Home
Search results “History of cryptology books of the old”
Famous UNCRACKED Codes That STILL Exist!
 
12:26
Check out these famous uncracked codes that still exist! From secret riddles to unsolved mysteries, this top 10 list contains cryptography that's still unexplained today! Subscribe For New Videos! http://goo.gl/UIzLeB Watch our "Most CRAZY Things Ancient Egyptians Did!" video here: https://youtu.be/T0zERiMJFQo Watch our "Most CRAZY Things Ancient Greeks Did!" video here: https://youtu.be/-JkhVvn_dow Watch our "REAL Evidence That Aliens EXIST!" video here: https://youtu.be/dtwJT2eilx0 10. Chinese Gold Bar Cipher In 1933, General Wang in Shanghai, China, allegedly received seven gold bars. These gold bars appear to represent metal certificates related to a bank deposit with a U.S. Bank. The gold bars themselves have pictures, Chinese writing, some form of script writing, and cryptograms in Latin letters. Not surprisingly, experts debate concerning the validity of the claim for the deposit. It may help to resolve the dispute if someone can decipher the cryptograms on the bars. Someone translated the Chinese writing, which discusses a transaction in excess of $300,000,000. It also refers to these gold bars, which weigh a total of 1.8 kilograms. The rest remains a mystery. 9. D’agapeyeff Cipher The D’Agapeyeff cipher is an as-yet unbroken cipher that appears in the first edition of Codes and Ciphers, an elementary book on cryptography published by the Russian-born English cartographer Alexander D’Agapeyeff in 1939. Offered as a “challenge cipher” at the end of the book, it was not included in later editions. D’Agapeyeff supposedly admitted later to having forgotten how he had encrypted it. Some argue that the failure of all attempts at decryption is due to D’Agapeyeff incorrectly encrypting the original text. However, it has also been argued that the cipher may still be successfully attacked using computational methods such as genetic algorithms. Whatever those are. 8. The Beale Ciphers If this next one isn’t a hoax then the person who solves it could become very, very rich. This question of authenticity has bothered cryptoanalysts ever since these ciphers first appeared in an 1885 pamphlet called The Beale Papers, which recounts a fantastic story of buried treasure. According to the pamphlet, a man named Thomas Jefferson Beale, a man no one has proven even existed, discovered gold during an 1816 expedition into the American West. The treasure, as the story goes, was then transported to Bedford County, Virginia, and buried. The gold's secret location was allegedly provided by three cryptograms, of which one was already cracked. Unfortunately, the cracked code only detailed the type of treasure there and not a specific location. To find out anything more specific would involve cracking the two other ciphers. The problem is that figuring it out requires comparing them to unknown historical texts. The decrypted cipher, for example, used the Declaration of Independence. The first number, 115, corresponds with the first letter of the 115th word in the Declaration: "instituted." That means 115 stands for "I." So what are the translation texts for the other two ciphers? No one knows, and they may very well not exist at all. There are also questions over whether the other ciphers may just be unintelligible, as if the whole thing was made up by the pamphlet's author decades after the gold was supposed to have been discovered. 7. Dorabella In 1897, a 40-year-old composer named Edward Elgar sent an encrypted letter to 23-year-old Dora Penny, the stepdaughter of one of his friends. Why he sent it is part of the mystery and can only be answered if anyone ever cracks the code. To figure it out would involve deciphering 87 characters all made of strings of semi-circles oriented in different directions. Attempts at translating the cipher yielded a message just short of gibberish. Experts say that shorter ciphers are always harder to solve. Another theory has it that the code is an example of a distinct private language shared only between Penny and Elgar. If that's the case, then solving it may be simply impossible, since no one but them would understand the references. In 2016, a police officer in Cleveland believes he’s cracked at least part of the code, revealing a line of melody. Inspector Mark Pitt read 100 books on the Dorabella Cipher; he hopes to write one on his discoveries. Whether or not that’s really the meaning, though, remains to be seen. Origins Explained is the place to be to find all the answers to your questions, from mysterious events and unsolved mysteries to everything there is to know about the world and its amazing animals!
Views: 1358092 Origins Explained
Cryptography: Crash Course Computer Science #33
 
12:33
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure. Note: In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: https://www.youtube.com/watch?v=mYtvjijATa4 Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios Want to know more about Carrie Anne? https://about.me/carrieannephilbin The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Want to find Crash Course elsewhere on the internet? Facebook - https://www.facebook.com/YouTubeCrash... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 232302 CrashCourse
"The Lost Symbol" - Magic Squares and the Masonic Cipher
 
43:15
December 2, 2009 Dan Brown? The Lost Symbol? Masonic cipher? Albrecht Durers magic square? If you know about these things AND you can decipher the message below, then dont bother coming because you know as much as I do. If you dont know about them OR you cant decipher the message below, then by all means come and hear my presentation. Yes, we do have pizza. Ed Brumgnach http://www.qcc.cuny.edu/ecet/magicSquares.asp
Views: 953502 CUNYQueensborough
What is cryptography? | Journey into cryptography | Computer Science | Khan Academy
 
01:31
What is Cryptography? A story which takes us from Caesar to Claude Shannon. Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/caesar-cipher?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/algorithms/intro-to-algorithms/v/what-are-algorithms?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information). About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1 Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 795011 Khan Academy
CRYPTOLOGY - Decode The Great Seal
 
01:25
Featured In This Collection Is The 1st Great Seal of The United States And The 'Codex Gigas' A Mystical Magical Royal Treasure Historically Known As "The Devils Bible". Historically The Codex Gigas Is A Spoil of War Taken From The Royal Treasury of The Holy Roman Emperor 'Rudolph II' By The Plundering Swedish Army And One Story Is Rudolph Had Borrowed The Book From A Monastery For His Art Exhibit & Occult Studies And Never Returned It. The Codex Gigas Is Believed To Be Written By A Mysterious 'Bohemian Monk' Who Sold His Soul To The Devil. Due To Its Old Age The Codex Gigas Is Kept Under A Custom Shroud For Preservation Purposes And Because of Its Priceless Value The Codex Is Sealed In A Guarded Vault At The Royal Library In Stockholm. LEGENDS AND HISTORICAL FACTS: (1.) The Codex Gigas Is A Giant Book of Questionable Origin; Almost 1000 Years Old; And A National Treasure Once Counted To Be The 8th Wonder of The World. (2.) The Codex Gigas Is The Largest Medieval Manuscript Known To Exist On Earth; Each Page In The Devils Bible Is A Animal Skin And The Giant Book Recently Made International Headlines And Vented For One Hour In A National Geographic Tell A Vision Special. http://youtu.be/FSTVUU7fqMo (3.) Legend Is Nobody Knows Who Wrote The Devils Bible or What Inspired Its Writer, The Other Legend Is Nobody Knows Who Designed The 1st Great Seal or What Inspired Its Designer. (4.) Another Legend Is A Mysterious Hooded/Cloaked Figure of A Man Gave Thomas Jefferson The Design For Americas First Great Seal. http://youtu.be/id0CWnW24BI (5.) Another Legend Related To This Mystical Magical Tale From A Crypt Is The Legend of A Dead Man Who Claimed To Be "The Truth" Born In Bethlehem, Legend Is The Truth Was Hated And Betrayed And Sold For 30 Pieces of Silver To Be Brutally Edited; Wrapped In A Custom Shroud For Preservation Purposes; And Then Sealed In A New Vault Until The Edited Truth Magically Escaped The Vault Un-Edited To Be Known Again. OTHER MISC NOTES: (A.) Codex Gigas Is Latin Interpreted: Great; Big; Giant; Renown Book. Therefore The Great Seal of The Great Book And The Great Painting of The Great Satan Bound Betwixt Twin Towers On The Most Filthy And Most Exploited Page of The Book . . .The Great Seal of The Pit. (B.) Annuit Coeptis; Novus Ordo Seclorum; And E Pluribus Unum Are Also 'Latin Words' Which Until Recently Were Interpreted: The 'Official' Language of The Church & State. (C.) There Has Never Been A Democracy In History That Did Not Commit Suicide or Murder Itself. Therefore This New Revised Experiment 1776. You Are Welcome To Visit My WebSite @ http://community.livejournal.com/bible_codes/
Views: 1221 44AlphaMale44
Mystery Of Codex Gigas The 'Devil's Bible' Who Wrote Biggest Manuscript?
 
03:55
The mysterious Codex Gigas has a full-page colour image of the Devil Legend has it that a monk made a deal with the devil to create the text Handwriting analysis has revealed that the text was written by one scribe Read Full Story:http://www.cosmostv.org/2015/05/mystery-of-codex-gigas-devils-bible-who.html Latest Uploads From The Cosmos News https://www.youtube.com/playlist?list=PLdM_BWPQiR9C-uBWUfRBO4UnDU5YGhrcM
Views: 53941 The Cosmos News
Input Output | Malta
 
04:04
IOHK sponsor Financial Cryptography and Data Security conference 2017, Malta http://fc17.ifca.ai/ The conference is a week-long annual event for cryptography as applied to finance. IOHK’s chief scientist, Aggelos Kiayias, put the programme of speakers together, and core themes of the event were blockchain and Bitcoin. Prominent figures from the crypto community attended including IOHK CEO Charles Hoskinson, IOHK CSO Jeremy Wood, Silvio Micali, Adam Back, Emin Gün Sirer, Vitalik Buterin and more. The keynote speech was delivered by MIT professor and cryptography pioneer Silvio Micali, who spoke about his Algorand protocol. A number of IOHK staff attended and Dmitry Meshkov, IOHK researcher, presented Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies. Malta was not only a chance for IOHK staff to attend the conference, but also a great opportunity to come together to work, because they are usually spread across the world and across time zones. Almost 40 of IOHK’s researchers, developers, executives, and operations staff collaborated for up to two weeks, working to push forward major projects, as well as spending time getting to know each other in the evenings. Blog post on Malta: https://iohk.io/blog/a-trip-to-malta-and-a-grothendieck-milestone/ Read More about IOHK in the recent coindesk article by Amy Castor (@girlandgrowl): http://www.coindesk.com/no-incentive-algorand-blockchain-sparks-debate-cryptography-event/ @Coindesk More about IOHK: https://iohk.io/about/ IOHK is a company focused on decentralization and disruption. With operations in Hong Kong, Japan and Eastern Europe, and employees and partners from Latvia, the Netherlands, Austria, France, Ukraine, Argentina and Brazil in addition to its multinational core members, IOHK is a truly global company despite its small overall size and short history. We not only aim to cause disruption with our technology, but also with the way we organize a group of talented and motivated people around the same vision and passion. https://iohk.io/careers/ We are always looking for talented and motivated people to join our team, and more importantly to collaborate with. Our goal is to cause cascading disruption and there are many ways to be a part of it. If you feel like you have something to contribute, whether directly to IOHK or one of its projects, please do not hesitate to contact us.
Views: 1692 IOHK
The Hunt For The Zodiac Killer: Code Breakers Unite | Premieres Nov. 14 | History
 
