How to Study the Bible

by Dr. Chuck Missler

The Bible is the Word of God.

That’s quite a statement. If we really believe that, it should change everything. We realize that the Bible is not the random jottings of ancient Hebrew sages, but a portal — a portal into the heart of our Creator. The Word of God is given to instruct and correct and guide us, but it is also a weapon to protect us from the enemy of our souls.

And that from a child thou hast known the holy scriptures, which are able to make thee wise unto salvation through faith which is in Christ Jesus.

— 2 Timothy 3:15

For the word of God is quick, and powerful, and sharper than any two-edged sword, piercing even to the dividing asunder of soul and spirit, and of the joints and marrow, and is a discerner of the thoughts and intents of the heart.

— Hebrews 4:12

The Bible is by far the best-selling book of all time, yet thousands of Bibles sit on shelves year after year gathering dust. When we come to realize the true nature of the Bible, we understand what a terrible waste that is. We live in a world filled with deception, and the best way to recognize a lie is to already know the truth. We need to know this book that God breathed through His prophets and disciples. We need to know what it says and how to wield it in our own lives. I often say that the Bible is a message by one Author from outside our time domain, but it’s vital to know why I say that and how it’s true.

How should we study the Bible? I’m going to make some personal remarks in this book. I’ve been studying the Bible for more than sixty years, so I’ve developed my own viewpoints on matters. However, nobody should accept anything just because I’ve said it or because some other Bible teacher has said it. You have a much better tutor than me readily available to you through the person of the Holy Spirit. Research and study the Bible for yourself to determine what it says — from front to back. My foundational verse on Bible study is Acts 17:11, which tells us about the people of Berea, who:

…were more noble than those in Thessalonica, in that they received the word with all readiness of mind, and searched the scriptures daily, whether those things were so.”

— Acts 17:11

Read more →

Privacy Policy

Copyright © 1996-2018 by Koinonia House Inc., P.O. Box D, Coeur d’Alene, ID 83816

Cosmic Codes – A Series: The Bible Codes


Cosmic Codes – A Series:

The Bible Codes

by Chuck Missler


There has been a flurry of interest in “Bible Codes.” Many sensationalistic books have been published making extravagant claims;1 there have also been skeptical detractors with their erudite guffaws.2

Some truly provocative books have been published highlighting some amazing discoveries that would seem to validate the supernatural origin of the Biblical text,3 but very few have written from the standpoint of a cryptographic background.4

Are the so-called “Bible Codes” real? Or are they artifacts of random behavior within the normal characteristics of natural language? Are there really “hidden codes” behind the surface of the Biblical text?

The Science of Cryptology

People never cease to be fascinated by “secret writing,” or secret codes. Ever since the earliest times, military, political, and personal messages have been communicated by various means to restrict their contents to those to whom the message is intended and to deny them to others.

From the ancient palaces of our earliest civilizations to the “black chambers” of our most modern command posts, the art of secret writing – and the science of their decipherment – has tumbled proud thrones and turned the tide of major wars.5

Cryptology – the study of secret codes and ciphers – has, of course, been stimulated by its use in literature. Edgar Allen Poe’s The Gold Bug probably remains unequaled as a work of fiction, his tale turning upon a secret coded message.6

Sir Arthur Conan Doyle’s Sherlock Holmes encounters ciphers three times in his uniquely distinguished career, demonstrating his thorough knowledge of the subject in The Adventure of the Dancing Men, where he recognizes little stick figures as cipher symbols.7 Jules Verne heightened the excitement of three of his novels with the mysteries of secret writing.8

The amazing ability to break a seemingly unintelligible cipher has always appeared mystical to the uninitiated. It undoubtedly was a major source of power to the priesthoods of the ancient empires.

It was not surprising that the famed American coup over the Japanese naval codes in World War II was called “MAGIC.”9

The art of encryption has its roots in manipulations of the Biblical text-including the Kabbalah of Jewish mysticism. It was these techniques which led to cipher wheels and mechanical aids, which ultimately led to the computer.

It seems fitting that it is now the computer which appears to be opening up secrets hidden within the Biblical text since its inception.

Encryptions in the Bible

It comes as a surprise to many Bible scholars that there are a number of classic encryptions within the Biblical text. Hebrew tradition lists three different transformations in the Old Testament.

