Seventy years ago this weekend, a man’s body was found on Somerton Beach just south-west of Adelaide: our inability to identify this “Somerton Man” or even to reconstruct any significant part of his life has turned him into one of South Australia’s favourite cold cases. His unexplained death has inspired books, novels, TV documentaries and countless web pages and blog posts: behind this mini-industry is a panoply of breathless conspiracy theories, ranging from spurned suicidal lover to Russian rocket spy to inter-state car criminal (as if anyone would even consider such a thing, hrrmmmh).

On this day, though, I think it’s time to take a rest from that whole treadmill, and to look at the Somerton Man from a quite different angle.

History, Evidence, Disappointment

Cold cases are, almost definition, historical: so to “do history” on them, we need to select both historical evidence and a historical methodology / mindset.

But even though social historians love nothing more than diaries, journals, or even tax records of ordinary people, for the Somerton Man we only have what one might call tertiary social history evidence – incidental objects of low social signification such as cigarettes, laundry tags, chewing gum, combs, and (what I would categorise as) a fairly random assortment of men’s clothes. Can we read social history clues and cues to locate the Somerton Man in a social milieu? People have tried this trick, for sure: but I think it is fair to say that this has yielded very little of use.

Similarly, even though political historians tend to work from a more high-end (yet slim) frame of reference (from Chifley to Churchill), it hasn’t stopped researchers from trying to read the mysterious unreadable note attributed to the Somerton Man as implying some kind of espionage-centric back-story for him: a Russian spy scouting out South Australia’s uranium secrets, or defecting from some international conference. Yet the supposed ‘tradecraft’ evidence holding this aloft is something that I’ve never found any genuine substance to.

Finally, despite the South Australian police’s loss of almost all its evidence (Gerry Feltus had only a small folder of fragments to work with), hundreds of newspaper articles on Trove plus the detailed text of inquest reports have yielded a fine factual slurry for researchers to sieve and then rake over in search of That Single Golden Nugget Of Information That Turns Everything Upside Down. Yet even the massed eyeballs of the Internet’s army of DIY forensic historians – sometimes derided as armchair detectives, but who have actually managed to uncover all manner of interesting evidence – have struggled to gain any significant kind of purchase on the Somerton Man’s slippy upwards slopes. What was his profession? What was his nationality? Satisfactory answers remain out of reach for even such (apparently basic) questions as “if the Somerton Man wasn’t “T. Keane”, why did his suitcase have T. Keane’s tie and underwear?”

In short, none of the historical hats we have worn when we try to understand the Somerton Man seems to have had the (mythical) power of a Holmesian deerstalker: and is the game even afoot in the way many (most?) people think it really ought to be? The answer would seem to be that it is not.

As of December 2018, I don’t believe that we have any genuine idea who the Somerton Man was, or precisely why he died (i.e. mishap, murder, or suicide), or where he had come from, or even what he was doing in Adelaide at all. For all of these, we have well-stocked warehouses of might-possibly-have-beens, for sure: but this is a situation only someone wanting to weave and embellish a story around the scanty facts could be truly satisfied with. Anyone who wants to know what happened to lead up to the Somerton Man’s death is, for now, likely to be in a state of disappointment.

Random Clothes

Putting all that accumulated historical disappointment to one side, I actually think we are very close to being able to reconstruct a little about the Somerton Man’s life and times in a useful way: and even if the precise details remain murky (and may remain so for some time), I suspect that there’s still a lot we can now say.

For a start, his clothes were not from a single shop or town or even country (some were American, some were Australian): even his shoes and slippers were different sizes. Others may disagree, but I don’t think this sartorial randomness can be read as a sign of affluence or of taste, or even of implying he was on some kind of undercover operation. Rather, to my eyes it strongly indicates that he was just plain poor – his clothing has all the hallmarks of charity donations, of Seaman’s Missions, of gifts by charity’s hospital visitors.

From all this, I strongly suspect that he, like so many others in the years immediately following WW2, was a recent immigrant to the country (he had air mail stickers in his suitcase), and quite probably not a legal one (no official record of him could be found). Exactly where he originally came from I can’t say: I suspect that the faded tan on his legs may imply that he had earlier that year been working outdoors, perhaps riding horses on a farm. Remember that Paul Lawson stated:

On looking at the deceased legs I am of the opinion that he was used to wearing high heel riding boots. I form that opinion because the muscles of his legs were formed high up behind the knees, similar to the muscles of a woman who wears high heeled shoes. [Gerry Feltus, “The Unknown Man”, p.85.]

I should also note what John Burton Cleland wrote about the air mail stickers:

Air-mail stickers in suitcase – corresponded with some one at a distance – other State more likely than Britain (special air-mail letter forms usually used for latter).

All the same, my current suspicion is that he arrived by surreptitious means (e.g. using fake papers) in Australia around October 1948, perhaps from the United States, perhaps staying in New Zealand for a period of time (where the Rubaiyat seems to have come from) en route, and – like Charles Mikkelsen – was corresponding with one or more people there. But all of that remains just a guess.

The Known Man

Who was the Somerton Man? Apart from the nurse Jessica Harkness / Jo Thomson (who told her daughter that she knew who the Somerton Man was, but wouldn’t tell the police at the time or even Gerry Feltus decades after the event), not a single person has admitted to knowing who he was. Nobody at all! As for me, I don’t believe for a New York second that the Somerton Man somehow entered Australia and made his way to Somerton Beach to die without encountering en route a whole load of people – fifty to a hundred at a minimum – who would subsequently recognize him if they wanted to. And so I think that the title of Gerry Feltus’s book – “The Unknown Man” – belies what I think will prove to be a difficult truth to swallow about the Somerton Man: that a whole set of people knew who he was, but for broadly the same reason chose to say nothing.

The Italian word for this is omertà – a code of silence surrounding Mafia criminal activities, along with a shared, mutual refusal to give any evidence to the police. (Even former police.) Everyone knows what happens to squealers, even the KGB: even though the CIA says the story about captured double agent Pyotr Popov being thrown alive into a furnace isn’t actually true, it is very likely still presented as if it were true to GRU new recruits, to persuade them of the value of “omertà-ski”. And let’s not pretend that the Novichok attack never happened, right?

Anyway, when Gerry Feltus had worked out the name of the (unnamed) nurse whose phone number was written on the specific Rubaiyat connected to the slip of paper in the dead man’s pocket, he interviewed her several times. Yet even though, as a retired police officer, he knew full well that she told him nothing of the truth surrounding the dead man that she was clearly aware of, he never really twigged why that was the case. For me, though, the reason for her prolonged silence seems all too obvious: that she was aware of the omertà surrounding the dead man, and wasn’t prepared to be the first one to say That Which Must Not Be Spoken out loud.

The presence of an Italian organized crime syndicate in Melbourne is something that became all too apparent in the 1960s, with the spate of Victoria Market murders being triggered (literally) by the accession wars following the deaths (by natural causes) of crime godfather Domenico “The Pope” Italiano and his enforcer Antonio “The Toad” Barbara in 1962. This crime group was described at the time in a secret report by John T. Cusack as follows:

It is frequently referred to by its adherents as the Society. Some, particularly outsiders, call it mafia. Actually it is not mafia. The latter is exclusively Sicilian in origin and membership. Since the Society in Australia is exclusively Calabrian, it is obviously a derivation of the ancient Calabrian Secret Criminal Society known as the L’Onorata Societa (The Honoured Society), ‘Ndrangheta (Calabrian dialect for The Honoured Society), also referred to by some as Fibia.

From my perspective, the most powerful explanation for the silence surrounding the Somerton Man would be not that nobody knew who he was, but instead that he was some kind of footsoldier in a criminal society (I would predict Melbourne, given that the Melbourne train arrived in Adelaide early). I suspect this was (in 1948) not the ‘Ndrangheta, but rather home-grown gangsters The Combine (more on that in a moment). More broadly, my inference is that lots of people knew exactly who he was, but deliberately chose to say nothing. Gerry Feltus certainly knew he was being spun a line by Jo Thomson, but perhaps he will live to be surprised by how many people knew who exactly “The (Un)known Man” was.

I hope that some day soon someone will come forward – even anonymously, seventy years on – to defy the code of silence and finally tell even a small part of the Somerton Man’s story.