02:02
HISTORY delves into the mystery of the Zodiac Killer while on a mission to crack the code. Throughout the early 1960s and 1970s, the Zodiac Killer, one of history’s most famous unidentified serial murderers, terrorized America in a spree of heinous attacks, sending taunting letters and codes filled with bizarre and ancient symbols. This code has baffled some of the greatest minds in cryptology for over 50 years. HISTORY’s new nonfiction limited series, “The Hunt For The Zodiac Killer” opens up a new investigation into the mystery of this twisted serial assassin. Premiering on Tuesday, November 14 at 10PM ET/PT, this five-part limited series, features a team of top investigators and code-breakers, working in tandem with a super-computer, known as CARMEL, the first of its kind programmed to think like a killer. This team believes they may have broken a significant portion of the diabolically complicated code, Z340, and have been granted unprecedented access to police files, new witnesses, new clues, and the cooperation of representatives of the CIA and FBI. Subscribe for more HISTORY: http://www.youtube.com/subscription_center?add_user=historychannel Newsletter: https://www.history.com/newsletter Website - http://www.history.com Facebook - https://www.facebook.com/History Twitter - https://twitter.com/history HISTORY®, now reaching more than 98 million homes, is the leading destination for award-winning original series and specials that connect viewers with history in an informative, immersive, and entertaining manner across all platforms. The network’s all-original programming slate features a roster of hit series, epic miniseries, and scripted event programming. Visit us at HISTORY.com for more info.
Views: 33015 HISTORY
Stanford Seminar - Who Owns the Future
 
01:16:45
"Who Owns the Future" -Jaron Lanier, Microsoft Research Colloquium on Computer Systems Seminar Series (EE380) presents the current research in design, implementation, analysis, and use of computer systems. Topics range from integrated circuits to operating systems and programming languages. It is free and open to the public, with new lectures each week. Learn more: http://bit.ly/WinYX5
Views: 43649 stanfordonline
Cryptanalysis of Classical Ciphers
 
51:54
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
Views: 13422 nptelhrd
The Imitation Game Official Trailer #1 (2014) - Benedict Cumberbatch Movie HD
 
02:32
Subscribe to TRAILERS: http://bit.ly/sxaw6h Subscribe to COMING SOON: http://bit.ly/H2vZUn Like us on FACEBOOK: http://goo.gl/dHs73 Follow us on TWITTER: http://bit.ly/1ghOWmt The Imitation Game Official Trailer #1 (2014) - Benedict Cumberbatch Movie HD In THE IMITATION GAME, Benedict Cumberbatch stars as Alan Turing, the genius British mathematician, logician, cryptologist and computer scientist who led the charge to crack the German Enigma Code that helped the Allies win WWII. Turing went on to assist with the development of computers at the University of Manchester after the war, but was prosecuted by the UK government in 1952 for homosexual acts which the country deemed illegal. The Movieclips Trailers channel is your destination for the hottest new trailers the second they drop. Whether it's the latest studio release, an indie horror flick, an evocative documentary, or that new RomCom you've been waiting for, the Movieclips team is here day and night to make sure all the best new movie trailers are here for you the moment they're released. In addition to being the #1 Movie Trailers Channel on YouTube, we deliver amazing and engaging original videos each week. Watch our exclusive Ultimate Trailers, Showdowns, Instant Trailer Reviews, Monthly MashUps, Movie News, and so much more to keep you in the know. Here at Movieclips, we love movies as much as you!
Views: 4548009 Movieclips Trailers
Code Girls: The Untold Story of the American Women Code Breakers of World War II
 
01:09:27
In the tradition of Hidden Figures and The Girls of Atomic City, Liza Mundy’s Code Girls is the astonishing, untold story of the young American women who cracked key Axis codes, helping to secure Allied victory and revolutionizing the field of cryptanalysis. A book signing will follow the program.
Views: 6901 US National Archives
8 Bells Lecture | Dan Urish: The story of Diego Garcia
 
01:14:31
Dan Urish, "Coral, Copra, and Concrete," Eight Bells Book Lecture, Naval War College Museum, Jan. 21, 2016. The story of Diego Garcia, B.I.O.T, its history, construction of the U.S. base by SeaBees, and its expansion into the U.S. Navy Support Facility Diego Garcia, providing logistic support to operational forces forward deployed to the Indian Ocean and Persian Gulf areas of responsibility in support of national policy objectives. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 2874 usnavalwarcollege
Code Kids
 
45:07
Code Kids is a documentary following the journey towards seeing kids being taught coding in schools once again in Canada's Maritime provinces. With the happy ending already set as a goal, will support for the movement gain the necessary steam to make this a reality? Will the amazing results seen in Estonia and Finland inspire those back home and will Canada's eastern-most provinces decide to take the lead in a global race to fill the millions of tech jobs, that at current rates, will not be filled in years to come without more kids choosing coding and tech as a career? Meet the supporters and volunteers behind this grassroots movement that's sweeping the globe and follow individual kids and how their lives have been changed by pursuing their dreams. To watch more CBC documentaries visit CBC"s Absolutey Maritimes - http://www.cbc.ca/player/Shows/Shows/Absolutely+Canadian/Absolutely+Maritimes/
Views: 202909 Hemmings House
Margalit Fox, "The Riddle of the Labyrinth" | Talks At Google
 
56:26
THE RIDDLE OF THE LABYRINTH, by New York Times writer Margalit Fox, tells one of the most intriguing stories in the history of language—the race to decipher the Bronze Age script known as Linear B, first dug up on clay tablets in Crete in 1900. Fox masterfully blends history, linguistics, and cryptology into a mesmerizing account that reads like an intellectual detective story. At the center of this narrative is an American linguist, Alice Kober, whose major contribution to the decoding of the script is unknown to history because she died before she was able to make the final leap. In many respects, Alice Kober is to the story of Linear B what Rosalind Franklin, the great unsung heroine of the mapping of molecular structure of DNA, is to that canonical Margalit Fox holds graduate degrees in linguists and currently has been writing obits for the NYT, many of which have been front page.
Views: 5587 Talks at Google
Extended Euclidean Algorithm and Inverse Modulo Tutorial
 
06:00
Using EA and EEA to solve inverse mod.
Views: 415152 Emily Jane
Biography - American Gunfighters from the Wild West - 1800s - Part 1 of 2
 
11:57
When Gunfighters Ruled the Streets of the Wild West Today we present the first of two programs about some of the most famous people who lived in the American West many years ago. We tell about lawmen, criminals and gunfighters. And we will try to tell as much truth as possible about this interesting time in American history. the people in Dodge City began to see something that frightened them. Strangers were entering the town. All of these men carried guns. The men said they were friends of Luke Short. They caused no trouble. A newspaper in Dodge City printed a story that identified the men. Luke Short returned to Dodge City wearing his guns. The chief lawman of the town quickly sent a telegram to the governor of the state asking for help. He was afraid a major civil war would begin in his town. The men who had forced Luke Short out of town decided to negotiate a settlement. They did not want to face his many dangerous friends. A few days after the settlement, Bat Masterson, Wyatt Earp, Doc Holliday and the other dangerous friends of Luke Short left Dodge City. No one ever fired a shot. No one was even threatened. All it took to force a negotiated settlement was for these dangerous men to show their faces in Dodge City. Just the fear of them settled the argument in favor of Luke Short. No one wanted to deal with men who were not afraid of a gunfight. Who were these dangerous men? Why did people fear them so much? Why did they become so famous? The story of these famous men began a little before the American Civil War of the eighteen sixties. Most of the shooting incidents between professional lawmen and outlaws took place during the eighteen seventies in Texas. But living in the American West was not easy. There were no laws, no courts and little or no government. There were few lawmen to keep order. The people who arrived in the West included many criminals. Many were escaping punishment from their crimes. They knew that an area with no law would provide them with safety. These professional criminals often used force to take what they wanted -- cows, horses or money. Often, there was little to stop them. To protect their towns, the settlers often had to employ people who were expert in the use of firearms. Several lawmen in the Old West had learned to use their weapons when they were criminals. Both the outlaws and the lawmen in the Old West had something else in common. They could do something many other people could not. They were willing to risk their lives to enforce the law or to commit a crime. And they were willing to do this with a gun. A good example was a man named William Matthew Tilghman. He was arrested two times and charged with stealing when he was a young man. However, he later became a deputy United States marshal, a law officer. On July fourth, eighteen eighty-eight, a man named Ed Prather began shooting his gun in the street in Farmer City, Kansas. People ran away in fear. Tilghman made him stop. Prather left the street angry and went into a drinking place. He began drinking alcohol and making threats. Later, Tilghman went into the drinking place looking for Prather. Prather put his hand on the gun he was carrying. Tilghman told him to move his hand away from the gun. When he did not obey, Bill Tilghman pulled out his gun and shot Ed Prather two times. He died immediately. That was only one of the many times Bill Tilghman used his gun as a law officer. He served in many other towns. Often, all he had to do was walk into a room to stop a fight. Outlaws feared and obeyed him. Most criminals stayed away from a town where Bill Tilghman was the marshal. Bill Tilghman was shot to death on November first, nineteen twenty-four. He was trying to arrest a man who had been drinking too much alcohol. He was seventy years old and still working as the marshal of Cromwell, Oklahoma. His life had lasted exactly the seventy years of the American Wild West. Wyatt Earp was once asked how to win a gunfight. He said a good gunfighter took his time. He said he had to go into action as quickly as possible -- as fast as he could move. But then he should take his time with the shooting. He said a successful gunfighter could not let fear or anything else force him to shoot too soon and miss the target. Missing the target could get him killed. Wyatt Earp was very successful. He was only wounded once in a gunfight. He is one of the few successful gunfighters who lived to old age. He died in nineteen twenty-nine. He was eighty-one years old.
Views: 6166 ListenAndReadAlong
This Is The Weirdest Unsolved Mystery Up To Date!
 
