ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

The Time Travelers Dilemma – (7) Embroidery

Updated on December 14, 2016

From a lecture by Dr. Nakey: When we investigate the more complex social patterns of the past, many threads appear to be unrelated and disconnected. The late 20thCentury and early 21stCentury, for example, affected American society through movements related to Civil Rights, Progressive Socialism, subversive Communism, labor unions, and religious desensitization. Numerous examples exist. More importantly, the intensity of support and opposition ranged from outright violent organizations, proud and unrepentant regarding their violence, to milder discussion groups. The times are also sometimes characterized by the development of a widespread need for instant gratification, the "I want it now!" syndrome. These forces inter-played to form an embroidery for the time period that appears chaotic and confusing. Such was the first report we received from one of our first travelers.

Kryptos

As he aged, the man met people who re-awoke his predisposition for cryptography, interestingly enough, through playing role-playing games. While attending a role-playing convention, he attended a presentation on the Kryptos puzzle. For those who do not know, Kryptos is the cryptographic sculpture by James Sanborn installed in the Courtyard of the CIA. The man began to participate in the efforts to solve this puzzle. This brought him near full circle to the sort of thing his grandfather had originally thought he would be good at. Although he did not follow that as a professional path, it seemed to be part of his personality to think he could help with challenging puzzles.


This interest led to regular attendance to the Cryptologic History Symposium, a group that meets every two years to share lessons of Cryptologic history. This is fascinating stuff, attended by former workers at NSA and others who had participated in some way in the making or breaking of codes. Over the years, the presentations included discussions of the breaking of the Venona codes, the resulting prosecutions, and additional identification of those mentioned in the recovered messages, identifications that were not in the original released book. They tolerated the man's presence. But these interests and the high technology job meant, you guessed it, more investigations. They happen so often they have become an expected part of the routine now, their experiments in temptation too often interfering with otherwise productive work. What was it they thought he knew? As high technology as his job was, there was no way that investigators could justify the extended cost over years and years of investigating and re-investigating. So the everlasting question was, “Why?”

Why?

Could it all be because of the brief contact with the vacationer? What motivated the mother to play a part in protecting the vacationer? Exactly why did the vacationer need to be protected anyway? What motivated each to do their part?

It would have been quite natural for the vacationer’s mother to seek a father figure for her son. It would have been a simple and natural thing in the sixties to approach a Mason (or someone who knew a Mason), and seek help: “Is there no help for the widow’s son?” The mother would have sought help from her father. The grandfather, a former government employee and later a senior Mason, would have responded, and when he realized who the child really was, would have made it a point to ensure he knew exactly who was being helped. The grandmother (supposedly the "social climber" in the family) would have turned to her friends to also aid in protecting the child. All of these efforts would have been completely unrecognized by both the boy and the vacationer until a something motivated one of them to rediscover the truth.

Until then, nothing is as it seems.

Suffice it for those in the future to know this: the vacationer was qualified under the American Constitution and existing United States code to be elected President. This truth could only be seen upon reflection.

What becomes of a man who is sheltered from his roots? Independent conjecture below

Reflections

As life quieted down and the apparent intrigue faded, the now older-man began to reflect on the changes seen in the world since he was young (still asking himself the one question, “why?”) One of the best hopes for change in America came with a man a few years younger than he, one Barack Hussein Obama, when he was elected President of the United States in the late 2000’s. The now older man began to wonder who this person was. As he read and heard more, he thought back to that first black boy he had ever met. The demographic was so close. Both had a white mother. Both had a black father who had gone home to Africa. Both had the middle name Hussein. Both had either considered,or chosen to use the middle name Mohammed. Both had connections to Hawaii. Both had been sheltered from the terrors of the 60’s, and neither was likely to be thinking of it consciously as an act of being "sheltered". The demographic was so close, yet it seemed impossible. But for some reason, the subconscious kept screaming to the now-older-man “You idiot! File your report”, and so this report was begun. As the report progressed it nearly wrote itself. The clues had been there all along, for you see, all those events and investigations that happened as the boy grew were not originally intended for him. The computers choice on when and where to land had been right all along, and the mother’s ploy (both mothers) to protect the children had successfully misdirected even the best of investigators. It was to the vacationers benefit though, because he had all sorts of help from his friends to get to where he is. No man can become President without help from others. They help because it had become tradition to reward those who help you reach the top.

The vacationer did not have to worry about being accused of being a terrorist. He did not have to worry about being accused of being a serial killer. He did not have to worry about being accused of being a spy. But like former President Nixon, he refused to see the bad side of those who helped him, a man of principle not wanting to turn his back on those who helped him, no matter what their hidden agenda might be. Not that it matters, for it will be decades before this report is read by those who need to read it. Nevertheless it does make for an entertaining fiction story. To think it all begins with a wrong number.

One last barrier to writing this report remained, and that was the promise. Men of principle keep their word, based on the simple approach to life ‘do unto others as you would have done unto you’. The promise was for the boy to never speak of that one visit to the vacationer’s home, doubly promised to the vacationer’s uncle and to the boy’s father. Men of principle are also faced with a challenge at times, and that is this: “how do you deceive your enemy while telling them the truth?” This was resolved when our President come on television and declared “we’ll never set boots in Libya”. That knowledge of technology kicked in, and the now-older-man thought “We'll never set boots in Libya? Does that mean we will bomb them from the air”, and then, we did. The loophole was now clear, the boy had promised to never speak of that visit, but he had never promised not to write about it, and in fact, it had never been discussed.

YouTube Video - Dr. Malletts Theory

Resending A Message Forward in Time

The Chinese have recently published an article indicating that photons cannot travel faster than the speed of light. Of course photons can’t travel faster than the speed of light, for after all, if they did, physicists would just raise the speed of light to correct the error. A careful read indicates the Chinese were considering the localized interactions between photons and atomic matter.

The Chinese physics article appeared to be intended to refute Dr. Mallett's basic set of equations, which are more to the point of how time travel might be possible. Dr. Mallett's theory is more concerned with the interplay between photons and localized gravity fields.

Neither theory mentions the wave-like propagation of time, yet history teaches us that the theory evolved around this time, so, it is being presented as fiction here.

A recent experiment indicates that neutrinos are trending to speeds faster than the speed of light. Note the careful and seemingly probabilistic wording. Time will complete the story on this one.

And one last item to note. There appears to have been a second traveler who was sent even farther astray than myself, recognizable by the misquote of the message we had originally intended to have our time travelers share, a message the 20th or 21st Century listener will no doubt hear incorrectly:

“It is a Tangled Web, the Weave, when first we navigate the Sieve."

Dr. Beccam continues to purposefully walk the halls early in the mornings. He can sometimes be overheard saying 'Good morning, time travel’.

© 2011 FitnezzJim

Comments

    0 of 8192 characters used
    Post Comment

    • profile image

      Embroidery-Services 

      6 years ago

      It is a tremendous article. It's content is superb and it's really well written. Superb job....

    • rasta1 profile image

      Marvin Parke 

      6 years ago from Jamaica

      Will do some research into Dr. Mallets theory, thanks for bringing this to LIGHT.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)