Back in 2015, I blogged about the ciphertext that was found taped to Paul Rubin’s stomach, and also wondered whether Rubin might have suffered from paranoid schizophrena, and whether the FBI would ever release his code-tables. On a larger scale, given that we only had a single scratchy newspaper photograph of his cipher to work with, it seemed that we were unlikely to make huge progress.

Well, a lot of that has now changed.

Craig Bauer’s “Unsolved!”

Craig Bauer’s (2017) “Unsolved!” covers a good number of cipher mysteries with a particular focus on Americana, and so his book covers the Paul Rubin case on pp.289-304. Very kindly, he passed me the following (much clearer) scan to work with, that his book had reproduced at a fairly small size:

Hence I’ve added a page on the Paul Rubin Cipher to the Cipher Foundation website: this also includes my transcription of the cipher, as well as (thanks to Albert Mock) a copy of Rubin’s death certificate and details of his grave.

Arguably even more importantly, however, Craig Bauer also received a 160-page document set from the FBI following a Freedom of Information Act request (though this arrived too late for him to use in his book), which is now also linked on the Cipher Foundation webpage – and this is where our real research begins.

Paul Rubin’s FBI File

A number of suggestions as to the possible contents of the cipher appear in the FBI file: that it might be written in cable language, that it might contain cribs for a chemistry examination, and so forth. It also lists (p.25) possibly the first nutty theory about the cipher, courtesy of Mrs L. Rohe Walker, 2 Beekman Place, New York 22, NY.

For me, though, one particularly interesting aspect of the file is that it details (on p.66) the specific sequence that the FBI’s cryptanalysts followed to try to understand Rubin’s ciphertext (though without success). It starts by listing the languages FBI linguists tried: “Yiddish, Hebrew, Russian, German, Hungarian, Finnish, Latinair [?], Lettuishuan [?], Turkish, Portuguese, Rumanian, Italian, Spanish, Dutch, Danish, Norwegian, Swedish, Malayan, Albanian.” They also “[t]ried to develop words phonetically and as abbreviations, with no success.”.

It then moves onto cryptanalysis, firstly listing the “Direct Cipher” methods they looked for (all with negative results):

a. Monoalphabetic Subst.
b. Transposition – uniliteral
c. Partial encipherment with & without nulls
d. Typewriter displacement
e. Combination subst + Transp + nulls + partial encipherment
f. Commercial word codes
g. False language
( 3 books from Library of Congress:
( * “On the Choice of a Common Language”
( * “Method [?] to Esperanto”
( * “A Planned Auxiliary Language”
h. Binary substitution as superencipherment

It then lists the “Open Codes” they looked for, firstly for letters mapped across the whole specimen:

(1) Constant key positions 2-25 (Entire specimen)
(2) 1st, 2nd, 3rd …. final letters of words, initial letters – forward and reversed alphabets
(3) Beginnings & endings of lines (+10 and -10 letters)
(4) Numerical key 7469921 as letter positions
(5) Capital letters, including letters to right & left

Next they looked for words embedded in the entire specimen:

(1) Constant key positions
Also 1st, 2nd letters of constant keyed words 2-10

They moved on to search for possible “Distorted Words”:

2PONT = Dupont
1/4ly = Quarterly
AS(GESTALT)VERBENSDI
KETELLE = Catelle (psychologist) ?

They also looked for possible names, cross-referencing them in the FBI files (e.g. for B. H. KETELLE):

TYWOOD-JANOSSEY-KETELLE [lists FBI document references]
IVAN DIOLON (negative)

Next, they list various observations made by the cryptanalysts. This for me is the most interesting part by far (note that ‘Q5’ is the reference names for this ciphertext within the bundle of evidence made available to the FBI):

1. Peculiar letter combinations of contacts.
a. Phonetic & pronounceable but unintelligible. Hebrew/Yiddish influence observable.
b. Doubled letters – with “KK” at beginning of one word.
c. “MN” digram, occurring 3 times at end of words.

2. General letter frequency:
A = 21, B = 5, C = 4, D = 11, E = 35, F = 3, G = 10, H = 6, I = 15, J = 1, K = 7, L = 23, M = 10
N = 21, O = 17, P = 3, Q = 1, R = 13, S = 12, T = 15, U = 5, V = 5, W = 3, X = 1, Y = 3, Z = 5
2 = 1

3. “Digits” at bottom of Q5 not in organized form. “X” and “.” appear haphazardly. Makes no sense in attempts to convert binary to digits.

CONCLUSIONS:
1. Letter frequencies and pronounceability indicate phonetic composition.
a. May be syllable, phonetic, or artificial word code. If so, material is insufficient for analysis.
b. letter material looks like irrational or unsystematic composition

2. Digits have irrational composition. Positions of “X” and “.” do not assist solution. Concentrated efforts on “Binary”, produced no significant results. If digit code on cipher underlying binary, material is insufficient.

Is It A Real Cipher?

On the one hand, the parents “did state, however, that there were a number of papers of a similar nature in their home in Brooklyn. They stated also […] that Benjamin Birnbaum […] would undoubtedly be able to furnish information concerning the ‘coded note.’ ” Later: “Mrs Rubin stated that her son and his friend, Benjamin Birnbaum, often exchanged “notes” similar to the one found taped to the subject’s abdomen when he was found.” (p.17). Yet “BIRNBAUM advised that he never sent to nor received a coded message from deceased” (p.29).

