Zodiac Pattern Drawer

Computer science professor Ryan Garlick at the University of North Texas has been enlisting his students to try out different ways to solve Zodiac’s 340-character cryptogram. Many people believe that the 340 needs to be re-arranged before it can be cracked. So, this year, Dr. Garlick’s students developed the “Zodiac Pattern Drawer”, a web-based tool that lets you re-arrange the 340 and download the result.


Screenshot of Zodiac Pattern Drawer

Basically, you start with the original cryptogram, and click around in it to draw a different path through its symbols. Your rearranged symbols appear on the right, and when you are done, you can download a text file that contains a numerical representation of the new cryptogram. You can then take that file and feed it to an automatic solver such as zkdecrypto or AZdecrypt.

To get started, read the user guide and watch the tutorial video.

Hopefully someone can find a rearrangement that leads to a solution!

Speaking at the 2015 Cryptologic History Symposium

The Cryptologic History Symposium sponsored by the NSA’s Center for Cryptologic History is coming up this fall, and they have accepted a paper proposal I recently submitted. The symposium will be on October 22nd and 23rd this year in Laurel, MD, and covers many fascinating topics involving the history of cryptology. I attended the 2013 symposium and it was extremely interesting – be sure to read my article about it to get a sense of what’s covered.

For this year’s symposium, I will be giving a presentation in the “Ciphers and Crime” panel called “The Zodiac Ciphers: What do we know and when do we stop trying to solve them?” The talk will be a quick overview of the case, details on the ciphers, many observations about their contents, and results of my experiments designed to rule out different ways Zodiac may have constructed the unsolved 340-character cryptogram. It’s going to be very challenging to pack so much info into the 25 minutes they have allotted to me. Here is the abstract for my paper:

Over 45 years ago, the serial killer known as Zodiac taunted the San Francisco Bay area with cryptic letters that were widely published in newspapers. One letter contained a cryptogram (Z408) which was quickly solved by a high school teacher. A second cryptogram (Z340) was sent a few months later. It appeared similar in construction to the first, but remains unsolved to this day. The killer later mailed two additional smaller cryptograms (Z13 and Z32) which also remain unsolved. Here we summarize many facts and observations known about Zodiac’s cryptograms. Many hypotheses on the construction of Z340 have been explored but no solution has been found. Systematic exclusion of hypotheses is difficult and tedious. We attempt to address this with multi-objective optimization programming to generate cryptograms simulated under various construction hypotheses. The simulated cryptograms are artificially evolved to maximize similarities to the real Z340. If, under a given hypothesis, we can solve the numerous simulated cryptograms, and Z340 was constructed using the same hypothesis, then the solution to Z340 should be easily found. If it is not, then this failure provides strong evidence against a specific hypothesis. Thus hypotheses can be systematically excluded.

There is more information about the conference at this link. The proceedings may seem dry and academic, but if you have any interest at all in the history of codemaking and codebreaking, I guarantee you will be intrigued by the range of topics covered at these symposiums.

Hope to see you there! And thanks to Klaus Schmeh for encouraging me to submit a presentation.

Did a chess grandmaster solve the 340?

The World Chess Federation in Las Vegas, NV is involved in a dispute over trademark infringement. The web site for the World Chess Federation has a profile of its founder Stan Vaughan which includes this claim:

Grand Master Stan’s expertise as a cryptanalyst led him being noted for having solved two of the most important previously unsolved ciphers in the world: The Shugborough Hall Monument cipher for which he had received an award from the Reform Club, and the Zodiac Serial Killer 340 character cipher. Stan was also a National Trivial Pursuit Champion of 1986.

I cannot find any references that mention his solution. Does anyone know anything about it? I am attempting to contact Mr. Vaughan to see if he will give more information about his solution.

How to know that you haven’t solved the Zodiac-340 cipher

Do you think you’ve solved the Zodiac 340 cipher? University of North Texas professor Ryan Garlick has written a handy guide that you should read. Once featured on the National Geographic documentary “Code Breakers“, Dr. Garlick has studied the Zodiac ciphers for many years, and has even recruited his students to try to solve them. He knows how to spot bad solutions, and his guide shows you how you can easily spot them, too. Bad solutions usually have common symptoms, such as symbols representing multiple letters, liberal use of anagramming, gibberish that needs to be highly interpreted, frequent changing of the cipher keys, and the use of fake patterns such as numerology. To his guide I would add my litmus test: If your approach can generate many different and equally compelling plaintext messages, then you can’t prove your approach is the one used by Zodiac to encrypt his message. The best example is the known solution for the 408-character cipher. There is only one overall solution that can be generated with that method, and it results in a coherent message requiring no elaborate manipulations of the key. You could quibble over some misspellings and mistakes, but they do not result in a brand new message that it totally different from the known solution.

