SOMERTON MAN MYSTERY

The Evidence The Facts In Detail In Depth

THE SOMERTON MAN MYSTERY; THE REAL CODE ON THE SOMERTON MAN CODE PAGE. PART 2. MORE, MUCH CLEARER ANAMORPHIC WRITING IMAGES...

           ...anamorphic...    

CODE PAGE EXAMPLE

4TH JULY 2024      




...In the example above you can make out the horizontal orientation of characters from left to right. They are strings of numbers with some letters. Of great importance is the letter P. If you look carefully you can see very small numbers in darker ink within the upright of the letter P. These darker numbers align perfectly with a string of anamorphic characters that pass through and around the letter P. You may need to adjust your viewing angle of this image to get the best angle of view.

That is proof in this letter at least that the inked-over letters and their tiny writing are a part of the anamorphic design.

More Images To Follow...

11 Comments

Hi
Welcome to the Tamam Shud Blog, widely regarded as the leading and most trusted fact and evidence-based blog on the Somerton Man case. Please take a moment to review our comment guidelines here:

https://tamamshud.blogspot.com/p/tamam-shud-blog-rules.html

Visit our YouTube channel:
https://www.youtube.com/channel/UCOamLze8PyNDafjjBGGngJQ

  1. RidgyDidgeJuly 05, 2024

    If I move my view a little to the right, I can see the alignment and what appears to be sets of numbers and some letters is clearer than the earlier pics. Might be better if you adjusted the viewing angle from your end.

    ReplyDelete
  2. AnonymousJuly 05, 2024

    Have tried commenting here but it won't accept my name? Can just use 'anonymous'.

    ReplyDelete
    Replies
    1. Understood, it's a known issue between blogspot, some browsers, ipads and iphones. Firefox I know can be a problem but not always. I think it might have something to do with blogspots configuration, of URLs, So if you entered tamamshud.blogspot.de for Germany for example, it automatically redirects you to tamamshud.blogspot.com. It's beyond me.

      Delete
  3. WonderingJuly 11, 2024

    On another blog they say that you have always held that Alf and Jestyn were exchanging secret information but only changed your mind recently, would you care to comment on that?

    ReplyDelete
  4. Sure no problem. From the beginning my position has been that Alf was training the nurse, that was around mid 2013. That was constant until 2-17 when Paul Lawson stated that Alf and Jestyn were holding meetings in the gardens at the RNSH and exchanging information. This information came to me from Clive Turner following his meetings with Mr.Lawson. Here's the link, check it out:

    https://tamamshud.blogspot.com/2017/07/somerton-man-jestyn-ships-in-night.html

    Hope this helps. If you have any more questions let me know.

    ReplyDelete
  5. Here you go, this is the first post that I made that discussed Jestyn the nurse and Alf Boxall:

    https://tamamshud.blogspot.com/2013/06/somerton-man-was-jestyn-australian.html

    June 4th 2013 so just over 11 years ago. In all I would have written 35 maybe 40 posts on this subject, would be more if you include the posts that were specifically about the Rubaiyat and the Verse 70 inscription.

    For the record I have be been researching this case since 2009 starting off on the Adelaide University FB page, The World Search for a Rare Copy of the RUbaiyat of Omar Khayyam and then moving to the Inner Sanctum FB group.
    If 15 years makes you an expert on the subject then that what's what I am I guess but not in the class of Gerry Feltus. There are others with the same length of experience on this subject but not that many. If you'd care to check out the Blog Archives, you can find every post that I have written, more than 900 now, on the SM case.

    ReplyDelete
  6. Hello Gordon, I find it difficult to comprehend that a man travelling on a bus in Adelaide could carry out the computations needed in the examples you give across the posts. Apart from a small book he leaves on the seat he only carries items in his pocket. In 1945 could such a complex mobile system be workable for multiple agencies? If only we had the original page and not the overlaying scribbled page it could aid this research.

    ReplyDelete
  7. Hi Alan, What's interesting about your question is that it raises a wider one of what do we actually know for certain on the case.

    What we don't know for certain is who it was that bought the bus tickets, we don't know who checked the suitcase in, we don't know if the Somerton Man was on the bus and to your point, we don't know who it was that wrote the 'Code page' or for that matter when and where it was written. We also don't know who it was that threw the book into the car. All we have is a series of assumptions made by various people over the years.

    What we do know according to the evidence is that the code page information was found on the back of a copy of the ROK as 'pencil markings' and that book was handed into SA Police in July following the Inquest. We also know that the torn slip of paper containing the words Tamam Shud was compared to a torn out area in that same book and the paper type was found to match.

    No matching was done between the paper type of the 'Code page' and that of the page in the book from which the slip was torn.

    We also know that the nurses phone number was found in pencil and in 'really tiny lettering' on the back of the book. It wasn't clear whether that was the same page on which the indentations were found.

    Gerry Feltus maintained that the code page was a series of indentations that was lifted from the back of the book.

    So we have indentations and we have written in pencil which apparently were both found on the same page but no evidence to substantiate it. Unless I missed it of course.

    In summary, there is nothing that links the Somerton Man directly to the 'code page' we can link him to the torn slip quite readily based on evidence at the inquest. Then again, can we prove that it was SM who pushed the tightly rolled up torn slip into the concealed, secret fob pocket on the inside of waistband of the trousers that the Somerton Man was wearing when found on Somerton Beach. It is a reasonable assumption that he put it there, but a definitive proof?

