Home
Search results “History of cryptology books of the old”
Cryptography: The Science of Making and Breaking Codes
 
08:21
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable. Hosted by: Michael Aranda ---------- Dooblydoo thanks go to the following Patreon supporters -- we couldn't make SciShow without them! Shout out to Justin Ove, John Szymakowski, Fatima Iqbal, Justin Lentz, David Campos, and Chris Peters. ---------- Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: http://dftba.com/scishow Or help support us by becoming our patron on Patreon: https://www.patreon.com/scishow ---------- Looking for SciShow elsewhere on the internet? Facebook: http://www.facebook.com/scishow Twitter: http://www.twitter.com/scishow Tumblr: http://scishow.tumblr.com Instagram: http://instagram.com/thescishow Sources: http://www.vectorsite.net/ttcode_04.html#m3 http://www.simonsingh.net/The_Black_Chamber/crackingprinciple.html http://book.itep.ru/depository/crypto/Cryptography_history.pdf http://www.cs.trincoll.edu/~crypto/historical/gronsfeld.html http://www.sans.org/reading-room/whitepapers/vpns/history-encryption-730 http://ftp.stmarys-ca.edu/jsauerbe/m10s11/chapter5.pdf http://www.turing.org.uk/scrapbook/ww2.html http://enigma.louisedade.co.uk/howitworks.html http://www.codesandciphers.org.uk/enigma/example1.htm http://www.pbs.org/wgbh/nova/military/how-enigma-works.html http://www.cs.miami.edu/~burt/learning/Csc609.051/notes/02.html
Views: 777901 SciShow
Cryptography: Crash Course Computer Science #33
 
12:33
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure. Note: In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: https://www.youtube.com/watch?v=mYtvjijATa4 Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios Want to know more about Carrie Anne? https://about.me/carrieannephilbin The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Want to find Crash Course elsewhere on the internet? Facebook - https://www.facebook.com/YouTubeCrash... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 177244 CrashCourse
What is cryptography? | Journey into cryptography | Computer Science | Khan Academy
 
01:31
What is Cryptography? A story which takes us from Caesar to Claude Shannon. Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/caesar-cipher?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/algorithms/intro-to-algorithms/v/what-are-algorithms?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information). About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1 Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 785289 Khan Academy
CRYPTOLOGY - Decode The Great Seal
 
01:25
Featured In This Collection Is The 1st Great Seal of The United States And The 'Codex Gigas' A Mystical Magical Royal Treasure Historically Known As "The Devils Bible". Historically The Codex Gigas Is A Spoil of War Taken From The Royal Treasury of The Holy Roman Emperor 'Rudolph II' By The Plundering Swedish Army And One Story Is Rudolph Had Borrowed The Book From A Monastery For His Art Exhibit & Occult Studies And Never Returned It. The Codex Gigas Is Believed To Be Written By A Mysterious 'Bohemian Monk' Who Sold His Soul To The Devil. Due To Its Old Age The Codex Gigas Is Kept Under A Custom Shroud For Preservation Purposes And Because of Its Priceless Value The Codex Is Sealed In A Guarded Vault At The Royal Library In Stockholm. LEGENDS AND HISTORICAL FACTS: (1.) The Codex Gigas Is A Giant Book of Questionable Origin; Almost 1000 Years Old; And A National Treasure Once Counted To Be The 8th Wonder of The World. (2.) The Codex Gigas Is The Largest Medieval Manuscript Known To Exist On Earth; Each Page In The Devils Bible Is A Animal Skin And The Giant Book Recently Made International Headlines And Vented For One Hour In A National Geographic Tell A Vision Special. http://youtu.be/FSTVUU7fqMo (3.) Legend Is Nobody Knows Who Wrote The Devils Bible or What Inspired Its Writer, The Other Legend Is Nobody Knows Who Designed The 1st Great Seal or What Inspired Its Designer. (4.) Another Legend Is A Mysterious Hooded/Cloaked Figure of A Man Gave Thomas Jefferson The Design For Americas First Great Seal. http://youtu.be/id0CWnW24BI (5.) Another Legend Related To This Mystical Magical Tale From A Crypt Is The Legend of A Dead Man Who Claimed To Be "The Truth" Born In Bethlehem, Legend Is The Truth Was Hated And Betrayed And Sold For 30 Pieces of Silver To Be Brutally Edited; Wrapped In A Custom Shroud For Preservation Purposes; And Then Sealed In A New Vault Until The Edited Truth Magically Escaped The Vault Un-Edited To Be Known Again. OTHER MISC NOTES: (A.) Codex Gigas Is Latin Interpreted: Great; Big; Giant; Renown Book. Therefore The Great Seal of The Great Book And The Great Painting of The Great Satan Bound Betwixt Twin Towers On The Most Filthy And Most Exploited Page of The Book . . .The Great Seal of The Pit. (B.) Annuit Coeptis; Novus Ordo Seclorum; And E Pluribus Unum Are Also 'Latin Words' Which Until Recently Were Interpreted: The 'Official' Language of The Church & State. (C.) There Has Never Been A Democracy In History That Did Not Commit Suicide or Murder Itself. Therefore This New Revised Experiment 1776. You Are Welcome To Visit My WebSite @ http://community.livejournal.com/bible_codes/
Views: 1205 44AlphaMale44
"The Lost Symbol" - Magic Squares and the Masonic Cipher
 
43:15
December 2, 2009 Dan Brown? The Lost Symbol? Masonic cipher? Albrecht Durers magic square? If you know about these things AND you can decipher the message below, then dont bother coming because you know as much as I do. If you dont know about them OR you cant decipher the message below, then by all means come and hear my presentation. Yes, we do have pizza. Ed Brumgnach http://www.qcc.cuny.edu/ecet/magicSquares.asp
Views: 857247 CUNYQueensborough
Mystery Of Codex Gigas The 'Devil's Bible' Who Wrote Biggest Manuscript?
 
03:55
The mysterious Codex Gigas has a full-page colour image of the Devil Legend has it that a monk made a deal with the devil to create the text Handwriting analysis has revealed that the text was written by one scribe Read Full Story:http://www.cosmostv.org/2015/05/mystery-of-codex-gigas-devils-bible-who.html Latest Uploads From The Cosmos News https://www.youtube.com/playlist?list=PLdM_BWPQiR9C-uBWUfRBO4UnDU5YGhrcM
Views: 50904 The Cosmos News
Mysteries SOLVED By The Internet
 
09:20
There are some crazy and unexplained things that can be found on the internet and with more than 3 billion people using it, it’s no wonder that sometimes they can put their collective minds together to solve mysteries. From illusions to assisting investigators in missing person's cases, the answers to these mysteries were uncovered with the assistance of the world-wide-web. Here we have 11 Mysteries Solved by the Internet. Subscribe to Talltanic http://goo.gl/wgfvrr 4. Time Traveler Have you ever seen that video of the supposed time traveling woman in the 1928 Charlie Chaplin film Circus? If you have, you might have been blown away by what looks like a woman talking on a cell phone way back when movies were still purely black-and-white. But one commenter on YouTube solved what was going on. Crennycrenshaw stated that what she is holding in the video clip is actually a hearing aid made by Siemens in 1924. The user advised people to go to the Siemens website and view the picture of the 1924 model that shows what it looked like and how it was to be used. Must have taken a little digging to come up with the explanation but we must say, those are some pretty fantastic researching skills. 3. Dorothy Holm A woman had her ability to speak taken away by a tumor in 1996 and began furiously scribbling seemingly random letters on index cards before her death. Her family believed that she might have been trying to leave them some message, although it looked as if she had written it in code. Her grandchildren spent 18 years trying to puzzle out what in the world the random assortments of letters could mean before one of the granddaughters resorted to the internet to try to get answers. Within thirteen minutes she had a response. A metafilter.com user wrote back telling her that the card she had posted contained the first letter of every word in the Lord’s Prayer, blowing her mind. She was amazed that something that had been eating at her family for 18 years could be solved so quickly merely by posting it on the internet. The other cards are still being deciphered. 2. Cicada 3301 In 2012, a cryptic message showed up on different message boards all across the internet. The puzzle challenged visitors to find a hidden message in an image that accompanied it and stated that they were looking for “highly intelligent individuals.” The puzzle initially baffled virtually everyone who stumbled across it, that is until a man named Joel Eriksson came across it. Eriksson is a cryptosecurity researcher and developer from Sweden and said that he found the puzzle quite some time after its initial release. He quickly worked to solve it and found it much harder and more in-depth than he first thought it would be. He had to enlist his knowledge in areas from Mayan numerology to cyberpunk speculative fiction, used skills from stenography to cryptology, and had to enlist the help of people the world over to help him find posters taped to telephone poles in 14 different cities. Eventually, the puzzle brought him back to the internet and what he saw disappointed him. He was pointed toward an address on the anonymous Tor network, but when he arrived, he found a message from Cicada stating their disappointment in people sharing information to solve their puzzle instead of working on it individually. While he was extremely disappointed with the outcome, he was also proud of the work he had done. It took him only three weeks to work his way through all of the steps laid out for anyone to navigate. The group now releases a puzzle annually, and the group’s identity is much sought after. 1. Grateful Doe The body of a young man was found in the wreckage of a car crash that took place in 1995 and was nicknamed “Grateful Doe” because of two concert tickets found with his body at the time of his death. Jason Callahan was hitchhiking and following the Grateful Dead tour in 1995 and had been picked up by a 21-year-old on the road. The body of the other man was identified immediately by his family, but no one had any idea who the other man was, and he didn’t match the description of any missing persons report because Jason’s mother hadn’t reported him missing. An Australian Redditor with the handle “greymetal” posted his picture online in 2014, and his identification was set in motion. By January 2015 there was a serious lead: two men came forward claiming to know the man in the picture and called him Jason. They also said they knew he was from Myrtle Beach, SC. Volunteers then organized on Facebook and began bombarding news stations with the story. It was picked up and broadcast in the Myrtle Beach area and Callahan’s mother, Margaretta Evans, saw it. She filed a police report for her son the next day, and police immediately opened up an investigation. Grateful Doe’s DNA was taken and run, and after 11 months a positive identification was made. Too bad his mom didn’t just file a missing-persons report in the first place.
Views: 507204 Talltanic
Biography - American Gunfighters from the Wild West - 1800s - Part 1 of 2
 
