In a recent blog post, anthropologist and linguist Magnus Pharao Hansen takes on the Voynich Nahuatl monster constructed by Tucker, Talbert and Janick. Having written a dissertation “Nahuatl Nation” on “the political roles of the Nahuatl language in Mexico and beyond” in 2016, Hansen sounds like someone well equipped for this particular battle. So what does he think?

Hansen helpfully lists the main problems as he sees them, starting with the quality of the actual scholarship supporting the venture:

The most nefarious problem is that it is pseudo-rigorous –  that is it, it works hard to give the appearance of being rigorous scholarship while in fact it is not at all.  They cite lots of serious scholarship, and mostly they cite it correctly, but nevertheless all the citations are used only for circumstantial evidence. As soon as we look at the concrete examples and the readings they are unsupported by this evidence and rests on pure speculation – often uninformed speculation.


But this is just peanuts to space, as Douglas Adams once wrote. For Hansen, the hugest problem is simply that T/T/J’s supposed Nahuatl readings make no sense to him whatsoever:

For me the best problem, best because it is so solid that it clearly invalidates the entire endeavor, is the fact that none of the proposed readings are valid – hardly a single one of the proposed words actually read like a bona fide Nahuatl word.

Many of them are completely alien to Nahua phonological structure. And to be honest I am surprised that the scholars haven’t found it to be odd that a few of the letters are so frequent that they appear in almost all words – for example more than half of the proposed plant names (and names of the nude ladies they call “nymphs”) start with the letter that they read as /a/ – that would be very odd in a natural language, unless the a was a very frequent grammatical prefix (which it isn’t in Nahuatl).

Even so, Hansen pursues the logical thread through to the end by trying to use the supposed ‘key’ supplied in T/T/J’s 2018 book to turn Voynich text into proper Nahuatl, to see where this led. And he ended up no less disappointed by what he found there:

Finally, as I read the example it bothered me that there is a certain repetitiveness in the deciphered text, the same letters seem to occur very frequently in combinations with specific other letters. This is not usually the case for natural languages – but very frequent in something like glossolalia of the baby-speech “lalala balala malalaba”- type.

So, there you have it. There isn’t anything in Tucker, Talbert and Janick’s oeuvre that actually links Voynichese to Nahuatl in any workable way. Next!

In many ways, Beale Cipher B1 is a lot like the Zodiac Killer’s Z340 cipher, insofar as they both have what seem to be direct predecessor homophonic ciphertexts (B2 and Z408) that are very publicly solved: yet we seem unable to exploit both ciphertexts’ apparent similarities in both system and presentation to their respective parent.

At the same time, it’s easy to list plenty of good reasons why Beale Cipher B1 has proved hard to crack (even relative to B2), e.g. its very large proportion of homophones, the high likelihood of transcription errors, etc. Combining just these two would seem to be enough to push B1 out of the reach of current automatic homophone crackers, even (sorry Jarlve) the very capable AZdecrypt.

But in many ways, that’s the easy side of the whole challenge: arguably the difficult side is working out why B1’s ciphertext is so darned improbable. This is what I’ve been scratching my head about for the last few months.

Incremental Series

I posted a few days ago about the incremental sequences in B1 and B3 pointed out by Jarlve, i.e. where the index values increased (or indeed decrease) in runs. Jarlve calculated the (im)probability of this in B1 as 4.61 sigma (pretty unlikely), B2 = 2.72 sigma (unlikely, but not crazily so) and B3 = 9.86 sigma (hugely unlikely).

Why should this be the case? On the one hand, I can broadly imagine the scenario loosely described by Jim Gillogly where an encipherer is pulling random index values from the same table of homophones used to construct B2, but where the randomness sometimes degenerates into sweeping across or down the table (depending on which way round it was written out), and that this might (somehow) translate into a broadly positive incrementality (in the case of B1).

But this kind of asks more questions than it asks, unfortunately.

Gillogly / Hammer Sequences

Surely anyone who has read more than just the mere surface details of the Beale Ciphers will know of the mysterious Gillogly strings in Beale Cipher B1 (that were in fact discussed at length by both him and Carl Hammer).

On the one hand, finding strings in broadly alphabetic sequence within the resulting plaintext (if you apply B2’s codebook to B1’s index numbers) would seem to be a very improbable occurrence.

And yet the direct corollary of this is that the amount of information stored in those alphabetic sequences is very small indeed: indeed, it’s close to zero.

One possible explanation is that those alphabet sequences are nothing more than nulls: and in fact this essentially the starting point for Gillogly’s dissenting opinion, i.e. that the whole B1 ciphertext is a great big null / hoax.

Alternatively, I’ve previously speculated that we might be looking here at some kind of keyword ‘peeking’ through the layers of crypto, i.e. where “abcdefghiijklmmnohp” would effectively be flagging us the keyword used to reorder the base alphabet. For all that, B1 would still be no more than a “pure” homophonic cipher, DoI notwithstanding. As a sidenote, I’ve tried a number of experiments to use parts (e.g. reliable parts, and only some letters) of the B2 codebook to ‘reduce’ the number of homophones used by the B1 ciphertext to try to finesse it to within reach of AZdecrypt-style automatic cracking, but with no luck so far. Just so you know!

I’ve also wondered recently whether the abcd part might simply be a distraction, while the homophone index of each letter (e.g. 1st A -> 1, 2nd A -> 2, 3rd A -> 3, etc) might instead be where the actual cipher information is. This led me to today’s last piece of improbability…

The Problem With jklm…

Here’a final thing about the famous alphabetic Gillogly string that’s more than a bit odd. If you take…

  • the B1 index (first column)
  • map it to the slightly adjusted DOI numbering used in the B2 ciphertext (second column, hence 195 -> 194)
  • read off the adjusted letter from the DoI (third column, i.e. “abcdefghiijklmmnohp”)
  • print out the 0-based index of that homophone (fourth column, i.e. “0” means “the first word beginning with this specific letter in the DoI”)
  • and print out how many times that letter appears in the DoI

…you get the following table:

  147 ->  147 -> a -> 16 /166
436 -> 436 -> b -> 12 / 48
195 -> 194 -> c -> 7 / 53
320 -> 320 -> d -> 10 / 36
37 -> 37 -> e -> 2 / 37
122 -> 122 -> f -> 1 / 64
113 -> 113 -> g -> 1 / 19
6 -> 6 -> h -> 0 / 78
140 -> 140 -> i -> 5 / 68
8 -> 8 -> i -> 1 / 68
120 -> 120 -> j -> 0 / 10
305 -> 305 -> k -> 0 / 4
42 -> 42 -> l -> 0 / 34
58 -> 58 -> m -> 0 / 28
461 -> 461 -> m -> 7 / 28
44 -> 44 -> n -> 1 / 19
106 -> 106 -> o -> 7 /144
301 -> 301 -> h -> 7 / 78 [everyone thinks this one is wrong!]
13 -> 13 -> p -> 0 / 60

What I find strange about this is not only that the “jklm” sequence is in perfect alphabetic order, but also that its letters are all the 0th instance of “jklm” in the DoI. To me, this seems improbable in quite a different way. (Perhaps Dave Oranchak and Jarlve will now both jump in to tell me there’s actually a 1 in 12 chance of this happening, and I shouldn’t get so excited.)

The reason I find this extremely interesting is that it specifically means that the jklm sequence contains essentially zero information: the B2-codebook-derived letters themselves are in a pure alphabetic sequence (and so can be perfectly predicted from letter to adjacent letter), while each letter is referred to the index of the very first word-initial occurrence in the DoI.