Daphne Page

What was it like to deal with omertà in Australia in the late 1940s? Fortunately, we have a pretty good idea. Jo Thomson’s (soon-to-be) husband Prosper (George) Thomson got involved in a court case where he was wedged between a lady called Daphne Page and a dangerous Melbourne individual who he would not name in court. The judge seems to have taken a hearty dislike to everyone involved, somewhat reluctantly judging the case in George’s favour but ordering him to pay the costs.

From this, we know that “Early in December [1947] he [Thomson] went to Melbourne to sell a car for another man.” When a cheque from the “other man” bounced, Thomson was unable to do anything about it: and so refused to pass on the “black market balance” (that he hadn’t received) of the failed transaction to Daphne Page back in Adelaide. Page then told him she’d get her whole family to pretend that she’d instead loaned him £400 and would take him to court. In the end, the judge thought that Thomson’s (who had welched on a black market deal with Page when the Melbourne crim he’d sold to had welched on his half of a deal, and then told her to forget all about it) poor behaviour was more legally justifiable than Page’s poor behaviour: but it’s hard to feel grotesquely sympathetic towards either.

But even so, that’s what can easily happen when things as simple as buying or selling a car for its actual value are, thanks to the Price Commission, effectively pushed out onto the black market and criminalized. According to the Barrier Miner 15th June 1948, p.8:

Men in the trade said honest secondhand car dealers had almost been forced out of business during the war. Records showed that 90 per cent of all used car sales were on a friend-to-friend basis and they never passed through the trade.

So: the man the nurse Jo Thomson was living with was directly connected to dangerous Melbourne criminals who operated under a code of silence (George Thomson wouldn’t name the man in court). This is not a conjecture, this is just a consequence of being a garage proprietor and car dealer in 1948, a time when 90% of car buying and selling was done on the black market. Thomson expressed no shame or sorrow for having tried to broker a black market car deal between Daphne Page and Melbourne criminals (even if it went wrong), because that is what he had to do to stay in the car business: you might as well have asked a dog not to bark as ask him to change his ways.

Suggested Links to Melbourne

One story that appeared in the Adelaide News (26th January 1949) (and in the Sydney Daily Telegraph and Geraldton Guardian) suggested a connection between the Somerton Man and a Melbourne baccarat school:

Gamblers believe dead man was “nitkeeper”

Melbourne.- Two promininent Melbourne baccarat players who desire to remain anonymous, believe they knew the unknown man in the “Somerton beach body mystery.”

They saw the man’s picture in a Melbourne newspaper and said they thought they recognised him as a “nitkeeper” who worked at a Lonsdale street baccarat school about four years ago. They could not recall his name.

They said the man talked to few people. He was employed at the baccarat school for about 10 weeks, then left without saying why or where he was going.

Nitkeepers / cockatoos were basically lookout men, hired to stop police and undercover officers from getting inside the door: they were equally part of the street bookie’s world.

Gerry Feltus’s “The Unknown Man” (p.118) also included a cutting from the Mirror (no date given, but much later):

One Mirror “investigator” had more than just an idea to go on.

The Tamam Shud, he said, was more than just a page torn from a book.

It was the usual signature of a man who had twice stood trial for murder.

Every big baccarat player in post-war Melbourne knew who “Tamam Shud” was.

He was the enforcer!

In the hey day of a man called “Twist” he said and “Freddie The Frog” Harrison – himself executed – “Tamam Shud” was known and in [the] nether world of sly grog and illegal baccarat, feared.

Obviously the dead man had fallen afoul of the underworld and had been executed.

In fact, Melbourne detectives had investigated the same theory years before.

But this apparently promising lead had been a dead end.

Note that “Twist” (Jack Eric Twist) and Freddie “The Frog” Harrison (who was killed in 1959) were two of the five people who made up “The Combine”, controlling much of the organized crime in Melbourne in the years following WW2, via the Federated Ship Painters’ and Dockers’ Union. The others were Harold Nugent, Norman Bradshaw (AKA “Cornelius”), and Joseph Patrick “Joey” Turner (AKA “Monash”).

The Lonsdale Street Baccarat School

There’s a nice 1947 introduction to Melbourne’s gambling scene here.

Interestingly, the baccarat school on Lonsdale Street (a part of Melbourne long associated with brothels) was raided and shut down two weeks after the Somerton Man’s death. An article in the Melbourne Argus dated 16th December 1948 runs:

BACCARAT DENS BROKEN, POLICE CLAIM

Big city school closed

WITH the closing of a notorious school in Lonsdale street, city, on Tuesday night, gaming police claim they have at last broken the baccarat racket.
The school was the second last of the big games which yielded promoters thousands of pounds in the last five years.
Police say that the only other school of any consequence is operating at Elwood. They are confident this will be closed in the near future.
On Tuesday night the gaming squad served a man in Lonsdale st with papers informing him that his premises have been declared a common gaming house.
Previously, other premises in Lonsdale st and also in Swanston st, city, were also “declared.”

ENRICHED CRIMINALS

Sergeant A. Biddington, gaming police chief, said yesterday that the fight to beat the racket had been long and hard.
There were 14 schools in Melbourne two and a half years ago, all run by desperate characters. Huge sums changed hands nightly, enriching many well-known criminals.
In the last 12 months, he said, baccarat schools were raided nightly at two-hourly intervals.
Not only were the “bosses” upset but players, many of them respectable citizens and inveterate gamblers, became frightened.
The result was that attendances dwindled and some schools closed down for lack of patrons.

“COCKATOOS” BUSY

Sgt Biddington explained that it was difficult to obtain evidence against the schools. Usually they were on the top floors of buildings, and ‘cockatoos’ were able to give a warning before police ascended stairs and made a raid.
Sgt Biddington added that by closing the baccarat dens, police will break up some of the city’s worst consorting spots for criminals.

Incidentally, the (brief, and probably not 100% truthful) memoirs of Melbourne baccarat school owner Robert Walker that ran in the Melbourne Argus in 1954 is on Trove, e.g. here. In another installment, Walker describes entering the Lonsdale Street baccalat school, on his way to see The Gambler:

To get to the club in Lonsdale st., you walk up three flights of stone steps and knock on a big fireproof steel door.

I did that, and a small trapdoor was opened.

A few minutes after doing this that day, Walker got shot in the leg by the doorman (though he lived to tell the tale). But that’s another story.

Where To From Here?

If the Somerton Man was (as was claimed) associated with the Lonsdale Street baccarat school around 1945 or so, it should be possible to piece together a list of names associated with it from the Police Gazettes and newspaper articles of the day, and then rule out all those who lived past 1st December 1948, or died before then. It might well be that if we can follow this through to its logical conclusion, we would find ourselves with a very short list of names indeed – maybe three or four. What will we then find?

As always, there’s a good chance that this will be yet another Somerton Man-style dead end, a “big fireproof steel door” at the top of the stairs that we cannot get through. But whatever the Somerton Man’s reason for being in Adelaide on the day he died, perhaps this thread offers us a glimpse not of what he was doing, but of the life he was living.

For he was a real person, living his own life in his own way, even if that isn’t how we choose to live our own lives, and that’s something that tends to get marginalized: while people who treat him purely as a historical puzzle to be solved or to give them ‘closure’ in some sense aren’t looking to remember him for what he was, but for what resolving the questions around him can do for them now. Today, though, I simply want to remember the Somerton Man, and to try to imagine (however imperfectly) the life he lived and lost.

Every couple of years, I wake up in the middle of the night with an all-new version of The Big Idea – you know, the one that’s finally going to unlock the Voynich Manuscript’s secrets. These unstoppable small-hours plans are normally formed from the soup of things slooshing around in my head, but arranged in a pincer movement attacking the problem on two fronts (i.e. with the idea of trapping it in the middle).

As an aside, it would be a bit of a shock to me if the Voynich Manuscript’s contents turn out to be something wildly unexpected, like a 200-page Swahili ant-summoning ritual, or a book about various weird vegetables that magically cure diabetes (as if anyone would randomly send emails about that, ho hum). :-/ Similarly, I would find it a big surprise if the writing / enciphering system were to turn out to be something we hadn’t collectively considered at length and in detail already, though in some cunning combination that we hadn’t quite grasped.