11:57
When Gunfighters Ruled the Streets of the Wild West Today we present the first of two programs about some of the most famous people who lived in the American West many years ago. We tell about lawmen, criminals and gunfighters. And we will try to tell as much truth as possible about this interesting time in American history. the people in Dodge City began to see something that frightened them. Strangers were entering the town. All of these men carried guns. The men said they were friends of Luke Short. They caused no trouble. A newspaper in Dodge City printed a story that identified the men. Luke Short returned to Dodge City wearing his guns. The chief lawman of the town quickly sent a telegram to the governor of the state asking for help. He was afraid a major civil war would begin in his town. The men who had forced Luke Short out of town decided to negotiate a settlement. They did not want to face his many dangerous friends. A few days after the settlement, Bat Masterson, Wyatt Earp, Doc Holliday and the other dangerous friends of Luke Short left Dodge City. No one ever fired a shot. No one was even threatened. All it took to force a negotiated settlement was for these dangerous men to show their faces in Dodge City. Just the fear of them settled the argument in favor of Luke Short. No one wanted to deal with men who were not afraid of a gunfight. Who were these dangerous men? Why did people fear them so much? Why did they become so famous? The story of these famous men began a little before the American Civil War of the eighteen sixties. Most of the shooting incidents between professional lawmen and outlaws took place during the eighteen seventies in Texas. But living in the American West was not easy. There were no laws, no courts and little or no government. There were few lawmen to keep order. The people who arrived in the West included many criminals. Many were escaping punishment from their crimes. They knew that an area with no law would provide them with safety. These professional criminals often used force to take what they wanted -- cows, horses or money. Often, there was little to stop them. To protect their towns, the settlers often had to employ people who were expert in the use of firearms. Several lawmen in the Old West had learned to use their weapons when they were criminals. Both the outlaws and the lawmen in the Old West had something else in common. They could do something many other people could not. They were willing to risk their lives to enforce the law or to commit a crime. And they were willing to do this with a gun. A good example was a man named William Matthew Tilghman. He was arrested two times and charged with stealing when he was a young man. However, he later became a deputy United States marshal, a law officer. On July fourth, eighteen eighty-eight, a man named Ed Prather began shooting his gun in the street in Farmer City, Kansas. People ran away in fear. Tilghman made him stop. Prather left the street angry and went into a drinking place. He began drinking alcohol and making threats. Later, Tilghman went into the drinking place looking for Prather. Prather put his hand on the gun he was carrying. Tilghman told him to move his hand away from the gun. When he did not obey, Bill Tilghman pulled out his gun and shot Ed Prather two times. He died immediately. That was only one of the many times Bill Tilghman used his gun as a law officer. He served in many other towns. Often, all he had to do was walk into a room to stop a fight. Outlaws feared and obeyed him. Most criminals stayed away from a town where Bill Tilghman was the marshal. Bill Tilghman was shot to death on November first, nineteen twenty-four. He was trying to arrest a man who had been drinking too much alcohol. He was seventy years old and still working as the marshal of Cromwell, Oklahoma. His life had lasted exactly the seventy years of the American Wild West. Wyatt Earp was once asked how to win a gunfight. He said a good gunfighter took his time. He said he had to go into action as quickly as possible -- as fast as he could move. But then he should take his time with the shooting. He said a successful gunfighter could not let fear or anything else force him to shoot too soon and miss the target. Missing the target could get him killed. Wyatt Earp was very successful. He was only wounded once in a gunfight. He is one of the few successful gunfighters who lived to old age. He died in nineteen twenty-nine. He was eighty-one years old.
Views: 5949 ListenAndReadAlong
Cybersecurity: Crash Course Computer Science #31
 
12:30
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe. Check out Computerphile’s wonderful video on how to choose a password! https://www.youtube.com/watch?v=3NjQ9b3pgIg Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here! https://store.dftba.com/products/computer-science-coasters Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios Want to know more about Carrie Anne? https://about.me/carrieannephilbin The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Want to find Crash Course elsewhere on the internet? Facebook - https://www.facebook.com/YouTubeCrash... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 331615 CrashCourse
Biography - American Gunfighters - Best and Worst -  from the Wild West - 1800s - Part 2 of 2
 
12:11
This is Shirley Griffith. And I'm Steve Ember with EXPLORATIONS in VOA Special English. Today, we present the second of two programs about the Old American West. Experts disagree about who were the most dangerous gunmen of the Wild West. However, we will tell you about two of them. One was an outlaw. One was a lawman. Some people living in the West at this time became famous. These include men who worked as professional officers of the law, and others who were criminals. Their names were Wyatt Earp, Doc Holliday, Bat Masterson, Billy the Kid, Wild Bill Hickok and the brothers Jesse and Frank James. Books, movies and television programs have made these men more famous today than they were when they were alive. Some of the stories about them are true, but most are only stories. Here are two true stories of the Old West. Our first story begins with a very old photograph that was made in the little town of Pecos, Texas. This is one of the few photographs known to exist of a very dangerous man named James Miller. He was also known as "Killin Jim" or "Killer Miller". History records show that he was responsible for the deaths of at least twelve people. Jim Miller often said he had killed more than 50 people. The real number of people he killed will never be known. Jim Miller killed people for money. He charged about $150 to kill a person. He also killed anyone who caused him trouble. One man died a few days after he had spoken in court against Miller. There is no evidence to show who killed the man. However, people were sure Jim Miller was guilty of the crime. Miller was successful at what he did because there was little law enforcement in the areas of Texas and Oklahoma where he lived. And, people were afraid to say anything against Miller. They knew it would mean their lives. One law officer got into a shooting incident with Miller. The lawman shot Miller three times in the chest. Miller fell to the ground. The officer was sure he had killed the dangerous man. A few minutes later, Miller got to his feet. He had not been hurt. He was wearing a steel plate under his shirt. The bullets had hit the steel. The force of the bullets had knocked him down, but had not hurt him. Later, the law officer died from gun shot wounds. No one was sure who shot him. However most people knew Miller had killed again. In 1909, Miller made a mistake. He was paid money to kill a man in the little town of Ada, Oklahoma. He killed the man in the dark of night. Later, Miller was arrested for the crime. The citizens of Ada knew he had been arrested several times but had always been released for lack of evidence. Also, many people were afraid to speak in court against Miller. Many of the citizens of Ada thought Miller would escape justice again. On Sunday morning, April 19th, the citizens of Ada attacked the jail where Miller was being kept. They took him to a barn and hanged him. No one was ever arrested for the hanging of Jim Miller. Most people thought justice had been done. One man said, "He was just a killer. He was the worst man I ever knew." One of these was a man named John Horton Slaughter. He was sometimes called "Texas" John Slaughter. He was born in Louisiana in 1841. His family moved to Texas when he was only three months old. He grew up with little education. However, he learned to raise cattle. He learned to speak Spanish. And he learned much from the Native American Indians. John Slaughter was not a very tall man. He was really very small. However, criminals became afraid just looking into his eyes. History records show that John Slaughter took part in at least eight gunfights. This does not include his time as a soldier in the Civil War or fighting against Indians. The records show that he was forced to kill at least four men and possibly two others. These recorded shooting incidents took place when he was an officer of the law. There may have been several more. People who knew John Slaughter said there was no doubt they were dealing with an extremely serious man -- a man who could be very dangerous. One friend of John Slaughter said Texas John was the meanest good man he ever met. In 1886, he was elected the lawman or sheriff of Douglas, Arizona, the town near his ranch. Several groups of criminals were working in the area at the time. Soon, many of these outlaws were in jail. Most refused to fight Texas John Slaughter. They surrendered instead. Those who would not immediately surrender faced Sheriff Slaughters guns. After two terms as the sheriff, John Slaughter helped the United States Army seek out the famous Apache warrior Geronimo. He helped start the bank in Douglas, Arizona. He later became a representative in the Territorial Government and worked to have Arizona admitted as a state.
Views: 6344 ListenAndReadAlong
Top 10 Unbreakable Ciphers and Codes — TopTenzNet
 