This means (I think) that there isn’t enough information encoded inside the jklm sequence to encipher anything at all: which I suspect may actually prove to be a very important cryptologic lemma, in terms of helping us eliminate certain classes of (or attempts at) solutions.

Logistically, it might be just too late for Santa to swoosh these under your Christmas tree, but I found out yesterday that Italian perfume house Pinalli has just started selling a range of perfumes and related products under the brand “Voynich Botanica 1-66“.

If you hadn’t already guessed (and I must admit it wasn’t immediately obvious to me), the “1-66” in the name actually refers to the folios of the Voynich Manuscript containing the first large herbal section (well… Herbal A and Herbal B, to be precise). Here’s what their fragrant PR flacks have to say about it (translated from the Italian):

Voynich is an advanced cosmetic brand that combines naturalness with high performance to bring to life formulations strictly free of Silicones, Parabens, Peg, Sles, Mineral Oils, Artificial Colors, with over 98% of natural ingredients. Voynich uses a scientific laboratory that for over 30 years has been studying, developing and producing cutting-edge formulas using the most advanced technologies and the highest quality standards.

The Voynich manuscript is an ancient illustrated code from the fifteenth century. Section I (folios 1-66) called “Botanica” contains countless illustrations of plants and flowers. Voynich products are inspired by the charm that surrounds this book, the passion for botanical research and respect for what Nature gives us.

So what do these look like? There are currently three to choose from:

You can even buy them all in a nice Christmas gift box:

Obviously they’re leaving the plants in the Pharma section for next year’s wave of products, and maybe the bathing nymphs of Q13 for a future spa range of shower and bath products. 😉

Well, they are what they are, I guess. But regardless, may Father Christmas fill your stockings with fine mysteries this year!

I’ve recently been trawling through lots of sources of information on the Beale Ciphers, and thought it might be nice to dump a whole load of thoughts in a single place, rather than sprawl these out over 4-5 posts. So here goes…

Clayton Hart

The suggestion that the Beale Ciphers might be three genuine ciphertexts but that the Beale Papers could simultaneously just be fantastical meanderings woven around those ciphertexts is not original to me (and I never claimed it was). However, what I didn’t realise until the last few days was that Clayton Hart also wondered that this might have been true, possibly as far back as 1903:

Clayton Hart actually met with James Ward and his son, who both, in 1903, confirmed the content of his pamphlet. In particular he states: “I have wondered if Ward might have written his manuscript based upon some figures he found, or made up; and yet, we have the word of Ward, his son, and friends to the contrary. Inquiry among some aged neighbors of Ward showed the high respect they had for him, and brought forth the statement that Ward would never practice deception.”

Interesting, hmmm?

C3 and high numbers

Another Beale page on the same angelfire.com site (though watch out for those pesky pop-unders there, *sigh*) demonstrates that the high numbers in B3 are concentrated very strongly in the second half of the ciphertext:

The image is credited to researcher Simon Ayrinhac, who has a picture from 2006 or earlier here:

Ayrinhac’s French discussion on the Beale Ciphers is also online, though as it doesn’t include the above diagram, there may well be further Beale analyses of his elsewhere online (which I haven’t yet found).

Declaration of Independence

One of Stephen M. Matyas Jr.’s major contributions to Beale Cipher research is his extensive collection of printed versions of the Declaration of Independence from 1776-1825, which is available both in printed form and online on his website, e.g. his checklist and addenda PDFs (both highly recommended).

This has led him to build up what I think is a really solid reasoning chain about the Declaration of Independence used in the (solved) Beale Cipher B2. For example, as far as the word “unalienable” goes, Matyas writes:

Many, in fact, most Declarations printed before 1823 contain the word “unalienable.” Thus, it may be surmised that Beale’s Declaration contained the word “unalienable,” not “inalienable,” and therefore that the two Declarations are different and taken from two different source works (probably books).

In Chapter 6 of his book “Beale Treasure Story: The Hoax Theory Deflated” (according to this page, but more about Matyas’ books another day), Matyas further writes about the word “meantime”:

Beale’s DOI contains the variant wording “institute a new government” at word location 154 and the more common wording “mean time” at word location 520. (The pamphlet’s DOI uses the word “meantime” (one word), and this should be changed to “mean time” (two words) so that ten words occur between numbered words 500 and 510 instead of the present nine words. The printer of Ward’s pamphlet may have unwittingly combined the two words.)

So, the first big takeaway from Matyas’ careful analysis of all the pre-1826 printed copies of the Declaration of Independence is that the DoI that was used to create B2 was, he asserts, not an obscure and wonky variatn, but instead a genuine mainstream copy of the DoI. Matyas says that of the 327 printed versions he was aware of, 26 were entirely consistent with the cipher: and he believes that the one used to encipher B2 was from a book (rather than, say, from a newspaper).

His second big point is that some of the errors that affected the DoI numbering in the pamphlet seem to have arisen because the author of the pamphlet included a version of the DoI that he had adapted / reconstructed to better fit the one used to turn B2’s decrypted plaintext into its ciphertext. As Matyas puts it, “The misnumbered DOI in Ward’s pamphlet is the result of the anonymous author’s best attempt to simulate Beale’s key. He did a pretty good job of it, although some might disagree.”

From all this, I think it is clear that anyone genuinely trying to decrypt B1 and B3 should very probably be working forward from one of Matyas’ 26 remaining compatible DoI texts rather than backwards from the DoI version given in the pamphlet. This is a tricky point with code-breaking ramifications I’ll return to in a follow-up post.

Matyas’s Reconstruction

With the above in mind, Matyas moves on to show the sequence of steps that he believes was taken to construct Beale Cipher B2, which I reduce to bullet-point format here:

1. “[I]t is supposed that [the encipherer] copied the words in the DOI to work sheets.”
2. “He then carefully counted off groups of ten words, placing a vertical mark at the end of each group of 10 words.”
3. “Finally, he constructed a key by extracting the initial letters from the words on his work sheets, and arranged them in a table with 10 letters per line and 101 lines.”
4. The encipherer “made three clerical errors”:
(a) “a word was accidentally omitted after word 241 and before word 246,”
(b) “a word was accidentally omitted after word 630 and before word 654, and”
(c) “a word was accidentally omitted after word 677 and before word 819.”
5. The encipherer “made one additional clerical error; he accidently skipped over 10 words in the work sheets immediately following word 480, thus omitting an entire line of 10 letters in the key.”

Matyas believes that because of these errors, when the anonymous author of the Beale Papers pamphlet came to reconstruct and number his own Declaration of Independence, he adapted the numbering and wording to better fit the plaintext he had worked out.

Seventy years ago this weekend, a man’s body was found on Somerton Beach just south-west of Adelaide: our inability to identify this “Somerton Man” or even to reconstruct any significant part of his life has turned him into one of South Australia’s favourite cold cases. His unexplained death has inspired books, novels, TV documentaries and countless web pages and blog posts: behind this mini-industry is a panoply of breathless conspiracy theories, ranging from spurned suicidal lover to Russian rocket spy to inter-state car criminal (as if anyone would even consider such a thing, hrrmmmh).

On this day, though, I think it’s time to take a rest from that whole treadmill, and to look at the Somerton Man from a quite different angle.

History, Evidence, Disappointment

Cold cases are, almost definition, historical: so to “do history” on them, we need to select both historical evidence and a historical methodology / mindset.

