Beale Codes: Solving an Unsolvable Code?

Between 1819 and 1821, Thomas Beale buried a giant treasure in Virginia. It has never been found. The key to its location lies in one of the most mysterious codes in history…the Beale Codes. But how does one go about solving an unsolvable cipher?

The Mysterious Beale Treasure?

Last Friday, I posted the first story in a short series about the mysterious Beale Treasure. On Monday, I posted the second installment. Yesterday, I discussed whether the Beale Codes are real or a giant hoax. To recap, Thomas Beale and thirty other people excavated a massive treasure between 1819 and 1821. They reburied it in Virginia’s Blue Ridge Mountains. Then Beale created three ciphers now known as the Beale Codes.

“The Beale Ciphers were three codes which would enable one to locate the treasure and distribute it to the rightful heirs in the event that the group didn’t survive. The first Beale Cipher revealed the location of the vault. The second Beale Cipher described the contents of the vault. And the third Beale Cipher provided names and residences of the group members as well as their heirs.” ~ David Meyer, Beale Ciphers: A Lost Treasure?

Only one of the Beale Codes – the second one – has ever been decoded. It revealed the exact contents of the treasure.

“I have deposited in the county of Bedford, about four miles from Buford’s, in an excavation or vault, six feet below the surface of the ground, the following articles, belonging jointly to the parties whose names are given in number three, herewith: The first deposit consisted of ten hundred and fourteen pounds of gold, and thirty-eight hundred and twelve pounds of silver, deposited Nov. eighteen nineteen. The second was made Dec. eighteen twenty-one, and consisted of nineteen hundred and seven pounds of gold, and twelve hundred and eighty-eight of silver; also jewels, obtained in St. Louis in exchange for silver to save transportation, and valued at thirteen thousand dollars. The above is securely packed in iron pots, with iron covers. The vault is roughly lined with stone, and the vessels rest on solid stone, and are covered with others. Paper number one describes the exact locality of the vault, so that no difficulty will be had in finding it.” ~ Thomas Jefferson Beale, Decoded Version of Beale Cipher #2

Solving Beale Code #2?

Beale Code #2 is a book code. The “book” is the U.S. Declaration of Independence. In order to solve it, you take each number from the code and compare it to the relevant word in the document. Then you take the first letter from that word. So, the first number is 115. The 115th word in the Declaration of Independence is “instituted.” And the first letter in “instituted” is i. Below, you can see Beale Code #2 for yourself, as presented in The Beale Papers, Containing Authentic Statements Regarding the Treasure Buried in 1819 and 1821, Near Bufords, in Bedford County, Virginia, and which has Never Been Recovered:

This code was supposedly solved by a “friend” of Robert Morriss. The friend claimed to have stumbled upon the solution. I’ve always considered this one of the hardest parts of the Beale story to swallow. Without the key, a book cipher would’ve been pretty much impossible to solve at the time. Oh yeah, and the Declaration used to encode Beale Cipher #2 contains numerous mistakes. And yet, the friend was still able to figure out those mistakes. So, either the entire thing is a scam or the friend was using a similar version of the Declaration (actually, that second option isn’t impossible to believe…flaws abound in early reprintings of the Declaration).

Solving the Unsolvable Ciphers?

Assuming the Beale Codes are real, it stands to reason the remaining ciphers are encoded like Beale Code #2. That means there are two ways to solve them. First, a budding treasure hunter could search for the right key. This would involve seeking out texts of the time period and comparing them to the ciphers. One interesting idea presented by Tim Haydock in his book, Treasure Trove, plays off the fact that Beale’s full name was Thomas Jefferson Beale. Beale Code #2 was encoded with the Declaration of Independence, which is usually associated with Jefferson. So, Beale Code #1 might correspond to someone named Thomas (perhaps Thomas Paine). Beale Code #3 would then be deciphered with something having to do with the name Beale. An alternative suggestion is that all three documents might link to works published by Thomas Jefferson.

The second approach is to employ computers in a brute force attack. I believe this has been done in the past, but I’d be curious to know what modern computers could do with it.