Kevin Fagan recently wrote that many theories about the Zodiac Killer case are still being made, despite the case being 45 years old. If you have cracked the cipher, stand apart from all the bad ideas by making sure your solution does not show the problems mentioned in Garlick’s guide. Then maybe you are on the right track. Good luck!

The Most Pattern-Seeking Animal of All

Much has already been written about the dubious content of the recently published book The Most Dangerous Animal of All: Searching for My Father . . . and Finding the Zodiac Killer by Gary L. Stewart and Susan Mustafa. It joins a crowded pantheon of weakly supported books, and yet went on to make a profitable appearance on the New York Times bestseller list for non-fiction eBooks.

Michael Butterfield does a good job of pointing out the major problems with the evidence presented in Stewart’s book. There is also a lengthy thread on Mike Morford’s forum, and many posts on Tom Voigt’s forum. You can look at Stewart’s evidence and judge for yourself.

But here I will focus on the the book’s claims about the ciphers. The authors write that Stewart’s sleazy father, Earl Van Best Jr., was the Zodiac Killer, and his name appears in three of the killer’s cryptograms. The authors suggest that this is proof that their suspect is indeed the Zodiac killer.

Let’s look at how they found his name in the Zodiac’s 340-symbol cryptogram:

Using the kanji style of writing he had learned as a child in Japan, [Earl Van Best Jr.] began on the right side of the page, arranging letters and symbols in vertical columns. Instead of a coded message, he included his full name, written backwards.

[New York literary agent B. G. Dilworth] pulled up some images of the ciphers on his computer and at random began studying the 340 cipher, looking for my father’s name. He began by looking for the name Best.

Working his way from right to left backwards across the cipher, he found the name, Earl Van Best Junior. Van had put one letter of his name in each column.

Here’s what Dilworth’s discovery looks like:

Each column has one symbol marked. Here’s what they look like when you write them out from left to right:

But let’s write them from right to left instead, as Dilworth found them:

So, we’re getting closer, but it still does not look quite right. To overcome this, Dilworth allows some symbols to resemble other letters. For example, he treats the half-filled circle as the letter E. Here are the symbols with Dilworth’s interpretations:

Dilworth indulges in a bit of freedom with his approach. The problem, though, is that it causes at least hundreds of thousands of other names to appear in the ciphers. How can you know for sure that Earl Van Best Junior, a name among thousands, is the correct one? You can’t, unless you assume that you’ve already correctly identified your suspect.

Here’s a small sampling of the abundant names you can find using the same approach.

Timothy B. Greenwood

Clifton D. Pritchett

Carl B. Powell Junior

Earl Vasquez Junior

In fact, using Dilworth’s method, you can find many other similar Earls, such as: Earl Van Cook Junior, Earl Van Bell Junior, Earl Van Diaz Junior, Earl Van Cole Junior, Earl Van West Junior, Earl Leo Best Junior, Earl Bob Best Junior, Earl W Powell Junior, Earl B Little Junior, Earl T Howell Junior, Earl Clayton Junior, Earl Clifton Junior, Earl Wendell Junior, Earl B Patton Junior, Earl C Abbott Junior, Earl L O’Neill Junior , Earl a Osborn Junior, Earl O Hayden Junior, Earl C Albert Junior, Earl V Madden Junior, Earl Tolbert Junior, Earl F Bowden Junior, Earl Colbert Junior, Earl Boswell Junior , Earl Conklin Junior, and on and on and on. They are all appearing due to coincidence. Earl Van Best Junior is appearing due to the same kind of coincidence.

The book says:

To assure himself this was not a coincidence, B. G. used the same method to try to find his own name. It wasn’t there

He must not have looked hard enough, because it is there:

B.G. Dilworth

“Dilworth” even appears in the 408!