But even though social historians love nothing more than diaries, journals, or even tax records of ordinary people, for the Somerton Man we only have what one might call tertiary social history evidence – incidental objects of low social signification such as cigarettes, laundry tags, chewing gum, combs, and (what I would categorise as) a fairly random assortment of men’s clothes. Can we read social history clues and cues to locate the Somerton Man in a social milieu? People have tried this trick, for sure: but I think it is fair to say that this has yielded very little of use.

Similarly, even though political historians tend to work from a more high-end (yet slim) frame of reference (from Chifley to Churchill), it hasn’t stopped researchers from trying to read the mysterious unreadable note attributed to the Somerton Man as implying some kind of espionage-centric back-story for him: a Russian spy scouting out South Australia’s uranium secrets, or defecting from some international conference. Yet the supposed ‘tradecraft’ evidence holding this aloft is something that I’ve never found any genuine substance to.

Finally, despite the South Australian police’s loss of almost all its evidence (Gerry Feltus had only a small folder of fragments to work with), hundreds of newspaper articles on Trove plus the detailed text of inquest reports have yielded a fine factual slurry for researchers to sieve and then rake over in search of That Single Golden Nugget Of Information That Turns Everything Upside Down. Yet even the massed eyeballs of the Internet’s army of DIY forensic historians – sometimes derided as armchair detectives, but who have actually managed to uncover all manner of interesting evidence – have struggled to gain any significant kind of purchase on the Somerton Man’s slippy upwards slopes. What was his profession? What was his nationality? Satisfactory answers remain out of reach for even such (apparently basic) questions as “if the Somerton Man wasn’t “T. Keane”, why did his suitcase have T. Keane’s tie and underwear?”

In short, none of the historical hats we have worn when we try to understand the Somerton Man seems to have had the (mythical) power of a Holmesian deerstalker: and is the game even afoot in the way many (most?) people think it really ought to be? The answer would seem to be that it is not.

As of December 2018, I don’t believe that we have any genuine idea who the Somerton Man was, or precisely why he died (i.e. mishap, murder, or suicide), or where he had come from, or even what he was doing in Adelaide at all. For all of these, we have well-stocked warehouses of might-possibly-have-beens, for sure: but this is a situation only someone wanting to weave and embellish a story around the scanty facts could be truly satisfied with. Anyone who wants to know what happened to lead up to the Somerton Man’s death is, for now, likely to be in a state of disappointment.

Random Clothes

Putting all that accumulated historical disappointment to one side, I actually think we are very close to being able to reconstruct a little about the Somerton Man’s life and times in a useful way: and even if the precise details remain murky (and may remain so for some time), I suspect that there’s still a lot we can now say.

For a start, his clothes were not from a single shop or town or even country (some were American, some were Australian): even his shoes and slippers were different sizes. Others may disagree, but I don’t think this sartorial randomness can be read as a sign of affluence or of taste, or even of implying he was on some kind of undercover operation. Rather, to my eyes it strongly indicates that he was just plain poor – his clothing has all the hallmarks of charity donations, of Seaman’s Missions, of gifts by charity’s hospital visitors.

From all this, I strongly suspect that he, like so many others in the years immediately following WW2, was a recent immigrant to the country (he had air mail stickers in his suitcase), and quite probably not a legal one (no official record of him could be found). Exactly where he originally came from I can’t say: I suspect that the faded tan on his legs may imply that he had earlier that year been working outdoors, perhaps riding horses on a farm. Remember that Paul Lawson stated:

On looking at the deceased legs I am of the opinion that he was used to wearing high heel riding boots. I form that opinion because the muscles of his legs were formed high up behind the knees, similar to the muscles of a woman who wears high heeled shoes. [Gerry Feltus, “The Unknown Man”, p.85.]

I should also note what John Burton Cleland wrote about the air mail stickers:

Air-mail stickers in suitcase – corresponded with some one at a distance – other State more likely than Britain (special air-mail letter forms usually used for latter).

All the same, my current suspicion is that he arrived by surreptitious means (e.g. using fake papers) in Australia around October 1948, perhaps from the United States, perhaps staying in New Zealand for a period of time (where the Rubaiyat seems to have come from) en route, and – like Charles Mikkelsen – was corresponding with one or more people there. But all of that remains just a guess.

The Known Man

Who was the Somerton Man? Apart from the nurse Jessica Harkness / Jo Thomson (who told her daughter that she knew who the Somerton Man was, but wouldn’t tell the police at the time or even Gerry Feltus decades after the event), not a single person has admitted to knowing who he was. Nobody at all! As for me, I don’t believe for a New York second that the Somerton Man somehow entered Australia and made his way to Somerton Beach to die without encountering en route a whole load of people – fifty to a hundred at a minimum – who would subsequently recognize him if they wanted to. And so I think that the title of Gerry Feltus’s book – “The Unknown Man” – belies what I think will prove to be a difficult truth to swallow about the Somerton Man: that a whole set of people knew who he was, but for broadly the same reason chose to say nothing.

The Italian word for this is omertà – a code of silence surrounding Mafia criminal activities, along with a shared, mutual refusal to give any evidence to the police. (Even former police.) Everyone knows what happens to squealers, even the KGB: even though the CIA says the story about captured double agent Pyotr Popov being thrown alive into a furnace isn’t actually true, it is very likely still presented as if it were true to GRU new recruits, to persuade them of the value of “omertà-ski”. And let’s not pretend that the Novichok attack never happened, right?

Anyway, when Gerry Feltus had worked out the name of the (unnamed) nurse whose phone number was written on the specific Rubaiyat connected to the slip of paper in the dead man’s pocket, he interviewed her several times. Yet even though, as a retired police officer, he knew full well that she told him nothing of the truth surrounding the dead man that she was clearly aware of, he never really twigged why that was the case. For me, though, the reason for her prolonged silence seems all too obvious: that she was aware of the omertà surrounding the dead man, and wasn’t prepared to be the first one to say That Which Must Not Be Spoken out loud.

The presence of an Italian organized crime syndicate in Melbourne is something that became all too apparent in the 1960s, with the spate of Victoria Market murders being triggered (literally) by the accession wars following the deaths (by natural causes) of crime godfather Domenico “The Pope” Italiano and his enforcer Antonio “The Toad” Barbara in 1962. This crime group was described at the time in a secret report by John T. Cusack as follows:

It is frequently referred to by its adherents as the Society. Some, particularly outsiders, call it mafia. Actually it is not mafia. The latter is exclusively Sicilian in origin and membership. Since the Society in Australia is exclusively Calabrian, it is obviously a derivation of the ancient Calabrian Secret Criminal Society known as the L’Onorata Societa (The Honoured Society), ‘Ndrangheta (Calabrian dialect for The Honoured Society), also referred to by some as Fibia.

From my perspective, the most powerful explanation for the silence surrounding the Somerton Man would be not that nobody knew who he was, but instead that he was some kind of footsoldier in a criminal society (I would predict Melbourne, given that the Melbourne train arrived in Adelaide early). I suspect this was (in 1948) not the ‘Ndrangheta, but rather home-grown gangsters The Combine (more on that in a moment). More broadly, my inference is that lots of people knew exactly who he was, but deliberately chose to say nothing. Gerry Feltus certainly knew he was being spun a line by Jo Thomson, but perhaps he will live to be surprised by how many people knew who exactly “The (Un)known Man” was.

