Ciphers cracked revealing plans for 9/11 and Amerithrax attacks

Di più
1 Anno 11 Mesi fa - 1 Anno 11 Mesi fa #49780 da Eldorado
I am a renown cryptographer that has broken ciphers from Langley's KRYPTOS puzzle at the CIA's Headquarters in Virginia revealing never before seen evidence of the planning behind the 9/11 attacks.

The ciphers from within the matrixes of text were divided into 4 parts, with an additional 5th layer made out of their encryption systems. In one corner was the information that began my search for more evidence, reading END WTC. Found in two letters from the CIA's SOVA Group that were against the statue being commissioned was a set of instructions and a set of two confined blocks of text. The "disapproval" letters held more details about the plans that were made for the Twin Towers specifically and were broken down with keys found in the Seito Sakakibara Letters, that also detailed their new plan for laundering their counterfeit "Superdollars" made in Japan.

When the ciphers of this puzzle were broken, it was telling and patterned with details about their covert work from 1990 until the events of 9/11/2001. The puzzle was actually commissioned in order to culminate in the release of new information from the Agency as a message to two agents from their previous operations called the "Zodiac". They were set up as a call to the agents in the field from past events and tasked them with replying. The reply came in the form of the Scorpion Letters 9 months later.

Their ciphers in the past from the 60s up to the 90s had laid the groundworking in text for the Operation Bayonet, Operation Wrath of God, and Operation Spring of Youth. During this time they also planned to launder their drug money through the Vatican, using the American Archbishop as their Minister of Finance, while conducting the Il Mostro Di Firenze Murders in Italy. Each time they deposited their monies along a timeline matching the murders, they escalated the situation with more threats. They used the Zodiac Letters as a way to communicate to their internal associates about their plans. Not all the Zodiac Letters had murders found to be related to them in San Francisco, but they kept being sent to media for decades after.

When the ciphers from these operations were used up, the CIA concocted a new series of them at their new headquarters, in order to extend their operations into the next decade, until the plans for 9/11 were hatched with the later Amerithrax Letters hosting their own plans to continue their affairs afterwards.

ZODIAC CIPHERS
KRYPTOS at Langley
Amerithrax Letters

As a dedicated timeline of their operations, that were geared at creating a splinter cell or shadow government, they were able to mask their affairs behind the murders of innocent victims of a host of serial killings and targeted assassinations, that were known by different names, but all featured a letter or card of some sort and police sketches that matched them perfectly throughout the different times when they were made.

I discovered the identities of two suspects that were named in the ciphers of the Zodiac, Kryptos, Scorpion, Seito Sakakibara, and the Amerithrax Letters, with an addendum hit list found that included the creation of murders found on Obama's "Disposition Matrix", as well as later gruesome attacks that were specifically made into mockumentaries to induce fear in the minds of the public, and skew the public's awareness of these cases. I will go through all the ciphers one by one as they relate to the affairs that transpired.

Lt. Col. Michael Aquino
The Monster Of Florence
Suspect - ZODIAC KILLER

 
Ultima Modifica 1 Anno 11 Mesi fa da Eldorado.

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa #49781 da Eldorado
The ciphertext in the corner of the puzzle's lower section showed their movements were planned out to bring an end to the WTC
END WTC - Kryptos Ciphertext Read

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa #49783 da Eldorado
The ciphers of the puzzle were merely a historical distraction, while the final layer was used for communications with their agents in the field

SOVA Disapproval Letters

With that in mind you can find also other internal communications found in their declassified archives on the puzzle itself.  One letter held descriptors of the type of ciphers to look for and the other held the body of the text that was used....it is one of the most cleverly contrived ciphers I ever worked on and took a few minutes to be able to see how they had made the letters to conceal a secondary message.

SOVA Disapproval Letter 1 - Vertical Breaks and Boxing Techniques

But after that you find that their letters were used to deliver a message about the Marsh McLennan accountants in the WTC Towers, and you find that they were planning to eliminate them.  It mentions the ciphers in the other letters to be contained with a vertically read section and then shows the positioning of the block of text to use.

SOVA Disapproval Letter 2 - Layout of sections for ciphertext

It is an amazing find that can be seen showing the image of the WTC Towers and reading TWO TOWERS at the base of them

SOVA Disapproval Letter 2 - Close Up TWO TOWERS text blocks

Nothing too obvious just yet, just moving through a list of their inner design in a sequence...as instructed in the letters

SOVA Disapproval Letter 2 - REDACTED Signatures forming skyline of NYC

But you can see they were masking a lot of information in this one set of letters while decorating the other messages to the public like a trivial game that would never end.  You can see inside the Disapproval Letter 2 from the SOVA Group that the signatures of the people that signed them were used as part of the illusion.  When "circulating" the signatures or rotating them 90 degrees it forms the image of the NYC skyline showing the Towers and Building 7, as well as the second one holding the image of the new tower built.

