Welcome to Zodiac Cipher!
Zodiackiller.com Message Board: Ciphers: Welcome to Zodiac Cipher!
|By Glen Claston (dialup-18.104.22.168.dallas1.level3.net - 22.214.171.124) on Friday, August 18, 2000 - 08:41 pm:|
Thanks for the Cipher section, Tom. I'm sure we'll all have a lot of fun with it. I'll
give a brief overview of the subject, just to get the ball rolling.
There were four ciphers sent by the Zodiac killer, only one of which has been partially solved. The ciphers were reviewed by government agencies with no firm results, and I believe the prevailing opinion of law enforcement to be that the remaining ciphers are hoaxes. (This is not an opinion I share.)
The text of the first cipher can be summed up as a rambling list of reasons Zodiac killed, along with some esoteric religious reasoning of why he would continue to kill.
This cipher was broken very quickly by G. and W. Harden, a couple of average citizens, just like you and me. This probably angered Zodiac, which is why the remaining ciphers are so difficult.
The best security for any cipher, no matter how complex, is its brevity of use. Zodiac gets high points for brevity.
The first cipher was 408 characters long, and all but the last 18 characters has been read.
The second cipher fell to 340 characters in length with extra symbols added and no subject mentioned. The last line of this cipher also demonstrates "random" statistics when compared to the rest of the cipher, and includes the word "Zodaik" (with a Greek delta for the d).
The third cipher was a mere 13 characters long, preceded by the words "My name is -". Presumably this cipher contains Zodiac's name. Graysmith notes in his book that a cryptologist from the American Cryptogram Association challenged Zodiac to give his name in cipher, and boasted that it would be broken. I can't find any references to the exact date that program aired, but it presumably aired before Zodiac said "My name is-". Z may well have risen to the radio challenge and given his actual name.
The fourth cipher was a whopping 32 characters long by comparison, and supposedly contained the location of a bomb which was set to destroy a school bus full of children. A Philips 66 map was sent along with the cipher. The map and the cipher can be viewed here on Tom's site. A later Zodiac letter indicated that this cipher pertained to "radians and inches along radians." If this cipher contains legible text, the bulk of it will most probably be numbers written out.
I'm very willing to discuss these ciphers in great detail, and I'm slowly updating a page of statistics that can be used for reference on each of the ciphers.
I will readily discuss any idea on cipher meaning or attempts at decryption of these ciphers, and I'm aware that just because I take a more scientific approach to the problem, one of you may have an insight that solves the problem once and for all. A lot of good cryptology is following a hunch in the right direction.
On the reverse side, I don't mind examining claims and presenting my findings on why that claim may or may not be valid. Any quid pro quo exchange of ideas has its practical purpose. I might be able to save you some time from going in the wrong direction, and you may be able to save me some time from going in the wrong direction.
Those of you who know me from past posts know that I have no favorite suspect and I frankly don't think we'll ever know for sure who the Zodiac was, but I do know that the only hard evidence in the case that has not been thoroughly examined and reexamined is the cipher evidence.
If there is a clue that will lead to the identification of the killer, it most likely resides in the cipher evidence, and to me that makes this section of Tom's board the most important section of all.
|By Kevin M (cx206582-c.mesa1.az.home.com - 126.96.36.199) on Saturday, August 19, 2000 - 02:19 am:|
Been following your posts for quite some time. I agree with the last part of your statement in particular, and that's why I think you could really be on to something. I find your explanations to be very interesting and do like to follow along. Even though I am licensed by the FCC with a 2nd class radiotelegraph license and can copy Morse at 25+ wpm ( it's a language ), I do not have the type of brain to actually DO this type of math/crypto work... so I'll leave that up to you. However, I'm rather curious as to what you actually intend to do with this. Are you going to make an attempt at solving these, or just discuss the theory? Do you have a timeline and a plan? I'm sure you do... just wondering what your game plan is.
|By Glen Claston (dialup-188.8.131.52.dallas1.level3.net - 184.108.40.206) on Saturday, August 19, 2000 - 01:14 pm:|
All very good questions, and you do have the brain to do crypto work. All you need is a
pencil and a piece of paper!
Presently I've been working on the 340-cipher, as time permits. It was necessary to establish a list of Zodiac letters to build a profile of Z language. This list generates statistics on character usage, word usage, and Z phraseology that can be useful. We found that while Z used the word THE as the most common word (we all do), his second most common word was the word "I"! That in itself has implications.
The next step was to determine whether the 340-cipher possibly contained meaningful text, or was it just a random fake sent by a hoaxter? Character placement and frequency are in line with the 408-cipher, there is a correction, and distant character spacing is in line with normal language. This leads me to believe that there is most probably intelligent information contained in this cipher. The single correction made on the page almost cinches it, making it worthwhile to continue the investigation.
The next step is a lengthy one, but it will save time later. It becomes necessary to determine just how the information is enciphered. Did Z used his old system with a twist, or did he do something entirely different? Is the system used forward, backward, up, down, diagonal, or is the information anagrammed in the body of the cipher?
I've tested for up, down, forward, backward, and diagonal, but the test for anagramming doesn't really exist, so I'm having to invent something that can give me meaningful insight into this particular aspect.
We are fortunate in this instance that we have an example of Z's cipher in the 408-cipher. What I've decided to do is to anagram Z's message from the 408-cipher using the three most common anagramming techniques, and then re-encipher the resulting text with his old system. This should generate some useful statistics on anagramming that can be used to compare with the 340-cipher.
Once all tests are completed, a rational estimate of methodology can be deduced, which will give direction to decipherment attempts. It's all pretty straight forward stuff.
I'm also presently compiling a list of possible equivalents for characters that can be used as tryouts on the cipher. By the process of logical elimination we can get the system down to a workable level and even have several interested people at a time working on one of the possible aspects of the cipher. Perhaps we can even get someone to write a program that can automate most of the paperwork for us.
While the brevity of the cipher works against us, we can certainly improve our chances by making some intelligent and informed observations.
The timeline for the project is quite another matter. Time for me is precious few minutes to work on projects presently, but I hope my schedule will improve. As I said before, the case is 30 years old, so I don't feel a great sense of urgency, but like you I wish to see this thing solved sometime soon!
I'm sure you own a pencil, so here's the piece of paper, located at:
Print this cipher out (several copies) and start taking some of your best guesses! As a starting point, a language run I did on the cipher last night came up with 18 possibles for the very beginning of the cipher. The two most possible beginnings are "I will,,," or "I kill..." for the first five characters of the cipher. Choose one or both and take your best shot at trying to figure out the rest of the cipher. If you assume a character is "I", fill in the letter "I" for all other occurrences of the character in the cipher body, and see if any other words come to mind. It's really a process of trial and error, based on intelligent assumptions.
|By Glen Claston (dialup-220.127.116.11.dallas1.level3.net - 18.104.22.168) on Saturday, August 19, 2000 - 01:47 pm:|
An addendum on starting points -
please reference the below page to follow:
Characters 78 through 82, (O filled in, FP+P) is also a good tryout point. Language runs indicate that it's most probable equivalent is either "THERE" or "THESE".
This gives us the possibility of either an R or an S for the all important character "+".
(Don't forget that if the + character is an R, the word "WHERE" also becomes a third possible.)
|By Kevin M (cx206582-c.mesa1.az.home.com - 22.214.171.124) on Sunday, August 20, 2000 - 02:03 am:|
Not sure what you mean by "anagraming"...
|By Glen Claston (dialup-126.96.36.199.dallas1.level3.net - 188.8.131.52) on Sunday, August 20, 2000 - 05:29 am:|
Anagramming is one form of character transposition, best demonstrated by the most
common usage of the technique of repositioning the characters in each word:
The quick brown fox jumped over the fence.
het iuqkc rwnbo xfo updejm orev hte neecf.
Now we would remove all punctuation and run the characters together thus before replacing them with symbols:
Graysmith's solution is based on anagramming, but he fails to present any system by which the technique was carried out. Without a definite system of encryption, one can never be sure that the information extracted is correct, primarily because an astronomical amount of sentences can be constructed from this string, along with the right one, of course. A case in point are all the varied solutions sent to the newspapers from the last 18 characters of the 340-cipher.
I haven't found any evidence of anagramming in the 340-cipher, but since the issue has arisen in Graysmith's decipherment, it becomes necessary to run tests anyway so that when I say there isn't any anagramming, I have facts and statistics readily available to support my statement.
One correction, there is a simple method of testing for anagramming, though not always conclusive, and that is looking for most common word lengths, such as the length of the word "the" and seeing if there are any groups of three whose symbols appear in different positions.
|By Glen Claston (dialup-184.108.40.206.dallas1.level3.net - 220.127.116.11) on Sunday, August 20, 2000 - 05:31 am:|
Correction in the last post:
A case in point are all the varied solutions sent to the newspapers from the last 18 characters of the 408-cipher (3-part cipher).
|By Bruce D. (pm3-02-43.sle.du.teleport.com - 18.104.22.168) on Sunday, August 20, 2000 - 05:29 pm:|
For Glen Claston:
I don't know if Glen remembers my email to him when he came back on the Board after being away for a couple of months, but I told him that he held the key to solving this Z senario if it is ever to be solved. Maybe the law wouldn't agree but I'd sure like to see what he comes up with when(I KNOW HE WILL) he solves the ciphes
|By Ken (pppa40-resaleburlingtonnc1-1r7137.saturn.bbn.com - 22.214.171.124) on Sunday, August 20, 2000 - 06:49 pm:|
Glen what is Graysmith's solution to the cipher? I have not seen it before.
|By Glen Claston (dialup-126.96.36.199.dallas1.level3.net - 188.8.131.52) on Sunday, August 20, 2000 - 06:52 pm:|
Earlier I reported "interesting anomalies" and "peculiarities"
existing in the 340-cipher. These are weaknesses that provide the best possible
exploitation of the underlying system, and a list of them can be found at the following
location for printout:
While it's more fun to attack the cipher as a whole, this list provides the most likely road into the true meaning of the cipher. Anyone who finds the proper letter correlations to the sequences posted will have essentially solved the cipher.
(the character numbers refer to character placement within the cipher, which can be referenced at
|By Glen Claston (dialup-184.108.40.206.dallas1.level3.net - 220.127.116.11) on Sunday, August 20, 2000 - 09:03 pm:|
For Bruce D.,
Thanks for the undeserved words, Bruce, and I did review your previous e-mail just for reference. (I'm pretty anal about saving things.)
I hope you notice that since I've only had time to do the boring statistical runs on this cipher and not much time to sit down with pencil and paper, I'm posting my findings in non-technical posts so whoever's interested can pick up a pencil and perhaps be the one to solve a Zodiac Cipher!
Despite everything I've looked at, there is no indication that this cipher differs much in structure from Z's original 3-part cipher, which is pretty good news. While it's obvious he did a much better job at frequency suppression and error checking, he still made mistakes.
The only check I've done that was inconclusive is whether or not this cipher is written left to right or right to left, since both directions generate the same stats. Other than that one little problem I haven't yet developed a good test for, everything else brings the cipher down to a level that just about anyone can work on and get lucky with.
As long as we keep in mind that it may be written right to left, we're down to identifying and exploiting the weaknesses and solving this thing.
We've probably got a couple of Hardens out there that have some time and like puzzles, so let's get started. It's 30 years overdue, don't you think?
|By Michael (ip133.lancaster5.pa.pub-ip.psi.net - 18.104.22.168) on Monday, August 21, 2000 - 01:45 pm:|
If someone could get the NSA to toss the 340 on one of their Cray supers The code
would be broken in min, if it is really a code and not just 340 symbols that mean nothing
|By Glen Claston (dialup-22.214.171.124.dallas1.level3.net - 126.96.36.199) on Monday, August 21, 2000 - 07:57 pm:|
If one believes everything Graysmith says, the 340-cipher was considered too short to
produce meaningful statistics through computer runs. The FOIA files show that computer
runs were made on the 340-cipher by the Army Security Agency (a onetime military arm of
the NSA), and the Naval Academy, (also containing a military arm of the NSA). While their
runs did not break the cipher, they did provide feedback on possible equivalents to
certain cipher characters and groups.
By proxy, the NSA did feed this into their computers. So why wasn't it broken in minutes? Because machines are really good at breaking cipher written in machine language or generated by other machines, but machines have no advantage with cipher written by human beings because humans don't think like machines!
|By Kevin M (cx206582-c.mesa1.az.home.com - 188.8.131.52) on Monday, August 21, 2000 - 10:28 pm:|
Until IBM's "Big Blue" that is...
|By Michael (ip119.lancaster5.pa.pub-ip.psi.net - 184.108.40.206) on Tuesday, August 22, 2000 - 01:24 pm:|
I agree with kevin, Computers are far more powerful and complex now that they were
even a few years ago. And do you really think that you can break a code with pencil and
paper and the NSA super computers cant? In just the past few years they have built
computers that can "think"
|By Ed N. (spider-mtc-td013.proxy.aol.com - 220.127.116.11) on Tuesday, August 22, 2000 - 02:46 pm:|
But can they think in an abstract manner like humans can? It's intuition or a hunch that often solves ciphers, and people have been plugging away at Z's other three ciphers for 30 years to no avail (unless you count Graysmith's solution to the 340-symbol cipher, and Penn's bizarre solutions as well). That's not to say that computers can't, because they probably can given enough time. But if the 340-symbol cipher is in fact a substitution-transposition cipher, I have to wonder how many other halfway coherent solutions can be derived from it?
|By scott (exchange.thebernsteincompanies.com - 18.104.22.168) on Tuesday, August 22, 2000 - 04:42 pm:|
The zodiac was an ego-maniac who craved attention. He wanted the public to believe he
was more intelligent then the police force, probably because they had rejected him or
mistreated him in some way. It probably made him furious that the first cipher was solved
What better way to look like a genius, then to next send unsolvable ciphers.Unsolvable because there is no solution. That way police and people like us would puzzle over them for decades to come. Is not that a possibility
|By Glen Claston (dialup-22.214.171.124.dallas1.level3.net - 126.96.36.199) on Tuesday, August 22, 2000 - 05:55 pm:|
Do I think a human can solve a cipher that a super-computer can't? No offense to
super-computers, but when it comes to a cipher only 340 characters long created by a
madman, the human mind is a vastly superior computing tool.
I also see Scott restating the "hoax" theory, to which I once again submit that in order for Z to have created a hoax of this caliber, he would have to have indeed been the genius he wanted everyone to think he was. That would force us to reevaluate our perception that he was an egomaniac, because if he was that good, every bit of his ego was well placed and well deserved!
|By scott (exchange.thebernsteincompanies.com - 188.8.131.52) on Tuesday, August 22, 2000 - 06:49 pm:|
I know nothing about ciphers. Its way over my head.I mean no offense to glen because you obviously have spent much time trying to decode them, which I think is very admirable. Puzzles are fun to try to solve. They are a challenge. Here it's a direct challenge from a serial killer. "You think your smarter then me, solve this"."Catch me." Remember though this challenge comes from a man with a very deranged mind. We know in his letter's he has misrepresented himself several times and exaggerated to great affect to make his crimes seem more grandiose. I would not use the word "hoax" to describe the zodiac unsolved ciphers. I just think they might be meant to mislead. To through the police "off the scent" so to speak.
|By Glen Claston (dialup-184.108.40.206.dallas1.level3.net - 220.127.116.11) on Wednesday, August 23, 2000 - 05:19 pm:|
To throw the police "off the scent"? I would have to say this belief may be
justified with the "my name is" cipher and the "where's the bomb"
cipher, as these would indeed have the desired effect. I don't believe this to be the case
with the 340-cipher.