I hope that some day soon someone will come forward – even anonymously, seventy years on – to defy the code of silence and finally tell even a small part of the Somerton Man’s story.

Daphne Page

What was it like to deal with omertà in Australia in the late 1940s? Fortunately, we have a pretty good idea. Jo Thomson’s (soon-to-be) husband Prosper (George) Thomson got involved in a court case where he was wedged between a lady called Daphne Page and a dangerous Melbourne individual who he would not name in court. The judge seems to have taken a hearty dislike to everyone involved, somewhat reluctantly judging the case in George’s favour but ordering him to pay the costs.

From this, we know that “Early in December [1947] he [Thomson] went to Melbourne to sell a car for another man.” When a cheque from the “other man” bounced, Thomson was unable to do anything about it: and so refused to pass on the “black market balance” (that he hadn’t received) of the failed transaction to Daphne Page back in Adelaide. Page then told him she’d get her whole family to pretend that she’d instead loaned him £400 and would take him to court. In the end, the judge thought that Thomson’s (who had welched on a black market deal with Page when the Melbourne crim he’d sold to had welched on his half of a deal, and then told her to forget all about it) poor behaviour was more legally justifiable than Page’s poor behaviour: but it’s hard to feel grotesquely sympathetic towards either.

But even so, that’s what can easily happen when things as simple as buying or selling a car for its actual value are, thanks to the Price Commission, effectively pushed out onto the black market and criminalized. According to the Barrier Miner 15th June 1948, p.8:

Men in the trade said honest secondhand car dealers had almost been forced out of business during the war. Records showed that 90 per cent of all used car sales were on a friend-to-friend basis and they never passed through the trade.

So: the man the nurse Jo Thomson was living with was directly connected to dangerous Melbourne criminals who operated under a code of silence (George Thomson wouldn’t name the man in court). This is not a conjecture, this is just a consequence of being a garage proprietor and car dealer in 1948, a time when 90% of car buying and selling was done on the black market. Thomson expressed no shame or sorrow for having tried to broker a black market car deal between Daphne Page and Melbourne criminals (even if it went wrong), because that is what he had to do to stay in the car business: you might as well have asked a dog not to bark as ask him to change his ways.

Suggested Links to Melbourne

One story that appeared in the Adelaide News (26th January 1949) (and in the Sydney Daily Telegraph and Geraldton Guardian) suggested a connection between the Somerton Man and a Melbourne baccarat school:

Gamblers believe dead man was “nitkeeper”

Melbourne.- Two promininent Melbourne baccarat players who desire to remain anonymous, believe they knew the unknown man in the “Somerton beach body mystery.”

They saw the man’s picture in a Melbourne newspaper and said they thought they recognised him as a “nitkeeper” who worked at a Lonsdale street baccarat school about four years ago. They could not recall his name.

They said the man talked to few people. He was employed at the baccarat school for about 10 weeks, then left without saying why or where he was going.

Nitkeepers / cockatoos were basically lookout men, hired to stop police and undercover officers from getting inside the door: they were equally part of the street bookie’s world.

Gerry Feltus’s “The Unknown Man” (p.118) also included a cutting from the Mirror (no date given, but much later):

One Mirror “investigator” had more than just an idea to go on.

The Tamam Shud, he said, was more than just a page torn from a book.

It was the usual signature of a man who had twice stood trial for murder.

Every big baccarat player in post-war Melbourne knew who “Tamam Shud” was.

He was the enforcer!

In the hey day of a man called “Twist” he said and “Freddie The Frog” Harrison – himself executed – “Tamam Shud” was known and in [the] nether world of sly grog and illegal baccarat, feared.

Obviously the dead man had fallen afoul of the underworld and had been executed.

In fact, Melbourne detectives had investigated the same theory years before.

But this apparently promising lead had been a dead end.

Note that “Twist” (Jack Eric Twist) and Freddie “The Frog” Harrison (who was killed in 1959) were two of the five people who made up “The Combine”, controlling much of the organized crime in Melbourne in the years following WW2, via the Federated Ship Painters’ and Dockers’ Union. The others were Harold Nugent, Norman Bradshaw (AKA “Cornelius”), and Joseph Patrick “Joey” Turner (AKA “Monash”).

The Lonsdale Street Baccarat School

There’s a nice 1947 introduction to Melbourne’s gambling scene here.

Interestingly, the baccarat school on Lonsdale Street (a part of Melbourne long associated with brothels) was raided and shut down two weeks after the Somerton Man’s death. An article in the Melbourne Argus dated 16th December 1948 runs:

BACCARAT DENS BROKEN, POLICE CLAIM

Big city school closed

WITH the closing of a notorious school in Lonsdale street, city, on Tuesday night, gaming police claim they have at last broken the baccarat racket.
The school was the second last of the big games which yielded promoters thousands of pounds in the last five years.
Police say that the only other school of any consequence is operating at Elwood. They are confident this will be closed in the near future.
On Tuesday night the gaming squad served a man in Lonsdale st with papers informing him that his premises have been declared a common gaming house.
Previously, other premises in Lonsdale st and also in Swanston st, city, were also “declared.”

ENRICHED CRIMINALS

Sergeant A. Biddington, gaming police chief, said yesterday that the fight to beat the racket had been long and hard.
There were 14 schools in Melbourne two and a half years ago, all run by desperate characters. Huge sums changed hands nightly, enriching many well-known criminals.
In the last 12 months, he said, baccarat schools were raided nightly at two-hourly intervals.
Not only were the “bosses” upset but players, many of them respectable citizens and inveterate gamblers, became frightened.
The result was that attendances dwindled and some schools closed down for lack of patrons.

“COCKATOOS” BUSY

Sgt Biddington explained that it was difficult to obtain evidence against the schools. Usually they were on the top floors of buildings, and ‘cockatoos’ were able to give a warning before police ascended stairs and made a raid.
Sgt Biddington added that by closing the baccarat dens, police will break up some of the city’s worst consorting spots for criminals.

Incidentally, the (brief, and probably not 100% truthful) memoirs of Melbourne baccarat school owner Robert Walker that ran in the Melbourne Argus in 1954 is on Trove, e.g. here. In another installment, Walker describes entering the Lonsdale Street baccalat school, on his way to see The Gambler:

To get to the club in Lonsdale st., you walk up three flights of stone steps and knock on a big fireproof steel door.

I did that, and a small trapdoor was opened.

A few minutes after doing this that day, Walker got shot in the leg by the doorman (though he lived to tell the tale). But that’s another story.

Where To From Here?

If the Somerton Man was (as was claimed) associated with the Lonsdale Street baccarat school around 1945 or so, it should be possible to piece together a list of names associated with it from the Police Gazettes and newspaper articles of the day, and then rule out all those who lived past 1st December 1948, or died before then. It might well be that if we can follow this through to its logical conclusion, we would find ourselves with a very short list of names indeed – maybe three or four. What will we then find?

As always, there’s a good chance that this will be yet another Somerton Man-style dead end, a “big fireproof steel door” at the top of the stairs that we cannot get through. But whatever the Somerton Man’s reason for being in Adelaide on the day he died, perhaps this thread offers us a glimpse not of what he was doing, but of the life he was living.

For he was a real person, living his own life in his own way, even if that isn’t how we choose to live our own lives, and that’s something that tends to get marginalized: while people who treat him purely as a historical puzzle to be solved or to give them ‘closure’ in some sense aren’t looking to remember him for what he was, but for what resolving the questions around him can do for them now. Today, though, I simply want to remember the Somerton Man, and to try to imagine (however imperfectly) the life he lived and lost.

