Sunday 28 June 2020

BOOM! Part 2. A CLOSE UP



VIDR 3 or NIDR 3?

Worth posting this additional image of part of the crossed lines, it's a little clearer but still not 100%.

What do the letters stand for? VIDRO is a Greek Name but we don't have an O to show. NIDRO is another Greek name but again no O in sight.

If there was an E on the end NIDR we would have part of the name of a Jewish payer, Kol Nidre. It is traditionally sung at the beginning of the service for Yom Kippur, the day of atonement. But, no  E in sight either.

As per the previous post, the V1 part could have been a V1 flying bomb, it turned up in Adelaide as previously shown, in 1947 having arrived in 1946.  But what about the other letters? DR possibly meant Defence Research but in those days it was WRE as in Weapons Research Establishment. For now, at least, the letters as they stand are another mystery. As we unravel more of the concealed code, we stand a chance of getting it cracked. In that regard, a couple of blogs have expressed an interest.

One thing that is once again proven, the tiny letters and numbers are there as we have always said, they do exist despite the bleatings and wailings from one source in particular :)

An interesting aside, a lady, Anna Reisch, actually flew  V1 during testing, engineers were apparently unable to fix an issue so up she went. She identified the problem after 4 days testing and as awarded the Iron Cross, First Class for her efforts.
Share:

Thursday 25 June 2020

BOOM! MASSIVE BREAKTHROUGH REVEALS HIDDEN CODES IN GREAT DETAIL..



NEW METHOD FINALLY REVEALS CONCEALED CODES


 MARALINGA

A dramatic image? Yes. Maybe a little theatrical? Yes.

Why?

For some years on this blog and elsewhere a massive amount of work has been done working on numerous ways to 'lift' the code page images so that they were more easily read. Many different techniques have been used including bleaching, Infrared, UV light, and all with varying degrees of success but never quite enough to produce a clear, uncluttered image of the code page and its concealed writings.

It was always known that it was there and the whole thrust of this blog from the beginning in 2013, has been that the Somerton Man case is an Espionage case with the direct involvement of Intelligence agencies. When you read this post and view the image below, you'll understand why the header image was chosen. 




It's a massive breakthrough in recovery techniques and represents a totally new approach to the task of revealing concealed writing from photographs of documents.




Finally, I have managed to arrive at the right liquid solution and you can see the first results in the image of part of the crossed lines above. It is of the lower right segment of the two crossed lines on the code page. The letters VIDR or is that V 1 DR, the German rockets known to be stored at Salisbury North of Adelaide, are clearly seen and you can make out other letters and numbers, much better under magnification and I will be publishing more in the future. Here's a link to an article in the Advertiser, 20th March 1947, and here's the screengrab:





Incidentally, the upper crossed line was actually inverted, it was written from the opposite direction, i.e. the top of the page looking down the page, from the lower line. You can also see that the lead in highlighted in Yellow, has two lines of smaller letters and numbers.


Here's a short presentation of other examples using this technique:







For the record, this method effectively removes the upper layer of ink that was used to cover the letters and lines found on the code page. 80% plus of the concealed information will now be visible. 



Not only does this work on the code page, but it also works on the Boxall book, the torn piece, and the Hay Banknotes. It reinforces my belief that the Boxall book was a training manual that Alf used to train Jess and others.

It explains why any other examples have been very hard to find, the recovery method effectively means that the original source documents would necessarily be destroyed. Thankfully, this method is based on high-quality photographs, we can reproduce the original images on demand.

BACKGROUND

Over the past few years I have been reading extensively on accounts of field agents, and the tools and techniques they used, specifically the use of clandestine communications.

It was somewhat amusing to read the comment of a person on another site questioning the efforts made here as in how come it takes such a lot effort to reveal the concealed microcodes, they certainly wouldn't have had all the relatively hi-tech equipment that have been used here. If only they knew! In the background that's exactly what I have been working on, what methods were used? And you see the result above. What's very different is that we can do it with high-quality photographs and the original document is not required. There's more work to be done but it just became a lot easier, Lengthy strings of code will be revealed including, what could be, names. I have been in touch with other sites suitably qualified to get to work on the codes.


Does this replace infrared and UV lighting techniques? No, I am sure there will be cases where the other tried and proven methods will produce better results but in this instance, we have a real solution.


The last post included. in reasonable detail, the use of macro lens photography to obtain results. They were an improvement on previous efforts and certainly show the presence of micro writing. This is a much-improved method with far better results when applied to the Somerton Man code and related documents.

