FACT 2003 - Cosmic Codes - Part 1 - Chuck Missler

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
[Music] [Music] uh many of you of course wondering what on earth are these beads you see i wear these beads to make our host nervous you see but actually there's a story behind them as you probably guessed a very strange thing happened to me i had spilled on the floor a whole bunch of black and white beads and i picked them up randomly put them on a thread and after i did that i was startled to realize that just by sheer accident it actually in morse code spells out there's a did it that's an i dash dot that's n in and then there's a t h and e the in the beginning god created the heaven and the earth now in morse code now uh how many of you believe that this assembly of 347 beads happened by accident any hint you see in instinctively you know i'm putting you on by suggesting this was accidental actually i'm a radio ham so it was easy but the point is this took some planning and it was diligence and for you to believe that this was by accident of course is observed now you may have not you may not have done the math but it happens there's an alphabet of two black and white so it happens to be two to the three hundred and four and there's 347 beats so it's 2 to 347 power which in decimal is is 3 times 10 with 104 zeros after it now in the field of physics a probability that would involve 10 with 50 zeros or more is defined as observed in other words mathematically you can you would argue that there's no such thing as a probability of zero or one everything's in between those boundaries but when a probability gets so small as to be literally negligible they cut it off for mathematical reasons you need to cut off so 10 to the 50th 10th to the minus 50th is defined in physics as observed so this is 10 out of 50 with 104 zeros so this is obviously you instinctively realize it's absurd to consider that these 347 black and white beads assembled themselves somehow in spelling out genesis 1 1 and morse code and yet we let them tell teach our kids that we happen by accident and we'll be talking a little bit about that because what we're going to be doing today is something a little unusual you know we often hear talks about science in the bible from the point of view of physics because there's much in physics that's dramatic and fun or and uh the only people really all the fields of science are the only people really confused are the biologists on the evolution thing i'll stay off that um but uh very few people really are familiar with the field of information sciences which gives of course communication and many other of our of our features in our culture that happens to be my specialization i thought it'd be interesting to really take a look at what this field of specialized study has to say about the scripture and uh you'll find it i think provide a provocative now we're going to have three sessions this will be the first of three in which i'm going to if you'll just bear with me give you a little bit of introduction into the field of cryptography the art of secret writing there have been a lot of books published in recent years about the so-called bible codes and the tragedy of that field is it's been abused badly both by its enthusiasts as well as its detractors the truth lies between those two extremes and virtually everyone writing in that field has no background in the field that's been dealing with that's cryptography so i'm going to share with you a few things about that if as a prelude to some discoveries that i think you'll find extremely interesting and the very idea that there are hidden messages in the bible is a shock to many uh not just unbelievers but that many believers are offended or disturbed by that possibility and yet we'll discover that it's actually quite scriptural and has some exciting benefits to all of us and uh so we'll now i've told you about what i call my mystery beads here and the real question i usually introduce an audience with is how good a scientist are you did you buy that hypothesis and of course the whole idea that these beads cap by chance is patently uh observed now could this be chance no definitely design and i mentioned there's beads only two types black and white which by random chance would be approximately three times ten with a hundred and four zeros after and ten by the ten to the fiftieth is observed so we went through all that you see our whole ministry is based just to give a little background for those of you that may not know us that well we our ministry is based on two discoveries the first is that these 66 books that we glibly call the bible even though they were penned by over 40 different guys over the better part of about 2000 years they're an integrated message and i don't mean thematically that there's a theme in the old fulfilled the new no no far more than that that every detail every number every place name is there by deliberate design in the original so that's the first thing that we have an integrated message system in our laps um that and once you discover its integration you need to do that for yourself we'll show you some things the second discovery emerges from that and that is that the origin of this integrated message system had to come from outside our time domain literally we're in possession of a message system of extraterrestrial origin and you can prove that and we'll show you how and uh one integrated sign the new testament is in the old testament concealed and the old testament is in the new testament revealed you know it's interesting when you finish the old testament to realize that you've got a a collection of books that have unappeased learnings unfulfilled prophecies and so on and it's incomplete without the new they they go together in great ways but hidden treasures in the biblical text are there such things as hidden messages in the bible you know the bible says so one example is proverbs 25 2. it is the glory of god to conceal a thing and the honor or duty of kings to search out a matter and that's what we're about we'll take a look at some of these now i'm going to give you a riddle this is just to get started who is the oldest man in the bible anyone methuselah sure he lived 969 years yet he died before his father hmm how could he be the oldest man in the bible who died before his father anyone his father was what enoch good for you everybody forgets who his father was he was enoch enoch's an interesting guy the oldest prophecy in the bible uttered by a prophet is a prophecy of the second coming of jesus christ and was uttered before