One of these, known as albam, employs a substitution system in which the Hebrew alphabet is split into two halves and equates the two halves. Thus, the first letter of the first half, aleph, substitutes for the first letter of the second half, lamed, and vice versa. The second letter of the first half, beth, substitutes for the second letter of the second half, mem, and vice versa, and so on. The term albam derives from the first four letters of this arrangement; aleph-lamed & beth-mem.

a b g d h w z ch t y k

l m n s ‘ p ts q r sh t

Figure 1. Albam

In Isaiah Chapter 7, we encounter the scheming of Rezin, the king of Syria, and Pekah, the son of Remaliah, king of Israel, who were confederating against King Ahaz of Judah.

Regarding verse 6, the Midrash notes that Tabeal, t b’ l is encrypted using the method of albam, resulting in the name, r m l – Remala (for Remaliah).10

(Remember, Hebrew reads from right to left. All languages seem to flow toward Jerusalem: Languages of the nations west of Jerusalem-English, French, German, Italian, etc.-read from left to right. Languages of the nations east of Jerusalem-Hebrew, Aramaic, Arabic, Chinese, etc.-read from right to left.)

The plan of the conspirators in Isaiah 7 was apparently to establish the son of Tabeal as the king should their plot have succeeded.11

Another alternative encryption form found in the Old Testament is atbash, in which the alphabet is folded back over itself, with the second half reversed, as in figure 2.

a b g d h w z ch t y k

t sh r q ts p ‘ s n m l

Figure 2. Atbash

The label atbash derives from the very procedure it denotes, since it is composed of aleph, tau, beth, and shin-the first, last, second, and next-to-last letters of the Hebrew alphabet.

In Jeremiah 25:26 and in Jeremiah 51:41, we encounter the name Sheshach. The context implies that this is somehow related to Babylon, and some commentators assume it was a suburb, or the equivalent.

However, it appears that Sheshach, sh sh k, is simply Babel, b b l, encrypted using the method of atbash.12

Confirmation that Sheshach is really a substitute for Babel and not an entirely separate place name also comes from the Septuagint and the Targums.

In Jeremiah 51:1, we also find l b q m i, leb kamai, “heart of my enemy,” is substituted for k sh d i m- Kashdim, “Chaldeans.”

Hebrew literature records a third form of letter substitution, called atbah. Like albam and atbash, its name derives from its system. It is based on the property that each Hebrew letter also has a numerical value. The first nine letters would be substituted so that their numerical value would add up to ten. The next ten letters were paired on a similar system, totaling to the Hebrew digital version of 100. What happens to the remaining letters is not clear. This rather confusing system is not used in the Bible, but there is at least one use in the Babylonian Talmud.13

To students of cryptography, the substitution ciphers in the Bible are all simply historical novelties. However, to one who recognizes the supernatural origins of the Biblical text, the presence of encrypted elements in the Holy Scriptures is extremely provocative, indeed.

In our next article we will explore some of the more significant “Bible Codes.” In our forthcoming reviews we will focus primarily on those codes which you do not need a computer to figure out!

* * *

This series of articles is being excerpted from Chuck Missler’s forthcoming book, Cosmic Codes, scheduled for publication in Spring 1998.

This article was originally published in the 
January 1998 Personal Update News Journal.

Sign up here to receive our free email vesion of Personal Update

Or sign up here to receive the newsletter version.