10:49
Top 10 Unbreakable Ciphers and Codes →Subscribe for new videos every day! http://bit.ly/toptenzsubscribe →10 Reasons Bruce Lee was a Superhuman: http://bit.ly/1Hl4mVu Entertaining and educational top 10 lists from TopTenzNet! Brand new videos 7 days a week! Videos are published at 6pm EST every day! Other TopTenz Videos: Top 10 Historical Unsolved Mysteries http://bit.ly/1RAAE95 In an age where we have satellites that can zoom in to watch an ant pee on a leaf, you’d think our society pretty much knows everything. Even with our high-speed, touchscreen, 3-D, Star Wars projectors, there are still a few ciphers and codes keeping cryptologists (trust us, it’s a word) stumped. Some of them come from way back in the 18th century. Even with the addition of advanced technology, ye ol’ pilgrims are proving that the smartest thing about our society might just be our phones. Text version: http://www.toptenz.net/top-10-unbreakable-ciphers-codes.php Coming up: 10. Dorabella Cipher 9. D’Agapeyeff Cipher 8. Indus Script 7. Chinese Gold Bar Ciphers 6. Zodiac Killer 5. Linear A 4. Proto-Elamite 3. Taman Shud 2. McCormick Cipher 1. Bacon Cipher Source/Other reading: http://www.ciphermysteries.com/the-dorabella-cipher http://nautil.us/issue/6/secret-codes/the-artist-of-the-unbreakable-code http://www.ciphermysteries.com/2013/12/23/dagapeyeff-cipher http://itknowledgeexchange.techtarget.com/security-corner/the-unsolved-dagapeyeff-cipher/ http://www.harappa.com/script/indusscript.pdf http://elonka.com/UnsolvedCodes.html http://books.google.com/books?id=G4gCs-RmVZwC&pg=PA46&lpg=PA46&dq=General+Wang+unsolved+gold+bars&source=bl&ots=vrfYkpCHEz&sig=gwWoVvcHk5qecMsXwuLVmZoYKZU&hl=en&sa=X&ei=XU9_U-HGOtelyATduYDYDg&ved=0CHsQ6AEwBQ#v=onepage&q=General%20Wang%20unsolved%20gold%20bars&f=false http://listverse.com/2007/10/01/top-10-uncracked-codes/ http://www.crimelibrary.com/serial_killers/notorious/zodiac/8.html http://www.zodiologists.com/ http://mysteries24.com/n4-21061-Unsolved_coded_messages http://www.cam.ac.uk/research/news/cracking-the-code-the-decipherment-of-linear-b-60-years-on http://www.ancientscripts.com/elamite.html http://www.historytoday.com/mark-ronan/puzzle-proto-elamite http://www.heraldsun.com.au/news/law-order/portrait-may-hold-key-to-somerton-man-beach-mystery/story-fni0ffnk-1226674957043 http://www.ciphermysteries.com/2009/08/08/the-tamam-shud-cipher-mystery http://www.fbi.gov/news/stories/2011/march/cryptanalysis_032911/cryptanalysis_032911 http://www.riverfronttimes.com/2012-06-14/news/ricky-mccormick-code-mysterious-death-st-louis/ http://www.jstor.org/discover/10.2307/751135?uid=3739256&uid=2129&uid=2&uid=70&uid=4&sid=21103794245461 http://www.bibliotecapleyades.net/ciencia/esp_ciencia_manuscrito06.htm
Views: 85287 TopTenz
Cryptography for the masses: Nadim Kobeissi at TEDxMontreal
 
16:31
(Sous-titres en français bientôt disponibles) Amid today's debate on electronic surveillance and the ongoing Arab Spring protests, this young 22 year old Montreal hacktivist founded Cryptocat, a free, accessible, and open source encrypted chat application. His mission: make private communication on the web available to all. Dans le contexte du printemps arabe et des enjeux de surveillance électronique, ce jeune cybertactiviste montréalais a fondé à l'âge 22 ans Cryptocat: un logiciel de conversation protégé par cryptographie simple à utiliser, gratuit et à code source ouvert. Sa mission: rendre accessible à tous la communication privée sur le web. https://twitter.com/kaepora https://crypto.cat/ For more information, please visit http://tedmontreal.com/ Introduction motion animation by: http://www.departement.ca/ In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized.* (*Subject to certain rules and regulations)
Views: 11391 TEDx Talks
5 Mythical Creatures Caught On Camera & Spotted In Real Life!
 
04:54
5 Mythical Creatures Caught On Tape & Spotted In Real Life! Transcript: Think of the world’s most mythical creatures and your mind probably takes you to times of old fantastical stories travelled on the wind embedding themselves in the minds of a far more gullible human race. There have been much speculation thanks to certain photos and footage caught on tape by us humans. And in this countdown, we are showing the realest videos of Mythical Creatures thats been caught so far. Some videos out there are hoax but these ones shown in this list might leave you thinking the opposite. So prepare for 5 Mythical Creatures Caught On Camera & Spotted In Real Life!...... Lets.....Begin! 1. Mermaid Sighting The tales of mermaids have been around for thousands of years. Men have told these tales of beautiful and dangerous creatures who live primarily beneath the sea and you are about to be the witness of one. A second camera captures what appears to be a Mermaid 3000 Feet Deep Off the Coast of Greenland. Many claim this to be real and some claim it to be a hoax, but what do you think? You be the judge, here it is.. 2. Werewolf Sighting A possible hybrid werewolf was photographed in a city near Mato Grosso do Sul in Brazil.The mystery creature, which was snapped by police cctv cameras appears to show a huge bi pedal monster running down the main street in the city of Trêz lagoass in Brazil.This image which was released by a city official that has been scrutinized by several forensic photography experts who state that this bizarre image is indeed authentic and is not the work of hoaxers. People claim this to be the first real image onf a Werewolf. What do you think? 3. Unicorn Sighting In the video you are about to see shows the most realistic footage of what appears to be an unicorn. One of the most famous mythical creatures that was ever told. There are quite a number of hoaxed videos of unicorns out there but this one is the most believeable one that exists today. Most people belive this to be real. What you think? Here it is... 4. Pixie Remains Discovered in Bird of Prey Nest The footage you are about to see shows a miniature partial human skeleton. The skull, spine and ribs are present although the limbs, lower jaw and pelvis are missing. A five pence piece is also present in the images to give an indication of scale. If these are genuine then this is the smallest humanoid remains ever discovered, but how did they appear in a falcon nest? Who knows. Here it is... 5. The Lochness Monster Sighting What you are about to see shows a strange underwater creature floating around boaters who in a million years never expected to see and record what you are about to see. People claim this to be the realest footage to ever exist of the legendary Mythical creature of the Loch Ness Monster.... Here it is.. Music Background: Kevin MacLeod ~ Piece for Two Fingers : https://www.youtube.com/watch?v=l_8yizwLlhA VIDEO LINKS: 1. Mermaid Sighting: https://www.youtube.com/watch?v=iuXPdQqMYW0 2. Werewolf Sighting 3. Unicorn Sighting: https://www.youtube.com/watch?v=HHQIXCs4d98 4. Pixie Remains Discovered in Bird of Prey Nest: https://www.youtube.com/watch?v=0vmw2K7Ug0g 5. The Lochness Monster Sighting: https://www.youtube.com/watch?v=T4csp6O5S-Y _________________________________________________________________ Smash that like button for more and make sure yo share it with your friends! Make sure to follow me here: http://twitter.com/itsamerikano
Views: 6490590 Top 5s Finest
Black Magic | National Geographic
 
05:53
In the Sonora witches' market, witch doctors peddle their cures. And in back rooms behind the stalls, nearly anything is possible. ➡ Subscribe: http://bit.ly/NatGeoSubscribe #NationalGeographic #BlackMagic #Witchcraft About National Geographic: National Geographic is the world's premium destination for science, exploration, and adventure. Through their world-class scientists, photographers, journalists, and filmmakers, Nat Geo gets you closer to the stories that matter and past the edge of what's possible. Get More National Geographic: Official Site: http://bit.ly/NatGeoOfficialSite Facebook: http://bit.ly/FBNatGeo Twitter: http://bit.ly/NatGeoTwitter Instagram: http://bit.ly/NatGeoInsta Black Magic | National Geographic https://youtu.be/4oPPkKsskbQ National Geographic https://www.youtube.com/natgeo
Views: 2224680 National Geographic
ఈ వింత అక్షరాలతో బుక్ ఎవరు వ్రాశారు ? | Voynich Manuscript Mystery | Telugu Mojo
 