11:00
There are many unsolved mysteries that everyone knows about. Who was Jack the Ripper? What’s in area 51? What IS the Bermuda Triangle? How does Paul Rudd look so young? Here are ten of the world’s weirdest unsolved mysteries. The question is: Which of these are the weirdest? 10. The Voynich Manuscript For all bibliophiles and language fanatics out there, the Voynich Manuscript is one of the world’s most engaging mysteries. Where and when this tatty old book was written is unknown, but cryptologists’ best guess is 15th Century Italy. But not only can we not be sure where & when it’s from, we have no idea what any of it says. The entire manuscript is written in a mysterious unknown language. Whether the manuscript is written in some long-lost language of the past, or in an all-new script of the author’s creation is unclear. All we know is that nobody yet has managed to crack the code. 240 pages of untranslatable text, it’s the single-most infamous case in cryptology history. So, what is it? Harry Potter 8? A third Bible testament? Shakespeare’s long last sequel to Love Labour’s Lost? Most evidence suggests it’s something related to alchemy. Those alchemists were up to all sorts! Who knows what wonders we may find within, if it’s ever decoded? 9. Francis Leavy’s Handprint Some mysteries concern people or things vanishing without a trace, but this one concerns something that just won’t go away. In April 1924, the usually chipper Chicago Firefighter Francis Leavy had a strange turn of heart. A moody disposition took hold. Whilst washing one of the station’s windows he stopped, pressed his hand against the glass and told his colleagues he had been hit with a strange feeling that he would die that day. Leavy’s premonition was right. At 7pm that evening Leavy and his fellow officers raced to a four-storey building known as Curran’s Hall that was consumed in flames. Leary died, on duty, when the roof caved it. Upon returning to the station, Firefighters saw Leavy’s handprint still on the window. Not so mysterious. But what IS mysterious is that no-matter how hard they tried to wash the window- the hand print never went away. Leavy refused to be forgotten. His handprint remained, for two whole decades. Maybe Leavy’s ghostly spirit lived on. Or maybe he just had REALLY dirty hands. 8. Overtoun Bridge Overtoun Bridge in Scotland is no ORDINARY bridge. This bridge is the Bermuda Triangle of dogs. Since the 1950’s an estimated 50 dogs have, when being walked across the bridge, spontaneously hurled themselves over the edge- tumbling to their death. Canine psychologist Dr. Sands has examined every inch of the bridge and the land below, taking into account smell and sound. What is it the dogs can smell or hear that we can’t? What is it that’s driving so many dogs to suicide? Dr. Sands noted that the surrounding foliage could make the area look, from a dog’s lower eye line, like flat ground- meaning they didn’t know they were jumping from such a great height. That, combined with the odour of male mink urine, is luring dogs to jump in the hope of catching a mink, only to tumble into the abyss below. But local hunter John Joyce is not convinced, adamantly insisting there are no mink in the area, leading to other theories. That part of Scotland has a long history of paranormal myths: fairies, spirits, ghosts. Could an ethereal otherworldly creature be summoning them away to doggo heaven? Or maybe they just all HATE their owners… 7. The Pennsylvania UFO Incident In 1965, citizens of six separate U.S. states reporting seeing a huge fireball in the sky. If one or two people reported it you could maybe say they were not of their right mind, it was the 60’s after all. But enough people reported it to warrant a thorough investigation. Sadly, those hoping for an alien landing were left disappointed. They claimed it was nothing but a meteor burning up in the atmosphere. Despite this- something definitely landed. After decades of mystery and intrigue, in 2005 NASA finally admitted that they examined the area and had found fragments they determined to be from a crashing Russian Satellite. Mystery solved? Right? Not quite. Not aiding their story was that when asked to show records of their findings, they claimed to have lost the records in the 90’s. Following a court order under the Freedom of Information Act, NASA tried to find the records. 6. ???? 5. ??? 4. ??? 3. ??? 2. ?? 1. ? ► For copyright matters please contact us: [email protected] ► FOLLOW US ON TWITTER: https://twitter.com/Top5sFinest ► LIKE US ON FACEBOOK: https://www.facebook.com/TheFinestPost/ Background Music By: Kevin MacLeod: https://goo.gl/gWj3Zo Thank you so much for watching! Smash that like button for more, make sure you share the video with your friends and dont forget to subscribe!
Views: 13058 The Finest
Cicada 3301 (All Clues and How They Were Solved)
 
15:07
Want to know more about PGP encryption? Here's the video I used https://www.youtube.com/watch?v=3yN4uMMsK8I Songs: 00:40 song {Halsey - Haunting (Official Instrumental) https://www.youtube.com/watch?v=eT6VVntT8lo Piano cover by cragezy https://www.youtube.com/watch?v=4AxBYR11MG8 As not stated, the video is not entirely accurate (i.e notes shown were drawn up for clearity). Please refrain from pointing out the flaws when the majority of the video is correct. Douche Clues Clue 1: 0:00 Clue 2: 1:22 Clue 3: 1:48 Clue 4: 2:00 Clue 5: 5:50 Clue 6: 6:45 Clue 7: 8:22 Clue 8: 10:11 Clue 9: 11:05 Clue 10: 13:08
Views: 3505242 TheBraveZombies
Top 10 Unbreakable Ciphers and Codes — TopTenzNet
 
10:49
Top 10 Unbreakable Ciphers and Codes →Subscribe for new videos every day! http://bit.ly/toptenzsubscribe →10 Reasons Bruce Lee was a Superhuman: http://bit.ly/1Hl4mVu Entertaining and educational top 10 lists from TopTenzNet! Brand new videos 7 days a week! Videos are published at 6pm EST every day! Other TopTenz Videos: Top 10 Historical Unsolved Mysteries http://bit.ly/1RAAE95 In an age where we have satellites that can zoom in to watch an ant pee on a leaf, you’d think our society pretty much knows everything. Even with our high-speed, touchscreen, 3-D, Star Wars projectors, there are still a few ciphers and codes keeping cryptologists (trust us, it’s a word) stumped. Some of them come from way back in the 18th century. Even with the addition of advanced technology, ye ol’ pilgrims are proving that the smartest thing about our society might just be our phones. Text version: http://www.toptenz.net/top-10-unbreakable-ciphers-codes.php Coming up: 10. Dorabella Cipher 9. D’Agapeyeff Cipher 8. Indus Script 7. Chinese Gold Bar Ciphers 6. Zodiac Killer 5. Linear A 4. Proto-Elamite 3. Taman Shud 2. McCormick Cipher 1. Bacon Cipher Source/Other reading: http://www.ciphermysteries.com/the-dorabella-cipher http://nautil.us/issue/6/secret-codes/the-artist-of-the-unbreakable-code http://www.ciphermysteries.com/2013/12/23/dagapeyeff-cipher http://itknowledgeexchange.techtarget.com/security-corner/the-unsolved-dagapeyeff-cipher/ http://www.harappa.com/script/indusscript.pdf http://elonka.com/UnsolvedCodes.html http://books.google.com/books?id=G4gCs-RmVZwC&pg=PA46&lpg=PA46&dq=General+Wang+unsolved+gold+bars&source=bl&ots=vrfYkpCHEz&sig=gwWoVvcHk5qecMsXwuLVmZoYKZU&hl=en&sa=X&ei=XU9_U-HGOtelyATduYDYDg&ved=0CHsQ6AEwBQ#v=onepage&q=General%20Wang%20unsolved%20gold%20bars&f=false http://listverse.com/2007/10/01/top-10-uncracked-codes/ http://www.crimelibrary.com/serial_killers/notorious/zodiac/8.html http://www.zodiologists.com/ http://mysteries24.com/n4-21061-Unsolved_coded_messages http://www.cam.ac.uk/research/news/cracking-the-code-the-decipherment-of-linear-b-60-years-on http://www.ancientscripts.com/elamite.html http://www.historytoday.com/mark-ronan/puzzle-proto-elamite http://www.heraldsun.com.au/news/law-order/portrait-may-hold-key-to-somerton-man-beach-mystery/story-fni0ffnk-1226674957043 http://www.ciphermysteries.com/2009/08/08/the-tamam-shud-cipher-mystery http://www.fbi.gov/news/stories/2011/march/cryptanalysis_032911/cryptanalysis_032911 http://www.riverfronttimes.com/2012-06-14/news/ricky-mccormick-code-mysterious-death-st-louis/ http://www.jstor.org/discover/10.2307/751135?uid=3739256&uid=2129&uid=2&uid=70&uid=4&sid=21103794245461 http://www.bibliotecapleyades.net/ciencia/esp_ciencia_manuscrito06.htm
Views: 87005 TopTenz
The Voynich Manuscript, full video
 
41:44
The Voynich MS is the world's most mysterious book. About 600 years old, its provenance can be traced through alchemists, emperors, scholarly clerics, and, well, basically wizards. Despite decades of intense investigation, no one knows who made this book or why. It contains meticulous illustrations of plants, none of which can be identified as known species. It also seems to depict star charts, recipes for potions, strange portrayals of naked ladies engaged in perhaps some kind of ritual, and page after page of beautiful writing that has never been identified or translated. Many fake or discredited interpretations have been debunked, and WW2's star codebreakers tried and failed to find an encryption scheme. It'd be convenient to declare the MS a hoax, but sophisticated modern linguistic analyses show that the text is not pure gibberish and contains identifying qualities of natural languages, along with some other patterns associated with no known language. What is the Voynich MS? A hoax so clever or an encryption so sophisticated to defy the most modern techniques to crack it? Or is it something else? Tiger Style, creators of Spider: The Secret of Bryce Manor and Waking Mars, also have zero clue, but you can watch our full, fast-paced, no bs presentation for the real deal on the Voynich MS. Some Relevant links: Voynich scans from Yale's Beinecke Rare Book & Manuscript Library - beinecke.library.yale.edu/collections/highlights/voynich-manuscript Voynich on Wikipedia - en.wikipedia.org/wiki/Voynich_manuscript Great, dry, deep, succinct research summary - voynich.nu/ Tiger Style, creators of this research project - www.TigerStyleGames.com
Views: 1044 tigerstylegames
Cryptography | Wikipedia audio article
 
56:45
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Cryptography 00:03:38 1 Terminology 00:07:53 2 History of cryptography and cryptanalysis 00:08:55 2.1 Classic cryptography 00:16:37 2.2 Computer era 00:19:13 2.3 Advent of modern cryptography 00:21:54 3 Modern cryptography 00:23:02 3.1 Symmetric-key cryptography 00:23:13 3.2 Public-key cryptography 00:23:28 3.3 Cryptanalysis 00:27:58 3.4 Cryptographic primitives 00:34:01 3.5 Cryptosystems 00:40:06 4 Legal issues 00:41:12 4.1 Prohibitions 00:43:02 4.2 Export controls 00:43:12 4.3 NSA involvement 00:45:45 4.4 Digital rights management 00:48:46 4.5 Forced disclosure of encryption keys 00:50:51 5 See also 00:53:36 6 References 00:55:46 7 Further reading Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.8357640430680523 Voice name: en-US-Wavenet-D "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= Cryptography or cryptology (from Ancient Greek: κρυπτός, translit. kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure communication in the presence of third parties called adversaries. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages; various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, electrical engineering, communication science, and physics. Applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications. Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shares the decoding technique only with intended recipients to preclude access from adversaries. The cryptography literature often uses the names Alice ("A") for the sender, Bob ("B") for the intended recipient, and Eve ("eavesdropper") for the adversary. Since the development of rotor cipher machines in World War I and the advent of computers in World War II, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances, e.g., improvements in integer factorization algorithms, and faster computing technology require these solutions to be continually adapted. There exist information-theoretically secure schemes that provably cannot be broken even with unlimited computing power—an example is the one-time pad—but these schemes are more difficult to use in practice than the best theoretically breakable but computationally secure mechanisms. The growth of cryptographic technology has raised a number of legal issues in the information age. Cryptography's potential for use as a tool for espionage and sedition has led many governments to classify it as a weapon and to limit or even prohibit its use and export. In some jurisdictions where the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption keys for documents relevant to an investigation. Cryptography also plays a major role in digital rights management and copyright infringement of digital media.
Views: 3 wikipedia tts
CIPHERS - Decoding The Great Seal
 
