Over the last couple of years, Australian researcher Gordon Cramer has been promoting (and indeed gaining a little media attention for) his various theories about the Somerton Man that he has patiently built up over the last four years: for example, that the dead man was a Cold War spy and that the Rubaiyat note contains microwriting.

Specifically, Gordon asserts that he can discern microwriting inside a number of the letters that were found on the back of the Rubaiyat, most notably the letter “Q”.

As I understand it, his claim is that even though the contrasty writing in the image (looks like it) was written in a laundry pen on a shiny surface (say, a print of a photograph), that overwriting process still managed to preserve the fine detail of the original microwriting additively within it: and that by using a carefully chosen sequence of image enhancement steps, he thinks he has been able to reconstruct that original microwriting.

I was sceptical of this claim for many reasons. For instance, it seems hugely likely to me that we can see a small part of the original writing that (one would hope) lies beneath the laundry pen marks…

first-letter

…yet as far as I can see, there is no sign there of any microwriting. And if microwriting isn’t there, why should microwriting be anywhere else? But I digress. 🙂

More recently Gordon has, in response to questions from me, elucidated the experimental process he followed by which he believes he was able to make that microwriting visible. As a result, I have gone through the process of trying to understand and reproduce his results, and I’m posting here to explain what I found.

Here’s the original Q, cropped and rotated counterclockwise by 90 degrees but otherwise completely unchanged from the original scans:

rubaiyat-q-raw-rotated

We can, without much difficulty, directly pick out the set of grey levels in the image that make up the curve of the Q (that Gordon claims contains the microwriting): and if we adjust the image’s levels so that this range (12.5% to 50%) fills the entire 8-bit dynamic range, this is what we get:

rubaiyat-q-raw-rotated-contrast-enhanced

Let’s now blur this (which is essentially what happens when you resize an image to be slightly smaller than 100%):

rubaiyat-q-raw-rotated-contrast-enhanced-blurred

And then let’s sharpen it up again to try to bring out the detail that Gordon thinks is there:

rubaiyat-q-raw-rotated-contrast-enhanced-blurred-sharpened

Amazingly, we can now apparently see the word “SEGA” starting to coalesce out of the digital mists. Of course, the video games company SEGA (which started out as “Service Games”) only became known as “SEGA” in 1965 or so (it’s the first two letters of each word), so the actual chances of the Somerton Man having been a secret Sonic The Hedgehog fan are basically zero. Possibly even less.

Yet a number of other image processing experiments I carried out on the Q produced different results. All in all, while I can see how Gordon extracted some kind of microwriting from inside the Q, I also believe that he could have extracted any number of different messages from the same source image (with only slightly different image enhancement sequences), and that he could very likely have extracted plausible-looking microwriting from any sufficiently noisy source image.

In the Voynich Manuscript world, we have an extraordinarily close precedent for this whole thing: in the 1920s, Professor William Romaine Newbold used large prints of rotograph images, strong lighting and large magnification to extract what he believed to be microwriting – specifically Latin shorthand strokes. The intense effort of doing this seems to have sent Newbold to an early grave, followed by posthumous debunking to the point that he is now often cited as the worst possible way of doing cipher research: which is not a good end to any historical story.

Here, though, we have something that Newbold didn’t have: the possibility of better images. So rather than institute yet another dreary bout of back-and-forth comment tennis, why don’t we just see if we can get a higher-resolution (and higher bit-depth) scan of the photograph in the newspaper archive and see if we can work with that instead? If there is microwriting there, it should come out clearly. If there isn’t, it should vanish completely.

I’ve read a lot – and I really do mean a lot – of Voynich Manuscript-themed (and other genuine-historical-cipher-themed) novels over the years, and I have to say that the whole experience rarely gets any better than just-about-OK-if-there’s-nothing-much-on-TV. Yes, even with TV in the nadir-like pit it has winched itself down into these days.

Sad as it is, such novelists’ including-an-ancient-unbroken-cipher writing mechanism comes across to reflective readers as rather, I don’t know, desperate-and-wanting-to-be-loved (and doubtless someone will tell me an obscure German or Icelandic adjective to describe this more precisely). More precisely, it shouts out “please God, let importing some genuine real-world mystery be enough to distract attention from the countless plot flaws, the unconvincing characters, and the piss-poor writing“. And that’s before you’ve even got to page one.