The 340-cipher came with no subject and offered no expectations when it was cracked, even though the first 3-part cipher offered expectations of the killer's identity. This cipher offered the police no scent at all, not even a boast.
The last two may yet prove to be hoaxes, they certainly have all the earmarks. But for all my previously stated reasons, as well as reasoning that goes beyond the obvious, I stand firm in my belief that the 340 cipher is no hoax.
|By scott (exchange.thebernsteincompanies.com - 18.104.22.168) on Wednesday, August 23, 2000 - 06:32 pm:|
I agree glen the 340 cipher was not a "hoax". It contained an actual message but in his letter Zodiac claimed that if it was solved it would contain his identity. It did not. In fact it could be argued that it contained no useful informations except to better understand Zodiac's motives. I believe the ciphers served two purposes to the Zodiac: 1. To waste police time, remember every homicide detective working on decoding the cipher was not out running down leads. 2. To broadcast to the world Zodiac intelligence. The two unsolved ciphers might have solutions. That they contain useful info that might unmask Zodiac is doubtful.
|By Glen Claston (dialup-22.214.171.124.dallas1.level3.net - 126.96.36.199) on Wednesday, August 23, 2000 - 07:38 pm:|
Determining whether the ciphers contain any new clues or information is precisely the
purpose of this research, and we won't know either way until the ciphers have been solved.
We can only hope that Z's preoccupation with his own name led him to do something CRAZY (heh heh), like leave a clue to his identity. There is some indication in his letters that he was at least worried he had let something slip. Let's just hope so.
|By Anonymous (spider-wa062.proxy.aol.com - 188.8.131.52) on Tuesday, August 29, 2000 - 02:33 pm:|
When I tried to open your page, the second half of the cipher did not appear.
|By Glen Claston (dialup-184.108.40.206.dallas1.level3.net - 220.127.116.11) on Tuesday, August 29, 2000 - 04:25 pm:|
I just tried it and got both halves, but I've had problems in the past. It has to do with me using FrontPage extensions and file directories on Geocities. If you still have problems, maybe I can get Tom to post the two images on his site for easier access.
|By John C. King (pc308181.wcom.com - 18.104.22.168) on Wednesday, August 30, 2000 - 10:06 am:|
My master's thesis was titled, "The Complete Automated Cryptanalysis of Sequential
Homophonic Ciphers". I got interested in the Zodiac ciphers at that time and am
willing to dig out all of my research (finished and unfinished) for anyone who would want
it. I have information regarding the following:
1) Z1 (the solved "long" Zodiac cipher), was solved after being published in the newspapers. It is a "random" homophonic cipher, but the Zodiac began it as a "sequential" homophonic cipher.
2) Z2 (the unsolved "long" Zodiac cipher) is not a sequential homophonic cipher. It could involve transposition.
3) William Friedman (the great) outlines the many different types of transposition ciphers. I stopped researching Z2 before writing a program to transpose Z2 by these methods. I believe this is the best way to try to solve it if no one has done this before.
4) Z2 has a "correction" that seems to indicate it does contain a message.
5) The ending of Z2, which contains Zodiac's name in ciphertext, is sure to be "padding", such as is the end of Z1 seems to be. The end of Z1 is most probably padding even though hundreds of people have proposed anagrammed solutions for it.
Some of the above was published under the same title in Cryptologia back in '93 or so. I'll have to give you the exact information or reprints if you want it (all of my six papers were inadvertently omitted from the multiyear
John C. King
|By Jake (Jake) (spider-mtc-tc064.proxy.aol.com - 22.214.171.124) on Wednesday, August 30, 2000 - 02:32 pm:|
John, I'm interested in an elaboration of your post. I'd also be interested in the
date(s) of the Cryptologia article(s): are they online?
"This is the Zodiac Speaking..."
|By Anonymous (spider-wn032.proxy.aol.com - 126.96.36.199) on Wednesday, August 30, 2000 - 11:22 pm:|
I'm with Jake on this , let's check it out... J
|By Glen Claston (dialup-188.8.131.52.dallas1.level3.net - 184.108.40.206) on Thursday, August 31, 2000 - 07:19 am:|
Thanks for the heads up. I have most back issues of cryptologia, and I probably read your papers at one time. I'll look them up again!
I look forward to any elaboration you might be willing to give on your studies of the 340 cipher. It has some very interesting features that clearly involve language.
|By John C. King (pc308181.wcom.com - 220.127.116.11) on Thursday, August 31, 2000 - 11:37 am:|
Their are two papers, both touch on the Zodiac ciphers.
King, John C & Bahler. 1993. A Framework for the Study of Homophonic Ciphers in Classical Encryption and Genetic System. "Cryptologia" 17(1): 45-54.
King, John C. & Bahler. 1993. An Algorithmic Solution of Sequential Homophonic Ciphers. "Cryptologia" 17(2): 148-165.
John C. King
|By Glen Claston (dialup-18.104.22.168.dallas1.level3.net - 22.214.171.124) on Thursday, August 31, 2000 - 02:33 pm:|
Since John King brought up the possibility of transposition in the 340-cipher,
Ill present some notes on the subject for general review. Transposition is one of
the possible aspects of the 340-cipher that has drawn the most attention, and definitely
something Ive been concerned with in the course of this investigation.
We already know that Zodiac used two types of frequency suppression multiple characters for high frequency characters, and intentional misspelling of words. Anagramming/transposition would be another form of frequency suppression, and most certainly must be looked at and tested for because the method of solution would then be quite different.
Ive run several different sets looking for transposition, and all would appear to indicate that transposition is not present. Language structure appears to be intact and contiguously written in the standard left-to-right manner.
Any consideration of transposition must take into account the several methods that could have been employed, but each of these methods has the same desired effect-the disruption of word structure. A comparison of the ciphertext of both the 3-part and 340-ciphers does not demonstrate any significant shift between the two ciphers in digraph and trigraph transposition or distribution.
A common form of transposition/anagramming is the transposition of each character in a word, performed on each word in turn. In this simple method, we must consider the total number of ways the letters in a word can be transposed. Since we know that Zs average word length is between 3 and 4 words, this means that many of his words will fall in this grouping. Below are the 6 possibles for a three letter word and the 24 possibles for a 4 letter word.
3 letters abc, acb, bca, bac, cab, cba
4 letters abcd, abdc, acbd, acdb, adbc, adcb, bacd, badc, bcda, bcad, bdac, bdca, cabd, cadb, cbda, cbad, cdab, cdba, dabc, dacb, dbca, dbac, dcab, dcba.
If we consider the most common word "the" as our sample, we find expected occurrences of digraphs for "the" would be th-2 te-2 he-2 ht-2 et-2 eh-2, or otherwise stated as an equal number of digraphs present for each transposition of the word "the" in a homophonic substitution cipher. As you read on, you'll see this does not present itself in the 340 cipher.
The 340-cipher contains 21 recurring digraphs, making up 46 characters, or around 13.5% of the total character count. While is just half of the 26% reflected in the 3-part cipher, the 340-cipher has more characters and is shorter than the 3-part cipher. Transposition would be expected to increase the number of digraphs possible in the 340-cipher, which contains 314 unique digraphs. This is a factor of .923, which admittedly seems high until we look at the 3-part cipher, which has no transposition present but still maintains an extremely high digraph factor of .855, not out of bounds with observations of the 340-cipher. Had Zodiac not deviated from his initial system in the 3-part cipher, the ratio would have been even higher.
Using the 3-part cipher as a model for comparison, entropy levels of each of the two ciphers can be compared. Single word transposition can be carried out on the 3-part cipher and entropy compared to the 340-cipher. Methods beyond single-word transposition would yield even higher entropy than this common method of character transposition, becoming much more apparent as the transposition algorithm becomes more complex.
With that in mind for further tests, a look at the progression of digraphs and trigraphs might give some clues as to the presence of transposition. No matter what the plaintext value of the character, it would be transposed to many different positions if transposition were present. Digraph statistics are similar for all characters, so the best illustration would be the high volume character +, which appears 24 times in the 340 cipher.
Since I cant use the Zodiac font on the message board, my character references pertain to my computerized version of the cipher, found at:
-The + character -
+ doubles 3 times, preceeds 18 unique characters, and preceeds P and R twice each. + follows P once, but never follows R, even though R is followed by 8 unique characters.
Of the 18 characters preceeded by +, B is the most interesting. B is followed by 10 unique characters, the c and y characters twice each, but is never followed by +.
FB occurs 3 times, and the BF combination appears only once, similar to the TE or TH digraphs in the English language. FB or BF never coincide with +.
Of each character preceded by the + character:
F is followed by 6 unique characters, but is never followed by +.
I is followed by 9 unique characters, but is never followed by +.
K is followed by 7 unique characters, but is never followed by +.
L is preceded and followed by + one time each.
N is followed by 4 unique characters, but is never followed by +.
O is preceded and followed by + one time each.
P is preceded by + twice, and followed by + once.
R is preceded by + twice, but never followed by +.
U is preceded and followed by + one time each.
Z is followed by 4 unique characters, but is never followed by +.
^ is followed by 6 unique characters, but is never followed by +.
a is followed by 4 unique characters, but is never followed by +.
b is preceded and followed by + one time each.
u (the zodiac symbol) is followed by 9 unique characters, but is followed only once by the +.
y is followed by 5 unique characters, but is never followed by +.
On transposition of the digraphs that occur more than once:
FB 3 Bf -1
Gh 3 hG -0
M+ -3 +M -0
+P 2 P+ -1
+R 2 R+ -0
0F 2 F0 -0
0t 2 t0 -0
3R 2 R3 0
6O 2 O6 0
Bc 2 cB -0
By 2 yB 1
Fl 2 lF -0
I0 2 OI -0
Np 2 pN -0
O+ -2 +O -1
Op 2 pO -1
UZ 2 ZU -0
P2 2 2P -0
Z6 2 6Z -0
ab 2 ba -0
On transposition of the two trigraphs that occur more than once:
Another check for transposition is to check character displacement at distances of two, three, or four apart. Results yield about the same as digraphs, but with an interesting side note. Characters tend to cluster in regular language, and since such a short cipher would not be expected to have a wide variance of topics in its body, this means that some words or forms of the same word should be repeated. While there are a few more less noticeable sequences, Ive already provided a partial list of some of these at:
These sequences generally appear to be directional, much like language, and there does appear to be too many of them to contemplate the presence of transposition.
Any insight on this, John?
|By John C. King (pc308181.wcom.com - 126.96.36.199) on Friday, September 01, 2000 - 11:16 am:|
Before getting into word transposition I would take a look at _all_ of the
transpositions described by Friedman. There are many many types.
In order to see if any of these transpositions of Z2, or Z2 itself, have the expected number of digraphs, etc., one must know what to expect. One way to do this is to encrypt several plaintexts of length N=340 as random homophonic ciphers with the same multiplicity level and get an average count of the language statistics.
I may have done the latter. See my first paper on how to do it. I would have to look at my old research stashed in a closet to see if I did it for a cipher of length N=340. I might could even see if I could find C code on old 5 1/4" disks I have. I could also dig out a copy of the many types of transpositions from Friedman. Let me know if you want any of this.
I can also try to find my version of Z2 on disk where it is transcribed into numerical ciphertext symbols. Some of the original ciphertext symbols are a little ambiguous, for example, some characters look like either circles completely filled in or circles halfway filled in. Hard to tell with that felt-tip marker of Zodiac's. The SFPD sent me a copy of Z2 but it is not as good as a copy someone had sent me years before.
In a nutshell, rule out all of the simple explanations first.
John C. King
|By Glen Claston (dialup-188.8.131.52.dallas1.level3.net - 184.108.40.206) on Friday, September 01, 2000 - 03:54 pm:|
The transcription I posted, along with the matching Zodiac font
are the best representations I've been able to come up with after examining everything in print and on the internet. I beleive it's pretty accurate, with the possible exception of one character that may possibly be two characters, but the copies are too hard to read to be absolutely sure.
As far as starting from simple and working upward, this is also my philosophy.
My language statistics and other comparisons are drawn from a database of all the words and phrases Zodiac himself wrote. Since he wasn't any William Shakespeare, it's a better language sample than random passages from some other source and is more likely to provide reliable data than say, a cookbook.
Using the "simple first" approach, we must consider that a homophonic cipher is very old and not all that sophisticated (over 600 years old). Being a classical cipher in the truest sense, it makes me consider that any changes Z would have made would also draw on information obtained from a book on classical cryptography. I've examined these first and looked for evidence of the simple forms. I am familiar with Friedman's work on the subject, as was probably every government cryptanalyst that examined this cipher, and I (possibly incorrectly) reached the same conclusion they did - that the length of this cipher falls below the threshold of unambiguous solution by modern cryptanalytic means. I've fallen back on tried-and-true (albeit more time consuming) classical methods of examination to draw meaning from this passage.
Just a FYI for consideration - During my examination something came to light which I still haven't made sense of, so I've kept it in the back of my mind until I can quantify the effect - Z "divided" the cipher at the 10th line by using a dash character at the beginning and end of the line. These could simply be artifacts of the cipher itself, but when I consider that digraph and separated pairs of characters tend to reverse themselves in the second half of the cipher, I'm inclined to watch for some sort of system reversal in the second half. I've yet to do the counts necessary to back up this observation, but I'll get to it pretty soon.
In the meantime I'm rereading your papers. Doesn't a 340 character sample seem a bit small to gain more than just general information from this type of analysis? Even though the cipher falls above the "solveable" threshhold of 189 to 270 characters as observed by Shannon for this type of cipher, it falls well below the threshold of unambiguous solution by purely mathematical/automated means.
That is not to say that extremely useful information cannot be identified and exploited on ciphers this short. Monalphabetics have been solved at below their threshold of 27 characters by careful observation of frequency and character placement, and Z's 3-part cipher fell easily because of his "LL" redundancy in both language and cipher symbol. Good analysis can reveal a lot about even a short section of cipher.
I have your papers in hand, and I for one am interested in anything you have to offer in the line of research or observations that may help in solving this cipher.
|By Anonymous (spider-tq071.proxy.aol.com - 220.127.116.11) on Friday, September 01, 2000 - 06:17 pm:|
I follow your writings everyday and I hope in the long run some of it absorbs. I wanted to say
your doing one heck of a good job at trying to figure these ciphers out- what true dedication to something so complex . Most pleased to see John King has joined the group & crossing my fingers if you work as a pair we will see solutions... Can you recommend a good book as a starting point for me (basic) on ciphers & cyrptography ... I'd like to help but I must understand the task first ...
Thanks , J
Thanks , J
|By Glen Claston (dialup-18.104.22.168.dallas1.level3.net - 22.214.171.124) on Friday, September 01, 2000 - 09:56 pm:|
Thanks J, and I too look forward to any insight John King wishes to share with us.
The field I dabble in for liesure is generally described as "classical cryptography", a study of older systems (human derived systems) of cryptography. I only mention this because most books published today are directed toward computer encryption algorithms and algorithms designed to detect and crack computer encryption algorithms. As John King mentioned, William Friedman and others defined the mathematics of cryptography during the first half of this century and set the stage for the computer generation of cryptography.