01:43
Featured In This New Video Collection Is The 1st Great Seal of The United States And The 'Codex Gigas' A Mystical Magical Royal Treasure Historically Known As The Devils Bible. Historically The Codex Gigas Is A Spoil of War Taken From The Royal Treasury of The Holy Roman Emperor 'Rudolph II' By The Plundering Swedish Army And One Story Is Rudolph Had Borrowed The Book From A Monastery For His Art Exhibit & Occult Studies And Never Returned It. The Codex Gigas Is Believed To Be Written By A Mysterious 'Bohemian Monk' Who Sold His Soul To The Devil. Due To Its Old Age The Codex Gigas Is Kept Under A Custom Shroud For Preservation Purposes And Because of Its Priceless Value The Codex Is Sealed In A Guarded Vault At The Swedish Royal Library. LEGENDS AND HISTORICAL FACTS: (1.) The Codex Gigas Is A Giant Book of Questionable Origin; Almost 1000 Years Old; And A National Treasure Once Counted To Be The 8th Wonder of The World. (2.) The Codex Gigas Is The Largest Medieval Manuscript Known To Exist On Earth; Each Page In The Devils Bible Is A Animal Skin And The Giant Book Recently Made International Headlines And Vented For One Hour In A National Geographic Special. (3.) Legend Is Nobody Knows Who Wrote The Devils Bible or What Inspired Its Writer, The Other Legend Is Nobody Knows Who Designed The 1st Great Seal or What Inspired Its Designer. (4.) Another Legend Is A Mysterious Hooded/Cloaked Figure of A Man Gave Thomas Jefferson The Design For The Great Seal of The USA. (5.) There Is Another Legend Related To This Mystical Magical Tale From A Crypt, The Legend of A Dead Man Who Claimed To Be "The Truth" Born In Bethlehem. Legend Is The Truth Was Hated And Betrayed And Sold For 30 Pieces of Silver To Be Brutally Edited; Wrapped In A Custom Shroud For Preservation Purposes; And Sealed In A New Vault Until The Edited Truth Magically Escaped The Vault Un-Edited To Be Known & Realised Again. OTHER MISC NOTES: (A.) Codex Gigas Is Latin Interpreted: Great; Big; Giant; Renown Book. Therefore The Great Seal of The Great Book And The Great Painting of The Great Satan Bound Betwixt Twin Towers On The Most Filthy And Most Exploited Page of The Book . . .The Great Seal of The Pit. (B.) Annuit Coeptis; Novus Ordo Seclorum; E Pluribus Unum Are Also 'Latin Words' Which Until Recently Were Interpreted: The 'Official' Language of The Church & State. (C.) There Has Never Been A Democracy In History That Did Not Commit Suicide or Murder Itself. Therefore This New Revised Experiment 1776. LINKS TO THESE STORIES A Link To The 1st Great Seal Legend http://youtu.be/oNHko7d2jiI A Link To The Devils Bible Documentary http://youtu.be/zZ_A1I6d9iM A Link To My Live Journal Website: http://community.livejournal.com/bible_codes/
Views: 1313 44AlphaMale44
Cool Codes for Kids: The Pigpen Cypher
 
01:53
Dan Metcalf, author if Codebusters, gives you the lowdown on codes, ciphers and puzzles you can try at home. What do you do when you want all your writing to be secret? You use a code of course. You could use a substitution code like the Caesar shift, but you can just as easily use a code that substitutes letters for shapes. This is what the Freemasons did a few hundred years ago when they invented the Pigpen cypher! To start, you need a key – use two grids like this – the 'pigpen' – and fill in the alphabet. The second grids have dots in them so you can tell them apart from the first ones. Then you take the individual shape of the letter you wish to replace and copy it down. Then the decoder just needs to match the shapes to their key. Nifty, huh? Try this yourself!
Views: 1923 Dan Metcalf Writer
01 - The Mystery of Gravity Falls - Mini Series - Gravity Falls
 
06:54
Disney Channel Scandinavia explores all the secrets and ciphers hidden within Gravity Falls in this 6 part mini-series, Mysteriet i Gravity Falls, otherwise known as The Mystery of Gravity Falls. In this episode, learn about cryptograms with the Caesar Cipher!
Views: 567590 TheMysteryofGF
Professor Gerhard Weinberg on The Making of the New European Borders During and After WWII
 
01:30:01
On October 28, 2014 Gerhard Weinberg, Professor Emeritus at UNC Chapel Hill, delivered a lecture, “Cold War Borders: The Making of the New Frontiers of Europe During WWII.” This lecture is part of a series with eminent scholars organized by the Richard M. Krasno Distinguished Professorship at UNC-Chapel Hill in cooperation with the Curriculum in Peace, War, and Defense (PWAD), the Department of History, the UNC Center for European Studies, the College of Arts and Sciences, the UNC Institute for the Arts and Humanities, UNC Global, and the Triangle Institute for Security Studies (TISS).
Views: 5231 KrasnoUNC
8 Bells Lecture | Hal Friedman: The Naval War College, Japan and the Old Enemy in the Pacific
 
56:28
Hal M. Friedman, "Blue versus Orange: The U.S. Naval War College, Japan, and the Old Enemy in the Pacific, 1945–1946," Eight Bells Book Lecture, Naval War College Museum, Aug. 21, 2014. This study closely analyzes war gaming at the Naval War College in the academic year 1945–46, as both a reflection and source of the U.S. Navy’s doctrinal and strategic responses to the experience of World War II—responses that would help the Navy shape its approach to the Cold War. The book describes in fascinating detail the practice of war gaming at the Naval War College in that era. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 5610 usnavalwarcollege
8 Bells Lecture | Rear Adm. Chris Parry: Falklands War and the Importance of Naval Corporate Memory
 
58:10
Rear Adm. Chris Parry, "My Falklands War and the Importance of Naval Corporate Memory," Eight Bells Book Lecture, Naval War College Museum, March 15, 2016. Rear Admiral Chris Parry will describe his personal experience of combat in the Falklands War of 1982, which included the detection and disabling of the Argentinian submarine Santa Fe (ex-USS Catfish), the rescue of 16 Special Air Service troopers from a glacier in a hurricane and the amphibious landings at San Carlos Water which led to the successful capture of the Falkland Islands. He will also indicate some lessons that remain relevant today and for the future, as well as highlighting how every generation forgets the lessons of the past, in terms of doctrine, training and technology. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 21349 usnavalwarcollege
8 Bells Lecture | Thomas Wildenberg: Mitchell’s War with the Navy
 
58:56
Thomas Wildenberg, "Mitchell’s War with the Navy: the Interwar Rivalry Over Air Power," Eight Bells Book Lecture, Naval War College Museum, Sept. 25, 2014. This book provides the background to the intense political struggle over limited resources and funding following World War I and set the stage for the on-going dispute between the Army and Navy leading up to World War II. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 1780 usnavalwarcollege
Naval Heritage | Jonathan Parshall: The Untold Story of the Battle of Midway
 
50:01
June 3, 2014 NEWPORT, R.I. -- Jonathan Parshall, historian and co-author of the book "Shattered Sword: The Untold Story of the Battle of Midway," delivers a presentation about the Battle of Midway to students, staff and faculty at U.S. Naval War College (NWC) in Newport, Rhode Island. The Battle of Midway, which took place June 4-7, 1942, was considered the high water mark for the Japanese navy and the turning point of the war in the Pacific during World War II. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 80781 usnavalwarcollege
8 Bells Lecture | Niall MacKay: A Bayesian study of the Battle of the Dogger Bank
 
01:15:22
Niall MacKay, "Weighing the Fog of War: A Bayesian study of the Battle of the Dogger Bank, 24th January 1915," Eight Bells Book Lecture, Naval War College Museum, Feb. 4, 2016. The Battle of Dogger Bank was a naval battle fought near the Dogger Bank in the North Sea on 24 January 1915, during the First World War, between squadrons of the British Grand Fleet and the German High Seas Fleet. Even though it was considered a British victory, both Britain and Germany soon replaced commanders who were thought to have shown poor judgement. Both navies made some changes to equipment and procedures in response to problems identified during the battle. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 5671 usnavalwarcollege
Change - In A Sippy Cup
 
03:00
Featured In This Video Collection Is The 1st Great Seal of The USA And The 'Codex Gigas' A Mystical Magical Royal Treasure Historically Known As The Devils Bible. Historically The Codex Gigas Is A Spoil of War Taken From The Royal Treasury of The Holy Roman Emperor 'Rudolph II' By The Plundering Swedish Army And One Story Is Rudolph Had Borrowed The Book From A Monastery For His Art Exhibit & Occult Studies And Never Returned It. The Codex Gigas Is Believed To Be Written By A Mysterious 'Bohemian Monk' Who Sold His Soul To The Devil. Due To Its Old Age The Codex Gigas Is Kept Under A Customized Shroud For Preservation Purposes And Because of Its Priceless Value The Codex Is Sealed In A Guarded Vault At The Swedish Royal Library In Stockholm. INTERESTING LEGENDS AND HISTORICAL FACTS: (1.) The Codex Gigas Is A Giant Book of Questionable Origin; Almost 1000 Years Old; And A National Treasure Once Counted To Be The 8th Wonder of The World. (2.) The Codex Gigas Is The Largest Medieval Manuscript Known To Exist On Earth; Each Page In The Devils Bible Is A Animal Skin And The Giant Book Recently Made International Headlines And Vented For One Hour In A National Geographic Tell A Vision Special. (3.) Legend Is Nobody Knows Who Wrote The Devils Bible or What Inspired Its Writer, The Other Legend Is Nobody Knows Who Designed The 1st Great Seal of The United States or What Inspired Its Designer. (4.) American Legend Is A Mysterious Hooded/Cloaked Figure of A Man Gave Thomas Jefferson The Design For The 1st Great Seal of The USA. (5.) There Is Another Legend Related To This Mystical Magical Tale From A Crypt, The Legend of A Dead Man Who Claimed To Be "The Truth" Born In Bethlehem. Legend Is The Truth Was Hated And Betrayed And Sold For 30 Pieces of Silver To Be Brutally Edited; Wrapped In A Custom Shroud 'For Preservation Purposes' And Sealed In A New Vault Until The Edited Truth Magically Escaped The Vault Un-Edited To Be Known & Realised Again. OTHER MISC NOTES: (A.) Codex Gigas Is Latin Interpreted: Great; Big; Giant; Renown Book. Therefore The Great Seal of The Great Book And The Great Painting of The Great Satan Bound Betwixt Twin Towers On The Most Filthy And Most Exploited Page of The Book . . .The Great Seal of The Pit. (B.) Annuit Coeptis; Novus Ordo Seclorum; And E Pluribus Unum Are Also 'Latin Words' Which Until Recently Were Interpreted: The 'Official' Language of The Church & State. (C.) There Has Never Been A Democracy In History That Did Not Commit Suicide or Murder Itself. Therefore This New Revised Experiment 1776. LINKS TO THESE STORIES A Link To The 1st Great Seal Legend http://youtu.be/oNHko7d2jiI A Link To The Devils Bible Documentary http://youtu.be/zZ_A1I6d9iM A Link To My Live Journal Website: http://community.livejournal.com/bible_codes/
Views: 638 44AlphaMale44
Emancipation Proclamation Exhibit - VOA Mosaic in Special English
 