02:17
☛ For latest updates on Telugu Mojo Channels | https://goo.gl/sk3qjh ☛ Subscribe for more latest Videos | https://goo.gl/5MRNbH ☛ Like us on | https://www.fb.com/telugumojoofficial ☛ Follow us on | https://twitter.com/telugumojo ☛ Prapancha Rahasyalu Videos | https://goo.gl/NsMRVN ☛ Prapancha Rahasyalu Fb Page | https://www.fb.com/prapancharahasyalu/ ☛ Blogger: http://telugumojo.blogspot.in/ ☛ Twitter: https://twitter.com/telugumojo ☛ Tumbler: https://www.tumblr.com/blog/telugumojo ☛ More Videos | https://goo.gl/sk3qjh Telugu mojo features supernatural and paranormal activities from around the world. These fascinating facts packed with compelling true stories will blow your mind and keep you updated on all the mysterious happenings from around the globe. ☛Our Channels : ☛ Tollywood Central | https://goo.gl/zEbHe7 ☛ Telugu Mojo Kathalu | https://goo.gl/GnEFsd ☛ Prapancha Rahasyalu | https://goo.gl/2QJdLi ☛ Mana Health | https://goo.gl/4ZWKxb ☛ Temple Rahasyalu | https://goo.gl/Koaaes Tags:telugu movies, telugu songs,telugu new movies,telugu rhymes,telugu short films,telugu latest movies,telugu dj songs,telugufullmovies,telugunew songs,telugu comedy movies,telugu,telugu audio songs,telugu action movies,telugu all movies,telugu album songs,telugu actress,telugu ayyappa songs, telugu all songs,telugu audio,telugu arjun reddy movie,telugu ads,a telugu movie,a telugu movie trailer,a telugu teaser, a telugu trailer,a telugu movie teaser,a telugu full movie, a telugu songs,a telugu movie songs,a telugu movie video songs,a telugu movie trailer 2017,telugu bf,telugu badi,telugu best songs,telugu best movies,telugu bahubali,telugu bhakti songs, telugu bahubali 2,telugu best short films,telugu bigg boss,telugubommalu,b telugu full movie,b telugu movie,b telugu movies online,grade b telugu movies,ultra b telugu,13 b telugu movie,ultra b telugu episodes,mr b telugu review,hepatitis b telugu,13 b telugu,telugu comedy,telugu comedy scenes,telugu cinema,telugu christmas songs,telugu comedy videos,telugu cinemalu,telugu comedy short films,telugu cartoons, telugu calendar,c telugu tech tuts,c telugu tutorial,c telugu lesson,telugu b movies,ctrl c telugu movie,pointers in c telugu,sundar c telugu movies,recursion in c telugu,hepatitis c telugu,arrays in c telugu,telugu dj,telugu dance,telugu doraemon,telugu dj movie,telugu dubbed,telugu dialogues,telugu dubsmash,telugu dj folk songs,telugu dubbed english movies,d telugu movie,d telugu show,d telugu dance show latest,d telugu tv,dj telugu songs,d telugu film,d telugu cinema,d telugu dance show 2018, d telugu movie songs,d telugu etv,telugu emotional songs,teluguetv,elugu evergreen songs,telugu emotional movies, elugu english movies, telugu etv live,telugu entertainment,telugu emotional video songs,telugu etv news,telugu evergreen movies, e telugu movie,e telugu songs, e telugu movie trailer,e telugu movie scenes,e telugu movie songs,e telugu live,e telugu movie hot,e telugu movie video songs,e telugumovies 2016 full length movies,e telugu full movie jeeva hindi dubbed,telugu film, telugu folk songs,telugu funny videos,telugu feeling songs, telugu family movies,telugu full hd movies,telugu funny,telugu famous songs,telugu film songs, f telugu short film,f telugu movie,kumari 21f telugu movie, b f telugu,u of telugu,kumari 21f telugu songs,telugu movies 2016 fmovies,telugu god songs,telugu geeks,telugu gana, telugu grammar,telugu guninthalu,telugu ghost movies, telugu god movies,telugu gossips,telugu good movies, telugu good songs,g telugu golden awards, g telugu serial zee telugu serial,g telugu movie, g telugu golden awards 2017,g telugu mudda mandaram serial, g telugu live channel,g telugu live today,g telugu awards telugu live tv,g telugu today,telugu horror movies,telugu hit songs,telugu hit movies,telugu hd movies,telugu hd,telugu hd video songs,telugu hit video songs,telugu heroines,telugu hollywood movies,telugu hd songsh telugu boy names,aah telugu movie,telugu h d movies,telugu movies h,telugu h d songs,telugu hot songs hhmtv telugu,telugu songs videos h,new telugu h,telugu movies 2016 h d, telugu item songs,telugu i movie,telugu interview,telugu itam songs,telugu item video songs,telugu infobells, telugu inspirational videos,telugu i movie songs,telugu in telugu,telugu industry,i telugu movie, i telugu songs,i telugu movie songs, i telugu movie scenes, i telugu movie video songs, i telugu trailer,i telugu scenes,i telugu cinema,i telugu film, i telugu video songs,telugu jokes, telugu jabardasth,telugu janapadalu,telugu janapada, telugu jukebox,telugu janapada geetalu, telugu jesus,telugu jabardasth comedy,telugu jathakam,telugu
Views: 128960 Telugu Mojo
Cicada 3301 (All Clues and How They Were Solved)
 
15:07
Want to know more about PGP encryption? Here's the video I used https://www.youtube.com/watch?v=3yN4uMMsK8I Songs: 00:40 song {Halsey - Haunting (Official Instrumental) https://www.youtube.com/watch?v=eT6VVntT8lo Piano cover by cragezy https://www.youtube.com/watch?v=4AxBYR11MG8 As not stated, the video is not entirely accurate (i.e notes shown were drawn up for clearity). Please refrain from pointing out the flaws when the majority of the video is correct. Douche Clues Clue 1: 0:00 Clue 2: 1:22 Clue 3: 1:48 Clue 4: 2:00 Clue 5: 5:50 Clue 6: 6:45 Clue 7: 8:22 Clue 8: 10:11 Clue 9: 11:05 Clue 10: 13:08
Views: 3431245 TheBraveZombies
Margalit Fox, "The Riddle of the Labyrinth" | Talks At Google
 
56:26
THE RIDDLE OF THE LABYRINTH, by New York Times writer Margalit Fox, tells one of the most intriguing stories in the history of language—the race to decipher the Bronze Age script known as Linear B, first dug up on clay tablets in Crete in 1900. Fox masterfully blends history, linguistics, and cryptology into a mesmerizing account that reads like an intellectual detective story. At the center of this narrative is an American linguist, Alice Kober, whose major contribution to the decoding of the script is unknown to history because she died before she was able to make the final leap. In many respects, Alice Kober is to the story of Linear B what Rosalind Franklin, the great unsung heroine of the mapping of molecular structure of DNA, is to that canonical Margalit Fox holds graduate degrees in linguists and currently has been writing obits for the NYT, many of which have been front page.
Views: 5317 Talks at Google
The Michigan Dogman: Evidence (2008)
 
16:52
From the official dogman legend website; which is now gone.
Views: 529663 Kurtis Ward
8 Bells Lecture | Alan Rems: World War II's Great Forgotten Battlegrounds
 
55:16
Alan Rems, "South Pacific Cauldron," Eight Bells Book Lecture, Naval War College Museum, June 11, 2015. Alan Rems takes the reader into the unsung regions of World War II. Through his in-depth research, he presents the stories of Japanese and allied personnel in struggles no less brutal than the much heralded battlefields of Guadalcanal and Iwo Jima. Photographs and maps enhance the telling of these stories. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 12994 usnavalwarcollege
Cool Codes for Kids: The Caesar Shift
 
01:17
Dan Metcalf is the author of Codebusters, an adventure book for 8-12 year olds from Bloomsbury Publishing. He's also a (very) amateur codebreaker! Back in ancient rome, the emporer Julius Ceasar needed a way of disguising his messages to his generals who were off at war. He came up with this nifty little code, known as the Caesar shift (Isn't it weird that it had the same name as him???) To write the code down, you just take the letters of your word and hop two places ahead in the alphabet. So A becomes C, B becomes D, and so on. A word like BANANAS becomes DCPCPCU. So to decode the message you just take the message which looks like gobbledegook, and replace each letter with the one two places ahead of it in the alphabet. So this word: EQFGDWUVGTU Becomes: CODEBUSTERS You can jump any amount of places in the alphabet of course, which means there are 26 different versions. Have a go!
Views: 820 Dan Metcalf Writer
The Reporter Who Spilled the Secret behind the U.S. Navy's Victory at Midway
 
57:08
Stanley Johnston's Blunder: The Reporter Who Spilled the Secret behind the U.S. Navy's Victory at Midway A lecture at The Institute of World Politics, February 27, 2018 About the book: Stanley Johnston's Blunder: The Reporter Who Spilled the Secret behind the U.S. Navy's Victory at Midway concerns what may be the biggest intelligence leak to a reporter in U.S. Navy history. It spotlights Chicago Tribune war correspondent Stanley Johnston, embedded with the carrier USS Lexingtonwhen it is sunk by Japanese war planes during the Battle of the Coral Sea on May 8, 1942. He returns to the U.S. mainland aboard a transport that picks up a Secret Pacific Fleet message: It describes the composition of Japanese forces descending on Midway Atoll for what will be the pivotal Battle of Midway on June 4, 1942. On June 7, 1942 information from that dispatch appears on the front page of the Chicago Tribune. Top U.S. Navy brass fear the Japanese will see the story, realize their code has been broken and change it, depriving our Navy of vital intelligence. The Roosevelt administration’s Justice Department convenes a grand jury to consider espionage charges against Johnston. The grand jury throws out the case. My book explores key questions: How did Johnston get that story? Did a Navy officer “leak” the Pacific Fleet message? Why did the grand jury dismiss the case? Did the Japanese read the story and change their code? Much of the information in this book derives from 75-year-old grand jury testimony released to the author after a two-year court fight in which the U.S. Justice Department battled to keep the testimony locked up. Carlson’s case, argued by the Reporter’s Committee for Freedom of the Press, was decided in his favor in the fall of 2016 when a three-judge panel of the 7th circuit court of appeals ordered the documents released to the author. About the speaker: Elliot Carlson began his journalistic career in Hawaii, writing editorials for the Honolulu Advertiser. After completing a Congressional Fellowship that took him to Washington in 1963-64, he joined the staff of the Wall Street Journal, later free-lanced from Belgrade, Yugoslavia, and, still later, served as editor of AARP’s monthly newspaper. Retiring in 2004, he turned to biography, writing Joe Rochefort’s War: The Odyssey of the Codebreaker Who Outwitted Yamamoto at Midway (Naval Institute Press, 2011), for which he won the Samuel Eliot Morison Award for Naval Literature. His latest book, Stanley Johnston’s Blunder: The Reporter Who Spilled the Secret Behind the U.S. Navy’s Victory at Midway, was published by the Naval Institute Press in October 2017. Carlson holds degrees from University of Oregon and Stanford; he lives with his wife in Silver Spring, MD.
The Zodiac Ciphers - What do we know, and when do we stop trying to solve them?
 