Guerrilla Explorer’s Analysis

Before you run off searching for old books, there are two things you should know. First, some scholars think the Beale Codes story is nothing more than a Masonic allegory.

Actually, of course, Beale and his treasure are illusory-merely part of an allegory meant to evoke the anticipated Masonic “discovery of the secret vault and the inestimable treasures, with the long-lost word” (as expressed in the Royal Arch degree). The contrast between the futile quest for gold and that for more spiritual wealth are didactically expressed in the allegory.” ~ Joe Nickell, Mysterious Realms: Probing Paranormal, Historical, and Forensic Enigmas

And second, in 1980 Jim Gillogly used the same Declaration of Independence in an attempt to decipher Beale Code #1. This resulted in some curious strings of letters such as AAA, TTTTT, and most interesting, ABFDEFGHIIJKLMMNOHPP. Gillogly concluded that Beale Code #1 was fake, created by randomly selecting words out of the Declaration that, at least in part, formed the alphabet. On the other hand, this could indicate a two-stage code. In other words, the alphabetic sequence might line up with a keystring. Regardless, it seems almost certain at this point that the Declaration of Independence was used in some manner to create Beale Code #1.

Beale Treasure: Real…or a Giant Hoax?

Between 1819 and 1821, Thomas Beale buried a giant treasure in Virginia. The Beale Treasure has never been found. The key to its location lies in one of the most mysterious codes in history…the Beale Ciphers. But is the Beale Treasure even real? Or is it a giant hoax?

The Mysterious Beale Treasure?

Last Friday, I posted the first story in a short series about the mysterious Beale Treasure. Yesterday, I posted the second installment. To recap, Thomas Beale and thirty other people excavated a massive treasure between 1819 and 1821. They reburied it in Virginia’s Blue Ridge Mountains. Then Beale created three ciphers now known as the Beale Ciphers.

“The Beale Ciphers were three codes which would enable one to locate the treasure and distribute it to the rightful heirs in the event that the group didn’t survive. The first Beale Cipher revealed the location of the vault. The second Beale Cipher described the contents of the vault. And the third Beale Cipher provided names and residences of the group members as well as their heirs.” ~ David Meyer, Beale Ciphers: A Lost Treasure?

Only one of the ciphers – the second one – has ever been decoded. It revealed the exact contents of the treasure.

“I have deposited in the county of Bedford, about four miles from Buford’s, in an excavation or vault, six feet below the surface of the ground, the following articles, belonging jointly to the parties whose names are given in number three, herewith: The first deposit consisted of ten hundred and fourteen pounds of gold, and thirty-eight hundred and twelve pounds of silver, deposited Nov. eighteen nineteen. The second was made Dec. eighteen twenty-one, and consisted of nineteen hundred and seven pounds of gold, and twelve hundred and eighty-eight of silver; also jewels, obtained in St. Louis in exchange for silver to save transportation, and valued at thirteen thousand dollars. The above is securely packed in iron pots, with iron covers. The vault is roughly lined with stone, and the vessels rest on solid stone, and are covered with others. Paper number one describes the exact locality of the vault, so that no difficulty will be had in finding it.” ~ Thomas Jefferson Beale, Decoded Version of Beale Cipher #2

Is the Beale Treasure Real…or a Giant Hoax?

The remaining ciphers constitute two of the most famous unsolved codes in history. Many people find this suspicious. After all, high-speed computers and advances in code-breaking have enabled easy decryption of once unsolvable codes. That being said, numerous cryptographers have studied the remaining ciphers and concluded that the sequences of numbers appear non-random.

The story behind the Beale Treasure is problematic. Why would Beale and his companions dig up a giant treasure only to hide it somewhere else? Why didn’t they split it up and go on spending sprees instead? Why would they haul it out to Virginia if they intended to stay out west? And why would they entrust the secret to a man they barely knew – and thus further divide the Beale Treasure – rather than to one (or all) of the heirs?

Other problems abound. The second cipher – a description of the Beale Treasure – seems entirely unnecessary. And the third cipher – which provides the names and addresses of the heirs – seems entirely too short. It’s 618 characters long. Assuming it’s encoded like Beale Cipher #2 (one number is equivalent to one letter), each heir gets about twenty characters. That doesn’t leave much room for a full-blown address. For example, “Thomas Beale, Lynchburg,” runs twenty characters by itself. On the other hand, it is possible some of the heirs shared an address.