the flood of noah that itself is kind of interesting but enoch at the age when he was 65 years old had an experience that altered the rest of his life for 300 years following he walked with god whatever that means he also was given a prophecy you see the flood of noah did not come as a surprise the flood of noah had been preached on for four generations but but no excuse me methuselah was told that when his son was born that as long as his son is alive the judgment of the flood would be withheld and therefore he names him uh methuselah and the word methuselah comes from two hebrew roots one is muth it's a root which means death it's used 125 times in the old testament and the verb shallock which means to bring or send forth his death will send forth is really what the what the name means and if you do your homework it his death shall bring the year of the flood methuselah was 187 when he had a son by the name of lamech and lamech was 182 and noah was born and everybody knows that it was the 600th year of noah the flood came in other words the year that methuselah died was indeed the year that the flood came his life was a prophecy and that's why it's provocative to realize that he also has the longest lifetime in the bible because his lifetime then becomes in effect symbolic of god's mercy but by the way girls can you imagine raising that kid every time he caught a cold the entire neighborhood would go into panic right well if there's all this meaning hidden behind the name methuselah what about the other nine guys in genesis 5. you know genesis 5 is one of those strange you know people say what's your favorite book of prophecy a chapter of prophecy genesis 5 that surprises people because you don't think of that as a book of prophecy the first couple of chapters of genesis the creation hey that's rich stuff a lot of fun there genesis 3 that's the seed plot of the entire bible every dot in the bible has its roots in genesis 3. in genesis 4 the first murder we all know the story from genesis 6 on we have the flood of noah and all that action genesis 5 is one of those chapters you tend to sort of skip over i mean just a genealogy from adam to noah ten guys and the problem with genesis 5 is that it's not translated for you the rest of the bible is translated into english or whatever language you're comfortable with and uh but we don't translate proper names even in strong's lexicon or whatever you don't find proper names dealt with but every hebrew word is based on three-letter roots and if you know the roots you can infer the basic meaning of the words and i'll come back to that before we're through we're going to discover some very very intriguing things about the hebrew language before through but the point is part of our problem is we don't know what those names mean my formal legal name is charles what does charles mean there's all kinds of speculations no one really knows there's just conjectures and your own name very likely has been the meaning of it has been lost in antiquity well let's take a look at this the genealogy of genesis 5. adam seth enosh keenan mahalalel yared enoch methuselah lamacanoa 10 guys well let's take a look at this adam of course pretty easy what does adam mean it comes from autumn it means what man that's pretty straightforward and when the adam and eve had their son they named him uh uh in it and uh with a root that means appointed in fact uh eve even says so in genesis in the chapter before genesis 4 25 eve said for god hath appointed me another seed instead of abel whom cain slew it always fascinates me always people always ask you know where did cain get his wife i don't know why that's such a popular question you know obviously kane married his sister because he was able anyway we'll move on uh obviously they had a budget they had a son by the name of enosh now enosh comes from a root which means mortal frail or miserable it's usually it comes from the the root anash which means to be incurable it's used of a wound or grief sickness or wickedness so it really means mortal so now that's got a tough name to go through school with mortal you know whatever his son he named kinan now in some bibles it's translated canaan it's not no it's not aramaic it's hebrew and the kenites were a tribe in fact balaam in numbers 20 24 i think this makes a pun on their name the kenites the word keenan comes from a root which means sorrow or dirge or elegy that's also a rough label to go through school with you're going to choose up a rugby team hey sorrow you're on our side you know it doesn't work really so he apparently when he had his son had enough of this he gave his son a very unusual name rather a mouthful but a wonderful name mahalalel which means the mahal which means the blessed or praised one and l the name of god mahal el is the praised god or the blessed god that's that's pretty neat and he has a son by the name of yahweh which is a verb which means shall come down and i won't get into the conjectures surrounding this our time is short we'll keep moving here but uh we have then of course he has a son by the name of enoch now we've talked about enoch but what does his name mean it turns out it's an academic term meaning commencement or teaching and he of course has a son by the methuselah which we've already pointed out means uh his death shall bring and that is of course the year the flood came and it's a fulfillment of prophecy he has a son by the name of lamech now here's a root that we still may retain in our english language the word lament or lamentation and it but it comes from a root meaning despairing despairing and he has a son by the name of noah how many of you have heard of noah that's the israel handsome about two-thirds that's kind of very trouble here right i'm kidding of course now noah is the two-letter root that's it's derived from nakam which means to bring relief or comfort in fact lamika's father indicates that's why he named him noah because in genesis 5 29 he says he called his name noah saying the same shall comfort us concerning our work in the toil of our hands and so on so okay we have the j we have the genealogy adam seth enosh keenan mahalalel yared enoch methuselah lamech and noah ten guys but now we have enough background to take a crack at translating that genealogy man is appointed mortal sorrow but the blessed god shall come down teaching that his death shall bring the despairing comfort or rest every time i do this i get goosebumps man is appointed mortal sorrow but the blessed god shall come down teaching that his death whose death god's death shall bring the