{"id":414,"date":"2010-07-28T02:01:12","date_gmt":"2010-07-28T10:01:12","guid":{"rendered":"http:\/\/bellrock2012.com\/2012blog\/?p=414"},"modified":"2010-07-28T02:34:52","modified_gmt":"2010-07-28T10:34:52","slug":"28-july-2010","status":"publish","type":"post","link":"https:\/\/bellrock2012.com\/2012blog\/28-july-2010\/","title":{"rendered":"28 July 2010"},"content":{"rendered":"<p><html> <head> <meta http-equiv=\"Content-Type\" content=\"text\/html; charset=UTF-8\"><\/head> <body><\/p>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\"><i>The term <em>cryptology<\/em> is derived from the Greek <em>krypt&oacute;s<\/em><\/i> <i>(&ldquo;hidden&rdquo;) and <em>l&oacute;gos<\/em> (&ldquo;word&rdquo;).<\/i> <i>Security<\/i> <i>obtains from legitimate users being able to transform information by virtue of a secret key or keys&mdash;i.e.,<\/i> <i>information<\/i> <i>known only to them. The resulting cipher, although generally inscrutable and not forgeable without the secret key, can be decrypted by anyone knowing the key either to recover the hidden information or to authenticate<\/i> <i>the source<\/i><i>.<\/i><\/span><\/span><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&#8212;&#8212;&#8212;-<\/span><\/span><\/div>\n<div><b><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">PAG e-NEWS: 28 July 2010<\/span><\/span><\/b><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&#8212; questioning dogma, ideology, authority, reality, and whatever is left<\/span><\/span><\/i><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;&nbsp; &#8212; peeking behind the curtain<\/span><\/span><\/i><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;&nbsp; &#8212; thinking outside the program<\/span><\/span><\/i><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;&nbsp; &#8212; looking below the surface&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/span><\/span><\/i><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;&nbsp; &#8212; lifting the veil<\/span><\/span><\/i><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&#8212;&#8212;&#8212;-<\/span><\/span><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">Published by Peter A. Gersten, Esq. (ufolawyer@msn.com)<\/span><\/span><\/i><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/i><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">Website:<\/span><\/span> <a href=\"http:\/\/www.pagenews.info\/\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">http:\/\/www.pagenews.info<\/span><\/span><\/a><\/i><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&#8212;&#8212;&#8212;-<\/span><\/span><\/div>\n<div><b><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">THE SECRET CEREAL KEY<\/span><\/span><\/b><\/div>\n<div><b><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/b><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">By continuing to believe that these designs of incredible intricacy are created by ETs from planets light years away is not only ludicrous, it begs the real question. Since the likelihood is that the orbs &ndash; whether a life form or a form of technology &ndash; exist within our biosphere, the issue is not what the message is, but who\/what it is intended for. We need to learn who\/what has the secret cereal key.<\/span><\/span><\/div>\n<div><b><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/b><\/div>\n<div><b><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">The White Horse, nr Alton Barnes. Wiltshire. Reported 25th July.<\/span><\/span><\/b><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">Who are circle makers? They are celestial beings coming from the remote extra-terrestrial planet 3000 years ago. Over 3000 years they have been based on the moon, shielding and protecting the Earth from potential external disturbances. The symbol of their hometown is White Horse, which is the leader on that planet at the moment. They are hoping to return to their hometown in the distant universe after successfully assisting mankind to progress to the next stage of civilization.<\/span><\/span><\/i><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><a href=\"http:\/\/www.cropcircleconnector.com\/2010\/whitehorse\/whitehorse2010a.html\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">http:\/\/www.cropcircleconnector.com\/2010\/whitehorse\/whitehorse2010a.html<\/span><\/span><\/a><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">Article:<\/span><\/span> <a href=\"http:\/\/www.cropcircleconnector.com\/2010\/whitehorse\/articles.html\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">http:\/\/www.cropcircleconnector.com\/2010\/whitehorse\/articles.html<\/span><\/span><\/a><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><b><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">Roundway Hill, nr Devizes, Wiltshire. Reported 25th July.<\/span><\/span><\/b><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">Here&#8217;s a decoding of the crop formation, showing a couple of Mesoamerican symbols compared to the formation.