At the same time, none of the above ever hurt Dan Brown, so why not press that button and see where it leads, eh?

the-voynich-deception

Indeed, Michael Lancashire pressed that very button: and to his credit, his novel “The Voynich Deception” comes out of it basically an OK read. As the backdrop to his story, he has an unfeasibly clever guy (‘The Architect’) devising unfeasibly-clever-yet-still-oddly-micromanaged evil plans for ambitious crims to buy to execute. The rest of the plot involves a group of brutal, greedy and unlovable – though utterly uninvolving – Albanian gangsters following a blood-soaked trail of Voynich-linked cookie crumbs ever onwards towards a long-concealed treasure trove, where… well, that last bit would be telling, so my lips are sealed.

But at the same time, what I can say is that the structural weakness of “The Voynich Deception” is that while Lancashire’s ‘Architect’ is just an anti-Sherlock Holmesian conceit, the entire story pivots entirely on a single (admittedly fairly large) twist, one which the author flags very early on. As such, it’s more like a long short story than a novel: and for all the (occasional spatter of) blood ‘n’ gore, it does end up feeling a bit… thin.

Still, Lancashire is respectful towards the Voynich Manuscript (which is good), and he tells his story at a fair old pace, something far too many cipher novelists struggle with (hint: a fight they usually lose ignominiously).

The Kindle ebook version is only £1.99, so it’s not a huge investment or risk. And if you like The Voynich Deception, Lancashire has since written an Architect prequel novella (“Kernel Panic”) for you to move onto. All in all: not my tasse de thé, sure, but a perfectly OK read.

It turns out that the Internet has a little bit more information about this affair than I thought, specifically a 2005 report about the Chinese Gold Bar Ciphers (in Chinese, and possibly copied from an earlier blog entry), which seems to paint a rather more complicated story.

(Incidentally, a commenter on Klaus Schmeh’s website (where the Chinese Gold Bar Cipher is #19 of his top 25 ciphers) Google-Translated parts of this page into rather wonky German (the commenter preferred to stick with Google rather than ask someone at a nearby Chinese restaurant), but it’s probably not the best translation you’ll ever see).

The Big Fat Secret History – and I think you’re going to like this – seems to be that at the Shanghai branch of Citibank on 3rd March 1933, General Wang Jialie allegedly bought 300 million of Citibank’s shares for just over $300 million, but that (inevitably) everyone involved has somehow managed to cover up this transaction ever since. Believe it or don’t (as is your right): but that is apparently what it says.

(Note that in 1933, it wasn’t yet “Citibank” but was still “National City Bank”: according to Schwikipedia, its Shanghai branch was opened in 1902 by the International Banking Corporation, which in 1918 then became a subsidiary of National City Bank. NCB seems to have been a very major contributor to the 1929 Stock Market Crash: its boss at that time, Charles E. Mitchell, resigned in 1933, following investigation by the Pecora Commission. Hence 1933 was both the bottom of the stock market and an interesting time in the NCB’s history.)

Anyway, one of the gold bars is claimed to be a licence attesting to this transaction and its witnesses: (Kuomintang Generals) [He] Yingqin, Zhu Peide, Li Fulin; as well as Governor Sijie, Ruanruo Fu, and secretary Anna Si Lina.

“王家烈将军于中华民国 1933 年 3 月 3 日 10 时 30 分 3 秒( 股票以秒计算 ),以黄金、珠宝、法郎、马克、英磅折美元叁亿伍仟伍佰万元。存入美利坚合众国美国花旗银行上海分行。鉴存人何应钦、朱培德、李福林等( 当时都是军长 )三人座谈入行。行长斯杰、阮若夫,秘书安娜斯丽娜,金货总重壹点捌公斤”

Zhu Peide was a Military Intelligence man who had worked his way up to become a general: here’s a photo of Chiang Kaishek crying at Zhu Peide’s 1937 funeral. Li Fulin was also a General – there’s a (roughly-translated) biography of him here (e.g. it says he died of hypertension aged 79 in Hong Kong in 1952). And He Yingqin was also a General: there’s a picture of him as he accepts the Japanese Instrument of Surrender in 1945.