despairing comfort of rest now this is this little insight to me is precious for several reasons you have here a simple one sentence summary of the gospel of jesus christ and it also indicates that this that god's plan of redemption was not a knee-jerk reaction because adam surprised him by falling god knew from the beginning he would and had a plan in his mind to deal with it but there's also a pragmatic aspect of this there's no way you'll ever convince me that a group of jewish rabbis contrived to hide a summary of the christian gospel in a genealogy in their highly venerated torah books of moses no way so i think this is provocative it's a good beginning one integrated design the new testament is in the old testament concealed in more ways than we could possibly enumerate if we had a month to do it and the old testament is the new testament of course revealed so what i want to do now to be in order to fully appreciate some of the places we're going to be going together i'd like to give you a little background in a technology that most of us probably have not had any serious exposure to we're going to introduce you a little bit to secret writing cryptography and what that's all about and codes of course in literature were all familiar with that it was very prominent edgar allan poe's famous goldbug novel sir arthur conan doyle had sherlock holmes involved three times with codes most conspicuous from the adventure of the dancing men these little stick figures that sherlock figured out was actually a a form of secret writing and so on carl sagan's recent novel and movie involved code that was three-dimensional and and so forth so codes are obviously a part of our literature but it's also a key award the germany's enigma uh uh which uh from albert's uh cypherdiscs to cardano's auto key was derived from those things we'll talk about in a minute and the american code black in october 23 of 1942 it was cracked or uh made so it could be correct before al el alamein we had no victories after allah mean we had no defeats churchill pointed out and so what's hidden behind that is the art of the code breakers and project ultra touring here in britain and von neumann in the united states conspired together to develop our computer industry the roots of it which many people don't realize the primary drive was these machines to crack these codes which of course they did do and of course in the pacific the magic was a victory over japan's purple these codes which we actually knew but no one would believe that we had the day on the hour pearl harbor but nobody would listen there's a very dramatic background behind that let's keep going when you start talking about secret writing there's two major segments of it one is steganography that's the art of secret writing in the sense of invisible inks and hiding the message in the first place we're not going to deal with that that's not that's peripheral to our interest we're talking a little bit about cryptography and we'll distinguish between codes and ciphers codes in the field refer to arbitrary designations where you might have the number 347 mean a battleship whatever arbitrary definitions without the code book you're useless uh in in paul revere's ride the the old north church the lantern one by land two if by sea if the british had the most advanced grey computers they could not have broken that code because there's no way to break it it's a code it's an arbitrary designation by arbitrary pre-agreement that's what a code is a cipher is what most of us think of and there's two kinds two basic techniques in hiding a message with a cipher one is by transposing the letters by some scheme so so the unintended cannot interpret it and yet the intended can receive the message so one is by transposition others by substitution those are two basic things let's take a look at transposition ciphers one of the simplest ones in the very early days was to wrap a a paper around a staff write the message longitudinally along with other things when you unraveled it unless you had a staff of exactly that diameter didn't make a lot of sense to you this was a very primitive very crude but very early form of transposition ciphers there's a rail-french cipher columnar transpositions to give you a feeling for this if you took what's called the plain text that's the message you're trying to deal with and let's say you said please help now you can make a rail fence and then just slice it each level and that's one way of transposing looks cute but very easy to break not very useful perhaps far more significant was what they call columnar transpositions let's assume your plain text was cinderella be home before midnight okay first thing you do is put that in columns then you'd adopt a code a keyword and the person and you'd alphabet alphabetize the keyword and that would give you the order this is just one way there are many ways to do this but this would give you the order of the columns that you take and so it would take column two then one then four then five then three then six if with that keyword and so the text you take column two first and just take it vertically then you take column one vertically in column four vertically and column five vertically column three and column six the ordered being defined by your keyword and so very simple concept results in a reasonable form of concretion not easy to break but actually quite easy to break with modern computers it's a it's it's not as secure as it may seem at first but along came uh as we moved through history the famous cardinal grill the idea was that you would be in possession of a grill with some holes in it or you would have the formula by which to cut a grill with those home either way and if you took a message and this is obviously a very crude message to give you an idea for leverage try only cereals listed in social lovers editions it deliberately is meaningless but if you take the cardano grill if it's the right one and you put that over the message and and take the letters that are exposed it says flee at once all is discovered okay by simply selecting from the message certain letters this is the kind of code you find in the bible one of the simplest forms of this is simply to take every nth letter every third letter every fourth letter every fifth whatever and with a computer of course you can try all of them and discover all kinds of hidden messages what are their significance we'll get to that so this is the cardona grill a variation of this which looks very very complex is where they would take a six by six matrix and then they would uh uh