I'm a big fan of William Friedman and others involved in this process, and fully recommend that anyone interested in cryptography read "The Codebreakers", by David Kahn and available at Amazon.com. Kahn's book gives a very good history and overview of the field of cryptography. Kahn also touches on some of the "classical" techniques that I employ.
Jan Van Der Lubbe has a book out called "Basic Methods of Cryptography", which I've reviewed and find acceptable. Amazon.com lists several others that I haven't reviewed and therefore cannot attest to the quality of their subject matter.
There are also some very good FAQs available on the internet on each of the types of ciphers we've discussed here, and also discussions of basic cryptanalytic techniques for each of these systems. I've yet to find a FAQ that tells anyone how to identify an unknown system however!
The American Cryptogram Association (ACA) publishes a list of books and periodicals for their members, some of which I own. There are also books published by members of the ACA that can be found in this list that describe basic techniques of decipherment for many cipher systems, along with textbook examples. I point out that in real life, I've never run into a "textbook" example of a particular cipher system, which makes this field so much fun.
One of the best sources of information on cryptography and deciphering techniques I can think of right now is a university library. I first researched certain types of systems in a university library which had books going back some 150 years on the subject. My advice would be to take the time to search through the stacks and find the books that best speak to you. If you find one you like, go out and buy it. I found one from 1906 and spent 2 1/2 years sending letters to booksellers before I ran across a copy - a deal at $75.00, some 15 years ago!
If you have a good understanding of mathematics and statistics, I highly recommend William Friedman's books and papers, which I believe are still available in reprint from Amazon.com or some other bookseller.
As to the task we're trying to accomplish here, I think I'll set out the basics in a separate thread.
|By John C. King (spider-te034.proxy.aol.com - 126.96.36.199) on Sunday, September 03, 2000 - 10:11 pm:|
Glen mentioned a couple of things, one being whether their is enough redundancy for an
unambiguous automated solution. I can think of two automated methods. Probablistic
relaxation works great for monoalphabetic substitution ciphers. See my later (1995?) paper
in Cryptologia where I extended it to solve polyalphabetic substitution ciphers.
Unfortunately I don't know of anyone who has extended it successfully to homophonic
substitution such as Zodiac's. I know people have tried, particularly people working on
the Beale treasure ciphers. I've talked with several but no one ever got too far with it,
but the Beale Ciphers are much harder than Zodiac's.
Another automated method would be heuristic search techniques. These have also been tried by many people working on the Beale ciphers.
Glen is right in that the cipher is short enough to make automated cryptanalysis very difficult. However it should be long enough to be able to tell that a solution is "the" solution.
That is the fun part about using computer for automated cryptanalysis. You can get them to do the grunt work but they don't have the "insight" a human would, such as the solvers of Zodiac's first cipher where they figured, "This Zodiac guy is an egomaniac. He probably talks about himself in the cipher." Sure enough the message started out, "This is the Zodiac speaking."
Glen is also right that all the basic approaches have probably been tried. Dr. Carl Hammer told me about a meeting the NSA (National Security Agency had) had regarding the Zodiac's ciphers. They came to the conclusion that Z2 most likely did have some kind of message, that is, it most likely wasn't just random symbols written down by Zodiac to frustrate us all.
What I would really like to see is a psychological profile of the Zodiac and an idea of what me might expect to see in a solution of Z2. I was talking to Jake about John Douglas's books on criminal profiling. Has anyone seen anything like this on Zodiac. I'm sure Z2 does _not_ contain Zodiac's real name. He's way to smart for that. It probably contains something similar to Z1. Glen has a good idea of studying the language statistics of Zodia'c writing such as common words. Even though Zodiac went through the trouble of enciphering Z1, it had mistakes in it, perhaps both pre-encryption (spelling, grammar) and encryption. Z2 probably does also.
I think Z2 does have a message. Zodiac went though a lot of effort in both encrypting a message _and_ the physical act of writing down the odd ciphertext symbols in a neat grid. He probably proofread his cipher then made his correction after finishing it. After all that work in his messed up state of mind he probably wasn't going to rewite the entire thing. See Graysmith for some notes on his state of mind when writing his messages. He mentions possible drug use and, uh, autoerotic activities.
Glen, offline could you let me see all of the transpositions you've tried? Since Z2 is written in a block then each of the four corners could be a starting point for each transposition method. I'll dig out Friedman's outline on transpositions in the meantime (he was a great guy wasn't he?). If Friedman was alive he would have solved this one no doubt! :-) All of us put together just might do it.
I'm real sleepy and zoned out now, just enough to think, "Hmm. What would I do if I were the Zodiac encrypting this message." All we need is one little insight to try out to get a solution. It's probably simple. Trying out word transposition such as Glen is doing is certainly worth looking into. I have a really good set of trigram language statistics on disk "somewhere". In, yes another paper, 1992 or '93 Cryptogia I tell how to use an adjustment formula by Shannon to get trigram statistics where there are no word boundaries (spaces) such as in Zodiac's messages. Using these and altering them to skew a little bit towards Zodiac's writing style would be good for any attempt at automated cryptanalysis.
John C. King
For any email replies please use the following email address. I'm writing from someone else's computer: firstname.lastname@example.org
|By Glen Claston (dialup-188.8.131.52.dallas1.level3.net - 184.108.40.206) on Monday, September 04, 2000 - 02:59 am:|
As far as testing for any given transposition method, beyond Index of Coincidence, Chi-2 tests and entropy comparisons for Z plaintext and known ciphertext, I havent done anything major. (That's a sad statement - 6 months and I haven't even sharpened a pencil yet!)
Most of my work to date has been involved in trying to identify the type of cipher used. Any actual attempts at decipherment would be futile without a pretty clear understanding of what were dealing with. Its been a few months since I ran these tests, but its simple enough to run the cipher through the programs again and provide you with the output for examination. I ruled out polyalphabeticity and keyed/sequential/progressive transposition on the basis of these tests (along with other circumstantial information.) If nothing peaks in the IoC test or the Chi-2 test, I can only consider that the passage is below the threshold and any specific testing for sequential and progressive systems of transposition on a passage this short would yield inconclusive data. Like you said though, the tests Ive run have already been run by people with a lot more umpas in their band than I have, and they probably didnt have your information at the time, so its worth a try.
Funny you should mention Probabilistic Relaxation, because I was just reading a section on that tonight in Cryptologia with homophonic substitution in mind. Strange coincidence. I might drop that idea, but it has its merits. Lets not forget that monalphabetic substitution has an unambiguous solution threshold of 27, and thats why the calculators all over the net solve these things with ease. There are also some very good calculators out there for Vigenere and other types of progressively keyed polyalphabetics and their variants. (Im sure they are based on the principles outlined in your work.) Homophonics, even random systems, are really nothing more than multiple alphabets with a whole lot of nulls. I was considering your paper and how to factor out nulls based on frequency.
Beale Ciphers? I thought they were keyed to written text, such as the Declaration of Independence. I read a paper about a year ago from someone who went to great lengths to prove the remaining Beale Ciphers were hoaxes. We all know in cryptography that it is next to impossible to prove something a hoax without solving it first, but this guy (I cant remember his name right now) certainly offered enough statistical evidence to make you think 1,457 times before trying to solve the remaining Beale Ciphers!
As far as starting at the four corners of the block to look for transposition, it has occurred to me. Two things throw me off that scent, but it should be tried nonetheless. The first is the fact that Zodaik appears in the last line, which signifies to me that the last line may be garbage. The second is the division of the text at line 10, and the fact that the two halves differ statistically.
Ive stated many other reasons Im not keen on transposition in this cipher, but that doesnt mean it does not exist. If it were sequential perhaps, characters in line 1 and line 11 alternating, that could possibly still match some of the evidence Ive been able to extract from this cipher. It will match some, but not all the evidence, thats the problem.
Im still stuck in the Sequential Homophonic Cipher mode for many reasons. Digraph counts and progression give clues, as well as the old leader/follower chart. There is some evidence of lower frequency characters grouping. The G, O, and R for instance group around the backward L and the Z character. Granted 340 characters is not a lot to expect to see many of these types of patterns, so the fact that I do see quite a few is surprising and still points toward a sequential homophonic cipher at the core. In the case of the G, O, and R, one or more may be different plaintext characters, but their relationship indicates that backward L and the Z character are identical in meaning.
My avenue of approach at this moment is to find out as much as I can about each character and eliminate as many possibilities as to their meaning as I can. Once I have a reduced set, I can work from that angle to postulate a much more informed attack.
I think your idea of testing for transposition is a good one, if you can come up with an automated scheme to test for all the various types. Many are clearly out of bounds because of the entropy they impart with their use versus the entropy present here, so we are considering much more mundane systems in this cipher than we would normally test for in, shall we say, more legitimate cipher.
As I stated previously, I doubt what well come up with will be a textbook example of the system employed, so any computer model has to take into account the vast number of errors encountered in Zodiacs first cipher before attempting to solve the puzzle. Many of the words may be so badly misspelled that they will more closely resemble a soundex dictionary than a real one.
On the subject of errors with one or two exceptions, no properly used homophonic cipher can produce the groups of ++ and pp we have in this cipher. No homophonic cipher can produce strings such as 0T0M either. We also wouldnt have two FBc and I0F groups using such high frequency characters (One of these groups is actually I0FBc)! These are either artifacts of transposition as YOU suspect, or artifacts of a pseudo random construction, which I suspect. If I am right, its no wonder this thing hasnt fallen to a machine, because the only machine that can intuit the construction is a human brain. If you are right, the solution may be much easier, so Im putting my money on you! :-)
-My opinion for what its worth: Zodiacs house may look fine from a distance, but the walls are three bubbles short of a level and a pie slice short of a square-
|By Howard (Howard) (dsl-gte-10407-2.linkline.com - 220.127.116.11) on Thursday, January 18, 2001 - 05:37 pm:|
In a letter to Dave Toschi,Dave Peterson wrote:"The source of Zodiac's cipher symbols appears to be the book, "A History of Secret Societies," by Arkon Daraul,[wonder if his parents would have liked him enough to give him a name like John!]1961,The Citadel Press,New York.As per enclosed, he[Z[ used identically ,the reverse F for the D, and the triangle for the I and the T for the O. Some 11 symbols from the book ,he simply switched to different letters of his cipher alphabet. And 13 of his symbols appear to be minor variations of the book's symbols (in his first 3 part cipher of August ,1969). In Zodiac's later cipher of Nov. 9, 1969, he added the symbols ,from the book ,of the dot and the dash,along with some other variations of the book's symbols. The above may indicate that Zodiac is not necessarily as informed in different fields as his symbols seemed to show."Glen- what do you think? I have not searched for the book yet as I just dug up the letter. Can anyone get a copy?FYI-Peterson worked military Intelligence during WWII.
|By J Eric (J_Eric) (0-1pool27-70.nas7.los-angeles1.ca.us.da.qwest.net - 18.104.22.168) on Saturday, July 13, 2002 - 03:38 pm:|
As made known to attendees of the 7/4/02 task force meeting, it's my belief the last
18 characters of the 7-31-69 cipher--the EBEORIETEMETHHPITI -- are to be unscrambled as
follows: TIME I HIT THE BEER. The remaining three spell out: POE. If a crossword puzzle
answer, the question for it might be: "Author Allen?"
Arthur Leigh Allen was known to drink beer, and even was said to have brewed his own at home.
He said in the Cheri Bates letter: "It's about TIME..."
His cipher tells of a day of the "greatest pleasures" (at least for a maniac): hunting "anamals," getting his rocks off, collecting slaves for paradice. What better way to end the day than by getting drunk?
Note that while there have been some interesting ways to unscramble the 18 characters using the Hardens' letters (Robert Emmett The Hippie etc.), Zodiac's cipher seems to follow a direct one-letter-for-one-character translation, which this answer includes.
|By Zander Kite (Zk) (dialup-22.214.171.124.dial1.nashville1.level3.net - 126.96.36.199) on Saturday, July 13, 2002 - 04:36 pm:|
Actually "Beoriete Methhpiti" can easily be read as Theodore Kaczynski. The larger question is why The Zodiac mailed in codes in the first place. I believe it is explained in The Manifesto. Kaczynski writes: "A person is said to be well socialized if he believes in and obeys the moral code of his society and fits in well as a functioning part of that society.".... "violence is a form of "liberation". In other words, committing violence, they break through the psychological restraints that have been trained into them."......."the thought and behavoir of THE OVERSOCIALIZED person.."....."The moral code of our society is so demanding that no one can think, feel, and act in a completely moral way."....."We suggest that oversocialization is among the more serious cruelties that human beings inflict on one another."....The summary on this is: The Socialized live by their moral code, The Zodiac has his own code..."I like killing people because it is so much fun." I think that I have nailed this one! It's supported by what he writes. The code is the exact opposite of "the moral code of society". Kaczynskis job-quitting would represent a rejection of the socialized mold. Notice how that parallels with The Zodiac breaking loose. The terrorist equation is: Theodore Kaczynski versus The socialized and their moral code, as The Zodiac with his own code. Keep in mind, that anger and disaffection are the foundation mainly for his publicity-seeking killer spree. I think we should assume that this guy is serious, seriously angry and wanting to make a point. I would look away from such motivations as a watch-inspired name and beer-drinking games. I would view the game-playing nature of The Zodiac as a layer and not foundational as some appear to be suggesting.
|By Ed N (Ed_N) (acc15288.ipt.aol.com - 188.8.131.52) on Saturday, July 13, 2002 - 11:26 pm:|
I thought it stood for "San Benito Mental Hospital."
|By Kendra (Kendra) (pluto.cds1.net - 184.108.40.206) on Sunday, July 14, 2002 - 12:04 am:|
I've been working on deciphering the 340 cipher for about a week now, and have tried everything from establishing the frequency of each symbol used to color-coding each symbol to establish a "visual" pattern. I've tried starting with "this is the Zodiac speaking" right to left, left to right, spiral down, sideways, upways, turning it over and using a light to look through it's backside...and I've almost employed the use of a mirror, all to no avail. Maybe someone else can try these methods and come up with results? One thing, though, is that the cipher uses the symbol of a square with a dot in it ONCE. I thought that it could be an X (or Q, J, or Y) and that it could be used to spell the following: experience(d), exit, exhale(d), fix or affixiated, mix (as in bomb components), six or sixth, x-mass, Super-X or explode. The circle with the dot was used only twice, and the backwards "B" used only three times. I did a probability chart a while ago from Z's first, 3-part cipher, establishing how many alternates were used for each alphabetical letter. The lesser used letters (K,G,P,B,C,U,M,V,W,X,Y) used only 1 alternate each, where as the more commonly used letters had more (E of course having 7). Maybe this can help anyone...
|By Lapumo (Lapumo) (p50-227.as1.clm.clonmel.eircom.net - 220.127.116.11) on Sunday, July 14, 2002 - 10:35 am:|
"Actually Beoriete Methhpiti can easily be read as Theodore Kaczynski". How Zander?
|By Zander Kite (Zk) (dialup-18.104.22.168.dial1.nashville1.level3.net - 22.214.171.124) on Sunday, July 14, 2002 - 08:21 pm:|
By using the Zodiac symbol. The points are like a clock 0,3,6,9. Give letters their number value. You'll find that Theodore Kaczynski=Tehimioh Erttpebei(Beoriete Methhpiti scrambled) with the number differences as 03369633 69969960. Notice how Kaczynski's repeating letters equal the same letter OO=II, EE=HH, and KK=EE. The only zeroes are the beginning and end of Theodore Kaczynski. His name has gone full circle, so to speak. In the code they are presented as the last letter in each name. Look at the number pattern. Thats not something that appears to be something that has surfaced at random. The math on this is extremely tight if you fully analyze this.
|By Ray N (Ray_N) (user-38ldf26.dialup.mindspring.com - 126.96.36.199) on Monday, July 15, 2002 - 11:13 am:|
That's very interesting Zander. I don't dispute what you have found, however it is
unfortunate that it is a subjective solution, i.e. it relies on first scrambling the final
letters into a particular order prior to applying the numerical aspects. Given the
astronomical number of possible letter combinations here, there is only one believable
scenario, that being that you deliberately attempted to fashion Kaczynski's name from the
letters. You succeeded, but like others before you who have come up with other solutions
for this section, you show no proof that this was the intented solution. Any solution
deliberately intended would have to have proof, Zodiac would not have neglected to provide
it being the cryptographer that he was. It's possible that such proof exists, but you have
not provided it.