Share:

Lapstone Part 1. The Conference: Full HEMBLYS-SCALES MI5 Report, Major Implications For Somerton Man Case (DOWNLOADS)

FIRST PUBLISHED 2nd FEBRUARY 2020

R.V. HEMBLYS-SCALES WAS RUNNING THE LAPSTONE CONFERENCE SURVEILLANCE OPERATION AT THE TIME OF THE SOMERTON MAN'S DEMISE.

LAPSTONE CONFERENCE 

Nov/Dec 1948



Over the years, much has been said/alluded to regarding the Lapstone Conference, it took place in the 1st week of December 1948 and conference attendees included a Russian delegation.

The Russian contingent, according to records, included 14 members including a Mr. Sherbakov and a Miss Bogotyreva. Whilst these names definitely showed up on the inbound Qantas passenger lists, they did not leave Australia, somehow they stayed behind.  No records show their names in Australia after that date. The good news may be that, having read through the Scales MI5 report attached, there were photographs taken of the arrival and records were to be kept by CIS.

A Venona link

The file contains very interesting information on the case of the missing defence files, followers may recall that it was these files whose existence was discovered by the Americans in a Venona cable intercept. This, in turn, leads to a dramatic cooling of relations between the US, UK and Australia. The story unfolds within the first part of the pdf download shown later in this post.


Hemblys-Scales Authority



Major points of interest


R.V HEMBLYS-SCALES was the MI5 operative charged with running the Lapstone Surveillance Operation. A massive task with huge obstacles placed in the way by Dr.Burton, Hembly-Scales found it hard to conceal his frustrations with him.


Amongst the many ither points of interest in the file, there are some standouts:

1. Delegates were accommodated at 2 locations in the Blue Mountains, The Lapstone Hotel and the Hydro Majestic. Two Russians stayed in Sydney on the 4th and 5th December. (Another hotel was used by the delegation at the end of the conference, The Mayfair, Sydney. No trace of the hotel currently) The date coinciding with the discovery of the body of the anti-communist Michael Goreloff, view post here..

2. Those delegates staying at the Hydro Majestic, were there at the same time as Stan Moran and other members of the Eureka Youth League (Young Communists)

3. Two other names of members of the Russian delegation were, Chiliakin (Singapore?) an interpreter and Erzin, 1st Secretary of the Russian Embassy in New Delhi. Both these men were known to intelligence services and it was feared that they may take part in activities other than the conference.

4. There was a state of conflict between CIS and other agencies in Australia which hindered the surveillance task.

5. The cooperation from External affairs was very limited overtly so, read the letter from Burton.

6. Thanks to Mr. Burton, much of the surveillance in the Blue Mountains was carried out by Diplomatic cadets. Apparently, no experienced resources were available.

7. At the time, there was, apparently, a total absence of controlled agents within the CPA.

8. Tapped calls were made to 3 numbers in Sydney:
  • B6951 Australian Pty Ltd 247 George Street, Sydney
  • B3241, L.G. Ratcliffe, 2 Albert Street, Sydney
  • FA 2141, Isaac Kalm, an Alien in Sydney
9. The name Magnussen turns up in the document, he was a CIS man.

Implications for the SM case

In 'Assassination' posts made earlier, we discussed how the Somerton Man case bore all the hallmarks or MO of a typical Russian assassination. We spoke of the use of meticulous planning alongside the use of specially developed poisons to carry out their task. Poisons that were extremely difficult if not impossible to trace. These people deliberately set out to muddy the waters, to make it impossible to reach a conclusion on the cause of death and, in this case, the identity of the man was obscured.

All planned right down to the 'litter' filled suitcase, the various tickets and contents of his pockets but absolutely nothing that could possibly identify him. The plan worked and this blog was the first to uncover it not just as a theory but we have substantiated it with evidence of the MO and results of the Autopsy matching it almost exactly. We don't know the man's name and we don't know exactly who killed him although, now, we have some new possibles.

The names of suspects now include Sherbakov and Erzin ( could be Zinin), both men who apparently arrived in Australia just ahead of SMs death. The question is, were they the team? 

Our focus now is to search for the photographs that were apparently taken of the delegates on their arrival in Australia.

DOWNLOADS:

Download the HEMBLYS-SCALES Report here
See full MI5 report here...

