Thanks to a tip from the ever-busy Mark Knowles, here’s a recent presentation by Lisa Fagin Davis on the Voynich Manuscript to the University of Toronto’s Medieval Studies department:

She notes that the first 14 minutes (it’s about an hour and a half, including the Q&A) should be familiar to most Voynich researchers, so feel free to fast forward to there without missing anything new.

So: is there anything new?

Well (and inevitably), yes and no. The recent Yale X-ray fluorescence imaging of folio 1 (it’s an X-ray, so you see both sides of the folio) is certainly interesting. For example, it’s good to know for sure that (probably) Marci’s ink down the right-hand side of f1r (the attempted decryption column) is zinc-heavy rather than iron-heavy, and that Wilfrid Voynich used a sulphur-based reagent to try to bring out Sinapius’ (not “Tinapius”, sigh) marginalia. But that’s only really an imaging confirmation of what Voynich researchers have collectively thought for 20+ years, there hasn’t really been much disagreement around that aspect of the manuscript’s materiality.

She also reported on an ongoing project to use the receding size of the waterstains at the top of lots of the early pages to (weakly) predict the original quiration / nesting order of the bifolios. No strong results yet, but work is still ongoing. My prediction about the prediction (I looked at this topic 20 years ago): it’s too weak to really be sure, but perhaps it will produce results that can be combined with other results.

The big news, though, is what she didn’t say. I remember asking Lisa several years ago about why she – a codicologist – hadn’t taken on what I considered then (and, to be fair, still do) the Voynich Manuscript’s #1 codicological challenge, which was to reconstruct the original page/folio/bifolio order/nesting. (I recall calling this “the Everest of codicology”, for what it’s worth.) She basically slapped me down, saying that this was a waste of time, and that it would not produce any worthwhile results. I remember thinking at the time that this sounded like the worst example of codicological reasoning I’d heard for a long time. But now – mirabile dictu – she’s citing Glen Claston and me, e.g. trying to test our hypotheses about Quire 13 (Q13A and Q13B) and Quire 20 (Q20A and Q20B). So if it is a codicological rabbit hole I’ve been down for decades (since long before the Frascati meeting), I at least now have some esteemed company.

To be fair, she did invest a little bit of time in the presentation rubbishing my Curse of the Voynich reasoning that (at least) one of the bifolios in Q13 has been bound back to front (or inside out, depending on how you look at it). But because my reasoning there was flawless, I can only deduce that her evidence against it is marginal (and wrong). *laughs*

The problem with the presentation (and there is indeed a problem) is that she’s been trying to use text similarity metrics (you know, the same kind of thing that Rene was compiling 20+ years ago) to predict page adjacency, which I’m really not sure has the kind of predictive strength it would undoubtedly have when applied to Vincent of Beauvais’ Speculum, or indeed any text you can actually read and understand. We have reconstructed so little of the way the Voynich was constructed that I think this is wobbly in the extreme: were the bifolios written free-standing (i.e. one at a time), or folded into gatherings? If the text was enciphered, is the text analyis picking up encipherment artifacts or underlying text artifacts?

Really, my opinion is that while the text similarity metrics are pretty good for broadly clustering pages together, they’re extremely shaky as codicological support (if you’ll forgive the pun).

In the end, LFD’s presentation swings round to the hypothesis that maybe Q20 (and indeed many other parts of the Voynich Manuscript) was originally a bundle of “singulions” (a fairly rare term meaning ‘a single-bifolio gathering/quire, I’d personallly have preferred “singletons”), i.e. that it had no nesting structure at all. This is, of course, quite bold, but because it rests on a wobbly foundation of text similarity metrics, I’m not at all comfortable. It’s new, it’s interesting, but given its reliance on wibbly stats, is it really codicology? Personally, I think not, but it may yet point the way to future real codicology. Perhaps this is the start of something interesting, but caveat lector nonetheless (who was Hannibal’s bookish brother).

Nick’s own commentary

There are a few places in the Voynich Manuscript where we can see drawings going from one side of a bifolio to another, most famously in the balneological quire Q13, which has water flowing from one side to the other on two halves of a bifolio that it seems safe to say was probably at the middle of a gathering in the original unbound state. But if everything is singulions, this means nothing at all. Still, we can all look forward to the peer-reviewed paper on the subject. (Reviewer #2 says hi.)

Another example that doesn’t get a lot of online love is between f33v and f40r: here you can see the drawing extending slightly over the bifolio centre (and also the ‘heavy’ blue paint leaching into the pages now bound opposite both of them). Does this mean that the f33-f40 bifolio was originally the centre of a gathering/quire, or was this just a byproduct of the way that the bifolios were (hypothetically) written unbound? This is the kind of difficulty you face when trying to do codicological reasoning to try to reduce the vast combinatorial space to something more reasonable, and progress has been slow.