More generally, I would summarize my overall position as being that, without much doubt, there is a high probability that we are much closer than we think to the Voynichian chequered flag. Even though there are many nuttier-than-a-fruitcake researchers out there (no, I’m not referring to you, dear reader, that would be quite absurd), a huge amount of excellent research has been done, a very large part of which will almost certainly be correct.

And so, swimming against the pessimistic epistemological tide that seems to prevail these days, my overall judgement is that we shouldn’t – very probably – need to know much more than we already do in order to crack through the Voynich’s walls: just a little more may well do the trick. In fact, it may even be that a single solid fact might be enough to open the floodgates. 🙂

This Week’s Big Idea

And so it was that I woke up at 2am a few nights ago with (inevitably) a new Big Idea for cracking the Voynich. And given that my last post was about the diffusion of vernacular Cisiojanus mnemonics, I guess few readers here will be surprised that the main part of the idea was that the 30-odd labels per zodiac sign might well be the syllables of a vernacular Cisiojanus.

Why vernacular? Well, even though Latin Cisiojani had been known since the 12th century or so, vernacular Cisiojani were novel and unknown even in the mid-fifteenth century, and so one might well be a good candidate for something someone compiling a book of secrets might well want to conceal / hide / obfuscate / encrypt (delete as appropriate).

At the same time, I don’t believe that Voynichese can be enciphered or obfuscated Latin, because the way Voynichese seems abbreviated / truncated seems incompatible with Latin (where endings contain so much of the meaning). But if we are instead looking at a linguistically diffused Cisiojanus (such as Italian or French), it’s perhaps a different kettle of (cray)fish.

In parallel, the Voynich zodiac section offers us numerous more interesting clues to work with: for instance, the three crowned nymphs, of which the red-crowned nymph on the Leo page is arguably the earliest.

I’ve previously proposed that one or more of these crowns might be flagging a feast day with personal significance to the author. (For example, for a Florentine such as Antonio Averlino, the most important day in the calendar was the Festa di San Giovanni, the Feast of St John the Baptist.) As such, we might also look at the Voynich zodiac page for Cancer, which also has a crowned nymph, but where the crown looks to have been added later:

I previously mused whether this Cancer crown might have been a fake, designed to draw attention away from the real crown in Leo, but in retrospect this was a bit too harsh and reductive, even if the codicology is sound. Rather, these two crowns (and indeed the crowned nymph in Libra) may well have had different types of significance, added in separate codicological layers for separate reasons. Even if the idea of Antonio Averlino’s connection to Firenze is too strong for some of you, the connection between Italian Cisiojani and St John the Baptist may still be worth pursuing, as we’ll see next.

Nicola De Nisco’s Cisiojanus

In the same way that Jesus’ birthday is celebrated near the Winter Solstice (the shortest day of the year), St John the Baptist’s birthday is celebrated near the Summer Solstice (the longest day). And so it has been widely suggested that both attributed birthdays offered Christian hooks to hang pagan festivals from (and there seems to be no obvious reason in the Bible why John’s birthday should be celebrated then). Hence in many places in Europe (not just Firenze), the Feast of St John the Baptist was a three- or four-day long affair, arguably more akin to a pagan summer festival.

Hence if we suspect that the labelese text in the Voynich’s zodiac section is some kind of vernacular Cisiojanus, there should be plenty of good reasons why we should look for the Feast of St John the Baptist.

For June (which German calendars typically link with Cancer), De Nisco transcribes one 15th century Italian Cisiojanus as follows:

Nic.mar.cel.qui.bo.ni.dat.me.pri.mi.bar.na.an.ton.
Vi.ti.que.mar.pro.ta.si.san.ctus.io.bap.io.do.le.pe.pau

If we add in De Nisco’s corrections in square brackets, plus additional saints’ names courtesy of that most indispensable of publications, The American Ecclsiastical Review (1901), Vol. 24, plus an 1886 French book which gave me St Dorothy of Prussia), we get:

1. Nic — Nicomedes [original document has “Vic”]
2/3. mar.cel — Marcellus / Marcellinus
4. qui — St Quirino, Bishop of Sisak
5/6. bo.ni — Bonifacius
7. dat — ???
8. me — Medardus
9/10. pri.mi — Primus
11/12. bar.na — Barnabas
13/14. an.ton — Sant’Antonio da Padova
15/16. Vi.ti — Vitus
17. que —
18. mar — Marcus et Marcellianus [original document has “Nar”]
19/20/21. pro.ta.si — Protasius (et Gervasius)
22/23/24/25. san.ctus.io.bap — St John the Baptist
26. io — Johannes (et Paulus)
27. do — (if this isn’t St Dorothy of Montau (Prussia), patron saint of the Teutonic Knights (from 1390) whose actual feast day should be 25th June, who was it? Thanks Helmut Winkler for pointing this out.)
28. le — Leo
29. pe — Petrus et Paulus
30. pau — Commemoratio Pauli

The presence of the much-contested St Dorothy of Prussia (a chronically-self-harming widow from near Gdansk, who was adopted in the 20th century by Catholics for Hitler, if you really want to know) gives us a hint not only to the German origins of this particular Cisiojanus, but also an earliest date (1390). Yet the presence of St Quirino perhaps hints at an itinerary via Hungary (the St Quirino with a 4th June feast died in Szombathely, whereas the St Quirino of Rome had an entirely different feast day): while, as De Nisco points out, the presence of the Feast of Sant’Antonio da Padova points very strongly to a Paduan Ciosiojanus adapter.

More importantly, you can see “san.ctus.io.bap” taking up four consecutive syllables in the Cisiojanus, a fragment of (almost-)plain text peeking through the jumble of syllable fragments that make up the rest. Moreover, the next syllable along is also “io” (for the feast of St John and St Paul), which might also be there for the finding.

All of which could offer an excellent crib for the plaintext lurking somewhere beneath Voynich’s labelese: so might we be able to find some echo of this in the Cancer labelese? Even more remarkably, might we be able to line up this phrase’s syllables with the labelese close to the crowned nymph in Cancer?

(As an aside, I hope you can see that this is the kind of connection that not only wakes Voynich researchers up in the night but also stops them from getting back to sleep.)

The “san.ctus.io.bap” Crib

Firstly, I offer up my own EVA transcription of the Voynich Cancer labels:

Outer ring (from 10:00 clockwise, just around from a gap at the left)

ykalairol
olkylaiin
olalsy
or.aiin.am
os.as.sheeen
otosaiin
opoiinoin.al.ain
ypaiin.aloly
oteey.daiin
oeeodaiin
ofsholdy
opoeey.okaiin

Central ring (from 10:00 clockwise)

olfsheoral
or.alkam
ytairal
oeeesaiin
ory
ochey.fydy
ofais.oeeesaly
ykairaiin.airal
okalar
orary
olaiin.olackhy

Inner ring (from 09:00 clockwise)

oletal
opalal
yfary
osaiisal
ytoar.shar
actho
aral

And then I offer up my thoughts: much as this whole idea got between me and my comfortable bed, I just can’t construct a sensible mapping (even with verbose cipher) between these labels and any of the Cisiojani I’ve seen, whether Latin, Italian, French or whatever.

But then again, I can’t sensibly map these labels to just about anything, language-wise: there’s no structure, or grammar, or variational consistency that offers a way of systematically parsing these labels into a system, let alone reading them. Even the characteristically labelese-like “oletal” / “opalal” / “okalar” / “olalsy” words (I’d perhaps also include “osaiisal”, “otosaiin”, “oeeesaiin” and “ytairal” in this group, and maybe even “ykalairol” and “olkylaiin” too) are only a minority of the thirty labels.

All of which isn’t to imply (as Richard SantaColoma is wont to say) that ‘this can only be a hoax’ (*sigh*), but rather that I think we’re missing something really big here, a rational connecting principle that would give these kind of labels a mutual structure and explanatory context that our theoretical crossbow bolts are flying a mile both over and past. For example, what is the way that we see “es” (411) much more than “er” (28), or “ir” (724) much more than “is” (62) really telling us? Why is almost every single instance of “ssh” not only at the start of a word, but also either at the start of a line or immediately to the right of an illustration in the text?

