SOLVING SECRETS

Edited by M. E. Ohaver

HERE IS THE WAY TO SOLVE THE NIHILIST CIPHER AND SOME TO TRY YOUR SKILL ON

N our issue of March 28 we offered a sample of the famous Nihilist which was a challenge to our readers to send us messages that Mr. Ohaver could not translate. I Many of the correspondents doubted his ability to do it without the keyword and hoped that he would reveal the secret of his method. It is no secret. Skillful cryptographers the world over know it, and as Mr. Ohaver says, this method is about as safe as a leaky rowboat in the middle of the Atlantic. It's all in knowing how. In the department this week Mr. Ohaver explains one deciphering method. He says it's easy. Maybe it is. Try it for yourselves. Incidentally he offers some more ciphers from readers and gives the • words of a lot of Nihilist messages we have received. Your own may be among them.

F the numerous correspond• Nihilist cipher in FLYNN'S for April 25. ents who submitted Nihilist But for the benefit of the many who were ciphers for solution in re• tmable to do this, we have decided in re• sponse to our invitation in sponse to insistent requests to publish here FLYNN'S for March 28, for the first time a full exposure of the some were absolutely cer• method used in deciphering this kind of tain that their messages could not possibly cipher. be read without the keyword. To begin with, the Nihilist cipher, while Others, not so confident as these, thought bearing certain other earmarks that assist we might be able to decipher their crypto• in its identification by the initiated, is easily grams, saying, however, that they were recognizable from the fact that its num• completely in the dark as to how it could bers are never lower than 22 nor higher be done. than no. But almost to an individual they wanted If this cipher be carefully examined with to know, i/ we succeeded in deciphering a view to discovering weak points in its their communications, by what method this structure, it will be found to consist in the could be accomplished. use of a number of cipher alphabets in suc• A few of the more experienced fans suc• cession. Like the Gronsfeld cipher, it is of ceeded without the key in deciphering the the polyalphdtbetical type, each of its sev- 794 SOLVING CIPHER SECRETS 795 eral alphabets being formed from the orig• direct evidence against him. Just so, if we inal simple numerical alphabet by modify• can prove that the period of a cipher is ing the latter with one of the numbers of nothing other than four, for example, then the secondary or variable key. jour must be the guilty party. A Nihilist cipher written with a key word By consulting the full description of the of ten letters thus would use a fixed series Nihilist cipher in FLYNN'S for March 28 of ten cipher alphabets in a fixed order, you will find that the twenty-five numbers and, in cipher parlance, would be said to of the original alphabet, or primary key, have a period of lo. are formed from the various combinations The Nihilist cipher is, as far as safety is of the figures i, 2, 3, 4, 5, and that the concerned, just about as valuable as a row- numbers of the final cipher result from ad• boat shot full of holes in the middle of the ditions of two of these figures. Atlantic Ocean. This cipher cannot hold a This being the case, it is possible to de• secret, for it is as leaky as a sieve. termine when two numbers cannot have Under favorable conditions it may be been enciphered by the same key number solved by the method of trial guessing ex• by the following simple rule: It is impossi• plained in the article on the Gronsfeld ble for any two numbers whose units or cipher in FLYNN'S for June 6. Or it may whose tens differ by more than 4 to have be resolved by a general method for poly- been enciphered by the same key number. alphabetical