Doc656765.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Doc656765.Pdf This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com ,_ ... ' . : ;.;:."'::·~ ·... ·. ! : ~ J;P.,i. ....~;;\ft.~~6 ...~~:l,...J.:8-:-!.~1~629..,..,- ....,..8.~9- ••~6":""!.~1~!2-. 1~6~. 1:-:1-=-l,....., : ..... :~ :·· • ••~ .. :~ ••• 0 .. : '·to ~· 95, 8-4, 541, 975, H,-40, 64, 27, 81, 159, 215, 65, 90, 1120, 8, 15, 5, t"·::! :: . .•· ·' :. :'. i . 1215, 2018, 40, 'i.f, 758, 485, 604, 2!0, 456, 664: 582, 150, 251, 284. ··:: ... J ~ ·~ l 308, 231, 12-l, 211,-486, 22.5, -4M, 570, 11, '101, !05, 1!9, 189, 17, ~~)!~ ~~~:· . ... 0. I 5!, 88, 208, 193, 145, 1, 9-4, 75, 416, 918, 265, 28, 500, 558, 556, ... :. ... 0 • • ~- Jl7, 1!6, 219, 2'1. 176, 1!0, 10, 460, 25, 485, 18, 4!6, 65, 84, 200, 28!, 118, !20, 158, !6, ·U6, 280, 15, 71, 22-i, 961, 4-4, 16, 401, 59, I1 88, 61, 304, 12,21, 24, 285, 1!4, 92, 63, 246, 486, 682, 7, 219, 184, ; 560, 780, 18, 64, 465,474, 151, 160, 79, 7!, 4-40, 95, 18, 64, 581, I 54, 69, 128, !101, ~. 17, 81, 12, 10!, 820, 62, 116,97, 105, 862, 70, 60, 1517,-471,540,208, 121,890, !46, 56, 150, 59, 568, 6H, 1!, t~~~I~~~;~c~f;.:j:;~,t&·.:... ·'.. ~··~~~ 120, 6!, 219, 812, 2160, 1780,99, !5, 18, 21, 156, 872, 15, 28, 170, 88, 4, !0, 4-t, 112, 18, 147, 4!6, 195, !20, !7, 122, 11!, 6, HO, 8, 120, !0.5, 42, 58, -461, '"· 106, 501, 15, 408, 680, 9!, 86, 116, 550, 82, 568, 9, 102, 58. 416, 89, 71, 216, 728, 965, 818, 2. ss. 121, 195, H. !26, 148, 2!4, 18, 55, 131, 2!4, !61, 824, 5, 81, 62!, 48, 961, 19, 215, !!, 10, ll01, !65, 92, 88, 181, 275, !46, 201, 206, 86, 56, 219, 520, 829, 840, 68, 526, 19, 48, 122, 85, 216, 284, 919, 861, !26, 985, :iu. 6-4, 68, 2s2, 4!1, 96Q, so. 29, 81. 216, s21, 60!, H, 612. Sl, !60, !6, 51, 62, 194, 78, 60,200, !l<l, 676, 112,-4, 28, 18, 61, 1!6, 24i, 819,921, 1060, 46-4, 895, 10, 6, 66, 119, 58. 41, 49, 602. 423, 962, 302,294, 875, 78, 14. 2!, lll, 109, 62, 51, 501, 825, 216, 280, !.C. 24. 150, 1000, 162, 286, 19, 21, 17, !40, 19, 242, 51, 86, 2M, 140, 607, 115, !!, 191, 67, 104, 86, 52, 88, 16, 80, 121, 67, 95, 122, 216, 548, 96, 11, 201, 77, !6-4, 218, 65, 667. 890, 2!6, 154, 211, 10, 9!, u. 119,56, 216. 119, 71,218, 116-4, 1496, 1817,51, !9, 210, 56, 5, 19,540, 2!2, 22, Hl, 617, 8-i, 290, 80, -t6, 207,-411, 150, 29, 58, -46, 172, 85, 194, 56, 261, 54!, 897, 624, 18, 21!!, 416, 127, 9!1, 19, 4, 6!, 96, 12, 101,418, 16, HO, 250, 460, 5!8, 19, 27, 88, 612, 14!1, 90, 716, 275, '"· 8!. 11, <126, 89, ?2. u, 1!00, 1706, 814. 221, 1!2, 40, 102, !4, 858, 975, 1101, u. 16, 79. 2!, 16, 81, 122, 524, 4a5, 912, 227. 956, .U7, 55, 86, S<l, 4!, 212, 107, 96, SH, 264, 1065, !25, 4.28, 601, 20!, 124, 95, 216, 814, 2906, 654, 820, 2, !OJ, 112, 176, 21!, 71, 87, 96, 202, !5, 10, 2, 41, 17, 84, 221, 7!6, 820, 21-i, 11, 60, 760. Cipher Number One supposedly tells exact location but so far no "solutions" have led to treasure. ::.. \ 'r. By Ruth Daniloff Colonel J. J. Holland plunged his post holer ifit<i mound where his metal detector registered ten an brought up a scoop o£ dusty earth containing sever: lumps o{ coal. At 70, he had been warned by h doctor against d~gging 'Qecause o£ a serious heart a: ment, but his obsession with the treasure he believ A.cipl1er's the key lies six feet under the dirt beside the railroad· trac somewhere ·in Virgi~ia overrides all common sens Since 1964, when he first learned of Thomas J effe to the treasure son Beale, the 2,921 pounds of gold, the 5,100 pount of sih•er and some $200,000 worth of jewels, he h clocked up more than 150,000 miles driving to tl .in them. tl1.ar l1.ills foothills o£ the Blue Ridge ]\·fountains near Rc nok.e, Virginia, to dig. At home in Lillian, Alaban he works most nights £rom 10 to 2 on the ciphers lating to the treasure. This time he is convinced has broken the first o£ the three codes. "'\-\'hat need now is a backhoe," he says with obvious fr Cryptanal)'Sts and fortune hunters lead tration. '.'Then we can dig down and find the gr~ and solve this Beale thing once and for all." a merry chase through. the T'irginia countryside For more than 1!0 )'Cars people like Colo~el F. in search of Thomas Beale's buried loot land have been trying to find the Beale milli• . 