or allocate a certain portion a certain order a scrambled order of the squares in the grill and now this is one of those things that it would seem um superficially that the see by the time you're through you have an order a very scrambled order of the 36 squares and 6x6 matrix it looks the net result of that looks like it'll be very hard to break it turns out not hard to break at all if you realize the method but the method that derives from all of these that we encounter and there's been a lot published by is what's called the equidistant letter sequences which is really just a variation of the cardano grill with the simplest possible formula a fixed linear sequence of skipped letters and uh what's interesting very few people today are aware that they of going taking this to the next level a non-linear sequence of more complicated things the equidistant letter sequences are actually not very useful for secrecy they're easy to find but they can be used to authenticate a message because they're very very hard to simulate and part of the thing let's imagine you're a operative you're you're a spy in a foreign country and let's assume that your hosts have they may not know who you are but they know there's a spy among themselves so they create all kinds of false messages so part of your problem is in the foreign country you're getting messages but you're not sure which ones really came from headquarters and which ones were cons contrived by your hosts well one way you'd you what you'd do is you would look in your messages for content that only that you know only your contact has you'd look for attributes of the source to authenticate the source and interestingly enough that's exactly what god has done with his word since god has the technology to create us in the first place does he have the technology to get a message to us of course he does the trick is how does he authenticate his message how does he let us know that it's really from him and not some kind of contrivance or a fraud that's called authentication and we'll talk about some surprising ways god has done that within your text well we've talked about transposition ciphers but by far the more important category of ciphers are substitution ciphers in several categories mono alphabets polyalphabetic polygraphic and some more advanced forms the caesar cipher is perhaps the simplest used literally in those days if you take a sec the idea is very simple if you take a sentence you would take not those letters but some formula of letters say for an example each letter to be substituted for the letter that followed was the third after in the alphabet so if that's the case this is a fascinating session would translate into a series of letters that would be absolutely meaningless unless you realize that each letter really is alluding to a letter three steps before the alphabet you follow me very simple and yet unless you know that it's pretty tricky you'll also notice it's conventional of course to ignore the spaces and so what you usually do is put them together encrypt it and then break the encryption into five letter groups to make it easy to count so because you don't want the spaces to be a tip off in terms of the what's called the parsing of the sentence and there's other tricks we'll talk about in a minute but all of these in effect are one-on-one mapping where you take some alphabet and you simply one-on-one map it and you can take a random assortment of letters uh and make each lighter substitute in this particular example on the screen the word anime becomes swshp and uh because for the for the e you substitute the s and for the n you substitute the w et cetera et cetera and so and now what's as you can probably guess one of the weaknesses of this is there's a one-on-one relationship between the substitution and the letter if you know the frequency of use of letters you can begin to start inferring which letters represent what and surprisingly enough if there's much volume in this this breaks rather easily rather straightforward but there's some very very dramatic things that started to develop in the 15th century one of the things you'll discover by the way and i anticipate a little bit of the talk here as history goes on most of the kings in europe had on their staff former jewish rabbis and many of the rabbis drew upon traditions that go way back way back among the scribes and one of the things that's going on today is the rediscovery of some of the techniques that were prevalent back then but leon batista alberti invented the veneer poly alphabetic ciphers and these are like caesar ciphers with interesting variation if you took the alphabet the idea is you take a key letter and have it line up with the key with the plain text for example let's assume that keyword is dog and the plain text you're trying to translate i'll just use jim a three-letter example you take the d on the top row and you take the the letter you're looking for vertically and where they intersect becomes the the ciphertext and when you get to the o you take the o on the top and the eye on the horizontal where they intersect becomes the next letter what's interesting about this this destroys the one-on-relate one-on-one relationships between the letters and the g and the m become the s and so on and so uh this led to a whole revolution in cryptography because the that led to the what's called dynamic polyalphanumerics where you let each inciphered letter become the key to the next one and boy that makes it pretty rough to break where you have whatever the previous letter was is what you enter the top row with and that becomes a code that's very very difficult to break and so now this led uh in 1585 to the only code that's ever been invented that is unbreakable and it's called a strange label it's called the one-time pad and part of the requirements are you need a key as long as the message the key needs to be totally random and never reused and that's why it has this weird name the way to actually implement is to print a pad of random letters that the sender and the receiver both need to use and so it turns out to be very very powerful because you cannot break this kind of a code without those pads and at the same time it becomes very very difficult to manage in a pencil and paper kind of world with electronics it's a whole nother ball game and we'll come to that in a minute but modern ciphers of course use millions of continuing changing cipher alphabets and we'll talk about how you can communicate securely in modern terms in a moment but then there's polygraphic ciphers these are interesting