Rubin was also fascinated by binary. Birnbaum “stated that the deceased talked of using a word unit code with numbers for each word. The numbers would then be transmitted into the binary code. BIRNBAUM advised that the binary code is a code used on all calculating machines. He stated that the deceased was going to use another stage of transmitting this code unknown to BIRNBAUM.” (p.35)

I think it is abundantly clear from the file that Paul Rubin and Bernard Birnbaum did communicate by means of cipher, even if Birnbaum strenuously denied this under interview. Rubin and Birnbaum thought that everyone else was not only stupid, but deserved to be treated as stupid (and said so in the interview): so if Birnbaum treated the FBI as stupid, we should perhaps not be surprised.

In my opinion, the cipher would seem to be completely genuine and that Paul Rubin’s parents and Bernard Birnbaum did initially have access to Paul Rubin’s codebook. However, I strongly suspect that they chose to destroy it rather than give it to the government, lest the ciphertext reveal something unsavoury about the dead student’s end – better for him to die in mystery than in possible ignominy.

“La Buse, l’or maudit des Pirates de l’océan Indien” is a two-part (i.e. 2 x 52 minutes) documentary with fictional re-enactments (you get the idea) made by Kapali Studios, and due for release around January 2019 (so no need to get too excited just yet).

If (like me) you’re a pirate museum trivia fan, you’ll be interested to hear that the film-makers did their talking heads interviews in the Musée de la Marine and the Musée Cognacq-Jay (both in Paris), as well as on “L’Étoile du Roy“, a 46m replica of an 18th century British sixth-rate frigate that is a well-known tourist attraction in Saint-Malo (it was previously used as HMS Indefatigable in the TV series “Hornblower”).

Of course, as a cipher historian who cannot for the life of me see any actual connection between La Buse and “his” cryptogram, there could be no place set for me at that particular table – for realistically, where would the mystery be without the cryptogram? But while I don’t hold out a lot of hope for cryptological accuracy here, I’m sure the production will look beautiful. 🙂

The Eye Candy Bit

There are some nice behind-the-scenes images on the Kapali Studios website which I thought it would be nice to share here:

There were some other images here:

The total of my cipher mystery books purchases for 2017 was £260, which was actually a little lower than recent years (it’s been fairly quiet). For a change this year, I thought I’d list them here in all their eclectic glory.

I’ve lightly annotated each of these cipher mystery books, to cast a little glancing light on the areas of research I’ve been working on. Make of them all what you will!

* The Palaeography of Gothic Manuscript Books: From the Twelfth to the Early Sixteenth Century (Cambridge Studies in Palaeography and Codicology), by Albert Derolez.

Magisterial yet accessible, a really great book on Gothic palaeography. Of course, you then have to try it out in the field for a decade to be any good at it, but… palaeography is what it is. 😉

* A Man of Misconceptions: The Life of an Eccentric in an Age of Change, by John Glassie

Basically, the best-known modern biography of Athanasius Kircher. Perhaps a bit too generous towards its subject in places for my tastes, but it certainly covers all the ground. My focus when I bought this was on the people who carried on Kircher’s legacy, which turned out to be a very small group indeed.

* Regiomontanus: His Life and Work: Volume 1, by Ernst Zinner

Epic, detailed, stunning evocation of Regiomontanus. I’ve long wanted to read this, but until this year (when I found myself wanting to know whether Regiomontanus might have seen Vat. Gr. 1291 when it arrived in Rome), I could never quite justify the cost. Regardless, it turns out that it’s well worth the money – recommended.

* The Secret Code-Breakers of Central Bureau: how Australia’s signals-intelligence network helped win the Pacific War, by David Dufty (ebook).

Nice little book on Australia’s surprising war-time cryptology effort, something that tends to get trampled by gung-ho American cryptology historians. And no, it’s not all about Eric Nave (he actually plays a surprisingly small part in this account).

* Comment ils ont trouvé un trésor, by Alain Cloarec

Fairly lightweight, but helped me understand some of the practicalities of French treasure hunting law. But that’s another story…

* Maps, Mystery and Interpretation: 2. The Mystery: Oak Island Speculation: Volume 2, by G. J. Bath
* Maps, Mystery and Interpretation: 3. Interpretation: Sizing Up the Money Pit: Volume 3, by G. J. Bath
* Anson’s Gold: and the Secret to Captain Kidd’s Charts, by George Edmunds

I reviewed Bath’s books and Edmunds’ book in my blog.

* The Sirius Mystery: New Scientific Evidence for Alien Contact, by Robert K.G. Temple

Cipher Mysteries commenter Astronomical challenged me to read this, to make up my own mind about Temple’s Sirius theories (though on 1st April, so it’s hard to be sure). However… now that it has arrived, I just haven’t been able to get excited enough to actually pick it up, so it’s still waiting patiently on my bookshelf.

* The Templars: The Secret History Revealed, by Barbara Frale

Oh my, what an excellent little book this is. Anyone wanting to read about the Templars should start here. Highly recommended!