126 .,. --·- --·--·· ~ • > POQID :. 656765 -· Cryptographer Carl Hammer, right, joins treasure hunters as they go over map: The Peaks of Otter in the :Slue Ridge Mountains may be a clue to where :Seale buried gold, silver and jewels 160 years ago: treasures unearthed so far include an old car and a chunk of pig iron. ...... ·::· "once and for all." It is one of the largest and most missioned commander of the American army to fight .....,.... costly treasure hunts in U.S. history, baffiing the finest Indians who were making pioneer existence in the t' .•.. mathematical· minds in the country and defeating Northwest Territory impossible. their computers. Like the search for. the Lost Dutch­ Beale ca.me from a distinguished family. In 1668 man mine in Arizona, or the stories o£ the $S million King Chailes II of England recommended one of his in Confederate treasury gold buried along the James ancestors for appointment as commander of Point River just before the Union soldiers entered Rich­ Comfort, at the entrance of Norfolk Harbor. Though mond in 1865,·or wealthy plantation owners' fortunes' one contemporary described Beale as "a gentleman hidden from the Union soldiers and never recovered, well educated, evid~ntly of good family, and with the Beale treasure tantalizes its seekers with fantasies popular manners," recent research reveals him to have of untold riches while inducing frustration, despair been a no-good, gun-slinging genius who was con­ and bankruptcy. Numerous articles in magazines and stantly bailed out of scrapes by his more respectable trade journals and several books have explored the brothers. Still, women loved him-he was a broad­ Beale mystery. shouldered six-footer with swarthy complexion and . Thomas Jefferson :Seale, the man responsible for jet black hair worn slightly longer than was fashion­ trying 20th-century brains and technology, was a de· able. He was said to be a "model of manly beauty, vious Virginia gentleman believed to have been born favored by ladies and envied by men." around 1792. That was the year George Washington Indeed, the Beale treasure hunt may have started was elected President for the s«;cond time; Thomas with trouble over the opposite sex. There are several Jefferson and Alexander Hamilton were feuding over stories-some documented, some not. One story holds policies which would culminate in a two·party politi­ that in the spring of 1817 Beale got into a pistol fight cal system; and General Anthoq.y "Wayne was com- with a Fincastle, Virginia, neighbor over a woman .. Photographs. by Anne B. K. Krumbhaar . 127 ~~~.' . Colonel 1. 1. Holland digs in seaet spot convinced he has broken one code at la Believing he had killed the man, Beale oudor the frontier to escape prosecutic Beale's version of the story was tha~ and !0 individuals of good character. .Jc seeking ad\'enture and left on a tvto_;y'e expedition for buffalo and gri~lies:· \o\'hichever is true, a year 'later wh Beale and his hunting aonies ~·re· p: paring supper in a small ravine some 2 miles north of Santa Fe, they discover· strange stuff in lhe rocks. "Upon showir it to others," Beale wrote, "it was pr nounced to be gold, and much e:x.ci ment was the natural consequence." • In two letter.;, Thomu Beale describ· the gold, its journey back to Virginia two wagons and it• subsequent burial. r deposited the leuers in an iron strongbo and in :March 1822, he left the box wi Greece Is still a h iscoric bargain. r:------------, his friend, Robert Morriss, for safelc.ee In face, the dollar is worth 25% ,more than last I ~~:~!':'-~:.~~w~:~',~~~~::.~:~ I ing and disappeared. Morriss, who h: year. But don't come because its inexpensive. I•" ~>~;"'oc~o't'""'••-c~o...•.•L6060o nmm-•~»•1 5 7 12111 fallen on hard times as the resuh Come because it's Greece. I '" '· "'~ '·""' ........ c.~.too• Q'""" "hca\"y purchases of tobacco, at ruino r A h h A 1· h l"'""•'co4 4... d,.., .....,_ .. c:._•. C ome ror t ens, t e cropo rs, t e museums; figure.s," was the innkeeper at the Was for seductive Creek lsles like Rhodes, Crete, I Corfu and Mykonos.