03:07
Emancipation Proclamation Exhibit 01/04/2013 This week, the United States marked the 150th anniversary of the signing of the Emancipation Proclamation. The document freed slaves in the southern states that were fighting to secede --- to separate from the United States. President Abraham Lincoln signed the document on Jan. 1, 1863. The federal government held a public exhibition of the Emancipation Proclamation this week in Washington. Christopher Cruise tells about the rare showing. The National Archives put the proclamation on display for just a few days. It is a rare copy because it is signed by President Lincoln, and because it has the presidential seal, although the years have destroyed much of the seal. While it did not immediately free slaves in all of the United States, the Proclamation did lead to the approval of the 13th Amendment to the Constitution. That measure ended slavery in the United States. The fight over the 13th amendment is the subject of director Steven Spielberg's current movie "Lincoln." Reginald Washington is an expert in African-American documents at the National Archives. He says the document changed the debate about why the Civil War was being fought. "The proclamation, however, did bring about a fundamental change in the character of the war. With a stroke of Lincoln's pen, a war to preserve the union had overnight become a war for human liberation. For the nearly 4,000,000 slaves held in bondage, it was a symbol of hope. It gave confirmation to their beliefs and insistence that the war should be -- and was for them -- a war to secure their freedom." Mr. Washington says many historians and scholars believe the Emancipation Proclamation is one of the greatest documents in human freedom. He says some historians believe it is as important in American history at the Declaration of Independence. The National Archives has produced a free e-book on the Emancipation Proclamation. The one hundred fifty year old document was not well cared-for in the past. To protect it from further damage, officials permit its display for only 30 hours a year. However, the National Archives is considering the proclamation's display in other parts of the country this year to celebrate its anniversary. http://learningenglish.voanews.com/content/article/1577454.html
Views: 2848 ListenAndReadAlong
SEASONING THE WITCH
 
02:01
Featured In This New Video Collection Is The 1st Great Seal of The United States And The 'Codex Gigas' A Mystical Magical Royal Treasure Historically Known As The Devils Bible. Historically The Codex Gigas Is A Spoil of War Taken From The Royal Treasury of The Holy Roman Emperor 'Rudolph II' By The Plundering Swedish Army And One Story Is Rudolph Had Borrowed The Book From A Monastery For His Art Exhibit & Occult Studies And Never Returned It. The Codex Gigas Is Believed To Be Written By A Mysterious 'Bohemian Monk' Who Sold His Soul To The Devil. Due To Its Old Age The Codex Gigas Is Kept Under A Custom Shroud For Preservation Purposes And Because of Its Priceless Value The Codex Is Sealed In A Guarded Vault At The Swedish Royal Library. LEGENDS AND HISTORICAL FACTS: (1.) The Codex Gigas Is A Giant Book of Questionable Origin; Almost 1000 Years Old; And A National Treasure Once Counted To Be The 8th Wonder of The World. (2.) The Codex Gigas Is The Largest Medieval Manuscript Known To Exist On Earth; Each Page In The Devils Bible Is A Animal Skin And The Giant Book Recently Made International Headlines And Vented For One Hour In A National Geographic Special. (3.) Legend Is Nobody Knows Who Wrote The Devils Bible or What Inspired Its Writer, The Other Legend Is Nobody Knows Who Designed The 1st Great Seal or What Inspired Its Designer. (4.) Another Legend Is A Mysterious Hooded/Cloaked Figure of A Man Gave Thomas Jefferson The Design For The Great Seal of The USA. (5.) There Is Another Legend Related To This Mystical Magical Tale From A Crypt, The Legend of A Dead Man Who Claimed To Be "The Truth" Born In Bethlehem. Legend Is The Truth Was Hated And Betrayed And Sold For 30 Pieces of Silver To Be Brutally Edited; Wrapped In A Custom Shroud For Preservation Purposes; And Sealed In A New Vault Until The Edited Truth Magically Escaped The Vault Un-Edited To Be Known & Realised Again. OTHER MISC NOTES: (A.) Codex Gigas Is Latin Interpreted: Great; Big; Giant; Renown Book. Therefore The Great Seal of The Great Book And The Great Painting of The Great Satan Bound Betwixt Twin Towers On The Most Filthy And Most Exploited Page of The Book . . .The Great Seal of The Pit. (B.) Annuit Coeptis; Novus Ordo Seclorum; E Pluribus Unum Are Also 'Latin Words' Which Until Recently Were Interpreted: The 'Official' Language of The Church & State. (C.) There Has Never Been A Democracy In History That Did Not Commit Suicide or Murder Itself. Therefore This New Revised Experiment 1776. LINKS TO THESE STORIES A Link To The 1st Great Seal Legend http://youtu.be/oNHko7d2jiI A Link To The Devils Bible Documentary http://youtu.be/zZ_A1I6d9iM A Link To My Live Journal Website: http://community.livejournal.com/bible_codes/
Views: 1057 44AlphaMale44
8 Bells Lecture | Chuck Veit: The U.S. Navy's Secret Torpedo Program of 1862
 
49:19
Chuck Veit, "Sea Miner: The U.S. Navy's Secret Torpedo Program of 1862," Eight Bells Book Lecture, Naval War College Museum, Jan. 28, 2016. Based on research on NWC Archives, our first-ever program to develop an automobile torpedo was not at Goat Island in 1869, but in the waters off the Brooklyn Navy Yard in 1862-3, and the weapon that almost came out of that project would have immediately made us the most powerful navy in the world. It was actually completed, approved and the orders to get it into production cut; that it was never deployed was a function of the security that surrounded every aspect of the work. ***** Disclaimer: The views expressed are the speaker's own and may not necessarily reflect the views of the Naval War College, the Department of the Navy, the Department of Defense, or any other branch or agency of the U.S. Government.
Views: 1449 usnavalwarcollege
Stories - John Carter(Disney movie) - Princess of Mars - Part 1 of 4 - Edgar Rice Burroughs
 
12:42
A Princess of Mars, Part 1 Today, we begin a new series from a book by American writer Edgar Rice Burroughs. The book is called "A Princess of Mars." It is the first book in a series that Mr. Burroughs wrote about a man who travels to Mars during the last years of the eighteen hundreds. There, the man meets strange beings and sees strange sights. At first he is a captive, then a warrior, and after many battles, a prince of a royal family. Shep O'Neal begins the story of "A Princess of Mars." JOHN I am a very old man. How old I do not know. It is possible I am a hundred, maybe more. I cannot tell because I have never aged as other men do. So far as I can remember, I have always been a man of about thirty. I appear today as I did forty years ago. Yet, I feel that I cannot go on living forever. Someday I will die the real death from which there is no escape. I do not know why I should fear death. I who have died two times and am still alive. My name is John Carter. I am from the state of Virginia. At the close of the Civil War I found myself without a home, without money and without work. I decided the best plan was to search for gold in the great deserts of the American Southwest. I spent almost a year searching for gold with another former soldier, Captain James Powell, also of Virginia. We were extremely lucky. In the winter of eighteen sixty-five we found rocks that held gold. Powell was trained as a mining engineer. He said we had uncovered over a million dollars worth of gold in only three months I had no difficulty following Powell's trail. I soon found the trail left by the three riders following Powell. I knew they were Indians. I was sure they wanted to capture Powell. Suddenly I heard shots far ahead of me. I hurried ahead as fast as I could. Soon I came to a small camp. Several hundred Apache Indians were in the center of the camp. I could see Powell on the ground. I did not even think about what to do, I just acted. I pulled out my guns and began shooting. The Apaches were surprised and fled. I forced my horse into the camp and toward Powell. I reached down and pulled him up on the horse by his belt I followed the trail for several hundred meters more until I came to the mouth of a large cave. It was almost morning now. I got off my horse and laid Powell on the ground. I tried to give him water. But it was no use. Powell was dead. I laid his body down and continued to the cave. And now I could see the Apaches. They had found me. But I could do nothing. Within a minute one of them came into the cave. He looked at me, but he came no closer. His eyes grew wide. His mouth opened. He had a look of terror on his face. He looked behind me for moment and then fled. Suddenly I heard a low noise behind me. So could the rest of the Apaches. They all turned and fled. Then, for a moment, I closed my eyes. There was an instant of extreme cold and total darkness. Suddenly I was in deep, dreamless, peaceful sleep. I opened my eyes upon a very strange land. I immediately knew then I was on Mars. Not once did I question this fact. My mind told me I was on Mars as your mind tells you that you are upon Earth. You do not question the fact, nor did I. Near me was a small, low wall. Carefully, I made my way to the wall and looked over. It was filled with eggs, some already broken open. Small, green creatures were in them. They looked at me with huge red eyes. As I watched the fierce-looking creatures, I failed to hear twenty full-grown Martians coming from behind me. They had come without warning. As I turned, I saw them. One was coming at me with a huge spear, with its sharp tip pointed at my heart! This is a VOA product and is in the public domain Thanks to manythings.org for the text and audio.
Views: 12042 ListenAndReadAlong
Red Star Over The Pacific HD
 
01:01:29
Professor Toshi Yoshihara of the U.S. Naval War College visits the Merage School of Business at the University of California-Irvine to discuss the rise of Chinese naval power and its geostrategic implications.
CROSSROADS - Separation of Church & State
 