* Playing the Numbers: Gambling in Harlem between the Wars, by Shane White, Stephen Garton, Dr. Stephen Robertson, and Graham White

Very interesting book on the subculture of gambling that I touched on in my blog.

* Ella Minnow Pea: A Novel in Letters, by Mark Dunn,

Funky littl novl that msss around with th problms of writing whn crtain lttrs ar not allowd to b usd. 😉

* Generation of Vipers, by Philip Wylie

The book that Paul Rubin was supposed to be a follower of. Interesting (and surprisingly influential) mid-20th century nonsense.

* The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government, by Talbot, David

Another book triggered by the release of the FBI papers concerning Paul Rubin: I wanted to know more about Allen Dulles (whose surname seems to appear in Paul Rubin’s cipher, or is at least in his covertext).

* Sleepwalkers, by Arthur Koestler

A readable (but now rather dated) account of the development of astronomy.

* Humanism, Scholasticism, and the Theology and Preaching of Domenico de’ Domenichi in the Italian Renaissance, by Martin F. Ederer.

I wanted to know more about Domenico de’ Domenichi (who owned Vat. Gr. 1291), and this is probably the best book on the subject out there.

* The Renaissance in Rome, by Charles L. Stinger

I bought this to cast a light on what was going on in Rome circa 1460-1470, where some of my secondary Voynich research paths are now starting to vaguely lead towards.

* French Painting in the Time of Jean de Berry, by Millard Meiss

Splendidly detailed book, but don’t buy it expecting lots of extraordinary pictures, it’s mainly fine-detailed history. 🙂

* Solution of the Voynich Manuscript, by Leo Levitov

I’ve been meaning to buy a copy of this for myself for ages, and finally got round to it. However, I couldn’t bring myself to pony up the far greater amount for Joseph Martin Feely’s “Roger Bacon’s Cipher; The Right Key Found”, so if anyone just happens to have a digital copy of that, please let me know. 😉

* From Magic to Science: Essays on the Scientific Twilight, by Charles Singer.

Though I’ve ordered this, it hasn’t yet arrived. This was prompted by an updated page on Rene Zandbergen’s site which quotes Erwin Panofsky’s thoughts on the Voynich Manuscript in a less abbreviated form than has been the case.

After The History Channel’s recent season of “The Hunt For The Zodiac Killer” programmes (episodes 1, 2, 3, 4 and 5), I thought it was time to get back to some non-fake-news codebreaking research.

In particular, I want to suggest an approach we might follow to try to solve the Z340 that (hopefully) won’t need a brain the size of a planet to run it. But first I’m going to talk about the Z13 cipher, because I think it tells us a lot about what is hidden inside the Z340 and indeed why the Z340 was written at all…

The Z13 Cipher

The text just above the Zodiac Killer’s Z13 cipher (20th April 1970) clearly and unambiguously refers back to a ‘name’ supposedly in the Z340 cipher (8th November 1969), though as far as I can see the “Dripping Pen” note that arrived with the Z340 didn’t mention a name at all:

An oft-repeated account for this is that the Z13 had been constructed in response to a kind of cryptographic ‘taunt’ that appeared six months previously in the Examiner newspaper on 22nd October 1969, as detailed here. In the Examiner piece, entitled “Cipher Expert Dares Zodiac To ‘Tell’ Name“, the President of the American Cryptogram Association issued a direct challenge to the Zodiac Killer to reveal his name in a cipher.

However, if you put all these pieces together, it seems highly likely to me that it was instead the Z340 cipher that had been constructed as a response to President Marsh’s taunt (it appeared a mere seventeen days later). Hence it seems entirely reasonable to conclude that the Z340 indeed contains a specific name for us to decrypt – though, as always, it seems highly unlikely that this will contain the Zodiac Killer’s actual name.

Cryptanalytically, though, the Z13 couldn’t be further removed from the homophonic world of the (cracked) Z408 (and presumably the Z340), in that it has shape repeats and internal structure aplenty. In fact, if you colour all the Z13’s repeated cipher shapes (once again, using Dave Oranchak’s neat-o-rama Cipher Explorer), this is what you see:

Much as I love “Sarah The Horse” and “Clara Cataract” as elegant literary plaintexts for this, it’s important to note that these are homophonic solutions for something whose many repeats point to its actually being a monoalphabetic substitution cipher. Dave Oranchak’s “Laura Catapult”, and glurk’s “Gary Lyle Large” are fine examples of how it is possible to construct name-like phrases to fit: but these are relatively rare examples in a surprisingly sparse, errm, name-space.

In many ways, whereas the problem with the Z340 is that it has too many shapes, the problem with the Z13 is arguably that it has too few shapes. So there would seem to be something a little odd going on here, cryptanalytically speaking: something feels wrong.

In his 2017 book “Unsolved!”, Craig Bauer praised a possible crack of the Z13 cipher which I hadn’t previously heard of, and credits p.128 of Robert Graysmith’s (2002) “Zodiac Unmasked: The Identity of America’s Most Elusive Serial Killer Revealed” as the source (though Graysmith talks about it as if the suggestion were as old as the [Hollywood] Hills):

Now, even though this doesn’t quite fit the pattern (the N cipher shape shouldn’t be shared between plaintext F and M), I think Bauer was completely right to give this his imprimatur, because it seems exceptionally close. Giving MAD Magazine’s “Alfred E. Neuman” as his name feels like this exactly the kind of thing the Zodiac Killer would do, in that it is taunting, unhelpful, superior, nasty, satirical, self-centred, and narcissistic in all the right ways.