ciphers worked out by a Ger• In taking these differences a zero in the man major, F. W. Kasiski, and described units place is counted as ten. And the only in his book, " Die Geheimschriften und die exception to the rule is when a number Dechiffrirkunst," published in 1863. ends in zero. This always results from the Treatment by the Kasiski method con• addition of two fives, and causes the tens sists first in the mathematical determina• digit to be increased by i. Consequently, tion of the period, and then in the develop• in applying the rule, i must always be ment of the several alphabets. All of these deducted from the tens figure of any num• theories will be fully treated in later articles. ber ending in o. But for the present we shall confine our• To illustrate the full application of the selves to a much more ready method, that method, nothing could be much more ap• will neither require as long a message as propriate than to use it in solving one of does Kasiski's, nor as much time in its ap• the recently submitted Nihilist ciphers. And plication. for this purpose the cipher of Thomas J. Now, to get down to brass tacks, this Sullivan, New York City, has been selected special method consists in the determina• as especially fit in illustrating all of the tion, first, of the number of letters in the" necessary points. key (that is, of the period of the cipher); For the purposes of this explanation, his and, second, of the identity of each one of cipher has been rewritten and numbered by these key letters. This latter step is, of fives, making it easy to tell at a glance the course, equivalent to the determination of serial position of any particular cipher each cipher alphabet. group: By the Kasiski method a period is dis• (5) (10) (15) covered by finding out the only one that 55-38-85-48-78- 79-48-49-62-55- 89-102-30-96-69- (20) (25) (30) it could possibly be. But by this method, as paradoxical as it may seem, it is deter• 79-47-42-84-67- 85-48-93-50-78- 57-46-64-48-74- (35) (40) (45) mined by discovering what it is impossible 39-73-59-77-78- 44-55-59-74-30- 84-87-58-78-54- for it to be. (50) (55) (80) This is what detectives would call iden• B5-69-95-50-63- 50-59-49-85-83- 58-93-29-53-68- tification by elimination. If it is absolutely (65) (70) (75) certain, say, that one man out of a dozen 48-58-74-76-33- 94-39-86-79-57- 58-74-4466-105- (80) (85) (90) has committed a murder, and eleven can 50-86-80-56 70- 42-74-43-84-58- 87-70-69-68-73- prove their innocence, then the twelfth must (93) (100) (105) be guilty, even though there may be no 72-58-72-471961 48-68-67-75-46. 57-95-39-78-79. 796 FLYNN'S

In the subjoined table you will find all of divisible into 12 are thus automatically dis• the data required to determine the period posed of. of this particular cipher. But the elimination of a given number For example, if the period is i, this would as a period does not eliminate the multiples mean that the key consisted of but a single of such a number. Thus, if it is found that letter, and that consequently every number 3 cannot be the period, it does not follow in the cipher had been equally increased that 6, 9, 12, 13, et cetera, must on this by the same number. The discovery of ground also be rejected. any two numbers not so enciphered would It is always good policy to test each elim• eliminate this period as a possibility. Two ination by two or three trials with other such numbers are given in the first line of groups. Also it is best before going further the table. to verify the interval not eliminated by Incidentally, a Nihilist cipher with only thorough tests for positive results through• a single letter as the key would be equiva• out the cipher. In the present case there lent to a simple , and will be found no instance where any groups could be solved by any method