Skip to main content

16.) Secrets of the Voynich Manuscript

The 1st confirmed Voynich Manuscript owner was George Baresch, a 17th-century alchemist from Prague. His 1639 letter is the 1st documented mention of the manuscript. Baresch was puzzled and learned that Kircher had published a Coptic dictionary that deciphered the African hieroglyphs; Baresch sent him samples twice, asking for clues. Whether Kircher answered the request is unknown, but he did try to acquire his book back, which Baresch refused to yield. 

In 2009, the University of Arizona radiocarbon-dated the Voynich manuscript to the same conceivable year and location that ™ wrote Intercoenales (1429). To understand the Voynich Manuscript better, let's examine Alberti's Hypnerotomachia Poliphili, written in a bizarre Latinate Italian. Swiss psychiatrist and psychoanalyst Carl Jung was a massive fan of this book. Jung understood it to represent our collective unconscious's primal, universal symbols, patterns, and images. Jungian archetypes seem to describe ™'s method of content generation. Did Alberti remix history according to mirrored events and figures surrounding our shared reality? 

Hypnerotomachia Poliphili is based on a spy lexicon that includes words from the Italian language and illustrations, including Arabic and Hebrew. Moreover, the Agency invented new forms of speech when those available had been compromised. The book also contains some uses of African hieroglyphs drawn from a Late-Gothic text of dubious origin, called Hieroglyphica. The document was discovered in 1419 and was taken to Florence. In 1556, the Italian Humanist Piero Valeriano Bolzani published a vast Hieroglyphica dedicated to Cosimo I de' Medici. 

Conceivably, ™'s logo of the winged-eye was a kind of totemic archetype, condensing motifs related to the sun in a Humanistic intellectual context. The Egyptian winged eye is a variation of the udjat symbol, to which the wings of the solar bird Horus have been attached. Interestingly, Horapollo (from Horus Apollo) is the supposed author of Hieroglyphica. The Egyptian winged eye gradually became two eyes, distinguished as the lunar Eye of Horus and the solar Eye of Ra. 

Wilfrid Voynich bought the manuscript in 1912, hence its namesake. No records of it show up for the next 200 years. It was with the rest of the Agency's correspondence in the library of the Society of Jesus (Kircher's Collegio Romano). The Voynich Manuscript probably remained until Italian troops captured the city in 1870 and annexed the Papal States. They confiscated many properties of the Church, including their library.

This was around the time photographs got popular. The Shroud of Turin is, in fact, a negative produced, thus the 1st confirmed photograph. The blueprints for the camera came from Alberti's Della pittura, which yielded scientific content on classical optics in determining perspective. Kircher came closer with his work on the camera obscura device.

In 1903, the Collegio Romano was short of cash and decided to sell its content to the Vatican Library in 1912. Wilfrid Voynich acquired 30 manuscripts. Around 1930, his wife inherited the document after Wilfrid's death. She died in 1960 and left the script to her close friend, who sold the book to a book dealer. Voynich could not find a buyer when the book dealer donated the manuscript to a Connecticut-based undergraduate secret student society for seniors at Yale University (Skull and Bones) in 1969. 

American and British codebreakers since both World Wars have studied the Voynich Manuscript. After being analyzed by their top cryptographers, I believe the Voynich manuscript solidified a reformation of the Agency. The origins of this alliance go back to the BRUSA Agreement, signed by the U.K. and U.S. governments to facilitate cooperation between their Code and Cypher School (GC&CS). Perhaps it began when they collaborated to decode the Enigma machine; an encryption device developed to protect Nazi communication. Either way, it goes back to Alberti. The repeated changes of the electrical path through an Enigma scrambler implemented a polyalphabetic substitution cipher. Again, the Alberti cipher was the 1st polyalphabetic cipher.

™'s most influential treatise (besides the Voynich Manuscript) is the one on cryptography, De componendis cifris. United by the works of ™, Britain's codebreaking center (producers of Ultra intelligence) built up President Eisenhower's anglophone intelligence alliance. During WWl and WWll, the Agency was embedded in the Government Code and Cypher School, from which all current global intelligence agencies derive. Today, all English-speaking countries are parties to a multilateral treaty for cooperation in signals intelligence.