The recent surge of Voynich research interest in Diebold Lauber’s workshop has come about thanks to Koen Gheuen’s research. Koen’s focus was on the series of drawings in the centre of Voynich Manuscript’s zodiac roundels: and he began by tracing the unusual hand-clasping going on in the Voynich Gemini roundel (which I discussed here previously):

The similarity Koen highlighted between the Voynich Gemini roundel figures and the two frontmost figures in the following drawing from Diebold Lauber’s workshop is striking:

The parallels between the Voynich zodiac roundels and elements in Diebold Lauber’s workshop’s output are both qualitatively and quantitatively striking, not least of which is the crayfish (also highlighted by Koen) which – to the best of our collective knowledge – only appears misdrawn in a particular way (with the crayfish’s legs incorrectly attached to its tail rather than to its body) (a) in a Lauber-illustrated Buch der Natur, and (b) in the Voynich Manuscript’s Cancer zodiac roundel.

Knotty Problems

But there are problems of historical logic to untangle here. The first problem concerns the arms: the two hand-clasping Voynich Gemini figures have their arms crossed over (which is a correct depiction of the medieval ceremony), whereas the figures in Lauber’s drawing (dated 1448-1450) do not have their arms crossed over (which is incorrect). Koen dug up an image from the Werkstatt von 1418 (a different manuscript workshop, but from the same general area) that he suggests might well have been a predecessor to one or both of the other two:

Here, we can see the arms crossed over (which is correct) and a simple neckline (which is the same as we see in the Voynich Gemini roundel). Yet the arms are uncrossed, which is what we see in the Lauber drawing.

Koen proposes that this would make it difficult for the Voynich Gemini figures to have been derived from the Werkstatt von 1418 image, because the arms there were uncrossed, and it would be a little bit odd for the arms to have been recrossed.

Yet at the same time, given that the image depicts a man and a monk, this too is problematic for anyone trying to trace out a line of direct transmission.

It seems likely to me that the plain necklines depicted in all the Voynich roundel drawings that include a clothed human neck are systematic copies of a series of zodiac roundels from a single predecessor German manuscript (which was most likely a calendar). So we can tentatively date the predecessor document as being, say, closer to 1420-1430 (the date of the Werkstatt von 1418 drawing) than to 1448-1450 (the date of the Diebold Lauber drawing).

This gives us, I suspect, a sequence tree something broadly like this:

However, is this lineage compatible with the strangely misdrawn crayfish, which seems to suggest that Lauber’s workshop was somehow involved?

All I can say is that it is possible that the unknown document on the right (that I suspect was the predecessor for both the Voynich Gemini and the 1448-1450 Diebold Lauber drawing) was also from the Diebold Lauber workshop. The earliest known Lauber document is dated 1427 (Köln, Hist. Archiv der Stadt, Best. 7010 (W) 251, signed “Diebold de Dachstein”), and a number of Lauber’s early illustrations may have been by Hans Ott (whose work, the Heidelberg site says, can be found in Strasbourg documents between 1427 and 1449).

I (eventually) managed to track down some drawings from this 1427 Lauber document:

And yes, there are certainly a fair few simple necklines there. So the proposed sequence is still entirely possible, I think. Unless you know better? 🙂

Even though Beale Ciphers B1, B2, and B3 each consist of similar-looking strings of numbers, it’s far from obvious that they have been generated in the same way (i.e. that they all result from using the same cipher system).

Usage Patterns

We can quickly map the usage of the first 1000 index values (I remain a bit suspicious of higher numbers), with the following bitwise key:
* ‘.’ => unused
* ‘1’ => used in B1
* ‘2’ => used in B2
* ‘3’ => used in B1 + B2
* ‘4’ => used in B3
* ‘5’ => used in B1 + B3
* ‘6’ => used in B2 + B3
* ‘7’ => used in B1 + B2 + B3

77773777777757777776775777777376777777777777676777
7766576377737777755577754577317777755555.75777575.
77516774525774757757774525554135276747531.6.143147
42.3..4227.5.4..4..1454.4564.45.4124..1.7.171624.7
515.65574175554565525..51454.7111745.42421.44752.2
52...4...414154...46..247....1..132522.34..1.46.4.
73457..3.444474644475.11.5.5........4..11.46.1.4..
4.2..1...31..55.1..32..44....444.....2.....2..4..2
1.1.22.12.144..541.2..1..1....1..4.1..43......1...
.........55.11.2....1..1..........33........4....1
1...2.....2..................1.......1.3..1....3..
...2..2..........1......2.....33.................2
1131..3...41.1..54.2..11......4...........24..2...
...1.........1.21.......41...1.1.4................
...............14..........1.......1..............
.......1.....................1....................
......2...21.14.41554.11....1..........1....4.....
.....4.1..11.4.......1..1..............5....141...
...........1....411.14.4......1..4.5..............
44.......111..1.........5.........1..............1

From this, we can see that even though the numbers that are used in all three ciphers are biased towards low numbers (e.g. look at all the ‘7’ values at the top), B1 numbers (and to a slightly lesser extent B3 numbers) appear throughout the number range. Furthermore, apart from the numbers near the top, there seems to be no systematic relationship between the usage map of any two pair of ciphers (not even B1 and B3).

And yet we have quite strong evidence that the same enciphering tables derived from the DoI were used for both B2 (which has been solved) and B1 (which remains unsolved). I think this alone is strong evidence that for all their underlying “causal similarities” (for want of a better phrase), B1 and B2 were not generated by the same ciphering system.

Note also that the map shows runs of adjacent indices that appear in only one of the three ciphertexts (e.g. “4444” in B3) or that appear in both B1 and B3 but not in B2 (e.g. “55555”). However, these look broadly within the range of normal randomness, so I doubt these are highlighting anything unusual.

Jarlve’s Incremental Series

In a comment here a few days ago, Jarlve observed that all three Beale ciphers have stretches of numbers that were numerically ordered to a degree that was somewhat unusual. And furthermore:

Testing the significance of these incremental series versus randomizations, then B1 = 4.61 sigma, B2 = 2.72 sigma and B3 = 9.86 sigma.

If we map B1’s “incrementality” (i.e. where ‘.’ => decrement, and ‘*’ => increment), we can indeed see a six-long increment sequence about 60% of the way through, plus a couple of five-long increment sequences. What is just as striking is that the long decrement sequence in B1 is four-long (twice), which points to some kind of subtle asymmetry.

B1:

*.*...**.*.*.*..**.**.***.**.*.**.**.*.**..***..**
.*..**.*.***...*.**..**..**.*..*.*.*.***.*..*..***
..*.*.*.***...***.*.**.***.*..*..**.****.*.**.*.**
..*.*..*..*.**.*.***....***.**..***.**.*.*..*.**.*
*.**.**..**.*.*.*..***..***.*.*.*****.**.*.**.*...
***.*..****.*.**.***..*..****..****.*.*.***..***..
*.******.*..**.***.*..*..**...**.*..**.*.*.*.*.**.
*..*.*..*.**.****..*.*..**..*.*.*.*..****..*..**..
**.*..**..***.*.***..**.*..**.**.****.****.*..*.*.
.***....*.***..*..*****.*..*.**..*.*.**...***.*.*.
**.***...*.****..**

Compare this with B2, which has a six-long decrement sequence (about 30% of the way through), and a pair of five-long increment sequences.

B2:

..*.*..***..**..*.*.*.**.**..*..*..***....*.*.**..
*.*..**.**.*.*.**..***.**.*..***.**.*.*.*.**.*.*.*
*.*.**...*...**..**.**.***.*.**..**..***.*..*.**.*
.***.*.*.*.*..*..**..*.***.*.***..**..***.*..**..*
.*.**......*.**.*....*..*.*.***.***..**.*..***..**
.*.*.*..**..*.*.*...*.***.*.**.*.*.**.*.*.**.*.*.*
.***.***.*..**..*.****...*..*.*.**..***.**.*.**.**
.*.*.**.*.*.*..*.*....***.*..*..*..**..**...**.*..
*.*.**.****..**.*..*.**.***...*.*...**.*..*..*.*.*
*.***.**..**.**.*.**.*...*.**..*.*.****.*****..**.
***..*.*..**.*.**.*.*.**..***..**...***.*....*.*..
*.**...***.*.****..*.*.*.*.*..**..**.**..*.*.*.*..
**.**...*..*.*.*.*..***.*.****..*.**..*.*.*..*.*.*
*.**.*..***..*..**...**.*.*..**....*.**.*..*****.*
***.*.*..**.**.*.***.**.*..**.*...**..*..*.****.*.
***..***.***

But all of this in B1 and B2 is almost as nothing to B3’s extremely unbalanced set of increment series, firstly in a patch in the middle (two seven-long increments and two six-long increments) and then in a long patch at the end (where the positive increment sequences are 9, 9, 7, 6, 7, 9, and 6 long). By way of contrast, the longest decrement sequences in B3 are a single 6-long set, and a single 5-long set).

