Page 38 of 102
30 level, are grossly ata disadvantage without proficiency in the tools of New Aeon Eng- lish Qabala. Liber AL asserts this, but substantial research now backs up this claim. As the ciphers thus generated seem to be at work in UFO cases as well it should also be of vital importance to UFOlogists. Hidden grimoires—secret books of magick and knowledge of the inner secrets of the UFOnauts—are beginning to arise. To begin with, there is probably more useful knowledge to be gained from the “original” cipher derived directly from the KEY in The Book of the Law than any per- son, even with computer assistance, could mine in a lifetime of creative effort. The number of cipher “Stars” is almost as large as the number of stars in the sky. Our inability to number, or name—let alone understand—them all should no more stand in our way than astronomers allow the great variety and number of stars, comets, planets and black holes in the heavens to prevent the investigation of an asteroid or, for that matter, the age of the universe. If we confine ourselves to the single original cipher (see illustration), we discover that A=1, L=2, W=3, etc. Once you understand this, it becomes easy to see that the most basic function is to reduce a given interesting word or name or phrase to its numerical value. What constitutes an interesting word or phrase? The answer to that ti. de eee ee ee -£ LL question depends upon one’s line of research. Using these three initial letters alone, A/L/W or 1/2/3, we can derive its numerical value by simply adding the value of each letter, or 1+2+3 which, of course, equals a value of 6. In this case, the letters themselves form an obvious anagram for the word LAW. This might be an interesting area for an occultist, as this initial finding is the key word in the name of the book in which the cipher is hidden, The Book of the Law. It becomes more interesting when we discover that the number value, 6, is the actual number of the successful cipher it is derived from in the computer program Lexicon. That is, it was the 6th successful cipher generated by computer. (An “unsuc- cessful cipher” would be one that duplicates a number value before giving a separate value for each of the 26 letters of the standard alphabet.) As noted earlier, Cipher 6 involves numbering the letters A-Z by counting down from the letter A 11 times, numbering the next letter (L) 2, counting down 11 spaces again, numbering W as 3, and so on around the 26-pointed star, each point of which is a standard letter in standard sequence. For a UFOlogist, more interest, as has been the case with me, might lie in the conspicuous strange names given by purported aliens in the contactee lore. For ex- ample, by the late 1960s, I had noticed the Jesus-like qualities of George Adamski’s ORTHON. He looked like the conventional European images of Jesus, came from the sky with a message of peace and love, etc. But I had no cipher key. Armed with Cipher Six, the classical AL W code, I was able quickly to discover that O-R-T-H-O- N equaled 7-12-24-4-7-14, Adding these letter values 7+12+24+4+7+14 gives a total of 68. Now, there might be a very large number of words or phrases with the number value of “68,” but the cipher itself is derived from The Book of the Law. Therefore, using the number values ONLY of words contained in the code book itself: that is, in Allen H. Greenfield