Every couple of years, I wake up in the middle of the night with an all-new version of The Big Idea – you know, the one that’s finally going to unlock the Voynich Manuscript’s secrets. These unstoppable small-hours plans are normally formed from the soup of things slooshing around in my head, but arranged in a pincer movement attacking the problem on two fronts (i.e. with the idea of trapping it in the middle).

As an aside, it would be a bit of a shock to me if the Voynich Manuscript’s contents turn out to be something wildly unexpected, like a 200-page Swahili ant-summoning ritual, or a book about various weird vegetables that magically cure diabetes (as if anyone would randomly send emails about that, ho hum). :-/ Similarly, I would find it a big surprise if the writing / enciphering system were to turn out to be something we hadn’t collectively considered at length and in detail already, though in some cunning combination that we hadn’t quite grasped.

More generally, I would summarize my overall position as being that, without much doubt, there is a high probability that we are much closer than we think to the Voynichian chequered flag. Even though there are many nuttier-than-a-fruitcake researchers out there (no, I’m not referring to you, dear reader, that would be quite absurd), a huge amount of excellent research has been done, a very large part of which will almost certainly be correct.

And so, swimming against the pessimistic epistemological tide that seems to prevail these days, my overall judgement is that we shouldn’t – very probably – need to know much more than we already do in order to crack through the Voynich’s walls: just a little more may well do the trick. In fact, it may even be that a single solid fact might be enough to open the floodgates. 🙂

This Week’s Big Idea

And so it was that I woke up at 2am a few nights ago with (inevitably) a new Big Idea for cracking the Voynich. And given that my last post was about the diffusion of vernacular Cisiojanus mnemonics, I guess few readers here will be surprised that the main part of the idea was that the 30-odd labels per zodiac sign might well be the syllables of a vernacular Cisiojanus.

Why vernacular? Well, even though Latin Cisiojani had been known since the 12th century or so, vernacular Cisiojani were novel and unknown even in the mid-fifteenth century, and so one might well be a good candidate for something someone compiling a book of secrets might well want to conceal / hide / obfuscate / encrypt (delete as appropriate).

At the same time, I don’t believe that Voynichese can be enciphered or obfuscated Latin, because the way Voynichese seems abbreviated / truncated seems incompatible with Latin (where endings contain so much of the meaning). But if we are instead looking at a linguistically diffused Cisiojanus (such as Italian or French), it’s perhaps a different kettle of (cray)fish.

In parallel, the Voynich zodiac section offers us numerous more interesting clues to work with: for instance, the three crowned nymphs, of which the red-crowned nymph on the Leo page is arguably the earliest.

I’ve previously proposed that one or more of these crowns might be flagging a feast day with personal significance to the author. (For example, for a Florentine such as Antonio Averlino, the most important day in the calendar was the Festa di San Giovanni, the Feast of St John the Baptist.) As such, we might also look at the Voynich zodiac page for Cancer, which also has a crowned nymph, but where the crown looks to have been added later:

I previously mused whether this Cancer crown might have been a fake, designed to draw attention away from the real crown in Leo, but in retrospect this was a bit too harsh and reductive, even if the codicology is sound. Rather, these two crowns (and indeed the crowned nymph in Libra) may well have had different types of significance, added in separate codicological layers for separate reasons. Even if the idea of Antonio Averlino’s connection to Firenze is too strong for some of you, the connection between Italian Cisiojani and St John the Baptist may still be worth pursuing, as we’ll see next.

Nicola De Nisco’s Cisiojanus

In the same way that Jesus’ birthday is celebrated near the Winter Solstice (the shortest day of the year), St John the Baptist’s birthday is celebrated near the Summer Solstice (the longest day). And so it has been widely suggested that both attributed birthdays offered Christian hooks to hang pagan festivals from (and there seems to be no obvious reason in the Bible why John’s birthday should be celebrated then). Hence in many places in Europe (not just Firenze), the Feast of St John the Baptist was a three- or four-day long affair, arguably more akin to a pagan summer festival.

Hence if we suspect that the labelese text in the Voynich’s zodiac section is some kind of vernacular Cisiojanus, there should be plenty of good reasons why we should look for the Feast of St John the Baptist.

For June (which German calendars typically link with Cancer), De Nisco transcribes one 15th century Italian Cisiojanus as follows:

Nic.mar.cel.qui.bo.ni.dat.me.pri.mi.bar.na.an.ton.
Vi.ti.que.mar.pro.ta.si.san.ctus.io.bap.io.do.le.pe.pau

If we add in De Nisco’s corrections in square brackets, plus additional saints’ names courtesy of that most indispensable of publications, The American Ecclsiastical Review (1901), Vol. 24, plus an 1886 French book which gave me St Dorothy of Prussia), we get:

1. Nic — Nicomedes [original document has “Vic”]
2/3. mar.cel — Marcellus / Marcellinus
4. qui — St Quirino, Bishop of Sisak
5/6. bo.ni — Bonifacius
7. dat — ???
8. me — Medardus
9/10. pri.mi — Primus
11/12. bar.na — Barnabas
13/14. an.ton — Sant’Antonio da Padova
15/16. Vi.ti — Vitus
17. que —
18. mar — Marcus et Marcellianus [original document has “Nar”]
19/20/21. pro.ta.si — Protasius (et Gervasius)
22/23/24/25. san.ctus.io.bap — St John the Baptist
26. io — Johannes (et Paulus)
27. do — (if this isn’t St Dorothy of Montau (Prussia), patron saint of the Teutonic Knights (from 1390) whose actual feast day should be 25th June, who was it? Thanks Helmut Winkler for pointing this out.)
28. le — Leo
29. pe — Petrus et Paulus
30. pau — Commemoratio Pauli

The presence of the much-contested St Dorothy of Prussia (a chronically-self-harming widow from near Gdansk, who was adopted in the 20th century by Catholics for Hitler, if you really want to know) gives us a hint not only to the German origins of this particular Cisiojanus, but also an earliest date (1390). Yet the presence of St Quirino perhaps hints at an itinerary via Hungary (the St Quirino with a 4th June feast died in Szombathely, whereas the St Quirino of Rome had an entirely different feast day): while, as De Nisco points out, the presence of the Feast of Sant’Antonio da Padova points very strongly to a Paduan Ciosiojanus adapter.

More importantly, you can see “san.ctus.io.bap” taking up four consecutive syllables in the Cisiojanus, a fragment of (almost-)plain text peeking through the jumble of syllable fragments that make up the rest. Moreover, the next syllable along is also “io” (for the feast of St John and St Paul), which might also be there for the finding.

All of which could offer an excellent crib for the plaintext lurking somewhere beneath Voynich’s labelese: so might we be able to find some echo of this in the Cancer labelese? Even more remarkably, might we be able to line up this phrase’s syllables with the labelese close to the crowned nymph in Cancer?

(As an aside, I hope you can see that this is the kind of connection that not only wakes Voynich researchers up in the night but also stops them from getting back to sleep.)