Looking for contact transfers of ink or paint (and I don’t think the blue paint tells us anything useful) remains one of the few non-text-based avenues that yield anything, but without spectrography this is still difficult. For example, did the red paint mark on the top left f27r come from f53v or even from f87v, or was it just a stray drip? Multiply that uncertainty by a thousand, and only Bayesians will still be happy.

Personally, I still think that cross-referencing the DNA of the bifolios stands a good chance of massively reducing the search space, and that this is one of the few genuine routes that codicologists such as LFD should be pushing for. Of course, there’s a (tiny) chance that this will tell us nothing, but I have to say that I remain mystified that LFD remains so dead against it (and I thought her codicological reasoning there was extraordinarily suspect). Perhaps in a decade’s time she’ll join me down that rabbit hole as well, who knows?

For fun, I recently went looking for films that contained images of ciphertexts that could actually be cracked. Of course, plenty of films include plausible-looking ciphertexts, but I had no idea whether any took audience interest in code-breaking seriously enough to do it ‘for real’.

I was therefore pleasantly surprised to find “Cipher Bureau” (1938), a nice little (one-hour-long) film that not only shows you some ciphers on screen, but also (kind of) breaks them in front of your eyes. And it’s available for free (and without YouTube ads) on the most excellent Internet Archive.

But what of the ciphertext?“, I hear you cry. So here it is (barring any slopying cips on my part):

1.  PRRAHEHO
2. ALBTMIRS
3. EEASENSU
4. SHLWMMHN
5. TRVEMDTG
6. NTAOORTE
7. EEYWAYRH
8. AMVRCIYD
9. RAOELOUO
10. LOAREFRR
11. JDFWOUCU
12. PRNORNEA
13. AYFINITR
14. EFEBDOVG
15. CFILGMID
16. HRHONCIL
17. KOCLTMDE
18. TETTAYLA
19. AREAHENC
20. OFOEHLEY
21. ETHRIDSK
22. LSTGTEDO
23. LRERSIFE
24. SNENATRR
25. OARAPAOR

Of course, you can choose either to break this yourself (a luxury nobody had in those pre-video recording days), or to just watch the film and watch the protagonists break it (starting from around 24:00). But to be fair, you don’t have to be the very talented Tony Gaffney to pretty much read this cipher off the page. (I hope that’s not too big a hint that’s it’s a tionsispotran hercip.)

Personally, I enjoyed the film almost as much as Joan Woodbury appeared to enjoy playing Therese Brahn. Oh, and the Jason Robards in the film is actually Jason Robards Senior, who had a stalwart Hollywood career long before his son joined in on the fun.

PS: I’ll cover another fun cipher from this film in a separate post. And I’ll cover the sequel (“Panama Patrol”) separately too.

I’ve spent twenty-odd years thinking about the mystery of the Voynich Manuscript’s gallows glyphs; and I thought I’d post about how I believe these glyphs evolved. Whether or not I’m right probably doesn’t matter much, because I suspect I may be the only researcher looking at this particular mystery.

The only similar attempt I can recall was when Steve Ekwall posted about the “folding key” (that had been revealed to him by an Excitant Spirit), plus his other page here. What I’m doing here isn’t remotely like that, but seeing as nobody has mentioned Steve in a decade or more, I thought his pages could do with a bit of link love.

My Core Beliefs (About Voynichese)

Cryptographically, my core beliefs about how Voynichese happened are:

  • Voynichese did not appear ex nihilo (it’s far too sophisticated and tricky)
  • Rather, it was an evolution and a merging of earlier fifteenth century cipher systems / tricks
  • If we look carefully, we can catch glimpses of those earlier cipher systems / tricks
  • Its structured glyph patterns point away from mid-fifteenth century homophonic ciphers
  • Instead, its small cipher alphabet points to other tricks, e.g. steganography and transposition ciphers
  • As far as arbitrarily complicated transposition ciphers go, there is a single reference (in Alberti), but we have no matching transposition ciphertexts or other contemporary references to rely on

As far as what the other component cipher systems might be, my inference has long been that one of them was originally a verbose (paired glyph) cipher designed to steganographically conceal the visual presence of Roman numbers. For example, if CLXVI were each encoded as or [C], ol [L] / am [X] / al [V] / ar [I], the number LXXXVII would encode as olamamamalar. Note: this may not be quite how it ended up being used in the Voynich Manuscript, but my guess is that this is where these verbose pairs came from.

What, then, of the gallows glyphs? Where did they come from, and what happened to them along the way? These are the kinds of questions this post is trying to answer (however imperfectly).

Oh, and before I launch into the different evolutionary stages, my core belief is that the gallows glyphs have retained their original shapes throughout all this, but that their function has expanded and developed. Just so you know.

