Skip to main content

"The Penniston Code is a bona fide, Hynek Scale, Close Encounter of the Third Kind..." - Dr. Manu Seyfzadeh 3/16/23

 

Dr. Manu Seyfzadeh.  March, 16, 2023 

1. The Penniston Code is a bona fide, Hynek Scale, Close Encounter of the Third Kind; Bloecher subtype F.

It’s one of the rarest, if not THE communication candidate from an intelligent agency that is not from our own time. Therefore, if authenticated, it ranks at the top of all UFO-related encounters reported in the history of the phenomenon.

It deserves a thorough appraisal. 

2. Provenance: The source is credible by virtue of its credentials. The various critiques that have been launched against it have to do with perceived a) delay in reporting, b) note book irregularities, c) some of the coordinates mentioned in the code, and d) the overall implausibility of a message from the future and a message from Earth, as opposed to an extra-terrestrial location.

However, all these critiques miss one of the chief take-aways of the code: It authenticates itself without relying on Jim Penniston or any other human being. 

3. The Penniston Code, if it comes from the future, cannot by definition be explicit in its instructions and message because of the causality paradox. 

Example: 'Back to the Future:' Marty’s image disappears on the photo when he goes back in time and finds out that he must succeed in helping his mother to fall in love with his father George. When this threatens to not happen, Marty’s past begins to dim. What Gary Osborn has discovered is that the code’s method is implicit, probabilistic, and heuristic, as opposed to explicit. In other words, the code makes it more probable that an observer will discover its own authentication and ultimate purpose. By not changing the past, but only the probability distribution of how the past proceeds into the future, the code overcomes the causality paradox. 

4. The Penniston Code’s first task is to prove beyond a shadow of a doubt that it is an authentic message from the future. It does so by predicting a value of the Fine Structure Constant, not known in 1980 when Jim Penniston received the message. In keeping with the previous point about causality, the code sends the reader to the Giza Plateau, where it maps the various values of the Fine-Structure Constant onto the east base of the pyramid of Khafre, aka G2.

The Nazca coordinates, together with awareness of the importance at Giza of the Golden Ratio, establishes the 2018 Fine-Structure Constant value accurate to 9 decimal places (the full 12-digit number, as determined by physicists) 38 years earlier in 1980. 

5. The Penniston Code’s second task is to establish a 'time dial' at Giza using the well-known 'Lehner-Goedecke line' or 'Giza Diagonal,' and maps a 'processional clock' over it using the only two non-coordinate numbers used in the code: 666 and 8100. 

6. The Penniston Code’s third task - having established its authenticity and a time line - is to point the observer to its ultimate aims: the Great Sphinx, rumored to have housed hidden records, and the Azores, rumored to be a possible location for the real Atlantis. 

7. The remaining content of the code, as it stands, remains under investigation, i.e., "Eyes of your Eyes," the other four geographical coordinates of Sedona, Belize, Naxos, and Taishan, and the meaning of the symbols Jim Penniston saw on the side of the 'unidentified craft of unknown origin.' 

So, in sum, the take-aways are: 

1.The Penniston Code is one of the most significant pieces of evidence in human history of an intelligence other than us in our time. 

2. The critics of the code miss the point of the code: It does not rely on Jim Penniston to prove its authenticity.

If authentic, which the math says it is. it confronts us with a paradox that goes beyond Ufology because it challenges what we think we know about time, causality, and physics. 

3. The code from the future must, by definition, overcome the causality paradox.

The Penniston’s Code solves this problem by changing 'probabilities of outcomes' rather than outcomes. 

4. The Penniston Code has three, thus far, identifiable missions: to authenticate itself, to establish a 'time dial' relating to the cycle of precession (the Giza Diagonal) on which specific dates can be determined, and to point to two places, the Sphinx and the Azores.

Popular posts from this blog

How the Rendlesham Forest Incident binary code message was received, revealed and decoded

“During the night I was often wakening with thoughts, or rather images, of visions of ones and zeros running through my mind, my mind’s eye…” – Jim Penniston, Encounter in Rendlesham Forest In 2010 it was revealed by Jim Penniston that he initiated a download of information when he touched the pictorial glyphs on the craft of unknown origin during his investigation in the early morning hours of December 26th, 1980, in Rendlesham Forest.   26-year-old Sgt. James Penniston was part of the three-man USAF Security Police team called to investigate the landed craft of unknown origin in Rendlesham Forest.  The men with Sgt. Penniston, were A1C John Burroughs and A1C Ed Cabansag.  Only Penniston and Burroughs went into the woods to investigate the landed craft, Cabansag stayed near the truck as a radio relay for the men. Cabansag watched the mysterious pulsating multicolored lights in forest, while his two team members headed out on foot.  As Penniston and Burroughs ap...

How the Rendlesham Binary Code Message AUTHENTICATES itself - by Gary Osborn

Those who are interested in the Rendlesham Forest Incident should have been informed by now that the Rendlesham binary code message, as claimed to have been received by first responder SSgt. Jim Penniston on Boxing Day morning, 1980, has finally been deciphered and that the seven sets of geographical coordinates found within the message, each and together, contain enough additional information that could fill three large volumes. In other words, a great deal of data – answers to some of the things that have had us mystified for centuries – has been encapsulated within just those seven sets of coordinates.  However, aside from all the additional data they contain, what follows is a short version summary as to how the Rendlesham Binary Code Message actually AUTHENTICATES itself, which was first presented in the last chapter of the book I co-authored with Jim Penniston titled, The Rendlesham Enigma , published in 2019. Think on this. Do not ignore it. What follows is factual and...

Jim Penniston's Notebook

Jim Penniston first showed this notebook publicly on the Sci-Fi documentary UFO Invasion at Rendlesham broadcast in 2003 December.  Jim discusses the investigation the night he was face to face with a Craft of Unknown Origin that landed on the forest floor: "After ten minutes without any apparent aggression, I determined the craft was non hostile to my team or to the base. Following security protocol, we completed a thorough on-site investigation, including a full physical examination of the craft. This included photographs, notebook entries, and radio relays through airman Cabansag to the control center as required. On one side of the craft were symbols that measured about 3 inches high and two and a half feet across". "These symbols were pictorial in design; the largest symbol was a triangle, which was centered in the middle of the others. These symbols were etched into the surface of the craft, which was warm to the touch and felt like metal".  "The feeling ...