For ALFREDENEUMAN to be the Z13’s plaintext, the only concession you would need to make is that a single letter was misenciphered: and as starting points go for a ciphertext that already feels as though it has too few shapes, this is not half as big a step as almost all other solutions I’ve seen proposed. Even though I completely accept that this isn’t cast-iron proof, I do think it suggests that it is well worth considering as a conditional piece of evidence to work with.

And Now, The Z340 Cipher…

For me, the big (if not ‘huge’) question the above leads to is this: if this ALFREDENEUMAN Z13 decryption is actually correct, might the Zodiac Killer have included exactly the same name in his Z340 cipher? And if so, might we be able to use the name as a known-plaintext crib into the Z340? (AKA a block-paradigm match. 🙂 )

Assuming the Z340 does use some kind of homophonic cipher, there are (340 – 12) possible positions the Z13 crib could be positioned at: however, we should be able to eliminate any position containing a cipher shape repeat within the 13-shape stretch that does not match a repeat in the ALFREDENEUMAN crib, because that would mean that the same homophonic cipher shape would have been used to encipher two different plaintext letters.

For example, because Z340 line #4 begins “S99…”, the “99” part could not be any part of the Z13 crib because there are no doubled letters in “ALFREDENEUMAN”: this is also true for the “++” pairs in lines #4, #14, and #18. Similarly, the +..+ repeat on line #9 and the W..W repeat on line #18 both cannot be in the crib, because no plaintext letter is repeated three steps apart in “ALFREDENEUMAN”. If you run this against the most widely used Z340 transcription, there are – according to the vanilla C test I put together (below, which you can actually run for yourself by clicking on [Run]) – exactly 197 valid crib positions. So we can eliminate (340-12-197) = 131 candidate positions. Which is nice. 🙂

What I find interesting is that locking a set of fixed set of letters to an (albeit still hypothetical) crib should enable us to use a homophonic solver on far smaller subsections of the Z340 than we would normally be able to do. I’ve written before about how the top half and the bottom half of the Z340 have quite different (but subtly overlapping) properties: for example, how top-half ‘+’ characters seems to work differently to bottom-half ‘+’ characters. As a result, I think it would make sense to try to solve lines #1 to #9 separately from lines #11 to #19.

But there are other results, that point out how lines #1 to #3 seem to work quite differently from lines #4 to #6, and so on. So the ability to try to solve even smaller blocks of lines may well be a critically useful string for our cryptological bow.

Unfortunately, I’m not (yet) a zkdecrypto-lite power-user, so I don’t know how to automate this kind of search Anyone who would like to collaborate on doing this, please feel free to step forward: or if you want to take the idea and do what you like with it, that’s fine by me too. Can you blame me if I want to see this solved before they start shooting Season #2? 😉

Just One Last Thing…

There is, of course, one other possibility that should be investigated… it’s just that those cold, creepy eyes in the famous Zodiac poster remind me of someone, can’t think who it is, but the name might come to me soon, who was it…?

C: Crib Matching Code

Without any further ado, here’s The History Channel’s “The Hunt for the Zodiac Killer” season #1 finale, wherein Craig Bauer, having immersed himself almost completely in Zodiac Killer arcana, conjures up a new solution of the Z340, whereupon everyone else falls (or seems to fall) in line:

video since removed from TagTele site

Well… OK, I guess. I suspect what most people would agree on about this ‘solution’ are:
* it’s primarily intuitive, and not really ‘cryptological’ in any useful sense of the word
* it’s either really brilliant or really foolish, and almost certainly nowhere inbetween

Craig’s Crack

Because the starting point for Craig Bauer’s decryption attempt was the idea that some letters might actually encipher themselves (to make the answer hide in plain sight), I’ve added a green background to those letters (or simply transformed letters) where the ciphertext and his decrypted text coincide, e.g. “HER……KI.L….” on the topmost line. You should be able to see 23 green-backgrounded letters.

However, for the sake of balance, I’ve also added a red background to those letters (or simply transformed letters) where the two do not coincide, e.g. “…PLVVP….TB.D” on the topmost line. You should be able to see 61 red-backgrounded letters (I think).

To make the following diagram, I used Dave Oranchak’s funky online Cipher Explorer tool:

It should be immediately obvious that a very high degree of selectivity is going on here: furthermore, seven letters are left out (on lines 2, 3, 5, 6 and 7), while three extra letters are inserted (lines 5 and 8). Finally, there is no consistent mapping of other shapes to plaintext letters as per the claimed decrypt, which is why I think it is safe to say that this is not a ‘cryptological’ decryption in any useful sense of the word.

The notion that a given historical ciphertext uses a handful of actual letters as themselves while the rest are somehow illusory or made up is an illusionary amateur cipher-breaking trope I have seen many dozens of times. In every case, it is a Pyrrhic victory of intense hopefulness over good sense, and achieves nothing bar wasting my time. If anyone can point my attention to anything about this particular decryption that varies from this rather self-defeating and useless template, I’d be fascinated to see it: but so far, this is just about as bad as it gets.