However, “Governor Sijie, Ruanruo Fu, and secretary Anna Si Lina” I don’t (yet) know anything about.

The same page also reproduces three American Chinese-language newspaper articles from 1993, which I’m guessing are all saying much the same thing (but please feel free to correct me on this).

Even though Elonka listed the 1933 Chinese Gold Bar Cipher case on her “List of Famous Unsolved Codes and Ciphers” page many years ago, it isn’t something I’ve ever covered here, simply because the link she gave (to an International Association for Cryptologic Research page) is enough to answer most people’s questions.

Annoyingly, though, the same information has been cut-and-pasted so many times in the Internet that it is almost impossible to find any genuine opinion or insight. So perhaps taking a fresh look at this is somewhat overdue!

Also rather annoyingly, there isn’t a definitive numbering system in place for the ciphertexts on the seven gold bars: and it’s not entirely certain which is the front and which is the back of individual gold bars. It’s all a bit shabby, if you ask me. 🙁

Anyway, I’ll start by laying out my thoughts on a single side of a single gold bar, and it should quickly become apparent what I think of this whole matter…

One Of The Gold Bars

5.1

My transcription (only very slightly different from the IACR transcription) of this is:-

    UGMNCBXCKDBEY           VIOHIKNNGUAB
                           HFXPCQYZVATXAWIZPVE
                            YQHUDTABGALLOWLS
                           XLYPISNANIRUSFTFWMIY
                           KOWVRSRWTMLDH
                           JKGFIJPMCWSAEK
                           ABRYCTUGVZXUPB
                           GKJFHYXODIE
RHZVIYQIYSXVNQXQWIOVWPJO         ZUQUPNZN
SKCDKJCDJCYQSZKTZJPXPWIRN       GKJFHYXODIE
MQOLCSJTLGAJOKBSSBOMUPCE
FEWGDRHDDEEUMFFTEEMJXZR

Note that the “GKJFHYXODIE” line is repeated twice here, and the bottom two lines are repeated on a different gold bar (“MQOLCSJTLGAJOKBSSBOMUPCE” repeats once and “FEWGDRHDDEEUMFFTEEMJXZR” repeats twice, side by side).

Cryptanalytically, the letter instance statistics for the above are very flat, which makes simple substitution ciphers and/or transposition ciphers highly unlikely: and yet entire lines appear to be repeated, which would seem to point away from polyalphabetic ciphers too.

  I  E  J  K  S  X  Y  C  D  O  P  U  W A F G N Z B H M Q R T V L
 13 11 11 11 11 11 11 10 10 10 10 10 10 9 9 9 9 9 8 8 8 8 8 8 8 7

I half-heartedly tried a number of well-known cipher solvers on it in CryptoCrack, but didn’t really believe any of them would produce anything plausible. And they didn’t. So… up close, it’s a bit of mess, right?

General Wang?

Presumably the military-looking man in the middle of this gold bar is “General Wang” of the alleged narrative.

is-this-general-wang

There’s another (slightly clearer but still rather scronky-looking) image of what appears to be a General on a different gold bar, which I’ll include here for the sake of practicality:

general-wang-again

One Redditor seems to have suggested (in a deleted comment) that this may be General Wang Jialie, though the Chinese ideograms beneath the picture look to me to be a different name (please correct me if I’m wrong!) And again, a rather different General Wang Yaowu wasn’t made a general until 1935, so the timing there seems wrong too.

Similarly, General Wang Sheng wasn’t yet a general in 1933: although he was instrumental in policing the introduction of the gold-backed Chin-yuan Chuan currency in China just after the Second World War, his life was a fairly open book, and I think it would be fairly surprising if there was an entire gold-bar-related chapter missing from it. 😐

Or could it have been General Wang Jun, who died in 1941? (But his shoulders look wrong?) Or General Wang Xidao who died in 1937? (But he was only promoted in 1936?) Yet again, I suspect we are looking at none of these generals, which is frustrating.