03:00
Featured In This New Collection Is The First Great Seal of The USA And The 'Codex Gigas' A Mystical Magical Royal Treasure Historically Known As "The Devils Bible". Historically The Codex Gigas Is A Spoil of War Taken From The Royal Treasury of The Holy Roman Emperor 'Rudolph II' By The Plundering Swedish Army And One Story Is Rudolph Had Borrowed The Book From A Monastery For His Art Exhibit & Occult Studies And Never Returned The Book. The Codex Gigas Is Believed To Be Written By A Mysterious 'Bohemian Monk' Who Sold His Soul To The Devil. Due To Its Old Age The Codex Gigas Is Kept Under A Customized Shroud For Preservation Purposes And Because of Its Priceless Value The Codex Gigas Is Sealed In A Guarded Vault At The Royal Library In Stockholm. LEGENDS AND HISTORICAL FACTS: (1.) The Codex Gigas Is A Giant Book of Questionable Origin; Almost 1000 Years Old; And A National Treasure Once Counted To Be The 8th Wonder of The World. (2.) The Codex Gigas Is The Largest Medieval Manuscript Known To Exist On Earth; Each Page In The Devils Bible Is A Animal Skin And The Giant Book Recently Made International Headlines And Vented For One Hour In A National Geographic Special. (3.) Legend Is Nobody Knows Who Wrote The Devils Bible or What Inspired Its Writer, The Other Legend Is Nobody Knows Who Designed The 1st Great Seal or What Inspired Its Designer. (4.) Another Legend Is A Mysterious Hooded/Cloaked Figure of A Man Gave Thomas Jefferson The Design For The Great Seal of The USA. (5.) There Is Another Legend Related To This Mystical Magical Tale From A Crypt, The Legend of A Dead Man Who Claimed To Be "The Truth" Born In Bethlehem, Legend Is The Truth Was Hated And Betrayed And Sold For 30 Pieces of Silver To Be Brutally Edited; Wrapped In A Custom Shroud; And Sealed In A New Vault Until The Edited Truth Magically Escaped The Vault Un-Edited To Be Known Again. OTHER MISC NOTES: (A.) Codex Gigas Is Latin Interpreted: Great; Big; Giant; Renown Book. Therefore The Great Seal of The Great Book And The Great Painting of The Great Satan Bound Betwixt Twin Towers On The Most Filthy And Most Exploited Page of The Book . . .The Great Seal of The Pit. (B.) Annuit Coeptis; Novus Ordo Seclorum; And E Pluribus Unum Are Also 'Latin Words' Which Until Recently Were Interpreted And Legally Defined: The 'Official' Language of The Church & State. (C.) There Has Never Been A Democracy In History That Did Not Commit Suicide or Murder Itself. Therefore This New Revised Experiment 1776. LINKS TO THESE STORIES A Link To The 1st Great Seal Legend http://youtu.be/oNHko7d2jiI A Link To The Devils Bible Documentary http://youtu.be/zZ_A1I6d9iM A Link To My Live Journal Website: http://community.livejournal.com/bible_codes/
Views: 555 44AlphaMale44
AS NOT SEEN ON TV - The Great Seal of The Pit.
 
03:23
Featured In This New Collection Is The First Great Seal of The United States And The 'Codex Gigas' A Mystical Magical Royal Treasure Historically Known As The Devils Bible. Historically The Codex Gigas Is A Spoil of War Taken From The Royal Treasury of The Holy Roman Emperor 'Rudolph II' By The Plundering Swedish Army And One Story Is Rudolph Had Borrowed The Book From A Monastery For His Art Exhibit & Occult Studies And Never Returned The Book. The Codex Gigas Is Believed To Be Written By A Mysterious 'Bohemian Monk' Who Sold His Soul To The Devil. Due To Its Old Age The Codex Gigas Is Kept Under A Customized Shroud For Preservation Purposes And Because of Its Priceless Value The Codex Gigas Is Sealed In A Guarded Vault At The Royal Swedish Library. INTERESTING LEGENDS AND HISTORICAL FACTS: (1.) The Codex Gigas Is A Giant Book of Questionable Origin; Almost 1000 Years Old; And A National Treasure Once Counted To Be The 8th Wonder of The World. (2.) The Codex Gigas Is The Largest Medieval Manuscript Known To Exist On Earth; Each Page In The Devils Bible Is A Animal Skin And The Giant Book Recently Made International Headlines And Vented For One Hour In A National Geographic Special. (3.) Legend Is Nobody Knows Who Wrote The Devils Bible or What Inspired Its Writer And Another Legend Is Nobody Knows Who Designed The 1st Great Seal or What Inspired Its Designer. (4.) American Legend Is A Mysterious Hooded/Cloaked Figure of A Man Gave Thomas Jefferson The Design For The 1st Great Seal of The USA. (5.) There Is Yet Another Legend Related To This Mystical Magical Tale From A Crypt, The Legend of A Dead Man Who Claimed To Be "The Truth" Born In Bethlehem. Legend Is The Truth Was Hated And Betrayed And Sold For 30 Pieces of SilverTo Be Brutally Edited; Wrapped In A Custom Shroud And Sealed In A New Vault Until The Edited Truth Magically Escaped The Vault Un-Edited To Be Known Again. OTHER MISC NOTES: (A.) Codex Gigas Is Latin Interpreted: Great; Big; Giant; Renown Book. Therefore The Great Seal of The Great Book And The Great Painting of The Great Satan Bound Betwixt Twin Towers On The Most Filthy And Most Exploited Page of The Book . . .The Great Seal of The Pit. (B.) Annuit Coeptis; Novus Ordo Seclorum; E Pluribus Unum Are Also 'Latin Words' Which Until Recently Were Interpreted: The 'Official' Language of The Church & State. (C.) There Has Never Been A Democracy In History That Did Not Commit Suicide or Murder Itself. Therefore This New Revised Experiment 1776. LINKS TO THESE STORIES A Link To The 1st Great Seal Legend http://youtu.be/oNHko7d2jiI A Link To The Devils Bible Documentary http://youtu.be/zZ_A1I6d9iM A Link To My Live Journal Website: http://community.livejournal.com/bible_codes/
Views: 3974 44AlphaMale44
First National Reunion of WWII Code Girls
 
01:19:45
The Library of Congress Veterans History Project (VHP) will host a reunion of a special group of changemakers—the women who served as top secret code breakers during World War II, more commonly known as “Code Girls.” This event is believed to be the first national reunion of these women, all of whom are nonagenarians. Guest speakers include “Code Girls” Nancy Tipton and Suzanne Embree, New York Times bestselling author Liza Mundy, and television personality Bill Nye, whose late mother was a “Code Girl.” The “Code Girls” were originally recruited as young college students with high aptitudes in mathematics and linguistics, and are credited with cracking the secret codes that helped lead the United States to victory. Due to the sensitive nature of their work, the women’s achievements and patriotic service was at risk of being lost to history until Mundy, citing VHP collections and other sources, published her widely popular book, Code Girls: The Untold Story of the American Women Code Breakers of World War II (Hachette Books, 2017).
Views: 2722 LibraryOfCongress
Biography - American Gunfighters - Best and Worst -  from the Wild West - 1800s - Part 2 of 2
 
12:11
This is Shirley Griffith. And I'm Steve Ember with EXPLORATIONS in VOA Special English. Today, we present the second of two programs about the Old American West. Experts disagree about who were the most dangerous gunmen of the Wild West. However, we will tell you about two of them. One was an outlaw. One was a lawman. Some people living in the West at this time became famous. These include men who worked as professional officers of the law, and others who were criminals. Their names were Wyatt Earp, Doc Holliday, Bat Masterson, Billy the Kid, Wild Bill Hickok and the brothers Jesse and Frank James. Books, movies and television programs have made these men more famous today than they were when they were alive. Some of the stories about them are true, but most are only stories. Here are two true stories of the Old West. Our first story begins with a very old photograph that was made in the little town of Pecos, Texas. This is one of the few photographs known to exist of a very dangerous man named James Miller. He was also known as "Killin Jim" or "Killer Miller". History records show that he was responsible for the deaths of at least twelve people. Jim Miller often said he had killed more than 50 people. The real number of people he killed will never be known. Jim Miller killed people for money. He charged about $150 to kill a person. He also killed anyone who caused him trouble. One man died a few days after he had spoken in court against Miller. There is no evidence to show who killed the man. However, people were sure Jim Miller was guilty of the crime. Miller was successful at what he did because there was little law enforcement in the areas of Texas and Oklahoma where he lived. And, people were afraid to say anything against Miller. They knew it would mean their lives. One law officer got into a shooting incident with Miller. The lawman shot Miller three times in the chest. Miller fell to the ground. The officer was sure he had killed the dangerous man. A few minutes later, Miller got to his feet. He had not been hurt. He was wearing a steel plate under his shirt. The bullets had hit the steel. The force of the bullets had knocked him down, but had not hurt him. Later, the law officer died from gun shot wounds. No one was sure who shot him. However most people knew Miller had killed again. In 1909, Miller made a mistake. He was paid money to kill a man in the little town of Ada, Oklahoma. He killed the man in the dark of night. Later, Miller was arrested for the crime. The citizens of Ada knew he had been arrested several times but had always been released for lack of evidence. Also, many people were afraid to speak in court against Miller. Many of the citizens of Ada thought Miller would escape justice again. On Sunday morning, April 19th, the citizens of Ada attacked the jail where Miller was being kept. They took him to a barn and hanged him. No one was ever arrested for the hanging of Jim Miller. Most people thought justice had been done. One man said, "He was just a killer. He was the worst man I ever knew." One of these was a man named John Horton Slaughter. He was sometimes called "Texas" John Slaughter. He was born in Louisiana in 1841. His family moved to Texas when he was only three months old. He grew up with little education. However, he learned to raise cattle. He learned to speak Spanish. And he learned much from the Native American Indians. John Slaughter was not a very tall man. He was really very small. However, criminals became afraid just looking into his eyes. History records show that John Slaughter took part in at least eight gunfights. This does not include his time as a soldier in the Civil War or fighting against Indians. The records show that he was forced to kill at least four men and possibly two others. These recorded shooting incidents took place when he was an officer of the law. There may have been several more. People who knew John Slaughter said there was no doubt they were dealing with an extremely serious man -- a man who could be very dangerous. One friend of John Slaughter said Texas John was the meanest good man he ever met. In 1886, he was elected the lawman or sheriff of Douglas, Arizona, the town near his ranch. Several groups of criminals were working in the area at the time. Soon, many of these outlaws were in jail. Most refused to fight Texas John Slaughter. They surrendered instead. Those who would not immediately surrender faced Sheriff Slaughters guns. After two terms as the sheriff, John Slaughter helped the United States Army seek out the famous Apache warrior Geronimo. He helped start the bank in Douglas, Arizona. He later became a representative in the Territorial Government and worked to have Arizona admitted as a state.
Views: 6572 ListenAndReadAlong
Mysteries SOLVED By The Internet
 