Recommended publications
  • Cryptography and Data Security
    Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 1982-05 Cryptography and Data Security Denning, Dorothy E. þÿDenning, D. E., Cryptography and Data Security, Addison Wesley, May 1982. http://hdl.handle.net/10945/37163 Cryptography and 13ata Security Dorothy Elizabeth Rob,ling Denning PURDUE UNIVERSITY A VV ADDISON-WESLEY PUBLISHING COMPANY Reading, Massachusetts [] Menlo Park, California London II Amsterdam • Don Mills, Ontario I Sydney Library of Congress Cataloging in Publication Data Denning, Dorothy E., (Dorothy Elizabeth), 1945- Cryptography and data security. Includes bibliographical references and index. 1. Computers--Access control. 2. Cryptography. 3. Data protection. 1. Title. QA76.9.A25D46 1982 001.64'028'9 81-15012 ISBN 0-201-10150-5 AACR2 Copyright © 1982 by Addison-Wesley Publishing Company, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or other- wise, without the prior written permission of the publisher. Printed in the United States of America. Published simultaneously in Canada. ISBN 0-201-10150-5 A BCDE FG H I J-M A-898765432 In memory of my Father, Cornelius Lowell Robling 1910-1965 Preface Electronic computers have evolved from exiguous experimental enterprises in the 1940s to prolific practical data processing systems in the 1980s. As we have come to rely on these systems to process and store data, we have also come to wonder about their ability to protect valuable data. Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modifica- tion.
    [Show full text]
  • Benedek Láng Why Don't We Decipher an Outdated Cipher System? The
    Benedek Láng Why don’t we decipher an outdated cipher system? The Codex of Rohonc1 A neglected source The Codex of Rohonc is in a paradoxical situation: it is privileged to be in the elegant company of the nine most famous hitherto unsolved writing-systems (together with the Phaistos disk and the Linear A),2 while – in contrast to all the other unsolved writings – almost no serious research has been published on it since it turned up in 1838.3 This situation becomes particularly surprising if we compare it with that of the (in)famous Voynich manuscript. There are a couple of similarities between the two manuscripts: both have been written in a mysterious and unsolved cipher, both are fairly lengthy (and thus offer themselves to professional code breakers), both can be equally well a cipher, an artificial (or perfect) language or a hoax, both of them contain illustrations that might help the process of deciphering or might equally well misguide us, and both could have been written – or forged – sometime between the 16th and the 19th centuries. However, while the Voynich manuscript enjoyed the attention of the best code breakers of World War II, many twentieth century philologists researched it, and it has been offered several monographs, articles, web pages and e-mail lists, the Codex of Rohonc has only received a few aborted attempts at deciphering it and one meager e-mail list. There is not even a reliable piece of secondary literature on what can be actually known about it. The Codex of Rohonc is a nearly 450-page long handwritten paper book filled with 9-14 lines of unknown sign-strings on each page and with more than 80 illustrations.