Also, some of the words used in Beale’s letters don’t seem to make sense. According to Joe Nickell, the words, “stampeding,” “improvised,” and “appliances” did not appear in print until decades after Beale’s letters were supposedly written. This would seem to indicate the letters were written at a later date or someone edited them along the way. There is also some evidence to suggest that the person who wrote Beale Cipher #2 also wrote the pamphlet that revealed the story to the public (The Beale Papers, Containing Authentic Statements Regarding the Treasure Buried in 1819 and 1821, Near Bufords, in Bedford County, Virginia, and which has Never Been Recovered).

Guerrilla Explorer’s Analysis

The Beale Treasure suffer from the same problem as so many other legendary lost treasures…lack of falsifiability. There is simply no way to disprove the story. And there is no way to prove it either. Undoubtedly, Beale researchers will continue to study the codes, searching for a breakthrough. It may come someday. Or it may not.

That’s it for today. Tomorrow, we’ll take a look at some possible ways to approach the Beale Ciphers from a treasure hunting perspective. See you then!

Beale Ciphers #2: A Massive Treasure Revealed?

Between 1819 and 1821, Thomas Beale buried a gigantic treasure in Virginia. It’s never been found. In order to locate it, one must first decipher one of the most mysterious codes in history…the Beale Ciphers.

The Mysterious Beale Ciphers?

On Friday, I posted the first story in a short series about the mysterious Beale Ciphers. To recap, Thomas Beale and thirty other people excavated a massive treasure between 1819 and 1821. They reburied this treasure in Virginia’s Blue Ridge Mountains. Then Beale created a series of ciphers to make sure the treasure could be located in the event he and his group were killed.

“The Beale Ciphers were three codes which would enable one to locate the treasure and distribute it to the rightful heirs in the event that the group didn’t survive. The first Beale Cipher revealed the location of the vault. The second Beale Cipher described the contents of the vault. And the third Beale Cipher provided names and residences of the group members as well as their heirs.” ~ David Meyer, Beale Ciphers: A Lost Treasure?

In 1822, Beale locked the Beale Ciphers, along with two letters, in an iron box. He gave the box to Robert Morriss, a Virginia-based innkeeper, for safekeeping. Morriss placed it in a safe and proceeded to forget about it.

A few months later, Morriss received a letter from Beale. It was dated May 9, 1822. Beale claimed to be en route to the Great Plains on a two-year hunting trip. He told Morriss that the box contained papers that would “be unintelligible without the aid of a key…” He asked Morriss to keep the box for ten years. If no one came for it by then, Morriss was to assume Beale and the rest of his party was dead. He was then supposed to open the box and use a key (which would somehow be mailed in June 1832) to decipher the papers.

Morriss never heard from Beale again.

The Beale Ciphers…Deciphered?

June 1832 came and went. Morriss continued to wait and didn’t open the box until 1845. Inside, he found two letters, detailing the story of the Beale treasure. He also found three papers, covered with seemingly random numbers. In his letters, Beale asked Morriss to find the treasure and distribute it to thirty beneficiaries. For his efforts, Morriss would be entitled to an equal share of the treasure. Unfortunately, Morriss had never received the promised key. He was unable to decipher the codes and thus, the treasure remained lost.

In 1862, Morriss passed the Beale Ciphers to a friend (possibly James B. Ward). If he was able to locate the treasure, the friend would receive one-half of Morriss’ share. The friend believed the code was a standard key-code, with each number standing for a separate letter or word. For the next twenty years, the friend worked on the Beale Ciphers, comparing them to various documents. Eventually, he came upon a solution.