SOVA Disapproval Letter 2 - Signature Hint - Seito Sakakibara Keys

Building on that part alone you can see the words "Hidden" made from the marker streaks as the name of the puzzle in Greek also means "Hidden", and at the bottom of the signature section was a small smiling face and winking eye that showed the image of a Japanese Kanji character.  The block of text with the Two Towers mentioned is used as a working cipher, meaning that there is a columnar shift applied to alter the block to reveal the planning stages in detail.



 

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa #49784 da Eldorado
The CIA are clever about their work and have a number of older types of cryptograms and computerized codes that were created to specifically serve their needs throughout their operations.  In the case of Kryptos, they had wanted the entire world to see it, while sadistically hiding a plan for the operations, playing tricks on the CIAs intelligence using the puzzle to hide their agendas.  These stabs are found in the ciphers of the Zodiac throughout, and when Kryptos was made it was intended to be a continuation of their previous ciphers and operations, so they used telltale signature encryption techniques for that purpose, and used these slurs as a way to keep the patterning uniform.

As they passed along these ciphers through media publications and through their internal communication's channels they were able to plan out these operations, and to do so would murder more innocents just to create the fear and shroud over the affair, usually leading the media to publish these ciphers for "public awarness and assistance" from professionals.

Seito Sakikibara Ciphers - Kryptos Comparisons

These are the compilations of the many letters that were sent in Japan following the murder of two school children, and they were made to be the catalyst for the use of these ciphers in order to pass along another phase of their operations.  The ciphers detailed different types of Katakana, Kanji, and Hirayana, which they claimed that a 14 yo had written and called him "Kid A".  In order to keep any further investigations going by the public, they moved the trial to a closed court and implicated him without any examination of the text of the ciphers other than the basic translation of the words in the text of the ciphers, except they ignored the fact he mixed the characters according to a translation that was fluent in English, but compiled with numerous types of linguistic fill-ins from the different forms they use in school's in Japan at that age.

Showing a specific detail of the breaks in the first SOVA Letter you find the patterning that is used to break down the Sakakibara letter that is styled in Greek looking letters, but written in English.  Remember that Kryptos is Greek for Hidden.

SOVA Disapproval Letter Break Comparison - Seito Sakakibara

In this case ciphers of the Kryptos Disapproval Letter showed a consistent pattern that when segregated from the body of text it formed the outline of the body of the person in mention.  Adding the boot shaped cipher from one of the letters you piece together their affair. Here we see there is a group inside the CIA that is moving to expose parts of their operations of the past in order to implicate one of their old team, slandering him calling him the SHOOL KILLER.  In the Zodiac Letters were ciphers that also were toned in the same manner, and were used to try to jest with the other side of their team which they moved to Vermont to conduct an Eastern theater of operations, with Bernie Sanders as their director.  He was working in the US before these killings began, and was working through their operations with them but tried to break from their group and form his own political cabal, using politicians to shield his identity in the Church Hearings.

Seito Sakakibara Cipher Break - Image Confirmation

The ciphertext in this letter was appearing to be in English, but used Greek-looking characters.  The letter "E" specifically would be used to act as an arrow pointing at the previous letter, and using that as a ciphertext, was then placed into a ROT or Caesar Shift cipher using the settings of 4 and 6.  The phrase in the letter specifically says "I AM NOT FORGETTING" as a warning to Sanders for his collusion with investigators that secured him his freedom while implicating the CIA in the Hearings.  This infighting is also key to identifying two teams at work in this case.  The US and Israel.

When the examinations of the phrases were made it showed the use of a stacking technique to have letters also hold as the numbers 4 and 6.  When placed through the ROT/Caesar Shift it revealed the name BXRNIE and BEARN.  This is also found in the Zodiac Z408 Letter.

Zodiac Z408 - PLUCK THE NAME GAME - BERNIE SANDERS

The creation of these ciphers and the patterns within them are the keys to proving that they are communications between agency directors of the CIA and FBI, and are made to be used to conduct operations by their agents in hidden locations.  The puzzle is even laid out with stone maps at Langley that point to the locations of these two agents in New Mexico and Vermont.....Lt. Col. Michael Aquino and Bernie Sanders, each with their own Intelligence apparatus helping to conduct their affairs.