B3:

.*.*..*.**.*.**..***..*.*..*.***..*.*.*..*.*.**.*.
**.*.*.*.*..*..**.***..*.**.****.***.**.*.*.**.***
*.*.*.*...*...**.*.*.**.**..*.**..*.***.*.***..*..
*.***.**.**..*****...*.*.*..****..*....***..*.****
.*****..***...*.*.****.*******..**.*.*.*..**..**.*
***.**...**..*..**.*.*.***.**.**.****.****.******.
***..****.**...*.*.**..*.***.*******..*...**.*****
*.**..*.*.**.*.***.*.**..*.*.**..*****..***.**..*.
***.**.****.****.*.***.*...**...**.*......*.*..**.
**..*.*****.****.*****.*.*.*.*.**.*.*....*.*.*****
****.*********..**.**.*******..**.*..******.*.****
..*.**.****.*****.....*.**..*******.****..*.*.***.
.*********.******

Putting All This Together

I think Jarlve’s incrementing series perhaps offer a quite different dimension to what Jim Gillogly (perhaps better known for breaking parts of the Kryptos ciphers) mused in his “Dissenting Opinion” on the Beale Ciphers, where he opined:

I visualize the encryptor selecting numbers more or less at random, but occasionally growing bored and picking entries from the numbered Declaration of Independence in front of him, in several cases choosing numbers with an alphabetic sequence.

Whereas this loosely seems to fit B1 (where mysterious alphabet-like strings do indeed appear, but which require the cipher table used in B2 to have been used in a different manner), the immediate problem is that it doesn’t really capture what happens in B3 (where no mysterious alphabet-like strings appear if you apply B3’s index values to the DoI) at all. There, (thanks to Jarlve) we can say that the same encryptor seems to have instead chosen numbers with a strong bias towards incrementing numeric series.

But why would that be?

“Among other revelations, he discovers it was a treatise on Spacesynth“, says the author of the following video, Hagar Hogan. I’m not sure if that actually helps explain it, but it may possibly be some kind of starting point. For some people.

This has taught me a lot about the relationship between Mario and Luigi and the Voynich Manuscript. But probably more about where the volume dial is on my speakers.

Of course, readers might consider that the above is a waste of time, and that I should instead use my blog as a platform for discussing serious-minded Voynich videos by earnest researchers.

Here, it has to be said that I’m specifically thinking of “Mystical Voynich Manuscript Interpretation – Part 1” on the ‘High Elven Wisdom And Love’ YouTube channel. Its author is “an empath […] an elvenkin […] a soul that expresses themself as an elf in this lifetime”, and who wants to post 45-minute videos on the powerful energy behind the Voynich Manuscript.

Me, I’ll stick with Mario, if that’s ok with you. 😉

By now, everyone and his/her crypto-dog must surely know that the second Beale Cipher (“B2”) was enciphered using a lookup table created from the first letters of the words of the Declaration of Independence: that is, a number N in the B2 ciphertext corresponds to the first letter of the Nth word in the DoI.

Even working out that this was the case was far from trivial, because the version of the DoI used was non-standard, and there were also annoying numerical shifts (which strongly suggest that the encipherer’s word numbering messed up along the way). There were also a few places where the numbers in the B2 ciphertext appear to have been miscopied or misprinted.

Yet I don’t share the view put forward by some researchers that this would have made it nigh-on-impossible for anyone to figure out that the DoI had been used, simply because most of the number instances are low numbers, i.e. they are concentrated near the front end of the DoI where there are fewer differences with normal DoI’s, and before the numbering slips started to creep in. This means that even if you used nearly the right DoI, a very large part of the ciphertext would become readable: and from there a persistent investigator should be able to reconstruct what happened with the (not-so-straightforward) high-numbered indices to eventually fill in the rest of the gaps. Which is basically where Beale research had reached by the time Ward’s pamphlet was printed.

So far, so “National Treasure”. But this isn’t quite the whole story, because…

B1 Used The Same Table!

Even if we have so far failed to work out precisely how B1 was enciphered, we do also know something rather surprising, courtesy of Carl Hammer and Jim Gillogly: that the process used to construct B1 used almost exactly the same DoI used to encipher B2. Jim Gillogly, in his famous article “The Beale Cipher: A Dissenting Opinion” [April 1980, Cryptologia, Volume 4, Number 2, pp.116-119, a copy of which can be found in the Wayback Machine here] concluded that the ‘plaintext’ patterns that emerged from this were artificial nonsense, and so B1 (and by implication B3) were empty hoax texts, i.e. designed to infuriate rather than to communicate.

From the same evidence, Carl Hammer concluded (quite differently) that B1 and B2 were encrypted in the same way using the same tables, though he didn’t have a good explanation for the mysterious patterns. For what it’s worth, my own conclusion is that B1 and B2 were encrypted slightly differently but using the same tables, which is kind of a halfway house between Gillogly’s coglie and Hammer’s clamour. 😉

All three agree on this: that if you plug the DoI’s first letters into the B1 ciphertext, mysterious patterns do appear (more on those shortly). But for many years, my view has been that Gillogly’s end conclusion, though clear-headed and sincere, was both premature (because I don’t believe he had eliminated all possible explanations) and unhelpful (because it had the possibly unintentional effect of stifling nearly all subsequent cryptological research into the Beale ciphers).

Regardless, it seems highly likely that almost exactly the same DoI was used to construct B1 as was used to encipher B2. This is because the statistically improbable mysterious patterns only emerge in the B1 plaintext if you use the DoI.

Furthermore, what I think is quite striking is, as I pointed out some years ago, that if you use the corrected cipher table (i.e. the cipher table generated from the same DoI and using the same numerical mistakes as were used in the cipher table used to construct the B2 cipher text), the mysterious patterns not only remain, but become even more statistically improbable than before.

What this implies, I believe, is that not only was the same non-standard DoI used in both, but also the same enciphering tables derived from it, numerical errors and all.

Here’s what B1 looks like when combined with the raw DoI (numbers above 1000 map to ‘?’)

s c s ? e t f a ? g c d o t t u c w o t w t a a i w d b i i d t t ? w t t a a b b p l a a a b w c t
l t f i f l k i l p e a a b p w c h o t o a p p p m o r a l a n h a a b b c c a c d d e a o s d s f
h n t f t a t p o c a c b c d d l b e r i f e b t h i f o e h u u b t t t t t i h p a o a a s a t a
a t t o m t a p o a a a r o m p j d r a ? ? t s b c o b d a a a c p n r b a b f d e f g h i i j k l
m m n o h p p a w t a c m o b l s o e s s o a v i s p f t a o t b t f t h f o a o g h w t e n a l c
a a s a a t t a r d s l t a w g f e s a u w a o l t t a h h t t a s o t t e a f a a s c s t a i f r
c a b t o t l h h d t n h w t s t e a i e o a a s t w t t s o i t s s t a a o p i w c p c w s o t t
i o i e s i t t d a t t p i u f s f r f a b p t c c o a i t n a t t o s t s t f ? ? a t d a t w t a
t t o c w t o m p a t s o t e c a t t o t b s o g c w c d r o l i t i b h p w a a e ? b t s t a f a
e w c a ? c b o w l t p o a c t e w t a f o a i t h t t t t o s h r i s t e o o e c u s c ? r a i h
r l w s t r a s n i t p c b f a e f t t