This post was made possible by the great work done by PeteDavo and the ongoing valuable input from Clive Turner. Many thanks Pete and Clive!
More to follow...
Share:

Tuesday 23 June 2020

SOMERTON MAN CODE PAGE: MICROWRITING FROM NICK PELLING NEW SCAN..


PELLING NEW SCAN SHOWS
MICRO WRITING

This post completely debunks the erroneous claims made by Nick Pelling. Nick put forward a 'New Scan' from Marcel Varallo which was claimed to be of higher resolution and better quality with the strong inference that there would be no micro writing to be found.

As you will see in the presentation below, the Nick Pelling 'New Scan' contains micro writing:


In recent years, the availability of better cameras and lighting have made the process of revealing concealed writing far easier. In Nick's defence, these things were not so readily available even in 2017.

I invite all interested to test the process and will happily post a description of the method which really couldn't be easier.
Share:

Sunday 21 June 2020

THE VERSE 70, IT WAS TAMPERED WITH. NEW IMAGES AND VIDEO & SLIDE PRESENTATION


WHY WAS VERSE 70 TAMPERED WITH?





Click on the forward arrow above to view slides...

Why would anyone tamper with the image file? Who stands to gain from doing this? Every Letter on the page and the join between the two pages contains concealed micro writing/code.

Below you can see two images from the original Stuart Littlemore/Alf Boxall interview video:


You can clearly see that the name JESTYN has been covered over with tape, the version we now use had the tape removed.

In this next image you will see that the left page, opened to verse 70 of the book, has no marking at the top:


And yet in the Abbott copy there is a clear cross-like mark visible:



You can view the video here:



The evidence is here, deliberate tampering to hide the presence of micro writing which has now been proven, again and again, confirmation from Detective Brown's words, 'The telephone numbers were in really tiny lettering' and from Paul Lawson's interview with Clive, 'It was Loveday that found the tiny writing, not CIB'. It has been demonstrated on this blog and in the next post, I will show it's presence again in a most unexpected place.

Sadly for the amateur sleuths and trolls, they have been unable to disprove what has been proved on this blog.

Share:

Saturday 20 June 2020

PAUL LAWSON REVEALS ALF BOXALL & JESTYN WERE RECORDING SHIP MOVEMENTS. NEW VIDEO



FIRST PUBLISHED 7th JULY 2017 AS:
JESTYN & SHIPS IN THE NIGHT. 


SYDNEY HARBOUR SHIP MOVEMENTS

"Mr. Lawson's statement was that he was made aware that Jestyn had been collecting information on Allied ship movements through Sydney Harbour and that he believed that the information on these movements was passed to Jestyn by Alf Boxall."

ROYAL NAVY WARSHIPS SYDNEY HARBOUR 1945

Clive's ongoing discussions with Paul Lawson have yielded some surprising results and the input of both these men is gratefully acknowledged.

It is generally known that Jestyn was a member of the communist party of Australia and attended numerous meetings. But to what extent was she involved with the organisation and what tasks may she have undertaken on their behalf?

During this weeks discussion, Mr. Lawson made an astonishing statement and one that leads to apparently only one conclusion.

Espionage

Mr. Lawson's statement was that he was made aware that Jestyn had been collecting information on Allied ship movements through Sydney Harbour and that he believed that the information on these movements was passed to Jestyn by Alf Boxall.





 Mr. Lawson went on to say that his thoughts were that Jestyn was 'stringing' Alf along and did not offer any further information at this stage.

Let me make it clear, in Clive's view and I have absolute faith in that, Paul Lawson though of advanced age has a clear, sharp and active mind. He has not been given to making careless nor ill thought out statements or answers.

The whole Somerton Man case is and always has been an espionage case, this latest and unprompted statement by Mr. Lawson underlines that fact.

A good question to ask would be what part did the Rubaiyat's, yes, both of them, have to play in this apparent espionage activity? Jestyn's verse 70 should now be viewed in quite a different light by those that have had doubts about the presence of micro writing. The same can also be said about the code page and its micro written code.


I wonder whether this is why the code page was handed to Naval Intelligence for examination?

Whilst we can date the occurrence of the two ships leaving Sydney Harbour, when was the information delivered? Its real value would have depended on the 'freshness' of that information. Delivered on time the information could have led to a torpedo attack, delivered late it might have been of interest but of little tactical value.