 

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa #49786 da Eldorado
Taking notice that they were using a design that held characteristics of an English origin, and using the same tones as the Zodiac Letters, the media in Japan began to call them the "Japanese Zodiac Letters".  Seito Sakakibara literally means "Alcohol Devil Rose Saint Fight".  They were trying to create a form of umbrella operation that had a series of branches, with one aimed at creating a state of mind using enhancement technologies in the media, in order to create a psychological state of mind.  The author of the letters had chosen the name, and used an old mystical symbol, a swastika, to inspire more fear among the locals harnessing the superstition of their occult ritual killings.

Seito Sakakibara Body of Text - Block Configuration Examination

Taking the section of the blocked out body of text from the Greek Letter, you find that there is a massive amount of information within it when laid across as shown in the diagram, leaving no doubt as to the configurations that were used inside of their matrices to form Old English Box Ciphers, with a telltale rotation that was seen in a number of ciphers before them.  The blocking out of the center of the text and the read of the text forms the phrases OL E and PIVO BO meaning Old English and Pivot Box describing their methods of breaking from here, as well as taking on the words BIO.  In this blocking section it mentions finding a NY Case File as a joke.  The case related to the creation of the Heriberto Seda trial, and the copycat Zodiac Ciphers that were made as a distraction of investigations.  The attempt to close the case made the real suspects respond with a joke embedded in his real ciphers.  During which time he sent one to NYC to prove his sincerity, accusing IATSE Unions of Entertainment Industry Officials of hiding the cult affairs, and jesting with them as well to continue their partnership or they would expose their part causing troubles.

The information that is contained in the next segment is used to create a system to instruct them in manufacturing the technologies that work in conjunction with their research into Slow Kill Technologies, meant to disrupt the RDNA process from replicating and healing damaged cells, while internal medical conditions are manifest from the influences of the radiological broadcasting of light frequencies.  Specifically the phrases WELL USE USA LYDDO TEEVEES TO KILL PHEPL stands out in the next step and a variance of WELL SEE YOU IN KYMO GAME added in a secondary read is also achieved with the available text, using partial words formed.  You are tasked with literally building the cipher as instructed.  The message finished with a phrase TRY TO FENN.  Forest Fenn is Aquino's alias in New Mexico, and it appears that they are trying to direct him to assume that personality as an escape plan towards the end of this segment of operations.

Seito Sakakibara Letter Block - Step 2

For example using the words
SEIT
OSAK
AKIB
ARA
in a 4 letter block, and then rotating the box into a 6 letter long configuration, will eventually turn the phrase into LYDO TO RHF GV AILM OF RDNA using the methods described.  The key word LYDO is sounded in Japanese, meaning Light.  The author mentioned this as something to not forget about.

Seito Sakakibara Letter - Additional Romanji Translations

The ciphers of the other letters in this set worked to continue their operations and described the methods for mapping out their attacks in Japan, as well as the showing of information related to their ciphers of Kryptos specifically designing their letters in a mix of characters to take on a translation, forming a broken phrase that equates to BREAK LIKE WE TAUGHT YOU WE SPY BY THE WEB with the page title appearing like the phrase KRYPTOS. 

Seito Sakakibara Mapping Technique - Kryptos Comparison

Laying the formation of a mapping system, and encrypting their directions and instructions in multiple parts of this cipher, connecting with Kryptos's text comes next to show the final parts of their operation on 9/11 described using the final Seito Sakakibara cipher in the group.  It acts as a key to shifting the columns in the text block of the Disapproval Letter, and fully describes the events.

Seito Sakakibara Letter - Kryptos Shift Key

Looking closer, the image at the bottom would naturally appear like a looking glass or magnifying glass, instructing you to see the finite details of the key.  It clearly uses lettering that appears to take on the descriptors of two keys, one 9/11 and the other VT.  It is addressed to the agent Bernie Sanders.

Seito Sakakibara Key - Kryptos Comparison

Comparison of these keys and the blocks showed that there were two modifications to be made.  In the first key it describes a vertical drop and in the second it shows the segregation of blocks to be used to form a tertiary message.  In the first adjustments, with one shifting a set of columns, and the other acting as a point to lock in the reads of the new blocks, the message delivered is about their manipulation of the economic value of the yen, using Superdollars schemes and laundering through Fuji Bank.  Shifting according to the key shows a shift downward of 4 lines, and then 3 lines delivering a series of new phrases. First it describes "MO PIECES" as in more money, and more powerful military pieces.  The next shift will lock in the information about the Towers and the employees inside.