Gary Stewart himself appears

Gary Stewart’s full name appears in the decoded 408

Even his co-author Susan Mustafa appears in the 408

Dilworth also says:

He then looked … for more common names like Jane Brown and Mary Smith. He couldn’t find any first and last names in the same sequence

Once again, he didn’t look hard enough. Jane Brown can be found if you apply the method from top to bottom, and other common names are easily found:

Jane Brown

Betty Scott

Dorothy Collins

You can try it for yourself with this search gadget. You can also look at the 170,000 names I’ve found so far here (male names) and here (female names).

The book also says:

Even though the cipher had been decoded, they couldn’t take the next step of deciphering the killer’s name, because they didn’t know what name to look for.

Unfortunately, what this really means is: If you start with a name ahead of time, you can force it to appear within the cryptograms. This is how so many unreliable solutions are conjured from thin air. We see it repeatedly, and the pattern is usually this: The solver tries to generate a specific name, and eventually figures out a technique to make it appear. But the technique usually generates many other names. Since the solver has a strong desire to promote their suspect, all the other names are conveniently ignored.

You still need to prove that your solution isn’t just appearing by chance, like a face in the clouds.

Now let’s look at the authors’ claims about the 408 cipher:

I found a version on the Internet where the decoded message had been typed above the Zodiac’s cipher. I approached the three sections of the cipher as if they were a seek-a-word puzzle, looking at a particular letter and then looking vertically, diagonally, and across for my father’s name.

I saw it right away, plain as day: EV Best Jr.

Here’s the 408 with the decoded message printed above the cipher:

And here’s where he found E.V. Best Jr:

Notice how the name is permitted to flow in multiple directions, and can skip a symbol. As expected, that name is appearing purely by chance. Many other names can be found by chance as well:

Stewart

A.T. West Jr.

H.T. King Sr.

N.L. Peck Sr.

William

Milton

Wanda

Will Blair

Will Bean

Theo Nash

Lee Allen (Arthur Leigh Allen?)

Ted O’Dell

Ned Williams

Rob Forrest

Theodore (Kaczynski?)

Dan Eilliot

(Richard) Gaikowski

(Fred) Manalli

F(red) Manalli

Groucho

Gilligan

Again, there’s no way to accept “E.V.Best Jr” as a correct interpretation unless you already accept Stewart and Mustafa’s story.

Lastly, Stewart attempts to connect their story with Zodiac’s 13-letter cryptogram:

My father then included a new cipher with thirteen characters, including letters and symbols — the exact number of letters in Earl Van Best Jr.

The only connection there is that the length of “Earl Van Best Jr” is the same length as the 13-letter cryptogram. This is an extremely weak connection, since there are millions of names that are thirteen letters long. And the authors don’t bother to explain what any of the symbols mean!

I don’t doubt that Stewart’s father was a bad man and committed many terrible acts. But Stewart and Mustafa have tried to convince us that simple coincidences in the ciphers are proof Van Best was the Zodiac Killer. Stewart has made many rounds in the media to promote his book. His efforts were very successful – his “non-fiction” book sold many copies. But both the media and his publisher remain agnostic over the truth of his claims, sadly reinforcing the profit cycle of folklore and misinformation.

My name is… Manto Mokhenea?

Deborah Silva unearthed these articles from May 1970 issues of the Oxnard Press Courier:

A woman claimed to have found the name “Manto Mokhenea” in the Zodiac’s unsolved “My name is” cipher.

The name doesn’t quite fit into the cipher (if you assume it is a substitution cipher like the 408). If you make an adjustment, such as “Monto” instead of “Manto”, then the letter counts are correct, but you have to shuffle the letters to make them fit into the cipher text. As we know, this approach is not useful, since it generates millions of possibilities that you can’t narrow down.

Still, I wonder where she got the name “Manto Mokhenea”. It looks more Hawaiian than Russian to me!

Read Gareth Penn’s “Times 17” Online


(Part 1 | Part 2 | Part 3 | Part 4 | Part 5)

A generous Zodiac researcher loaned me a copy of Gareth Penn’s hard-to-find book Times 17: The Amazing Story of the Zodiac Murders in California and Massachusetts, 1966-1981. Gareth Penn is one of the most prominent and prolific people among the many who have inserted themselves into the folklore surrounding the Zodiac case.