Evolution #1 – Cipher Alphabet Selector (x2)

In the first evolution, I believe there were exactly two gallows glyphs, and that they had the same shapes as the Voynich Manuscript’s EVA t and EVA k. These would have been used only in the first character of a paragraph of ciphertext to indicate one of two cipher alphabets to use, visually concealed as a scribal flourish. We still see echoes of this earliest evolution in Herbal A pages (but mainly p-glyphs), such as the page-initial glyphs on f8v (EVA t) and f27r (EVA k):

The specific reason I think this is because of their shapes: I believe the shapes of these glyphs signalled to the decipherer not only which of two cipher alphabets to use, but where on the cipher ledger page to look for that cipher alphabet. That is, the cipher ledger page for the overall cipher would have contained two ciphers, one written out horizontally (EVA t) and one written out vertically (EVA k).

In a way, this would have been like an early homophonic cipher, but crossed with steganography. It feels like a branch of cryptography that had not yet hit its mid-fifteenth century stride, but as an evolving practice of secret writing whose history had yet to be written. Hence I’d tentatively date this first layer to the 1420s or maybe the 1430s.

Have I or anyone else seen a page of a cipher ledger with both a horizontal cipher key and a vertical cipher key? No, I don’t believe so: but nonetheless I still believe this was the first stage of the glyph evolution.

Evolution #2 – Fake Cipher Alphabet Selector

The next evolution introduced fake cipher selector glyphs at the start of paragraphs and pages – EVA p and EVA f. I believe that this usage is a feint, designed to make code-breakers suspect (wrongly) that the ciphertext they’re trying to crack uses the older cipher system: and that this is exactly what we see in the Voynich Manuscript.

But… why introduce fake cipher selector glyphs at all? My belief is that the cipher creator introduced the (stage 2) fake gallows glyphs to replace the (stage 1) original gallows glyphs, because they wanted to reuse the original glyphs for a different (but related) cryptographic trick, which we’ll see in the next section.

Also: I believe this second stage implies that the cipher creator had shown the first evolutionary stage to multiple potential patrons, in an attempt to sell his cryptographic / intelligencer services to them: or else there would have been no need for tricky misdirection. So I believe this tells a story not of a complete outsider, but rather of someone on the periphery of one or more fifteenth century courts, trying to use their cryptographic smarts to gain patronage.

Evolution #3 – EVA k = Vertical Transposition Cipher Token

In this third evolution, EVA t still referred to a horizontal cipher key and EVA k still referred to a vertical cipher key. That is, the glyph shapes retained the original visual cue to where on the page to look for the key, but the keys had moved to a new place (and on a new page).

So, where are these putative keys? I’ll start with the vertical key: it’s the first token (which might be a glyph or a glyph group) inserted at the start of each line. The idea that there is some kind of insertion going on at the start of lines is an idea that has been floated for decades, e.g. supported by statistical studies indicating that the first word of a line is normally a little longer than the second word. This of course plays havoc with vocabulary (because it yields lots of unique words) and any proposed explanatory grammar (because line-initial words mess up nice neat models).

All the same, few have proposed explanations as to what this vertical key might be for. Philip Neal in particular talked about this a lot: in his honour, these letters are often described as a “vertical Neal key”, though I believe he never felt comfortable hypothesizing about what that might mean cryptographically.

Me, I’m far more comfortable with hypotheticals, because otherwise we keep on hitting Wittgensteinian “whereof walls”. Here, my hypothesis is that EVA k is a transposition token that decipherers should replace with the token inserted at the start of the line. This makes this mechanism it very much a transposition cipher, but rather than a rail-fence cipher (which kind of relies on seeing letters as movable type, and is therefore more of a post-Gutenberg transposition cipher) it is a line-centric transposition cipher.

For an encipherer, then, the sequence would be something like this:

  • Scan though the whole of a single plaintext line
  • Find the (I imagine) single consonant that appears the most on that line
  • Insert an enciphered version of that letter at the start of that line
  • All instances of that letter within the line would then be replaced by EVA k

Let’s try this on a concrete example:

TO SLEEP PERCHANCE TO DREAM AY THERES THE RUB
FOR IN THAT SLEEP OF DEATH WHAT DREAMS MAY COME

OK: the most common consonant in the first line is R or T (four times each), and in the second line T (four times). So, replacing the first line Rs and the second line Ts with $ (standing in for EVA k) gives:

RTO SLEEP PE$CHANCE TO D$EAM AY THE$ES THE $UB
TFOR IN $HA$ SLEEP OF DEA$H WHA$ DREAMS MAY COME

Now, on its own, this cipher trick is far from fearsome: but when arrayed as one of a carefully chosen set of cipher tricks, I think it can be quite the monster.

Evolution #4 – EVA t = Horizontal Transposition Cipher Token

Whereas the third stage was a line-centric transposition cipher (i.e. you didn’t need to look beyond the current line to encipher or decipher the text), this fourth evolution is a paragraph-centric transposition cipher. What that means is that a horizontal key is concealed somewhere in the paragraph, and that each time a decipherer encounters an EVA t in the text, they replace the EVA t with the next token along from the horizontal key.