The “san.ctus.io.bap” Crib

Firstly, I offer up my own EVA transcription of the Voynich Cancer labels:

Outer ring (from 10:00 clockwise, just around from a gap at the left)

ykalairol
olkylaiin
olalsy
or.aiin.am
os.as.sheeen
otosaiin
opoiinoin.al.ain
ypaiin.aloly
oteey.daiin
oeeodaiin
ofsholdy
opoeey.okaiin

Central ring (from 10:00 clockwise)

olfsheoral
or.alkam
ytairal
oeeesaiin
ory
ochey.fydy
ofais.oeeesaly
ykairaiin.airal
okalar
orary
olaiin.olackhy

Inner ring (from 09:00 clockwise)

oletal
opalal
yfary
osaiisal
ytoar.shar
actho
aral

And then I offer up my thoughts: much as this whole idea got between me and my comfortable bed, I just can’t construct a sensible mapping (even with verbose cipher) between these labels and any of the Cisiojani I’ve seen, whether Latin, Italian, French or whatever.

But then again, I can’t sensibly map these labels to just about anything, language-wise: there’s no structure, or grammar, or variational consistency that offers a way of systematically parsing these labels into a system, let alone reading them. Even the characteristically labelese-like “oletal” / “opalal” / “okalar” / “olalsy” words (I’d perhaps also include “osaiisal”, “otosaiin”, “oeeesaiin” and “ytairal” in this group, and maybe even “ykalairol” and “olkylaiin” too) are only a minority of the thirty labels.

All of which isn’t to imply (as Richard SantaColoma is wont to say) that ‘this can only be a hoax’ (*sigh*), but rather that I think we’re missing something really big here, a rational connecting principle that would give these kind of labels a mutual structure and explanatory context that our theoretical crossbow bolts are flying a mile both over and past. For example, what is the way that we see “es” (411) much more than “er” (28), or “ir” (724) much more than “is” (62) really telling us? Why is almost every single instance of “ssh” not only at the start of a word, but also either at the start of a line or immediately to the right of an illustration in the text?

The recent surge of Voynich research interest in Diebold Lauber’s workshop has come about thanks to Koen Gheuen’s research. Koen’s focus was on the series of drawings in the centre of Voynich Manuscript’s zodiac roundels: and he began by tracing the unusual hand-clasping going on in the Voynich Gemini roundel (which I discussed here previously):

The similarity Koen highlighted between the Voynich Gemini roundel figures and the two frontmost figures in the following drawing from Diebold Lauber’s workshop is striking:

The parallels between the Voynich zodiac roundels and elements in Diebold Lauber’s workshop’s output are both qualitatively and quantitatively striking, not least of which is the crayfish (also highlighted by Koen) which – to the best of our collective knowledge – only appears misdrawn in a particular way (with the crayfish’s legs incorrectly attached to its tail rather than to its body) (a) in a Lauber-illustrated Buch der Natur, and (b) in the Voynich Manuscript’s Cancer zodiac roundel.

Knotty Problems

But there are problems of historical logic to untangle here. The first problem concerns the arms: the two hand-clasping Voynich Gemini figures have their arms crossed over (which is a correct depiction of the medieval ceremony), whereas the figures in Lauber’s drawing (dated 1448-1450) do not have their arms crossed over (which is incorrect). Koen dug up an image from the Werkstatt von 1418 (a different manuscript workshop, but from the same general area) that he suggests might well have been a predecessor to one or both of the other two:

Here, we can see the arms crossed over (which is correct) and a simple neckline (which is the same as we see in the Voynich Gemini roundel). Yet the arms are uncrossed, which is what we see in the Lauber drawing.

Koen proposes that this would make it difficult for the Voynich Gemini figures to have been derived from the Werkstatt von 1418 image, because the arms there were uncrossed, and it would be a little bit odd for the arms to have been recrossed.

Yet at the same time, given that the image depicts a man and a monk, this too is problematic for anyone trying to trace out a line of direct transmission.

It seems likely to me that the plain necklines depicted in all the Voynich roundel drawings that include a clothed human neck are systematic copies of a series of zodiac roundels from a single predecessor German manuscript (which was most likely a calendar). So we can tentatively date the predecessor document as being, say, closer to 1420-1430 (the date of the Werkstatt von 1418 drawing) than to 1448-1450 (the date of the Diebold Lauber drawing).

This gives us, I suspect, a sequence tree something broadly like this:

However, is this lineage compatible with the strangely misdrawn crayfish, which seems to suggest that Lauber’s workshop was somehow involved?

All I can say is that it is possible that the unknown document on the right (that I suspect was the predecessor for both the Voynich Gemini and the 1448-1450 Diebold Lauber drawing) was also from the Diebold Lauber workshop. The earliest known Lauber document is dated 1427 (Köln, Hist. Archiv der Stadt, Best. 7010 (W) 251, signed “Diebold de Dachstein”), and a number of Lauber’s early illustrations may have been by Hans Ott (whose work, the Heidelberg site says, can be found in Strasbourg documents between 1427 and 1449).

I (eventually) managed to track down some drawings from this 1427 Lauber document:

And yes, there are certainly a fair few simple necklines there. So the proposed sequence is still entirely possible, I think. Unless you know better? 🙂

Even though Beale Ciphers B1, B2, and B3 each consist of similar-looking strings of numbers, it’s far from obvious that they have been generated in the same way (i.e. that they all result from using the same cipher system).

Usage Patterns

We can quickly map the usage of the first 1000 index values (I remain a bit suspicious of higher numbers), with the following bitwise key:
* ‘.’ => unused
* ‘1’ => used in B1
* ‘2’ => used in B2
* ‘3’ => used in B1 + B2
* ‘4’ => used in B3
* ‘5’ => used in B1 + B3
* ‘6’ => used in B2 + B3
* ‘7’ => used in B1 + B2 + B3

77773777777757777776775777777376777777777777676777
7766576377737777755577754577317777755555.75777575.
77516774525774757757774525554135276747531.6.143147
42.3..4227.5.4..4..1454.4564.45.4124..1.7.171624.7
515.65574175554565525..51454.7111745.42421.44752.2
52...4...414154...46..247....1..132522.34..1.46.4.
73457..3.444474644475.11.5.5........4..11.46.1.4..
4.2..1...31..55.1..32..44....444.....2.....2..4..2
1.1.22.12.144..541.2..1..1....1..4.1..43......1...
.........55.11.2....1..1..........33........4....1
1...2.....2..................1.......1.3..1....3..
...2..2..........1......2.....33.................2
1131..3...41.1..54.2..11......4...........24..2...
...1.........1.21.......41...1.1.4................
...............14..........1.......1..............
.......1.....................1....................
......2...21.14.41554.11....1..........1....4.....
.....4.1..11.4.......1..1..............5....141...
...........1....411.14.4......1..4.5..............
44.......111..1.........5.........1..............1

From this, we can see that even though the numbers that are used in all three ciphers are biased towards low numbers (e.g. look at all the ‘7’ values at the top), B1 numbers (and to a slightly lesser extent B3 numbers) appear throughout the number range. Furthermore, apart from the numbers near the top, there seems to be no systematic relationship between the usage map of any two pair of ciphers (not even B1 and B3).

And yet we have quite strong evidence that the same enciphering tables derived from the DoI were used for both B2 (which has been solved) and B1 (which remains unsolved). I think this alone is strong evidence that for all their underlying “causal similarities” (for want of a better phrase), B1 and B2 were not generated by the same ciphering system.

Note also that the map shows runs of adjacent indices that appear in only one of the three ciphertexts (e.g. “4444” in B3) or that appear in both B1 and B3 but not in B2 (e.g. “55555”). However, these look broadly within the range of normal randomness, so I doubt these are highlighting anything unusual.