The motif of this antipattern is the codebreaker dreaming themselves an intense imaginary journey into the world of the codemaker, and bringing back as their prize a sampling of their vision, one that is every bit as hard to read as a book in a dream. All they have is the enduring conviction that they have solved it, a conviction that gets strengthened the brainier they are (and hence the more ingenious their post-rationalizing retro-fitting gets).

Total Immersion Delusion

If I were to give this kind of behaviour a “Pattern” name, I’d probably choose “Total Immersion Delusion“. Only someone who feels they have totally immersed themselves in their imagined world of the cipher maker would propose such a thing, and in almost every single case it is – sadly – a delusion that gets conjured up.

Here, you can see the seeds of the dream forming in the first line’s “HER…” and “KI.L” word-fragment patterns: but as the dream progressively fades away, the ability of the dreamer to fit the shape to the overselected letters reduces and reduces, until they’re left with only the sketchiest outlines of hope (a single green letter on lines 4, 5 and 7 demonstrates the degree to which it has triumphed over rationality here).

Sorry, but from what I can see, this Z340 ‘solution’ isn’t even close to being close: nobody’s going to come out of this particular dungheap smelling of roses, no matter how hard you hold your nose. Not huge, not a game-changer, sorry.

You may not be aware that there are, out in the world, many private languages – languages that offer speakers and listeners within a particular group or subculture the ability to talk about things that could if said in public cause one or both to be hated, persecuted, prosecuted, or even killed.

Antilanguages

The academic literature sometimes call these antilanguages, a term coined by M.A.K. Halliday in 1976 to describe those secret languages used by (what he also named) “anti-societies”, e.g. prisoners, fairground workers, gay men, lesbians, thieves, Voynich researchers ( 😉 ), etc.

For me, I suspect that pitching them as tools of active resocialization formed within consciously-formed alternatives to the mainstream (as Halliday does) is a little bit overreductive: from my point of view, they are necessary parallel forms of language when the use of mainstream language would be personally problematic.

Polari And Its Sisters

This need for ‘privacy in public’ has led to a large number of cant slangs, such as Polari – this is a very old UK cant slang used by many subcultures (fairground people, Punch & Judy men, gay people, etc). Even though there are two fairly recent books on it (both by Paul Baker), this private language first came to wider public attention (a linguistic paradox if ever I heard one) thanks to the 1960s radio programme “Round the Horne” and its two Polari ‘homy polones’, Julian and Sandy.

Even though Polari seems – in my opinion – to have a closer historical connection to Punch and Judy performers than anything else, it has become best known (thanks to Julian and Sandy, arguably the first “celebrity gay couple”, as one programme put it) as a gay cant slang.

Yet even if it was culturally appropriated in this way, Polari is far from the only gay subculture language. One could quickly point to Bahasa Binan in Indonesia, Gayle and IsiNgqumo in South Africa, and Swardspeak / Bekimon (short for “Baklang Jejemon”) in the Philippines, all countries where verbally displaying as gay can be physically perilous in the extreme.

It’s a fascinating linguistic area, for sure.

Calabar Lesbian Cryptic Languages

Now adding to this existing array of public/private languages is Nigerian researcher Waliya Yohanna Joseph at the University of Calabar. Calabar is a port city, capital of Cross River State on the Nigerian border with Cameroon: incidentally, it’s a part of Nigeria I happen to have an (indirect) connection with.

Waliya’s article (which appears in Anna Odrowaz-Coates & Sribas Goswami (2017) Symbolic violence in social contexts. A post-colonial critique.) is called “Calabar Lesbian Cryptic Languages”, and is downloadable on ResearchGate.

As you would expect, using this cryptic language yields the speakers “emotional and sexual liberation, as well as anthropological security”, because “Lesbians preferred not to be known by the general public in Nigerian society.”

Though the basic form is numbers, there are also enciphered forms. One ciphertext is quoted:

Ba1baya ga3rala, 3 la4va2 5. 5 1ra2 sa4 ba215ta3fa5la. 3 na22da 5 3na maya la3fa2.
Wa3lala 5 la4va2 ta4 ba2 maya fara32nada? 3 para4ma3sa2 ta4 la4va2 5 1nada 5 1la4na2.
Ra2palaya !

The paper goes on to say that “violence against the female child among other things are also very prevalent in Single public schools where Senior students and self-declared school mothers force, entice and cajole the juniors in the hostels to practice lesbianism, abortion and prostitution.” It makes for uncomfortable reading at times.

At the same time, it has to be said that the author’s position seems to be perhaps a little overfocused on Calabar: the idea that lesbianism is perilous in Africa in general, even more so in Nigeria, and yet more so in Calabar doesn’t really do the paper justice. There also seems to be a moralistic tightrope being patrolled here, when the paper pitches itself as being…

of help especially to parents, teachers, lecturers, matrons, guardians and care givers who may wish to protect their wards from strange sexual orientations such as same sex relationships.

Still, it is a bold and interesting piece of work, shining a light not only on the edges of language and cipher, but also on the sharp differences between the specific mores of Calabar and those generally of “post-colonial” societies – particularly of those people reading the paper.