OK, so where is this horizontal key? There seems little doubt to me that it will always be found somewhere on the top line of a paragraph. My suspicion is that in the earliest iterations of the cipher, this horizontal key may well have been placed right at the start of the paragraph. But as time went by, this was seen as a weakness, and so the encipherer would have needed to (what code-makers call) “bury” it inside. (For example, Typex used “buried codresses”, though this always sounds to me like an elaborate fish funeral.)

So, where on the top line of a paragraph should we be looking for these horizontal keys? In my previous post, I went looking for model-unfriendly long words: two of these (highlighted by Mauro) were in Q20 on the top line of paragraphs – chkaidararal on f115v, and shoefcheeykechy on f104v. These could very easily be horizontal keys, right? While that’s indicative, that’s really not systematic enough.

Once again, Philip Neal possibly comes to our rescue. One Voynichese behaviour he has long been intrigued by is the presence of pairs of words on the top line on paragraphs where both words contain EVA p. Philip wondered whether these pairs might somehow be signalling or bracketing a key phrase of some sort: though, as before, he remained hesitant about lurching forward from there into some kind of cryptographic hypothesis. But all the same, it has to be said that these p-paired horizontal Neal keys feel a lot like some kind of metatextual feature, whether a concealed title, or colour hint or what.

Whatever the actual explanation for these Neal keys, they feel almost consciously designed to disrupt nice neat statistics and/or linear language hypotheses about Voynichese. For if you take out all the paragraph-initial EVA p instances, as well as all the EVA p instances in p-paired horizontal Neal keys, then the number of EVA p instances remaining in the text drops down to almost none.

So… where exactly on the top line of a paragraph are the keys? What is the tell for a cipher key? I… don’t know. Yet. But I continue to look. Today I’m wondering whether I might be able to work backwards from odd words like chkaidararal and shoefcheeykechy to understand the visual cues on the page placed there to help a decipherer see the key. And the final answer may well have something to do with horizontal Neal keys. Hopefully we’ll get there before too long.

Evolution #5 – Where Transposition Doesn’t Work

A key problem with these two transposition ciphers is that they rely on you having neat lines and neat paragraphs to embed keys in. But what about pages built around circular diagrams? Here there is neither an obvious top line, nor an obvious line-start to insert before. So I believe a different kind of key would be needed.

For what it’s worth, I believe that an additional verbose cipher was introduced for these pages: ok / yk / ot / yt. Just to make things difficult for you. So I therefore think that “ok” is a verbose cipher, but “k” is a transposition cipher. But I might be wrong.

OK, So Where Next With All This, Nick?

I first suggested much of the above in “The Curse of the Voynich”, nearly twenty years ago: so for a fair few Voynich researchers this is far from breaking news. All the same, there’s lots of other stuff here that is new, so I think it was worth bringing the thread a bit more up to date.

Really, the big ‘where next‘ step here is simply to see if there’s some kind of visual cue (or an evolving set of visual cues) that signals to the decipherer exactly where a horizontal key is buried (e.g. on the top line of a paragraph). But if I’m the only person searching for this stuff, you better not hold your breath waiting for the next update, because it might be some time.

As I posted here a few days ago, it’s possible that unusual-looking (and probably longer) Voynichese words or phrases are actually unusual plaintext words (perhaps proper names) that needed to remain unabbreviated in the ciphertext, because they were so much less predictable than the rest of the words.

So: who has previously gone looking for unusual plaintext words? The indefatigable Byron Deveson helpfully pointed to a long 2025 comment chain on Voynich Ninja started by Rafal [Prinke], which ultimately harked back to a list compiled by Jorge Stolfi many years ago. (Which was probably the list I was thinking of in the first place.) Rene Z’s favourite ‘bad’ Voynichese word is certainly quite a stinker:

Stolfi’s list yields such words to play with as:

  • chesokchoteody [f68r1, outer ring, near the bottom]
  • oepchksheey [f93r, top line, but looks like half of a Neal key]
  • qoekeeykeody [f105r, which I’d note is possibly the original first page of Q20A]
  • soefchocphy [f102r2, right edge, but right on the fold, very hard to read]
  • ykcheolchcthy [f68v3, first word of second line]
  • shdykairalam [f106v, last word of a line]
  • shetcheodchs [f43v, first word of a line]

and so forth. Mauro’s post in the thread suggested other annoyingly interesting words:

  • cpholteedycfhoepaiin [where is this?]
  • chkaidararal [f115v, near the end of the top line of the penultimate paragraph]
  • shoefcheeykechy [f104v, near the start of the top line of the penultimate paragraph]
  • psheykedaleey [f41r, first word, so initial ‘p’ is probably spurious]
  • opalkechckhy [f50r, bottom line, might possibly be part of a floating ‘title’]

All of this was very helpful, because it made me grasp that what I’m looking for isn’t just non-model-friendly words, but longer words that kind of ‘muck up’ the normal (I suspect abbreviated) system we have all got so used to looking at over the years.