The Implications

Extending on this revelation, there are implications regarding the likely existence at that time of a network of agents all feeding back to the one source being Jestyn. It would not be beyond the realms of possibilities that each capital city as in Brisbane, Sydney, Melbourne, Adelaide, Perth, Darwin and Hobart, would have had someone collecting information on ship movements through their harbours. The question would be, how would that information be communicated? Too sensitive to be sent by post, too lengthy to be sent by Morse code it would seem that a humble book would be an ideal method even though it would require a courier to transport it. Someone who did or would travel extensively and someone who would simply blend into the background, possibly someone like Tibor Kaldor for example?

The strange 'one way' ads in the Adelaide papers begin to make more sense now, one wonders whether similar ads are to be found in other States media. Lost and Found ads could be a rich source of information.

Given the events of December 1st in Adelaide, what other events took place in other States over say, a 6 month period commencing in November 1948 through until May 1949? We know we have Tibor Kaldor's demise, but could there have been others?


Yet again we have found another way forward, from micro code, verse 70, the code page, Pavel Fedosimov, Tibor Kaldor and now this major breakthrough, we have information that shows Jestyn and Alf Boxall were involved in the transmission of valuable military information. To be continued.



Share:

PAUL LAWSON: "IT WAS LOVEDAY THAT FOUND THE MICRO WRITING, NOT THE CIB"


 THIS POST WAS FIRST PUBLISHED ON 

23RD OCTOBER 2017  

AS: PAUL LAWSON, MINIATURE WRITING 

AND LOVEDAY...

 'Now I have a question for you, About the micro-writing, I want this put right, it was Loveday and not the CIB who found/did it (the miniature writing.)'

This really was and still is a bombshell, you will read how Paul Lawson, without prompting, confirmed the presence of micro writing and which agency was responsible for finding it.

LOVEDAY INTERNMENT & POW CAMP



Situated in the Riverland of South Australia, Loveday Camp was home to internees and POWs. during and after WW2.

Civilians of Japanese, German and Italian origin and who lived in Australia were held there as well as German Civilians who were arrested in Iran and others who were transferred from Tatura, more detail on that in earlier posts on Internment camps and their association with the Somerton Man case.

In what can only be described as a stunning piece of information, when Clive last visited Mr. Paul Lawson just over a week ago and after he had asked him a series of questions, Paul said:

 'Now I have a question for you, About the micro-writing, I want this put right, it was Loveday and not the CIB who found/did it (the miniature writing.)'


Clive stresses that Paul's statement was entirely spontaneous and he was not asked or prompted in any way.
Major Woolrych of SOE, an example of an agents
micro written flimsy.

In that one sentence, the last remaining man who was deeply involved in the case has confirmed that micro writing was found. Given its significance, Clive and I discussed the matter at length and Clive even contacted Paul again and had his statement re-affirmed and also confirmed that it was Loveday camp and not a person of that name.(For the record, there was a well known British intelligence operative in Singapore and Malaysia during WW2 by the name of John Loveday)

We have consistently shown on this blog that the use of microcode hidden in normal writing was described in an SOE manual dated 1943, that there are examples of micro-writing in the British Military Intelligence Museum, we have shown it in the Hay Banknotes, we have shown it in the code page and in Jestyn's verse 70, it has been shown to be present in the letter Q and the letter T and others of the code page as well as in the so-called 'crossed lines' and 'crossed out' line, we have even replicated the exact way in which it was done.

We now have three people directly associated with the case that have confirmed the presence of micro-writing, those who follow this blog will recall that Detective Brown in an interview with Professor Abbott stated that Jestyn's phone number was found on the back of the book and it had been written in 'tiny handwriting', Gerry Feltus saying 'I see what you see but I have no explanation for thee..' and now Paul Lawson's statement.





The presence of microcode has been well and truly proven. It is an established fact.


Where to from here? The investigations by this blog and by others can now focus clearly on Loveday camp and the internees who were held there. My instincts tell me that there are two good places to start, the Red Book of internee interrogations of those German civilians captured in Iran and those Internees who were transferred from Tatura to Loveday.

This is a real, evidence-based challenge for you my friend. Are you up to it?



Share:

Friday 19 June 2020

THE LAPSTONE CONFERENCE REVISITED. PAVLOV, A MAN OF INTEREST?

VITALY PAVLOV

Vitaly Pavlov

Amongst the list of delegates at the Lapstone conference  in 1948, was the name 'Pavlov'. We only have that name courtesy of a handwritten list found in MI5 files. and just a surname at that. 

Mr. Pavlov arrived at Lapstone on the 30th November and departed on the 1st December 1948 just one day into the conference.