    [Show full text]
  • Beissinger-Sample.Pdf
    The Cryptoclub The Cryptoclub Using Mathematics to Make and Break Secret Codes Janet Beissinger Vera Pless Daria Tsoupikova, Artist A K Peters Wellesley, Massachusetts Editorial, Sales, and Customer Service Offi ce A K Peters, Ltd. 888 Worcester Street, Suite 230 Wellesley, MA 02482 www.akpeters.com Copyright ©2006 by The Board of Trustees of the University of Illinois All rights reserved. No part of the material protected by this copyright notice may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. This material is based upon work supported by the National Science Foundation under Grant No. 0099220. Any opinions, fi ndings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily refl ect the views of the National Science Foundation. Library of Congress Cataloging-in-Publication Data Beissinger, Janet. The cryptoclub : using mathematics to make and break secret codes / Janet Beissinger, Vera Pless. p. cm. ISBN-13: 978-1-56881-223-6 (alk. paper) ISBN-10: 1-56881-223-X (alk. paper) 1. Mathematics--Juvenile literature. 2. Cryptography--Juvenile literature. I. Pless, Vera. II. Title. QA40.5.B45 2006 510--dc22 2006002743 Book and cover design by Erica Schultz. Set in ITC Offi cina and Agate SSK by A K Peters, Ltd. Printed and bound in India. 10 09 08 07 06 10 9 8 7 6 5 4 3 2 1 Contents Foreword ix Preface xi Acknowledgments xiv Unit 1 Introduction
    [Show full text]
  • Episode 13 –The Beale Ciphers European Section – Season 3
    Episode 13 –The Beale Ciphers European section – Season 3 Episode 13 –The Beale Ciphers The Beale papers Episode 13 –The Beale Ciphers Publishing information Entered according to act of Congress, in the year 1885, by J. B. Ward, in the Office of the Librarian of Congress, at Washington. Episode 13 –The Beale Ciphers Opening paragraph Episode 13 –The Beale Ciphers Opening paragraph The following details of an incident that happened many years ago, but which has lost none of its interest on that account, are now given to the public for the first time. Until now, for reasons which will be apparent to every one, all knowledge of this affair was confined to a very limited circle – to the writer’s immediate family, and to one old and valued friend, upon whose discretion he could always rely; nor was it ever intended that it should travel beyond that circle;. Episode 13 –The Beale Ciphers Opening paragraph . but circumstances over which he has no control, pecuniary embarrassments of a pressing character, and duty to a dependent family requiring his undivided attention, force him to abandon a task to which he has devoted the best years of his life, but which seems as far from accomplishment as at the start. He is, therefore, compelled, however unwillingly, to relinquish to others the elucidation of the Beale papers, not doubting that of the many who will give the subject attention, some one, through fortune or accident, will speedily solve their mystery and secure the prize which has eluded him. Episode 13 –The Beale Ciphers Act 1 – 1817-1820 Episode 13 –The Beale Ciphers Act 1 – 1817-1820 Thomas Jefferson Beale, from St Louis, heads a party of 30 adventurers for a two years hunting trip to Santa Fe.
    [Show full text]
  • Ciphers Using Symbols
    Fall 2006 Chris Christensen MAT/CSC 483 Ciphers that Substitute Symbols ℑΔℵΩ◊∂◊∑℘◊◊Δ◊ℵ°℘ † Some historical simple substitution ciphers substitute symbols for plaintext letters. The ciphertext then looks less familiar – less friendly – but the techniques for cryptanalysis remain the same as for any simple substitution cipher – frequency analysis. Edgar Allan Poe (1809 - 1849) Edgar Allan Poe was an avid cryptologist. For six months, beginning in December, 1839, Poe wrote a cryptology column in Alexander’s Weekly Messenger. In addition to expressing his own ideas about cryptology, Poe solicited cryptological challenges from his readers. Poe published his solutions in his column. About a year after his last column in Alexander’s, Poe wrote “A Few Words on Secret Writing” for Graham’s Magazine. In addition to this article, there were several follow-up articles about cryptology. It was during this time that one of Poe's readers, a Mr. W. B. Tyler, submitted … two cryptographs … . Poe never published solutions to Tyler's cryptographs. This fact alone makes them interesting - of the 100-plus cryptographs submitted by his readers, these are the only two not solved. Poe claimed that he did not have the time to work out their solution, but published them in Graham's for his readers to decipher. However, the most interesting aspect of these cryptographs is the possibility that they were not written by W. B. Tyler, but by Poe himself. There is only circumstantial evidence to corroborate the theory that Tyler was Poe's nom de plume. http://www.bokler.com/eapoe.html Tyler’s first cryptogram was published in Graham’s in December 1841.