I learned, via an email from Rene Zandbergen today, that Voynich theorist Stephen Bax died a few days ago. It was only last month that he and Rene jointly formed the Voynich research presence at the Siloe press launch (he is on the left below, next to Rene):

I’m sure there are plenty whom he taught or that worked with him that have fond, positive memories: the obituaries will surely be safe in their hands. My thoughts – and I hope those of other Voynicheros – are with his family.

The new week brings a further episode of the History Channel’s “The Hunt for the Zodiac Killer”, not for the first time promising much but delivering little (Donna Lass car directions, really?) – the best part [37:25] was the interview with Zodiac Historian Misty Johansen (who wasn’t playing to CARMEL’s script). Even though it also partially revealed Craig Bauer’s much-trailed-and-supposedly-earth-shattering decryption of the Z340, that already looks to be more than a bit of a bust (sorry Craig), which I’ll discuss properly once the season finale has aired.

video since removed from TagTele site

Things must be particularly bad when it takes someone on Reddit to nail it, but according to ‘chickendance638’:

if you made a drinking game where you drank when somebody said “game-changer” or “huge” then one could forget about the incredibly shitty tv show that’s just been viewed.

Though I’m pleased to say that the same commenter then proved sufficiently wise to the dangers of expressing even mild exasperated sarcasm on the Interweb by noting:

Gotta be careful, if it catches on I could be responsible for more deaths than Zodiac himself

Anyhoo, the Zodiac-Killer-associated cipher this week’s episode highlighted was a short ciphertext included in a letter sent to the Times Union in Albany, NY and postmarked August 1st 1973 (which Karga Seven’s handwriting expert duly affirmed was by the Zodiac Killer). So let’s do our collective codebreaking thing on the “Albany Cipher”…

The Albany Cipher

As always with everything Zodiac related, it’s important to say that the Albany Cipher had been discussed and debated by Zodiac researchers for many years before it appeared on the show. The clearest image we currently have to work with is…

…though this image of its cipher scanned from Lyndon Lafferty’s (2012) “The Zodiac Killer Cover-Up: The Silenced Badge” (p.427) may possibly be slightly clearer, but it’s hard to be sure because of the screening…

Incidentally, I emailed the Times Union’s archive people to see if they happen to have a photo of the letter in their files. They kindly replied that:

We do not have the letter and nobody here has any information on its whereabouts, the actual receipt of the letter and what happened to it.

Which is a shame, but it is what it is.

Cracking the Albany Cipher

As was made clear during Hunt Ep.4, the Albany Cipher was originally cracked by the FBI many years ago, though the version they released to the public had the very first part of the plaintext – presumably containing the non-victim’s name – heavily redacted. So far, this was a basically correct account, i.e. the programme makers didn’t yet again claim that the decryption was puked out by CARMEL.

What we have of the plaintext runs: xxxxxxxxxxxxALBANYMEDICALCENTRETHISONLYTHEBEGINNING. Even though it would normally be the case that having this many plaintext letters would force the rest of the ciphertext to be one of only a small number of possibilities, a number of things conspire to make this difficult here. For a start, a number of cipher letter shapes are very similar: moreover, the quality of the reproductions we have are not good enough to definitively tell them apart; while a third difficulty is that people’s names tend to be more variable and hard to pin down than ‘pure’ dictionary words. And so on.

From the letters we have, the cipher alphabet mapping looks something like this:

Using these, some of the letters in the name section seem quite solid: CONxxExxENLY. The closest single word (with a couple of ciphering slips) would be CONSEQUENTLY, but because that’s not a name, it doesn’t make sense in context. If you like Mexican food, you can also try to start it CON QUESA: but this also seems unlikely in context.

Which is why, back in 2013, Zodiac crypto-meister Dave Oranchak floated the idea that the name might possibly be CONNIExHENLY. (This is of course the same name that CARMEL supposedly suggested in 2017, *sigh*.)

But cryptologically, I’m not so sure that Dave was on the money here: given that there seems no obvious reason to think that the message contains homophones, we should surely not begin by accepting ‘N’ as the fourth plaintext letter, and, rather, should instead directly reject it. However, because most of the plaintext alphabet has already been allocated, the unique shape at position four must surely be an otherwise unused plaintext letter.

Moreover, there are patterns within the mapping layout: for example, I’ve marked up R/S/T with the same proxy cipher shape in the table because (frankly) I can’t tell them apart in the ciphertext, so they look to be part of the same shape family. Hence I wouldn’t be at all surprised if the same pattern was also used for adjacent letters Q or U. And finally, the closest visual match to the unknown fourth shape of the ciphertext is the shape used for Y: so I would be unsurprised if this letter stood in for an adjacent letter e.g. X or Z.

Put all this together: and if this is a name, my own best guess is that the first six letters are in fact “CONZUE” (short for “CONZUELA”). I’m sure Spaniards will be happy to tell me which part of Spain or South America “Conzuela” is typical of (or whatever).