37:36
http://zodiackillerciphers.com This is a talk I gave at the 2015 Cryptologic History Symposium on October 22, 2015. I've been studying the Zodiac ciphers for a while now, and this presentation is a culmination of my research. The talk was part of the "Ciphers and Crime" panel moderated by FBI historian John Fox. Fellow panelists included FBI Cryptanalysis and Racketeering Records Unit chief Dan Olson and encryption technology author Klaus Schmeh. For much more information about the Zodiac Ciphers, please visit http://zodiackillerciphers.com Some bits of the audio dropped out due to technical issues with my sound recorder - apologies for the parts that are hard to understand! BONUS MATERIAL: At the end of the video, I recorded some new material on miscellaneous things I didn't have time to include in the presentation. ERRATA: At 28m59s, I say the 408 is missing a word or phrase between parts 1 and 2. But actually it is missing between parts 2 and 3.
Views: 127820 David Oranchak
The Hunt For The Zodiac Killer: Code Breakers Unite | Premieres Nov. 14 | History
 
02:02
HISTORY delves into the mystery of the Zodiac Killer while on a mission to crack the code. Throughout the early 1960s and 1970s, the Zodiac Killer, one of history’s most famous unidentified serial murderers, terrorized America in a spree of heinous attacks, sending taunting letters and codes filled with bizarre and ancient symbols. This code has baffled some of the greatest minds in cryptology for over 50 years. HISTORY’s new nonfiction limited series, “The Hunt For The Zodiac Killer” opens up a new investigation into the mystery of this twisted serial assassin. Premiering on Tuesday, November 14 at 10PM ET/PT, this five-part limited series, features a team of top investigators and code-breakers, working in tandem with a super-computer, known as CARMEL, the first of its kind programmed to think like a killer. This team believes they may have broken a significant portion of the diabolically complicated code, Z340, and have been granted unprecedented access to police files, new witnesses, new clues, and the cooperation of representatives of the CIA and FBI. Subscribe for more HISTORY: http://www.youtube.com/subscription_center?add_user=historychannel Newsletter: https://www.history.com/newsletter Website - http://www.history.com Facebook - https://www.facebook.com/History Twitter - https://twitter.com/history Google+ - https://plus.google.com/+HISTORY HISTORY®, now reaching more than 98 million homes, is the leading destination for award-winning original series and specials that connect viewers with history in an informative, immersive, and entertaining manner across all platforms. The network’s all-original programming slate features a roster of hit series, epic miniseries, and scripted event programming. Visit us at HISTORY.com for more info.
Views: 27038 HISTORY
Naval Heritage | Jonathan Parshall: The Untold Story of the Battle of Midway
 
50:01
June 3, 2014 NEWPORT, R.I. -- Jonathan Parshall, historian and co-author of the book "Shattered Sword: The Untold Story of the Battle of Midway," delivers a presentation about the Battle of Midway to students, staff and faculty at U.S. Naval War College (NWC) in Newport, Rhode Island. The Battle of Midway, which took place June 4-7, 1942, was considered the high water mark for the Japanese navy and the turning point of the war in the Pacific during World War II. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 69505 usnavalwarcollege
21. Cryptography: Hash Functions
 
01:22:01
MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: Srinivas Devadas In this lecture, Professor Devadas covers the basics of cryptography, including desirable properties of cryptographic functions, and their applications to security. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 65463 MIT OpenCourseWare
CIPHERS - Decoding The Great Seal
 
01:43
Featured In This New Video Collection Is The 1st Great Seal of The United States And The 'Codex Gigas' A Mystical Magical Royal Treasure Historically Known As The Devils Bible. Historically The Codex Gigas Is A Spoil of War Taken From The Royal Treasury of The Holy Roman Emperor 'Rudolph II' By The Plundering Swedish Army And One Story Is Rudolph Had Borrowed The Book From A Monastery For His Art Exhibit & Occult Studies And Never Returned It. The Codex Gigas Is Believed To Be Written By A Mysterious 'Bohemian Monk' Who Sold His Soul To The Devil. Due To Its Old Age The Codex Gigas Is Kept Under A Custom Shroud For Preservation Purposes And Because of Its Priceless Value The Codex Is Sealed In A Guarded Vault At The Swedish Royal Library. LEGENDS AND HISTORICAL FACTS: (1.) The Codex Gigas Is A Giant Book of Questionable Origin; Almost 1000 Years Old; And A National Treasure Once Counted To Be The 8th Wonder of The World. (2.) The Codex Gigas Is The Largest Medieval Manuscript Known To Exist On Earth; Each Page In The Devils Bible Is A Animal Skin And The Giant Book Recently Made International Headlines And Vented For One Hour In A National Geographic Special. (3.) Legend Is Nobody Knows Who Wrote The Devils Bible or What Inspired Its Writer, The Other Legend Is Nobody Knows Who Designed The 1st Great Seal or What Inspired Its Designer. (4.) Another Legend Is A Mysterious Hooded/Cloaked Figure of A Man Gave Thomas Jefferson The Design For The Great Seal of The USA. (5.) There Is Another Legend Related To This Mystical Magical Tale From A Crypt, The Legend of A Dead Man Who Claimed To Be "The Truth" Born In Bethlehem. Legend Is The Truth Was Hated And Betrayed And Sold For 30 Pieces of Silver To Be Brutally Edited; Wrapped In A Custom Shroud For Preservation Purposes; And Sealed In A New Vault Until The Edited Truth Magically Escaped The Vault Un-Edited To Be Known & Realised Again. OTHER MISC NOTES: (A.) Codex Gigas Is Latin Interpreted: Great; Big; Giant; Renown Book. Therefore The Great Seal of The Great Book And The Great Painting of The Great Satan Bound Betwixt Twin Towers On The Most Filthy And Most Exploited Page of The Book . . .The Great Seal of The Pit. (B.) Annuit Coeptis; Novus Ordo Seclorum; E Pluribus Unum Are Also 'Latin Words' Which Until Recently Were Interpreted: The 'Official' Language of The Church & State. (C.) There Has Never Been A Democracy In History That Did Not Commit Suicide or Murder Itself. Therefore This New Revised Experiment 1776. LINKS TO THESE STORIES A Link To The 1st Great Seal Legend http://youtu.be/oNHko7d2jiI A Link To The Devils Bible Documentary http://youtu.be/zZ_A1I6d9iM A Link To My Live Journal Website: http://community.livejournal.com/bible_codes/
Views: 1307 44AlphaMale44
The Blockchain and Us (2017)
 
31:27
A film by Manuel Stagars http://www.blockchain-documentary.com For more interviews about the brave new world of blockchain technology and cryptocurrencies, see Manuel's podcast: http://www.theblockchainandus.com. In 2008, Satoshi Nakamoto invented bitcoin and the blockchain. For the first time in history, his invention made it possible to send money around the globe without banks, governments or any other intermediaries. The concept of the blockchain isn’t very intuitive. But still, many people believe it is a game changer. Economist and filmmaker Manuel Stagars portrays this exciting technology in interviews with software developers, cryptologists, researchers, entrepreneurs, consultants, VCs, authors, politicians, and futurists from the United States, Canada, Switzerland, the UK, and Australia. The Blockchain and Us is no explainer video of the technology. It gives a view on the topic, makes it accessible and starts a conversation about its potential wider implications in a non-technical way. The film deliberately poses more questions than it answers. For a deep dive, see all full-length interviews from the film here: http://www.blockchain-documentary.com/interviews Credits: Conversations with (in alphabetical order) David Birch Director of Innovation, Consult Hyperion Guildford, UK Perianne Boring Founder & President, Chamber of Digital Commerce Washington, USA Christian Decker Core Tech Engineer, Blockstream Zurich, Switzerland Taylor Gerring Co-Founder, Ethereum Zug, Switzerland Marco Carlo Grossi Director Audit & Risk Advisory, Deloitte Switzerland Zurich, Switzerland Caitlin Long Chairman of the Board & President at Symbiont.io New York, USA R. Jesse McWaters Financial Innovation Lead, World Economic Forum New York, USA Paul Meeusen Head Finance and Treasury Services, Swiss Re Zurich, Switzerland Dolfi Müller Mayor of the City of Zug Zug, Switzerland Matthew Roszak Co-Founder & Chairman, Bloq Chicago, USA Guido Rudolphi Founder, Cryptocash Uster, Switzerland Jan Seffinga Partner, Deloitte Switzerland Zurich, Switzerland Elizabeth Stark Co-Founder & CEO, Lightning San Francisco, USA Alex Tapscott Founder & CEO, Northwest Passage Ventures Co-Author "Blockchain Revolution" Toronto, Canada Lars Thomsen Chief Futurist & Founder, Future Matters Zurich, Switzerland Eric Van der Kleij Founder Adeptra, London Tech City, Level39. Adviser UK Govt, Kickstart Accelerator London, UK Roger Wattenhofer Professor, Distributed Computing Group, Swiss Federal Institute of Technology (ETH) Zurich, Switzerland Rik Willard Founder & Managing Director, Agentic Group New York, USA Steve Wilson Digital Identity Innovator & Analyst Sydney, Australia Additional conversations and special thanks (in alphabetical order): Iris Belle, Ben Bledsoe, Thomas Bromehead, Richard Cheng, Dario Duran, Marie Farrar Knowles, Olga Feldmeier, Sony Fricker, Daniel Gasteiger, Daniel Grassinger, Johs. Hoehener, Richard Kastelein, Leanne Kemp, Thomas Kern, Francine Klopfenstein, Veronica Lange, Claire LaRocca, Adriano B. Lucatelli, Christian Mäder, Ruedi Maeder, Luzius Meisser, Michael Monceaux, Martin Müller, Mia Mutic, Ian Petchenik, Nathaniel Popper, Ramon Quesada, Kamesh Raghavendra, Brian Rogers, Jouko Salonen, Vadim Shamigulov, Raffaela Stelzer, Don Tapscott, Elizabeth Wesson Many thanks to all conversation partners and all others who made this film possible Additional thanks (in alphabetical order): Agentic Group, Blockchain News, Blockstream, Bloq, Chamber of Digital Commerce, Constellation Research, Consult Hyperion, Cryptocash, Deloitte Switzerland, Ethereum Foundation, Everledger, Flightradar24, Future Matters, ISO-20022.ch, Lightning, Lockstep Consulting, Municipality of Zug, nexussquared, Northwest Passage Ventures, Swiss Federal Institute of Technology (ETH), Swiss Re, Symbiont, World Economic Forum (WEF), Zurich Airport Recording of live air traffic courtesy of Flightradar24 Chinese subtitles: Richard Cheng Dutch subtitles: Rein Jonkman French translation: Thomas Bromehead Portuguese subtitles: Caio Rearte Russian subtitles: Vadim Shamigulov, Sergey Sevantsyan Spanish subtitles: Jose Felip Daras and Avalbit.org team Many thanks to all individuals and teams who contributed additional subtitles and translations. Cinematography, Editing, Music, Narration & Sound Design by Manuel Stagars © 2017 Manuel Stagars The goal of this film is to encourage the conversation about the economic and social impacts of blockchain technology. Participate in the comments and subscribe to the channel to stay in the loop. To enable more films like this one, feel free to support my projects at https://www.manuelstagars.com/support Listen to the song in the end credits: https://soundcloud.com/stagars/low-sea-end-credits-from-the-blockchain-and-us
Views: 415344 Manuel Stagars
8 Bells Lecture | Norman Friedman: Naval Air Defence from Biplanes to the Cold War
 