    [Show full text]
  • Cryptanalyze This - New York Times 2/4/09 9:49 AM
    Cryptanalyze This - New York Times 2/4/09 9:49 AM November 7, 1999 Cryptanalyze This By ROBERT OSSERMAN THE CODE BOOK The Evolution of Secrecy From Mary Queen of Scots to Quantum Cryptography. By Simon Singh. Illustrated. 402 pp. New York: Doubleday. $24.95. A very old joke -- one that does not quite work in written form -- goes, ''If 9W is the answer, what is the question?'' One reason mathematicians are fond of this joke (whose punch line is below) is that it is a perfect example of an ''inverse problem,'' one that arises when one knows the outcome of some process and needs to deduce what led to it. Coding and decoding -- or in Greek terminology, cryptography and cryptanalysis -- are perfect examples of direct and inverse problems. They share the basic features of both: the inverse problem is generally far more difficult to solve, and there may not be a unique answer. A direct operation playing a major part in current cryptography involves multiplying together two large numbers. The inverse takes the resulting even larger (say, 300-digit) number and tries to factor it to find the original two numbers. ''The Code Book: The Evolution of Secrecy From Mary Queen of Scots to Quantum Cryptography,'' by Simon Singh, grew out of one section of ''Fermat's Enigma,'' Singh's earlier book recounting the 350-year effort to find a proof of what was the most famous unsolved problem in mathematics, Fermat's last theorem. Singh's approach is to make each of a series of historical incidents the frame for holding the reader's interest as he fills in technical details of successive coding systems.
    [Show full text]
  • THE CODE BOOK the Science of Secrecy from Ancient Egypt to Quantum Cryptography (Simon Singh)
    THE CODE BOOK The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Simon Singh) Freshman Seminar, Winter 2006 February 28, 2006 Contents 1 January 26, 2006 1 1.1 Chapter 1—The Cipher of Mary Queen of Scots . 1 1.1.1 The Evolution of Secret Writing . 1 1.1.2 The Arab Cryptanalysts . 2 1.1.3 Cryptanalyzing a Ciphertext . 3 1.1.4 Renaissance in the West . 3 1.1.5 The Babington Plot . 4 1.2 Chapter 2—Le Chiffre Ind´echiffrable . 4 1.2.1 From Shunning Vigen`ereto the Man in the Iron Mask . 5 2 February 2, 2006 5 2.0.2 The Black Chambers . 5 2.0.3 Mr. Babbage Versus the Vigen`ereCipher . 6 2.0.4 From Agony Columns to Buried Treasure . 6 2.1 Chapter 3—The Mechanization of Secrecy . 7 2.1.1 The Holy Grail of Cryptography . 8 3 February 9, 2006 9 3.0.2 The Development of Cipher Machines—from Cipher Disks to the Enigma . 9 3.1 Chapter 4—Cracking the Enigma . 10 4 February 16, 2006 12 4.0.1 The Geese that Never Cackled . 12 4.0.2 Kidnapping Codebooks . 13 4.0.3 The Anonymous Cryptanalysts . 14 4.1 Chapter 5—The Language Barrier . 14 4.1.1 Deciphering Lost Languages and Ancient Scripts . 15 5 February 23, 2006 17 5.0.2 The Mystery of Linear B . 17 5.0.3 Bridging Syllables . 17 i 5.0.4 A Frivolous Digression . 17 5.1 Chapter 6—Alice and Bob Go Public .