Jarlve’s Incremental Series

In a comment here a few days ago, Jarlve observed that all three Beale ciphers have stretches of numbers that were numerically ordered to a degree that was somewhat unusual. And furthermore:

Testing the significance of these incremental series versus randomizations, then B1 = 4.61 sigma, B2 = 2.72 sigma and B3 = 9.86 sigma.

If we map B1’s “incrementality” (i.e. where ‘.’ => decrement, and ‘*’ => increment), we can indeed see a six-long increment sequence about 60% of the way through, plus a couple of five-long increment sequences. What is just as striking is that the long decrement sequence in B1 is four-long (twice), which points to some kind of subtle asymmetry.

B1:

*.*...**.*.*.*..**.**.***.**.*.**.**.*.**..***..**
.*..**.*.***...*.**..**..**.*..*.*.*.***.*..*..***
..*.*.*.***...***.*.**.***.*..*..**.****.*.**.*.**
..*.*..*..*.**.*.***....***.**..***.**.*.*..*.**.*
*.**.**..**.*.*.*..***..***.*.*.*****.**.*.**.*...
***.*..****.*.**.***..*..****..****.*.*.***..***..
*.******.*..**.***.*..*..**...**.*..**.*.*.*.*.**.
*..*.*..*.**.****..*.*..**..*.*.*.*..****..*..**..
**.*..**..***.*.***..**.*..**.**.****.****.*..*.*.
.***....*.***..*..*****.*..*.**..*.*.**...***.*.*.
**.***...*.****..**

Compare this with B2, which has a six-long decrement sequence (about 30% of the way through), and a pair of five-long increment sequences.

B2:

..*.*..***..**..*.*.*.**.**..*..*..***....*.*.**..
*.*..**.**.*.*.**..***.**.*..***.**.*.*.*.**.*.*.*
*.*.**...*...**..**.**.***.*.**..**..***.*..*.**.*
.***.*.*.*.*..*..**..*.***.*.***..**..***.*..**..*
.*.**......*.**.*....*..*.*.***.***..**.*..***..**
.*.*.*..**..*.*.*...*.***.*.**.*.*.**.*.*.**.*.*.*
.***.***.*..**..*.****...*..*.*.**..***.**.*.**.**
.*.*.**.*.*.*..*.*....***.*..*..*..**..**...**.*..
*.*.**.****..**.*..*.**.***...*.*...**.*..*..*.*.*
*.***.**..**.**.*.**.*...*.**..*.*.****.*****..**.
***..*.*..**.*.**.*.*.**..***..**...***.*....*.*..
*.**...***.*.****..*.*.*.*.*..**..**.**..*.*.*.*..
**.**...*..*.*.*.*..***.*.****..*.**..*.*.*..*.*.*
*.**.*..***..*..**...**.*.*..**....*.**.*..*****.*
***.*.*..**.**.*.***.**.*..**.*...**..*..*.****.*.
***..***.***

But all of this in B1 and B2 is almost as nothing to B3’s extremely unbalanced set of increment series, firstly in a patch in the middle (two seven-long increments and two six-long increments) and then in a long patch at the end (where the positive increment sequences are 9, 9, 7, 6, 7, 9, and 6 long). By way of contrast, the longest decrement sequences in B3 are a single 6-long set, and a single 5-long set).

B3:

.*.*..*.**.*.**..***..*.*..*.***..*.*.*..*.*.**.*.
**.*.*.*.*..*..**.***..*.**.****.***.**.*.*.**.***
*.*.*.*...*...**.*.*.**.**..*.**..*.***.*.***..*..
*.***.**.**..*****...*.*.*..****..*....***..*.****
.*****..***...*.*.****.*******..**.*.*.*..**..**.*
***.**...**..*..**.*.*.***.**.**.****.****.******.
***..****.**...*.*.**..*.***.*******..*...**.*****
*.**..*.*.**.*.***.*.**..*.*.**..*****..***.**..*.
***.**.****.****.*.***.*...**...**.*......*.*..**.
**..*.*****.****.*****.*.*.*.*.**.*.*....*.*.*****
****.*********..**.**.*******..**.*..******.*.****
..*.**.****.*****.....*.**..*******.****..*.*.***.
.*********.******

Putting All This Together

I think Jarlve’s incrementing series perhaps offer a quite different dimension to what Jim Gillogly (perhaps better known for breaking parts of the Kryptos ciphers) mused in his “Dissenting Opinion” on the Beale Ciphers, where he opined:

I visualize the encryptor selecting numbers more or less at random, but occasionally growing bored and picking entries from the numbered Declaration of Independence in front of him, in several cases choosing numbers with an alphabetic sequence.

Whereas this loosely seems to fit B1 (where mysterious alphabet-like strings do indeed appear, but which require the cipher table used in B2 to have been used in a different manner), the immediate problem is that it doesn’t really capture what happens in B3 (where no mysterious alphabet-like strings appear if you apply B3’s index values to the DoI) at all. There, (thanks to Jarlve) we can say that the same encryptor seems to have instead chosen numbers with a strong bias towards incrementing numeric series.

But why would that be?

“Among other revelations, he discovers it was a treatise on Spacesynth“, says the author of the following video, Hagar Hogan. I’m not sure if that actually helps explain it, but it may possibly be some kind of starting point. For some people.

This has taught me a lot about the relationship between Mario and Luigi and the Voynich Manuscript. But probably more about where the volume dial is on my speakers.

Of course, readers might consider that the above is a waste of time, and that I should instead use my blog as a platform for discussing serious-minded Voynich videos by earnest researchers.

Here, it has to be said that I’m specifically thinking of “Mystical Voynich Manuscript Interpretation – Part 1” on the ‘High Elven Wisdom And Love’ YouTube channel. Its author is “an empath […] an elvenkin […] a soul that expresses themself as an elf in this lifetime”, and who wants to post 45-minute videos on the powerful energy behind the Voynich Manuscript.

Me, I’ll stick with Mario, if that’s ok with you. 😉

By now, everyone and his/her crypto-dog must surely know that the second Beale Cipher (“B2”) was enciphered using a lookup table created from the first letters of the words of the Declaration of Independence: that is, a number N in the B2 ciphertext corresponds to the first letter of the Nth word in the DoI.

Even working out that this was the case was far from trivial, because the version of the DoI used was non-standard, and there were also annoying numerical shifts (which strongly suggest that the encipherer’s word numbering messed up along the way). There were also a few places where the numbers in the B2 ciphertext appear to have been miscopied or misprinted.

Yet I don’t share the view put forward by some researchers that this would have made it nigh-on-impossible for anyone to figure out that the DoI had been used, simply because most of the number instances are low numbers, i.e. they are concentrated near the front end of the DoI where there are fewer differences with normal DoI’s, and before the numbering slips started to creep in. This means that even if you used nearly the right DoI, a very large part of the ciphertext would become readable: and from there a persistent investigator should be able to reconstruct what happened with the (not-so-straightforward) high-numbered indices to eventually fill in the rest of the gaps. Which is basically where Beale research had reached by the time Ward’s pamphlet was printed.

So far, so “National Treasure”. But this isn’t quite the whole story, because…

B1 Used The Same Table!