The man in the photograph to the left is one Vitaly Grigorievich Pavlov. The critical question is, could this be the same Pavlov who attended at Lapstone because if it was, then we would have placed a serious Soviet intelligence asset in Australia in the same time frame as the death of the Somerton Man.





The Vitaly Pavlov on this photograph had quite a track record as a Soviet spy. From being found hidden in a cupboard in 1945 at the Ottawa, Canada home of the Soviet cipher clerk and defector Igor Gouzenko, to a rapid rise through the ranks of the Soviet Intelligence services, Vitaly is not a man to be taken lightly. He was an operative, a 'legal' resident in Canada to use the correct term. A member of the NKGB, he acted under the cover of being a Soviet Consular official. Interestingly, that was much like our friend Pavel Fedosimov. In fact if my memory serves me correctly, Pavel and Vitaly may have both been in Ottawa at around the same time in 1946, note for file, must remember to check that out. It was in 1946 that Viraly was declared 'persona non grata' by Canada and was soon on his way back to the mother country.

On 1947, Vitaly transferred to the then newly organised directorate of illegal operations. It was in that role that he was instrumental in setting up the illegal operations for a number of Soviet spies including William Fischer who became 'Rudolph Abel', a renowned Soviet Spy. The Fischer operation kicked off with his successful insertion into Canada in October 1948. Why is this relevant? Because it shows the Russian technique of creating false identities and setting up spy networks and infrastructures to support them and of course the direct involvement of our man Vitaly Pavlov.

Let's be certain on this, we do not know whether the Pavlov at Lapstone was Vitaly Pavlov, but as a matter of interest, he arrived in Lapstone on 30th November and departed on 1st December which overlapped with the arrival of one Feodor Nosov, the head of the Sydney Office of the KGB at that time. Perhaps there was time for a quick operational review? I wouldn't have thought it was the done thing to have two high-end assets together in the same location for more than just a brief encounter, it might attract too much interest.

Where does the attendee Pavlov fit into the scheme of things? Really not sure at the moment, early days. And of course, we must first clarify whether this is Vitaly. Time to dig deeper into the ASIO and MI5 files to see just what we can find. Will update this down the track as we bring a few more loose ends together.






Share:

Sunday 14 June 2020

THE TORN PIECE: HIGH RESOLUTION IMAGES


THE TAMAM SHUD PIECE

YOU WILL NEED TO LET YOUR EYES FOCUS CAREFULLY ON THE
TWO IMAGES. THE EXAMPLES OF MICROCODE ARE VERY SMALL


 THE CHANGE IN BACKGROUND COLOUR RELATES TO THE USE OF INFRARED LIGHTING

The torn piece has long been overlooked as a potential source of additional information. After all, what could you possibly expect to find apart from the letters that form the two words?

What you can just about see are, once again strings of letters and against a none to clear background. They appear to be done using a sharp pencil but I wouldn't rule out special inks and perhaps a pin, the characters are around .3mm in height in places. Very doable but unexpected.

Another interesting aspect is the 'halo' effect around the two letters T and A, in fact, that extends to the rest of the letters in TAMAM SHUD.

I have started to look at another example of the book and the same words, at present they don't look anything like the content of these two but I need to spend more time to confirm that. There is no apparent 'halo' effect on the other example that I have found to date.

(Followers may recall that the Pavel Fedosimov photograph had a similar halo effect that, in his case, related to the possible markings left by an oxygen mask. Pavel was supposedly photographed at La Guardia airfield in 1947, in those days, passengers on national flights were issued with oxygen masks in the event of encountering the need to fly above the normal ceiling heights. Pressurised cabins in aircraft were uncommon at that time but quickly became popular in the later 40s period and that may be the cause of shadowing on the image. It's is also correct to say that lighting and camera angles regularly cause facial changes in photographs, particularly including the shape of a person's nose. That same halo impression/shadowing either left by the mask or camera and lighting angles on Pavel, led one enthusiastic commenter to proclaim that Pavel must have had a 'saddle' nose. Not so. Here's a link to the page that discusses the issue...)

Why is it that no one has ever taken this close a look at the torn piece? Adelaide University boasts significant resources that could have uncovered this many years ago, but, seemingly, they were unaware of the contents of the piece. Realistically, that was the same attitude they had to the Boxall book and the code page itself. Personally, and as I have expressed before, I am astonished that they have investigated these items. Or have they?
Share:

Friday 12 June 2020

VERSE 70 and THE CODE PAGE:CLOSE UP IMAGES AND INFORMATION


There seems to be some confusion amongst some commenters regarding the nature of the new Hi-Resolution images of the Code page and Verse 70. This post is intended to provide those who need it some simple guidance as the view the images.