    [Show full text]
  • The Curtis Collection: a Personal View of Prince William County
    The Curtis Collection A Personal View of Prince William County History Donald E. Curtis The Curtis Collection A Personal View of Prince William County History Donald E. Curtis Prince William County Historical Commission Prince William, Virginia 2006 Copyright © 2006 by the Prince William County Historical Commission Originally Printed, 1988 Prince William County Historical Commission Reprinted 2006 for the Prince William County Historical Commission Prince William County B&G Print Shop 5001 Prince William Parkway Prince William, VA 22192 Please direct all correspondence and book orders to: Prince William County Historical Commission 1 County Complex Court Prince William, VA 22192 ISBN: 978-0-9792155-2-0 BOARD OF COUNTY SUPERVISORS Corey A. Stewart, Chairman Maureen S. Caddigan, Vice Chairman Hilda M. Barg Martin E. Nohe Wally Covington John T. Stirrup, Jr John D. Jenkins . HISTORICAL COMMISSION Members Ruth M. Anderson Ellis B. Hawkins Sara B. Anderson Alexander Jones, Jr. Frederick R. Brown Jane B. MacDonald James M. Burgess, Jr., Vice Chairman Ronald L. Smith Stephen K. W. Chock Harry P. Stickley, III Rebecca Cumins David Swavely Janice M. Cunard Ron Turner Betty Duley, Chairman Elaine S. Yankey Staff Robert C. Bainbridge, Planning Office Liaison Justin Patton, County Archaeologist Heather Hembrey, Public Works Liaison Toni Brzyski, Secretary Don Wilson, Library Liaison CONTENTS Title Page Introduction....................................................................................................................1 A Personal Experience
    [Show full text]
  • Declaration of Independence Treasure Hunt
    Declaration Of Independence Treasure Hunt Anomalous Waylon tagged, his beautifier deprecates entitle rustily. Slanted Jake consolidating, his displayer aphorises transcribe notoriously. Autocratic Bennet nictitate some merengues and outsells his Cleethorpes so gravely! While the other dons has a potential customer reviews yet another treasure before your hunt of National Treasure Movie the Common Sense Media. Sponsored or university lines that it to harm women in on me to new exclusive content focus may or watch! This little relationship to disagree with every corporate team and walked with the interior of keeping the hunt of. How late does Nicolas Cage once per film? There is great treasure map on the parrot of the Declaration. Students should recognize phrases from the Declaration of Independence and the US Constitution and its amendments 2 Organize students in pairs and. National Treasure Honest Trailer An audience-packed Film. I collect books dated 1776-125 that reprint the three text fix the Declaration of Independence DOI. Did Tom Hagen betray Michael? While luke skywalker, cooperate and get unlimited digital access to try and learns about any college or find a beat up prematurely and. Patriotic 4th of July Scavenger Hunt Party Planning Guides. Why did Michael fire Tom Hagen as Consigliere Movies & TV. How his interactions with my life, and a treasure web browser that it matches founding fathers, you care about diluting and people filing for progressive loading. Founding Documents Treasure Hunt Answers ST Consultoria. What burden did Fredo do to betray Michael Movies & TV Stack. Treasure Hunt Activity The Declaration of Independence. Tom were traced and protective when it gets his works, director jon turtletaub, and are addressed together, complete these attributes, they claim that.
    [Show full text]
  • Observations Concerning the Text of the Beale Papers
    The Last Haunting of Edgar Allan Poe Hiding In Plain Sight: Observations Concerning the Text of The Beale Papers by Robert Ward, Ellicott City, Maryland, August 2011 “…the Declaration of Independence is given herewith, and will be of interest to those designing to follow up my investigations”. The Beale Papers The anonymous author of The Beale Papers, a cryptographic, treasure mystery published in 1885 in Lynchburg, Virginia, embedded into the text of the story hundreds of words from the Declaration of Independence. These DOI words were seamlessly written into the text with such skill and artistry that they have remained hidden for more than one hundred and twenty-five years. The placement of such a high volume of DOI words throughout the story suggests a purpose and design that may conceal a code or some other type of secret writing. The identification of these DOI words throughout the letters, statement, decryption and narrative included in the story, all purportedly written by different individuals, also presents persuasive evidence that The Beale Papers was authored by one man. An Astonishing Performance The anonymous author of The Beale Papers (“the Beale author”) has written a masterpiece that may one day take its place alongside the great cryptographic and literary classics of the past. To successfully conceal hundreds of words from the Declaration of Independence (“DOI words”) within the text of a story which highlights the Declaration as the key to a cryptographic mystery is quite a feat. But to conceal such words for over a
    [Show full text]