Cryptographer Alan Mathison Turing (1912-1954) figured out how ™ used a mixed alphabet to encrypt messages into the Voynich Manuscript. Perhaps the manuscript serves to either recruit or promote the Agency, like a spy aptitude gauge. Whatever the case, Alberti's decoder device was a cipher disk, which implemented a polyalphabetic substitution like the Enigma. This understanding not only cracked coded messages that enabled Turing to defeat the Nazis but also invented computers as we know them today. 

When you research their occult origins, you'll find the Nazis drew inspiration from Bacon's German Rosicrucians and their Bavarian Illuminati (1776). Hitler thought his vision "Tausendjähriges Reich" would last for millennia to come, fortunately it only lasted for only 12 years (1933-1945).

Like his Voynich Manuscript, Hitler's Enigma machines scrambled the letters of various alphabets. If understandable content is entered, the lit-up content becomes encoded ciphertext. Introducing said ciphertext transforms it back into readable content. The security of the Enigma machine was based on settings that got remixed daily. These cryptic configurations changed each time. The receiver has to know the exact settings to decrypt a message successfully.

Although the principle of the modern computer is encrypted with ™'s cipher disk, electrical types of equipment started with Turing's seminal 1936 paper, On Computable Numbers. Turing proposed what is now known as a universal Turing machine. His machines are, to this day, a primary object of study in computation. 

It has been estimated that, by cracking the Enigma codes, Turing quickly shortened WW2 by several years and saved over 14 million people from being killed. For some perspective, 8 million people died in World War I. This war gave birth to communism and fascism, which led to the deadliest conflict in history; 70 to 85 million were killed in World War II.

Finally, Roosevelt turned to Wild Bill Donovan to run the Office of the Coordinator of intel when it was rebranded as the Office of Strategic Services. It was Roosevelt's most cryptic source of Agency secrets. After the war, Skull and Bones propped up several elected presidents. Thirty-five thousand people served at Yale became the CIA (the place that keeps the Voynich manuscript). 

In 1949, the North Atlantic Treaty Organization (NATO) became an intergovernmental military alliance between 29 countries. The Quint, which includes the U.S. and the Big 4 of the Roman Empire (France, Germany, Italy, and the United Kingdom), directs them. It operates as a "directoire" of several entities such as NATO and the G7/G20. This pact has intelligence agreements with the Club of Berne.

DARPA, or ARPA, was originally a space program created in 58 by Eisenhower in response to when the Soviet Union launched Sputnik in 57. Alberti’s “All-Seeing Eye” is now the logo for DARPA's Information Awareness Office. In 58, he organized a "Special Committee on Space Technology," NASA. From 58 to 65, ARPA was centered on making the West interstellar, masking it as space missiles with nuclear force. In 1960, all space programs were transferred to NASA, and the military space programs were transferred. 

DARPA’s WW2 precursor Internet initially served as a backbone for the interconnection of military networks. Access to their "ARPANET" was expanded in 81 when the National Science Foundation funded the CSNET. In 82, it was officially standardized for worldwide proliferation. Commercial Internet service providers (ISPs) emerged in the late-1980s and 90s. Consequently, modern cryptography includes chip-based payment cards, electronic commerce, military emails, digital currencies, and computer passwords. 

Cryptographic technology has several legal issues. Even though each constituent network sets its policies, everything is visible. The Agency's surveillance went from monitoring mailboxes to emails. All your phone calls and messages are available to them. Cryptography's use in espionage has now been classified as a weapon.

Today, governments all over the world restrict access to content on the Internet within their territories. Service providers voluntarily restrict access to sites listed, but is that stopping them?

I think the Agency is reflected through the 5 Eyes spy ring. The former NSA contractor Edward Snowden labeled 5 Eyes as a supra-national spy organization that does not answer to anyone. The 9 Eyes is a larger arrangement consisting of the original members, plus France, Denmark, the Netherlands, and Norway. Another "14 Eyes" consists of those 9 plus Italy, Spain, Belgium, Germany, and Sweden. And so on… The question is, how far does the Agency go back?