Of the many artificial-looking sequences here, the one that caught Hammer’s and Gillogly’s eyes was:

a b f d e f g h i i j k l m m n o h p p

If we instead plug the same set of B1 numbers into the corrected DoI cipher table, this is what you get:

s b s ? e t f a ? g c d o t t u c w o t w t a a i s d b t i d t t ? w t f b a a b a d a a a b b c d
e f f i f l k i g p e a m n p w c h o c o a l l p m o t a m a n h a b b b c c c c d d e a o s d s t
b n t f t a t p o c a c b c d d e p e t p f a b t h i f f e h u u b t j t t t i h p a o a o s a t a
b t t ? m n m p a a a a r b o p j d t f ? ? t s b c o h d a f a c p n r b a b c d e f g h i i j k l
m m n o h p p a w t a o m b b l s o e s a t o f i s p c t a o l b t f l h d o a h g b w t e n c l c
a s s a a s t a t d t g t a w g f e a a o c a a a t t w h t t t a a o e t s a f a a s b s t c i h r
c a b t o t s c t d c n h w t s t e h i o o a t s t w t t s o f a a s t a a m s i w c p c w s o t l
i n i e e i t t d a t t p i u f a e r f a b p t c t a o i d n a t t o a t s t a ? ? a t m a t w n w
t t o c w t o t p a t s o t e b a t r c h b t o g a w c d r o l i t i a h l w a a s ? b c s t a f a
e w c m ? f t o w l t s o c c t e w t a f o a o w t t t t t o t h r i s u e o h a c u a f ? p o i h
r m s s t r a s n i t p c t u o w f t t

This yields even more mysteriously ordered patterns than before:
* a a b a d a a a b b c d e f f i f
* a b b b c c c c d d e
* a b c d e f g h i i j k l m m n o h p p

Sorry, Jim, but something is going on there to cause feeding B1’s numbers into the refined DoI to produce these patterns: and even if I agree that the rest of the Beale pamphlet is a steaming heap of make-believe Boy’s Own backfill, I still don’t think the B1 ciphertext is a hoax. There’s just too much order.

Filling In The Gaps

Now, if it is true that exactly the same cipher table was used to construct both B1 and B2 (and though I believe this is highly likely, I have to point out that this remains speculative), these mysterious patterns may offer us the ability to advance our understanding of the cipher table yet further. This is because we can look at those places where the mysterious patterns break down in mid-sequence, and use those places to suggest corrections either to the table or to the B1 ciphertext itself. That is, even if we can neither decrypt nor understand B1, we can still use its mysterious plaintext patterns to refine our reconstruction of the enciphering table used to construct it and/or our understanding of the B1 ciphertext itself.

150=a 251=a 284=a 308=b 231=b 124=c 211=d 486=e 225=f 401=f 370=i 11=f

370=importance BUT 360=forbidden, so I suspect that 370 may have been a copying slip for 360.

24=a 283=c 134=b 92=c 63=d 246=d 486=e

283=colonies BUT 284=and, so I suspect that 283 may have been a copying slip for 284.

890=a 346=a 36=a 150=a 59=r 568=b

59=requires, but I’m not sure what happened here.

147=a 436=b 195=c 320=d 37=e 122=f 113=g 6=h 140=i 8=i 120=j 305=k 42=l 58=m 461=m 44=n 106=o 301=h 13=p 408=p

301=history BUT 302=of, so I suspect that 301 may have been a copying slip for 302.

OK, I’d agree this isn’t a huge step forward: but given that the printed version of (the solved!) B2 has seven similar copying slips…

* B2 index #223 is ’84’, but should be ’85’
* B2 index #531 is ’53’, but should be ’54’
* B2 index #571 is ‘108’, but should be ‘10,8’
* B2 index #590 [#591] is ‘188’, but should be ‘138’
* B2 index #666 [#667] is ‘440’, but should be ’40’
* B2 index #701 [#702] is ’84’, but should be ’85’
* B2 index #722 [#723] is ’96’, but should be ’95’

…I’d expect that we’re likely to have between 10 and 20 copying slips in B1’s series of numbers. That, combined with the larger ratio of homophones (i.e. as compared with the size of the ciphertext), keeps pushing B1 out of the range of automated homophonic ciphertext solvers. So all we can do to try to correct for those may well be a help!

My bibliographic search for more information about the Hollow River Cipher led to Sterling Ramsay’s (1973) “Folklore: Prince Edward Island”.

It’s a nice little book, that tries to enjoy local folkloric tales of ghosts, spirits and buried treasure from Prince Edward Island without the intrusion of too much critical thinking, a tradition that has (apparently) continued to the present day with the PEI Ghosthunter’s Society.

As to the author, there’s a picture (presumably) of Sterling Ramsay circa 1973 on the back cover, though inverted and coloured orange. A few minutes with GIMP produced the following reconstruction:

Does Ramsay have anything more to say about the Hollow River story that the Prince Edward Island Magazine didn’t back in 1900?

The answer is… not a lot, but that’s perhaps to be expected. What we do learn is that (p.61):

Many years went by until the original parchment note fell into the hands of a Mr. Donald MacDougall who came originally from the Brackley area of the island. To say that he became intrigued with the note would be quite an understatement, for, according to various accounts, he became almost obsessed with the desire to decipher the note’s hidden message. He spent every free moment arranging in various forms the jumbled letters with the hope of finding some clue to their meaning, but all in vain. This in itself was not enough to discourage him however. He showed it to every person whom he considered as likely of obtaining an idea of its contents. But all without success, none could understand any part of it but that which he could plainly see for himself, that is, what appeared to be a date, the 10th day of a month, A.D., 1738. At length he began to suspect that he was merely being made the butt of some seaman’s cruel joke, so his interest soon waned and for the moment, at least, all thoughts of the mysterious message fled from his mind. This was not to be very long lived, however, as he was soon to discover.

Who Was Donald MacDougall?

A quick Internet search revealed several mid-19th century Donald MacDougalls on Prince Edward Island, all descendants of a (presumably too early?) Donald MacDougall:

1. born on 24th December 1847 in Grand River, Prince, Prince Edward Island, son of James MacDougall (b. 1789) and Margaret Plaisted. Donald MacDougall married a Mary Gillis on 27 Nov 1866.
2. born on 24th January 1842 to Roderick MacDougall (b. 1812) and Mary MacKinnon.
3. born on 5th November 1844 to Jonathan MacDougall (b. 1813) and Anne MacNeil.
4. born on 20th August 1850 in Grand River, Prince, Prince Edward Island to Michael MacDougall (b. 1818 in Grand River, Prince, Prince Edward Island) and Anne Gillis (died 22nd May 1902). He died on 4th May 1929 in Grand River, Prince, Prince Edward Island.

The “various accounts” mentioned by Sterling Ramsay are probably different family retellings of the same basic story, handed down a couple of generations. (There’s nothing like a bit of elusive pirate treasure talk around a family hearth, right?)

Sterling Ramsay

Is Sterling Ramsay still alive? There’s a picture of a Sterling Ramsay of Charlottetown shovelling snow in 2015 in a local PEI newspaper:

And, in a timely coincidence, it seems likely to me that this is probably the same Sterling Ramsay who elaborately decorates his house on Euston Street every Halloween to scare local children: though sadly the local Guardian’s online archive seems to have lost the pictures of him with the Grim Reaper and shaking hands with the Devil. But I’m sure you get the basic idea. 🙂

From collecting folkloric ghost stories to improvised Halloween house-theatre, it seems like there could easily be a consistent thread of interest weaving through his life, wouldn’t you say, hmmm? 😉

For more than forty years, the late historian Gustina Scaglia researched 15th and 16th manuscripts containing drawings of machines. This led to her writing (some with Frank D. Prager) a number of highly regarded books, a good number of which I can afford (and have copies of) and a fair few my budget cannot easily stretch to. :-/ The list of her machine-related papers stretches back at least to her 1960 NYU thesis Studies in the “Zibaldone” of Buonaccorso Ghiberti (Advisor: Richard Krautheimer).

Overall, I think what emerged can be fairly described as a decades-long research programme to work out how these technical books and drawings fitted together into an larger inventive tradition – i.e. to determine where machine ideas really came from, and how they flowed from manuscript to manuscript, being adapted and adjusted as they went.