First off the rank is Verse 70.

VERSE 70
Infrared and Flash image



ROTATE 90 DEGREES ANIT CLOCK WISE:



PAGES JOIN AT THE CENTRE

MICRO WRITING VISIBLE IN THE JOIN


No need for anything more than strong light, oblique angle camera, and lighting. Not at all hard to view with some very basic techniques.

FROM THE VERSE:

                                                           OFT BEFORE, TOP LINE



ROTATED ANTI - CLOCKWISE VIEW:





BOTTOM LEFT CORNER OF BOOK



TOP MIDSECTION ABOVE PAGE JOIN


In the image above you can see where some of the micro writing has been 'greyed' over. However, you can see the fine, faint pencil markings beneath the grey when you use strong light and infrared.


Verse 70 Summary

In summary, pages of the book containing the handwritten Verse 70 and its concealed code would have been very easy to view even in those days with some basic and readily available equipment. There are many more instances of concealment within this particular book.

THE CODE PAGE


This is the Hi-Resolution version of the Code page as per the last post. The question was put by a commenter elsewhere regarding how people in the 1940s could have viewed the code page micro writing if it has taken such a great deal of effort with modern tools to get to where we are now? 

In this person's defence, they don't have the background or skill and hadn't run any of the tests that have been made available on this blog so they couldn't be expected to understand why this should be. In the end, after some years of trial and error, the answer really is quite simple.

In contrast to the Boxall, Verse 70, book and it's micro writing, the code page that we have, had been written over, more precisely, the individual letters and other markings had been painted over with a fine brush and with quite some skill. Personally, I think that they used a particular kind of ink as used by the censors in those days. What it means is that prior to the application of the censor's brush, the original glass plate photograph taken under special lighting revealed the 'faint pencil' marks and tiny lettering referred to by Detective Brown.

The task was to somehow find a way to remove that layer of censor's ink so that everyone could see the original markings. That has now been found and the results are there for all to view.

Below is a close-up view of the crossed lines in the centre of the Hi-Resolution code page. It is one of many images that have been taken.

CROSSED LINES CLOSE-UP


This image has been inverted, the view is from the top of the code page looking at an angle down the page. Whilst they are not sparklingly clear, you can clearly see the presence of micro letters and numbers within the lines. So, it is definitely not pareidolia,  definitely not jpeg artefacts, but it is micro writing. It is to be found in every marked up letter and 'painted' area on the code page. Some of it is extraordinarily small being around .25 mm in height and that is very achievable with just a fine sharpened pencil.
There are numerous examples of the use of micro writing including such writing within cursive lettering.

I hope this post has clarified the situation for all concerned.

There are more images to be posted which will happen over the next week or so. 

On a related but somewhat of an aside subject, the use of concealment methods and clandestine communications goes back hundreds if not thousands of years. In WW1, there were major advances in the subject area some of which could still be in use today.

Use was made of everyday items in the task so as not to arouse undue attention or suspicions. For example, tubes of toothpaste and 'ordinary' soap had in fact, concealed chemicals which were used in the secret ink/writing process. I will put a post together on the subject shortly.




Share:

Tuesday 9 June 2020

HIGH RESOLUTION IMAGES: VERSE 70 PLUS THE CODE PAGE, UPDATED



VERSE 70 HIGH RESOLUTION



1. The above is a high-resolution image, you can view this on-screen and magnify it but be careful not to go out of focus. You should see the micro-writing within the words of Verse 70. You will also be able to take a closer look at the TItle page and the individual printed letters, The letters T, I, R, M and H show up reasonably well.

2. You can certainly magnify the join line of two pages and see microcode written in. You may need to rotate the image for a clearer view.

3. The Grape bunch is also visible including writing, please rotate the image for the best viewing angle.

4. The book edge on the left of the page clearly shows a column of 3 and 4 digit numbers with writing visible across the top and bottom edges.

5. Right Click on the image to download

CODE PAGE HIGH RESOLUTION


There are examples of microcode visible in numerous locations on the code page.

1. You can magnify this Hi-Res image onscreen and immediately see microcode within the crossed lines in the centre, the flourish at the base of the page and the long tail stemming from the last letter on the page, the letter R.

2. Each letter on the page contains micro written letters and/or numbers

3.. The shaded areas at the top left, top right and above the 'D' at the upper edge contain microcode.