because two letters are coupled together perhaps the most famous is what's called the playfair code actually invented by wheatstone but because lord playfair during world war he was in love with this idea i'll give you a simple version you take the alphabet take the i and j together so you have 25 letters so you can make a five by five matrix out of it and you take your plain text must come now let's say you break it into letter pairs m u s t c o and so forth and each pair of letters will form a rectangle and you take the opposite diagonal of the rectangle so the mu you see become rp if you will on the screen uh the the st becomes the xy and you adopt a in each case though it's the letter pair that determines the letter pair there is not a one-on-one correspondence with any particular letter that's where it gets its real power this is a very very powerful code used during the boer war it was also used by the german spies in the united states usually what you do before you create your matrix you use a sentence or a key word and what the what they did is they used the uh king james bible found in any you can do this in any hotel room you didn't know equipment there's a gideon bible and what they often would do for an example is use the book of proverbs it has 31 chapters so you use the day that corresponds to the chapter there's no chapter that has less than 12 verses so you let the verse to the month the chapter to the day and for every date you have a sentence you take that sentence take the letters in the order they occur and then fill in the missing ones to make your matrix uh you can do this as a pencil paper it was a very very effective code used at for espionage purposes uh in america by the germans during world war ii it's very simple very practical and and relatively difficult to break so so uh and of course you end up with a cipher text that's it's difficult to break because there isn't a they're digraphs they're they're letter pairs they it they're more digraphs than there are um letters so the uh they're under it undercuts the monographic frequency analysis and uh it obliterates single letter characteristics and so forth but uh then there's substitution ciphers and the one we've missed is a block substitution if you take the uh well in fact the national bureau of standards has a des chip we turned around western digital by putting this into a chip for a number of purposes it uses 64-bit keys it uses 17 stages of poly alphabetic substitutions alternated with 16 different transpositions and so it really requires an exhaustive search of all two to the 64th power keys to to crack it and it's not really as strong as you'd like in modern uh today you can take those things and operate on them mathematically fractionate them shuffle them all kinds of ways to make them very very difficult to to communicate there is up till now this is just general quick background for you as we get into some things here in a minute but there's one thing you want to carry away from this you want to remember and that is an invention that occurred relatively recently in what's called one-way keys or so-called public keys and uh these are asymmetric see it's normal in encryption to have a a key or a code word the same for the sender and the receiver that's the trick is that you both need to share that keyword and some way of manipulating it in 1976 whitfield diffie and martin e helmet of stanford university discovered or invented what's called an asymmetric key a different key for encryption a different key for for decryption there they come in pairs but the one for encryption you can publish publicly if you know my public key you can use that to send me a signal that no one else can crack even you can't crack it you can encrypt it but you can't crack it because it takes a different key to crack it follow me it's a asymmetric they're called that's why they call them public keys or one-way keys there's there's a number of different styles of these from from the stanford tradition or the mit tradition but out of all of this comes a thing you'll hear about called pgp it facetiously talks about pretty good privacy it's actually very good privacy and what has got the government's upset across the world is that this is the public domain the people invented this put it on the internet you can go to in any stationary store and pick up a software that allows you to do this and it actually if used properly can it cause you to enjoy pretty good privacy and privacy makes governments and liberals very uncomfortable and one of the things we plan to do as we think we moving into darker times is to have training sessions for leadership to understand how to use the internet for secure communications because see all these things you want to understand what pgp is and the internet is a whole different ballgame see all these models of communication from a to b implies a communications channel that's static but if you're communicating through a totally continually dynamically changing database which internet is you can in fact mutually be referring to parts lists and other things that no one has any idea and the only way they could break your code is to have a snapshot at the institute transfer of the entire internet which of course is observed so out of that reality can come a form of communication to give you security from eavesdroppers of any kind so there may be a time when leadership may want to take advantage of that well of course out of these techniques came devices alberti's cypherdisc being an example of that the wheatstone disc that followed thomas jefferson had his wheels and babbage had his difference engine which led to the computer industry the enigma machines in world war ii were a major factor in what was going on touring of the neumann machines were invented to do that and out of that course came what we think of as the modern computer and of course modern computers whole different ball games you know the technology in computers doubles about every 18 months has for years if you have a laptop with a pentium 3 in it and if you had had that in 1995 it would have been classified as one of the 500 fastest computers in the world we laugh at that now but same time we don't realize how much speed or much capacity has increased just in the last what eight years so that's an example kind of interesting but let's move on what about let's get at it now with this little quick survey what about the bible codes we hear so much about that and when they say bible codes what they mean whether they know it or not is a specific code called the equidistant letter