In many ways, Scaglia achieved just about everything she aimed to do: her accounts of Brunelleschi, Mariano Taccola, and Francesco di Giorgio’s books (and all their copybooks and derivative works, sprawling through the 16th century and beyond) in many ways exemplify the best of historical scholarship – despite covering such a large area, they are well researched, well thought through, and lucidly presented. And yet…

The Hole At The Centre: The Machine Complex Authors

It’s hard not to notice that there is a hole at the centre of Scaglia’s account, one which never seems to have been resolved (at least, not in those papers and books of hers that I’ve read). Although a very large number of machine drawings in Francesco di Giorgio’s books were derived directly from Mariano Taccola, Francesco di Giorgio also had a second major source for his machine drawings, a source which Scaglia was able to track only indirectly: she called these sources “the Machine Complex Authors“.

(Note that her 15th century Machine Complex Author(s) are different from the quite separate 16th century person she calls The “Machine Complex Artist”, who she concludes was active in Siena, and whose works Oreste Vannucci Biringucci copied into his books of drawings. I thought I’d mention this as it’s easy to get confused by these two similar names.)

Scaglia talks a little about the Machine Complex authors in her “Francesco di Giorgio: Checklist and History of Manuscripts and Drawings in Autographs and Copies from ca. 1470 to 1687 and Renewed Copies (1764-1839)”, in an early section devoted to Francesco di Giorgio’s Opusculum de Architectura (British Museum 197.b.21, formerly MS Harley 3281):

Francesco’s other engine designs in the Opusculum, which may be briefly designated as the Machine Complexes, and fort plans had all been composed by anonymous artisans in 1450-1470 or earlier, none of which appear in Taccola’s sets […] These Machine Complex designs, largely formed in the artisans’ imaginations, are often inoperable, greatly constricted by the box frame in which the components are fitted […] [p.43]

Essentially, by the time sixteenth century engineers began to look with a more experienced eye at these 15th century drawings, it was clear that they were almost all impractical (and indeed occasionally fantastical): that if they were to be built, they would inevitably “move slowly”, as the architect Antonio da Sangallo il Giovane put it.

To the best of my knowledge, if Scaglia ever had an inkling of who might have been the “anonymous artisans” who conjured up those additional Machine Complex drawings that Francesco di Giorgio used, she never wrote it down. This was the hole in her history she never managed to fill: Scaglia’s unfinished business, as it were.

Was Filarete a Machine Complex Author?

In “The Curse of the Voynich” (2006), I explored the idea that the Voynich Manuscript might have been (in some way) a version of the little books of secrets mentioned many times by architect Antonio Averlino, scattered through his libro architettonico. According to Averlino, they contained secrets related to agriculture, water, machines, bees and so forth (though he never actually included a formal list).

Opinions are sharply divided about these little books, allegedly composed during Averlino’s time as ducal architect in Milan (1450-1465): some historians think they never existed at all (i.e. that they were just a literary conceit in Averlino’s part-factual / part-fictional libro architettonico), while others think that they did exist and that trying to make money out of them was one of the reasons Averlino wrote his libro at all. Either way, there is currently no known evidence outside the four walls of the libro architettonico that supports or refutes either account: so all we really have to go on is what Averlino tells us.

However, since 2006, I have further speculated that Averlino might have been the author of some of the Machine Complex drawings. This is historically compatible based on what we know of both: the period when Averlino claimed to have written / invented / compiled his book of machine secrets was within exactly the same period Scaglia concluded the Machine Complex Authors were active in Italy, after Taccola’s works (-1449) and before Francesco di Giorgio’s early works (1470-1475). And Averlino’s death (probably in Rome sometime between 1465 and 1469) would be about the right time for some or all of his books of secrets to make their way out into the world.

Did Scaglia consider the possibility that Averlino may have been one of the mid-Quattrocento Machine Complex Authors? Scaglia did, in 1974, write a glowing review in Isis of Finoli and Grassi’s scholarly edition of Antonio Averlino’s libro architettonico (a review I’ve only read the first page of, sadly), so would have been well aware that Filarete had claimed authorshop of a book of machines, something that fell squarely within her long-term research programme. But perhaps the lack of corroborating external evidence for this meant that positing a link to the Machine Complex Authors would perhaps have been more openly speculative than she was comfortable with: perhaps someone more familiar with her work than me will be able to say.

Machines Hidden In Plain Sight?

If, for the sake of argument, we temporarily accept the premise that Averlino’s book of machine secrets did end up concealed in the Voynich Manuscript, the obvious question is: where are they? When I was researching Curse, it was very easy to see how a book on “agriculture” could be behind the Voynich Manuscript’s herbal pages, and also to see how a book on “water” could be behind the Voynich Manuscript’s ‘balneological’ quire (with its drawings of baths, and even possibly a rainbow at the end): so the absence of machine drawings was an issue that vexed me a great deal.

Though still just as hypothetical as it was more than a decade ago, the prediction this led me to remains controversial, simply because it is both simple and outrageous: that if Averlino’s book on machines (and it would inevitably be, like Taccola’s drawings that went before it, very visually oriented) is somehow hidden in the Voynich Manuscript’s pages, I concluded that the only place it could be hidden in plain sight was in the Voynich Manuscript’s “Herbal B” pages.

The text on (what Prescott Currier famously called) Herbal A pages was written by a larger, more open hand than the scratchy, smaller hand that wrote Herbal B pages: and despite superficial similarities, the two sets of pages have significantly different statistical profiles. Even though Herbal A bifolios have ended up (partially) mixed in with Herbal B bifolios, there seems little doubt that the two were originally composed in separate writing phases, and perhaps even written by different scribes.

Hence: even though both groups of pages are made up of plant drawings (normally one per page) accompanied by blocks of text (sometimes interleaved through the drawings), there seems very strong grounds for concluding that the two groups could well be quite different at heart. One of the things that distinguished Curse was that it proposed that these two groups of pages might well contain two different books – a book on agriculture, and a book of machines.

“Sunflowers” or Gears?

Since writing Curse, I’ve read a lot more of the 15th century machine drawing literature than I was able to before. And even now (in 2018), the systematic set of visual parallels I draw in 2006 seem no less strong: I still don’t see Brumbaugh’s supposed “sunflowers”, but wind-powered mills (and even wind-powered cars, something that had already been invented – though not built – by the early 15th century)

I also don’t see implausible plants, but rather obfuscated details that I suspect represent the racks and pinions that appear in 15th century machine drawings:

Additionally, I see what appear to be concealed versions of the horse-powered (or ox-powered) hoists that were such a mainstay of the 15th century machine drawing tradition (i.e. in Buonaccorso Ghiberti, Taccola, and elsewhere):

Finally: given Filarete’s love of fountains, it’s also easy (once you get to this point in the whole train of thought) to wonder whether some Herbal B Pages depict fountains:

As always, your mileage may vary: make of it all what you will.

Weak vs Strong Research Questions

The research brick wall I ran into with Curse was that Averlino’s books of secrets are – as far as anyone can say – entirely internal to his libro architettonico, making them virtual, unproven, implicit, or even absent: no-one can tell. And as for whether Gustina Scaglia ever considered (or even pursued) the idea of Averlino as a possible Machine Complex Author, she passed away 15 years ago, so that’s not really an avenue that can be followed.

However: what struck me in the last few days is that even though individually both are weak (i.e. untestable) research questions, if you put the two together you get a strong research question – by which I mean a question that can be tested against actual evidence, and perhaps falsified or proved. The point is that whatever trying to answer the question reveals, it should be possible to use the result to learn something new.

That is, even though the following claims have proven almost impossible to individually test (i.e. they are weak research questions)…

* that Averlino wrote the Voynich Manuscript
* that Averlino wrote books of secrets including a book of machines
* that the Voynich Manuscript’s Herbal B pages contain encrypted or obfuscated versions of his machine drawings
* that Averlino was one of Scaglia’s Machine Complex Authors whose drawings were copied by Francesco di Giorgio in 1470-1475

…if you put all of them together into a single composite claim…

* that Averlino’s drawings appear both in the Voynich Manuscript’s Herbal B pages and in Francesco di Giorgio’s machine drawings

…you get a strong research question, i.e. something that can actually be tested. So my next step is obviously going to be working out precisely which of Francesco di Giorgio’s drawings came not from Mariano Taccola but from the Machine Complex authors, and then comparing those with the Voynich’s Herbal B page drawings to see if anything connects the two.