Regardless, that's still admirable work on your part.
|By Alan Cabal (Alan_Cabal) (189.sanfrancisco-12rh15rt-ca.dial-access.att.net - 188.8.131.52) on Monday, July 15, 2002 - 06:07 pm:|
That is truly remarkable work, Mr. Kite.
|By Zander Kite (Zk) (dialup-184.108.40.206.dial1.nashville1.level3.net - 220.127.116.11) on Monday, July 15, 2002 - 09:48 pm:|
Ray and Alan: Thanks. But Ray I challenge you to take a closer look at the math
involved and how this works. For example the "T" possibilities are K,N,Q,T,W,Z,C
(9,6,3,0,3,6,9). The only possibility for a match to "BEORIETE METHHPITI" is T=T
or T=TTT. Now look at the "D"=UXADGJM. So D=M which means without that one
"M" in "BEORIETE METHHPITI", Theodore Kaczynski is unworkable. So much
for endless possibilities, you see what I mean? In fact, look at "A"=RUXADGJ.
Guess what that means. A=R only. Which means any name with 2 A's is unworkable. Arthur
Leigh Allen, Larry Kane, Michael Ohare etc. Another example: Bruce Mcgregor Davis:
"D"=UXADGJM which means "D"="M" only: also meaning two D's
is unworkable. G=XADJMP meaning G=MP making Bruce Davis unworkable because DGG cant equal
MP. I'm just giving 16 to 17 letter names as comparisons, not that there is any importance
to establishing other suspects as unworkable. Also, these are superficial stoppages, so to
speak. For example, there is at least one other way to forfeit Allens name, by 6/5 ratio.
I'm trying to say that this is a mathematical tightrope. I can list a lot of 2 and 3 and 4
letters combos that automatically cancel a name such as AA and DD I've already mentioned.
If the shorter ones don't disqualify, the deeper ones will.
But don't take my word for it: I challenge anyone to fit a 17 letter name(not a bogus one either) into this math system. If you are lucky enough to find one, then I doubt it will be as good as Theodore Kaczynski: because it appears to be designed: all of Ted's 3 double letters equal the same letter and the numbers involved appear designed: 0 33 6 9 6 33 6 99 6 999 6 0. (corrected other post). This makes it look like as Kaczynski went down his name, he decided to use larger numbers more and more, while going thru the alphabet near the end. I did not make up this number system either. It is taken from the Zodiac symbol. Zodiac ,himself, has given the numbers 0,3,6,9 to the north,east,south, and west points of his symbol. Of course, I needed the name Theodore Kaczynski first to realize it was even hidden in there, but that's not fabrication. Anyway, I've got pages of analysis on this that I wont list. But if you study this tightrope math system, you'll end up face to face with the fact that Theodore Kaczynski is the only name that reasonably works here.
|By Ray N (Ray_N) (user-38ldc1a.dialup.mindspring.com - 18.104.22.168) on Tuesday, July 16, 2002 - 08:28 am:|
I agree that it's interesting, possibly even mathematically tight. But without some way to verify or prove the solution, it's no more likely this is the intended solution than "It's time to hit the beer," or for that matter, no more likely than that the letters are only gibberish. In other words, that it produces a name is not enough. Also, I have to say that maybe you did invent the 0,3,6,9 thing, because nowhere did Zodiac say that the crossed circle represented a clock face. In fact, if anything, he described it as a unit circle (radians reference). In this case, 0 would be at the 3 o'clock position, travelling counter-clockwise would indicate intervals of PI/2: 0, PI/2, PI, 3PI/2, and 2PI. So while your solution is impressive, you still need to show evidence that the 0,3,6,9 was intended to compute the solution.
|By Zander Kite (Zk) (dialup-22.214.171.124.dial1.nashville1.level3.net - 126.96.36.199) on Tuesday, July 16, 2002 - 01:42 pm:|
The 0,3,6,9 Zodiac symbol can be found: opening page Zodiackiller.com:to Zodiac
letters:to Zodiac-button letter,cipher...Map Hit Map!... Ray, I accept your position here.
If you're not necessarily intrigued by this, then that's the way it goes. The Zodiac chose
the odd number of 17 as his code lines. I'm guessing it's because that's how many letters
are in his name. This was his first code, and I believe he designed it this way, in order
to leave the last 17 as his signature in code. I would guess that he erred and had an
extra, so he doubled the "E" in afterlife. This 17 letter signature works well
with his openings This is (The Zodiac speaking)(17 letters).
So I think that we are working with a signature, somehow coded,anagrammed for the last 17. I would surmise that if he wanted an 18 letter signature, that he would have fashioned his code in eighteens. Anyway, it is popular belief that The Zodiac has somehow signed his code.
|By Linda (Linda) (208-59-124-18.s18.tnt1.frdr.md.dialup.rcn.com - 188.8.131.52) on Tuesday, July 16, 2002 - 03:46 pm:|
Zander... Very interesting solution to the unsolved ending of the three part cipher.
It seems to work well, but I can see where it would be hard to confirm; however, if it
could be found that Ted, either as himself or the Unabomber, used a similar type code
and/or anagramming, I think that would be great confirmation of a solid solution.
I don't believe that the code key to TK's coded diary has ever been released. Much of his diary was written in numeric code and it was said that the key to the code was also found. I tried once, through an FOIA request, to obtain the key; however, was unsuccessful.
|By Howard Davis (Howard) (dsl-gte-10407-2.linkline.com - 184.108.40.206) on Tuesday, July 16, 2002 - 05:00 pm:|
In the VPD report one citizen offered this suggestion as to the word scramble at the
end of the three part cipher:"This is the tip-Robert E. Lee."Of course ,there is
Robert Emmit(no hint of Emmit being a middle name!).And "Or be with me in the
pit".There are lots more- all ingenious in their own way."I will NOT give you my
Actually,it is endless and can never be proven one way or the other unless some hard evidence surfaces.All combinations,like Zanders,for example, should be looked at and encouraged-ideas are the name of the game-Zs game that is!
|By Zander Kite (Zk) (dialup-220.127.116.11.dial1.nashville1.level3.net - 18.104.22.168) on Wednesday, July 17, 2002 - 11:57 am:|
The "M" is the middle the alphabet and the middle of the last line of the code: 8 letters:"M":8 letters. Going the next letter after "M" right then left,ETC. You get: Meet the hip riot EIB. Who or what is EIB????
|By BFree (Bfree) (6534106hfc169.tampabay.rr.com - 22.214.171.124) on Wednesday, July 17, 2002 - 10:03 pm:|
Please excuse me if this has been asked before and I missed it. How many, if any,
local, state or federal departments, agencies or universities are officially examining the
I imagine the Defense Dept has super-computers programmed to crunch all manner of cryptographs. I wonder if anyone has approached our best code breakers with the Zodiac ciphers as a challenge. Just thinking out loud. Thanks in advance for your response...Fascinating stuff.
|By Kevin (Kevinrm) (ip68-98-108-6.ph.ph.cox.net - 126.96.36.199) on Wednesday, July 17, 2002 - 11:52 pm:|
I approached the Israeli guy who broke Edgar Allen Poe's crypto about a year ago. He was "somewhat" interested, but not enough to follow through.
|By Douglas Oswell (Dowland) (232.philadelphia06rh.15.pa.dial-access.att.net - 188.8.131.52) on Thursday, July 18, 2002 - 12:48 am:|
I believe a master cryptographer who used to post here tried his hand at it and failed, although he gave a fascinating analysis of what the cipher was and what it wasn't.
|By Ray N (Ray_N) (user-38lddo9.dialup.mindspring.com - 184.108.40.206) on Thursday, July 18, 2002 - 12:23 pm:|
Unfortunately, no one is working on the codes except amatuers. The police, government agencies, FBI do have some resources in this direction, but have neither the time nor the inclination to put them to work on a 30+ year old murder case. This is especially true because every last man Jack of them believes that the codes are already basically solved and there is no identification of the Zodiac within them. At one time, the NSA and FBI were involved with decryption efforts on Zodiac ciphers. Neither agency actually solved anything. The FBI however did authenticate the Harden solution for the first cipher. The cold war was on and national security was simply the priority. In my view, this does not mean that Zodiac defeated the best cryptographic minds the way Graysmith so dramatically claims. I think the best cryptographic minds just had better things to do with their time. It's hard to get qualified people to spend time working on things already deemed pretty much solved.
Still, I wonder if someday somebody will discover that Zodiac really did tell us who he was. Wouldn't that be a shocker?
|By obiwan (Obiwan) (ciw2.ciw.edu - 220.127.116.11) on Saturday, July 20, 2002 - 12:39 am:|
I have been on hiatus from this group for a while due to travels & work, but
I caught your intriguing post regarding the "Unexplained" letters at the
end of the 3 part cipher:
Indeed if a clean, robust mathematical algorithm can be found to
translate these letters into a name or other English text, it would be
a huge lead. Since you suggested you had a "mathematically tight"
method to translate these letters into a name, I decided to
investigate in detail. Perhaps I'm daft, but I took me some time to
grasp exactly what you did. At risk of misreprenting your work I'd
like to lay out this algorithm as clearly as possible & add in some of
my own thoughts. Please correct me if I haven't got it right.
The Zander Algorithm for the
Unexplained Letters in the 3-Part Cipher
The last 18 letters of the 3 Part Cipher, following "AFTERLIFE", do
not spell anything, ( see,
eg. http://www.sfgate.com/offbeat/zodiac.html )
STEP 0.: Remove the E after "AFTERLIFE", giving the Original Text:
STEP 1.: Anagram This Text Into:
(we must admit that this choice of anagram is arbitrary, right?
See below for a different choice)
Decrypt Anagrammed Text by replacing each letter with a choice of 7
letters, all of which are either 0, 3, 6, or 9 letters away from the
original letter. For example A would be replaceable by D (=A+3), G
(=A+6), J, (=A+9) OR: X (=A-3), U (A-6), R(A-9) or by A itsself (A+0).
I will call these offsets "Shift Factors". For Shift Factors of:
[-9,6,3,0,3,6,9], A would be represented by: [R,U,X,A,D,G,J] Using a
small computer program I made a table which shows us all the possible
decryptions of "TEHIMIOHERTTPEBEI". Just read left to right, choosing
a different shift factor (row) as you go.
T E H I M I O H E R T T P E B E I Shift Factor
K V Y Z D Z F Y V I K K G V S V Z -9
N Y B C G C I B Y L N N J Y V Y C -6
Q B E F J F L E B O Q Q M B Y B F -3
T E H I M I O H E R T T P E B E I 0
W H K L P L R K H U W W S H E H L 3
Z K N O S O U N K X Z Z V K H K O 6
C N Q R V R X Q N A C C Y N K N R 9
Reading across, if we choose Shift factors of:
0 3 -3 6 -9 6 3 -3 6 9 9 6 9 9 -9 9 0
T H E O D O R E K A C Z Y N S K I
Just as you said. On the other hand a different choice of shift
factors gives some other words, if not names. With out much effort
I came up with:
Z E N I S F U N B O O K S B E E R
We should also add that the initial choice of anagrams was
"arbitrary." However, I think I see why you settled upon that one. I
tried some other possible, simpler, anagrams, for example ones
beginning with "THEOMORE" [0,0,0,0,-9,0,0,0]. But getting the
remaining letters to map to KACZYNSKI proved impossible, suggesting
the uniqueness of this choice of anagrams (assuming of course that they
are intended to spell TK's name.)
So I would say great job at finding TK's name in the code here, & congrats
on your work. The only unclear aspect here is how many possible names could
be spelled out of the letters arising from one of the numerous possible
anagrams. These kind of probability questions are hard to answer but I'm
working on a possible answer in regards to the 340 cipher.
|By Lapumo (Lapumo) (p51-10.as1.clm.clonmel.eircom.net - 18.104.22.168) on Saturday, July 20, 2002 - 05:09 am:|
Welcome back Obiwan and thanks once again for laying things out for us.It is much
Good work Zander! It's a find, it's there and should be looked into further.In and of itself the Math is tight,however I would have reservations about the assumptions you have made in putting it together.
Let me ask both of you a something; Kaczynski's name or a close match has now been found in four places.Zander has it here and in the bottom line of the 340.Doug has an excellent interpretation of the 13 code and also has a close match from the introduction "this is the Zodiac speaking.
I do like the latter most of all because I agree with Doug that this statement is very important.
Is there anyway to compute the statistical odds against chance of a suspects name showing up more than once in these communications?
We have approx. 20 written communications, how do the odds work for once ,twice ,three, four?
|By Douglas Oswell (Dowland) (193.philadelphia06rh.15.pa.dial-access.att.net - 22.214.171.124) on Saturday, July 20, 2002 - 08:22 am:|
Even considering the arbitrary nature of the initial anagramming, I think it's amazing
that this particular suspect's name just happens to conveniently (and accurately) pop up
in a variety of places. In addition to Zander's solution, see my solution of the 13-symbol
cipher at http://home.att.net/~mignarda/sets.pdf.
Kaczynski, of course, was a highly skilled mathematician who would have been perfectly
capable of encrypting his name using any of a number of advanced functions that would have
been inscrutable to anyone not trained like himself.
Obiwan, what do think the chances are that Kaczynski used his name as the basis for his encryption?
|By Douglas Oswell (Dowland) (98.philadelphia06rh.15.pa.dial-access.att.net - 126.96.36.199) on Saturday, July 20, 2002 - 10:52 am:|
Lapumo, for some reason I didn't see your post above mine, which makes essentially the same point as my post directly below it. I don't want you to think I was ignoring your point. I think it's a valid one, and it would be very nice to know the probabilities involved.
|By obiwan (Obiwan) (ciw2.ciw.edu - 188.8.131.52) on Saturday, July 20, 2002 - 10:59 am:|
Correction to my previous post: The 2nd to last shift factor should be 6 not 9. Here is
the grid again, with Bold to lead your eye:
T E H I M I O H E R T T P E B E I Shift Factor
K V Y Z D Z F Y V I K K G V S V Z -9
N Y B C G C I B Y L N N J Y V Y C -6
Q B E F J F L E B O Q Q M B Y B F -3
T E H I M I O H E R T T P E B E I 0
W H K L P L R K H U W W S H E H L 3
Z K N O S O U N K X Z Z V K H K O 6
C N Q R V R X Q N A C C Y N K N R 9
This is the simplest demonstration of Zander's finding I could think of:
T E H I M I O H E R T T P E B E I
T H E O D O R E K A C Z Y N S K I
The letters on top are an anagram of BEORIETEMETHHPITI (17 of the 18 Unexplained letters from the 3-part cipher). The numbers are how much you need to shift the anagram to get the name. Of course any string of letters can be mapped into any other string by sufficient shifting. What is unusual here is that all the shifts are multiples of 3, and that Zodiac later wrote 0,3,6,9 on the map as a clue.
