...CONTINUING THE SEARCH FOR TRUTH...
We are the leading fact, evidence-based, and authoritative blog on the Somerton Man case.
The TAMAM SHUD case, all began with the discovery of the body of a man on Somerton Beach, South Australia on Dec. 1st 1948. He had been poisoned. No identification was found on the man or at the scene, and there were no signs of violence. The sand around the body was undisturbed.
The discovery of secret codes and a local telephone number add to this enduring mystery,
UNVEILING THE TRUTHS OF THE SOMERTON MAN CASE
Our blog's journey began in 2013, springing from my deep involvement with Professor Derek Abbot's Facebook page, 'The World Search For A Rare Copy of The Rubaiyat Of Omar Khayyam'. I joined this vibrant community in late 2009 and had the privilege to engage in enlightening discussions with leading researchers of the Somerton Man mystery. Notably, my exchanges with ex-Detective Sergeant Gerry Feltus, who once held the Somerton Man case file as a Cold Case, left a profound impression. Gerry's integrity and keen attention to detail stood out; a true embodiment of an 'Old School' copper deserving of utmost respect. I owe a great deal to Gerry and to the members of the Inner Sanctum Facebook group that spun off from the initial FB pages. We were also privileged to have numerous discussions with the late Paul Lawson, another good man of integrity. Paul shared some significant facts about his knowledge of the case and the making of the plaster bust. Those details have been shared with SAPOL.
I also hold in high regard the original investigators from 1948 and beyond. Facing challenges that we can scarcely imagine today, they undoubtedly gave their best, under difficult circumstances to unravel the mystery.
On January 21st, 2013, our blog took its first steps into the digital world. Over the years, we've been fortunate to welcome thousands of readers. By March 2024, we celebrated a significant milestone, surpassing 1 million page views and penning 899 insightful posts.
Our inaugural post delved into 'micro writing', a claim and accompanying evidence that has stood firm.
As we write this, we eagerly anticipate unveiling even more substantial evidence. Five years ago, we shared the initial decoded words from a previously hidden code. Since then, further discoveries have been revealed including the finding of a coded name DANETTA in TIBOR KALDOR's last letter and elsewhere.
Additionally, we identified three different encryption methods including the HILL CIPHER, MORBIT CIPHER, and recently the NIHILIST CIPHER, a tool once used by Soviet agents in WW2.
Amid the diverse theories surrounding the Somerton Man – from the 'rare' ear type, anodontia to the Love Child hypothesis and erroneous DNA connections – we remain committed to the pursuit of truth. Recently, the Carl 'Charles' Webb theory has emerged, and though it awaits concrete substantiation it is not something that this blog supports.
Many thanks to all who visit these pages, your support and encouragement means a great deal.
A collection of 14 WW2 digitized films that contain real-world examples and code-breaking tutorials...
There is a huge difference between the clandestine communications techniques used by agents in the field and the codes and ciphers used for diplomatic communications or front line military codes such as Enigma. To start with, the codes used by agents were generally concealed, they were hidden amongst and made use of everyday items. Simplicity was the key and it worked much as the Somerton Man microcode methods fooled everyone for 70 years.
Code Breaking Videos from WW2. Major Henry Burton of US Military Intelligence explains how the codes were found and cracked. There are some most interesting similarities between some of these codes and those found in the Somerton Man Mystery.
The videos on this page are from a series on WW2 codes and code-breaking. They actually form part of 14 episodes each of 3 minutes duration approximately.
You will see examples of true clandestine communications, codes that were created and used in the field by enemy agents.
1. A BASIC CODE BREAKING TECHNIQUE
The first video above shows a basic decoding technique.
2. HIDDEN IN A SEAM - CONCEALMENT
This next video shows an example that will ring bells if not because of the code type then most certainly for the way the code in this instance was concealed. It was hidden in the seam of a handkerchief. Followers will know that the torn piece containing the words TAMAM SHUD, was found rolled up very tightly and pushed down into a hard to find fob pocket. It would have felt just like a seam.