commonly separated by an interval of 9 provide a dif• used with such ciphers. ference larger than 4, as per the rule. In the case of a period of 2, every second Having rejected every period but 9, it letter would have to be enciphered with may therefore be tentatively assumed that the same key number. The discovery of the period of the cipher is 9, because it is any two numbers separated by an interval not found possible for it to be anything of 2, which, according to the rule, were not else. so enciphered, would eliminate this period. Things now begin to look pretty black Two such numbers are (group 9) 62, and for Number Nine, don't they? So far, noth• (group 11) 39, which have a unit's differ• ing but circumstantial evidence has been ence of 7. uncovered. But perhaps a little snooping All of the other periods should be sim• may reveal something definite. ilarly dealt with. The particular groups Proceeding upon the assumption that used in illustrating intervals 7 and 10 were there are nine letters in the key, the next selected to show the application of the rule step is to learn just what these letters are. to numbers ending in 0. Here you will see For this purpose the cipher is now divided the tens differences tabulated as 5 and 6, re• into periods of nine groups each, and ar• spectively, where actually they are only 4 ranged so as to form nine columns. In this and 5. way all of the groups enciphered by any particular key number are brought together INTERVAL. GROUPS FORllING PIFPERENCES THE INTERVAL, TB.N'S-UN into the same column. 1 (8r.2)-.SS: 85 5 (gr- 8)- (1) _(2) J3) (4) (.5) (6) (7) (8) (9) 2 (sr.O)—02: (gr.lD — 39 7 8 (gr.6)-7n: (gr. 9)- 62 7 55- 38- 85- 48- 76- 79- 46- 49- 62- 4 (gr.&)—62: (gr.l3)- SO 8 55- 30- 102- 30- 96- 69- 79- 47- 42- h (gr.4)—48: (gr. 9)- 62 e 64- 67- 85- 46- 93- 50- 78- 67- 46- 6 (er.6)—70: (gr.12)—102 7 64- 48- 74- 39- 73- .59- 77- 78- 44- 7 (gl-.6)-70: (gr.l3) — 30 (5) 65- 59- 74- 30- 84- 87- 58- 78- SI- .S (gr.3)-85: (gr.ll)- SO 5 OS- 69- 95- 59- 65- 50- 69- 49- 85- 83- 68- 93- 29- 53- 68- 48- 88- 74- 9 76- 36- 04- 39- 86- 79- 57- 58- 74- 10 (gr.3)-S5: (gr.13)- 30 (6) 5 44- 66- 105- 60- 86- 69- 56- 76- 42- 11 (gr.l2)- 74- 48- 84- 68- 87- 70- 60- 68- 73- (Br.l)-55: 102 5 72- 58- 72- 47- 96- 48- 68- 67- 75- 12 (gr.l)-55: (gr.lS)- 30 5 46- 57- 95- 39- 76- 79. IS (gr.fl)-79: (gr.l9)- 64 5 14 (gi-.4)^8: (giMS) — 42 e KEY: 31-L, 14-D 51-V 15-E 42-R 35-P 24-17'oFlj'ir- L 15 (gr.8)—49: (gr.23)- 93 6 « 15-B 2.5-K 25-K etc. etc. etc. etc. etc. 24- IJ 34-0 34-0 25- K 35-P 35-P It is now necessary to mention some facts Now, since in the Nihilist cipher any that might escape your attention. The figure is the result of the addition of two elimination of any number as a period also of the figures /, 2, 3, 4, or 5, it is clear that eliminates all factors of that number as pos• the units or tens figures in any column can sible periods. For instance, if it is found only be from / to 5 greater than the units that the period cannot be 12, neither can it or tens figure respectively of the key num• be 7, 2, 3, 4, or 6, all of which being evenly ber for that column. Here the only excep- SOLVING CIPHER SECRETS 797 tion is, as above, when a number ends in or even longer than, the message itself. o, its tens figure must be reckoned as / less Even such a refractory case is, however, than its actual value. possible of solution by the method just men• It may now be mentioned that in the tioned. Nihilist cipher 2 is always the result of the In the present case more than one key addition of i and /; and o always repre• number is mathematically possible in col• sents the sum of 5 and 5. Similarly, 22, 30, umns 2, 7, and 8. In column 2, for ex• 102, and no are always the doubles of ample, the first figure of the key might be II (A), 30 (E), 51 (V), and 55 (Z) re• either i or 2; and the second, either 4 or 5. spectively. The presence of any of these This makes possible for this column four figures or numbers in a cipher, as in col• different key numbers: 14 (D), 15 (E), umns 3 (V) and 4 (E) of the foregoing 24 (IJ), or 25 (K). Similarly, both col• , will thus always materially umns 7 and 8 could be 24 (IJ), 25 (K), simplify operations. 