Gareth Penn (Credit: Mike Martin)

In 1987, Penn self-published Times 17, a collection of his sprawling essays, filled with well-written but delusional speculations connecting Berkeley professor Michael O’Hare to the Zodiac killings. Repeatedly dismissed by authorities, Penn’s claims span almost 400 pages. The book is filled with elaborate mathematical ideas which superficially appear rational, but fall apart quickly when examined. Penn’s most abundant trick is to use math to simultaneously generate and disguise random coincidences. First, he sets up basic systems of mathematical operations that create new information from the Zodiac’s correspondences and other facts surrounding the case. Then he plucks out the interesting bits of new information generated by his tricks, and ignores all the other uninteresting coincidences. This confirmation bias approach is shared by many similarly misguided amateur sleuths and codebreakers. Penn’s complicated mathematical procedures create a barrier for most readers, making his claims tedious to analyze and challenge. For an example, see my previous article about Penn’s letters to the popular Scientific American writer Martin Gardner. There you can see why Penn’s “binary Morse” system quickly falls apart: Morse code has a hell of lot of different interpretations when you let the codes run together.

Times 17 also features Penn’s “radian theory“, in which two of Zodiac’s killings form an angle of approximately one radian with Mount Diablo.


Map code and clues in Zodiac’s correspondences


Penn’s radian observation

It’s arguable whether this is by design by Zodiac. At the least, it’s an interesting observation. But throughout Times 17, Penn takes the idea to ridiculous extremes, connecting his mathematical games to angles formed by key words and elements of Zodiac’s correspondences. Penn spreads the interesting observation thinly across a great deal of poor reasoning.


Example of Penn’s application of pseudo-mathematics and angles to Zodiac’s letters

Penn’s bizarre behavior led some to think he might be the Zodiac Killer himself. And like Zodiac, Penn even has his own copycat. Former postal carrier Raymond Grant also self-published his own book filled with “proof” of Zodiac’s identity. His book is filled with many of the same mathematical coincidence generators employed by Penn. For many years, Grant has been arguing that Penn was part of a larger team which included Michael O’Hare, O’Hare’s mother, and Penn’s father. Grant claims he discovered and disrupted the catastrophic “Terminus Event“, the culmination of the group’s “Zodiac Project”. On web sites and online forums, Grant repeatedly tried to share his theories, which were met with strong criticisms. This led to a pattern of Grant authoring many lengthy responses and rebukes, only to be followed by their removal because of his frustration with other Zodiac researchers.


Grant describes discovering the “Terminus Event”

Penn and Grant seem to be intelligent, capable writers. But any serious analysis of their claims will lead you to question their sanity. Or at least their motivations. The study of the irrational crimes of the Zodiac killer has branched into an entire forest of irrational behavior, fertilizing an expanding mythology, like UFO enthusiasts have done by filling in the blanks on mysterious events in the sky.

You can now read the entirety of Times 17 online, if you want to subject yourself to the experience. The book is split into five parts, and can be viewed at the following links:

Times 17 – Part 1 of 5
Times 17 – Part 2 of 5
Times 17 – Part 3 of 5
Times 17 – Part 4 of 5
Times 17 – Part 5 of 5

You can also download the entire 100 megabyte PDF here: times-17-full.pdf. (UPDATE: Thanks to zodiphile, the book is now available in epub and mobi formats for reading on mobile devices). For more of Penn’s writing, read his Ecphorizer articles, or his followup book The Second Power (read it online here). He is also reportedly working on a third book. And, you can still visit Penn online at his blog, where you will only find the occasional bizarre posting of his cryptic puzzles.

Be sure to read Michael J. Martin’s comprehensive and fascinating article which goes into a deep exploration of the Gareth Penn saga. O’Hare himself has also written an article about his experience with Penn. Michael Butterfield has also written a lot of interesting material about both Gareth Penn and Raymond Grant.

Film reviewer Mike D’Angelo once wrote, “I think the [Zodiac] movie erred in selecting author Robert Graysmith as its source and nominal protagonist. Zodiac buffs know well that the true obsessive is a fellow named Gareth Penn.” Have a look at Times 17 and see if you agree.

Swedes crack Zodiac’s map code?

Crypto enthusiast Nick Pelling recently posted this interesting article about two Swedish engineers who developed a theory about the Zodiac’s unsolved 32-character “map code”.

I agree with Nick’s assessment that the theory is ridiculously convoluted, and that it cannot possibly be correct.

The map code is the most difficult of Zodiac’s cryptograms to solve, because only three of its symbols are repeated. With so many unique symbols, numerous solutions can fit into those 32 characters. By itself, a solution to the cryptogram is impossible to validate. But maybe someone can discover some indisputable connection between the map and the code. Keep trying!