Mark Knowles wondered in this thread whether such unusual Voynichese words might well be enciphering real words, while all the other (more ‘conventional’, rule-bound) Voynichese words are just filler: but this seems unnecessarily pessimistic to me.

As an aside, I’m very receptive to BlueToes101’s suggestion of “olaiior oloro eeeoly” at the bottom of f23v as being an interesting block. Given that this has more half-spaces than spaces, I would agree – from the positioning – that it could easily be a signature / attribution. Though with my Voynichese modelling hat on, I might speculate whether this should have read “ol ainor olory cheoly” (i.e. copyist’s fatigue):

I half-remember two other suspicious word blocks I found years ago, one in a long (fake star?) paragraph in Q20 and the other somewhere in Q19. But searching Cipher Mysteries hasn’t helped me find them: I’ll look another day when it’s not quite so stiflingly hot here.

The key issue here is that I think I need to look at each of these curious long words in context. Some of them may just be two or more words rolled into each other: others are certainly not so easy to explain away.

I’ve just thought of this trick, and I don’t remember anyone suggesting it before. So here goes…

I’ve long suggested that the Voynich Manuscript was written using a combination of the latest (for the 15th century) techniques – abbreviation, verbose cipher, steganography, etc. And (I believe) a good part of the practical problem that this combination of techniques presents to codebreakers is that our analytical tools often assume that these techniques only happen one at a time: and also that they don’t interfere with each other.

Specifically, I strongly believe that Voynichese contains many verbose cipher pairs (qo / ol / al / or / ar / am) and even some verbose cipher blocks (ain, aiin, aiiin, air, aiir), and that the expansion this introduces is largely counterbalanced by abbreviation – truncation (“truncatio”) and contraction (“contractio”). There are a ton of other annoying tricks (e.g. horizontal Neal keys, vertical Neal keys, line-final -m, etc), but verbose cipher and abbreviation are arguably the Big Two.

Now… abbreviation is all very well, but as a technique it relies on the plaintext being very predictable. While this is true for normal text, what I’m pointing out is that there are always going to be a handful of places where an unpredictable name or string pops up in the plaintext, one that the encipherer isn’t convinced that the decipherer will know (even if the encipherer and decipherer happen to be the same person).

In the same way that cartouches highlighted the names of Pharaohs in the Rosetta stone (which led to hieroglyphics being deciphered), perhaps we can use statistics to identify unpredictable-looking blocks of letters. What I’m proposing here is that I suspect such blocks – virtual cartouches, if you like – may well be enciphering unpredictable names or strings in the plaintext. To be fair, I don’t believe that there are more than 10-15 of these scattered through the text: but all the same, this might be a hugely productive place to launch a fresh kind of cryptological attack from.

Now, I have a vague memory from 20-odd years ago of a heroic ‘Voynich whisperer’ who went out of their way to identify unpredictable looking blocks of text. I don’t believe it was Glen Claston (Tim Rayhel), but I might be wrong.

Can anyone remember who this was? Or has someone perhaps repeated the same process more recently? I don’t want to launch into this myself if someone has already done this. Thanks!

As most CM readers will know, it’s widely considered that the greatest (unsolved) cipher mystery is the Voynich Manuscript. However, I’ve long wondered whether this might actually run a rather poor historical second to John Dee’s works of “angelic magic”. Whereas the Voynich Manuscript only has a ragtag bunch of cryptologists (a group I am proud to be a member of) poking at its edges, for more than a century John Dee’s mysterious work has inspired all manner of quasi-religious Enochian followers to do all manner of magickal ceremonies. Big difference, huh?

From Hooke onwards, people have suspected that John Dee – who was utterly gleeful when he finally managed to get a copy of Trithemius’ Steganographia – was not a magician/magus but a cryptographer/spy (or maybe a wannabe cryptographer/spy). And yet these days, this view has largely faded away: and even modern histories of Dee seem condemned to go round in (magic) circles.

Dee’s Tabula Angelorum Bonorum 49 (fol. 51r) offers a nice starting point, with seven sets of names associated with each of the seven classical ‘planets’, yielding forty-nine entries:

For fun just now, I transcribed all the names as best I could (by referencing various Enochian websites, I’ve also included the linked weekday and archangel for each):