Fans of Family Guy will (of course) know the name Consuela well:

Yes, it’s the famous “I clean toilet” sketch. 🙂

What would Consuela say about the Albany Cipher – does she think it was made by the Zodiac Killer? Only one possible answer: “No, no“. Well… either that, or “More Lemon Pledge“, you choose (and you pay). 😉

If you think what the world really needs right now is yet another Voynich theory, preferably one that’s been stewing in some guy’s head for more than a decade and that could well emerge in book form during the next twelve months, then please feel free to advance to the edge of your seat, because this is without any real doubt absolutely the right post for you.

(Everyone else can just get ready to shake their head while exhaling slowly and sadly, as per normal.)

And no, it’s not muralist and war artist Nicholas Gibbs’ wonky Latinistic theory I’m talking about here, and it’s not even Gerard Cheshire’s polyglottal mess, though I have little doubt that we will hear more Sturm Und Drang from these two self-proclaimed Voynich giants before too long.

Really, if the number of nutty Voynich Manuscript theory/manifestoes currently being promised is a measure of an idea’s currency, then right now the Voynich Manuscript’s stock – NASDAQ:VOYM, perhaps? – would seem to be trading at an all-time high.

Jim Handlin

So, does anyone here not too far from Woodstock want to spend eight dollars to hear about Jim Handlin’s decryption of the Voynich Manuscript (his talk is called “The Voynich Manuscript Dechipered [sic], Part 2“, because it followed an introductory talk by Handlin in the same venue the preceding month)? Then you might consider heading over to Mountain View Studio, 20 Mountain View Ave, Woodstock, NY 12498 on 9th December 2017 between 5pm and 6:30pm.

The event blurb tells us:

Emerging from a 12-year engagement within cryptic language uses in western civilization, Handlin’s solution — if verifiable — is a mind-blowing revelation at a nexus of Jewish and Coptic mysticism and alchemy. […]

But Handlin’s crack of the Voynich Manuscript came about (it says here) almost as a secondary thing:

In 2004, Handlin discovered an ancient code used to hide and protect a system of thought he believes goes back to the creation of the alphabet. He has spent the last twelve years working with that system, which he calls the Rotas Code, applying it to decipher antiquarian texts that have defied translation. Recently he has used the Rotas Code to translate the Word Squares in the Abramelin Manuscript (1459 CE) and has made significant progress in translating the contemporaneous Voynich Manuscript.

You probably already know whether or not you’re even remotely interested in what Handlin has to say, so I’ll end the post there. But just so you know, I’ll post separately about the Book of Abramelin, because that’s a genuinely interesting topic for another day (though not a cipher).

OK, I’m going to start this post by embedding S01E03 of the History Channel’s “The Hunt for the Zodiac Killer”, because this is what started me on the road to the solution to the Donna Lass cipher:

video since removed from TagTele site

About half the episode is taken up with trying to make links between the Zodiac Killer and Donna Lass’s disappearance in 1970, a connection for which there seem to be two primary pieces of evidence – a poster (with a cryptogram) and a postcard. However, as we’ll see, it turns out that there are serious problems here which the series makers chose to fast-forward their audience past.

Who Was Donna Lass?

According to her FindAGrave website entry:

Donna was the daughter of James and Frances (Kukar) Lass. During high school, her activities included F.H.A. and singing in mixed chorus. During her senior interview, she stated that her plans were “to go college or be a nurse.” She was one the fifty-two members of the graduating class of 1962 at Beresford High School in Beresford, South Dakota.

Donna was listed as a survivor in the 1973 obituary of her father; but, she was listed as deceased in the 1982 obituary of her mother.

It’s hard not to conclude that hope for her survival died with her mother.

There are some reasonably good pictures of her on the Internet:

What happened to her? According to the official missing person’s page that discusses her:

Donna Lass was last seen in South Lake Tahoe, she left her residence without her vehicle or personal belongings. Lass worked as a nurse at the “Sahara Hotel-Casino”. Her last entry in the nurse’s log book was at 1:50 a.m., and although her car was found parked at her apartment complex in nearby Stateline, she wasn’t seen after leaving the Sahara.

The next day, an unknown male called her landlord and employer, stating Lass wouldn’t be returning due to a family emergency. The call was a hoax, and there has been no trace of Lass ever since

Of course, none of this sounds remotely like the Zodiac Killer’s modus operandi: so you’d have thought there really ought to be some good evidence out there linking the two, given the longevity of these claims.

The Donna Lass Cipher

The cipher first appeared on a reward-for-information poster, with each cipher shape underlined by hand. It’s unclear to me whether the underlining was originally designed in to the poster, or whether it was added by hand to the poster in the only genuine copy of the poster we have.

In episode S01E03 of “The Hunt for the Zodiac Killer”, the editing makes it seems as though everyone spends some time following a – frankly somewhat pathetic – interpretative anagram of the above cipher, that magically turns the cryptogram into driving instructions to get to some woods that just happen to have a TV-friendly creepy historical backstory (the Donner Pass cannibalism story, yada yada yada). In my opinion, this is right up there with people who draw pencil lines between similar letters and then try to convince you that it is not the cryptogram itself but rather those pencil lines that are the ‘real’ treasure map. *sigh*

Moreover, it was immediately clear to me (as I’m sure it was to everyone in the codebreaking team) that this particular reading wasn’t even close to being close: and, moreover, that the patterns of shapes were more or less exactly as you would expect a simple substitution cipher to present (for instance, the presence of doubled letters pointed directly away from any thought of Zodiac Killer-style homophones).