Is there anyway to compute the statistical odds against chance of a suspects name showing up more than once in these communications?
The odds of two things happening, unrelated are the product of each of the things happening individually. (Ie the odds of Coin=HEADS and die = 6 are 1/2 * 1/6 = 1/12) The problem here is computing the odds of the individual events. To compute the odds that the Zander Algorithm leads to a name RANDOMLY, we would have to: First look at all possible anagrams of BEORIETEMETHHPITI (STEP 1). For each anagram, draw up a table like the one I showed above (STEP2). Then for all these tables find out how many have names hidden in them. There are 17! = 355 Trillion ways to anagram a 17 character string (minus a correction for repeated letters). How many of these tables would you like to look at Lapumo? I could make some up for you. I'm also interested in these probability questions...more on that later.
Obiwan, what do think the chances are that Kaczynski used his name as the basis for his encryption?
What you are talking about, Doug, is using KACZYNSKI is the key which enables the code to be broken. That is different from what we have here where, according to ZK, KACZYNSKI is the plaintext which has been encoded into ciphertext using a certain algorithm.
If TK is the Zodiac, then I think yes, there is a fair chance he might use his name as an encryption key. TK must have tried anagramming his name at some point and he clearly would have known that you can find ZODIAC in his name. I take it you are thinking about the TK diaries which were in a code that the FBI has not yet revealed?
|By obiwan (Obiwan) (ciw2.ciw.edu - 184.108.40.206) on Saturday, July 20, 2002 - 12:49 pm:|
I've been working on deciphering the 340 cipher for about a week now.
Hi Kendra, Your frequency work sounds good, I like the color coding. It probably duplicates work some of us have done previously. Just so you know here's a summary of my freqency analysis of the 340 Cipher:
But first see this page:
Which lays out my computer-readable ASCII version of the cipher symbols. The main challenge of the 340 is that the length of ciphertext is small compared to the number of symbols used.
Hopefully you've checked out the previous discussions on the 340-cipher at:
Where I noted that solving just the 10 most frequent letters in the 340-cipher gives you 1/3 of the whole cipher... Good luck!
|By Zander Kite (Zk) (dialup-220.127.116.11.dial1.nashville1.level3.net - 18.104.22.168) on Saturday, July 20, 2002 - 02:03 pm:|
The big draw on the solution is: That Teds double letters all equal the same letter. That sends the odds into orbit, if all names must follow that standard. I find it interesting that the number 6 is used for the letters KOKO Z. The number pattern appears designed. Kaczynski uses a string of numbers in his diaries. The letters add up to: Beoriete=79 Theodore=90 Methhpiti=108 Kaczynski=119. Both are 11 difference. My experience with my solution is this: 90% of names are disqualified within a minute. The rest basically fail at some point after that. The easiest way to showcase the difficulty here is to draw out 2 3 and 4 letter combos that automatically disqualify a name such as AA and DD. I see Kaczynski's name in: "The Zodiac" itself, which is an abbreviated form of his name. Beoriete Methhpiti. Doug's 13-code solution. And the 340 code where THEODOR and KAZINSKI are on the first and last lines. That's well against the odds there, when you study the frequency of symbols used and so forth. Also "THEO" appears hidden in the beginning of the code.
|By Howard Davis (Howard) (ont-cvx1-18.linkline.com - 22.214.171.124) on Sunday, July 21, 2002 - 02:19 am:|
In an FBI computer report on the 13 character cipher they came up with Adam
Shanahan,Adam Flanagan,and Adam Granahan plus Gemini.
It is endless and dozens of ingenious( and not so bright)combinations arise,with those that have suspects finding- by either computation or word manipulations,etc.-their suspects name in the midst.As I have said-let it continue as this is the spirit of research.
Zodiac wrote he would NOT give his real name.
He was into PEN NAMES and symbols though Zodiac(Z and the cross/circle)being the most prominent with rh,BY ---,Robert Emmit,RP or Red Phantom,A Friend,Yours truly,A citizen,etc.,all following.Some are questionable like Robert Emmit,but others were clearly used by ZODIAC.
|By Zander Kite (Zk) (dialup-126.96.36.199.dial1.nashville1.level3.net - 188.8.131.52) on Monday, August 12, 2002 - 03:15 pm:|
In another code section, the question is asked: "Scrabble tiles equal 187, does that number mean anything to anyone?" When I gave out the (Beoriete Methhpiti-Theodore Kaczynski) figures, I was hoping someone would notice and take it from there and realize my 0,3,6,9 solution wasn't just picked out of thin air. The numbers for letters on Scrabble= 187 and numbers for letters BEORIETE METHHPITI also equals 187. Which makes the average 187/17= 11 or "K". beorieteMethhpiti=kkkkkkkkkkkkkkkkk. So we have Theodore Kaczynski matched to Beoriete Methhpiti at +11,+11(Beoriete(79)Theodore(90):Methhpiti(108)Kaczynski(119)), where the average or base number is also 11. At this point, any mathematician, worth his IQ, will say there must be a number system in place around the name "Theodore Kaczynski" centered on the number 11. Not to mention, that the only matches are the "E" and the "I"(perfect name word breaks) and that "K" is the letter chosen.
|By obiwan (Obiwan) (ciw2.ciw.edu - 184.108.40.206) on Monday, August 12, 2002 - 09:15 pm:|
"Scrabble tiles equal 187, does that number mean anything to anyone?"
Actually that number doesn't mean anything to me. At least it didn't before I started reading this board....from which I have picked up that this is a number used by police to refer to murders? Is that right? I'm not sure that police code is commonly known, except in crime-fighting circles.
187 as 11x17 on the otherhand, might be quite significant. 17 is obviously significant from the ciphers. The fact that both 11 and 17 are prime, given Z's math background, should not be overlooked. Good observation ZK. You mention "base number" of 11. This makes me wonder if using base-17 numbering could get us anywhere...oh so many possibilites so little time.
|By Ed N (Ed_N) (acbf2f90.ipt.aol.com - 220.127.116.11) on Tuesday, August 13, 2002 - 04:44 pm:|
Careful, gentlemen, you're starting to write and think like Gareth Penn...
|By obiwan (Obiwan) (ciw2.ciw.edu - 18.104.22.168) on Wednesday, August 14, 2002 - 05:46 pm:|
Or perhaps we're starting to write and think like Zodiac? Ed, If there is going to be
a big solution to this case based upon the evidence we have before us then that solution
will very likely come from understanding the hidden, probably mathematical meaning in one
or more of the existing Z letters/ciphers. True, they may be meaningless and this may be a
dead end, but barring the revelation of new physical evidence (ie P.S. keys turning up in
somebody's house), the best hope for a "solution" to the case IMHO is via a
(possibly mathematical) decipherment of Z's writings.
I happen to think that Penn started off on the right track, but may have wandered far afield with his morse code soutions, etc. But I have not read his books, so to be fair, I can't really criticize. ps. Since everybody seems to be so anti-penn, anybody want to send/sell me a copy of his book(s), which apperently are pure rubbish?
|By Ray N (Ray_N) (user-38ldej1.dialup.mindspring.com - 22.214.171.124) on Saturday, August 17, 2002 - 12:00 pm:|
In response to your reply over on the TK 340 Odds thread:
You are right. There haven't been any conclusive solutions in 34 years. That sounds pretty impressive on it's face. But the way you frame it, it sounds like there's been a bunch of guys with pocket protectors and thick glasses sitting in a basement office of the Pentagon staring at a computer screen, crunching numbers for 34 years straight. It's a fallacy to assume that "the top codebreakers in the world" are stumped by the Zodiac ciphers. The fact is they aren't even working on this. Nor have they been for about the past 33.9 years! The NSA and FBI and the Navy looked briefly at the ciphers without success. The FBI verified the Harden key for the first cipher. And that was pretty much it. To repeat what I said on an earlier post (July 18 in this thread), the cold war was in full swing back then, and government agencies such as NSA didn't have the time or the motivation to dedicate much effort to working on something like this. National security was simply the priority.
Additionally, Zodiac was not a cryptography expert. He was himself an amatuer, and his codes are the result of amatuer cryptography. Therefore, it must be understood that they will be broken/solved definitively (unless everyone adopts a "blow it off" attitude). When the break occurs, I predict it will be due exclusively to the work of dedicated amatuers who refused to give up. Therefore, the fact that the experts "failed" to solve the ciphers means absolutely nothing to me. It's easy to fail when you don't do anything.
I'd say the reason there hasn't yet been a conclusive solution identifying Zodiac is that the focus has always been in the wrong places. Even when provided with numerous clues by Z, there was not much effort expended in that direction, especially after the phrase, "I will not give you my name" was discovered. To my way of thinking, this would be a very good way to get people off his trail if in fact he had encoded his identity.
Of course, the other possibility for the 340 is that it is just unsolvable junk. There are those on here (and they know who they are) who find this a particularly pleasant option, because they can then have yet another reason for not getting constructively involved. All that is required is a hasty application of "Occam's Principle of Limited Imagination".
Don't get me wrong, I wasn't getting hot under the collar when I wrote my reply to your post. Actually, I was laughing my head off. Now ask yourself this, why would I think that was funny?
This is most definitely an amazing case.
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 126.96.36.199) on Friday, January 10, 2003 - 02:09 pm:|
I have taken the advice of the project team and have forwarded a packet of info on
BEORIETE METHHPITI to a math professor by way of a 3rd year Clemson student who is some
variation of a math major. The solution works by giving the letter its number ((A=1 B=2,
Z=26 etc.)). The solution works with the Zodiac symbol itself, as an encoding wheel if you
will. Zodiac, on several occasions, used the symbol like a clock, on the map he placed
0,3,6,9 at the points. Those points can be argued as being 2 elevens, so you have 0,3,6,9
placed on 2 11's. Here's some more info from the packet: 1. Zodiacs 13-code is well
structured, balanced if you will, a sequence of 8K8M8 appears, suggesting it was designed
8,8,8=KM. 2. Theodore Kaczynski=209=19x11 3. Beoriete Methhpiti=187=17x11 4. Placing
Theodore Kaczynski under Beoriete Methhpiti you find that the only matches are E and I,
the last letter of each name, name breaks. 5. The 22 difference is perfectly balanced with
11 for each side. (T)90 (B)79...(K)119 (M)108 NOTES: A. 17x11 and 19x11 are prime numbers.
B. Scrabble is a number for letter game, the pieces add up to 187(Ted was very good at
Scrabble from a young age). C. 187 is the murder number. D. the letter K equals 11. E.
Hurkos predicted the importance of 2 elevens in the Zodiac case(LOL-that's not included).
The solution continues with the second stage, if you will, that is 0,3,6,9. Of course that's posted, see above up some. Anyway the notes on that are: THEODORE KACZYNSKI=TEHIMIOH ERTTPEBEI(all 0,3,6,9 difference)= scrambled to BEORIETE METHHPITI. A. The name runs full circle of the Z symbol from zero to zero. B. Those only matches are the first and last of Ted's entire name, when scrambled, the matches move to the last letter of each name. C. The string of numbers going down Ted's name keeps getting higher in use, suggesting as Ted went down his name, he tried to make it more difficult. Look>> 0,3,3,6,9,6,3,3,6,9,9,6,9,9,9,6,0. Ted waits till his last name to go thru the alphabet or look at actual difference in letters>> 0,3,3,6,9,6,3,3,6,17,17,6,9,9,17,6,0 D. ALL of Ted's double letters equal the very same number, suggesting design. E. The 6(sixes) uses the letters KOKO-Z. (compare to Theodore (J. KAC-Z)ynski(that's just for fun)). F. The 3 is HERE and 9 CANDYS. G. ZY=HH is of interest.
Further, Kaczynski uses a code that involves a string of numbers mixed with words. I have requested a percentage. That is something like: 51% TK's name is placed there by design, 49% coicidence. I put it at 85/15. I have some more detailed math work I'm holding back for now, but I believe that is enough to draw a similar 85/15 or plus reply. Also, it appears that only less than 1 % of all 17 letter names are workable thru the 0,3,6,9 Z-wheel. Also, I'm looking for an estimate on the number of names that will work if it is required as a standard that the double letters in the name must equal the same number. I place that at 20,000 to 1 at the moment.
|By Warren (Warren) (w205.z064002105.hou-tx.dsl.cnc.net - 188.8.131.52) on Friday, January 10, 2003 - 02:30 pm:|
2 X ?!
|By Lapumo (Lapumo) (p51-50.as1.clm.clonmel.eircom.net - 184.108.40.206) on Friday, January 10, 2003 - 04:00 pm:|
Just before we get into the detail of this ,please explain/clarify the following
1."These points can be argued as being 2 elevens".
2."suggesting it was designed 8,8,8 =KM
3."Kaczynski uses a code that involves a string of numbers mixed with words" The 13 code?
4. What is it exactly you have requested the % on?
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 220.127.116.11) on Friday, January 10, 2003 - 08:18 pm:|
1.The Zodiac symbol broken down is a wheel(circle) and 4 points, the straight lines equal 2 elevens(it's a visual thing). So you have 0,3,6,9 off 2 elevens on the map. 2. The 13-code is very orderly. It reads letter,letter,letter,symbol,(8,leter,8,letter,8)symbol,letter,letter,letter. Same forward as backward, balanced. Even the 8K8M8 is balanced because 888=KM 8+8+8=24, K(11)+M(13)=24. 3. That code is a Unabomber one that Doug posted on "Code Challenge". It involves words and strings of numbers. If I'm right about how I believe it works, it would support this BM solution. Usually when words are slipped into a number code, it's because the code-creator is using a number system based on the letter before it. Also suggesting to confirm this is the tedious nature of figuring out the exact number over and over again. It's like this: (Z,53,13,42,1,91.) So you work off the Z(26)+53=79=26+26+26+1=A. A(1)+13=14=N. N(14)+42=56=26+26+4=D. D(4)+1=5=E. E(5)+91=96=26+26+26+18=R. ZANDER. But that's in simple form and solvable. Imagine now a plus or minus is assigned to 13 letters and 13. Imagine there are simple rules like words that automatically send the decoder back to the previous word. Imagine certain combos of letters send the decoder back also. Imagine the code-creator assigns a few numbers to mean nothing(like the backward c in the 340). I can't say for sure, that it is similar to this, but including words from time to time suggests that like a domino-builder, the code writer is using safeguards against tripwiring his code into oblivion. So with only a page for a key, that code is realistically impossible to decipher. 4. The opinion of the professor(or any others) is requested to answer what is the most reasonable explanation for the numbers being what they are. He might side with this anagram theory but only by a 51/49 ratio. 51 being for the solution, 49 for coincidence. I have it at 85/15(not to be confused with the 99.99 % assumption that Ted is Z.) Or even the opinion might be that it doesn't even qualify as coincidence, though I would find such a reply unrealistic. *Warren, clarify your question, if you have one. Lapumo (and Ray) I will say this. I am interested in all cryptic options, but honestly I haven't seen any non-Kaczynski cryptics that I feel are solid. The only reason I dogged your work is that a claim of solving the case accompanied it(at least by Ray) and even I with my massive ego, make no claims of solving the case thru Beoriete Methhpiti. I look forward to reading your solution when it's the right time to put it out.
|By Lapumo (Lapumo) (p50-167.as1.clm.clonmel.eircom.net - 18.104.22.168) on Saturday, January 11, 2003 - 06:29 am:|
First of all let me say, that what we are discussing here is your
"solution".This is not an TK versus AlA argument Ok? I will give an honest call
on this as I see it.