<\/span><\/span><\/i><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/i><\/div>\n<div><a href=\"http:\/\/www.cropcircleconnector.com\/2010\/roundwayhill\/roundwayhill2010a.html\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">http:\/\/www.cropcircleconnector.com\/2010\/roundwayhill\/roundwayhill2010a.html<\/span><\/span><\/a><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/i><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">Comments:<\/span><\/span> <a href=\"http:\/\/www.cropcircleconnector.com\/2010\/roundwayhill\/comments.html\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">http:\/\/www.cropcircleconnector.com\/2010\/roundwayhill\/comments.html<\/span><\/span><\/a><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">Articles:<\/span><\/span> <a href=\"http:\/\/www.cropcircleconnector.com\/2010\/roundwayhill\/articles.html\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">http:\/\/www.cropcircleconnector.com\/2010\/roundwayhill\/articles.html<\/span><\/span><\/a><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><b><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">East Field, nr Alton Barnes, Wiltshire. Reported 26th July.<\/span><\/span><\/b><\/div>\n<div><b><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/b><\/div>\n<div><i><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">I think it&#8217;s the first time that ETC (Extraterrestrial Civilization) showed their own language (letters) within a crop circle!&nbsp;<\/span><\/span><\/i><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><a href=\"http:\/\/www.cropcircleconnector.com\/2010\/Eastfield\/eastfield2010a.html\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">http:\/\/www.cropcircleconnector.com\/2010\/Eastfield\/eastfield2010a.html<\/span><\/span><\/a><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">Comments:<\/span><\/span> <a href=\"http:\/\/www.cropcircleconnector.com\/2010\/Eastfield\/comments.html\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">http:\/\/www.cropcircleconnector.com\/2010\/Eastfield\/comments.html<\/span><\/span><\/a><\/div>\n<div>&nbsp;<\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\"><strong>Crop Circle Similarities to Drone UFO case!<\/strong><br \/> &nbsp;<br \/><\/span><\/span><a href=\"http:\/\/readthenose.blogspot.com\/2010\/07\/crop-circle-similarities-to-drone-ufo.html\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">http:\/\/readthenose.blogspot.com\/2010\/07\/crop-circle-similarities-to-drone-ufo.html<\/span><\/span><\/a><\/div>\n<div>&nbsp;<\/div>\n<div>&nbsp;<\/div>\n<div style=\"text-align: center;\"><a href=\"http:\/\/ymlp41.com\/forward.php?id=FFc5V&#038;e=pagenews@bellrock2012.com\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">Forward this email to a friend<\/span><\/span><\/a><\/div>\n<div style=\"text-align: center;\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div style=\"text-align: center;\"><a href=\"http:\/\/ymlp41.com\/yFFc5V\"><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">Interesting? Share this email on social networks<\/span><\/span><\/a><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div><span style=\"font-family: verdana,geneva;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/span><\/div>\n<div>&nbsp;<\/div>\n<div>&nbsp;<\/div>\n<div>&nbsp;<\/div>\n<div>&nbsp;<\/div>\n<div>&nbsp;<\/div>\n<div>&nbsp;<\/div>\n<div>&nbsp;<\/div>\n<div>&nbsp;<\/div>\n<p> <!--YMLPUF--><\/p>\n<div align=center style=\"padding-top:10px;padding-bottom:10px;font-family:Verdana;font-size:8pt;color:#000000;\">\n<hr noshade color=#000000 width=50% size=1> <a href=\"http:\/\/ymlp41.com\/u.php?id=gussyyugsgubuugeejh\" style=\"color:#000000;\">Change email address \/ Leave mailing list<\/a> <br \/> <a href=http:\/\/ymlp41.com\/m\/ style=\"color:#000000;\">Powered by YMLP<\/a> <\/div>\n<p><!--YMLPUFE--><\/body><\/html><\/p>\n<iframe src=\"http:\/\/www.facebook.com\/plugins\/like.php?href=https%3A%2F%2Fbellrock2012.com%2F2012blog%2F28-july-2010%2F&amp;layout=standard&amp;show_faces=true&amp;width=450&amp;action=like&amp;colorscheme=light&amp;height=80\" scrolling=\"no\" frameborder=\"0\" style=\"border:none; overflow:hidden; width:450px; height:80px;\" allowTransparency=\"true\"><\/iframe><!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<\/p>\n<p> The term cryptology is derived from the Greek krypt&oacute;s (&ldquo;hidden&rdquo;) and l&oacute;gos (&ldquo;word&rdquo;). Security obtains from legitimate users being able to transform information by virtue of a secret key or keys&mdash;i.e., information known only to them. The resulting cipher, although generally inscrutable and not forgeable without the secret key, can be decrypted by [&#8230;]<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[5],"class_list":["post-414","post","type-post","status-publish","format-standard","hentry","category-pagenews","tag-pagenews","odd"],"_links":{"self":[{"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/posts\/414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/comments?post=414"}],"version-history":[{"count":1,"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/posts\/414\/revisions"}],"predecessor-version":[{"id":415,"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/posts\/414\/revisions\/415"}],"wp:attachment":[{"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/media?parent=414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/categories?post=414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bellrock2012.com\/2012blog\/wp-json\/wp\/v2\/tags?post=414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}