If this is a General Wang, which General Wang is it? I’d really like the opinion of someone able to read Chinese, in case the caption below the portrait on the gold bar is actually specifically naming him (as you’d hope).

possibly-wangs-name

A final note: I have to say I’m not feeling hugely convinced by the general’s hat as drawn: I’d have thought it ought to look more like General Wang Jun’s hat (in the link a little way above). So… all in all, I don’t think we’re doing hugely well here. 🙁

A 1933 Plane?

Perhaps unsurprisingly, the image of a plane on this same gold bar also has me a little perplexed.

gold-bar-plane

The reason for my perplexity is that planes of the 1920s were almost all biplanes: while all the planes of the 1930s that I could find better matching this design (all-metal, single wing mounted underneath the fuselage, single propellor on each wing, modern-looking nose, door over the wing) were built closer to WW2. Even so, the Douglas DC-3 was in 1936 [but doesn’t have a door over the wing], the Lockheed Model 10 Electra in 1935 [but the tail is wrong for that]): so really, I couldn’t find anything similar that was in production in 1933.

Perhaps someone with more specialist knowledge of planes circa 1933 will be able to throw some light on this plane. But for now, this too is somewhat unsatisfactory.

And The Signature Too?

At the bottom of the image, there’s apparently a signature:-

gold-bar-signature

Is this “(Something) G. Denly”? “(Something) G. Dealy”? Beats me: any suggestions?

So, My Conclusion Is…

Numerous things about these gold bars have me stumped, not just its cryptogram-like text. If I were to sum up my feelings right now, I’d say that this looks like a post-WW2 fake (and probably even from the early-to-mid 1950s), trying to make something look as though it had been made in the 1930s, but not quite getting it right.

The situation in China and (what was becoming Taiwan) in the late 1940s and early 1950s was tense and intensely political: so perhaps these gold bars were intended for some kind of political propaganda purposes back then? I really don’t know… but perhaps we shall see!

(Incidentally, why was it that people were able to date these to 1933?)

As part of my preparations for a talk on the ‘cipher pigeon’ that I’ll be giving at Westminster Under School in a couple of months’ time, I’ve been making sure that there aren’t any books I should have read.

The one I’ve most wanted a copy of is “Memoirs of a Wartime Teenager” By Frederick Dyke: but this is out of print and out of reach, so I’d need to book a day at the British Library to have a look at it. Perhaps I’ll get a chance shortly.

However, I recently found another book that I knew instantly I had to have: “Pigeons in World War II” by W. H. Osman (presumably a relative of “the late Lt.-Col A[lfred] H[enry] Osman, CBE”, who wrote extensively about pigeons under the pen-name “Squills”).

pigeons-in-world-war-ii-532

Though having said that, it’s not so much a ‘book’ as a book-shaped database: firstly, of letters from top-ranking officials thanking the nation’s pigeon breeders and trainers for their outstanding effort in WWII; and secondly, of microstories describing individual pigeons’ contributions to the same war effort.

Cross-referencing and correlating these pigeony microstories does conjure up a number of slightly larger pigeon-related narratives. For example, it seems clear that many of the pigeons employed by the US Army in Normandy for D-Day were bred and trained in and around Plymouth.

Yet the question I particularly wanted to try to answer – of course – is if we can find out any more about the two wartime pigeons “NURP 40 TW 194” and “NURP 37 DK 76” who were apparently carrying the two copies of our mysterious (or if not ‘mysterious’ then certainly frustrating) enciphered message.

Even though single-letter NURP pigeons (e.g. “NURP.42.A.4708”, “Bred by N.P.S. member, H. R. Veal, Basingstoke, Hants”, and “Trained by R.A.F. Station, Gillingham”) had a fairly random geographic distribution, I think it’s fair to conclude that multi-letter NURP pigeons tended to have at least some method to their naming madness. For example, “TTT” always corresponded to a group of pigeon breeders and trainers in Ipswich: “WAC” corresponded to Walthamstow, “SBC” to Shepherd’s Bush, “DX” to Doncaster, “WMK” to West Malling, and so forth. Additionally, many three-letter sets beginning with N– were from Nottingham, while many three-letter sets beginning with P– were from Plymouth. Just to keep you on your toes, it turns out that “XEB” was from Bexleyheath / Welling in Kent.

