will see all this in the images that follow.

Step 1. Code inked over, this is a photograph of 
the original







Step 2. Immersed in bleach for about 15 seconds, code beginning to show.




Step 3. 1 minute immersion


You can see how the ink is breaking away and dissolving leaving the pencilled code coming into view.












Step 4. 3 minutes immersed, code is now clearly visible


Step 5. Using the photographic image above, the code is again inked over, the nib on this pen is around .7 mm in width. Having made an extensive study of the page for some time now, I think that the actual markings on the photograph were done with a brush, a very skilled job.:


Step 6. The image is of the revealed code after it had been inked over in the picture below. You can see the ruled edge showing sub 1 mm for most of the coded letters/numbers. It is this picture, the photo of the photo, that we will use to develop the code and make it visible again.



Step 7. Image from step 6 is immersed in bleach, the image shows the effects of 2 minutes after immersion.

Step 8. The image is developed and the code once again becomes visible. Please bear in mind that, even though the code page was written many years ago, the tools and techniques used by Police and Intelligence services were extremely good. Glass plate photographs were capable of producing extraordinarily fine details and the use of various chemicals, including Iodine vapour,  would reveal every single fibre in a document and if it had been modified in any way.


This image is a little hazy, with more time I would have improved on the quality but I think you can get the picture. What this post has done today is to clearly demonstrate that using a digital image of another image you are indeed able to recover concealed code. That is exactly what I have been able to do with the code page as well as the torn piece and Verse 70 from Jestyn's book inscription to Alf Boxall.

I would like to acknowledge the impetus for writing this post received from JP who commented in a very constructive manner, earlier today. 

In closing, anyone can do this even with just basic knowledge.

If you have any queries on this process, please message me via the comments link. I will not publish your name without your permission.

Some questions for other bloggers in this space, I was wondering when you will start to at least look at the implications of the results of this work? Are you unable to see how the whole case changes? Will our audiences be treated to yet more re-runs of the suitcase contents and imaginings about the body? 

For the audience reading this post, why don't you tell the other bloggers to wake up! What they have is a real live espionage story on their plate and they don't know what to do with it, further, they'll keep on not knowing what to do with it until their blogs step off the edge of the cliff again.

As for this blog, I will keep posting as and when I am able to recover more of the micro code and intersperse those posts with some fascinating and little known case studies that I have managed to find related to tradecraft and espionage.




Tuesday, 2 February 2016

SOMERTON MAN: The Code Cracked Open, The Crossed Lines, Even the most sceptical can now see the code



The Code Page: Cracked Open

Three different exposures of the same area from the Code page, the right hand end of the crossed lines just above the letter Q.

The process is now very straightforward thanks to the recent upgrade to the free photo editing tool, Paint.net.

Step 1. is to open a copy of the code page and select and save the crossed lines from the page.

Step 2 using the colour replacement tool choose first the shade of     colour you want to replace and then lighter shade of that same         colour. Use the tool to work over the selected area.

Step 3 print out your processed image as above using a high quality or 'Best' print setting.

Step 4. Using a strong back light, I used a 10 Watt LED inverted, and then took pics using the macro lens setting on my Olympus Digital camera.

Step 5. I replaced the LED back light with a 13 Watt CFL, UV light placed behind the photo on plain copy paper and took more pics using the macro lens setting on my camera.

THE COVER UP

What does this mean? Well for one it means that the Police or whoever took the original images of the code page must have seen what we see here, strings of numbers with letters interspersed.

Next, whoever wrote this code knew of the existence of Ink H, the British Intelligence developed technique of concealed/clandestine communication. This was taught to SOE operatives and also to Australian Intelligence agents.

NOTE: Every 'letter' and crossed line on the code page is formed in this same way. In fact some of the letters are not fully formed which means the letters showing on the code page are not the real ones. More work to do as yet but it is very revealing.

This same technique was definitely used in Jestyn's Poem to Alf Boxall, Verse 70 of the ROK. as well as in the torn piece from the book. More images will follow in the next week or so.

In answer to the question was this a part of an elaborate cover up has to be Yes.

What does this mean as far as Professor Abbott and Adelaide University is concerned? I think to be kind all I will say is that they must have overlooked it despite many prompts from myself and maybe even others.

I really do hope that more will take this work on, in reality there is much more work to do on the code page, verse 70 and the torn piece, what's been done hjere is to show what was concealed, there is a significant task in finding out what these letters and numbers actually mean.









Thursday, 28 January 2016

Somerton Man: New Close up images, UV light reveals far more information...


UV Light on Code Page Letters Reveal More 

Letters and Numbers



Some brand new images using a better UV light source, more below:


The image above shows some interesting background/faded letters and numbers. Note that inside the lower part of the letter G there appears to be a slightly curved word, hard to make out.


Within the shape of the R and G you can see small letters and numbers, the top of the G is reasonably clear.

Even the 'crossed' lines conatin micro numbers. There is more work to do on the latest batch but I hope you can make out the letters and numbers even though they are a little shaded. The letter 'I' at the bottom of the image above has some good examples as does the the stroke through the 'Q'.

It is only a question of time before we get every letter and it's contents improved and more visible.

An interesting development with the 'crossed out' second line, it looks as though it may not have been crossed out but placed there earlier and then written over. More to do and will post on that next.