1	Venus  	B	A	L	I	G	O	N	King	Friday	Haniel
2	Venus  	B	O	R	N	O	G	O	Prince		
3	Venus  	B	a	p	n	i	d	o	Governor		
4	Venus  	B	e	s	g	e	m	e	Governor		
5	Venus  	B	l	u	m	a	p	o	Governor		
6	Venus  	B	m	a	m	g	a	l	Governor		
7	Venus  	B	a	s	l	e	d	f	Governor		
8	Sun    	B	O	B	O	G	E	L	King	Sunday	Raphiel
9	Sun    	B	E	F	A	F	E	S	Prince		
10	Sun    	B	a	s	m	e	l	o	Governor		
11	Sun    	B	e	r	n	o	l	e	Governor		
12	Sun    	B	r	a	n	g	l	o	Governor		
13	Sun    	B	r	i	s	f	l	i	Governor		
14	Sun    	B	n	a	g	o	l	e	Governor		
15	Mars   	B	A	B	A	L	E	L	King	Tuesday	Kamael
16	Mars   	B	U	T	M	O	N	O	Prince		
17	Mars   	B	a	z	p	a	m	a	Governor		
18	Mars   	B	l	i	n	t	o	m	Governor		
19	Mars   	B	r	a	g	i	o	p	Governor		
20	Mars   	B	e	r	m	a	l	e	Governor		
21	Mars   	B	o	n	e	f	o	n	Governor		
22	Jupiter	B	Y	N	E	P	O	R	King	Thursday	Zadkiel
23	Jupiter	B	L	I	S	D	O	N	Prince		
24	Jupiter	B	a	l	c	e	o	r	Governor		
25	Jupiter	B	e	l	m	a	r	a	Governor		
26	Jupiter	B	e	n	p	a	g	i	Governor		
27	Jupiter	B	a	r	n	a	f	a	Governor		
28	Jupiter	B	m	i	l	g	e	s	Governor		
29	Mercury	B	N	A	S	P	O	L	King	Wednesday	Michael
30	Mercury	B	R	O	R	G	E	S	Prince		
31	Mercury	B	a	s	p	a	l	o	Governor		
32	Mercury	B	i	n	o	d	a	b	Governor		
33	Mercury	B	a	r	i	g	e	s	Governor		
34	Mercury	B	i	n	o	f	o	n	Governor		
35	Mercury	B	a	l	d	a	g	o	Governor		
36	Saturn 	B	N	A	P	S	E	N	King	Saturday	Tzaphqiel
37	Saturn 	B	R	A	L	G	E	S	Prince		
38	Saturn 	B	o	r	m	i	l	a	Governor		
39	Saturn 	B	u	s	c	n	a	b	Governor		
40	Saturn 	B	m	i	n	p	o	b	Governor		
41	Saturn 	B	a	r	t	i	r	o	Governor		
42	Saturn 	B	l	i	i	g	a	n	Governor		
43	Moon   	B	L	U	M	A	Z	A	King	Monday	Gabriel
44	Moon   	B	A	G	E	N	O	L	Prince		
45	Moon   	B	a	b	l	i	b	o	Governor		
46	Moon   	B	u	s	d	u	n	a	Governor		
47	Moon   	B	l	i	n	g	e	f	Governor		
48	Moon   	B	a	r	f	o	r	t	Governor		
49	Moon   	B	a	m	n	o	d	e	Governor

Is this all meaningless filler? Well… I’d point out that the middle column of the seven letters (i.e. INngmmlOA etc) is the “least fillerish” by far, with a reasonable character distribution and where the most common letters are ‘m’ and ‘n’. Note that I tried running this column through Cryptocrack in various ways (English patristocrat, Latin patristocrat, governors only, governors only and sorted by days of the week), and nothing jumped out: but that doesn’t mean there isn’t something hidden there.

From my perspective, there’s a strong case to be had that John Dee never needed the Voynich Manuscript to be associated with him for his angelic writings to be seen as not just cryptic, but also cryptographic. And so maybe the biggest mystery here is why nobody (not even Jim Reeds) seems to be even trying to crack Dee’s work.

To the sustained disbelief of my wife, I’ve recently watched all eleven series of The X-Files (they’re available on My4 / Channel 4 catch-up) from start to finish. Though not the films or the Millennium or Lone Gunmen spin-off series (because that would have been really insane).

When I started this, I had the vague idea I might be able to chart how attitudes to Roswell changed over the lifetime of the show. But after a while I realised that Roswell functioned as a foundational nostalgic axis, one which everything rotates around but never really approaches.

But as I got close to the end, I started to wonder more about what role mystery plays in The X-Files. Yet here too I ended up frustrated: the constraints of the show format meant that mystery was only useful as a tactical template. By which I mean: a long-concealed truth yields to a high-speed pincer attack by two research commandos, yet proof is then revealed to be fragile and revocable. Yada yada yada.

Ultimately, the show’s long story arcs aren’t about mystery per se, but are instead extended meditations on childbirth, technocracy, loyalty, betrayal, futility, etc. Conspiracy isn’t the show’s fabric, but the thread holding all the fragments together. It’s a patchwork, sure, but a very well-executed one.