2013 Cryptologic History Symposium

I had the pleasure of attending this year’s Cryptologic History Symposium, held on Oct 17 and 18 in Laurel, Maryland. The event is organized every two years by the non-profit foundation that supports the NSA’s National Cryptologic Museum.

Crypto conference schwag

The proceedings were filled with dozens of fascinating talks by noteworthy professionals in the world of cryptology, and I met several interesting and colorful personalities. Here are some highlights.

NSA Deputy Director John C. Inglis kicked off the symposium with his keynote talk, in which he spent a lot of time defending the NSA in light of the numerous unauthorized disclosures by Edward Snowden of the NSA’s secret and controversal surveillance programs.

NSA Deputy Director John C. Inglis

York University professor Craig Bauer told a fascinating tale about famed computer scientist Alan Turing’s work on SIGSALY, a telephone voice scrambling machine developed during World War II. Created before the digital age, the machine was humongous and required carefully protected phonograph disks to store the cryptographic keys consisting of random noise.

Craig Bauer giving his talk

SIGSALY, a World War II era speech encryption machine

I spoke with Dr. Bauer and learned that he had included the Zodiac Killer in an interesting talk he gave about famous unsolved codes and ciphers. He’s also working on an upcoming book about this topic. Videos of his talk are available on Youtube:

Part 1:

Part 2:

Click this link to go directly to the Zodiac portion of his talk which starts 12 minutes and 32 seconds into the video. He gives a brief summary of the case, and touches on Gareth Penn’s radian theory and the New York Zodiac copycat killer Heriberto Seda.

Dr. Bauer talks about the Zodiac ciphers

He even gave Heriberto Seda’s cryptogram as an exercise for students of York’s cryptology course.

Can you crack it? Click the image to download the exercises, which include many other interesting ciphers.

At the conference I also met German cryptology author Klaus Schmeh, who writes an interesting German-language blog about various cryptologic mysteries, including the Zodiac ciphers. His book Nicht Zu Knacken (which I wrote about here) has a chapter devoted to the Zodiac ciphers. At the conference, Klaus gave a talk about compiling a list of 32 encrypted books. He showed some examples, ranging from obscure encrypted texts, to more well-known books such as the Voynich Manuscript and Codex Rohonci. He even brought his own hand-made reproduction of the Codex Rohonci as a prop for people to look through.

Video of Klaus’ talk (Part 1):

Video of Klaus’ talk (Part 2):

(The volume is faint, so you’ll need to crank up the volume on your speakers)

Video game developer, cryptology enthusiast and Kryptos expert Elonka Dunin gave a talk about the use of cryptology in the recreational activity of Geocaching. I was surprised to learn that many caches require solving cryptograms and other puzzles before you can learn the location of the caches. She told me that some of the puzzles remain unsolved. You can view them here. Some puzzles are even based on the German Enigma machine.

Geocache cryptogram, courtesy of “Oceana Abel” on DeviantArt.

Dr. Todd Mateer spoke about his cryptanalysis of one of the Beale ciphers. In the original document, James B. Ward’s The Beale Papers, each number in the solved cipher corresponds to a word from the Declaration of Independence. Mateer tried to reconstruct the solution based on the procedure outlined in Ward’s paper. He found that he ran in to trouble due to the numerous variations of the Declaration of Independence that were published in Ward’s day. He also found that there are mistakes in the encipherment, such as duplicate numberings in the version of the DOI in Ward’s paper. How is it that the so-called Beale cipher uses the exact same DOI variant, and the exact same encipherment mistakes, as that of Ward’s decipherment? What are the chances that Beale and Ward made precisely the same mistakes? Mateer’s conclusion is that it’s because the Beale treasure is likely to be a hoax, invented by whomever authored The Beale Papers. Nick Pelling offers the alternate view that the oddities found in the unsolved Beale ciphers reflect a change in the encipherment procedure that causes bits of an encrypted key to show through. Some experiments in this direction might help clarify his idea.

The talk with the most attention-grabbing title was Shame, Sex and Alcohol: Ciphers in the Context of Everyday Practices of Secrecy in Early Modern Times, about encrypted messages left by noteworthy Hungarian historical figures in diaries and correspondences. Here is one of the more colorful excerpts:

Their secrets live on.

The conference was very educational, provoking a thirst for more knowledge and discovery. I don’t want to miss the next one in 2015!