Individual abstracts for special issue Ho Chun Cheong Revelation and Secret Codes: Fixed Meanings and Ambiguity In my proposed essay, I am going to investigate the nature of codes in the book of Revelation in the bible. There are plentiful and sometimes abundant mystic figures in the book. For examples, the lion of Judah, four horsemen of the Apocalypse, seven angelic trumpeters and the whore of Babylon, etc. If we assume that author of the book aimed not to sufficiently hide the messages, it is justifiable to know the “hints” or “keys” by which we can decode the secret messages. Throughout the history of interpreting the book, there have been recurring attempts of eschatological or aesthetic elucidations. The former gives us thoroughly consistent accounts of what the symbols mean. If they are right, the language the book used might be similar to what John Wilkins, a 17th century clergyman and philosopher proposed, a system of concept language in replacement of the phonemes we are using. I think for the language to exist, it has at least two requirements: first, it has to be built up by ideograms rather than phonograms. It is because the appearance of homophones renders the latter impossible. The aesthetic attempt suit Saussure’s idea of l'arbitraire du signe, which tells us that different people have different meanings of a word. He thought that concepts exist before words and the latter shape the former. Literary language resembles the nature of language in general. They can be ambiguous. If Saussure is right about the loose relation between word and meaning of a language, then we can treat the symbols in the book of Revelation as a language in a Saussurean sense. But in the case of secret codes, we tend to think of them as fixed symbols embedded with meanings. This paper address the possibility of decoding secret codes in literary and mystic literature and investigate the nature of secret codes and its difference with general language use illuminated by linguistic theories. *************************************************************************** Yip Ho Yan Counter-intelligent Intelligence Communication: The Navajo Code The Navajo Code was employed by the U.S. during WWII to defend against cryptanalytics. Since Navajo code is not a man-made cryptographic system but a natural minority language being entirely different from European languages, in this capacity, it is less vulnerable to cryptanalytic attack. On one hand, it has to be different from English so that it is sufficiently incomprehensible to English-speaking unintended receivers. Paradoxically, to ensure intersubjective cryptic communication, the Navajo Code also has to be similar to English so that the code talkers can translate between the two languages instantaneously and accurately. A number of literatures have thus concluded that the Navajo code instantiates two polarities of views towards languages: linguistic variation and linguistic universality. Such paradox inspired Baker (2002), who believes that the Navajo code does justice to both language diversity and unity, to resolve the paradox by making reference to universal grammar and parameterization. This essay will first review some critical similarities and differences between Navajo and English and explore the implication of universal grammar and structuredness within heterogeneity to the Navajo code. It does not aim to settle the two polarities, but to give an exposition on how the mentioned two competing but auxiliary forces serve to legitimate the reciprocity of the Navajo code. After all, given that Navajo and English are two languages with embedded cultural differences, this essay will also give attention to the fundamental problems of code-based communication and interrogate the possibility of true understanding and intersubjectivity in secret communication despite the alleged translational capacity endowed by virtue of universal grammar. *************************************************************************** Monique Attrux Da Mafia Code: decrypting Bernardo Provenzano and his pizzini code In 2006, the head of Cosa Nostra, Bernardo Provenzano, was arrested by the Italian police. In the midst of his arrest, he was found to be writing his code, which shrouded his illegal orders to his subordinates. For Provenzano, his codes were the key to his power in Cosa Nostra, and the key to his downfall. The codes were rich evidence that could put Provenzano away for life. However, it took a whole year for his codes to be deciphered. Except for Provenzano and his associates, no one knew the code. To decrypt it, the lead investigator would have had to decrypt Provenzano himself, and the Italian mafia culture of honor, religion and family. In this paper I explore the socio-historical context of secret organizations like the mafia and their use of codes to maintain power and membership. This article also deals with the Provenzano codes themselves which is a version of the Roman Empire's 'Caesar cipher', and how the ciphertext works to cover the plaintext message. In order to gain the plaintext message of the pizzini, this paper argues that the prosecutor relied on a cultural understanding works rather than a mathematical approach for decryption. The aim of the article is to show that a cultural understanding of how encryption works is also fruitful both for a subjective approach with cryptography - gaining a complexity of the understanding between the transmitter of the code and the receiver - and and an objective approach - gaining the real plaintext of the code. *************************************************************************** Wong Cheuk Yu The Enigma of the Ancient Lost Language: Mayan Script People are always mesmerized by ancient lost languages, which are filled with mystery and pose a sense of enigma. Among the many lost languages, the Mayan script is one that captures the most attention and interest from people. In year 2012, the Mayan script reached the pinnacle of people’s interest with a rumoured prediction of the end of the world. Many people actually feel able to relate to the old language through portrayals of movies and fictions. The Mayan script is currently the only deciphered Mesoamerican writing