What I came to see about the show is that, in the same way that William Gibson’s cyberpunk universe is locked into the 1980s, The X-Files are locked into the 1960s, with Mulder and Scully a Twilight Zone-coded reprise of John Steed and Emma Peel (the original Avengers cinematic universe), and with the Cigarette Smoking Man standing in for the Technocrats Who Know Best, Bless Them.

What, then, have I learnt about myself from The X-Files? Am I a Fox Mulder, using intuition and crazy hypotheses to battle bureaucracy and indifference to get to the unspeakable truth? Or a Dana Scully, trying to ground everything in science and evidence, but forever let down by the fragility of proof? Or a Walter Skinner, a well-meaning but ultimately ineffective bureaucrat? Or a Lone Gunman (pick any one of three), hacking around the edges but forever succumbing to conspiracy stories? Or their nemesis Morris Fletcher, gleefully putting out unprovable stories to mess with people’s minds? Or even a Reggie Murgatroid, inserting himself in a history he has no genuine part in?

I think it’s telling that I’ve been accused of being all of these over the years. But to be honest, these days I identify more with the various grey aliens that the Syndicate briefly tolerates: misinterpreted, misconstrued and then nonchalantly shot in the head.

Make of that what you will, conspiracy fans.

I’ve previously posted a few times about the Ohio Cipher (e.g. here in 2013, here in 2013, here in 2013, and here in 2014). Having determined what I think the (likely) most reliable version of the ciphertext is, I noted that it seemed to be made up of two substitution alphabets, one for odd-word-position letters and one for even-word-position letters. If you render these letters as upper case and lower case respectively, the ciphertext looks like this (with the apparent English words near the end removed):

WaS NvLvAfT By AaKaT TxPxScK UpBk TxPhN OhAy YbTx CpT MxHg WaE SxFp ZaVfZ AcK TxLk WaYx Za

Some patterns emerge here, which you can see if you load this into zkdecrypto:

On the one hand, this seems a dreadfully short cryptogram to solve with two whole cipher alphabets to find. On the other, I’d point out that it feels like an improvised “folk cipher” (i.e. devised in the wild, rather than by hotshot cipher academics). Hence it could very easily be “aristocratic”, by which I mean that ciphertext word boundaries are also genuine word boundaries in the plaintext, which should (in theory) be millions of times easier to break.

For fun, I put some of the words in the Ohio ciphertext into Quipqiup, and the one that immediately caught my attention was TxPxScK -> “STATION”, which seems hugely plausible. This makes me think that someone with a good idea for how to go about solving this specific kind of cipher might well be able to crack it.

So… what are you waiting for? Go for it!

I’ve just bee(n) reading Gene Kritsky’s “The Quest for the Perfect Hive”, which, though it covers many different sides of apiculture, ultimately focuses on the evolution of hive technology. This, of course, brought me back to thinking about the Voynich Manuscript’s ‘Bee Secrets’ page that I discussed briefly in The Curse of the Voynich.

Back then, I’d wondered whether the page (one of the panels on the reverse side of the nine-rosette page) might have been an enciphered version of Filarete’s book of secrets relating to bees (along with water, machines, agriculture, etc). And so I had discussed the drawings on this page with the tippitty top bee expert Dr Eva Crane (who I’m sad to say died in 2007): she pointed out that the hives apparently depicted there were conical skeps. This is a type of hive thought to have originated in Germany and which beekeepers south of the Alps almost never used (they instead used horizontal log hives).

The Four Skeps

In the top left ‘skep’, the beekeeper might possibly be smoking the bees out of a hole in the top:

In the top right ‘skep’, we see a stylised bird (not sure what this represents) and bees going in or out of the bottom (this is one of those Voynich drawings where we seem to have an original layer and an obscuring layer on top, others like this are in Q13):

The bottom left skep is oddly stylised and apparently multi-stage, and it’s not clear what the beekeeper is doing (perhaps smoking the bees out?). The dots in the body, however, appear to be where the honey / honeycomb would be, so perhaps some kind of honey extraction mechanism is what is intended here:

Finally, the bottom right skep has the mysterious bird again, and again the inner (dotted) honeycomb seems to be exposed:

What Does It All Mean?

Oddly, Dr Crane’s observation hints that this single page might offer us a microcosm of the secret history of the Voynich Manuscript: a German bee-keeping technique, perhaps with a mechanical innovation added by the author, all concealed in plain sight, and being re-presented for an Italian audience. And this doesn’t necessarily have to have anything to do with Filarete (whose personal motto was the industrious bee) for it to be true.

What I learned from Gene Kritsky’s book (pp. 160 ff.) was that accounts of bee-keeping often included “bee calendars”, that told bee-keepers what to do in different months, zodiacal signs, or seasons. And I’m now wondering whether that accounts for the way the writing on this page appears in four directions, i.e. the four seasons of bee-keeping:

In terms of a block paradigm match, therefore, I currently believe the source material for this page will turn out to be an early (1380-1450) account of conical skeps written in Italian (or possibly Latin), derived from Northern European sources (probably German, possibly Swiss), and with four paragraphs corresponding to the four seasons of bee-keeping.