Just to get the technical and obvious out of the way.They do need to be listed.
1.Your calling the last 17 lines of the first cipher a code.
2.Your saying that Zodaic aka Theodore Kaczynski
encrytped his full name within.
3.You are claiming that Zodiac used his "cross circle" symbol combined with NSEW directions as a method of encryption.
4.You claim that the math is fairly strict and the little or no alternatives that can be derived from this process, go a long way to proving that you solution is correct.
It must be said at this point that all of the above claims are assumptions.However they are not unreasonable assumptions.Zodiac did hint his name was here. The last 18 letters in the string have not been resolved.You have elected to deal with 17.Again that's not unreasonable because "Afterlifee" may be a misspelling.You have uncovered a name that has 17 letters in it.
It's fair to suggest that Zodiac may used "his" symbol in some form of encryption and that idea is strengthened when he uses it later on the Phillips map.
There are two reasons why I outlined the above.
1. I just want to be sure we are in general agreement on what it is we are looking at.
2.It was imortant to establish that the foundation for your theory was based in reasonable logic.What I mean by that is that you have a reasonable platform to proceed in this case as opposed to the "though nead" and "340 first and last line" efforts.
Finally,for now, would you agree that what your talking about here is a variation of a Caesar cipher?
|By Warren (Warren) (w205.z064002105.hou-tx.dsl.cnc.net - 22.214.171.124) on Saturday, January 11, 2003 - 09:46 am:|
Zander, althought your man is Ted and mine's Leigh, I do think there is something in the 3,6,9,12 series. I wondered about it recently when looking at a picture of the Zodiac watch and the ^'s used to denote those positions. And further evidencing my boundless ignorance, I have strong feelings that the 340 is also a partial Masonic code. I have reams of partial solutions on zeroxed copies of the 340 and so far all I'm coming up with are random names of basketball franchises(!) So I appreciate anyone who has taken the time to come up with any plausible solution, despite any irreverent comments I may make.
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 126.96.36.199) on Saturday, January 11, 2003 - 02:13 pm:|
Lapumo, I've never heard of a Caesar cipher. Your post appears to accurately outline my solution. I will also say that I find the fact that TED KACZYNSKI can be found in the first and last 17 raw-letter symbols of the 340 extremely compelling and unarguable. I also must say the TK in "though-nead" as compared to "knead-dough" while placed under TC(TK) is my personal favorite. I first became aware of the 2 elevens on the Z-symbol before hearing of Kaczynski, when I read Hurkos 2-11 prediction. I know that's just a technique used by clairvoyants, but I wondered why he chose those numbers, then I figured he may have taken it from the Z-symbol. Anyway when Ted was arrested I applied his name to BM and was taken aback to see the 2 elevens match. I originally proceeded with the 3,6,9,12 numbers as Warren says, but I instinctively felt it wouldn't wash. I decided to check the map again, and when I saw it was 0,3,6,9, I knew I had just stepped on a bombshell.
|By Lapumo (Lapumo) (p51-251.as1.clm.clonmel.eircom.net - 188.8.131.52) on Sunday, January 12, 2003 - 04:58 am:|
Ok Zander,the following is my analysis of your
"Crypto solution".We have agreed on what it is you are claiming and on the process you say you followed in order to extract the name THEODORE KAZCYNSKI.I'm not interested in going off on any tangents here and will stick to the facts.
You have defined your code as BEORIETEMETHHPITI.
You have defined your key as "Compass Cipher"
For the purposes of clarity,that is what I will call the Zodiac cross circle with points 0,3,6,9.
The key being the the procees for decryption.
If the approach is unbiased this is straightforward enough.You apply the key to the code and the result is your answer.
point o B-E-O-R-I-E-T-E-M-E-T-H-H-P-I-T-I
PLUS 3 E-H-R-V-L-H-W-H-P-H-W-K-K-S-L-W-L
PLUS 6 H-K-U-Y-O-K-Z-K-S-K-Z-N-N-V-O-Z-O
PLUS 9 N-Q-A-E-U-Q-F-Q-Y-Q-F-T-T-B-U-F-U
Point no.1. There is no solution at this stage.
Applying the key does not produce THEODORE KACZYNSKI.You have 68 letters to play with and not only is the name not there in straight spelling it isn't even there in anagram form.
So what's next?
Your code is still intact,but your key does not work.As far as a valid cryptic solution goes this is now dead in the water.
Had there been even an anagram form of the name at this stage, you would still be alive.
So what do you decide to do?
You alter the code.There is no instruction to do this,there is no hint,there is no logical reason to re-arrange these letters in the sequence of your choice.The only reason you decide to put them into this arrangement is because you have the answer to this before you go into it.It's biased and your forcing things.
New Code with compass cipher.
point 0 T-E-H-I-M-I-O-H-E-R-T-T-P-E-B-E-I
PLUS 3 W-H-K-L-F-L-R-K-H-U-W-W-S-H-E-H-L
PLUS 6 Z-K-N-O-I-O-U-N-K-X-Z-Z-V-K-H-K-O
PLUS 9 C-N-Q-R-L-R-X-Q-N-A-C-C-Y-N-K-N-R
Even after you change the code and re-apply the key you still do not have the name THEODORE KACZYNSKI.The best that can be achieved is
TH-O-O-R- KAZCYN-KI.There isn't even a "d" to be had in the entire 68 letters.There is only one s and one y,however as these appear on the same line one is excluded from use.
So what is you next step?
You simply choose to align the name Theodore Kaczynski beneath the new(altered) code.Let's forget the fact that you are not even supposed to have the name Theodore Kazcynski going into this.
Not only have you no reason in the world to be at this point, you now declare to have produced tight math and sequencing.
You produce the following sequence 0,3,3,6,9,6,3,3,6,9,9,6,9,9,9,6,0.
Look's good dosen't it? However it is nowhere near tight math.You only have 4 numbers to pick from,you are going to get a combination of only four numbers.There is no rhytm or sequence, it is totally random. If you were on to something even at this stage it would need some structured sequence such as 0,3,6,9,0,3,6,9,0,3,6,9,0,3,6,9,0
But let's even forget all that because the sequence you claim to have is not even there.
At this point you cannot even stick to the plan.
The rule is you have got to move from the Code to the Solution.At this point you are working both ways. You are working from the solution(that your not supposed to have) and filling spaces back to the code.
Let me explain.
At 4 points the progression from code to name is not there.H TO E IS +23/ M TO D IS +17/ H TO E AGAIN IS +23/ B TO S IS +17.It is absolutely ridiculous to think that you can work back from a solution you are not suppose to have.Again even if it was there,if you had the sequence you claimed it would mean absolutely nothing.It's random.
I have outlined my problems with your work and approach before.Nothing has changed,you cannot approach these things trying to fit a name into them.It's there without forcing or it is not there at all.What troubles me most is that you have not even recognized the flaws and problems with your own work.You were allowed to create you own code and your own key and you still have to force the name.
It again goes back to another point,that is, all these names people are suppose to be pulling out of these communications are not even there.
This was adjuged to be the best effort on the board.It's simply just not there.
|By Ray N (Ray_N) (184.108.40.206.bay.mi.chartermi.net - 220.127.116.11) on Sunday, January 12, 2003 - 02:09 pm:|
The point most well-considered to be taken away from this is that the main problem other board members have had with this type of work is the hypothesis that because there have been so many names extracted, this kind of work is going to ultimately be fruitless and unprovable. But as can be seen here, and this could be repeated with Harvey Hines' 13 cryptogram solution and others, the names were not in fact "pulled out" at all. Correctly stated, THOSE NAMES WERE PUT IN! Zander's is a textbook example, although it is by no means the only one of it's variety. Therefore, it is completely unfair to pre-judge this type of work based on the results of those whose work is not legitimate cryptography, but only poorly prepared concoctions intended to support a preconception of the identity of Zodiac.
|By Ray N (Ray_N) (18.104.22.168.bay.mi.chartermi.net - 22.214.171.124) on Sunday, January 12, 2003 - 04:15 pm:|
Also not addressed by Zander's key is the need to variously add or subtract the offset in order to get the needed letter with apparently no defined formula or algorithm to determine which operation is to be used, except of course the next letter that is needed to achieve the desired outcome. The fact that the key does not work suggests that the "compass key" was not intended to be used in this manner, and when we reach that conclusion, there is no basis for the manipulated starting order of TEHIMIOHERTTPEBEI (apart from creating an anagram template on Theodore Kaczynski), which defines this whole process as a subjective search for the key to a cipher for which the desired plaintext is already known. And thus the theory does not survive even an elementary scrutiny.
|By J Eric (J_Eric) (dsl081-238-156.lax1.dsl.speakeasy.net - 126.96.36.199) on Monday, January 13, 2003 - 11:40 am:|
For the finale of the first cipher (that the Hardens almost completely solved), being EBEORIETEMETHHPITI, I'm still leaning toward my unscrambling of: TIME I HIT THE BEER. POE. The "beer" comes after a perfect day of hunting and collecting slaves for Paradise. The "Poe" calling to mind, in crossword puzzle type clues, "Author Allen." (This information was available at the 7/4/02 Task Force meeting, but repeated here for those afar.)
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 188.8.131.52) on Monday, January 13, 2003 - 03:43 pm:|
Lapumo and Ray, you don't understand how the solution works. LOL-this is why I said what I said in the other thread. Obiwan followed it. Read his post above with what he calls a shift factor. The solution works off the possibilities (-9,-6,-3,0,+3,+6,+9). Also consider, that this is in graph form(another connection to the Z-symbol). So Lapumo, I am assuming that you have not considered the negatives. For example the T=KNQTWZC(-9,-6,-3,0,+3,+6,+9). I have another coincidence to offer within the solution. If you'll notice "M" is only available until the 5th option. See...T=KNQTWZC H=YBEHKNQ E=VYBEHKN O=FILORUX D=UXADGJM. Now look THEOD=TEHIM. The word "TIME" is penned at the earliest possible instance. Now look at the string for THEODORE=(0,3,3,6,9,6,3,3). Notice the 9 appears out of place. Actually, look at the whole string. (0,3,3,6,9,6,3,3) (6,9,9,6,9,9,9,6,0). Notice that only the M(9) is the difference from using just 3 and 6 for the first name and 6 and 9 for the last name(The zeroes represent how the name runs the full circle of the Z-wheel). I'm suggesting that the out of place 9 represents Kaczynskis effort to write "TIME" in at the earliest possible instance(THEOD=TEHIM). Ray, Lapumo and anyone who's criticized the solution, without even knowing how it works. You can kill 2 birds with one stone here. FORWARD A NAME that works. 1. You will prove that you understand how the solution works. 2. You will show how easy it is to produce a name within the solution. A name should be found that works, because I believe about 1 percent of all names work. But yet I can still compare this in quality to Theodore Kaczynski. At any rate, this is an easy way to show that you understand the solution, and from what I've read so far, I'm not gonna believe it till I see a name.
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 184.108.40.206) on Monday, January 13, 2003 - 03:57 pm:|
PS. Ray: you wrote: ((And thus the theory does not survive even an elementary scrutiny.)) LOL-Ray, it won't survive yours.
|By Lapumo (Lapumo) (p50-189.as1.clm.clonmel.eircom.net - 220.127.116.11) on Tuesday, January 14, 2003 - 03:49 am:|
You just don't get it do you?
For the last time,you had no business being where you were in the first place,it is a complete manipulation.I fully understand how it "Works".
If you are going to argue this then argue by the facts,explain how you worked from one position to the next.
This whole thing is designed at finding Kazcynski NOT finding a solution using a key.
I was waiting for you to to jump on the negative movement,because this again is another variation another thing you need to do to get this to fit.
That's what I mean by saying there is no formula here,you work to the positive and when something dosen't fit you work back the other way.
Your "sequence" read 03369633699699960
it should have read 03-36-963-3699699-960.
These are two different instructions.
Each time you add a postivive or negative,you are adding 17 letters.So this whole thing started with 17 letters,all you have done is increase that to 119 letters.You still cannot extract TK's name using anything that resembles math,what is it that you don't understand about that?
We now have 119 letters to work from,are you seriously suggesting that no other names can be extracted?
At a glance(using your method) EIOTEMREIB sequence
3969099909 equals BRUCE DAVIS.
There are no rules that state this has to be a name of seventeen letters.That this line doesn't contain some other message, nothing.
Your "effort" is not a solution.If Arthur leigh Allen's name or any other possible name or message is derived from this process it is invalid.Let me go on record as saying this,nobody anywhere with a knowledge of Crypotlogy will validate your solution.You haven't so much stepped on a bombshell, but a landmine.
|By Lapumo (Lapumo) (p51-150.as1.clm.clonmel.eircom.net - 18.104.22.168) on Tuesday, January 14, 2003 - 05:21 am:|
It just struck me that you do not understand what it is you are dealing with,in terms
of process or required proof to make any solution valid.
I earlier likened your "solution" to that of a caesar cipher.Let me give you an example,I hope will help.
Caesar Cipher is one of the earliest and simplest forms of encryption.Simply, it's the alphabet plus three.Therefore ZANDER would be encoded CDQGHU,simply count forward 3 letters to encode,count backwards (to the negative) 3 letters to decode.
This would also be acceptable if the "solution" were anagrammed".It gives another level of security.However this is only acceptable if the math is "Strict" and there are no other possible words that could be spelled using the same letters.
If we are to compare this to your "sequence" then here is works as 3,3,3,3,3,3.There's no room for movement ,you apply the Key to the Code and only one possible answer emerges.
You can now begin to see how you solution falls apart.
Eric's example above shows another alternative.
It goes to demonstrate how different people see different things.His thoughts are that there are 18 letters to consider,not 17. He elects to suggest the Zodiac did not encode his name here but rather hint at it.Another perfectly reasonable idea.He thinks its an anagram and has extracted a coherent message.As it stands, it is not good enough,without further proof.However even at this point it is better than yours. Why? because he applied his key Strictly and came up with a reasonable reading.
He can argue that there is no other full reading .
For instance others have come up with ROBERT EMMET THE HIPPIE, which isn't there, there is only one R.His solution can only be knocked if one can extract an alternative reading using the same process.Or someone else comes up with another "solution" that they can prove beyond doubt.
At the end of the day there is only one solution to this.Robert emmet isn't here and neither is T Kazcynski, at least as demonstrated.
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 22.214.171.124) on Tuesday, January 14, 2003 - 07:31 am:|
Lapumo: you wrote: ((The sequence with negative reads: 0,3,-3,6,-9,6,3,-3
6,9,9,6,9,9,-9,6,0)). I prefer the opposite of what you have, but good enough. Anyway, you
write how Bruce Davis works. Please, obviously this works off 17 letter names only.