system, the writing system of the Maya Civilization of Mesoamerica back at the 3rd Century BCE. Now most Mayan writings could be read and understood that provide us insights into the Mayan life. Logograms (which represent whole words) complemented by a set of syllabograms (which represent syllables) are used in Mayan writing. There are also hundreds of glyphs representing place names and names of Gods. The development of deciphering Mayan scripts was also met with a great variety of opinion. Thompson in early 1950 explained that the content of Maya inscriptions was calendrical and astronomical, and that the hieroglyphs themselves had little to none phonetic reference. Later views like Knorosov and Kelley arose deeming that the Mayan glyths could indeed be read as phonetic-syllable signs with knowledge of the Maya religion, iconography, calendrics and cultural history. In this issue, how Mayan scripts come to be read and understood would be studied with knowledge of the glyphs of logograms and syllabograms. *************************************************************************** Pang Karman Decoding subliminal messages in advertisements: Application of linguistic steganography on ads Martin defined steganography as an exchange of message between the sender and only the receiver who anticipates the presence of a plaintext within a ciphertext (2012). The plaintext, thus, is remained to be hidden from the majority in two folds: the information is camouflaged “inside something that exists to be nothing out of the usual” (Kaleem, 2012, p.33) and the techniques to decode the secret message is only acquired by the intended receiver. Within the category of steganography, linguistic steganography has been frequently studied owing to its influence to the field of computer science (see EC-Council, 2010) and the linguistic realm which gives rise to papers concerning synonym ambiguity and statistical mimicry. Goje, Gornale, and Yannawar proposed to classify linguistic steganography into semagrams and open codes based on the methods in which messages in disguised in the cover-text (2007). Semangrams take into account not only the visual aids which include any physical entities but also wordings differing from the cover-text in font size, font type or any modification of appearance. In light of the above, this paper hopes to address the issue of subliminal messages in advertisements via analyzing both the graphical and textual discourses illustrated in the commercials with the application of semagrams. The paper would also look into the perlocutionary act of the messages in addition to the obvious aim of product promotion. *************************************************************************** Chung Sze Lok Look in the eye of the Illuminati The Illuminati, not a name of unfamiliarity but of mystery, with its symbol of the all-seeing eye on a pyramid has aroused curiosity of many people. Although the Illuminati has listed some explanations on its famous symbols via its official webpage, majority of those symbolic meanings are believed to be well hidden. This paper briefly looks at the various secret symbols of the Illuminati, including the all-seeing eye, the pyramid, and pentagram, before examines their characteristic as a message-carrying symbol. For instance, to investigate the ideology behind that has made the symbol, and to what extent the meaning is solid. This paper also questions the concept of membership in the decoding process. As the Illuminati operates as a closed organization, the testament of the Illuminati states “to maintain [their] anonymity in the mists of confusion”, therefore; the in-group identity seems indispensable when comes to getting the ‘real’ meaning. However, is it possible for outsiders to understand those hidden messages? Or, from another angle, is it possible for insiders to judge the outsiders as inaccurate interpreter? Lastly, this paper draws from pop-culture examples, such as music and movies, to examine the hidden messages conveyed and whether they perform what the organization wishes them to. *************************************************************************** Li Chi Him Codes to Freedom – Language of Fugitive Slaves Secrets codes - the mere mentioning of this enigmatic term may conjure up conspiracy theories on clandestine missions or sinister societies; however, contrary to this grim misconception, secret codes can also serve as key instruments for the oppressed and embattled. And one prime instance of this is the Underground Railroad. Having little to do with train networks in the literal sense, the Underground Railroad refers to a sprawling network of secret routes, safe houses and rendezvous points established in the United States during the early-to-mid 19th century. This network was used by slaves then to flee from their slave-holding households and states to neighboring Free states or Canada (Walters, 2012). Allies of slaves, who operated the Underground Railroad, and slaves themselves communicated using secret codes as the latter navigated the complex escape network. Such surreptitiousness safeguarded fugitive slaves from being captured by slave catchers, who were commissioned to return fugitive slaves to slave-masters. These secret codes take multiple forms. On one hand, there exists myriad secret words, such as “Baggage”, which refers to fugitive slaves (Switala, 2008). These codes are often employed in communication among slave sympathizers to avoid suspicion (Calarco & Vogel, 2011). On the other hand, there are secret symbols marked across the Railroad – near safe houses, meeting points, and so forth (Tobin & Dobard, 2011). These secret symbols, known only by slaves and their allies, served various functions, from giving directions to flagging up dangers (Wolly, 2003) Given the historical significance of the Underground Railroad, the present paper delves into the secret codes that pervade and sustain the Underground Railroad. By examining this epoch-making enterprise, one can gain more insight into the relationship between secret codes and the oppressed in our society. References Calarco, T., & Vogel, C. (2011). Places of the Underground Railroad: A geographical