The friend compared the second Beale Cipher to the Declaration of Independence. Each number corresponded to a word in the document. The friend took the first letter of each word and came up with the following:

“I have deposited in the county of Bedford, about four miles from Buford’s, in an excavation or vault, six feet below the surface of the ground, the following articles, belonging jointly to the parties whose names are given in number three, herewith: The first deposit consisted of ten hundred and fourteen pounds of gold, and thirty-eight hundred and twelve pounds of silver, deposited Nov. eighteen nineteen. The second was made Dec. eighteen twenty-one, and consisted of nineteen hundred and seven pounds of gold, and twelve hundred and eighty-eight of silver; also jewels, obtained in St. Louis in exchange for silver to save transportation, and valued at thirteen thousand dollars. The above is securely packed in iron pots, with iron covers. The vault is roughly lined with stone, and the vessels rest on solid stone, and are covered with others. Paper number one describes the exact locality of the vault, so that no difficulty will be had in finding it.” ~ Thomas Jefferson Beale, Decoded Version of Beale Cipher #2

In a cruel twist of fate, the friend now knew the sheer size of the treasure but not the exact location. He returned to the remaining codes with a renewed spirit. Unfortunately, he never managed to decode either of the other two Beale Ciphers. In 1885, the friend finally gave up. He proceeded to publish the whole story as a pamphlet entitled, The Beale Papers, Containing Authentic Statements Regarding the Treasure Buried in 1819 and 1821, Near Bufords, in Bedford County, Virginia, and which has Never Been Recovered.

Guerrilla Explorer’s Analysis

That’s it for today. Tomorrow, we’ll take a closer look at the Beale Ciphers themselves. See you then!

Beale Ciphers: A Lost Treasure?

Between 1819 and 1821, Thomas Beale buried a whopping 2,921 pounds of gold and 5,100 pounds of silver in Virginia. It’s still there, waiting for someone to dig up. But there’s a catch. In order to find it, one must first decipher one of the most mysterious codes in history…the Beale Ciphers.

The Treasure Trove of Thomas Beale

In 1817, a man named Thomas Beale led thirty Virginians on a western hunting trip. They left St. Louis in May and arrived at Santa Fe in December. After several months of little activity, a few members of the group embarked on an excursion. Several weeks later, they sent word that they had discovered gold in a ravine, 250 to 300 miles north of Santa Fe. Immediately, Beale set forth to examine the site and found a large cache of gold and silver.

The group worked the ravine for 18 months, gathering a large quantity of gold and silver in the process. Afterward, they decided to transport the treasure to a cave “near Buford’s tavern in the county of Bedford.” After a long journey, part of Beale’s group arrived in Bedford. Unfortunately, the cave in question was being used by others. So, Beale’s group dug a vault in the Blue Ridge Mountains and buried the treasure. Beale later returned to the ravine, gathered more treasure, and proceeded to deposit it in the vault.

The Beale Ciphers?

The treasure was to be split into thirty shares, one for each member of the group. However, the group faced a problem. They didn’t want anyone to know about the treasure. At the same time, members were still actively hunting and prospecting at the ravine. As such, they were worried about Indian attacks and outlaws. If they were killed in a raid, no one would ever know about the treasure or who had rightful claim to it.

So, Beale created the Beale Ciphers. The Beale Ciphers were three codes which would enable one to locate the treasure and distribute it to the rightful heirs in the event that the group didn’t survive. The first Beale Cipher revealed the location of the vault. The second Beale Cipher described the contents of the vault. And the third Beale Cipher provided names and residences of the group members as well as their heirs. In a letter, Beale stated that the Beale Ciphers would “be unintelligible without the key…”

Guerrilla Explorer’s Analysis

The full story of the Beale Ciphers is long and complicated. So, it’ll take me a few days to go through it. Tomorrow, we’ll look into what Beale did with those ciphers and how they became public knowledge. Stay tuned…the best is yet to come!

The Mysterious Voynich Manuscript?

In 1912, antique book dealer Wilfrid M. Voynich purchased a strange unreadable manuscript near Rome. Despite a century of efforts, it has defied all code-breaking attempts. What is the Voynich Manuscript?

The Mysterious Voynich Manuscript?

At this very moment, a conference is underway in Rome, a sort of 100-year celebration of Voynich’s purchase. Various experts will hold presentations with such topics as:

  • Forensic investigations of the Voynich MS
  • Voynichese word structure and statistics
  • Statistical Properties of the Voynich Manuscript Text – How Can we Make Sense of Contradicting Results?