At the same time, there were also a fair few exceptions with no obvious rationale (“BFF” was from Poole, etc), so there was no universal naming convention, and hence we must tread carefully with our heavy-booted inferences.

The nearest to our DK and TW letter-groups was “RP.40.DUK.57” (p.116), a pigeon from an unnamed Thames Estuary breeder that was liberated in France on D-Day (i.e. the pigeon was liberated, not the breeder *sigh*), but who didn’t get home until the 8th of the following month. There was nothing remotely like the “TW” group to be seen.

I then checked this against the Special Section pigeon archive I had previously photographed at Bletchley Park (just to be sure), but that had no additional information (on its p.47) beyond what I’d just found:-

RP-40-DUK-57

However… when I double-checked this against the list of owners in the Thames Estuary Group, one name in particular stood out like a severed thumb (guess who was just reading Conan Doyle’s “The Engineer’s Thumb” with his son?!):

L-Duke

So: my current best guess is that of our two pigeons, the “DK” one may well have been owned by L. Duke of The Stores, Great Shelford, Cambridgeshire – so I’m now following this up, and will see where it leads.

At the same time, another owner from the same Thames Estuary Group was W. H. Twigg of 71 Stevenson Avenue, Tilbury. Might it be that the “TW” was short for “Twigg”? It’s entirely possible (but still a bit of a long shot).

W-H-Twigg

Hopefully, we shall see before too long…

It’s an episode of “Expedition Unknown” that has everything – Foamhenge, some inside peeks of the Grand Masonic Lodge in Philadelphia, and even Justin ‘Justintime’ Cannady (hey there Justin) helping host Josh Gates get absolutely nowhere in his quest to dig up squillions of dollars’ worth of Beale-related treasure 4 miles from Bufords etc etc.

Yet as normal, it’s all based on a grossly unsophisticated reading of the Beale Papers, and with little or no attempt to assess the evidence, do a close reading of the texts, or even really engage beyond the superficial gee-that’s-a-lotta-treasure-y’all-talkin’-’bout-there-hoss mythology we’ve seen a dozen or more times before.

All the same, if you’re simply desperate to see Josh Gates fall out of a raft, then this could well be the best thing you’ll see all week. Enjoy!

When dealing with the Somerton Man case, many people have a tendency to try to reduce it all to a story wrapped around an emotion (love, passion, jealousy, hurt, anger, loss, betrayal, etc) and/or a crime (plotting, deception, murder, suicide, etc).

But actually, these are mindsets that not only don’t help, but also get in the way: looking at the evidence with a clear head is a hard enough challenge on its own. In fact, I find getting to the point where I’m ready even to ask the right question to be a genuinely tough process, never mind reaching towards an answer.

So here’s today’s question…

Actual-tamam-shud

Why was the “Tamam Shud” scrap of paper in the Somerton Man’s pocket at all?

After a lot of consideration, my starting points for answering this question are:
* I believe the Somerton Man placed it there himself (i.e. it was not planted there by someone after his death)
* I believe it was not random, accidental or coincidental (i.e. it seems to have been consciously and deliberately put in a hard to find place)
* I believe it was placed there for a rational reason (whatever that reason happens to be)
* I believe it had a specific extrinsic function – that is, it had value or meaning or use only in relation to someone or something else

So… why was it there, then?

Putting all this together, my current working hypothesis is that the “Tamam Shud” fragment was the Somerton Man’s physical proof that the Rubaiyat was linked to him, even though he had (apparently) not previously met the person who was in possession of that Rubaiyat.

So the two items when combined together form a paired identification proof mechanism: the Tamam Shud scrap was a token to prove his identity to someone he had not previously met, while the Rubaiyat was a token to prove the other party’s identification to him.

If this is right, we have a fairly small number of token-based mutual identification scenarios to consider, such as:

(1) Seller – Intermediary – Buyer
* The Seller tears the “Tamam Shud” out of the Rubaiyat.
* The Seller gives the “Tamam Shud” to the Intermediary (the Somerton Man) and the Rubaiyat to the Buyer.
* The Intermediary meets the Buyer to collect money – possession of “Tamam Shud” token proves he was sent by the Seller.
* The Intermediary takes the money back to the Buyer.