Quick digression: I went into several second hand bookshops a couple of weekends ago, and while I found a few nice historical books to keep me occupied, what struck me was the complete lack of the usual breathless UFO books. In the olden days (i.e. five years ago), these used to fill the shelves, so why are they now so few and far between? Might conspiracy theorists have moved on from UFOs to (who knows?) vaccine, woke, Brexit, Russian political funding, MAGA, Trump, Jewish space lasers, American democracy, doomscrolling? Is Roswell too distant a memory for anyone but me to give a stuff about?

Anyway… one of the big ‘traditional’ focuses of UFO conspiracy theorists is Major Jesse Marcel. It was he who famously went to Mac Brazel’s ranch in Corona NM (near Roswell) where pieces of strange metal foil and curious beam fragments (some with odd writing on) were found. Plenty of books and documentaries have been made featuring Marcel, mainly because he combined a credible straight-down-the-line military career with his firm belief that what crashed near Roswell was, ummm, extra-terrestrial.

Yet another very similar military man went to Brazel’s ranch that day: Counter Intelligence officer Captain Sheridan Cavitt. Relatively little UFOlogical ink has been spilt on Cavitt, perhaps because he combined a credible straight-down-the-line military career with his firm belief that what crashed near Roswell was… ummm, just a balloon. Which would, of course, make for far less juicy books and tabloid headlines.

Still, it’s time to take a look at Sheridan Cavitt, the other well-known military Roswell responder…

Captain Sheridan Cavitt

Perhaps the best place to start is Nick Redfern’s two-part article on Sheridan Cavitt: here’s part one, and here’s part two. The most ‘horse’s mouth’ thing Cavitt said about Roswell was in a May 24, 1994 interview with Colonel Richard L. Weaver, USAF:

“There were no, as I understand, checkpoints or anything like that (going through guards and that sort of garbage) we went out there and we found it. It was a small amount of, as I recall, bamboo sticks, reflective sort of material that would, well at first glance, you would probably think it was aluminum foil, something of that type. And we gathered up some of it.”

As to how large that debris field was, Cavitt asserted that it was “Maybe as long as this room is wide.” And he was sure (he said) that it was “a weather balloon”.

UFO researcher Kevin Randle interviewed Cavitt in 1990: Cavitt told Randle that because in 1947 he was working for the CIC (Counter Intelligence Corps), any report he made would have gone to Washington (there’s a persistent rumour Cavitt wrote a report that has since disappeared). As far as the Roswell incident goes, Randle was sure Cavitt was lying (which he was), and Cavitt was pretty sure Marcel was lying (he probably was). At the same time, Randle pointed out that “Cavitt doesn’t even agree with Cavitt“, so we have to exercise caution when trying to make sense of all this.

But there was in fact a third Army early responder, Bill Rickett. And according to Rickett’s later testimony, it was Rickett and Cavitt who got to Brazel’s ranch first, with Rickett coming back later with Marcel. And that kind of broadly squares with Cavitt saying that he took the stuff he collected from the site with Rickett back to the base at Roswell and handed it to Marcel; and that he thought Marcel claiming that he’d gone to the site first with Cavitt was wrong, and had caused Cavitt a load of problems.

So… what did happen?

On balance, I think that the actual first Roswell responders were probably Sheridan Cavitt and Bill Rickett; and that Jesse Marcel, having been handed debris from the site by Cavitt back at the base, had then gone to the site with Bill Rickett a little later that day. Generally, even though Cavitt wasn’t a particularly reliable witness, I’m a little more comfortable with parts (though, again, not all) of Rickett’s account.

Does that mean that I think Jesse Marcel embiggened his role up in the whole affair, and should really have been recorded as third or fourth or fifth responder? Yes, probably. Really, my guess is that Marcel had told his family stories for several decades about what happened that day, and in the end wasn’t really comfortable untangling that whole knot if that meant reducing his heroic role in the story.

At the same time, Marcel was sure what had been in the field wasn’t a weather balloon, even if Cavitt was: yet if the debris resembled aluminium foil and bamboo, it can’t have had anything to do with Project Mogul, as Cavitt and others later (incorrectly) claimed. I believe they all tried to frame what they saw in terms of what they knew: but what they saw it wasn’t anything that they knew. By which I mean to imply not that it was some kind of ‘alien technology’ (because I’m sure it wasn’t): but rather non-Army technology sufficiently advanced to confuse the heck out of them both (while still not being magic).

Finally, on the matter of the mysterious “bodies” at the other site close to Roswell, Cavitt kept resolutely schtum: but that’s definitely a topic for another day (i.e. not today).

PS: here’s a nice video of Project Mogul balloons being launched, courtesy of the Black Vault. Might one of these have come down on Mac Brazel’s ranch? I really don’t think so, sorry.