So, what do we know about the Voynich Manuscript? Well, not very much as it turns out. Its author is unknown. It has been carbon-dated with 95% accuracy to 1404-1438, making it ~600 years old. The earliest known owner is believed to be Emperor Rudolf II (1552 to 1612). It contains about 240 pages, many of which are filled with drawings of unidentified plants, astrological diagrams, and images of strange women bathing in basins that are connected to each other with elaborate pipe networks (see the picture above).

The text itself remains a complete mystery. The Voynich Manuscript was written from left to right and appears to lack punctuation. The exact alphabet used is unknown. However, 20-30 letters would account for almost all of the text. Unfortunately, all attempts to map these letters on to existing languages have fallen short. Many scholars have put forth possible explanations for the mysterious text, ranging from unknown dialects to some form of code. But no one knows for certain.

Guerrilla Explorer’s Analysis

All this begs the question, is the Voynich Manuscript even authentic? Over the past few decades, numerous scholars have speculated it’s actually some kind of ancient hoax. However, if it’s a hoax, it’s one of epic proportions. The Voynich Manuscript is incredibly complex with many subtle characteristics.

At this point, we must conclude our knowledge of the Voynich Manuscript is slim and driven more by what we don’t know than what we do. Still, researchers continue to study it, looking for that elusive breakthrough. Maybe one day soon, someone will crack the text and at last, we’ll be able to learn the tome’s true secrets.

The Pearl Harbor Code?

Seventy years ago, the Japanese Navy launched an attack on Pearl Harbor. The vicious assault killed over 2,000 people, damaged some 300 planes, and crippled 18 vessels. In the aftermath, FBI Agents conducted a secret raid on the New Yorker magazine’s offices. They were searching for clues related to a code…a code which may have been used to alert Japanese spies to the attack. What was the Pearl Harbor Code?

The Deadly Double & Pearl Harbor?

Sixteen days before the Pearl Harbor attack, a “teaser advertisement” appeared in the New Yorker. The text read “Achtung! Warning! Alerte!” Underneath, readers were encouraged to “See Advertisement Page 86.” The ad also contained two dice and was apparently placed by a company named Monarch Publishing Co. A second advertisement ran on page 86. It contained a strange picture of people playing dice in an air-raid shelter, repeated the “Achtung! Warning! Alerte!” text, and referred to a game called “The Deadly Double.”

After Pearl Harbor, American civilians became extra-vigilant about foreign spies and saboteurs. Thousands of rumors and tips flooded into FBI Headquarters. One of the most prominent tips was in regard to “The Deadly Double” advertisement. Hundreds of readers suspected it was a coded message, designed to alert Japanese and Nazi spies about the upcoming attack.

Was the Deadly Double a Coded Message about the Pearl Harbor Attack?

According to John Costello’s The Pacific War: 1941-1945, the numbers on the dice might have meant “0” hour for a “double cross” on “12”/”7″ at “5” out of “24” hours. Another interpretation comes from the 1982 Reader’s Digest book, Mysteries of the Unexplained. That work concluded that the numbers 12 and 7 refer to December 7. 5 and 0 were suspected to be the planned time of the attack. XX, or 20 in Roman Numerals, was the approximate latitude for Pearl Harbor. The purpose of the number 24 was unknown (although possibly some sort of code designation).

On the Page 86 ad, the top part of the drawing was viewed as a depiction of three airplanes flying over Pearl Harbor, complete with searchlight beams, antiaircraft shells, and even an exploding bomb on the surface of the water. “The Deadly Double” was believed to stand for two of the Axis Powers, namely Germany and Japan. And finally, the double-headed eagle at the bottom of the ad appeared to be a combination of the two versions of the Nazi’s Iron Eagles.

Guerrilla Explorer’s Analysis

So, was the Pearl Harbor Code a real attempt to warn Japanese and Nazi spies about Pearl Harbor? Or was it just a coincidence? According to Reader’s Digest, the advertisement turned out to be legitimate. The ads were supposedly placed by a Mr. and Mrs. Roger Craig. The investigation of the Craig family was kept under wraps until 1967 when Ladislas Farago broke the story prior to the release of his book, The Broken Seal. At the time, Craig’s widow was said to have stated that any connection between the ad and the attack was nothing more than a coincidence.