  1. Michael Drosnin, The Bible Code, Simon and Schuster, NY, 1997.
  2. Ronald S. Hendel and Shlomo Sternberg, “The Bible Code-Cracked and Crumbling,” Bible Review, Vol XIII, No. 4, August 1997; includes “The Secret Code Hoax,” by Hendel, and “Snake Oil For Sale,” by Sternberg. Hugh Ross, “Cracking the Codes,” Facts & Faith, Vol 11, No. 3, 3rd Qtr 1997, Reasons to Believe, P.O. Box 5978, Pasadena, CA.
  3. Grant Jeffrey, The Handwriting of God, a sequel to his Signature of God, both published by Frontier Research, Toronto, Canada, 1997; also, Yakov Rambsel, His Name is Jesus, also published by the same publisher.
  4. A worthy exception is by Jeffrey Satinover, M.D., Cracking the Bible Codes, William Morrow & Company, New York, 1997.
  5. Much of this background is well covered in David Kahn’s comprehensive history, The Codebreakers, Macmillan Company, NY, 1967.
  6. Poe’s stories, employing an intellectual chain of logic to solve a central problem, resulted in their being regarded as the first detective stories. The Gold Bug remains a classic despite its being full of absurdities and errors: the survival of the parchment despite the decay of the timbers of the boat; the fact that the invisible ink-cobalt nitrate-would also be soluble in water; the intricate geometry between the skull sighted between the rift in the trees after 150 years of arboreal growth, etc. Still, it remains a classic.
  7. Holmes, having solved the cryptogram, composes a message out of the cipher symbols he has recovered that leads to the culprit’s arrest. Holmes may have borrowed this scheme from Thomas Phelippes, who had in 1587 forged a cipher postscript to a letter of Mary, Queen of Scots, to learn the names of the intended murderers in the Babington plot against Elizabeth. Holmes’ other encounters occur in The Gloria Scott, where the great detective discovers a secret message hidden within an open-code text as every third word; and in The Valley of Fear where he receives a numerical code message from an accomplice of his arch rival, Professor Moriarty.
  8. In Voyage to the Center of the Earth, Verne opens with a three-step cryptogram of runic letters.
  9. It is interesting that the very word Magic derives from the Persian Magi, and the first cryptanalyst who was appointed the head of the ancient priesthood. This will be explored in a subsequent article.
  10. Midrash Rabbah, Numbers 18:21.
  11. Some authorities regard Tabeal as a corruption or some form of contemptuous epithet and dispute this as albam. (Albam works for the first two letters; the third, lamed, retains its identity because it would otherwise be transformed into a silent aleph.)
  12. The kaf, k, is one of five letters with a modified form if it is the last letter in a word. The employment of unique “final forms” is a characteristic which yields parsing advantages when used in extraterrestrial communication. This and related characteristics will be addressed in subsequent articles.
  13. Seder Mo’ed, Sukkah, 52b. This example plays on the word “witness” and its atbah substitution “master” to make a moral point.

 

K-House Publications

Personal Update, eNews, and more…

Visit the Koinonia  House Online Store

Shop Now →

Featured Product

New Testament DVD Collection cover art

New Testament DVD Collection

“The Old Testament is in the New Testament revealed.” A wealth of perspective and understanding at your fingertips. This is a perfect study tool for the serious Bible student. This comprehensive verse-by-verse collection will provide hours of uplifting and transforming Bible study and insights.

Buy Now →

 

 

Privacy Police


Copyright © 1996-2018 by Koinonia House Inc., P.O. Box D, Coeur d’Alene, ID 83816


Copyright © 1996-2018 by Koinonia House Inc., P.O. Box D, Coeur d’Alene, ID 83816

Joy And Pain

Hi,

I did not post anything since we adopted our puppy.

He is a joy and I named him tiny

He is so so skinny and needs to put on a couple of pounds on his little body.

He is a small treasure an truly needed new friend.

We are potty training him now,  lol.

I still hurt for the loss of Belle and Teyla but I will give all I can to this puppy.

He is truly small, 4 pounds and will not get any bigger than 6.

H was so sad looking in the shelter, pushing his little face against the metal of the small cage.

At first, I was told he was already adopted t. They called the people interested and they ran to the Humane Society  Shelter in 10 minutes. I was upset and said a prayer because he was the only puppy they had. Perfect for me.

The people came, they went in the room where people plays with the dogs and cats, and, THANK YOU, GOD!! changed their mind.

I need not even say, It was the Hand Of God.

I have been sad since I lost my 2 friends in 6 weeks and have an empty spot in my heart.

I know with a little time I will love Tiny differently but truly. I will never forget the 4 friends I had in my lifetime.

Lupo, a mix of wolf and German shepherd I was told.

My Lupa, the love of my life, a German Sheperd, Tia, and Belle my other loving friends. Tia and Belle, both Maltese Breed. Tiny is a Schnauzer and Yorkshire Terrier mix. We used to call them Muts, now they are designer dogs lol. They breed them intentionally like that, They cost up to 1.400 dollars and even in the Shelter they charge us about 300.

I think dogs are in many cases better than some people that hurt and betray other human beings. Dogs give their lives for they owners, their friends.

Even Here God IS present and heard as very often does, my prayers. He knows all of me and spoils me a lot.

We certainly do not by ANY standard, wealthy, as are millions of others, we are,  paycheck to paycheck but, God always s provides more then we need.