It drops down like the Towers did, and reads MEANING WOULD END EMPLOYEES ARE SPLATTERED BE DEALT LEAD SERVE TO SENSATIONALIZE POOR BRIDES OF

Below is the inclusion of the blocking technique that reads off using the key counts in the Seito Sakakibara Letter to deliver the message to Patrick Leahy and Bernie Sanders, preparing them for the oncoming war.  You can see the counts matching to select the amount of lines and the blocked phrases read IN THE FEET - SANDERS - ON TV AU (gold), in another humerous spinoff added. The other blocking section is directed at Leahy - LEAHY WEEPING TO TWO TOWERS and CLUE TO WOPR describing their war game being planned.

Seito Sakakibara Letter Blocks - Second Configuration

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa - 1 Anno 11 Mesi fa #49787 da Eldorado
Take notice of my limited edition Arnette Hot Shots with the combination of the Kryptos ciphertext, and symbols from the Zodiac and Scorpion Letters.

Take notice that they are made specifically with these ciphers combined together to form the illusion I mention. A lot of people know about my research in the industry as I was once known to have tried to usurp this plan before it happened, reporting the activity of these groups operating within the Entertainment Industry in NYC as a person that worked numerous shows and events before becoming the Editor of WARNING! Magazine's Tempe Branch. I also have hosted the American Cryptogram Association's Annual Convention in 2017 in the hometown of the Zodiac Killer himself.

To have a vested interest in this affair is one thing, to be born and raised in Princeton, NJ is another, as after the events of 9/11 the Amerithrax Letters were mailed using a drop box across the street from Princeton University. The reason is that they wanted to send a message to their political science directors that were preparing a document that would become the standard for all War Crimes Tribunals, and would exempt exclusions that the US had set aside for themselves. Bush had just come to Trenton and made the comment "Politics in New Jersey are like a toothless tiger".

The continued operations that followed also threatened a certain individual in the letters, as they were beginning to target specific people that held the skills to break their ciphers or held information about their affairs. The threats were later compounded with the creation of a "Kill List" that was found on the Washington Street Bridge suspects that were detained fleeing the attacks. I discuss all of this in the next segment of this affair, and show without a doubt how the use of the science of cryptography and the art of concealment was integrated years before in the production of this plan, having used the World Trade Center as a tool for laundering money after their Vatican/Bank Of London scandals began to be exposed, threatening their operations.

They are fully revealed in the links I posted, and are in the spotlight, as I sent these reports to a number of judicial groups and countries that were attacked previously and occupied by this affair, in order to inform them about the evidence I located. Their goals were always to manipulate their economies and to sap their natural resources. Their agendas were geared at finishing a long running plan that was begun by Zionists under direction of Rockefeller and Morgan. Their plan began in the 1880s with the original Business Plot called the Peralta Land Grab in Arizona, and is another research project of mine that exposes the operations of the first clandestine groups in the US through the study of their ciphers, showing the formation of a splinter cell of Masons, and the beginning of the Knights of the Golden Circle'

These ciphers were very old, but the plans they laid are still in effect used to conduct the ENTIRE strategy of the US Govt.

I am the first person to bring this evidence to light and expose their motives over a decades long operation.

Arnette Hot Shots - Crytpic Text in Design
Ultima Modifica 1 Anno 11 Mesi fa da Eldorado.

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa #49788 da Eldorado
Now when the World Trade Centers were downed, investigators found that an "Art Performance Group" named Gelitin was stationed in the upper sections for over 4 years, and they wondered what was really happening, as the Pentagon was also hit and the downing of the plane from the Cleveland Airport in Shanksville, PA became an oddity that couldn't be explained. 

Likewise there were "Dancing Israelis" on the NJ shores that were driving a van around acting suspicious, cheering on the attacks while filming.  We all know that they were questioned and detained for some time and gave a presentation explaining that they were there to film the events.  As they were leaving, the APB's had alerted the others that they were suspects, and through investigations their cabal was routed out of the US having ties to the Urban Moving Systems company that employed many of them.

The evidence that was found on them tested positive for explosives, and there was commentary that they were suspected of having military grade weapons with them, or had been using them recently, fearing they had been rigging them somewhere across NYC.  When there were investigations into their possessions, the investigators overlooked a piece of evidence that appeared to take on the form of a Contact List.  Something that appeared normal but was cleverly used to conceal a hidden cipher.  I had at that point already broken down the ciphers of the Amerithrax Letters, and when I went to work on 9/11/17 searching for any sign of a pattern, I located something that both the press had mentioned, and had been seen in the breaks of the Amerithrax Letters.  A large and specifically designed "Z" shape that was taken from the Zodiac Cheri Jo Bates Letters from one of their first operations in the US.

They were held by the FBI until a FOIA request released them in 2017, and I went to work on inspecting them for signs of a cipher.  There were over 100 papers included as their file was quite large, but I was able to scan through them and pull a rabbit out of my hat like a magician, exposing their "Kill List" embedded in a series of names of their contacts on a single page of the pile.