However, that’s just one side of the story. According to William F. Breuer’s book Unexplained Mysteries of World War II

“FBI agents discovered that the advertisement had been placed by the Monarch Trading Company (a dummy corporation). A white male, who had not given his name, had brought the plates for the ad to the New Yorker offices and had paid in cash. He had not given his address. Curiously, the man the FBI would identify as the suspect apparently met a sudden, violent death a few weeks later.”

Which story is correct? Did the FBI truly get to the bottom of the incident? If so, was the Code just a big coincidence? Or was it something more? Unfortunately, the available evidence is contradictory. So, until more information comes to light, the Pearl Harbor Code will remain one of the great unsolved mysteries of World War II.

The Edgar Allan Poe Code?

Edgar Allan Poe is one of America’s best known writers. He was well-known for his heart-rending mysteries and is considered the inventor of the detective novel. But Poe is known for something else…two ciphers that eluded all efforts to solve them for over 150 years. What was the Poe Code?

Edgar Allan Poe’s Cryptographic Challenge

During the mid-1800s, the practice of cryptography was held in high esteem and code-breakers were praised for their abilities. In December 1839, Edgar Allan Poe began publishing a “cryptographic challenge” in the Philadelphia-based Alexander’s Weekly Messenger. In a series of articles, he challenged his readers to stump him with their ciphers. And over a six month period, he published solutions to all of the ciphers as well as sharing much of his knowledge on cryptography.

A year or so after his series ended, he went to the pages of Graham’s Magazine to publish one last article on the subject. In A Few Words on Secret Writing, Poe included two cryptographs supposedly sent to him by a “gentleman whose abilities we highly respect” named W.B. Tyler. Poe went on to claim that he didn’t have time to solve these last two ciphers but that his readers should give them a shot. Apparently, they remained unsolved for over a century.

Breaking Edgar Allan Poe’s Code?

In 1985, Professor Louis Renza came across the ciphers and proposed that W.B. Tyler was none other than Poe himself. This theory grew in prominence when Shawn Rosenheim added some circumstantial evidence in The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet.

In 1992, Professor Terence Whalen solved the first of the mysterious ciphers. After decoding the mono-alphabetic substitution code, he discovered the following message:

“The soul secure in her existence smiles at the drawn dagger and defies its point. The stars shall fade away, the sun himself grow dim with age and nature sink in years, but thou shall flourish in immortal youth, unhurt amid the war of elements, the wreck of matter and the crush of worlds.”

Much to his disappointment, the passage could not be claimed as original to Poe. Instead, it was traced to Joseph Addison’s 1713 play Cato. In order to solve the second cipher, Rosenheim created the “Edgar Allan Poe Cryptographic Challenge” and offered $2,500 to the first person to decode the cipher.

“The contest was an avenue of last resort. Because the second cipher uses six separate alphabets to encode its text, it’s several orders of magnitude harder than the first. I tried to solve it myself and failed. I also sent it to various cryptographers, from the editor of The Cryptogram magazine to professionals at Bell Labs, but no one was able to help me.” ~ Shawn Rosenheim

In July 2000, the contest came to an end when Gil Bronza submitted the correct answer. It turned out that the cipher was a poly-alphabetic substitution cipher and contained “over two dozen mistakes.” And what was the answer to this masterful, albeit flawed puzzle?

“It was early spring, warm and sultry glowed the afternoon. The very breezes seemed to share the delicious langour of universal nature, are laden the various and mingled perfumes of the rose and the –essaerne (?), the woodbine and its wildflower. They slowly wafted their fragrant offering to the open window where sat the lovers. The ardent sun shoot fell upon her blushing face and its gentle beauty was more like the creation of romance or the fair inspiration of a dream than the actual reality on earth. Tenderly her lover gazed upon her as the clusterous ringlets were edged (?) by amorous and sportive zephyrs and when he perceived (?) the rude intrusion of the sunlight he sprang to draw the curtain but softly she stayed him. ‘No, no, dear Charles,’ she softly said, ‘much rather you’ld I have a little sun than no air at all.'”