33:54
Norman Friedman, “Fighters Over the Fleet: Naval Air Defence from Biplanes to the Cold War,” Eight Bells Book Lecture, Naval War College Museum, March 1, 2018. “Fighters Over the Fleet” is an account of the parallel evolution of naval fighters for fleet air defense and the ships they sought to defend. This volume concentrates on the three main advocates of carrier warfare: the Royal Navy, the U.S. Navy, and the Imperial Japanese Navy. Because radar was not invented until the mid-1930s, fleet air defense was a primitive effort for flyers during the 1920s. Once the innovative system was developed and utilized, organized air defense became viable. Thus major naval-air battles of the Second World War—like Midway, the “Pedestal” convoy, the Philippine Sea and Okinawa—are portrayed as tests of the new technology. However, even radar was ultimately found wanting by the Kamikaze campaigns, which led to postwar moves toward computer control and new kinds of fighters. After 1945, the novel threats of nuclear weapons and stand-off missiles compounded the difficulties of naval air defense. The second half of the book covers the U.S. and Royal Navies’ attempts to resolve these problems by examining the U.S. experience in Vietnam and British operations during the Falklands War. The book then turns to the ultimate U.S. development of techniques and technology to fight the Outer Air Battle in the 1980s before concluding with the current state of technology supported carrier fighters. Dr. Friedman has been concerned throughout his career with the way in which policy and technology intersect, in fields as disparate as national missile defence, nuclear strategy, and network-centric warfare. An internationally known strategist and naval historian, he spent more than a decade at a major US think-tank, and another decade as consultant to the Secretary of the Navy. Dr Friedman has written more than 40 books on naval strategy and technology, including an award-winning account of the US Cold War Strategy and histories of British (and Commonwealth) and U.S. aircraft carriers, cruisers, destroyers, and frigates as well as U.S. submarines. He contributes a monthly column on world naval developments to the Naval Institute’s Proceeding magazine and writes articles for journals worldwide. Dr. Friedman holds a PhD.in physics from Columbia University, New York. He lectures widely on defence issues in forums such as the National Defence University, the Naval War College and the Royal United Services Institute. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 1613 usnavalwarcollege
158,962,555,217,826,360,000 (Enigma Machine) - Numberphile
 
11:52
The Nazi's Enigma Machine - and the mathematics behind it - was a crucial part of World War II. Flaw video at: http://www.youtube.com/watch?v=V4V2bpZlqx8 More links & stuff in full description below ↓↓↓ Brown papers on ebay: bit.ly/brownpapers Dr James Grime demonstrates the machine and discusses its many configurations. James' "day job" is touring with the Enigma machine - he could even visit you - see more at http://enigma.maths.org/content/project-officer NUMBERPHILE Website: http://www.numberphile.com/ Numberphile on Facebook: http://www.facebook.com/numberphile Numberphile tweets: https://twitter.com/numberphile Subscribe: http://bit.ly/Numberphile_Sub Videos by Brady Haran Patreon: http://www.patreon.com/numberphile Brady's videos subreddit: http://www.reddit.com/r/BradyHaran/ Brady's latest videos across all channels: http://www.bradyharanblog.com/ Sign up for (occasional) emails: http://eepurl.com/YdjL9 Numberphile T-Shirts: https://teespring.com/stores/numberphile Other merchandise: https://store.dftba.com/collections/numberphile
Views: 3496704 Numberphile
8 Bells Lecture | Rear Adm. Chris Parry: Falklands War and the Importance of Naval Corporate Memory
 
58:10
Rear Adm. Chris Parry, "My Falklands War and the Importance of Naval Corporate Memory," Eight Bells Book Lecture, Naval War College Museum, March 15, 2016. Rear Admiral Chris Parry will describe his personal experience of combat in the Falklands War of 1982, which included the detection and disabling of the Argentinian submarine Santa Fe (ex-USS Catfish), the rescue of 16 Special Air Service troopers from a glacier in a hurricane and the amphibious landings at San Carlos Water which led to the successful capture of the Falkland Islands. He will also indicate some lessons that remain relevant today and for the future, as well as highlighting how every generation forgets the lessons of the past, in terms of doctrine, training and technology. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 17074 usnavalwarcollege
Code Girls: The Untold Story of the American Women Code Breakers of World War II
 
01:18:25
Liza Mundy recently published "Code Girls: The Untold Story of the American Women Code Breakers of World War II." Using the Veterans History Project collections, she was able to gather background information and research context. Mundy will give a talk on the book and the process she went through to conduct her research at the Library of Congress.
Views: 2653 LibraryOfCongress
J.R. Watts: Shroud Codes In The Bible • The Scott Helmer Show - 03.27.17
 
02:03:44
Source: https://www.spreaker.com/user/scotthelmershow/j-r-watts-shroud-codes-in-the-bible-the-_2 SHROUD OF TURIN MYSTERY SOLVED BY GOV'T CODE-BREAKER! In 2012; former government investigator, intelligence analyst & code-breaker, J.R. Watts, launched a 5 year research project to finally answer the question: Did Christ's disciples hide clues about the SHROUD OF TURIN in the New Testament? What he discovered were cryptic forms of word camouflage known to cryptologists as: open codes, null ciphers & jargon codes, arranged in diffused layers of data in the Bible. They describe the Shroud in intermittent signals, symbolic references, disguised metaphors & phonetically spelled ciphers. But their common denominator was JESUS' IMAGE ON THE SHROUD! Watts used the same code-breaking methods the CIA & NSA utilize when cracking codes, such as pattern recognition, quantitative data analysis, detection of graphical deception, cluster analysis, data mining, frequency analysis, camouflage signaling & correspondence analysis. Learn how the disciples became adept at layering their words with telltale hints about the Shroud. See why these codes remained INVISIBLE to the clergy & Shroud experts, who lack cryptology skills. Watts also points to Old Testament verses that cloaked the Shroud in the abstract of Scripture. He says the Shroud Codes were no accident; they were there all the time, waiting for us, like a hidden dossier. It was the safest way to write about Christ's miraculous image because it subtly obscured the medium on which it existed: a shroud. The SCIENCE OF CRYPTOLOGY proves the Shroud of Turin covered the body of Jesus! BONUS INFO: J.R. WATTS REVEALS THE HARBINGERS ALL THE PROPHECY WATCHERS MISSED: Learn about the resurrection of the Exodus 32 Golden Calf Idol, REBORN in New York City's New Millennium Cow Parade in 2000. In Moses' time 3,000 people were killed in 1 day for false idolatry. On 9-11; 3,000 people were again slain in 1 day, surrounded by the SAME false idols. The book has 6 dozen color photos & free 3D glasses to view the Shroud in 3D! J.R. Watts worked as an investigator for various government agencies in New York City for more than two decades, as well as for government intelligence contractors. But behind the scenes; he was also a code-breaker, having been educated in cryptanalysis and cryptography. He was also a Shroud of Turin researcher.
Views: 383 Scott Helmer
Change - In A Sippy Cup
 
03:00
Featured In This Video Collection Is The 1st Great Seal of The USA And The 'Codex Gigas' A Mystical Magical Royal Treasure Historically Known As The Devils Bible. Historically The Codex Gigas Is A Spoil of War Taken From The Royal Treasury of The Holy Roman Emperor 'Rudolph II' By The Plundering Swedish Army And One Story Is Rudolph Had Borrowed The Book From A Monastery For His Art Exhibit & Occult Studies And Never Returned It. The Codex Gigas Is Believed To Be Written By A Mysterious 'Bohemian Monk' Who Sold His Soul To The Devil. Due To Its Old Age The Codex Gigas Is Kept Under A Customized Shroud For Preservation Purposes And Because of Its Priceless Value The Codex Is Sealed In A Guarded Vault At The Swedish Royal Library In Stockholm. INTERESTING LEGENDS AND HISTORICAL FACTS: (1.) The Codex Gigas Is A Giant Book of Questionable Origin; Almost 1000 Years Old; And A National Treasure Once Counted To Be The 8th Wonder of The World. (2.) The Codex Gigas Is The Largest Medieval Manuscript Known To Exist On Earth; Each Page In The Devils Bible Is A Animal Skin And The Giant Book Recently Made International Headlines And Vented For One Hour In A National Geographic Tell A Vision Special. (3.) Legend Is Nobody Knows Who Wrote The Devils Bible or What Inspired Its Writer, The Other Legend Is Nobody Knows Who Designed The 1st Great Seal of The United States or What Inspired Its Designer. (4.) American Legend Is A Mysterious Hooded/Cloaked Figure of A Man Gave Thomas Jefferson The Design For The 1st Great Seal of The USA. (5.) There Is Another Legend Related To This Mystical Magical Tale From A Crypt, The Legend of A Dead Man Who Claimed To Be "The Truth" Born In Bethlehem. Legend Is The Truth Was Hated And Betrayed And Sold For 30 Pieces of Silver To Be Brutally Edited; Wrapped In A Custom Shroud 'For Preservation Purposes' And Sealed In A New Vault Until The Edited Truth Magically Escaped The Vault Un-Edited To Be Known & Realised Again. OTHER MISC NOTES: (A.) Codex Gigas Is Latin Interpreted: Great; Big; Giant; Renown Book. Therefore The Great Seal of The Great Book And The Great Painting of The Great Satan Bound Betwixt Twin Towers On The Most Filthy And Most Exploited Page of The Book . . .The Great Seal of The Pit. (B.) Annuit Coeptis; Novus Ordo Seclorum; And E Pluribus Unum Are Also 'Latin Words' Which Until Recently Were Interpreted: The 'Official' Language of The Church & State. (C.) There Has Never Been A Democracy In History That Did Not Commit Suicide or Murder Itself. Therefore This New Revised Experiment 1776. LINKS TO THESE STORIES A Link To The 1st Great Seal Legend http://youtu.be/oNHko7d2jiI A Link To The Devils Bible Documentary http://youtu.be/zZ_A1I6d9iM A Link To My Live Journal Website: http://community.livejournal.com/bible_codes/
Views: 634 44AlphaMale44
American History - Part 039 -  Jefferson's Death
 
