Thursday, December 06, 2007

Messages on Scalp and in Images of Internet

"Interactive" Urinal Advertising heat sensitive ink technology is used by HAUB (Heat Activated Urinal Billboards) for adverisement. Self urine is used by Moraji Desai for getting long life to sevrve the public. In Roman times, there was a tradition among the Gauls to use urine to whiten teeth.


Life giving vs Life taking

It has been suggested that when a person is in desert survival or surrounded by salt water and devoid of drinking water that the person must resort to drinking his/her own urine if it is the only liquid available. The same urinal is used by Jehadi to kill innocent people. So life giver urine also becomes life taker.
Leader as Bush MM use syringes of secularism, religious freedom, freedom of expression, human rights etc. aiming to destroy all these syringes in the name of democracy. Why does Indian Govt follow Bush? Al-Qaeda, LeT, JeM use medical syringes to kill innocent people in the name of Islam. Why is the Syringe device that saves so many life since past many years, is now being used to take the life? Why do Life givers are killers?
Syringes as Mini Nuke for Doctors of Death
http://www.newsanalysisindia.com/112072007.htm


Heat Activated Urinal Billboards for advertisement

This HAUB adopts innovative medium for advertisement such as the heat in a male's urine will deliver the message and the automatic flush from the toilet will re-set it for the next unsuspecting visitor... a perfect repetitive marketing tactic.

Invisible may seem like the stuff of James Bond movies, but it has a long history in real life spying.


Hide message within visible message as news behind news

An invisible message can be hidden within a visible message. You will need to give your friend a clue as to what type of invisible ink you used so your friend will know how to decipher it. You write visible letter keeping much distance between the written lines. Write invisible message by urine inkbetween the visible written lines.


Tattoo message on scalp

Sending hidden message is an old concept It is an old concept, written about in 474 B.C. by Greek historian Herodotus, who described how Histiaeus of Miletus shaved the head of a slave and tattooed a secret message on his scalp. When the slave's hair grew back, Histiaeus dispatched him to the Greeks, who shaved the slave's head and read the message.


More-powerful tools of Modern steganographers

Al-Qaeda’s steganographic use of advance technology radio communication and computers is to communicate the steganographic message in the hidden invisible ways.

Modern steganographers have far-more-powerful tools. After the terrorist attacks of September 11, 2001, U.S. officials claimed that members of the group al-Qaeda, as well as of other terrorist groups, had used steganographic software to communicate plans to each other, hiding messages in images on pornographic Web sites and in sports chat rooms. Training camps for extremists in a number of countries now include instruction in cryptographic techniques, including digital steganography.

Security experts have developed several ways to embed messages in images and video streams. One of the simplest methods is to take a frame of an image made up of pixels and alter it very slightly. Peter Honeyman, steganography expert and scientific director of the centre for information technology integration at the University of Michigan says that a megapixel-sized image could carry a secret message of 50,000 words.


Real unreal terror of terroism

"We're dealing with the global fear of terrorism, which is legitimate, but that fear is being translated into very speculative and unrealistic scenarios, all of which are possible, but none of which are likely. Until someone turns over some evidence that says 'here's the cover message, here's the hidden message,' I'm going to remain a sceptic that terrorists are using this," says Honeyman.


Old tact urine ink is continue

It does not mean that old ways are not exist. So many self declared and small terror groups use old method also. Few days back in Moradabad investigationg authorites found a plain paper with hidden message which might be written in the urine ink.

The sender can transmit a message without ever communicating directly with the receiver. There is no e-mail between them, no remote logins, no instant messages," wrote Bruce Schneier of Counterpane Internet Security. "Steganography is a good way for terrorist cells to communicate... without any group knowing the identity of the other."


Morse-code message

A photograph of a large group of people, for example, might contain a Morse-code message in the expressions of the people in the photograph (e.g., smiling for dot, blank for dash) or in the directions they are looking (e.g., slightly to the left for dot, straight at the camera for dash).


Invisiblaily in World War II

During World War II, invisible ink was used by all sides. And the Germans perfected the use of "microdots," in which a page of writing could be reduced to the size of a dot on a letter - only to be enlarged by the recipients and read.

Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darkens when heated, or tiny punctures above key characters in a document that form a message when combined.


Steganography and Encryption

The technique, known as steganography, is the practice of embedding secret messages in other messages -- in a way that prevents an observer from learning that anything unusual is taking place. Encryption, by contrast, relies on ciphers or codes to scramble a message.

Some times spies didn't write the secret message in the letter but on the right upper corner of the envelope, so after removing the stamp with steam, you can show the message & some times they wrote it on the inner side of the envelope.

As above sighted examples we find that the blank paper or images in internet may contain message of terrorists made disasters. They are as the teeth of elepahant for eating is different then shown outside.
http://www.newsanalysisindia.com/109042007.htm


Fake Mask be torned

I wrote an article titled “Peace Raises of Malegaon & ‘The Hindu’ Daily” on Sept 9, 2006 as: If Non-Hindus with Hindu names and makeup to honor the Hinduism instead of deceiving the people then they are welcomed? Otherwise their masks should be torn.
http://www.newsanalysisindia.com/sep_06.htm


Bahurupia politician

I have sited many examples of pseudo politicians who follow Bahurupia tradition in my past articles.
Parliamentarian S S Ahluwalia and Sikh Org of Hasriyana have asked the Dera Chief to drop 'Gurmeet Singh' as part of his name and adopt a new name after he insulted the tenth guru of the Sikhs Guru Gobind Singh.
http://www.newsanalysisindia.com/122052007.htm


Code Words Santra or Nagpur, Aam for Amravati

Like the above Peepal, Khajur and Bar are for other cities. It may sound like the recipe of a fruit salad, but is much more sinister than that. These are some codes by which Naxalites reportedly refer to cities in Maharashtra. Code 36 may be for thechhattisgarh, sun for arunachal, tour for Bihar, tree for Jharkahnd etc.The city police are now trying to decipher such codes that have been found in the documents seized from the four naxals, who were arrested near Deekshabhoomi on May 9. While the police conjecture that 'santra' refers to Orange city Nagpur and 'aam' is another name for Amravati, the meaning of other monickers has yet to be established. These codes hint at a deep-rooted network of Maoists in the state, especially cities like Nagpur and Mumbai, sources said.
Nationalism of 1857: Maoist in Mumbai Vs UP Biharis in Delhi
http://www.newsanalysisindia.com/110052007.htm


VIDEOs
Body invisible writing articoleuv.ro
http://www.newsanalysisindia.com/230112007.htm
Invisible writing with a very common thing. Watch to find out.http://www.newsanalysisindia.com/230112007.htm
Conspiracy Invisible Ink Video
http://www.newsanalysisindia.com/230112007.htm


By Premendra Argawal

1 Comments:

Blogger sloan123 said...

Microdots are a cool way of identifying and marking assets. Check out this site on microdots for more details on how this technology works.

10:06 AM  

Post a Comment

<< Home