    When it comes to field agents and their covert communications methods, from what I have read on the subject, the codes and methods must be easily remembered and quick to implement. Clandestine radio operators in WW2 Europe for example had literally 15 to 20 minutes to send and/or receive messages and then time to pack up and clear out before they could be tracked as, sadly, so many of them were. It's true to say that many times the messages they received were sent at pre set times and they just needed to listen out at those times and may not have needed to send a response until a later time or day. Their task then was to pass the messages they received on to their intended recipients and that is where covert techniques were more likely applied. Time taken on this latter step may not have been such an issue, they would have been more concerned about where or how they could conceal code books and one time pads as well as how they might disguise the messages they were to pass on.

    I've rattled on a bit so my apologies. I hope this makes sense and provides the answers that you are looking for.
    Thanks for the question.

    ReplyDelete
    Replies
    1. Thanks Gordon, I am a little familiar with the details you write, so I ask for just a little clarification of a couple things rather than repeat all your comment.
      Is the phone number actually that of the nurse or that of George? You likely know of an apartment in Seacombe Grove in Brighton (Melbourne) that was queried some years ago. That also carried the X3239 number, was in an area where most of the full Harkness family lived as well as a group of young mechanics.It had a CIA controlled residence 6 doors away. The same people had a residence next door to the Monterey Flats in Albert Park (Melbourne) where the Moorabbin Airport intercepts were decripted.
      Secondly, doesn’t your coding description rule out field use due to its complexity?

      Delete
  8. PART 1.
    The phone number has always been a matter of interest as I am sure you agree. Just whose number was it? Why did Detective Brown choose to call it and not the others with X3239 found in Melbourne, one in New South Wales, (A real estate agent out Pittwater way) and at least one in Brisbane. but I think the latter may have been from Prosper who was looking to buy cameras at the time, might be worth digging around that issue, how many camera ads did he place and where?
    The best way to answer your question though is to ask when was the book found versus when was it dropped into the car? I say that because as you no doubt know the Telephone directory for 1948 when the book was supposedly dropped in the car, did not have Prosper's name listed against that X3239 number. The name listed for 90A Mosely street was an 'A.Ross'. and the 1947 Directory listed H.A. Lyndon.

    Here's the link to a post from 2022 that will provide more detail:

    https://tamamshud.blogspot.com/2022/11/somerton-man-mystery-that-telephone.html

    So my suggestion is that you check the dates of the telephone directories in each State as a first step and then if you have time, drill down on the names Lynden and Ross.

    With your reference to the CIA in Melbourne, you might find it worthwhile checking the addresses around the Real Estate agents office in Sydney including the owners home address perhaps.

    Next, the Hill Cipher.
    It was created first in 1929 and like most ciphers it goes through various iterations in its lifetime, in fact the Hill cipher still exists I believe and is used to encrypt text messages. Depending on where you do your research, the cipher is described as relatively easy to use but very hard to decrypt. When I used the online decoder to track the nature of the letters and numbers that I found on the code page, the hill cipher came top of the list of probabilities and that's why I pursued it, The decode spat out several interesting names and a location but little in the way of groups of words that made much sense as per the posts you've probably reviewed here. What does that mean? It could mean that the cipher identified was an iteration which has long since been superseded. An example of the way that codes and ciphers were often modified 'on the fly' as it were, is to be found in Alexander Foote's book, 'A Handbook for Spies'. Alexander was a 'pianist' or radio operator for the Rote Drie group and was based in Switzerland but coordinated communications for Soviet backed agents throughout occupied Europe. The group used the NIHILIST cipher, created in the late 1800s. The Soviets made good use of it for many years and trained Alexander in its use, trained him so well that he was able to make modifications for his own use. The relevance of this fact is that the cipher very clearly identified in the torn slip was the NIHILIST cipher. It not only topped the list in the code identifier but it ticked every box. It also turned out some very relevant information.

    Part 2 follows..

    ReplyDelete
  9. PART 2

    Back to the Hill cipher, yes it could be challenging to use but it was secure. Proper training followed by regular usage and familiarity would fix the issue I suspect.

    However, there is another question in regards to that discovery. You might read up, if you haven't already, Leo Marks's book between Silk and Cyanide and see what he has to say about the various codes and ciphers and why they first used then dropped or modified, some because of the flaws in design. The Poem and Book codes were examples which led to the deaths of a number of radio operator agents, Szabo amongst them. The life expectancy of such operators was down to 6 weeks.

    Reviewing the way in which Foote worked, he was effectively at the hub of Rote Drei operations and as such he would receive and send messages and encrypt and decrypt them. Thus he would receive a message from an agent which may or may not have been encrypted in some other code and then he would produce a plain text version, encrypt with the Nihilist cipher and only then would he send the messages as quickly as possible. Conversely, if he received a message from Moscow Centre, he would take down the cipher text and later decrypt it. He wouldn't wait around for the Swiss Police to find his location, which they eventually did in any case and imprisoned him. In his book he does talk about spending hours transmitting and receiving. I can recommend the book to you, it's a fascinating and informative read.

    Given that information, we can ask informed questions about the SM code page. Was it a matter of jotting down strings of code from a numbers station perhaps, strictly messages received, or was it the result of the operator encrypting messages to be sent or passed to another agent or handler? I don't have an answer for that.

    Its one of the many challenges associated with the code page, we don't know who wrote it, we don't know when and we don't know where. We also don't know what role the person doing the recording was playing.

    There are two clues and one of them is that, according to Gerry Feltus, there were indentations. Part of tradecraft training was never to leave a trace and that included indentations. They were taught to reduce the chance of being caught by sometimes using a hot iron over a slightly dampened page that may have contained any incriminating evidence. Whoever caused the indentations, didn't do that.

    In closing, I should tell you that whilst I will share some of the findings, there are some which I will keeping confidential at least for the time being.

    I am up to my neck in renovation work at the moment so if I am a little tardy in responding for the next couple of weeks I hope you'll bear with me.

    ReplyDelete
Previous Post Next Post
/body>