09:20
There are some crazy and unexplained things that can be found on the internet and with more than 3 billion people using it, it’s no wonder that sometimes they can put their collective minds together to solve mysteries. From illusions to assisting investigators in missing person's cases, the answers to these mysteries were uncovered with the assistance of the world-wide-web. Here we have 11 Mysteries Solved by the Internet. Subscribe to Talltanic http://goo.gl/wgfvrr 4. Time Traveler Have you ever seen that video of the supposed time traveling woman in the 1928 Charlie Chaplin film Circus? If you have, you might have been blown away by what looks like a woman talking on a cell phone way back when movies were still purely black-and-white. But one commenter on YouTube solved what was going on. Crennycrenshaw stated that what she is holding in the video clip is actually a hearing aid made by Siemens in 1924. The user advised people to go to the Siemens website and view the picture of the 1924 model that shows what it looked like and how it was to be used. Must have taken a little digging to come up with the explanation but we must say, those are some pretty fantastic researching skills. 3. Dorothy Holm A woman had her ability to speak taken away by a tumor in 1996 and began furiously scribbling seemingly random letters on index cards before her death. Her family believed that she might have been trying to leave them some message, although it looked as if she had written it in code. Her grandchildren spent 18 years trying to puzzle out what in the world the random assortments of letters could mean before one of the granddaughters resorted to the internet to try to get answers. Within thirteen minutes she had a response. A metafilter.com user wrote back telling her that the card she had posted contained the first letter of every word in the Lord’s Prayer, blowing her mind. She was amazed that something that had been eating at her family for 18 years could be solved so quickly merely by posting it on the internet. The other cards are still being deciphered. 2. Cicada 3301 In 2012, a cryptic message showed up on different message boards all across the internet. The puzzle challenged visitors to find a hidden message in an image that accompanied it and stated that they were looking for “highly intelligent individuals.” The puzzle initially baffled virtually everyone who stumbled across it, that is until a man named Joel Eriksson came across it. Eriksson is a cryptosecurity researcher and developer from Sweden and said that he found the puzzle quite some time after its initial release. He quickly worked to solve it and found it much harder and more in-depth than he first thought it would be. He had to enlist his knowledge in areas from Mayan numerology to cyberpunk speculative fiction, used skills from stenography to cryptology, and had to enlist the help of people the world over to help him find posters taped to telephone poles in 14 different cities. Eventually, the puzzle brought him back to the internet and what he saw disappointed him. He was pointed toward an address on the anonymous Tor network, but when he arrived, he found a message from Cicada stating their disappointment in people sharing information to solve their puzzle instead of working on it individually. While he was extremely disappointed with the outcome, he was also proud of the work he had done. It took him only three weeks to work his way through all of the steps laid out for anyone to navigate. The group now releases a puzzle annually, and the group’s identity is much sought after. 1. Grateful Doe The body of a young man was found in the wreckage of a car crash that took place in 1995 and was nicknamed “Grateful Doe” because of two concert tickets found with his body at the time of his death. Jason Callahan was hitchhiking and following the Grateful Dead tour in 1995 and had been picked up by a 21-year-old on the road. The body of the other man was identified immediately by his family, but no one had any idea who the other man was, and he didn’t match the description of any missing persons report because Jason’s mother hadn’t reported him missing. An Australian Redditor with the handle “greymetal” posted his picture online in 2014, and his identification was set in motion. By January 2015 there was a serious lead: two men came forward claiming to know the man in the picture and called him Jason. They also said they knew he was from Myrtle Beach, SC. Volunteers then organized on Facebook and began bombarding news stations with the story. It was picked up and broadcast in the Myrtle Beach area and Callahan’s mother, Margaretta Evans, saw it. She filed a police report for her son the next day, and police immediately opened up an investigation. Grateful Doe’s DNA was taken and run, and after 11 months a positive identification was made. Too bad his mom didn’t just file a missing-persons report in the first place.
Views: 508659 Talltanic
The Reporter Who Spilled the Secret behind the U.S. Navy's Victory at Midway
 
57:08
Stanley Johnston's Blunder: The Reporter Who Spilled the Secret behind the U.S. Navy's Victory at Midway A lecture at The Institute of World Politics, February 27, 2018 About the book: Stanley Johnston's Blunder: The Reporter Who Spilled the Secret behind the U.S. Navy's Victory at Midway concerns what may be the biggest intelligence leak to a reporter in U.S. Navy history. It spotlights Chicago Tribune war correspondent Stanley Johnston, embedded with the carrier USS Lexingtonwhen it is sunk by Japanese war planes during the Battle of the Coral Sea on May 8, 1942. He returns to the U.S. mainland aboard a transport that picks up a Secret Pacific Fleet message: It describes the composition of Japanese forces descending on Midway Atoll for what will be the pivotal Battle of Midway on June 4, 1942. On June 7, 1942 information from that dispatch appears on the front page of the Chicago Tribune. Top U.S. Navy brass fear the Japanese will see the story, realize their code has been broken and change it, depriving our Navy of vital intelligence. The Roosevelt administration’s Justice Department convenes a grand jury to consider espionage charges against Johnston. The grand jury throws out the case. My book explores key questions: How did Johnston get that story? Did a Navy officer “leak” the Pacific Fleet message? Why did the grand jury dismiss the case? Did the Japanese read the story and change their code? Much of the information in this book derives from 75-year-old grand jury testimony released to the author after a two-year court fight in which the U.S. Justice Department battled to keep the testimony locked up. Carlson’s case, argued by the Reporter’s Committee for Freedom of the Press, was decided in his favor in the fall of 2016 when a three-judge panel of the 7th circuit court of appeals ordered the documents released to the author. About the speaker: Elliot Carlson began his journalistic career in Hawaii, writing editorials for the Honolulu Advertiser. After completing a Congressional Fellowship that took him to Washington in 1963-64, he joined the staff of the Wall Street Journal, later free-lanced from Belgrade, Yugoslavia, and, still later, served as editor of AARP’s monthly newspaper. Retiring in 2004, he turned to biography, writing Joe Rochefort’s War: The Odyssey of the Codebreaker Who Outwitted Yamamoto at Midway (Naval Institute Press, 2011), for which he won the Samuel Eliot Morison Award for Naval Literature. His latest book, Stanley Johnston’s Blunder: The Reporter Who Spilled the Secret Behind the U.S. Navy’s Victory at Midway, was published by the Naval Institute Press in October 2017. Carlson holds degrees from University of Oregon and Stanford; he lives with his wife in Silver Spring, MD.
BEAT ANY ESCAPE ROOM- 10 proven tricks and tips
 
12:12
10 tips to dominate any Escape room- Prepare your brain for the Escape room using Brilliant.org. First 200 people get 20% off!! http://brilliant.org/markrober EXTRA INF0- -Check out Dr. Nicholson's website here for more juicy stuff- http://scottnicholson.com -8 roles for players- http://bgnlab.ca/blog/2018/8/28/the-eight-roles-for-escape-room-success.html -This is the escape room I filmed in. They were awesome to work with. If you live in Silicon Valley this is the perfect spot (not all Escape Rooms are created equal)- http://playliveescape.com/ -This is the harder room that looked like a castle- https://exit2escape.com MUSIC- 0:07- New Shoes- Blue Wednesday - https://soundcloud.com/bluewednesday/ 1:23- Spark- Maxwell Young- https://soundcloud.com/maxwell_young 2:08- The Ocean- Andrew Applepie- http://andrewapplepie.com/ 6:33- Cereal Killa- Blue Wednesday - https://soundcloud.com/bluewednesday/ 8:30- Breakfast- Andrew Applepie- http://andrewapplepie.com/ 10:57- Q- Blue Wednesday - https://soundcloud.com/bluewednesday/ 11:49- Too Happy to be cool by Notebreak- https://soundcloud.com/notebreak/dubstep-too-happy-to-be-cool Summary: I visited Dr. Scott Nicholson in Brantford, ON Canada since he is the world expert in Escape Room design. After meeting with him for a day here are the 10 tips I came away with to beat any escape room: 1. Think simple 2. Searching 3. Organize your stuff 4. Focus on what is stopping you 5. Team roles 6. Lock types 7. Code types 8. Written clues 9. Look for patterns 10. Your guide is your friend MERCH- They are soft- https://teespring.com/stores/markrober PLEASE CONSIDER SUBSCRIBING: http://tinyurl.com/MarkRober-Sub ****************************************­ I make videos like this once a month all year long while supplies last: CHECK OUT MY CHANNEL: http://tinyurl.com/MarkRober-YouTube FACEBOOK: https://www.facebook.com/MarkRoberYouTube TWITTER: https://twitter.com/#!/MarkRober INSTAGRAM: https://www.instagram.com/markrober/
Views: 8018709 Mark Rober
Japanese naval codes
 
09:20
Video Software we use: https://amzn.to/2KpdCQF Ad-free videos. You can support us by purchasing something through our Amazon-Url, thanks :) The vulnerability of Japanese naval codes and ciphers was crucial to the conduct of World War II, and had an important influence on foreign relations between Japan and the west in the years leading up to the war as well.Every Japanese code was eventually broken, and the intelligence gathered made possible such operations as the victorious American ambush of the Japanese Navy at Midway and the shooting down of Isoroku Yamamoto in Operation Vengeance.The Imperial Japanese Navy used many codes and ciphers.All of these cryptosystems were known differently by different organizations; the names listed below are those given by Western cryptanalytic operations. This channel is dedicated to make Wikipedia, one of the biggest knowledge databases in the world available to people with limited vision. Article available under a Creative Commons license Image source in video
Views: 364 WikiWikiup
ఈ వింత అక్షరాలతో బుక్ ఎవరు వ్రాశారు ? | Voynich Manuscript Mystery | Telugu Mojo
 