34 (O), or 35 (P). That these two hap• To illustrate the method of determining pen to come out alike is, of course, purely the figures of the key, take column i. Here accidental. the units run from 2 to 6. The 2 alone is The key, insofar as it has yet been deter• evidence enough that the unit figure of the mined, will stand "as shown in the above key is /; but the 6 is additional proof, in periodic arrangement of the cryptogram. that it is not larger than i by more than Poor old Number Nine, now just about five. The tens in this same column run completely enmeshed in the web of his own from 4 to 8. Consequently the tens figure making, seems to be nearing the end of his of this key number must be 3, since 4-5-6- rope. 7-8 are within the prescribed limits of that We can almost hear the rapping of the figure. The first key number is thus found gavel, and the stern voice of the judge as tobejr (L). he thunders: " Number Nine, stand up, and When the cryptogram is long enough, it receive the sentence of this court!" is possible to determine all of the letters But let's hang around a little longer. of the key in this manner. And, further, Maybe we'll see this suspect get it in the since the cipher is thus mathematically de• neck. cipherable, it is unnecessary to know any• Of the several key combinations possible thing of the contents of the message in order with the additional letters, that forming the to solve it. word LIVERPOOL fairly shouts its pres• The method would work just as well if ence. And by actual trial it is the only one the message chanced to be, say, in French, that will provide plausible results in all and the key word happened to be German. parts of the cryptogram. And the decipherer would not have to un• For example, the second letter of the key derstand a single word of either language can be either E or /. But E can be re• in order to find the key. jected, however, since the key LEVERP-L, But in a shorter cipher, it is not always by trial with the first period of the cipher possible by this method alone to narrow gives ICONOT-L as the translation, while each letter of the key down to but a single L/VERP-L gives IDONOT-L (I DO possibility. As a general rule, as the length NOT-L, et cetera). of the message decreases, or that of the Again, the ninth period as deciphered by key increases, the greater becomes the num• the key L-VERP-L comes out C-YPTO ber of mathematically possible numbers for —A. Here the word intended obviously each letter of the key. is Cf?YPTOGRA(m), thus determining Such a cipher is solved by trying all pos• with a single word all the doubtful letters sible combinations of the various key num• of the key. bers, in search of those combinations that Here is Mr. Sullivan's message complete• provide logical sequences of letters both in ly deciphered with the key LIVERPOOL: the key word and in the message. The cli• "I DO NOT BELIEVE YOU CAN max is reached when the key is as long as, SOLVE THE NIHILIST CIPHER 798 FLYNN'S