sequence or elses there's a lot of fanciful stuff a lot of stuff contrived it's been popularized in recent books that's too bizarre to be accepted yet some of it is too impressive to be ignored so let's steer a path through this and i'm going to suggest to you some professional competence in cryptology is essential to adequately evaluate what we're getting into here as early as the 16th century cardovaro rabbi cardobar said the secrets of the torah are revealed in the skipping of letters and around that profound insight a rabbi by the name of weissmandel after world war one started to check in and what do we mean by equidistant letter sequence well here's just a contrived sentence to give you an idea dr rips happens to be one of the pioneers here rips explained that each code is a case of adding every fourth letter to form a word in other words if you take every fourth letter and the thing that's on the screen it spells out another message which in this case simply says read the code the point is you can embed in a rational message another message of a totally different kind the the message might be reinforcing which could be used for authentication or it could be new information altogether well having said all that let's take a look at the book of genesis in hebrew relax we don't have to get into the hebrew here but the first if you go to the first how and then you count 49 letters you come to above and you count 49 letters you come to a resh and you count another 49 letters and you come to hay now that happens to spell torah you say well that's kind of curious but just a statistical you know accent perhaps with switching theory you could probably calculate the odds it's very very rare as you can imagine but you're puzzled by this so you go to leviticus nothing happens when you get to numbers something even weirder happens the same thing happens if you spell it backwards now i have no idea how they discovered this they must have had time on their hands but and you go to deuteronomy you have the same equivalent type of thing saying you got taurus spelled backwards there and 49 letter intervals you say what on earth is this is too designed to be accidental and what's the point well you go to the middle book between the in the five it's leviticus and now we're not talking 49 letters we take the square root of that seven and we discover that in intervals of seven you have the name of god so we have genesis and exodus it goes in the proper direction numbers neutronomy it goes backwards and in the middle you have jehovah in other words the torah always points to jehovah this is a design in the text and yet the text is not contrived it carries the most important narratives in the bible and so we look at this and what do you make of this i'm not sure if that was all there's two of us just to curiosity there's more why 49 by the way that's a strange thing it's the square of seven of course well in leviticus 23 17 we know that there that seven sevens are significant the scripture in several ways one of the ways is at the feast of first fruits they are count you know uh 49 days and the next one is the feast of weeks the haksha vote which is the prophetic day of the church being born and there's a lot more to it i'll leave that for now in the book of ruth which is one of the most interesting books of prophecy little four chapter book that unless you understand the book of ruth you will not understand the book of revelation but in genesis 38 judah and tamar member gave birth to perez and zerach boaz descended from perez okay boaz in book of ruth marries ruth they had a son named obed who had a son named jesse who was the father of david you're with me so far that's all by review i'm sure you remember that well in genesis 38 these names are encrypted at 49 letter intervals in chronological order the probability of just having the names there is the neighborhood of i think one in 10 thousand but the probability of having a chronological order turns out to be one chance and over eight hundred thousand so is this accidental is this just a coincidence of statistics there's a big debate on those things well the ellipse closes you know see the the cabalists these these mystical rabbis had traditions as how you handle the text and in in the renaissance period as the k as these techniques became very important to the courts of europe the uh on the on the staff of most of these kings were some rabbinical expertise that developed translated this into crypt into the field we call cryptology and as that matures we start having mechanical aids that ultimately leads to the enigma machines in germany the wartime computer development and the rediscovery of the codes themselves the loop is closed see in other words it was that technology that created the codes that gets reflected ultimately in machinery which now allows us to rediscover things that the ancient rabbis knew let's take some examples here's the word israel you think that'd be an important word in the scripture if you look at the first ten thousand letters of the book of genesis from intervals from minus one hundred plus one hundred minus numbers being you know looking at it backwards it only occurs twice that itself is statistically astonishing because statistically it should appear a lot more take the frequency of the letters and go through that analysis you'd expect it occur more than twice turns out it only occurs twice and interestingly enough in intervals of seven and fifty to any jew that's very profound because the qadosh the sabbath observance in genesis chapter chapter one part chapter two is something they do every shabbat if you will and of course the jubilee years after seven shmitahs so so we have seven and fifty are very significant numbers to a jew and it's interesting the name israel is in in effect encrypted in the books of implications at that level if you look at genesis two the end of chapter one in the beginning of chapter two you have a section of text it starts in genesis 1 29 god says be old i've given you every herb bearing seed and so forth and every uh every tree which is the fruit of a a tree yielding seed and so forth and that whole passage ends with chapter verse nine of chapter 2 and out of the ground made the lord god to grow every tree that is pleasant to the sight and good for the food and the tree of life also in the midst of the garden and the tree of knowledge good and evil those of you familiar with genesis that all sounds familiar what you may not realize that in the hebrew text you have encrypted in that passage the name of every tree that occurs