'The Root': Can you solve our cipher?

Watch 'The Root: The Birth of Big Brother' and all of 'The Root' episodes HERE

Catch up on the research from segment 1 HERE

Segment 2: William Friedman; Edgar Allan Poe; Solve the Cipher

Friedman

In this segment, Glenn explained how Yardley’s operation was shut down – but the practice of domestic spying wasn’t. By 1929 surveillance, coding and decoding messages were established as a crucial skill to have, maintain, and advance. So, Secretary of State Stimson may have put an end to Yardley’s operation, but Yardley’s files were not destroyed. Instead, they were sent to the desk of one of the most brilliant minds in cryptology – William Friedman.

 

Edgar Allan Poe

Friedman was a pioneer in the field, and as you’ll see in the next segment, inspired the creation of the only known cipher machine to never be cracked. But how Friedman got his start in the field is an incredible tale all its own. Friedman was a big fan of Edgar Allan Poe, and Poe was a big fan of ciphers. In fact, he once bragged that he could decipher anything. Friedman loved deciphering messages, and one of his favorite Poe stories was ‘The Gold Bug’.

The code in Poe’s ‘Gold Bug’ is an example of a substitution cipher, which is a cipher where the letters of the alphabet are replaced by other letters or symbols. Calculating all possible combinations of 26 letters of the alphabet and 26 symbols the possible results are in the trillions. For hundreds of years, substitution ciphers were considered impossible to crack.

The secret to solving substitution ciphers is by analyzing syntax. Languages follow a set of rules. There’s only so many ways you can combine letters so that they form intelligible words. Even though the cipher uses symbols it still has to follow those rules. Pretty soon by looking for these rules we can start to see patterns within the message. All that’s needed is a key.

The foundation for all codebreaking is letter frequency analysis. As Poe's Legrand pointed out in the story, in English the most commonly used letter is the letter E. Locating the most frequently used vowels and consonants is the key to letter frequency analysis. Legrand argued that the letters of the alphabet ordered from most frequent to less frequent looked like this:

e a o i d h n r s t u y c f g l m w b k p q x z

Read the entire Edgar Allan Poe’s the Gold Bug – it’s a great story.

Here’s the section that contains the cipher and the explanation on how to decrypt it (this is the portion Glenn animated on the program):

Here Legrand submitted the parchment to my inspection. The following characters were rudely traced between the death's-head and the goat:

 

53‡‡†305))6*;4826)4‡.)4‡);806*;48†8 ¶60))85;1‡(;:‡*8†83(88)5*†;46(;88*96

*?;8)*‡(;485);5*†2:*‡(;4956*2(5*—4)8 ¶8*;4069285);)6†8)4‡‡;1(‡9;48081;8:8‡

1;48†85;4)485†528806*81(‡9;48;(88;4 (‡?34;48)4‡;161;:188;‡?;

"But," said I, returning him the slip, "I am as much in the dark as ever. Were all the jewels of Golconda awaiting me upon my solution of this enigma, I am quite sure that I should be unable to earn them."

"And yet," said Legrand, "the solution is by no means so difficult as you might be led to imagine from the first hasty inspection of the characters. These characters, as any one might readily guess, form a cipher — that is to say, they convey a meaning; but then, from what is known of Kidd, I could not suppose him capable of constructing any of the more abstruse cryptographs. I made up my mind, at once, that this was of a simple species — such, however, as would appear, to the crude intellect of the sailor, absolutely insoluble without the key."

"And you really solved it?"

"Readily; I have solved others of an abstruseness ten thousand times greater. Circumstances, and a certain bias of mind, have led me to take interest in such riddles, and it may well be doubted whether human ingenuity can construct an enigma of the kind which human ingenuity may not, by proper application, resolve. In fact, having once established connected and legible characters, I scarcely gave a thought to the mere difficulty of developing their import.

"In the present case — indeed in all cases of secret writing — the first question regards the language of the cipher; for the principles of solution, so far, especially, as the more simple ciphers are concerned, depend upon, and are varied by, the genius of the particular idiom. In general, there is no alternative but experiment (directed by probabilities) of every tongue known to him who attempts the solution, until the true one is attained. But, with the cipher now before us, all difficulty was removed by the signature. The pun upon the word 'Kidd' is appreciable in no other language than the English. But for this consideration I should have begun my attempts with the Spanish and French, as the tongues in which a secret of this kind would most naturally have been written by a pirate of the Spanish main. As it was, I assumed the cryptograph to be English.

"You observe there are no divisions between the words. Had there been divisions, the task would have been comparatively easy. In such case I should have commenced with a collation and analysis of the shorter words, and, had a word of a single letter occurred, as is most likely, (a or I, for example,) I should have considered this solution as assured. But, there being no division, my first step was to ascertain the predominant letters, as well as the least frequent. Counting all, I constructed a table, thus:

Of the character 8 there are 33.