Guerrilla Explorer’s Analysis

Strange…very strange indeed. So, who wrote the cipher? And what does it mean? Rosenheim believes that the cipher was still written by Poe but admits that “the text is clearly not by Poe, but from some unidentified novel or story of the period.”

We may never know for sure whether or not Poe encoded the two ciphers and published them under the name of W.B. Tyler. And at the end of the day, that’s probably the way Poe would’ve preferred it.

“Ye who read are still among the living; but I who write shall have long since gone my way into the region of shadows. For indeed strange things shall happen, and secret things be known, and many centuries shall pass away, ere these memorials be seen of men. And, when seen, there will be some to disbelieve, and some to doubt, and yet a few who will find much to ponder upon in the characters here graven with a stylus of iron.” ~ Edgar Allan Poe, Shadow – A Parable

The Secret of Kryptos?

In 1990, a strange sculpture known as Kryptos appeared in the courtyard outside CIA Headquarters in Langley, Virginia. It consisted of a wavy copper screen covered with 1,732 letters, 4 question marks, and 2 spaces. These characters represent four encoded messages, one of which remains unsolved to this day. What is this famous code that’s stumped the intelligence community’s finest minds for over two decades?

What is Kryptos?

Kryptos was commissioned in 1988 and created by artist James Sanborn in 1990. It encompasses numerous sculptures. The wavy copper screen depicted above is by far the most famous of these pieces.

The screen contains four separate encoded messages, which were developed by Sanborn, and Ed Scheidt, former Chairman of the CIA Cryptographic Center. These messages combine to form a riddle within a riddle which can only be solved by one who’s physically in the courtyard (which unfortunately is closed off to civilians).

“In part of the code that’s been deciphered, I refer to an act that took place when I was at the agency and a location that’s on the ground of the agency. So in order to find that place, you have to decipher the piece and then go to the agency and find that place.” ~ James Sanborn

To date, three of the four messages have been cracked. Details are below:

Kryptos Message #1: K1

  • Notes: This is a modified Vigenère cipher where the alphabet key is “kryptos” and the passphrase is “palimpsest” (using this transcript, you can solve it yourself here). Some think the strange and deliberate misspelling at the end (iqlusion) might be a clue to K4.
  • Decoded Message: “Between subtle shading and the absence of light lies the nuance of iqlusion.”

Kryptos Message #2: K2

  • Notes: Same as above but with a passphrase of “abscissa.” On April 19, 2006, Sanborn announced this particular section contained an error. The corrected version is given below. It appears to point to something being buried and the coordinates point to a location 150 feet southeast of the sculpture. Also, there is another strange misspelling – “undergruund.”
  • Decoded Message: “It was totally invisible. How’s that possible? They used the earth’s magnetic field. x The information was gathered and transmitted undergruund to an unknown location. x Does Langley know about this? They should: it’s buried out there somewhere. x Who knows the exact location? Only WW. This was his last message: x Thirty-eight degrees fifty-seven minutes six point five seconds North, seventy-seven degrees eight minutes forty-four seconds West. X Layer two.”

Kryptos Message #3: K3

  • Notes: This section uses a far more complicated coding technique, namely transposition. The text appears to describe Howard Carter’s opening of Pharaoh Tutankhamun’s tomb in 1922. The question at the end was asked by Lord Carnarvon. Depending on the source, Carter answered with either “Wonderful things” or “Yes, it is wonderful.” There is yet another misspelling (“desparatly”) and the last sentence contains a strangely-placed “q.”
  • Decoded Message: “Slowly, desparatly slowly, the remains of passage debris that encumbered the lower part of the doorway was removed. With trembling hands I made a tiny breach in the upper left-hand corner. And then, widening the hole a little, I inserted the candle and peered in. The hot air escaping from the chamber caused the flame to flicker, but presently details of the room within emerged from the mist. x Can you see anything q?”