WITHOUT THE KEY WORD, AND I 66-30-55-69-65-65-65-65-96-75-48-65-60- SUBMIT THIS CRYPTOGRAM IN 82-26-86-88-94-57-30-47-60-74-46-59-47- 66-53-46-53-99-74-SS-78-76-66-57-58-34- SUPPORT OF MY CONTENTION." 99-73-35-57-57-53-84-29-37-78-73-35-66- So now you have the method. Quite 57- 86-53-46-65-79-75-34-59-77-86-76-57- lengthy to describe, it is simplicity itself to 46- 60-74-45-65-55-53-55-59- use. This looks as though some one might The periods may be represented by a sim• have been watching the clock. ple row of numbers, each interval being CIPHER No. 3. This one was sub• crossed out as it is eliminated. The cipher mitted by James Veale, D. D., South Ozone may be then divided by pencil marks into Park, Long Island. Rev. Mr. Veale enjoys periods of the determined length, and most FLYNN'S and finds this department a store• of the work done mentally from the original house of curious and interesting informa• cryptogram. tion. To discover the key word is often but 34-55-89-56-48-85-37-67-67-77-36-53-64- the work of two or three minutes. 58- 77-47-59-57-45-35-57-34-70-66-46-39- Here are some Nihilist ciphers upon which 89-57-60-84-26-48-70-46-30-84-24-66-79- 47- 28-73-28-67-46-65-30-74-47-67-79-47- to try out your newly acquired method. 48- 86-28-66-50-66-59-66-46-46. They are selected from those sent in re• CIPHER No. 4. Here is a specimen sponse to the Nihilist challenge. from an enthusiastic fan, Fredolf A. Holm- And, by the way, fans, let's try now to berg, of Augusta, Kansas: break the record. About two hundred of 59- 26-74-68-57-77-30-75-59-78-59-57-58- you submitted solutions to the Nihilist 48-66-28-67-58-50-58-53-77-38-56-26-84- cipher in FLYNN'S for March 28. 59-69-48-57-96-47-57-28-56-68-47-30-73- Armed with this exposure, more than this 68-39-84-30-57-87-59-48-56-59-37-57-50- should succeed in solving one or more of 56- 59-77-26-54-75-39. the following ciphers without the key We would be interested to receive full de• ivords! tails of the scheme mentioned in this cipher. Here goes! CIPHER No. 5. J. Fleming Jones, State CIPHER No. I. This one came un• Game and Fish Ranger, Okemah, Okla• signed from Meriden, Connecticut. How• homa, says: ever, the sender had used his name as the 97-79-80-47-53-78-78-57-74-76-79-38-57- key word. 76-68-84-74-59-56-46-96-57-67-85-67-88- 59-48-53-37-65-53-86-88-47-69-66-68-77- 57- 74-66. 104-50-46-73-76-85-36-86-49-89-64-50-58- 86-94-78-65-65-30-97-96-69-69-76-87-78- And you can bet your last nickel that we 43-96-49-99-66-50-28-66-77-77-37-84-39- will do as he suggests. 98-96-50-46-73-74-69-45-76-67-108-86-80- CIPHER No. 6. Henry Koester, New- 29 - 66 - 56-78-66-53-48-68-76-87-39-73-73- burgh, New York, whose cipher follows, be• 98-45-53-48-79-106-69-60-94-66-98-45-66- 49-108-64-59-46-73. lieves in more ways than one that his mes• sage is in desperate need of his key word. We're on, Bill! You'll find what you are 63-55-26-86-38-47-26-54-47-60-84-58-48- after in this article. 26-44-47-30-56. CIPHER No. 2 Neil C. Bierce, police The keys and solutions to all of the above headquarters, Portsmouth, New Hampshire, ciphers will be found in next Solving sends in this sample: Cipher Secrets. SOLUTIONS TO THE GRONSFELD CIPHERS The first of the Gronsfeld ciphers pub• The second of the two Gronsfeld ciphers, lished in FLYNN'S for June 6 was enciph• using a longer key, in connection with a ered by the same key used by Verne for the shorter message, was expected to be much cryptogram in his Giant Raft; and the mes• more difficult of solution. sage was a translation from the original Here are the keys and solutions of these French of that same cipher. two ciphers: SOLVING CIPHER- SECRETS 799

CIPHER No. I. Key: 432513. Solution: And it is especially adaptable, as you "THE REAL AUTHOR OF THE ROB• have already, learned, to the Gronsfeld BERY OF THE DIAMONDS AND OF THE MURDER OF THE SOLDIERS WHO ES• cipher. CORTED THE CONVOY, COMMITTED The solutions to the three Nihilist ciphers DURING THE NIGHT OF THE TWENTY- in the June 6 issue are intentionally with• SECOND OF JANUARY, ONE THOUSAND held so as to give every one a chance to EIGHT HUNDRED AND TWENTY-SIX, solve them by the method dealt with in this WAS NOT THUS JOAM DACOSTA, UN• JUSTLY CONDEMNED TO DEATH; IT article. WAS I, THE WRETCHED SERVANT OF The solutions to these ciphers will