However, apart from some references by the British Museum’s curators to figures in an unnamed book by someone called “Mancini” (presumably Girolamo Mancini?), I don’t know if there is a facsimile reproduction of the Opusculum de Architectura – if anyone happens to know a facsimile of the Opusculum or what the name of Mancini’s book is, please let me know, thanks!

More generally, what I find interesting here is that for many years I have spent a lot of time trying to break down big research questions into smaller questions that can be researched and tested atomically. Yet here I’m having to work in quite the opposite direction, simply because the individual smaller research questions are each too weak to be answered. And that makes me wonder whether we as historical researchers are sometimes hamstrung for lack of larger vision: that we can spend too much time on tiny questions that we can only partially answer, when we should (at least some of the time) also try to construct larger, more daring problematiques (as the Annales historians liked to put it), which would be testable in quite different (and perhaps far more revealing) ways. Just something to think about, anyway.

The story of the ‘Scorpion’ letters to John Walsh, host of “America’s Most Wanted” and (more recently) “The Hunt with John Walsh”, is now reasonably well known. From 1991, Walsh received a string of threatening letters from someone signing themselves “SCORPION”, and also containing cryptograms. Since 2007, two of these cryptograms (“S1” and “S5”) have been released by the FBI: however, none has yet been solved.

The Scorpion also wrote:

I now realize with many hundreds of hours of mindracking experimentation with my complex ciphers that my first one that I sent you was comparatively simple to my second, third, fourth, and now temporarily final cryptograph system. I have been encoding useful information for your use and have done it fairly, since all of my ciphers can be decoded simply, once the limited patterns and systems are discovered.

I’ve blogged before about how the S5 cryptogram (arranged as 15 rows of 12 symbols each) only ever has repeats where the distances between symbols is a multiple of 16, suggesting that it may well be composed of 16 strictly cycling cipher alphabets. I similarly suggested that S1 appeared to have repeats largely centred around multiples of 5, though this distance was far less solid.

Here’s what S1 (the first Scorpion cryptogram) looks like:

To make some kind of organizational sense of this, I tried to follow the basic pattern laid down by the S5 ciphertext, by:
* assigning symbols to five cycling columns
* mostly resetting these at the leftmost column of ten
* assuming that the encipherer’s first cipher system usage wasn’t as disciplined as his later (far more complex) efforts.

Here, you should be able to see all the same symbols as S1 (and in the same order), but assigned to five columns, where the shapes in each column are (mostly) thematically grouped. The only exception to this rule is the mirrored ‘L’ shape, which appears both in column #2 and in column #4. My strong suspicion is that this was an enciphering slip, where a simple geometric shape appeared in two different columns’ cipher alphabets by mistake.

Is this solveable? If I’m even roughly correct about the grouping, then S1 was, like S5, almost exactly the same category of cipher for which I put forward a sequence of challenge ciphers in 2017 (and all of which remain uncracked). There, the first challenge cipher was 153 symbols long, laid out in five perfectly cycling groups. This was more than twice as long as S1, and with the added benefit that I even told you exactly what kind of cipher it is. The second challenge ciphertext was slightly shorter (118 symbols): and so forth.

Can We Crack S1?

On the one hand, the multiplicity of the Scorpion ciphertexts is very high, meaning that pure homophone solvers stand almost no chance.

On the other hand, I’m pretty sure that these aren’t pure homophonic ciphers, insofar as each group of symbols almost certainly will have at most one A shape, at most one B shape etc. We might also try searching ‘down’ from setups that assume that repeated symbols in each group are not randomly chosen, but are most likely frequently used letters, e.g. ETAOINSH. With a long enough ciphertext to work with, this would be the preferred ‘classical’ way to attack the cipher: but, alas, we only have short ciphertexts to work with here. 🙁

However, my understanding is that there has been a handful of historical examples where particular ciphertexts of this general type (i.e. based around a cycle of interleaved cipher alphabets) have been cracked by determined cryptanalysts. So I’m not yet convinced it’s impossible.

All the same, has a specifically optimized machine algorithm for cracking these ever been put forward?

Apologies again for previously repeating the incorrect identification of “Ronald Francis” as Dr Douglas Buxton Hendrickson. However I can fully rectify that in the best way possible, by passing on today’s announcement courtesy of Gerry Feltus: from which we can say (hopefully definitively) that “Ronald Francis” – in whose car the Rubaiyat was found – was in fact chemist John Freeman of 24A Jetty Road, Glenelg.

I have established that the person who owned the car in which the relevant copy of the Rubaiyat was located and his wife are both deceased. Their next of kin have recently given me permission to release identities and details relevant to the ‘Unknown Man’ investigation. John Freeman, in December, 1948, was a Chemist, and resided with his wife in premises attached to their Chemist shop, at 24A Jetty Road, Glenelg. Their family car, a small Hillman Minx was more often than not parked in Jetty Road, outside their shop/residence.

Gerry Feltus goes on to say that he will soon be releasing more details about the interviews he carried out, which I (unsurprisingly) very much look forward to reading.

Trove had no obvious reference to John Freeman: but in January 1945, a Colin Charles Freeman did have a thief in his Jetty Road flat stealing a purse containing four pounds and six shillings. This leads us to an announcement dated 11 Sep 1945:

To whom it may concern. Declaration is hereby made that on August 20, 1945, Colin Charles Freeman and John Christian Freeman, chemists, of Adelaide, disposed of all interest and share in, and connection with, Howard Products. Aust.

With this, plus a little help from a long-running Somerton Man thread on Reddit, we can see that the two Freeman chemists were both cremated in Centennial Park:
* Colin Charles Freeman died on 23 March 1985. (Last abode: Somerton Park)
* John Christian Freeman died on 20 January 2014. (Last abode: Belair)

Both brothers are also listed as associates of the University of Adelaide in the 1955 Calendar (p.140):
* Freeman, Colin Charles…..1944
* Freeman, John Christian….1943

Beyond that, however, there seems to be little in Trove or elsewhere about either of them. Though I suspect this may improve before very long…

John Christian Freeman

According to Rootsweb:

Birth: 10 Jul 1922 in Parkside, Adelaide, South Australia, Australia
Note: Born: John Christian FREEMAN. Father : Charles Herbert FREEMAN. Mother : Doris Sylvia BERNAN.
Source : South Australian Births 1907 – 1928. Book : 98A Page : 358 District : Ade.

Colin Charles Freeman

According to Rootsweb:

Birth: 11 Dec 1920 in Unley, Adelaide, South Australia, Australia
Note: Born: Colin Charles FREEMAN. Father : Charles Herbert FREEMAN. Mother: Doris Sylvia BERNAN.
Source : South Australian Births 1907 – 1928. Book : 67A Page : 109 District : Ade.

According to the MyHeritage site:

Colin Charles Freeman was born in 1922, to Charles Herbert Freeman and Doris Sylvia Freeman [nee Bernau]
Charles was born on May 4 1897, in West Thebarton, South Australia, Australia.
Doris was born on July 18 1898, in Eaglehawk, Victoria, Australia.
Colin had 2 siblings.
Colin married Margaret Cynthia Freeman (born Grasby) on [– –] 1944, at age 22 at [——].
Margaret was born on September 25 1922, in “Xarma” Nursing Home, South Terrace, South Australia, Australia.
They had 2 children.
Colin passed away on [March 23] 1985, at age 63.

While at the University of Adelaide, he passed his Practical Inorganic Chemistry examination in 1940.

Finally: for those interested in car-related stories, Colin Charles Freeman appeared in court in regard to a driving incident in 1941:

At an Inquest yesterday into the death of Elizabeth Matthew Harrod, 71, pensioner of Milner street, Prospect, the Acting city Coroner (Mr. G. Ziesing) found that she died at the Royal Adelaide Hospital on May 24 from multiple injuries received when she was struck by a motor car on the Main North road Enfield, on the same day.
Mr. Ziesing found that the negligence of the driver, Colin Charles Freeman, chemist, of Nottage terrace, Medindle Gardens, was not sufficiently culpable to warrant his taking further action.