It was once again built using the instructions that were found inside of the selection of words and their relative positions to other sections of the letter, showing a series of individual ciphers that acted together.

Contact List Original - Redacted Numbers

Si prega Accesso a partecipare alla conversazione.

  • Jimmy81
  • Visitatori
  • Visitatori
1 Anno 11 Mesi fa #49789 da Jimmy81
Risposta da Jimmy81 al topic @pump_upp - best crypto pumps on telegram !
t.me/pump_upp - best crypto pumps on telegram
Make 1000% and more within 1 day, join channel @pump_upp !

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa #49790 da Eldorado
The ciphers in the Contact List were divided in three sections and were made to be used to direct their operatives in the US in targeting select individuals for assassinations, as well as deriving a series of descriptors to be used to confuse the masses through the creation of strange and speculative documentaries using edited video footage and media commentary, leading up to the Amerithrax Letters, which were used as the ultimate catalyst for declaring war against Iraq and Afghanistan.  The key to this build up was to use the attacks of 9/11 to build sentiment, while the Amerithrax Attacks were made to be used to take advantage of their affairs to justify the initiation of their military attacks and occupation. 

When these ciphers were hidden in evidence lockers, they were kept for a 10 year delay before the first killings took place, while they were entertaining a MASSIVE PULP FAD, as seen in the text of the decrypted sections.

Contact List Cipher Breakdown

This is how the cipher was compiled.  The cipher held a specific word categorization that when removed and compared, would produce the biliteral ciphertext strand that was translated to the letter "Z".  The media was already on fire looking for "Mr. Z", their suspect in the Amerithrax Letters, as they noticed the pattern forming the shape of the letter and coined the suspect with their usual suspicious. 

Contact List - Mr. Z

The title section held a first letter sequence of text that when placed into an anagram program would only produce a specific set of words.  They read off as descriptions of their agendas after 9/11.

Contact List - First Section, First Letter Anagrams

MAP FIVES PLUS AD, VALUES PAD PIMP
MASSIVE PULP FAD, MAP FIVE UPS LADS
ADVISES FLAP LUMP, FIVE ADS LUMP
MAP IF SAVED PLUS, MAP FLED VISAS UP

When the cipher was made and the key was used to find the mystery suspect Mr. Z, it held the description of the way to break down the other sections.  The first letters were used in an anagram, and a Biliteral was used, the same as in the Amerithrax Letters.  In this case taking the Biliteral examination of the names in the list you would need to have a specific letter count to be authentic, ending in a 5 or a 0.  The confirmation of this portion being used comes from the names examined for their use of a capital or lower case lettering.  The words are compiled together and bracketed every 5 letters, with the assignment of the upper case given an A and the lower case given a B.  The combinations of upper and lower case letters are then found to be played against the key chart that used the original Baconian Biliteral system. In this case they used both the normal version, and the reversed version to give a larger strand of ciphertext as a result and some of the patterning was such that no resulting match was made, so they acted as a filler for the full solve to be derived.  It had 135 letters and used 27 Biliteral derivatives.

Contact List - Biliteral Derivatives

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa #49791 da Eldorado
A key point to take notice of was the phrase ADVISES FLAP LUMP and FIVE ADS LUMP.

This would be akin to the strange pod that was seen in the videos of the post-9/11 plane examinations and holds for identifying that as a definite intentional add-on that was mentioned, either being used to cause controversy, be a physically added piece of equipment used to fully penetrate the outer layers, or both.  As the Contact List was in their possession, they were tasked with parts of the operations, either as a group that were seemingly innocent and were in possession of it unknowingly, or intentionally dropping it off for their domestic operatives to use internally. 

It is assumed that at this point that the murders of a number of people after the attacks were made to continue the operations that were planned in this cipher, and that the Amerithrax Letters were to be used to inspire a number of critical works that seemed to all follow the official narratives, without anyone remembering that it was declared by the FBI as holding a cipher.  Not one outside examination was made to authenticate the methods used to encrypt it, and it was just forgotten about while the numerous conspiracy videos were skirting the information with dramatic images of the Towers and the Pentagon being attacked with drone planes.