be THE ADMINISTRATION OF THE DIA• published, however, in the next Solving MOND DISTRICT. YES, I ALONE, WHO Cipher Secrets, together with those of the SIGN THIS WITH MY TRUE NAME, ORTEGA." Nihilist ciphers in this issue. CIPHER No. 2. Key: 465812462. Solu• The solution to the cipher by Hyman tion: JULES VERNE WOULD NOT HAVE Wacks, in FLYNN'S for May 16, is as fol• THOUGHT IT POSSIBLE FOR YOU TO lows: HAVE DECIPHERED THIS WITHOUT A KEY. YOUR LIFE IS IN DANGER. AVOID ME. POSTPONE ATTEMPT ON FIRST Many polyalphabetical ciphers, such as NATIONAL. the Nihilist and Gronsfeld ciphers, can be solved by a general method that does not re• This is a simple substitution cipher in quire any information as to the particular which the key is formed by using the fifth system used. letter of the alphabet, E, as the substitute When a cryptogram is believed, however, for A; the fifth letter after E (namely, /) to be in some particular cipher, often a for B; the fifth after that, 0, for C; and special method can be successfully applied. so on. The method of trial guessing described in This cryptogram does not use all of the last Solving Cipher Secrets, while not as letters of the alphabet, but by determining effective as some others, may often be used the principle on which the key is based, the to advantage, either alone, or in combina• entire cipher alphabet, as given below, may tion with other methods. be reconstructed: Normal Alphabet: ABCDEFGHIJ KLMNOPQRSTUVWXYZ Cipher Alphabet: EJOTYDINSX CHMRWBGLQVAFK PUZ SOME CHALLENGE CIPHERS

•Here, fans, is a letter that doubly deserves 14 3 3 4 2 0 10 2 4 17 18 II 14 o 4 I your attention. For not only has it come 691 20 333 13 O 10 894820 II 3 a long distance, but it contains, as well, an 7 o 21 14 S 10 15 14 6 26 3 22 20 5 o 10 o II 23 15 12 II 5 I 10 7 7 5 14 o 7 ingenious cipher to test your skill. 9 24 084 II II 92 10 392 1303 DEAR SIR: 13 13 13 14 14 21 5 9 o I 2 12 o 4 o 16 The following message is writ*^en in a secret 4341201819455423633917 code known to smugglers: 758242 IS 74 13 1429 AH MING: The only condition to this offer is that your YRT HSRKNVMG WFV HSRMBL solution must be received within one month NZIF. ED. from the date of the issue in which the cipher If this message is solved, or cannot be is published. J. LEVINE, solved, please let me know the results. The Long Beach, California. readers of your magazine will have a hard time deciphering it. S. HUTCHINSON. Honolulu, Hawaiian Islands. Here is a cipher from Mr. L. W. Harke, Chicago, Illinois. It is not of extreme diffi• Here is an opportunity for you to benefit culty. Neither is it as easy as it looks: from your ability as a decipherer: DEAR SIR: OABAEAEAAOAEBABTO I will give the money for one year's sub• after EAEAH0BT8 after D O A C scription to FLYNN'S to the first person solv• A A D O B C after H B T 7 plus i o 7 ing the following cipher: plus I after 8 A I O 8 A A D after C A S O 800 FLYNN'S

ETABTBTAE after 4 then 4 O 47-19-31-49-45-3-28-10-0-12-43-0-13-37-2- B after 4OAHEADBEOBBEXII 3 l-XX - X-4 7-X-o-1 -2 -3 6-48-12 -9- X - 7-46-0- after E A E A H O after 6 E B T A B C 17-14-46-9-0-14-15-41-0-11-1-28-40-34-12- ABE. RED. 54-0-15-5-32-44-38-16-3-0-13-36-25-3-0-16- 39-27-0-20-8-17-2-26-12-X-31-o-I8-44-I5-o- The following interesting cryptogram is 2g-I9-20-45-7-l3-3o-SS• 11-30-0-17-0-15-22-23. submitted by Mr. J. C. Bell, 16910 Endora Road, Cleveland, Ohio. Our correspondent Mr. Bell says that until his cipher is is absolutely certain that his system is one solved he is going to stubbornly insist that which no living man can decipher. Here it cannot be done. it is: Try your hand, fans, and look for some 7-S5-54-28-13-8-33-0-3-21-39-32-29-0-S-9-23- 13-0-9-52-20-2 -X-35-0-6-23-53-32-14-42-17- more of these challenge ciphers at an early X-0-8-19-26-23-25-53-5-0-4-49-21-40-16-0-2- date.