in the bible and there's a there's like 25 of them and they're all in there fairly tightly encrypted in that passage now what's the chance of that happening by accident and what's interesting aside from the statistics of the letters the relevance of it here you have all it's the passage about the trees you have all the trees encrypted in that passage uh the appointed times you know the rabbi hirsch said that the jews catechism is his calendar and you can one of the most exciting studies if you haven't done it is to understand the jewish calendar from its prophetic significance and we have the heptatic calendar we got a week of days we're all familiar with that we have a week of weeks the shabbot the counting the 49 the the week of months the religious year we have the week of years the sabbatical year and seven weeks plus one uh seven weeks of years is the jubilee year that's the calendar in which all land reverts to its owners all slaves go free all deaths forgiven and that the jubilee of course is alluded by peter in acts in the second sermon in acts 3 as the time of the restitution of all things of the second coming so there's issues here and so but the appointed times you know this in genesis chapter 1 verse 14 it says god said let there be lights in the firmament of heaven to divide the day from the night and let them be for signs and for seasons and for days and for years that's in the english in the hebrew the word seasons is hamoidin the appointed times is what it really means well if you search for this it's kind of interesting first of all how many appointed times are there to a jew well there's 52 sabbaths seven days of passover shabbat yom torah trumpets day of atonement seven days of sukkot and uh the eighth day of assembly when you add that all up at 70 there are 70 appointed times in the scripture when you take a computer and search the book of genesis there's 78 000 letters in the book of genesis statistically you would expect these letters to occur uh at least five times in that in the entire book of of genesis it turns out it only shows up once which itself is disturbing but what's even further interesting it is at an interval of 70 the number of pointed times there are and it is centered on the very verse that we just read where the idea of homo eudem is introduced so what's the chance of that happening by accident no it's designed it's designed in and uh so the odds against this if that's happening by on any chance have been estimated by 70 better than 70 million to one now does this ge reveal some new information no of course not i wouldn't trust it if it did but it authenticates the origin of the message itself because these are the you're seeing the finger what i believe are the fingerprints of the holy spirit isaiah 53 some people call it the holy of holies of the old testament in which and if you look if you search it search that passage in the scripture you'll discover that he says you'll find yeshua is my name and by the way if you search on all the messianic prophecies in the old testament you find encrypted behind that the name yeshua yeshua is my name and so forth and the messiah nazarene galilei caiaphas and this all in isaiah 53 is a number of different words all of which are interesting but here's the here's the one that really interests me you also find encrypted in these 12 verses the names of everyone that were of relevance that were at the foot of the cross you find all the disciples there peter matthew john andrew philip thomas do you find two james's not three because remember one was not a believer until after the resurrection the lord's brother but uh j two james simon thaddeus matthias you find three mary's that's itself interesting one of them is encrypted interlocked with john by the way salome and joseph so that itself is provocative to me but there's something even more astonishing there is a name because of its letters that should show up very frequently in any jewish text because the letters are so frequent and it should occur like 50 times in the book of isaiah but it's conspicuous in that it doesn't appear here that's the name of judas the fact that judah statistically doesn't show here is in itself astonishing once you understand the dynamics so those are some let's shift a little bit and talk about some acrostics you know people say does the book of esther's been controversial you know martin luther wanted out of the bible because the name of god doesn't appear in it that's because he wasn't jewish he didn't know how to look for it the word esther itself means something hidden and there are five acrostics the jews love acrostics and and i'll show you the acrostics because they are well known from the talmud i published in my newsletter many years ago and i heard from this quaint character in san antonio texas he wrote me a note which i first disregarded then i double back on it and developed a beautiful relationship with him esther 1 20 we find the name of god is hidden away in an acrostic in esther 120. it's take the initial letters of each of these words because the event there is initial it is spelled the name of god spelled backwards because god was turning back the councils of man in that passage you have the and these are all in the talmud bible these are well known to a scholar uh you have another one esther 5 4 in which the initial letter spelled the name of god because god was initiating the action and it's forward because god is ruling and causing esther to act and you have another one in 5 13 and it is also the last letters of each word because haman's end was approaching and it's backwards because god is overruling haman's gladness and turning back haman's uh counsel if you remember the story of the book of esther and uh then you have it in esther 7 7 and final letters the last letter of each word haman's end had come and it's forward because god is ruling and bringing about the end that he determined so these are these these some are forward some are backward and so forth some are the front letters some of the back letters the ones that are each they're each different speakers and what's interesting ones men you can one zester one's ham and one's by the writer of the book and the pairings uh they're initial when the facts are initial they're final when the facts are final they're backward when the gentiles are speaking and their forward and israelites are speaking so you suddenly realize these acrostics are designed they have a purpose they're not just random things and so there's also introversions the words that are spoken uh concerning a queen the word