(2) Seller – Messenger – Buyer
* The Seller (the Somerton Man in this scenario) tears the “Tamam Shud” out of the Rubaiyat.
* The Seller gives the Rubaiyat to the Messenger to give to the Buyer (but keeps the “Tamam Shud”).
* The Seller meets the Buyer to collect money – possession of the two halves mutually prove each party’s identity.

(3) Buyer – Messenger – Seller
* The Buyer tears the “Tamam Shud” out of the Rubaiyat
* The Buyer passes the “Tamam Shud” to the Seller via a Messenger
* The Buyer meets the Seller to collect money – possession of the two halves mutually prove each party’s identity.

Pete Bowes and Gordon Cramer seem to insist that this kind of behaviour is merely ‘tradecraft’, but I really don’t know if that’s a position that can yet be justified. All the same, there’s certainly a strong whiff of distrust and proof at play here: personally, I don’t yet know what to make of it all. But it is what it is.

Who was the 17-year-old boy from Broken Hill who dumped the suitcase with clothes and a rifle stock on Somerton Beach the weekend before the Somerton Man died there?

Commenter ‘Clive’ had had no luck with the Adelaide Court archives (in fact, Janey found out a few weeks ago that “all [Adelaide] Youth Court files prior to 1984 have been destroyed”), so decided to trawl through the Police Gazette. Luckily, what Clive found there was that “the youth, aged 17, was named as Frederick William Pruszinksi. He was fined 4 pounds and 10 pence for unlawful use of a car”.

Actually, it seems very likely to me that the youth’s name was Richard Frederick (“Freddie”) Arthur Pruszinski, of 247 Williams Street, Broken Hill: and we can trace many aspects of his (unfortunately) short life through Trove.

10 December 1945: Fred Pruszinski was in Class 2CP, and got “1st English (aeq.), 1st Technical Drawing (aeq.)”

29th November 1947: a relative (presumably?) was working on the mines but fell ill: “C. Pruszinski was taken to the Hospital and admitted after he had become ill at the Zinc Corporation. His condition last night was stated to be quite comfortable.” (He seems to have flown back from Melbourne on 4th January 1949.)

Despite his young age, Fred Pruszinski was a keen member of the Silver City Miniature Rifle Club: his first newspaper mention is from 8th March 1948, and by 20th August 1949 he was Honorary Secretary.

29th November 1949: his sister Eileen Patricia Pruszinski announced her engagement to “Harold, only son of Mr. and Mrs H. Payne, 608 Beryl Street”. They were married on 11th March 1950 at 9am:

Fine needlerun lace and misty tulle was chosen for the bride’s picturesque period gown, which she had made herself. Underlined with rich satin, the frock was made with a high round neckline and circular tulle yoke piped with satin and outlined with a soft frill, and the slender satin-piped waist line was met by a hooped crinoline skirt. The centre panel of soft tulle frills was edged each side with satin piped scallops caught with sprigs of orange blossom, and the skirt swept out into a graceful flowing train flnished with a deep tulle trill all around. A trail of orange blossom was caught across the back waistline above a shirred bustle of satin-lined lace, and her long peaked sleeves were buttoned to the elbow. A coronet of orange blossom backed with a frilled lace halo surmounted her frothy veil of six tiers of scalloped tulle, and she wore a double strand pearl necklace. […]

By 14th May 1951, Fred Pruszinski was shooting for West Broken Hill Rifle Club.

12th July 1951: “Failure to observe a halt sign at the intersection of Argent and Kaolin Streets cost Richard Pruszinski a fine of £2 and 10/ costs.” (Might have been Freddie or his father Dick, I don’t know).

8th January 1952: in an apparent change of direction, Fred Pruszinski passed an Engineman Driver’s Examination (“AC and DC”). By 1st July 1952, he had passed his Diesel examination too.

Yet sadly, he died suddenly at Morton Boolka creek on 7th March 1953, having shot a bird and tried to swim to get it, before falling into difficulties and drowning. (The Coroner subsequently ruled that his death was an accident, e.g. Barrier Miner, 31 Mar 1953.)