IS YOUR KEY WORD HERE?

Some more of the fans who submitted Daisy Malley, Pomerania P. O., New Jersey. ciphers in response to the recent invitation MALLEY. to solve Nihilist ciphers will find their F. H. A. Martel, Battleford, Saskatchewan, Canada. CANADA. names and their key words listed here. J. G. Meerdink, Hoboken, New Jersey. SUC• Another group will be published in the CESS. next Solving Cipher Secrets. John McCormack, Dripping Springs, Texas. W. Ray Cupps, Springdale, Pennsylvania. CIPHERFAN. EDITOR. William T. McCaw, Cambridge, Massachusetts. H. B. Elsom, Houston, Texas. HOUSTON. CHEER. Mrs. Geo. Englert, Toledo, Ohio. OHAVER. Clyde M. McKinney, Lackawanna, New York. J. C. Folsora, Glenrock, Wyoming. FOLSOM. FLYNNS. Joe F. Faltz, Washington, District of Columbia. W. C. McNerney, St. Louis, Missouri. CHINA. CHICAGO. Donald C. Burgess, Parsons, Kansas. COO- Clarence S. Fox, Syracuse, New York. SYRA• LIDGE. CUSE. Arthur L. Cadieux, Crookston, Minnesota. George W. Ford, Jr., Denver, Colorado. FORD. HARD. Jasper Freeman, Hinsdale, New Hampshire. James R. Cain, Syracuse, New York. OHAVER. EASTER. John Campbell, Providence, Rhode Island. Victor Freeman, Hamilton, Ontario. SECRET. MEOHAVER. William R. Friske, Chicago, Illinois. SOVIET. Leonard Caronfa, Washington, District of Co• Mrs. C. G. Gay, St. Joe, Idaho. CIPHERS. lumbia. CAIRO. John A. Gonding, Omaha„ Nebraska. OHAVER. W. A. Caudill, Akron, Ohio. CINCINNATI. Reuben Gordon, Baltimore, Maryland. MA• Tom Clark, Oakland, California. OHAVER. RINE. Paul M. Conlan, New York, New York. R. E. Graham, Fresno, California. MOTHER. MEOHAVER. James R. Heeney, Newark, New Jersey. RA- Paul M. Conroe, San Diego, California. CON- DIOTIC. ROE. R. M. Hilgert, D. D. S., Footville, Wisconsin. Clayton L. Couture, Adams, Massachusetts. OHAVER. EDITOR. Raymond Johnson, Brooklyn, New York. John P. Crotty, Jr., Charleston, Massachusetts. QUALITY. OHAVER. Clifford S. Jones, Montreal, Canada. CANADA. Charles A. Cushman, St. Petersburgh, Florida. W. E. Jones, Aurora, Illinois. JORES. BABERUTH. Thomas M. Kennedy, Holyoke, Massachusetts. Harold Daly, Brooklyn, New York. VIRGINIA. SKILLED. Mrs. C. R. De Santis, Los Angeles, California. Fred G. Knaus, New Orleans, Louisiana. MHSWEENEY. KNAUS. Jack S. Dowd, East Lynn, Massachusetts. John A. Kronberg, Eau Claire, Wisconsin. CODE. OHAVER. Alden Dowdy, Chicago, Illinois. OHAVER. Abraham Levine, New York, New York. Vernon Driscoll, Hamilton, Ontario, Canada. BEST. SPHINX. Alfred Park Lyon, Jr., Yonkers, New York. Victor Dyer, San Francisco, California. VIC• CODE. TOR. 10 F W