Ancient Texts Research Tool
 - - - - STAR - - - -
The STAR project was taken as a challenge to either prove or disprove the findings by Timothy Smith in his recent book, The Chamberlain Key (TCK).  

Without access to the original computer source code underlying the software application used by Mr. Smith (which we discovered had been destroyed by a lightning strike) , we did not have the means to verify the manipulation of search array letter sequences, the algorithms, translations, and the statistic calculations employed.  We were also limited in our ability to replace the letter sequence with one from a different source , e.g., the Leningrad Codex.  With STAR we have overcome  these deficiencies via an industry standard “open” approach to determine if complex encryptions have been placed in ancient texts as theorized by Mr. Smith.  

We teamed with Dispatch, USA, experts in the field of "embedded messaging", to develop this very unique
research tool.  A consumer version of the tool is being provided to the public for a minimal license fee that will continue to help us fund the project.  Putting this tool into the hands of the public also levels the playing field in that it provides everyone the ability to inspect the TCK findings with advanced statistics and to join the hunt for other potential encryption mechanisms.
STAR Background
One of the first features we requested to be implemented in STAR is the ability to import any text document into a search engine, whether that text be an ancient Hebrew document (e.g., Leningrad Codex), or a modern day novel, or newspaper (e.g., War and Peace, Wall Street Journal, etc.).  If we were to discover that any text source could also produce “remarkable synchronistic findings correlated to biographical data”, then we would be able to dismiss the findings presented in TCK as “total chance”.​​​

​We have solicited the support, expertise, and advice from many in the traditional “code cracker” hobbyist community, in addition to the professionals, as to the features we deliver in the software.  New features are being incorporated daily, funds permitting.  The tool is expected to evolve as the community grows and funds our effort through the purchase of the software.  Although we straddle the fence on whether we believe or doubt the existence of encryptions in ancient texts,  we strive to provide a tool that will support your own personal research (or that of your research institution).

In order to expedite our development of the tool, we employed the services of the Dispatch community to advise us on forensics, encryption/decryption mechanisms, steganography, statistics, and communications information theory.  We also solicited their advice on the art of systems scaling, since we envisioned moving the search engine to a cloud based enterprise architecture that could support parallel processing.  

We had to account for the theory presented in TCK that God encoded additional information into these texts, and if so, we could not limit Him in the infinite ways He could have done this.  For that reason, we needed a flexible architecture that would allow us to add new search engines that could test additional encryption mechanism theories (e.g., DNA profiles, error correction codes found in modern day communications, steganography, etc.).  We believe an infinite God has the ability to employ an infinite number of mechanisms and we want to be prepared for that.
​​​​STAR has been written in Java on the recommendation of Dispatch to give us the greatest flexibility in target platforms, whether that be your basic Windows desktop/laptop, Mac, Linux server, and or Android Smartphone/tablets (future app).  Although we have sacrificed performance by this choice of coding language, we believe that the wider platform target options will increase the overall research effort by enabling more individual users with the tool, who will in turn contribute their own unique findings and new theories.  

​​​Social features gave been employed in the software so that users can share their results and queries with one another for the advancement of this field to study, i.e., evidence hidden information in ancient texts and the encryption mechanisms utilized.

Like a “doubting Thomas”, before we can believe in this, we need to see a strong second indication of time lapsed synchronistic communication from these ancient texts that will complement the findings of the TCK …, i.e., there must be two witnesses … so let the race be on, you may have the missing second key.
STAR Features and User Manual
STAR Resources
​​Links to all the resources for use of STAR are found here and/or on the Support Page :