Here you can see they targeted Mathematical Genuises and Prodigies, with the intention of killing them to create a mystery behind their deaths.  A sort of warning to others about their attempts to take control over scientific developments in a monopoly.  The ciphers of the Contact List remained hidden in evidence files until released in 2017.  In 2010 the first person to be targeted was Gareth Williams in London, a GCHQ Cryptographer murdered in his own safe house by unknown intruders that locked him in a duffel bag in his bathroom.  The killing was a national news piece, and the subversive interests were at work once again skewing the storyline, as concealed evidence found and later reported detailed the objects in his apartment were arranged in a map format, to show a selection of targets in London.  This was the MAP mentioned in the anagrammed section of the Contact List.  The name of Gareth Williams can be found by segregating a block section and using the available lettering to form the phrases surrounding his death.

In 2012, coincientally on 2/7, a climber was found dead on Mt. Hood, who's name was also listed in this cipher as a formal target of their program.  His name Jared Townsley is the most direct listing of a name from this blocked section of text and holds as evidence of the creation of more targeted attacks.

Contact List - Jared Townsley

The ciphers of the Contact List were somewhat symbiotic with the Amerithrax Letters, as the same types of cipher encryption techniques were developed on the same patterning as before, and they were made to be used to continue their operations with a degree of continuity that would afford them an advantage knowing which ones were used and how they were assembled.

When you get into the breaks on these ciphers you can test the resulting methods on other randomly written letters and you will not find one consistent pattern or cipher within them, meaning that to achieve this feat, you have to intentionally select words and position them in a letter to deliver instructions, and create a body of ciphertext to use secretly, in order to avoid detection by programs and software that is used in these types of investigations.  That feat was accomplished for over 50 years by the agency, and this is only one of their operations.

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa #49792 da Eldorado
The ciphers of the Amerithrax Letters are formed from the copies of 2 letters that were sent to different locations, and as we saw the messages in the Seito Sakakibara letters working with the Kryptos Disapproval Letter ciphers to inform Leahy and Sanders about the coming war, you also find Leahy was able to "intercept" the letter sent to his office.  What a lucky gent.

Being mailed in Princeton, NJ across the street from the Nassau Hall entrance gates to the university, this mysterious part of their affair was so out of the ordinary for a "terrorist" attack, that it quickly became apparent that only an advanced country could have produced the strains that were found in the letters.  In fact they tried fruitlessly to implicate two different people, with one "killing himself" during the investigations.  Regardless of the fact that they had already invaded two countries, and were occupying them, they still tried to accuse two Americans, with one working at a BioWeapons Lab.  Remember that the SOVA Disapproval Letters were signed by a group that was mostly compiled by their employees in that department of the CIA.  The group SOVA is the Russian BioWeapons intelligence group.

The accused Bruce Ivins had previously reported a trail of leaked biological agents during his normal inspection and cleaning routines.  Reporting this to his supervisor, he made the attempt to track down the source, and was later implicated in the manufacture of highly advanced strains of the Anthrax Virus.  It was later admitted that he could not have used the equipment in his facility to have manufactured the coatings that were found on one sample, so it became a strong suspicion that the leaked trail he found leading to the locker changing room and out of the building was the trail of a person that removed an agent from the lab.

He was a cryptographer they said......he stole the Sorority Code Book and pranked them so they couldn't break their own ciphers or write others.  An amazing feat but not something that warrants the indictments brought against him.

I am a cryptographer, and I was born in Princeton, NJ.

So was Ted Cruz's father, Rafael Bienvenidos Cruz y Diaz. He was born in Cuba, and came to the US under an intense embargo and timeline of events revolving around the assassination of JFK.  His photos are all over the internet, as are his ciphers that he made as a part of the team of operatives that were part to these long term affairs.

Princeton Graduate - Rafael Bienvenidos Cruz y Diaz - LHO Photo

As a graduate there he was welcome to come and go with the intention of an alumni, but as an operative of the Bush cabal, he was also seen with Lee Harvey Oswald in New Orleans distributing Anti-Castro propaganda.  His part in these ciphers can be traced to the original Z lettering on the Zodiac Cards and Letters, with his later part in the affairs as the hijacker known as DB Cooper shown in his letters during the operations in Canada.

Cruz and DB Cooper Suspect Composite Sketch

 

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa #49793 da Eldorado
Amerithrax Letter 1

Looking at their media reports with keen insight in mind, these reporters made the leap to identify a pattern of double scored letters that stood out from the others being drawn with more perfect strokes. This differed completely from the structured linear pattern of the other letter, and was "sloppy".  When they saw the shape of the Path Cipher connecting them, it revealed that their suspect "Mr. Z" had been found.  But not one would identify the relation to its form being taken from an older affair in the Zodiac Ciphers.

Zodiac Bates Letter "Z" - Amerithrax Letter "Z"

With this known at the time I found the letters to be suspicious enough to warrant an examination and had recognized their patterns enough to be able to identify out of place traits in them, forming a theme behind the breaks used to decipher the letters.  The text was very basic and was masked to appear as if a 4th grader had written it all.  Another telltale insult used by their team, having just finished in Japan with their other "Shool Killer" ciphers.