4. Right Click on the image to download

PRINTING AND PHOTOGRAPHY TECHNIQUES

Both of these images were taken using a flash and with Infrared lighting.

Here's a list of things you need to know:

You can take close up photographs of each example but please follow the instructions below:

1. Use a macro lens camera if possible
2. Use a Flash for the pic
3. Take numerous images from different angles and lighting angles
4. If you need to print the pics out, use bleed proof paper. You can get that from an art supply store, in Australia that would be Eckersley's.
5. Print the image out at high-quality setting.
6. Print size should be 23.5 cms X 18 cms in Landscape view.
7. Let the printed photo dry properly before removing it from the printer, I suggest 10 minutes would be ample.



Share:

Saturday 6 June 2020

IMAGE FORENSICS, A SAD TRUTH REVEALED: UPDATED 15th JUNE 2020




THE COMPARISON

TWO IMAGES, ONLY ONE IS CORRECT:

The image below is from the exact file as used for the example in Feltus's book The Unknown Man. Five areas have been highlighted wherein you will find micro written code within the cursive strokes.

CLICK ON THE IMAGE TO SEE A LARGER VERSIO



This image below is a close up from the image of verse 70 supplied by Professor Abbott, you'll see that it has been tampered with, the letters have been partially 'painted' over with the colour grey. and the edges of the letters have been darkened. Not what you would expect from 'faded' writing.

CLICK ON THE IMAGE TO SEE A LARGER VERSION


VERSE 70 ALF BOXALL BOOK
Per Gerry Feltus



Above is the original photograph as per e Gerry Feltus Book,e Unknown Man.

Below is an image that has been examined using a forensic analysis tool:


The highlighted areas in the image above have been marked to show where there is an immediately obvious presence of microcode. Apologies for the low quality of the mage to the left, I will improve that.

  1. The edge of the book to the left for example shows horizontally written strings of numbers in a column. 
  2. The marked edge at the left-hand base of the book again shows microcode but deliberately written at an angle. 
  3. The Fez on the illustration on the left page shows a series of letters and numbers whilst the grape bunch again shows numbers written in. 
  • All of these examples are not clearly visible with the naked eye, some show up well under strong lighting, and some, as per the left column the base and the fez, show up using the forensic examination tools.
That establishes the role of the book as being one that was used to train others in the various concealment techniques.

A SECOND IMAGE

Some years ago I was sent another image of the Verse 70 page, it was basically the same page but, as you will see in the images below, the microcode examples had been deliberately obscured and the illustration of the lady with the Fez had had its levels altered so as to appear totally black over the lady with the fez and her outlines. When I asked why the details were no longer visible, I was told that they must have faded.




The image below shows the wording has been 'painted' over to deliberately obscure the presence of micro writing, not only that but the writing had also been 'darkened' at the edges in an effort to hide any remaining detail.




For comparison, below is an image taken from an untouched though highlighted excerpt from the authentic copy of verse the 70 inscription, the word 'Spring':


I was honestly disappointed to see the results of this effort to hide the presence of code in this way. The person concerned had access to the very best of equipment that would have readily revealed the micro writing. In my view, that person deliberately decided against it and chose instead to deceive others.

The 'darkening' technique was also used on the Fez in the altered version of the inscription.

I then put this altered version through the forensic analysis process, and here is the result:



There's more work to do but in the image above, you can see the outlines of microcode in the areas highlighted and it is recoverable.

SUPPORTING EVIDENCE

Here's an image put forward by Nick Pelling of the Cipher Mysteries blog, dated 2013, of the same Verse 70 photograph supplied by Professor Abbott. You will see that this image also shows the grey markings. I repeat, the verse 70 image was tampered with in an effort to conceal the microcodes:



Whilst most of the microcode has been obliterated, there are still examples left even in this image. Importantly, with the right equipment, we may be able to recover the 'obliterated' details, that's next on the list.

There are two kinds of Infrared that can be used, one is reflected and the other is luminescence. Here's an example of what infrared luminescence can do:




And here is the link to the Pelling example: 


EXIF FILE

Here's the EXIF file information for the tampered version of Verse 70. (An EXIF file accompanies most digital images unless the facility is removed by the author. In this case, the person who took the photograph neglected to remove it, and thus the evidence is available to us:

Facts:
  • From this file we can see that the camera used was from an iPhone 4S, the iPhone 4 was released in 2010.
  • The original photograph was taken at 8.52 pm on Wednesday 31st October 2012
  • This original photograph was then modified on Thursday, November 1st, 2012 at 7.15 pm.
  • The photograph was then stored on a Macintosh PC with an OS version of 10.7.4
  • A Flash was not activated
I used the most recent version of Paint.net, version 4.2.12, this software was released within the last 7 days, to prepare the image for loading to this blog page.