3. THE DICTIONARY CODE
The tutorial in this video starts at the 16 minute and 5 seconds mark. Major Burton describes how some everyday items can be used to transmit a secret code and you really wouldn't know. I won't spoil it for you but you could make a start with the items that the man had with him when found, 7 cigarettes, 2 combs, 1 packet of chewing gum....Over to you..
4. POSTCARD CODE
Coming up next, an early version of a 'Simple Letter Code' where a message is concealed within a handwritten note on a postcard. This example was actually taken from an enemy agent in WW2.
5. THE QWERTY CODE
Next, yet another very clever way to create and conceal a secret coded message, the code itself was found in the heel of a shoe written on a small piece of paper. The Intelligence team quickly latched on to what was being used and deciphered the secret message fairly quickly.
6. THE MATCHES CODE
In this case, an ordinary book of matches contained a concealed code that had been written on to the stalks of the matches. The decoding exercise was great to watch, yet again, simplicity was the key.
7. SECRET INKS
Mention spies and the subject of Secret or Invisible inks is often included in the same sentence. Messages using secret inks were and are quite commonplace but some of the fluids used may not be so well known. This video gives a good overview of the technique and one that can be easily tested.
8. DECK OF CARDS CODE
Another code and another everyday item used to create and conceal secret messages. The technique used to decode requires in this case a piece of equipment although in other circumstances it could be done manually.
9. THE CHESSBOARD CODE
What at first looks like a jumble of letters is quickly sorted into a deciphered secret message using a simple technique. The letters are laid out in a chessboard style but in such a way that you would never guess what the hidden words were, until...
10. A LUNCH BOX CODE...
A hidden slip of paper found in a secret compartment in an everyday item, a lunchbox. The code at first looked challenging but as usual, a simple method is found and the code was cracked.
11. POCKET ITEMS CODE
Everyday contents of a man's pocket combine to create a secret message which nearly was nearly overlooked except by the sharp-eyed code breakers from US Military Intelligence.
12. A NUMBERS CODE
A different kind of code in this example, nothing but a set of numbers including fractions to work from. But in the end, the solution is simple. A fine example of Tradecraft.
13. THE CANDY CODE
A small box of chocolate candy was intercepted by the code breakers, on weighing the box it was found to be lighter than the contents label suggested. That led the team to think that the number of individual types of candy was probably some kind of code. They were right of course...
14. THE IN-BETWEEN CODE
You could also call it 'The Gap Code', because this code relied on what was missing and not what was there to deliver its secret message. Once the problem was understood, the solution was quick to follow.
Hi Welcome to the Tamam Shud Blog, widely regarded as the most trusted fact and evidence-based blog on the Somerton Man case. Visit our YouTube channel: https://www.youtube.com/channel/UCOamLze8PyNDafjjBGGngJQ
First Level of Code Page Cracked! For the enthusiast. If you look to the left of the first letter A in the AIAQC sequence above, ...
NOTICES
A WARNING: Those site visitors of Aboriginal and Torres Straight Islander Culture should be aware that there are photographs and images of the deceased.
AFIO DISCLAIMER: The author of this blog is a member of the Association of Former Intelligence Officers and as such the views and opinions expressed here are those of the author and do not represent the views and opinions of the Association of Former Intelligence Officers, its staff or Directors.
Learn more about the Association including membership requirements at www.afio.com.
'Q'
Micro Code
AFIO
At the top of this page, you will see an AFIO disclaimer, I am a research member of that organisation. I can recommend it to you if you are at all interested in the history of Intelligence agencies in the West. They publish regular newsletters and great articles as well as 'The Intelligencer' magazine. I joined because I have found it invaluable and it has given me information that would otherwise have been more difficult to source and obtain' Anyone can apply to join and the fee is most reasonable, the application does ask some searching questions as you might expect but nothing onerous. It is a requirement of membership that if you have a blog or deliver presentations or use their information in any way, then you should post a disclaimer. AFIO is a professional and well-respected organisation and I hope that you will consider joining.
No comments:
Post a Comment
Hi
Welcome to the Tamam Shud Blog, widely regarded as the most trusted fact and evidence-based blog on the Somerton Man case.
Visit our YouTube channel:
https://www.youtube.com/channel/UCOamLze8PyNDafjjBGGngJQ