02:17
☛ For latest updates on Telugu Mojo Channels | https://goo.gl/sk3qjh ☛ Subscribe for more latest Videos | https://goo.gl/5MRNbH ☛ Like us on | https://www.fb.com/telugumojoofficial ☛ Follow us on | https://twitter.com/telugumojo ☛ Prapancha Rahasyalu Videos | https://goo.gl/NsMRVN ☛ Prapancha Rahasyalu Fb Page | https://www.fb.com/prapancharahasyalu/ ☛ Blogger: http://telugumojo.blogspot.in/ ☛ Twitter: https://twitter.com/telugumojo ☛ Tumbler: https://www.tumblr.com/blog/telugumojo ☛ More Videos | https://goo.gl/sk3qjh Telugu mojo features supernatural and paranormal activities from around the world. These fascinating facts packed with compelling true stories will blow your mind and keep you updated on all the mysterious happenings from around the globe. ☛Our Channels : ☛ Tollywood Central | https://goo.gl/zEbHe7 ☛ Telugu Mojo Kathalu | https://goo.gl/GnEFsd ☛ Prapancha Rahasyalu | https://goo.gl/2QJdLi ☛ Mana Health | https://goo.gl/4ZWKxb ☛ Temple Rahasyalu | https://goo.gl/Koaaes Tags:telugu movies, telugu songs,telugu new movies,telugu rhymes,telugu short films,telugu latest movies,telugu dj songs,telugufullmovies,telugunew songs,telugu comedy movies,telugu,telugu audio songs,telugu action movies,telugu all movies,telugu album songs,telugu actress,telugu ayyappa songs, telugu all songs,telugu audio,telugu arjun reddy movie,telugu ads,a telugu movie,a telugu movie trailer,a telugu teaser, a telugu trailer,a telugu movie teaser,a telugu full movie, a telugu songs,a telugu movie songs,a telugu movie video songs,a telugu movie trailer 2017,telugu bf,telugu badi,telugu best songs,telugu best movies,telugu bahubali,telugu bhakti songs, telugu bahubali 2,telugu best short films,telugu bigg boss,telugubommalu,b telugu full movie,b telugu movie,b telugu movies online,grade b telugu movies,ultra b telugu,13 b telugu movie,ultra b telugu episodes,mr b telugu review,hepatitis b telugu,13 b telugu,telugu comedy,telugu comedy scenes,telugu cinema,telugu christmas songs,telugu comedy videos,telugu cinemalu,telugu comedy short films,telugu cartoons, telugu calendar,c telugu tech tuts,c telugu tutorial,c telugu lesson,telugu b movies,ctrl c telugu movie,pointers in c telugu,sundar c telugu movies,recursion in c telugu,hepatitis c telugu,arrays in c telugu,telugu dj,telugu dance,telugu doraemon,telugu dj movie,telugu dubbed,telugu dialogues,telugu dubsmash,telugu dj folk songs,telugu dubbed english movies,d telugu movie,d telugu show,d telugu dance show latest,d telugu tv,dj telugu songs,d telugu film,d telugu cinema,d telugu dance show 2018, d telugu movie songs,d telugu etv,telugu emotional songs,teluguetv,elugu evergreen songs,telugu emotional movies, elugu english movies, telugu etv live,telugu entertainment,telugu emotional video songs,telugu etv news,telugu evergreen movies, e telugu movie,e telugu songs, e telugu movie trailer,e telugu movie scenes,e telugu movie songs,e telugu live,e telugu movie hot,e telugu movie video songs,e telugumovies 2016 full length movies,e telugu full movie jeeva hindi dubbed,telugu film, telugu folk songs,telugu funny videos,telugu feeling songs, telugu family movies,telugu full hd movies,telugu funny,telugu famous songs,telugu film songs, f telugu short film,f telugu movie,kumari 21f telugu movie, b f telugu,u of telugu,kumari 21f telugu songs,telugu movies 2016 fmovies,telugu god songs,telugu geeks,telugu gana, telugu grammar,telugu guninthalu,telugu ghost movies, telugu god movies,telugu gossips,telugu good movies, telugu good songs,g telugu golden awards, g telugu serial zee telugu serial,g telugu movie, g telugu golden awards 2017,g telugu mudda mandaram serial, g telugu live channel,g telugu live today,g telugu awards telugu live tv,g telugu today,telugu horror movies,telugu hit songs,telugu hit movies,telugu hd movies,telugu hd,telugu hd video songs,telugu hit video songs,telugu heroines,telugu hollywood movies,telugu hd songsh telugu boy names,aah telugu movie,telugu h d movies,telugu movies h,telugu h d songs,telugu hot songs hhmtv telugu,telugu songs videos h,new telugu h,telugu movies 2016 h d, telugu item songs,telugu i movie,telugu interview,telugu itam songs,telugu item video songs,telugu infobells, telugu inspirational videos,telugu i movie songs,telugu in telugu,telugu industry,i telugu movie, i telugu songs,i telugu movie songs, i telugu movie scenes, i telugu movie video songs, i telugu trailer,i telugu scenes,i telugu cinema,i telugu film, i telugu video songs,telugu jokes, telugu jabardasth,telugu janapadalu,telugu janapada, telugu jukebox,telugu janapada geetalu, telugu jesus,telugu jabardasth comedy,telugu jathakam,telugu
Views: 131138 Telugu Mojo
Places - Vatican Museum
 
13:41
I'm Barbara Klein. And I'm Steve Ember with EXPLORATIONS in VOA Special English. The Vatican in Rome, Italy is the world headquarters of the Roman Catholic Church. But the Vatican is more than a religious center. Over the centuries, church leaders gathered priceless objects including cloth textiles, books, documents, paintings and sculptures. Come with us now as we join the millions of people every year who explore the Vatican MuseumsAs you enter the Vatican Museums, you pass through large sculptured doors. When the light shines just the right way, bronze squares in the doors seem to catch fire. The artist Cecco Bonanotte created the doors in 1999. He produced them for the opening celebration of the new entrance to the Vatican Museums in 2000. But other works here are much older There are containers with beautiful artwork created more than 2,000 years ago. Statues and paintings show heroes of ancient Troy and Athens. Paintings and cloth textiles reproduce the world of the 16th century. Sometimes experts remove objects to repair and restore them. And some objects may be loaned to other museums. But there are always many interesting and beautiful objects to see at the Vatican Museums It is almost impossible to visit all the Vatican collections in one day. There are more than 20 museums and public art centers. Today we tell about a few of the most interesting works of art. The Gallery of the Maps is a good place to start. The Vatican Museums also exhibit objects from an ancient land called Etruria. This area is now in northern Italy. Most historians believe that Etruscan society reached its height more than 2,500 years ago. The Etruscans created fine art with terra cotta, or baked clay. Pope Gregory the Sixteenth established the Etruscan Museum in 1837. The collection includes containers called vases and objects of bronze and gold. It also includes statues of full human bodies and sculptures of heads. In addition, you can see objects that added beauty to the Etruscan religious centers, called temples. For example, a horse with wings once guarded a temple. The horse still shows some of the colors the artist created so long red, black and yellow.Next we visit the Chiaramonti Museum, established by Pope Pius the Seventh Chiaramonti. This museum contains almost 1,000 ancient works of art, including statues of Roman gods.Julius so liked the work of Raphael that he told the artist to remove earlier paintings in the Pope's living areas. But Raphael understood the value of the work of others. He saved the work of great artists including Perugino.We have saved the best for last. We enter the official private church of the popes, called the Sistine Chapel. It is the most famous part of the Vatican Museums. Pope Sixtus the Fourth had it built in the 1470s. Major events involving Roman Catholic Church leaders take place in the Sistine Chapel. For example, in April of 2005, top church officials held a historic meeting in this center for prayer. They chose a new pope, Benedict the Sixteenth. But the chapel also is home to some of the finest paintings ever created. The ceiling is an artistic wonder. Michelangelo made more than 50 paintings that show more than 300 people. The paintings show God creating Adam, the first man. They also show stories from the Christian holy book, the Bible. It took Michelangelo four years to paint the ceiling. He painted it while lying on his back. Almost 25 years later, Pope Paul the Third asked Michelangelo to paint the wall of the Sistine Chapel above the altar. This is the structure where religious ceremonies are carried out. Between 1536 and 1541, he painted "The Last Judgment." This huge painting includes 300 people. Christ is shown as the supreme judge of good and evil. The painting shows some good people rising to heaven. But bad people are condemned They are shown falling or being dragged by ugly creatures into hell where they are tortured forever. Some people find this work beautiful. Others find it frightening But many people believe that the ceiling of the Sistine Chapel and the "Last Judgment" are the most famous works of art ever created. This program was written by Jerilyn Watson. It was produced by Mario Ritter. I'm Barbara Klein. And I'm Steve Ember. Join us next week for another EXPLORATIONS in VOA Special English Thanks to manythings.org for audio and text This is a VOA product and is in the public domain
Views: 2351 ListenAndReadAlong
American History - Part 039 -  Jefferson's Death
 
13:14
Welcome to THE MAKING OF A NATION -- American history in VOA Special English. Thomas Jefferson left the White House in March of 1809. His secretary of state, James Madison, had been elected president. Jefferson believed the nation was in good hands. He returned to Monticello, his country home in Virginia, and never went back to Washington again. But Jefferson and the new president exchanged letters often. Jefferson offered advice on a number of problems that Madison faced as the nation's fourth president. There were many visitors to Monticello. But Jefferson was happiest when he could discuss books, government, science and education. This week in our series, Maurice Joyce and Kay Gallant discuss the final days of Thomas Jefferson and his lasting contributions -- to Virginia and the nation. Jefferson did not wait long to begin working to improve education in Virginia. A group of men decided to build a college at Charlottesville, near Jefferson's home. Jefferson immediately offered to take a leading part in starting the school. He said he would plan the buildings and also plan what the students would study. He wrote to many of his friends -- experts in education. He asked for their advice. One of the experts told Jefferson he should not include religion among the studies. Jefferson agreed. But he understood that leaving out religious studies would cause problems. He explained it this way: "We cannot always do what is absolutely best. Those with whom we act have different ideas. They have the right and power to act on their ideas. We make progress only one step at a time. To do our fellow men the most good, we must lead where we can, follow where we cannot. But we must still go with them, watching always for the moment we can help them move forward another step." The legislature, however, agreed to part of the plan. It approved a bill to help pay the cost of educating poor children. And it agreed to spend 15,000 dollars each year for a university. There was much debate about where the university should be built. Several other towns wanted the school. Finally, Charlottesville was chosen. By this time, Jefferson had completed plans for the university buildings. He borrowed many of his ideas from the beautiful buildings of ancient Greece and Rome. The buildings were so well planned that one hundred years later, when the university was to put up a new building, the builder could find no reason to change the plans drawn by Jefferson. Work began on the university immediately. But it was six years before the school was open to students. Jefferson was there almost every day, watching the workmen. He was quick to criticize any mistake or work that was not done well. When he was sick and not able to go down to the university, he would watch the work through a telescope from a window of his home. The cost of the university kept growing. And Jefferson had to struggle to get the legislature to pay for it. He also worked hard to get the best possible professors to teach at the university. He sent men throughout the United States to find good teachers. He even sent a man to Europe for this purpose. Finally, in March, 1825, the University of Virginia opened. Jefferson's health had suffered during his years of work for the university. He was eighty-two years old and feeling his age. He suffered from rheumatism and diabetes, and was so weak he could walk only short distances. Jefferson also found his memory was failing. He knew he did not have much longer to live. He told a friend one day: "When I look back over the ranks of those with whom I have lived and loved, it is like looking over a field of battle. All fallen." As his health grew worse, Jefferson turned his thoughts to death. He wrote how he wished to be buried. He wanted a simple grave on the mountainside below his house. He drew a picture of the kind of memorial he wanted put at his grave. On this stone he wanted the statement: "Here was buried Thomas Jefferson -- author of the Declaration of American Independence, of the Virginia Law for Religious Freedom, and Father of the University of Virginia." On the Fourth of July, 1826, the nation began its celebration of the fiftieth anniversary of the Declaration of Independence. Then, from Boston, came news that former president John Adams had died. His last words were: "Thomas Jefferson still lives." But Adams was wrong. At ten minutes before ten in the morning, on that same Fourth of July, his friend, Thomas Jefferson, had died. As the news of the deaths of the two great men spread across the country, the celebrations turned to mourning and sorrow. Jefferson was buried the next day, as he had ordered, in a simple grave on the quiet mountainside.
Views: 7305 ListenAndReadAlong