SUMMARY

From these images, it's been demonstrated that there was a concerted effort by a prominent person in the Somerton Man case research to deliberately stall the work and mislead genuine researchers. This same person worked in conjunction with others on this task. It's time to come clean.

In the next post, there will be an image that strongly links this Alf Boxall version of the Rubaiyat to the Somerton Man Code Page.

BEWARE OF INSECURE SITES


You should note that numerous blogs are marked as "Not secure', this is problematical especially considering the Troll traffic that currently uses that blog.

Here's an explanation of the risks you run when visiting an insecure websites:


For Visitors Information

The reason you are seeing the “Not Secure” warning is because the web page or website you are visiting  is not providing a secure connection. When your Chrome browser connects to a website it can either use the HTTP (insecure) or HTTPS (secure).

Any page providing an HTTP connection will cause the “Not Secure” warning. You should avoid conducting any sensitive transactions on these pages—such as logging in, providing personal information, or payment information—browsing insecure sites could put you at risk if you are viewing information that is dangerous or not condoned in your country.

As a visitor, you cannot fix the cause of this warning. The only way to solve the issue is for the website operator to obtain an SSL certificate and enable HTTPS on their site. This will allow your browser to connect securely with the HTTPS protocol, which it will do automatically once the website is properly configured.

If a site you frequently use is displaying the “Not Secure” warning, you should contact them and ask them to start supporting HTTPS. You can also try manually replacing HTTP with HTTPS in the URL, as some sites may have partial support for HTTPS but don’t offer it by default.

Note that even with basic browsing over HTTP—such as looking at recipes or reading news—what you are looking at can be monitored, modified, and recorded by entities, such as your ISP or government. This effectively means you do not have any privacy when browsing such pages. On public Wi-Fi networks, like at a coffee shop or airport, there is an additional risk from ‘local attackers’—other computers on that network—which are able to view and monitor the pages you are looking at, the information you are sending them, and what you are searching for.'

                                 ALWAYS LOOK FOR THE 'NOT SECURE' WARNING IN THE BROWSER BAR

Some sites are home to a few trolls, some using multiple names and identities, and that increases the risk that you run given its 'Not secure' status. Known trolls on that site use multiple IP addresses and identities. 

The multiple IP address issue, better known as 'Dynamic IP Address' or 'VPN', is very concerning because this facility is not mostly used by legitimate businesses and entities. It is however used regularly by hackers, spammers, trolls, those engaged in Phishing activities, and even by child traffickers and pedophiles. For example, a troll could embed themselves in a non-secure site and readily access your personal details as you log in, capture your personal information, and then either make use of it themselves or onsell/share it with others of unsavoury intent. THEY CAN DO THIS EVEN IF YOU JUST VISIT THE SITE.

The 'John Sanders' troll, for example, uses this Dynamic IP/VPN facility. In the 2019 year the 'John Sanders' troll had 17 different IP addresses at a minimum and used 4 or more different names/identities. This troll actually sells his services as a 'researcher'. He uses another blog to launch personal and defamatory attacks on those who displease him or perhaps those who he is paid to attack. His Internet Service Provider in Vietnam is FpT telecom, Ho Chi Min City. He is not the only troll in the Somerton Man space using that service. One agency I spoke with informed me that they had 2000 + records against the name John Sanders.

Here is a list of the IP Addresses used by the 'John Sanders' troll in 2019:

118.68.102.126
1.54.186.38
1.52.75.95
42.116.61.220
58.186.192.51
1.54.95.246
42.118.233.169
42.118.233.155
183.80.198.119
1.54.187.220
1.52.75.208
42.113.38.125
113.22.254.94
1.53.143.137
1.53.209.156
118.68.101.203
1.53.143.128

TAMAM SHUD BLOG IS A SECURE SITE

For visitors to this blog, you will see the lock sign in the browser bar, this means that the site is secured, it is actually a Google-owned service. Trolls of any kind are not allowed on this blog, they never have been nor will they ever be.

PLEASE BE CAREFUL.



Share:

ABOUT US and OUR RECORD

Learn more about, when the blog started our location plus a long list of 'finds' and new evidence discovered by this blog