guide. ABC-CLIO. Switala, W. J. (2008). Underground Railroad in Pennsylvania. Stackpole Books. Tobin, J. L., & Dobard, R. G. (2011). Hidden in plain view: A secret story of quilts and the Underground Railroad. Anchor. Wolny, P. (2003). The Underground Railroad: A Primary Source History of the Journey to Freedom. The Rosen Publishing Group. *************************************************************************** RE: Call for Abstract Submissions to a Special Issue of the Journal Cryptography in Second World War: Its Applications and Impacts Dear Sir / Madam I am writing to submit the abstract of my proposed paper on the topic of Wartime Cryptography, Applications and Impacts in WWII and in a potential Crypto War. The author, Kayley Chan, is currently studying at the University of Hong Kong as an English major. Kindly see below for the abovementioned abstract. Manuscript title Wartime Cryptography, Applications and Impacts in WWII and in a potential Crypto War Abstract Cryptography facilitates information assurance and security in people’s daily lives with no doubt, its applications on wartime affairs have proven its values in securing confidential national military information too. From the experience of the renowned German Enigma Machine and Japanese PURPLE Machine, history has shown significant utilization of cryptography. The cracking of the machines by the Allied and the US have partly contributed to the defeat of Germany and Japan in the war. This paper provides an overview of the development of cryptography in WWII, its applications and impacts. In addition, military communication has been imposing fundamental impact on cryptography / encryption and the advancements thereof. The practices of encryption and sending coded messages do not belong solely to government bodies and/or secret organizations anymore, but in a more common basis where every individual needs such service in present-day life. With also the tremendous advancements of technology over the past century, we have witnessed the great changes in the subject matter. Despite there has not been a World War 3 hitherto, predictions have been casted on the potential war in this digital age. Cases such as the ISIS cryptography issues and the New Crypto War about the case of FBI demanding Apple’s help in unlocking a dead terrorist’s iPhone have triggered discussions and predictions on such a possible future incident. This paper, in the second part, offers a comprehensive discussion on the cryptography in contemporary international and political world, and meanwhile investigates into the controversies of a potential Crypto War. *************************************************************************** James Lee Telepathy power: physical or spiritual? Telepathy is one of the most mysterious communication method that only few privileged people could phantom. Literally meaning human-to-human transmission of message (thoughts) via some unknown source of power, the act of it has always been regarded as magic or miracle, which are mostly recorded as performance and scientific results. It is now quite popular for street magicians to go hold hands with random pedestrians and figure out animals or colours they are thinking of. There has also been frequent examples of experiments and incidents in which people could re-enact the thoughts inside the brains of the people they hold hands with. All these examples suggest some kind of relations between physical contact and mental contact; are the thoughts transmitted via physical contact? Meanwhile there are other contrasting schools of scholars suggesting telepathy via dream or imagery, and some cases disclose people who can hear voices in their heart, which further induce the possibility of unhuman spiritual powers as the media of the telepathy process. Therefore this paper aims to investigate on different kinds of telepathy and their disputable mechanisms by studying different experiment results and hope to come with a conclusion or a stance upon it. *************************************************************************** Seunghee Park Secret Codes used by Spies: The Diverse Steganography Although wars and battles sound a bit outdated for people in the modern society, the current society is a product of numerous wars and battles, and there are still some wars are going on in the world. Sometimes the wars are aggressive enough to be noticed by everyone, but sometimes, there are silent battles called cold war. Spies are usually most active during this time of a war, being disguised into normal people, working to reveal military information and to carry out orders. When military wants to make its spies to move, they have to be extremely careful to keep the spies safe from being revealed of their spy status, so it has been more than usual for them to develop secret codes to communicate with spies. There occurred a diversified version of secret code, because of the special property of the secret codes, which is that once it loses content confidentiality, it is no longer valid as secret code. This concept of secret code is familiar to the public because this has been the subject matter of numerous movies and contents because of its mysterious and intriguing values. Some people may have dreamed of creating their own secret spy codes or learn the existing ones to communicate with friends secretly, but it would have only happened in their imagination. This essay would firstly introduce famous historical spy figures like Richard Sorge and Mata Hari, and deal sophisticatedly with the structures of their distinctive steganography, so that the steps of making codes and decoding codes are understandable. Before, in the time of the World War, spying was mostly dependent on steganography, but nowadays, the rate of usage of codes have been lessened because of improved technology; plenty of spaces on the internet to hide secret messages and satellite pictures that helps in gaining information that are unreachable in person. However, steganography is still remained in the world, sometimes utilized in attempt to wage psychological warfare, and even may have been used to convey real secret messages secretly without allowing nobody to be able to decode them.
© Copyright 2026 Paperzz