In the letter shown above the Z is a mere Path Cipher to "connect the dots".  But the vertical read of the first line is a TTDDA.....as in another surprise similar to the MMMMRRR Z intro in the Contact List to follow.

Running a Biliteral in this case is perfectly matched to the 65 letter count found here, so I produce the results to read
RASACILARWCAB or more clearly BACKWARDS CIA RASCAL.

Amerithrax Letter 1 Biliteral - Backwards IQ

After this I take notice of the hints in the acrostic, as it leads to the right to the word GREAT, which has the letter G posed as a number 6

I immediately prepared a series of 6x6 boxes in the event that the word GREAT doubled as a GRATE or a grid for letter placement, and noticed the Z from the path cipher was to be removed in order to create the message.  The lines filled and another grid was added to the lower section, filling the rest and leaving 25 letters empty.  Seeing this as a "Z" operation I insert their Operation Wrath of God motto WE DONT FORGIVE WE DONT FORGET.  It fits perfectly, and a shift is applied to the lower grid to place it along a horizontal path to read each extended line. 

Amerithrax Letter 1 - Letters in grid form

HIS ISIS N ISRAEL, EXCELLENT GREAT WINDOW, WE DONT HAVE TO FORGIVE AMERICA, WE DONT HAVE TO FORGET.  This being a declaration of victory from the Israeli State, and the declarations of their inception of ISIS as a terrorist facade.  We also know that ISIS stands for the Israeli Secret Intelligence Service, and their agendas are based on plotting out a Greater Israel as well through their international factions, assassinations, sabotage rings, and the fueling of violent revolutions as a way to form control over the developing regions surrounding their country.

ISIS and Greater Israel

There is another statement found here as well, hidden within the design of the word PENACILIN, and is used to draw a line through the cipher, completely changing their reads, countering the "Arab Terrorist" narratives.  The letters ILI are the key to finding a bILIteral cipher as well as drawing a line through their text to form breaks in the text.  A technical "Slant" with a twist.

Amerithrax Letter 1 - Technical Slant

It now reads TAKE PENAC, DEATH TO DEATH TO ALLAH and NOW IN AMERICA ISRAEL IS GREAT

The next letter also shows their same themes but takes it even further with the meaning behind the Path Cipher and the Genetic Strand TTAAAGT.

Amerithrax Letter 2

Seeing this all was made with two different letters I first thought that it would be a different cipher structure for each, but the same stacked G in GREAT was seen as the last clue, so I looked for a Biliteral word count. The whole letter was 99 letters long with punctuation, and 92 letters without.  These would not form perfect layouts of 5 or 0 letter counts, so I looked for a section with a suitable pattern.  Fortunately the word counts produced a descending 5/4/3/3/3/3/3 word count per line.  I counted the 3 word lines up to find it was exactly 60 letters so I ran that as the test Biliteral in this letter.  It also read on the acrostic as YADDA, which is basically a Jewish phrase meaning Talk of the Town.

Amerithrax Letter 2 - Biliteral Block

The Biliteral results were now shown by running the standard layouts and all of them had been arranged to deliver ciphertext without a single blank or null.  REBEAILARECAA or basically REVEAL A RACE.  When run backwards it mentions the REAL BIBI, naming Bibi Netanyahu as a signature.  Remember he was an operative during Operation Wrath of God so the use of these mottos and his name is telling enough to see they were responsible for these attacks and were planning more against the US in a separation from their previous agenda together.

Amerithrax Letter 2 - Biliteral Results

This letter held more of a technical side to it and had no Path Cipher, but a cut out strand at the top was made to enter the blocked section used in the Biliteral into the 6x6 grids. 

Amerithrax Letter 2 - Letters in Grid form

With the text of the Biliteral block section entered into this grid and shifted in the same manners, there are only 12 spaces to be filled.  The cipher reads YOU DIETH TO NO WAR E ISRAEL, YOU AFRICAN ALLAH, I AM THE GREAT AIDS THAT NO AMERICAN D.....and finishes with the addition of OCTOR CAN CURE.

The strand of letters found inside of the first Z shaped Path Cipher was TTAAAGT and is taken from the fungus Candida Albicans.

I broke these ciphers in 10 hours over two days one weekend in the later part of 2016, and by 2017 I was hosting the American Cryptogram Association's Annual Convention.  You can match my evidence and research into these types of ciphers and compare them to the FBI's own declarations of a cipher being present that they claimed Ivins had made.