Even if we have so far failed to work out precisely how B1 was enciphered, we do also know something rather surprising, courtesy of Carl Hammer and Jim Gillogly: that the process used to construct B1 used almost exactly the same DoI used to encipher B2. Jim Gillogly, in his famous article “The Beale Cipher: A Dissenting Opinion” [April 1980, Cryptologia, Volume 4, Number 2, pp.116-119, a copy of which can be found in the Wayback Machine here] concluded that the ‘plaintext’ patterns that emerged from this were artificial nonsense, and so B1 (and by implication B3) were empty hoax texts, i.e. designed to infuriate rather than to communicate.

From the same evidence, Carl Hammer concluded (quite differently) that B1 and B2 were encrypted in the same way using the same tables, though he didn’t have a good explanation for the mysterious patterns. For what it’s worth, my own conclusion is that B1 and B2 were encrypted slightly differently but using the same tables, which is kind of a halfway house between Gillogly’s coglie and Hammer’s clamour. 😉

All three agree on this: that if you plug the DoI’s first letters into the B1 ciphertext, mysterious patterns do appear (more on those shortly). But for many years, my view has been that Gillogly’s end conclusion, though clear-headed and sincere, was both premature (because I don’t believe he had eliminated all possible explanations) and unhelpful (because it had the possibly unintentional effect of stifling nearly all subsequent cryptological research into the Beale ciphers).

Regardless, it seems highly likely that almost exactly the same DoI was used to construct B1 as was used to encipher B2. This is because the statistically improbable mysterious patterns only emerge in the B1 plaintext if you use the DoI.

Furthermore, what I think is quite striking is, as I pointed out some years ago, that if you use the corrected cipher table (i.e. the cipher table generated from the same DoI and using the same numerical mistakes as were used in the cipher table used to construct the B2 cipher text), the mysterious patterns not only remain, but become even more statistically improbable than before.

What this implies, I believe, is that not only was the same non-standard DoI used in both, but also the same enciphering tables derived from it, numerical errors and all.

Here’s what B1 looks like when combined with the raw DoI (numbers above 1000 map to ‘?’)

s c s ? e t f a ? g c d o t t u c w o t w t a a i w d b i i d t t ? w t t a a b b p l a a a b w c t
l t f i f l k i l p e a a b p w c h o t o a p p p m o r a l a n h a a b b c c a c d d e a o s d s f
h n t f t a t p o c a c b c d d l b e r i f e b t h i f o e h u u b t t t t t i h p a o a a s a t a
a t t o m t a p o a a a r o m p j d r a ? ? t s b c o b d a a a c p n r b a b f d e f g h i i j k l
m m n o h p p a w t a c m o b l s o e s s o a v i s p f t a o t b t f t h f o a o g h w t e n a l c
a a s a a t t a r d s l t a w g f e s a u w a o l t t a h h t t a s o t t e a f a a s c s t a i f r
c a b t o t l h h d t n h w t s t e a i e o a a s t w t t s o i t s s t a a o p i w c p c w s o t t
i o i e s i t t d a t t p i u f s f r f a b p t c c o a i t n a t t o s t s t f ? ? a t d a t w t a
t t o c w t o m p a t s o t e c a t t o t b s o g c w c d r o l i t i b h p w a a e ? b t s t a f a
e w c a ? c b o w l t p o a c t e w t a f o a i t h t t t t o s h r i s t e o o e c u s c ? r a i h
r l w s t r a s n i t p c b f a e f t t

Of the many artificial-looking sequences here, the one that caught Hammer’s and Gillogly’s eyes was:

a b f d e f g h i i j k l m m n o h p p

If we instead plug the same set of B1 numbers into the corrected DoI cipher table, this is what you get:

s b s ? e t f a ? g c d o t t u c w o t w t a a i s d b t i d t t ? w t f b a a b a d a a a b b c d
e f f i f l k i g p e a m n p w c h o c o a l l p m o t a m a n h a b b b c c c c d d e a o s d s t
b n t f t a t p o c a c b c d d e p e t p f a b t h i f f e h u u b t j t t t i h p a o a o s a t a
b t t ? m n m p a a a a r b o p j d t f ? ? t s b c o h d a f a c p n r b a b c d e f g h i i j k l
m m n o h p p a w t a o m b b l s o e s a t o f i s p c t a o l b t f l h d o a h g b w t e n c l c
a s s a a s t a t d t g t a w g f e a a o c a a a t t w h t t t a a o e t s a f a a s b s t c i h r
c a b t o t s c t d c n h w t s t e h i o o a t s t w t t s o f a a s t a a m s i w c p c w s o t l
i n i e e i t t d a t t p i u f a e r f a b p t c t a o i d n a t t o a t s t a ? ? a t m a t w n w
t t o c w t o t p a t s o t e b a t r c h b t o g a w c d r o l i t i a h l w a a s ? b c s t a f a
e w c m ? f t o w l t s o c c t e w t a f o a o w t t t t t o t h r i s u e o h a c u a f ? p o i h
r m s s t r a s n i t p c t u o w f t t

This yields even more mysteriously ordered patterns than before:
* a a b a d a a a b b c d e f f i f
* a b b b c c c c d d e
* a b c d e f g h i i j k l m m n o h p p

Sorry, Jim, but something is going on there to cause feeding B1’s numbers into the refined DoI to produce these patterns: and even if I agree that the rest of the Beale pamphlet is a steaming heap of make-believe Boy’s Own backfill, I still don’t think the B1 ciphertext is a hoax. There’s just too much order.

Filling In The Gaps

Now, if it is true that exactly the same cipher table was used to construct both B1 and B2 (and though I believe this is highly likely, I have to point out that this remains speculative), these mysterious patterns may offer us the ability to advance our understanding of the cipher table yet further. This is because we can look at those places where the mysterious patterns break down in mid-sequence, and use those places to suggest corrections either to the table or to the B1 ciphertext itself. That is, even if we can neither decrypt nor understand B1, we can still use its mysterious plaintext patterns to refine our reconstruction of the enciphering table used to construct it and/or our understanding of the B1 ciphertext itself.

150=a 251=a 284=a 308=b 231=b 124=c 211=d 486=e 225=f 401=f 370=i 11=f

370=importance BUT 360=forbidden, so I suspect that 370 may have been a copying slip for 360.

24=a 283=c 134=b 92=c 63=d 246=d 486=e

283=colonies BUT 284=and, so I suspect that 283 may have been a copying slip for 284.

890=a 346=a 36=a 150=a 59=r 568=b

59=requires, but I’m not sure what happened here.

147=a 436=b 195=c 320=d 37=e 122=f 113=g 6=h 140=i 8=i 120=j 305=k 42=l 58=m 461=m 44=n 106=o 301=h 13=p 408=p

301=history BUT 302=of, so I suspect that 301 may have been a copying slip for 302.

OK, I’d agree this isn’t a huge step forward: but given that the printed version of (the solved!) B2 has seven similar copying slips…

* B2 index #223 is ’84’, but should be ’85’
* B2 index #531 is ’53’, but should be ’54’
* B2 index #571 is ‘108’, but should be ‘10,8’
* B2 index #590 [#591] is ‘188’, but should be ‘138’
* B2 index #666 [#667] is ‘440’, but should be ’40’
* B2 index #701 [#702] is ’84’, but should be ’85’
* B2 index #722 [#723] is ’96’, but should be ’95’

…I’d expect that we’re likely to have between 10 and 20 copying slips in B1’s series of numbers. That, combined with the larger ratio of homophones (i.e. as compared with the size of the ciphertext), keeps pushing B1 out of the range of automated homophonic ciphertext solvers. So all we can do to try to correct for those may well be a help!