13:14
Welcome to THE MAKING OF A NATION -- American history in VOA Special English. Thomas Jefferson left the White House in March of 1809. His secretary of state, James Madison, had been elected president. Jefferson believed the nation was in good hands. He returned to Monticello, his country home in Virginia, and never went back to Washington again. But Jefferson and the new president exchanged letters often. Jefferson offered advice on a number of problems that Madison faced as the nation's fourth president. There were many visitors to Monticello. But Jefferson was happiest when he could discuss books, government, science and education. This week in our series, Maurice Joyce and Kay Gallant discuss the final days of Thomas Jefferson and his lasting contributions -- to Virginia and the nation. Jefferson did not wait long to begin working to improve education in Virginia. A group of men decided to build a college at Charlottesville, near Jefferson's home. Jefferson immediately offered to take a leading part in starting the school. He said he would plan the buildings and also plan what the students would study. He wrote to many of his friends -- experts in education. He asked for their advice. One of the experts told Jefferson he should not include religion among the studies. Jefferson agreed. But he understood that leaving out religious studies would cause problems. He explained it this way: "We cannot always do what is absolutely best. Those with whom we act have different ideas. They have the right and power to act on their ideas. We make progress only one step at a time. To do our fellow men the most good, we must lead where we can, follow where we cannot. But we must still go with them, watching always for the moment we can help them move forward another step." The legislature, however, agreed to part of the plan. It approved a bill to help pay the cost of educating poor children. And it agreed to spend 15,000 dollars each year for a university. There was much debate about where the university should be built. Several other towns wanted the school. Finally, Charlottesville was chosen. By this time, Jefferson had completed plans for the university buildings. He borrowed many of his ideas from the beautiful buildings of ancient Greece and Rome. The buildings were so well planned that one hundred years later, when the university was to put up a new building, the builder could find no reason to change the plans drawn by Jefferson. Work began on the university immediately. But it was six years before the school was open to students. Jefferson was there almost every day, watching the workmen. He was quick to criticize any mistake or work that was not done well. When he was sick and not able to go down to the university, he would watch the work through a telescope from a window of his home. The cost of the university kept growing. And Jefferson had to struggle to get the legislature to pay for it. He also worked hard to get the best possible professors to teach at the university. He sent men throughout the United States to find good teachers. He even sent a man to Europe for this purpose. Finally, in March, 1825, the University of Virginia opened. Jefferson's health had suffered during his years of work for the university. He was eighty-two years old and feeling his age. He suffered from rheumatism and diabetes, and was so weak he could walk only short distances. Jefferson also found his memory was failing. He knew he did not have much longer to live. He told a friend one day: "When I look back over the ranks of those with whom I have lived and loved, it is like looking over a field of battle. All fallen." As his health grew worse, Jefferson turned his thoughts to death. He wrote how he wished to be buried. He wanted a simple grave on the mountainside below his house. He drew a picture of the kind of memorial he wanted put at his grave. On this stone he wanted the statement: "Here was buried Thomas Jefferson -- author of the Declaration of American Independence, of the Virginia Law for Religious Freedom, and Father of the University of Virginia." On the Fourth of July, 1826, the nation began its celebration of the fiftieth anniversary of the Declaration of Independence. Then, from Boston, came news that former president John Adams had died. His last words were: "Thomas Jefferson still lives." But Adams was wrong. At ten minutes before ten in the morning, on that same Fourth of July, his friend, Thomas Jefferson, had died. As the news of the deaths of the two great men spread across the country, the celebrations turned to mourning and sorrow. Jefferson was buried the next day, as he had ordered, in a simple grave on the quiet mountainside.
Views: 6843 ListenAndReadAlong
Code Girls: The Untold Story of the American Women Code Breakers of World War II
 
01:09:27
In the tradition of Hidden Figures and The Girls of Atomic City, Liza Mundy’s Code Girls is the astonishing, untold story of the young American women who cracked key Axis codes, helping to secure Allied victory and revolutionizing the field of cryptanalysis. A book signing will follow the program.
Views: 4905 US National Archives
8 Bells Lecture | Dan Urish: The story of Diego Garcia
 
01:14:31
Dan Urish, "Coral, Copra, and Concrete," Eight Bells Book Lecture, Naval War College Museum, Jan. 21, 2016. The story of Diego Garcia, B.I.O.T, its history, construction of the U.S. base by SeaBees, and its expansion into the U.S. Navy Support Facility Diego Garcia, providing logistic support to operational forces forward deployed to the Indian Ocean and Persian Gulf areas of responsibility in support of national policy objectives. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 2571 usnavalwarcollege
Emancipation Proclamation Exhibit - VOA Mosaic in Special English
 
03:07
Emancipation Proclamation Exhibit 01/04/2013 This week, the United States marked the 150th anniversary of the signing of the Emancipation Proclamation. The document freed slaves in the southern states that were fighting to secede --- to separate from the United States. President Abraham Lincoln signed the document on Jan. 1, 1863. The federal government held a public exhibition of the Emancipation Proclamation this week in Washington. Christopher Cruise tells about the rare showing. The National Archives put the proclamation on display for just a few days. It is a rare copy because it is signed by President Lincoln, and because it has the presidential seal, although the years have destroyed much of the seal. While it did not immediately free slaves in all of the United States, the Proclamation did lead to the approval of the 13th Amendment to the Constitution. That measure ended slavery in the United States. The fight over the 13th amendment is the subject of director Steven Spielberg's current movie "Lincoln." Reginald Washington is an expert in African-American documents at the National Archives. He says the document changed the debate about why the Civil War was being fought. "The proclamation, however, did bring about a fundamental change in the character of the war. With a stroke of Lincoln's pen, a war to preserve the union had overnight become a war for human liberation. For the nearly 4,000,000 slaves held in bondage, it was a symbol of hope. It gave confirmation to their beliefs and insistence that the war should be -- and was for them -- a war to secure their freedom." Mr. Washington says many historians and scholars believe the Emancipation Proclamation is one of the greatest documents in human freedom. He says some historians believe it is as important in American history at the Declaration of Independence. The National Archives has produced a free e-book on the Emancipation Proclamation. The one hundred fifty year old document was not well cared-for in the past. To protect it from further damage, officials permit its display for only 30 hours a year. However, the National Archives is considering the proclamation's display in other parts of the country this year to celebrate its anniversary. http://learningenglish.voanews.com/content/article/1577454.html
Views: 2782 ListenAndReadAlong
8 Bells Lecture | Thomas Wildenberg: Mitchell’s War with the Navy
 
58:56
Thomas Wildenberg, "Mitchell’s War with the Navy: the Interwar Rivalry Over Air Power," Eight Bells Book Lecture, Naval War College Museum, Sept. 25, 2014. This book provides the background to the intense political struggle over limited resources and funding following World War I and set the stage for the on-going dispute between the Army and Navy leading up to World War II. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 1712 usnavalwarcollege
How a Nazi Enigma machine works (and how to break its code)
 
02:09
Watch more CNET News videos: http://bit.ly/1LGPOmk It might look just like a typewriter, but the Enigma machine was a fiendishly complex encryption device. Here's how it worked, and how it was broken. Subscribe to CNET: http://bit.ly/17qqqCs Watch more CNET videos: http://www.cnet.com/video Follow CNET on Twitter: http://twitter.com/CNET Follow CNET on Facebook: http://www.facebook.com/cnet
Views: 35019 CNET
PhreakNIC   Elonka Dunin   Famous Unsolved Codes
 
01:14:33
Elonka goes over some of the world's most famous unsolved codes, including the CIA's Kryptos sculpture, the centuries-old Voynich Manuscript, and inspiration for "National Treasure," the "Beale Papers". Elonka Dunin (@ElonkaDunin) is a professional game developer, writer, and cryptographer. She is webmistress of two popular crypto-related websites which contain information about the world's most famous unsolved codes. As of 2014, her elonka.com website has had nearly five million page views. In 2000 she was awarded a prize for being the first person to crack the 1999 PhreakNIC v3.0 Code. In 2003 she led the team that cracked the famous Cyrillic Projector cipher, which turned out to contain extracts of classified KGB documents. In 2006 she authored "The Mammoth Book of Secret Codes and Cryptograms", which has been published internationally with multiple re-printings. Bestselling author Dan Brown honored Elonka by naming one of the characters in his Da Vinci Code sequel The Lost Symbol after her: "Nola Kaye" is an anagrammed form of "Elonka". She has also been featured by the popular webcomic Penny Arcade, where she created a cipher that dovetailed with the daily comic. In other hobbies, Dunin is an avid Wikipedia editor, was elected as an administrator in 2007, and has been a significant contributor to over 500 articles, especially in topics related to the Crusades and medieval history. When not in front a computer, she's probably out geocaching. PhreakNIC is a technology conference held annually in Middle Tennessee. PhreakNIC started as an infosec hacker convention but has expanded over the years to include the maker scene, ham radio, DIY engineering, space and science nerds, the skeptics community, electronic and experimental music, gamers, anime, and general geekery.
Views: 168 phreaknicstaff
Pam's NSA Crypto tour continues...radio/phone docent Howell McConnell is family!
 