FBI Declarations

You will find that not one of their assertions holds a consistent use throughout their breakdown of only one of the two pages, and they randomly selected text out of a possible list of comparable items and matching letters, in regards to their assertion of a technique used.  Their attempts to prove this would be futile in the face of a logical inquiry into their statements, and showing these worksheets I produced, their claims would be completely thrown out of any court in the country. 

Somewhat like the American Military has been shown the way out of Iraq and Afghanistan.
 

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa - 1 Anno 11 Mesi fa #49794 da Eldorado
Two additional legs of this operation were launched across the globe under the intentions of maintaining this affair. The name of the official authorization bill was called the "Disposition Matrix" signed by Barak Obama, granting the US the right to assassinate any person deemed a threat to their affairs and efforts. During this time the creation of a series of mockumentaries were planned to be made from killings that were orchestrated using the ciphers of a series of operations.

Ciphers from 2004-2006 - Continued Operations

This last page earned a Shorty Award Top Mention from the letter I mailed into their organization. They immediately took their US Navy awards page and placed the link to my page on the top of their referenced pages for the program, as a Top Mention that usurps even their own homepages explaining their ARG and what they claim it is used for.  You will find the ciphers here that were found on the computer of Alessio Vinci, the Aerospace Engineering Student that was killed in Paris on 1/19/19, as well as the other attacks that were planned out over a period of time during which their Intelligence apparatus had advanced the ciphers into a computerized format and began the use of numerous associates like Wikileaks, Soros, and even Elon Musk.  The information in this page has some of the most dedicated counter-intelligence work done by an independent journalist.  It shows the reason behind why a number of major events have happened, and shows the instigations of a number of attacks on an International level.

Project Architeuthis

So far the page has been on fire with updates from numerous additional ciphers being found as a network of communications, with more complex encryption techniques, and the creation of an Archon character naming himself Cypher Zero, who ties into the Gelitin Crew with his NYC Circus Arts and Firefly Aerial Acrobatics in LA. From the messages found in his ciphers he is becoming the host of a cabal of operatives through his safe houses, cafes, and shows admission of other suspected roles in the murder of the Seattle AAG, Tom Wales, who was killed in his basement by an intruder shooting him through the sliding door in his office while online, shortly after 9/11/2001.

There are a lot of things that are unseen, or happen behind closed doors, but the fact that these media productions are skirting around these very obvious and blatant statements that can easily be found in these letters with a bit of research, is clearly due to the lack of any evidence of this kind to be looking for from any investigation, ever.

I hope to be that person that gives them a huge amount of content to look at. These types of affairs need more scrutiny and someone dedicated to taking time to explain them in better context, and am looking to speak with the owner of this site Massimo Mazzucco in order to try to form a team to document all of this for a global audience . It deserves its own attention.

Hope to speak with you soon.
Ultima Modifica 1 Anno 11 Mesi fa da Eldorado.
I seguenti utenti hanno detto grazie : fumeo17

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 11 Mesi fa #49803 da Aigor
Ciao Eldorado, benvenuto.
Abbi pazienza, ma se scrivi in inglese temo che pochi potranno rispondere... ;-)
my two cents

Mitakuye Oyasin
"La violenza è l'ultimo rifugio degli incapaci" (I. Asimov - Il crollo della galassia centrale)
I seguenti utenti hanno detto grazie : Eldorado

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 10 Mesi fa #49822 da fumeo17
It is incredible how deep the white rabbit den is.
Thank you for the immense work posted and the automatic translated online, cheers!

L'unica maniera per ottenere l' impossibile, è pensare che sia possibile.
I seguenti utenti hanno detto grazie : Eldorado

Si prega Accesso a partecipare alla conversazione.

Di più
1 Anno 10 Mesi fa - 1 Anno 10 Mesi fa #49828 da Eldorado
Make sure to take a look at my other threads here too as they are some of the most amazing discoveries in the field of exploration and in-depth research into the science of cryptography. Here's a quick link for each, but I will be making a thread for each in its category here.

A Secret Mission For The King
Troves of the Corsair Olivier Levasseur
Solving the Beale Papers
Journey To The Lost Dutchman
Zodiac Ciphers Solved
Cracked Kryptos - CIA Art Installation and Ciphers
Amerithrax Letters Decoded
Cypher Zero - Ciphers of the Mossad in US Operations
Project Architeuthis - US Navy ARG - Ciphers and Operations

Last one earned me a Shorty Award Top Mention for online content.

Enjoy!
Ultima Modifica 1 Anno 10 Mesi fa da Eldorado.

Si prega Accesso a partecipare alla conversazione.

Tempo creazione pagina: 0.351 secondi
Powered by Forum Kunena