(LOL-Please don't bring up Don Ho again!) Let me break this down into simplest form. We
all agree that Zodiac wrote BEORIETE METHHPITI. OK, the Caeser cipher is a good example,
but instead of 3, Zodiac offers the options(-9,-6,-3,0,+3,+6,+9). It makes sense,
Kaczynski wouldn't offer a plain anagram, and might only feel comfortable in offering
enough options. At any rate, this should clear up things, if there's any remaining
confusion(this solution is simple yet pesky!). B thru(-9,-6,-3,0,+3,+6,+9)=SVYBEHK. That's
how it works. So BEORIETE METHHPITI= *B=(S)VYBEHK *E=VYBE(H)KN *O=FILO(R)UX *R=ILORUX(A)
*I=ZCFIL(O)P *E=VYBEH(K)N *T=KNQ(T)WZC *E=VYBEH(K)N *M=(D)GJMPSV *E=VYBEHK(N) *T=KNQTW(Z)C
*H=YB(E)HKNQ *H=YB(E)HKNQ *P=GJMPSV(Y) *I=ZCF(I)LOR *T=KNQTWZ(C) *I=ZCFIL(O)R
I've (), all the Ted matches. As you can see they equal=SHRAOKTKDNZEEYICO=Theodore Kaczynski. So to find a name within the solution, you are required to pick only one letter for each letter from BM, like I have done with TK. Since Zodiac gave us Beoriete Methhpiti and 0369 along the Z-wheel, finding his name within these requires explanation because no other reasonable names seem to fit. Of course, all the other coincidences within the numbers are additionally compelling. So BEORIETE METHHPITI as a Caesar cipher variation using (-9,-6,-3,0,+3,+6,+9) equals Theodore Kaczynski in anagram. Anyone can list those BM options on a piece of paper, and circle one letter for one. That's an easy way to do it, find another name. I would like to hear and possibly compare any names found. Thank You.
|By Lapumo (Lapumo) (p51-150.as1.clm.clonmel.eircom.net - 126.96.36.199) on Tuesday, January 14, 2003 - 09:21 am:|
This is going to be my last post on the matter because I'm fed up of trying to explain
to you as honestly as I can why your "solution" is not worth the paper you wrote
it on.I can assure you I do know what I'm talking about.I'm through wasting my time.You go
ahead and send it away for professional analysis and then you can shut us all up when you
get the answer back.
The Caesar cipher is a defined Cipher.
How does Z off an alternative? How do you work that out? How can you imply that the only solution here is a name with 17 letters in it?
All rhetorical questions.
This is your work,so if you want to check the validity of the following you do so.
There is nothing to prove that these 17 letters contain a name in the first place.Because you have manipulated one into place does NOT mean that I or somebody else has to find a name with 17 letters in it to disprove yours.That's working off the following conclusion. Zodiac, whoever he was, had 17 letters in his real name and they are encoded in this particular line. Rubbish. There is nothing to say that this is not some other kind of message OR Zodiacs real name accompanied by some other statement.I have already told you that any message extracted using this method is invalid.However you have also argued that other names are not possible using your own process.
Again let me repeat ,this line could say something like. Laurence Kane Zodiac (using 18 letters.There is also nothing to say that some of these letters are not used as fillers to square the 17X8 section of cipher off.
BRUCE DAVIS is there as indicated above.
LEIGH ALLEN is there IEOMHRIIET/ 3066090006.That in itself suffices,however there is no problem completing a coherent message using all 17 or 18.
Here's another "solution". Zodiac wrote;-I will change the way the collecting of Slaves I will no longer announce to anyone when I commit..."
Some see this as an indication that he may have been clueing us in in advance.M Rodelli discovered the Upside-down Crossed circle and the 132 clue possibly hinting at Highway 132 and kathleen John's.
Using your process the following is possible
Arrange letters as follows;-THITBEIIEEPMRHEOT
us the following sequence 00996036960009090.
Solution Z HIT BERRYESSA NEXT.
All you have to do to verify any of these "solutions is to do what you have already done. Write BEORIETEMETHHPITI in the middle and the 3 lines of 17 letters at either side plus and Minus. Aggange for any message or name of your choosing.
I have taken this as far as I can and as far as I am willing to.Perhaps someone else can take you up on this if you still don't get it.
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 188.8.131.52) on Tuesday, January 14, 2003 - 01:15 pm:|
My solution works off suggesting Beoriete Methhpiti is an anagram for Theodore Kaczynski. Lapumo, you must stick to how the solution works. Surely you're not telling me that "Beoriete Methhpiti" is an anagram for "Bruce Davis". By the solution, the resulting anagram must be 17. You have offered "Z HIT BERRYESSA NEXT" as 17. I'll look into it. Initially though, it's not a name and it's consistent with the kind of baby-talk anagram that results from a forcefit effort. Nevertheless, I shall compare the two. The solution only assumes: The last 17 are used to anagram a name and Zodiac used his own symbol with 0369 at the points as a method. Lapumo, you outlined these things earlier as not unreasonable. Now the result leads to an anagram of TK. So now, is this a coincidence? You have to look into the solution, study it. Two possibilities: TK created this solution. 2. Coincidence. It certainly qualifies as a coincidence because no other reasonable names appear anywhere in sight. The solution is cutthroat, I don't think that's been realized yet. I've listed the other items of interest, that also qualify as coincidence. Anyone have a name yet?
|By Ed N. (Ed_N) (acc3364b.ipt.aol.com - 184.108.40.206) on Tuesday, January 14, 2003 - 02:24 pm:|
Hmm... it seems really arbitrary to drop the first "E" from
"EBEORIETEMETHHPITI," then break the remaining 17 letters in two parts forming
"BEORIETE METHHPITI," which "coincidentally" just happen to have 8 and
9 letters each, exactly the same as "Theodore Kaczinsky." Amazing!
It's very strange that anyone should do so, and completely arbitrary in any case. How do we know that it's not supposed to be "EB EORIET EMETH HPITI," which stands for "IM ARTHUR LEIGH ALLEN?" Personally, I think it stands for "San Benito Mental Hospital."
|By Lapumo (Lapumo) (p50-149.as1.clm.clonmel.eircom.net - 220.127.116.11) on Wednesday, January 15, 2003 - 08:15 am:|
If you call that arbitrary Ed, how about what you need to do next?
You then apply the key "O369 crossed circle"to get the following graph;-
MINUS 9... S-V-F-I-J-V-K-V-D-V-K-Y-Y-G-Z-K-Z
MINUS 6... V-Y-I-L-M-Y-N-Y-G-Y-N-B-B-J-C-N-C
MINUS 3... Y-B-L-O-F-B-Q-B-J-B-Q-E-E-M-F-Q-F
ZERO 0... B-E-O-R-I-E-T-E-M-E-T-H-H-P-I-T-I
PLUS 3... E-H-R-U-L-H-W-H-P-H-W-K-K-S-L-W-L
PLUS 6... H-K-U-X-O-K-Z-K-S-K-Z-N-N-V-O-Z-O
PLUS 9... K-N-X-A-R-N-C-N-V-N-C-Q-Q-Y-R-C-R
Now you have a choice,the initial 17 letters has been increased to 119.You can pick any letter from each column using 17 in total to find the name Theodore Kazcynski.However, you must read the small print because there are conditions :- You must forget that nobody heard of him back in 1969 and that you cannot arrive at the "solution" unless you know the name.Don't worry though because you can pick it out completely at random and then re-arrange back into it's correct form.
No proof is required here,so there's no need for any of the math stuff.
Incidentally, if in the process of searching for this particular name, you must ignore any other coherent messages that might pop up.That's because they are probably forced in there.Also any other shorter names that arise are excluded. It dosen't matter if you can find Arthur Allen Zodiac or Bruce Davis killer, does not count.We must be strict here, only names that have 17 letters can be shown as proof
that the solution is in any way flawed.Then again if you do find a name with 17 letters in it, it's not the same as Theodore kaczynski,is it?
There are only 2 possibilities. Theodore kazcynski
deliberately encoded his name here, or this is a coincidence.
What may help you in your decision is the definition of the word coincidence- "An accidental or remarkable occurence of events,at the same time suggesting but lacking a casual relationship".
Although as this is neither accidental or remarkable, there must be a third possibility.
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 18.104.22.168) on Wednesday, January 15, 2003 - 01:44 pm:|
OK Ed, but it is not an unreasonable to assume that Zodiac wanted to use the last 17. Even Lapumo has said so. (By the way ED, the breaking of the names is nearly meaningless within the solution). The amusing part about all this is that Lapumo originally states that it is not unreasonable to use 17 and use the Z-wheel 0369 as a method. Now that he realizes the solution does work, he goes back to saying those things that were reasonable are now unreasonable. LOL>>he might have to say the solution is reasonable if he keeps going forward. Lapumo, all I can say is that you appear completely ignorant of how this math system works, perhaps math in general. If I give an anagram for an animal as "FLOW" What's the best answer 1. FOWL 2.WOLF 3.OWL (LOL-it's not 3). But you would argue it was. IT's an anagram. 17=17. Of course the best comparison for this is a 2 word 17 letter name and why not, you can make up like a million of them. An easier way to do this is to make a 16-letter name, then you're free to add a middle initial(but not as good). I'll accept "Bruce Davis Killer" or similar. I'll pass on "Z HIT BERRYESSA NEXT" because once you start using one letter to represent a word, use broken English, use 4 words, etc.,then it becomes infinitely easier. The focus should be on why TK works when very few names work. Once I have a name to compare to, I can nearly guarantee it wont match the curious patterns set by the name TK.....like..... 1. patterns around the number 11. 2. All of Ted's double letters equal the same letter. 3. The number string which suggests as Ted went down his name, he used larger numbers and shows his name running full circle on the Z-wheel. In other words to beat TK as the best fit here, you must have a 17 letter name(2 words preferably), that of course not only fits, but matches or surpasses the curious number patterns surrounding TK. Lapumo, you are free to create any 17 letter name you want, pass it on to me with B=,E=,O= and I will look into it. Lapumo, you have to realize that your logic is flawed concerning not knowing TK's name in 1970. It is entirely possible that, let's say in 1970, someone could be intrigued by the 0369 Z-symbol(let's say a detective) and then did the same exact thing I've done with the 0369. At that point he would search for anagram names. LOL-pretend you're him and get me a name. You've already said that the Z-wheel 0369 used on the last 17 is a reasonable approach. Now, your only course is to show that names are easily extracted in the same way, thus, at least partially, negating the TK cryptic recovery. I like the way you look up definitions. LOL- It reminds me of when Gilligan looked up the exact laws and threw everyone in the can. I will give you some credit for hanging in there and not just ducking and running like Ray.
|By Carolyn (Carolyn) (dialup-22.214.171.124.dial1.seattle.level3.net - 126.96.36.199) on Thursday, January 16, 2003 - 01:43 am:|
I actually worked out Doug Oswell's 13 cipher tonight (of 7/20/02) after reading his
explanation and how the five symbols spell obvious words (from geometry or ancient
symbols, etc.), each time unifying all letters from the phrase, but eliminating
duplicates. I hate math and can't begin to understand the other ciphers but within minutes
I also easily came up with:
AENZODICFTYKMRS Unscramble and you get: From Ted Kaczynski (one k will be missing because of eliminating all duplicate letters). Can't believe the simplicity of it! Thanks, Doug!
|By Tom Voigt (Tom_Voigt) (12-224-139-118.client.attbi.com - 188.8.131.52) on Thursday, January 16, 2003 - 01:49 am:|
Unfortunately, Ted is not bald or fat enough to be the Zodiac...therefore, it's merely a coincidence.
|By Ed N. (Ed_N) (acbfe5c4.ipt.aol.com - 184.108.40.206) on Thursday, January 16, 2003 - 02:07 am:|
I get EN MRS ZODIAC KFTY, or "Ed Neil, Mrs. Zodiac, KFTY" (Channel 50 in Santa Rosa). That tells me that Z's wife will appear with me on Channel 50 to reveal that her husband is, in reality, Z.
|By Douglas Oswell (Dowland) (28.philadelphia08rh.16.pa.dial-access.att.net - 220.127.116.11) on Thursday, January 16, 2003 - 03:30 am:|
I can't help but recall the 9-digit number, reading liking a social security number, 553-25-4394, that Ted gave out in order to validate himself as the Unabomber. I'm not precisely sure, but given Ted's teasing nature when dealing with the authorities, I think there's a good chance that his name (9 letters) is somehow encoded within those 9 digits.
|By Lapumo (Lapumo) (p50-50.as1.clm.clonmel.eircom.net - 18.104.22.168) on Thursday, January 16, 2003 - 04:59 am:|
Do not accuse me of doing something that I have not done.I stated at the outset that I thought it was not unreasonable to assume that Zodiac could have encoded his name in the last line of this cipher.I also stated that the thought of using the crossed circle 0369 was not unreasonable.However that's where our agreement ends.The manner in which you have attempted to apply "the key" is ridiculous in the extreme.The only possible way this could have worked is to apply a strict math sequence to the orininal line.
That means the sequence must have frequency structure. The purpose of which would be to exclude other combinations.An example of this frequency structure would be 0369036903690369 etc.There is a pattern,as opposed to the random sequence which you have put forward.
Again go back to the example of the Caesar Cipher, a defined system with only one possible extraction.Your system is not defined because when you apply the key, you still do not have the answer.You have to pick and choose to find the name your looking for and the only math applied is that it comes from one of 7 columns.What's worse again is adding the minus movement. Essentially all you are doing is giving 3,6 and 9 two values each.
There are thousands of possible extractions, because you are dealing with an anagram.It is not for you to apply the rules.Therefore anagrams follow the same rules as natural language,all extractions are only the same value as any other extraction.In short, any coherent message that can be extracted is as good as any other.The fact that there is more that one possibility renders this system useless in terms of any kind of proof.
In your ignorance you have actually made my own argument for me with your FLOW = FOWL OR WOLF example,in terms of anagramming.There are two possible answers to the same puzzle.How can we determine which is correct. We cannot, unless we have additional information such as strict math formula.By your rules both answers are equally possible.By mine one result only would be possible.
Another ludicrous argument of your involves excluding Z HIT BERRYESSA NEXT on the basis of using the single letter Z.As useless as it is as some kind of proof of deliberate encryption it is a hundred times better that what you suggest.
Finding a reference to Z or Zodiac would be part of the proof as he did not tell us until the following letter that his moniker was Zodiac.We also know the his next target was L.Berryessa. These are known facts.Despite your convictions,we still do not know if TK is Zodiac.
How you can keep a straight face and suggest this a force fit and at the same time turn around and suggest that MY NAME IS FROM TED KASNKI legitimate is beyond me and only goes to prove either your dishonesty or total lack of understanding of what is at play here.
A detective or anybody else doing the "exact same thing" as you did, would have the answer before going into it and would be manipulating the rules in order to extract the required name.A person looking at this logically should throw it in the bin. However someone with the same idea but attempting to find a name without bias(not knowing the name) would have several thousand combinations to look at.Each coherent name or message or combination holding the same value as any other.In other words no chance at proof.
In terms of discussing this it is not I who deserves credit for sticking around, but Ray for not continuing with this pointless discussion.
There are umpteen peolpe on this board who think it possible that Zodiac may have encrypted his name.There are also those who think TK is the Zodiac.How many have commented on your "bombshell"?.If your system is good enough it will stand on its own and it won't matter what I have to say.If your going to persist with this have the courage to put you money where your mouth is.
Doug, that is very interesting and getting some kind of idea what was behind it could tell us much.Just to make the point again,here we appear to have some code using strict math.Something as yet not evident in the Zodiac ciphers.