09:46
The amazing tour continues. Gosh, I love this place. At 13:19, I introduce myself to the docent I was directed to for the radio and phone and computer encryption room...who turns out to be a direct relative! At 14:00, docent Howell McConnell then tells me of our ancestry as relates to a cousin of King Arthur. I also find out he's written a history of the national computing center, and the Orange book. My cousin _is_ a color!
Views: 361 Pamela Lynn Howell
8 Bells Lecture I Norman Friedman: Fighting the Great War at Sea
 
29:36
Norman Friedman, "Fighting the Great War at Sea," Eight Bells Book Lecture, Naval War College Museum, Oct. 9, 2014. Norman Friedman discusses his book and concentrates on how each side tried to use or deny the sea to the other during this global war as it examines strategic, technical, and tactical approaches to sea control. Fought during a time of rapidly changing ship and weapon technology, the war brought new concepts in tactical practices and the use of command and control. The perceived lessons from this war set the stage for the use of naval forces during the Second World War. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 3804 usnavalwarcollege
Book Discussion: Cyber War Will Not Take Place
 
59:58
Author Thomas Rid discusses his new book, Cyber War Will Not Take Place. He argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways. (ref: iss_20130913)
Views: 925 WoodrowWilsonCenter
CROSSROADS - Separation of Church & State
 
03:00
Featured In This New Collection Is The First Great Seal of The USA And The 'Codex Gigas' A Mystical Magical Royal Treasure Historically Known As "The Devils Bible". Historically The Codex Gigas Is A Spoil of War Taken From The Royal Treasury of The Holy Roman Emperor 'Rudolph II' By The Plundering Swedish Army And One Story Is Rudolph Had Borrowed The Book From A Monastery For His Art Exhibit & Occult Studies And Never Returned The Book. The Codex Gigas Is Believed To Be Written By A Mysterious 'Bohemian Monk' Who Sold His Soul To The Devil. Due To Its Old Age The Codex Gigas Is Kept Under A Customized Shroud For Preservation Purposes And Because of Its Priceless Value The Codex Gigas Is Sealed In A Guarded Vault At The Royal Library In Stockholm. LEGENDS AND HISTORICAL FACTS: (1.) The Codex Gigas Is A Giant Book of Questionable Origin; Almost 1000 Years Old; And A National Treasure Once Counted To Be The 8th Wonder of The World. (2.) The Codex Gigas Is The Largest Medieval Manuscript Known To Exist On Earth; Each Page In The Devils Bible Is A Animal Skin And The Giant Book Recently Made International Headlines And Vented For One Hour In A National Geographic Special. (3.) Legend Is Nobody Knows Who Wrote The Devils Bible or What Inspired Its Writer, The Other Legend Is Nobody Knows Who Designed The 1st Great Seal or What Inspired Its Designer. (4.) Another Legend Is A Mysterious Hooded/Cloaked Figure of A Man Gave Thomas Jefferson The Design For The Great Seal of The USA. (5.) There Is Another Legend Related To This Mystical Magical Tale From A Crypt, The Legend of A Dead Man Who Claimed To Be "The Truth" Born In Bethlehem, Legend Is The Truth Was Hated And Betrayed And Sold For 30 Pieces of Silver To Be Brutally Edited; Wrapped In A Custom Shroud; And Sealed In A New Vault Until The Edited Truth Magically Escaped The Vault Un-Edited To Be Known Again. OTHER MISC NOTES: (A.) Codex Gigas Is Latin Interpreted: Great; Big; Giant; Renown Book. Therefore The Great Seal of The Great Book And The Great Painting of The Great Satan Bound Betwixt Twin Towers On The Most Filthy And Most Exploited Page of The Book . . .The Great Seal of The Pit. (B.) Annuit Coeptis; Novus Ordo Seclorum; And E Pluribus Unum Are Also 'Latin Words' Which Until Recently Were Interpreted And Legally Defined: The 'Official' Language of The Church & State. (C.) There Has Never Been A Democracy In History That Did Not Commit Suicide or Murder Itself. Therefore This New Revised Experiment 1776. LINKS TO THESE STORIES A Link To The 1st Great Seal Legend http://youtu.be/oNHko7d2jiI A Link To The Devils Bible Documentary http://youtu.be/zZ_A1I6d9iM A Link To My Live Journal Website: http://community.livejournal.com/bible_codes/
Views: 550 44AlphaMale44
8 Bells Lecture | Chuck Veit: The U.S. Navy's Secret Torpedo Program of 1862
 
49:19
Chuck Veit, "Sea Miner: The U.S. Navy's Secret Torpedo Program of 1862," Eight Bells Book Lecture, Naval War College Museum, Jan. 28, 2016. Based on research on NWC Archives, our first-ever program to develop an automobile torpedo was not at Goat Island in 1869, but in the waters off the Brooklyn Navy Yard in 1862-3, and the weapon that almost came out of that project would have immediately made us the most powerful navy in the world. It was actually completed, approved and the orders to get it into production cut; that it was never deployed was a function of the security that surrounded every aspect of the work. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 1363 usnavalwarcollege
SEASONING THE WITCH
 
02:01
Featured In This New Video Collection Is The 1st Great Seal of The United States And The 'Codex Gigas' A Mystical Magical Royal Treasure Historically Known As The Devils Bible. Historically The Codex Gigas Is A Spoil of War Taken From The Royal Treasury of The Holy Roman Emperor 'Rudolph II' By The Plundering Swedish Army And One Story Is Rudolph Had Borrowed The Book From A Monastery For His Art Exhibit & Occult Studies And Never Returned It. The Codex Gigas Is Believed To Be Written By A Mysterious 'Bohemian Monk' Who Sold His Soul To The Devil. Due To Its Old Age The Codex Gigas Is Kept Under A Custom Shroud For Preservation Purposes And Because of Its Priceless Value The Codex Is Sealed In A Guarded Vault At The Swedish Royal Library. LEGENDS AND HISTORICAL FACTS: (1.) The Codex Gigas Is A Giant Book of Questionable Origin; Almost 1000 Years Old; And A National Treasure Once Counted To Be The 8th Wonder of The World. (2.) The Codex Gigas Is The Largest Medieval Manuscript Known To Exist On Earth; Each Page In The Devils Bible Is A Animal Skin And The Giant Book Recently Made International Headlines And Vented For One Hour In A National Geographic Special. (3.) Legend Is Nobody Knows Who Wrote The Devils Bible or What Inspired Its Writer, The Other Legend Is Nobody Knows Who Designed The 1st Great Seal or What Inspired Its Designer. (4.) Another Legend Is A Mysterious Hooded/Cloaked Figure of A Man Gave Thomas Jefferson The Design For The Great Seal of The USA. (5.) There Is Another Legend Related To This Mystical Magical Tale From A Crypt, The Legend of A Dead Man Who Claimed To Be "The Truth" Born In Bethlehem. Legend Is The Truth Was Hated And Betrayed And Sold For 30 Pieces of Silver To Be Brutally Edited; Wrapped In A Custom Shroud For Preservation Purposes; And Sealed In A New Vault Until The Edited Truth Magically Escaped The Vault Un-Edited To Be Known & Realised Again. OTHER MISC NOTES: (A.) Codex Gigas Is Latin Interpreted: Great; Big; Giant; Renown Book. Therefore The Great Seal of The Great Book And The Great Painting of The Great Satan Bound Betwixt Twin Towers On The Most Filthy And Most Exploited Page of The Book . . .The Great Seal of The Pit. (B.) Annuit Coeptis; Novus Ordo Seclorum; E Pluribus Unum Are Also 'Latin Words' Which Until Recently Were Interpreted: The 'Official' Language of The Church & State. (C.) There Has Never Been A Democracy In History That Did Not Commit Suicide or Murder Itself. Therefore This New Revised Experiment 1776. LINKS TO THESE STORIES A Link To The 1st Great Seal Legend http://youtu.be/oNHko7d2jiI A Link To The Devils Bible Documentary http://youtu.be/zZ_A1I6d9iM A Link To My Live Journal Website: http://community.livejournal.com/bible_codes/
Views: 1049 44AlphaMale44
8 Bells Lecture | Niall MacKay: A Bayesian study of the Battle of the Dogger Bank
 
01:15:22
Niall MacKay, "Weighing the Fog of War: A Bayesian study of the Battle of the Dogger Bank, 24th January 1915," Eight Bells Book Lecture, Naval War College Museum, Feb. 4, 2016. The Battle of Dogger Bank was a naval battle fought near the Dogger Bank in the North Sea on 24 January 1915, during the First World War, between squadrons of the British Grand Fleet and the German High Seas Fleet. Even though it was considered a British victory, both Britain and Germany soon replaced commanders who were thought to have shown poor judgement. Both navies made some changes to equipment and procedures in response to problems identified during the battle. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 5120 usnavalwarcollege
U.S. History: Navajo Code Talkers
 
06:00
A brief summary about the Navajo's service in World War II. Click on the video to view and learn more.
Views: 838 Kathy Cuzco

Job cover letter email title for job
Writing a letter of complaint about service
Diversity officer cover letter
Reviews essay writing service
Annotated bibliography the hunger games