There were plenty of funeral notices: a typical description of Pruszinski’s funeral appeared in the Barrier Miner, 11th March 1953 edition:

The funeral of Mr. Richard Frederick Arthur Pruszinski took place yesterday afternoon. The cortege left his residence, 247 Williams Street, for the general cemetery. Envoy J. Crocker conducted a service at the grave. The bearers were: Messrs. D. Hargraves, K. Cook, P. Fitzgerald, D. Carlin, J. Heslop, and J. Hamilton. The following representatives were present: Mr. J. P. Fitzgerald <W.I.U. of A> Mr. L. Farrugia (Zinc Corporation Sickness Fund); Messrs. F. Anderson and J. Brownett (West Rifle Club).

He was buried in grave #214 at Broken Hill Cemetery, the same one as Richard Walter Pruszinski (1928-1934, presumably an older brother).

According to this, Pruszinski was born and educated in Broken Hill, and “was employed at the N.B.H.C. as a miner. He was a member of the W.I.U. of A., Zinc Sickness Fund, and the West Rifle Club”. This funeral notice lists his close friends: “DON PURCELL, DON HARGREAVES, DON CARLIN, KEVIN COOK, JOHN WINKLER and PAT FITZPATRICK”. (They were also his pallbearers). At the West Broken Hill Rifle Club, “the flags were flown at half-mast and members stood in silence in respect for late member F. Pruszinski.”

Here’s a partial update on the Paul Emanual Rubin cipher mystery for you, followed by my updated thoughts on the ciphertext, and then finishing with my current best guess as to what happened. But… please don’t build your hopes up too high, there’s no sign of hugely happy ending to it all just yet. 🙁

The Update Part

After my recent post on the Paul Rubin cipher, I discovered that Craig Bauer (whose long-standing interest in the case was the starting point for that post) is currently planning to write and publish a Cryptologia article on it.

Needless to say, I’m really looking forward to his article: and I really hope that he gets to peek just a little behind the veil of the scanty external documentation to reveal the real secret history just behind it. There’s certainly very little of substance currently in the public domain: yet there’s a good chance that many of Rubin’s friends – if Bauer could manage to identify them – may well still be alive. I’m sure that they would be very happy to help Bauer get closer to the truth, even at this distance in time.

At the same time, I’m assuming that the FBI – which was so clearly involved right from the start of this case – will likely not be contributing to the picture Bauer will build up. As a matter of general policy, the Bureau seems uninterested in contributing or collaborating with external codebreakers (and don’t get me started on the Ricky McCormick case), so the FBI side of things seems to be an avenue that will remain blocked for many years yet.

The Cipher Part

Doubtless Craig Bauer will have his own conclusions about the ciphers used (and he may even have access to enough primary material to be able to break the ciphertext). But here are mine.

rubin-newspaper-cutting-annotated

Even on the low resolution photo of the cipher note, we can see “PER” at the bottom right, which is surely Paul Emanuel Rubin’s typewritten signature. Hence there is no real doubt that this whole thing was made directly by him.

I also have no real doubt about the section with the numbers on (outlined in blue above): that this is a home-brewed Morse Code variant. Only an amateur / kid code-maker would use something like this: while visually impressive, it’s hugely long-winded and impractical.

Finally, I have very little doubt about the section that seems to have “Conant” and “Dulles” in the clear: there is only one cipher system that has sufficient latitude to achieve this, and that is where a plaintext message (or a simple substitution cipher message) gets interspersed with euphonic or orthographically pleasing nulls to generate a covertext. Trithemius proposed this 500 years ago, and I feel certain that this is what is being used here.

e.g. the underlying cipher message might say “C.N.N”, but after nulls get added, the cover message becomes “C.o.N.a.N.t”.

As a more general observation, though, I suspect that each line of the text uses a separate code-table, because there seems to be very little consistency from line to line, even if you take every other letter of each line. But that fits with the whole amateur code-maker thing: it’s almost impossible to break extremely short ciphertexts, unless you have a lot of a priori knowledge about what was going on in context (which seems not to be the case here).