spoken by a queen the word spoken by him and the word there's a if you're familiar with introversion structures that also shows up but anyway um uh was called to my attention that there are some other uh terms in there and uh the name i am is encrypted in esther 7 5. the question being asked in the text is who is he and where is he that just presume in his heart to do so the answer is god the i am is encrypted behind that passage and uh esther 1 3 at an interval of 8 we have the name the messiah hidden away behind the text because god is protecting the jewish people from haman and so forth but he's doing it invisibly for lots of reasons and yet even his name is in the book a number of times but invisibly and then there's another one in esther 4 7. again the name is yeshua or g as we would say jesus equidistant of seven and we have uh again we have el shaddai the almighty but the last one is the fun one in uh starting in esther 3 verse 11 to 12 taking an equidistant letter of sick by the way uh the rabbi that does this does this all manually without a computer he spent his life doing these things discovering all kinds of stuff but ramsel rabbi ramsel yaakov ramsel a wonderful guy he wrote me this he says chuck this last one you'll really get a kick out of you start an ex esther 310 and take every sixth letter it says and satan share the same stench so kind of fun i want to show you something let's serve a little test to see if you've been following this i have a paragraph on the on the screen and i want you to see if you can tell what is unique or strange about this this paragraph i'll read it to you upon this basis i'm going to show you how a bunch of bright young folks did find a champion a man with boys and girls of his own a man of so dominating and happy in individuality that youth is drawn to him as is a fly to a sugar bowl it is a story about a small town it's not a gossip er nor is it a dry monotonous account full of such customary fill-ins as romantic moonlight casting murky shadows down a long winding country road close quote etc do you notice something strange about that text no ease right on it's a text totally without ease how many of you believe that was just an accident of the writer of course not you see ease are so prevalent in our language the absence of ease itself is an evidence of design you follow me in fact i've taken this to uh the the e's are about 13 if you're typing about 13 of your letters will be ease and of course the chance that this happened by accident is absurdly long it was taken actually from a 267 page novel that was published by uh in 1939 by ernest vincent wright the whole novel is deliberately designed to have no ease in it you may wonder why bother it was just a challenge that he took he actually had to remove the e from his typewriter that means he couldn't use the word the these they the words he could not use are enormous and yet he took that on to see if he couldn't write a novel and he did uh in 1939 266 it's called gadsby the story of over 50 000 words without using the letter e but i i bring it here to indicate the statistical behavior of language is something you can't manipulate easily so when you start looking at these so-called bible codes the head of the chairman of the department of mathematics in harvard and professor cashman said the phenomenon is real what it means is up to the individual indeed that's true but i want before we leave this topic talk about the dark side of the codes you know there are critics that say bible codes are nonsense they haven't done their homework on the one hand there's others that go the other way and they try to use them for divination they are one-way keys they're not designed to be divination they're designed to glory god after the fact and they're they they're effective in that purpose but you want to be careful in this area if you get carried away in it because it also brings with it the lure of the occult in the kabbalah the study of gamatria which can be constructed but often goes into deep stuff and the gnostic heresies were all built into this kind of stuff so that is the the quick background to what we're going to do tomorrow and i'm going to provide you proof proof that these codes are macro codes now what do i mean by that i'll talk about that tomorrow but i'll prove to you that these codes had to come from outside our time dimension they demonstrate that the thing that is in your lap is of supernatural origin and you can prove it and i'll prove it to you tomorrow in fact we'll also talk about how you measure certainty if i ask you you know we had some talks here about faith and so forth how certain are you believe it or not you can measure certainty there's a science that allows you to do that we do it every day and we'll apply those ideas and those those tools to how sure can we be that that bible really is what it says it is that jesus christ really is who he said he is measuring our certainty will be our task tomorrow and so we're going to go through and we'll talk about extraterrestrial communication and we'll talk about how the scientists the techniques they're using to verify the seti intercepts and the rest and all that will be uh our challenge tomorrow let's close our let's do let's close our session with a closing prayer let's borrow hearts father we stand in awe as we get a further glimpse of just who you are and the preciousness of the word that you've provided to us we do pray father that you would help us with your holy through your holy spirit to indeed to find those things that you've hidden here for our learning those things that will magnify your name we thank you father you've gone to such extremes that we might live we thank you father we ask that you would just increase in each of us a hunger and a passion for your word and that you would help each of us to grow in grace in the knowledge of our lord and savior yeshua hamashiach we thank you father for who he is for sending him and for the extremes you've gone to that we might live and bear fruit father help us to be better stewards of the opportunities you put before us we pray father that your purpose would be accomplished in every life in this auditorium and that hear these words as we commit ourselves before you in the name of yeshua our lord and savior jesus christ amen
Info
Channel: Koinonia House
Views: 73,898
Rating: 4.9298449 out of 5
Keywords: jesus, christ, koinonia, house, khouse, institute
Id: WKHdyhmolMw
Channel Id: undefined
Length: 53min 57sec (3237 seconds)
Published: Sun Aug 29 2021
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.