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 22.214.171.124) on Thursday, January 16, 2003 - 07:20 am:|
Lapumo, I don't want to keep burning space here with technical arguments. I've put
forward a possible anagram for BM using a fairly simple approach based on the Z-symbol. If
you have a name for comparison...good. If not, then I would find that meaningful. By the
way, I wrote: Here's an anagram FLOW= 1.fowl 2.wolf 3. owl : What's the best answer. You
see, I offered that because I knew your rigid technical-mind couldn't handle it. I've come
to the conclusion that your mind works exactly the opposite of Bookworms. The best answer
is: WOLF: because it is an anagram and is a backward reading of FLOW. Seriously though,
unless you have new insight, I'll accept your last post as the last word here.
At any rate, I think that Carolyn has a good point: Simplicity. Or what I would call deceptive simplicity.
553-25-4394? Maybe there's something to that? It reminds me of when Ted anagrammed the middle of Bry(an Hartn)ell, when he wrote: (Call Nathan R Wed 7 PM). Of course, we also know that BH offered his phone number to Zodiac and that Z wrote 6:30 on the car that day.
|By Lapumo (Lapumo) (p51-197.as1.clm.clonmel.eircom.net - 126.96.36.199) on Thursday, January 16, 2003 - 08:58 am:|
No problem,Zander.I'm am glad to see that you have Tom's best interests at heart and
space is expensive.All you need to do in future is call it like it is.So when you force
Tk,s name into something call it a "POSSIBLE ANAGRAM" from day one and not a
"bombshell",a deliberate encryption or a twenty million to one shot and I'll be
glad to agree with you.
Putting such titles on things requires techinal proof,unfortunately!
Yes, I agree with you, Carolyn's point was good.Simplicity. Actually, you have a better one again "deceptive simplicity".Write that down,it may be helpful in future.
Have a couple of ideas going on that number 553-25-4394.Do we know how this was first communicated to Law Enforcement? Was it part of a longer written communication?
(Call Nathan R wed 7 pm)mmmm Ihave it!
ARTH. ALLEN W and C(Washington and Cherry ?) 7pm.
O My God Zander, another "bombshell". If you can't find another name in there in means TK and ALA were the Zodiac team.It explains everything. LOL
|By Douglas Oswell (Dowland) (adsl-61-70-177.rdu.bellsouth.net - 188.8.131.52) on Thursday, January 16, 2003 - 12:37 pm:|
Lapumo, I have to differ with you on your interpretation of "strict math." Mathematics, as practiced by people like Kaczynski, actually utilizes very little in the way of numbers. Most of it is involved with abstractions that are represented by symbols. Kaczynski's doctoral dissertation is chock full of them, many of them reminiscent of those used by Zodiac.
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 184.108.40.206) on Thursday, January 16, 2003 - 02:30 pm:|
Lapumo: you wrote: ((Putting such titles on things, unfortunately, requires proof)) LOL- Like starting a thread called "New Evidence" with no new evidence? What boggles my mind here is how you can put forward that IL LEE ALLEN solution. That is so flawed and manufactured and ridiculous, I don't see how you can criticize ANY thing else that's posted in English. Lapumo writes: ((Was the number 553-25-4394 part of a longer communication?)) LOL- You don't know anything about Kaczynski, do you? LOL-Lapumo: Look at your Jan. 12th post. Read where you accuse me of altering the code from BEORIETE METHHPITI to TEHIOMHERTTPEBEI in order to get a new choice of 68 letters. LOL-those letters match, it's an anagram.(You erred with the U off the I) Those are the same exact 68. That right there tells me all I need to know concerning your abilities to properly gauge my solution. Funny thing is how Ray followed up by agreeing with your post. It's funny too, I haven't got a name from Lapumo yet. Lapumo, how about you send me DON DRHUCJEGHEDS HO and then tell me it's possible for someone to have 12 middle names and so you've abbreviated each name(LOL). That's just as good as a complete name, right? OK, so you understand my solution, certainly you do! Here's a name: Eric Robert Rudolph. Tell me in math terms why it doesn't work. And don't say because you couldn't get the circle things to work.
|By Douglas Oswell (Dowland) (adsl-61-71-245.rdu.bellsouth.net - 220.127.116.11) on Thursday, January 16, 2003 - 02:53 pm:|
Lapumo, the 9-digit code wasn't sent to law enforcement. Kaczynski never wrote to law
enforcement; only to the newspapers, and a couple of select individuals, although he tried
to place a single phone call to the Sacramento PD about a day before the Gil Murray bomb
exploded; he ended up getting the answering machine of a business whose number was one
digit removed from that of Sacramento PD. The code was meant to validate him as the
Unabomber. A typical correspondence would begin something like: "This is the
terrorist group FC, 553-24-4394." (I'm on the road now and don't have my sources in
front of me, so this is not verbatim.)
The "call Nathan R" indentation might or might not have been from Kaczynski. I recall reading an article a number of years ago that stated the editor to whom it the letter was addressed placed it on a pile of other correspondences and might have made the notation himself, on a piece of paper placed above it--he apparently knew a "Nathan R."
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 18.104.22.168) on Thursday, January 16, 2003 - 02:57 pm:|
Correction: On Lapumos Jan. 12th post, on the first anagram (Beoriete Methhpiti) that leads to 68 possibilities for the plus side. There are 19 errors. Yes, 19! Keep in mind, that this only involves adding 3,6, and 9 to the number for the letter.
|By Lapumo (Lapumo) (p51-116.as1.clm.clonmel.eircom.net - 22.214.171.124) on Thursday, January 16, 2003 - 06:11 pm:|
When I spoke about "strict math" is was in relation to how it should apply to Zanders solution.I'm not sure if that is what you are disagreeing with or you are making a more general point.If it's a case of you not agreeing with my assessment of Zanders "solution" please outline the problem and I will gladly discuss it.
My position is that this work is neither a sound method of encryption or decryption.
I would appreciate getting that message on the number verbatim, when you get the chance,thanks.
My "rigid technical mind" as you call it,has nothing to do with your solution.
My "il lee allen" post has nothing to do with your solution.
What I think does not change your solution.
My typing errors do not influence how your system works unless we are calling different letters.And the post on the 12th dealt only with how your system worked.(In fact,why don't you write out your own theory)Maybe that's why no one else is posting on your bombshell.
You twisting my words has nothing to do with your solution.
Because I am not as knowledgeable(nor do I pretend to be) on TK as Doug or you does not change your solution.
The only thing that matters here is the solution itself.If you want to be taken seriously,you need to do your own research before you post submissions.No good saying ,"I found a name,now you find one to disprove my theory.You appear to have this stupid belief that it's up to me to disprove what you have rather than you proving your own claims.If your solution is good enough it doesn't matter what I have to say.It will stand on it's own.
Having said all that,I have given an opinion and I will stand by it.It seems ridiculous to carry on discussing this. I have studied it in detail and my opinion was an honest one.
If your honest and believe in this, back it up.
You obviously take exception to my opinion of this ,so the best thing to do is put your faith in it and prove me wrong. Do what you have been promising to do and get an expert opinion.
I'm willing to put my money where my mouth is, ARE YOU? Seriously,perhaps you would like to make that meeting in the summer.Wouldn't it be great to have your flight covered or your hotel paid for?.Write a check you have to cash for once.
|By Zander Kite (Zk) (gsa-24-197-136-36.sc.charter.com - 126.96.36.199) on Thursday, January 16, 2003 - 08:29 pm:|
Oh well, I'll have to put this all on hold. I'm heading out to Spruce Pine in like an hour, for a perhaps lengthy visit. Lol Doug, we might cross paths. If I'm not able to post before DNA results are official, just keyword bombshell...Zander was right! Thanks. Maybe I'll post my 32-bomb-code solution, if I get a chance. I'll let you all in on a secret of mine concerning the Zodiac case. Before I had ever heard Of TK, I had his name on this list, the list was produced from the codes and writings, some intuition. It was the top 100 most likely names for Zodiac. This goes back to 1992(Unabomber arrested in 1996). I had the word game down in my notes(though-nead compared to knead-dough equals missing T and K). Of course, I couldn't appreciate that it was placed under TC at that time. I did factor in that a victims initials were also on the note(PS). (Remember to, that at that time I'm working only off what's available from the yellow Zodiac book.) Anyway, I had my first and last 17 working off the 340. The first names are actually limited. My list was something like Ed,Ted,Gil,Ned,Bill,Phil,Don,Ron,Ben,Ken,Len,Nigel,Neil. While the last name list had around 50 names on it, like Cody,Cook,Hancock,Mack etc..... I had Kaczynski but it was not an exact spelling, but more or less Kaczynski. Anyway, a top 100 list of likely names for Zodiac was created and one of them was Ted Kosmynski(sic). So, that was taken from code work and other ideas. Of course, I had a lot of weird ideas that led to putting names on that list. LOL- Ron Hancock, Phil Simon, Bill Cody, and Benjamin Cook were on it. I had one for Kane and Donald Day. Some other weird ones. Anyway, I have been reluctant to reveal this, but little by little the info has been passed on anyway, so I guess it's not a big deal. Oh well, DNA should settle all this anyway.
|By Ed N. (Ed_N) (acbeee93.ipt.aol.com - 188.8.131.52) on Thursday, January 16, 2003 - 09:05 pm:|
My list was something like Ed,Ted,Gil,Ned,Bill,Phil,Don,Ron,Ben,Ken,Len,Nigel,Neil.
Ed Neil as the Zodiac??? Never heard of him...
|By Nick (Nick) (184.108.40.206) on Thursday, January 16, 2003 - 10:32 pm:|
Suspect Ed Neil........
Strong Vallejo connection
Intimate knowledge of crime details
Can be placed at all of the crime scenes
Name appears in ciphers
How old are you Ed?
|By Ed N. (Ed_N) (acac95c2.ipt.aol.com - 220.127.116.11) on Friday, January 17, 2003 - 07:37 pm:|
What if I told you my birthday was 12-18-1933...???
|By Nick (Nick) (18.104.22.168) on Saturday, January 18, 2003 - 12:15 am:|
I'd say you've aged well.
|By Tom Voigt (Tom_Voigt) (12-224-139-118.client.attbi.com - 22.214.171.124) on Saturday, January 18, 2003 - 12:43 am:|
Anyhoo, this thread is huge and going absolutely nowhere. Maybe someone can start another one with a new direction?
|By Lapumo (Lapumo) (p51-25.as1.clm.clonmel.eircom.net - 126.96.36.199) on Saturday, January 18, 2003 - 12:16 pm:|
I can appreciate that this thread was going nowhere.The reason for that will become
clear in time if it isn't already. However there was very important point at stake here
and I hope you will you will allow me one last word on it.
It is not even necessary to go into the specifics of what is being proposed here to show exactly why this does not make sense.
What we are looking at here is the last line of the first cipher.All we can say for certain is that it is a row of 17 letters.If may be gibberish, a line just added to square off the cipher into three equal parts.An existing anagram, or something yet to be discovered.One thing is for sure though, there is only one answer.That is why what Zander proposes is not possible.After we apply his key we are left with an anagram spread over seven lines.In other words we are left with 119 letters to build a message from.We have every letter in the alphabet available to spell a name or a message, with no rules to dictate what form that message should take.Each and every extraction having exactly the same value as any other.
It's a seriously flawed notion and very misleading.
|By Howard Davis (Howard) (dsl-gte-3839.linkline.com - 188.8.131.52) on Thursday, November 20, 2003 - 01:04 pm:|
Some time ago I posted that there was a statue of Robert Emmet in Golden Gate Park.
I got some flak in e mails saying there was no such statue and that I was trying to make a 'fit' for the letter string at the end of Cipher One.
Of course,we know some have seen the possibility that Zodiac used the above name of the Irish revolutionary as another moniker(which he was fond of doing) at the end of his first code.
By using Google just click in "statues in Golden Gate Park," then go to the third topic down and click and there are two photos of the Robert Emmet statue in Golden Gate Park.It was donated in 1919,so it was there in the 60's!
There seems to be a connection to things British and Irish in Zs letters."This is the Zodiac Speaking"book brings this out too.
Interestingly enough,in the 60's hippies ,I was told,used to hang out near the Emmet statue.The code string has been seen as saying 'Robert Emmet the hippi.'FYI
|By Howard Davis (Howard) (dsl-gte-3839.linkline.com - 184.108.40.206) on Thursday, November 20, 2003 - 01:07 pm:|
|By Lapumo (Lapumo) (p50-91.as1.clm.clonmel.eircom.net - 220.127.116.11) on Friday, November 21, 2003 - 02:04 am:|
I guess it's whatever one is prepared to accept.
"Robert Emmet the Hippi" was suggested as a possible anagram. The problem is,it's not there,
at least as written. That particular string has 19
letters in it. There are only 18 letters at most available.
The letters EBEORIETEMETHHPITI. So there is only one R, one M and one P. The closest one could get
is Robet Emet the Hipi.
|By Howard Davis (Howard) (dsl-gte-2718.linkline.com - 18.104.22.168) on Friday, November 21, 2003 - 11:41 am:|
Good enough- within the parameters of an ananagram sequence where concealment coupled with a revelatory effect is desired!
|By Warren (Warren) (22.214.171.124.ptr.us.xo.net - 126.96.36.199) on Friday, November 21, 2003 - 02:50 pm:|
|By Howard Davis (Howard) (dsl-gte-2718.linkline.com - 188.8.131.52) on Friday, November 21, 2003 - 04:13 pm:|
The anagram decipherment is within acceptable range-inspite of the fact not all letters are present- for such a message (i.e.Robert Emmet), as given.
Anotherwords,I don't know what our Irish friend is talking about!
|By Sandy (Sandy) (adsl-216-100-137-70.dsl.snfc21.pacbell.net - 184.108.40.206) on Thursday, November 27, 2003 - 09:08 pm:|
This will sound a bit nuts but could it read as :me thee hipii Robeett? If I take out all the multipals, I get Rob M P or Rob P M. I then thought he has 5 E's and 3 I's, if I add the 5 and 3= 8 the 8th letter in the alphabet is H.That works for one of my suspects,except the 3T's and 2H's left over = 5 the 5th letter is E ,I don't know what to make of that one. If I subtract it ,I get 1=A = Ha ( Like in Ha Ha)Was he laughing at all of us again? Happy Thanksgiving no more eggnog for me.
|By Bruce Monson (Bruce_Monson) (co-ratlsnk-u2-c6-111.clspco.adelphia.net - 220.127.116.11) on Friday, November 28, 2003 - 10:43 am:|
On the original box that the Zodiac Sea Wolf watch came in (see picure here: http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2673236726
) there is an interesting sentence written in red that has exactly 17 letters: "With
Could it be that simple?
Well, maybe not that simple. But it's something to consider.
Note also that this moveable beZel is something that could be of significance in the Mt. Diablo Mag. North puzzle and possibly even the 5 "X" markings on the Z-sign in at the end of the Bus Bomb letter (if indeed the Z-symbol was inspired by the Zodiac watch), since the bezel rotates and a radian angle can be delineated within some marks located on the 15-minute time marker on the bevel.
|By Lapumo (Lapumo) (p51-179.as1.clm.clonmel.eircom.net - 18.104.22.168) on Saturday, November 29, 2003 - 05:31 pm:|
Interesting thought Bruce,especially in relation to the Phillips map. Curious that he should combine a movement in degrees with a sketch that appears to deal with time.The watch connection does seem strongest.