So once I’d got to the end of the programme, I found a copy of the cipher online and wrote it down on a piece of paper. Within ten seconds, I realized that the last set of shapes could only sensibly be DONNALASS: and that gave me enough letters to get to STALKING, and within a few minutes I also figured out that the larger phrase was I AM STALKING.

The next morning, when I ran a test to find words that fitted the pattern of the first six letters, only two words fitted – BEHAVE and BEWARE. Eliminating BEHAVE gave a nearly-complete decryption:

BEWAREIAMSTALKING
OO?...DONNA LASS.

I then immediately felt a bit of a fool that I hadn’t immediately noticed that this was exactly the same as the start of the last sentence of the Riverside “Confession” letter: “BEWARE . . . I AM STALKING YOUR GIRLS NOW” (there’s a copy here):

After a little more thought, I became convinced that the first of the two outline triangle shapes at the start of the second line should probably have been an upside-down outline triangle, and that the original plaintext for the Donna Lass cipher was (without any real doubt):

BEWAREIAMSTALKING
YOU...DONNA LASS.

Put all this together, and you’d have to say this looks like a cryptographic slam-dunk to link the crime to the Zodiac Killer’s “The Confession” letter (even if – in my opinion – he probably only tried to take ‘credit’ for Cheri Jo Bates’ murder, i.e. he didn’t do it himself). You can even see how the cipher shapes were laid out in a 5 x 5 grid by the encipherer, because the triangle shapes are all five letters apart, as are all the backwards letters.

However, it turns out that even though this is definitely the correct plaintext for this cryptogram, there are a number of issues

The Donna Lass Poster

The full poster looks like this:

For a start, it turns out that I was reinventing the wheel here (as far as solving this cipher goes). A number of other people had worked out the exact same plaintext a decade or more earlier than me – the earliest mention I found was May 2007: but given that it was so straightforward, it would be unsurprising if yet others had solved it long before then.

Problematically, commenter Seagull pointed out that:

The reward poster for Donna Lass, that Tahoe27 linked, can’t be from the ’70’s because the Area Code for the phone number did not come into being until 1997. […] Maybe this reward poster is from the time of Harvey Hines investigation.

Even Wikipedia lists this fact: “Created in 1997 by split from 916.” From that alone, there seems no chance at all that this poster was really from 1970 or 1971.

Moreover, commenter Slug then quickly pointed out (a) that the typesetting seemed inconsistent with the 1970s, and (b) that it seemed to have been laid out in close-to-exactly the same way that MS Word 97 would have done it. Others have also pointed out that it used Times New Roman, further compounding the period inaccuracy of the thing.

Finally, commenter Jupiter noted “a newspaper article about the Lass murder, written in 1971, that details a $500 reward put up by the family and people with information were to contact a private eye hired by the Lass family. There is no mention of having people contact the police with the info and the reward is considerably smaller”.

So where did the poster come from? Tom Voigt got it from Howard Davis, who in turn said:

Donna’s sister Mary sent that poster to me.It was done by the Lass family.

When asked about it, he then went on:

Mary mentioned to me a few times they had a family member(or in law) that is into computers,graphics,etc. He may have done the poster. She told me the reward was no longer in effect as I recall.Note at the bottom of the poster the family is mentioned.I do hope this doesn’t go into a all out contraversy as it was just an attempt at the time by the family to seek more information.I have enough to do as it is.Remember that Hines had pretty much convinced them Kane was the perp,hence,the ‘positive’poster wordage about having information,etc.

Put all this together, and the picture that finally emerges seems to be of the Zodiac theory industry collectively manufacturing a connection between Donna Lass and the Zodiac Killer – that is, Zodiac theorists convincing Hines so strongly that Laurence Kane (who Donna Lass personally knew) was the Zodiac Killer that he incited the Lass family to include a fake Zodiac-style cryptogram on a later faked-up poster.

The awful (and stupid) thing about this is that it encourages people to view the causality backwards: that while there is no doubt that Laurence Kane was connected to Donna Lass (and so could genuinely have been a person of interest), her sad death had absolutely nothing in common with any of the Zodiac Killer’s confirmed murders – the connection implied by the poster would seem to be totally bogus, in every sense of the phrase.

The Donna Lass Postcard

All of which process of elimination leaves us with the Donna Lass postcard, which the History Channel episode also trawled over for some time:

Well… after all the above discussion, it perhaps won’t come as any great surprise that there is a high chance that this postcard (which, let’s face it, contains nothing new about her death, nor proof of her murder, etc) is also fake:

A postcard, supposedly from Zodiac, was received by the San Francisco Chronicle on March 22, 1971, with the implication that Lass was a murder victim. However, the postcard contained no proof, as Zodiac was known for including. In 1999 a retired detective revealed to me that a former Zodiac investigator had admitted to forging the Lass postcard.

I’m sorry, but I have to say that I find this whole thing unbelievably sad. A vivacious young woman gets abducted (and, in all probability, killed) and all people want to do is to use her death to manufacture elaborate links falsely entangling it with a serial killer. What kind of vacuous, cynical theatre is that? This isn’t a cipher mystery, this is a cipher tragedy: shame on those who do such things.