Finally, the other short patches of text seem likely to me to be code-table references or offsets etc. When Rubin’s friend said at the time that he (I presume he) would be able to decrypt it in a few hours if he had access to Rubin’s code-tables, this is without much doubt what he meant. Hence my prediction is that each code-table is relatively simple in itself, but that each one is used only in short bursts, to make it nearly impervious to codebreakers.

The Secret History Part

As to what was going on Rubin’s life and head in the days and weeks up until his death, I don’t honestly know: as I mentioned before, I strongly suspect that he may have been suffering from paranoid schizophrenia (for surely only someone in a distressingly paranoid place would even consider taping a coded message to their abdomen), but many other causes and rationales are still in play.

But I do have a guess about what went wrong after his death.

And this is based on cryptanalysis: that if “Conant” and “Dulles” were, as I believe, both part of a covertext created by filling between genuine cipher letters with nice-looking Trithemian nulls to form additional words, then I don’t honestly believe that the plaintext will ultimately have anything remotely to do with “Conant” and “Dulles” at all. In short, if you were paranoid about Conant and Dulles, you really wouldn’t leave them in plain sight.

But this was the diametric opposite of the assumption that the FBI seemed to be working on in this case. This was 1953, after all, the height of the HUAC and Cold War era, and Reds were perceived to be under every goshdarned Bed. And Rubin was a student, and therefore – so the mythology goes – could well have been exposed to one of numerous radicalizing factors and ideologies. So in fact it seems to me that poor Mr Rubin may not even have been the most paranoid element in the whole setup: by which I mean that the FBI seems to have been institutionally paranoid at that time, paranoia on an almost industrial scale.

Personally, I believe that Rubin’s friends – with whom he had exchanged numerous coded notes, according to various newspaper accounts, and doubtless knew most of his Trithemian tricks well – could easily have broken the heterogeneous set of micro-ciphers that made up his final essage, had they been given access to his code-tables.

However, my suspicion (as things stand) is that Rubin’s friends never got to see the message. Instead, I suspect that the FBI collected up all Rubin’s code-tables and documentation, tried to break them (and failed), and then – because they perceived that National Security was somehow at stake, even if they couldn’t prove it – kept everything quiet. The paranoid logic being, of course, that if Rubin was a goddamn Commie, then all his code-breaking chums were probably all the same distressing shade of Red, and therefore not to be trusted anywhere near his note.

(To my eyes, there are institutional echoes of the way the Ricky McCormick case was later handled, with the (minor) difference being that the institutional paranoia at play there was a weed (ha!) that grew vigorously on top of America’s civil War On Drugs.)

If I’m right, all Rubin’s code-tables are probably still sitting in an FBI archive, having never been shown to the very people who could have helped crack it without much trouble: and if so, what a sad waste of time the whole affair was.

Let’s hope Craig Bauer gets to tell us the whole story.

Here’s a very accessible 1940 article by über-codebreaker William Friedman that I’m sure you’ll like: an appreciation of the cryptography of Jules Verne.

William Friedman – “Jules Verne as Cryptographer” – The Signal Corps Bulletin, April-June 1940 pp.70-107

signal-corps-bulletin-april-june-1940

In the article, Friedman discusses three stories Verne wrote that each hinged on a cryptogram that had to be broken:
* A Journey To The Centre of the Earth (1864)
* The Giant Raft or 800 Leagues On The Amazon (1881)
* Mathias Sandorf (1885).

In two cases it was a transposition cipher, while in the other it was a Vigenère cipher. Of course, it was Friedman himself who invented the whole Index of Coincidence approach for tackling Vigs in a systematic way, and what is nice here is that he reconstructs Verne’s attack on the Vig ciphertext in an easy-to-understand way (short version: Verne got it largely right, but not anywhere near 100%).

Naturally, many will point to Poe’s “The Gold Bug” as the ultimate cipher story: but actually, that used only a simple (monoalphabetic) substitution cipher, so Verne’s work was – cryptographically speaking – much more challenging. I hope you enjoy Friedman’s take on the three ciphers!

Incidentally, the article was recently found, scanned and posted by cryptocollector Brooke Clarke in the book section of his webpage of crypto-related stuff – thanks, Brooke, much appreciated! 🙂