Kryptos Message #4: K4

  • Notes: This section, which consists of 97 characters, remains unsolved. The correct solution requires that the first three sections be properly decoded. Sanborn has hinted that “the plaintext itself is not standard English and would require a second level of cryptanalysis.” Other possible clues include the various misspellings as well as other nearby sculptures, some of which display messages in Morse code while another one depicts a compass rose. In November 2010, Sanborn revealed to the New York Times that when “NYPVTT” is deciphered, it reads “Berlin.”
  • Encoded Message: OBKR UOXOGHULBSOLIFBBWFLRVQQPRNGKSSO TWTQSJQSSEKZZWATJKLUDIAWINFBNYP VTTMZFPKWGDKZXTJCDIGKUHUAUEKCAR

Guerrilla Explorer’s Analysis

Kryptos is one of the most famous unsolved codes in history. It even played a role in Dan Brown’s The Lost Symbol. Go ahead and give it a shot…if you come up with an answer, you can submit it via Sanborn’s website. But be warned…the cipher has caused more than its fair share of sleepless nights.

Experts and amateurs alike have wrestled with the code of Kryptos for more than twenty years. Eventually, someone will crack K4. But don’t forget the coordinates in K2 and Sanborn’s comments about being physically within the courtyard. For all we know, the answer to K4 might not end the mystery of this strange encrypted sculpture…it might be the beginning of a whole new one.

The Last Secrets of World War I?

On April 19, 2011, the Central Intelligence Agency declassified six secret documents from 1917 and 1918. These were America’s oldest classified documents and believed to be the last of their kind from World War I. So, what great secrets could possibly require nearly a century of security? Political intrigue? Government conspiracy? Something even worse?

Secret Documents…from World War I?

Not in the least bit. According to the official press release, the secret documents, which you can find here, “describe secret writing techniques.” Or, to put it more plainly, they describe how to create invisible ink as well as “a method for opening sealed letters without detection.”

Have you ever wanted to secretly open an envelope, World War I-style? Well, here’s your opportunity.

“Mix 5 drams copper acetol arsenate. 3 ounces acetone and add 1 pint amyl alcohol (fusil-oil). Heat in water bath — steam rising will dissolve the sealing material of its mucilage, wax or oil.”

Oh, but don’t forget this part.

“Do not inhale fumes.”

Why all the Secrecy over Outdated Secret Documents?

I have to admit that the secret documents provide some interesting insights into the national security concerns of the time. One paper exposes Germany’s secret formula for invisible ink. Another one provides 50 ways for U.S. postal inspectors to detect invisible ink.

“The rule is to suspect or examine every possible thing. The war between the spy or forger and the expert is continually bringing out new methods.” ~ Theodore Kytka, Handwriting Expert

Still, I can’t help but wonder why the CIA chose to keep this material classified for nearly a hundred years. Recipes for invisible ink are easy to find and anyways, would any spy dare to use such an outdated technique?

According to the CIA, the answer is apparently yes. In 1999, “the agency rejected a Freedom of Information Act request to release the six documents, asserting that doing so ‘could be expected to damage the national security.'” A similar request was rejected in 2002.So, what changed? Well, a CIA spokeswoman claimed that “in recent years, the chemistry of making secret ink and the lighting used to detect it has greatly improved.”

“These documents remained classified for nearly a century until recent advancements in technology made it possible to release them. When historical information is no longer sensitive, we take seriously our responsibility to share it with the American people.” ~ Leon E. Panetta, CIA Director

Guerrilla Explorer’s Analysis

One of the secret documents revealed that America knew the secret to creating Germany’s invisible ink. I guess the German Empire will have to switch recipes going forward. Anyways, the CIA has long been considered one of the world’s most secretive organizations. From where I stand, the delayed release of these extremely outdated documents does nothing to change that reputation.

“Invisible ink was rendered obsolete by digital encryption long ago, not in the last few years. Director Panetta is attempting to rationalize the CIA’s irrational information policies, but there is no known basis for his claim.” ~ Steve Aftergood, The Federation for American Scientists

Well, I suppose we can be happy that these secret documents have finally been released. Now, we can move on to the next batch. What’s next on the list of oldest still-classified documents? Anyone?