; " 26.

4 " 19.

‡ ) " 16.

* " 13.

5 " 12.

6 " 11.

†1 " 8.

0 " 6.

9 2 " 5.

: 3 " 4.

? " 3.

¶ " 2. —. " 1.

"Now, in English, the letter which most frequently occurs is e. Afterwards, the succession runs thus: a o i d h n r s t u y c f g l m w b k p q x z. E predominates so remarkably that an individual sentence of any length is rarely seen, in which it is not the prevailing character.

"Here, then, we have, in the very beginning, the groundwork for something more than a mere guess. The general use which may be made of the table is obvious — but, in this particular cipher, we shall only very partially require its aid. As our predominant character is 8, we will commence by assuming it as the e of the natural alphabet. To verify the supposition, let us observe if the 8 be seen often in couples — for e is doubled with great frequency in English — in such words, for example, as 'meet,' 'fleet,' 'speed,' 'seen,' 'been,' 'agree,' &c. In the present instance we see it doubled no less than five times, although the cryptograph is brief.

"Let us assume 8, then, as e. Now, of all words in the language, 'the' is most usual; let us see, therefore, whether there are not repetitions of any three characters, in the same order of collocation, the last of them being 8. If we discover repetitions of such letters, so arranged, they will most probably represent the word 'the.' Upon inspection, we find no less than seven such arrangements, the characters being ;48. We may, therefore, assume that ; represents t, 4 represents h, and 8 represents e — the last being now well confirmed. Thus a great step has been taken.

"But, having established a single word, we are enabled to establish a vastly important point; that is to say, several commencements and terminations of other words. Let us refer, for example, to the last instance, but one, in which the combination ;48 occurs — not far from the end of the cipher. We know that the ; immediately ensuing is the commencement of a word, and, of the six characters succeeding this 'the,' we are cognizant of no less than five. Let us set these characters down, thus, by the letters we know them to represent, leaving a space for the one unknown —

t eeth.

"Here we are enabled, at once, to discard the 'th' as forming no portion of the word commencing with the first t; since, by experiment of the entire alphabet for a letter adapted to the vacancy, we perceive that no word can be formed of which this th can be a part. We are thus narrowed into 

 

t ee,

and, going through the alphabet, if necessary, as before, we arrive at the word 'tree,' as the sole possible reading. We thus gain another letter, r, represented by (, with the words 'the tree' in juxtaposition.

; "Looking beyond these words, for a short distance, we again see the combination ;48, and employ it by way of termination to what immediately precedes. We have thus this arrangement:

the tree ;4(‡?34 the,

or, substituting the natural letters, where known, it reads thus:

the tree thr‡?3h the.

 

"Now, if, in place of the unknown characters, we leave blank spaces, or substitute dots, we read thus:

the tree thr...h the,

when the word 'through' makes itself evident at once. But this discovery gives us three new letters, o, u and g, represented by ‡ ? and 3.

 

"Looking, now, narrowly, through the cipher for combinations of known characters, we find, not very far from the beginning, this arrangement,

83(88, or egree,

 

which, plainly, is the conclusion of the word 'degree,' and gives us another letter, d, represented by †.

 

; "Four letters beyond the word 'degree,' we perceive the combination

 

­­;46(;88*.

; "Translating the known characters, and representing the unknown by dots, as before, we read thus:

 

th.rtee.

 

an arrangement immediately suggestive of the word 'thirteen,' and again furnishing us with two new characters, i and n, represented by 6 and *.

 

; "Referring, now, to the beginning of the cryptograph, we find the combination,

53‡‡†.

"Translating, as before, we obtain

. good,

which assures us that the first letter is A, and that the first two words are 'A good.'

"To avoid confusion, it is now time that we arrange our key, as far as discovered, in a tabular form. It will stand thus:

5 represents a

† " d

8 " e

3 " g

4 " h

6 " i

* " n

‡ " o

( " r

; " t

"We have, therefore, no less than ten of the most important letters represented, and it will be unnecessary to proceed with the details of the solution. I have said enough to convince you that ciphers of this nature are readily soluble, and to give you some insight into the rationale of their development. But be assured that the specimen before us appertains to the very simplest species of cryptograph. It now only remains to give you the full translation of the characters upon the parchment, as unriddled. Here it is:

'A good glass in the bishop's hostel in the devil's seat forty-one degrees and thirteen minutes northeast and by north main branch seventh limb east side shoot from the left eye of the death's-head a bee line from the tree through the shot fifty feet out.' "

And that’s how you solve a cipher. Easy, right? We thought we’d give you a little challenge, to see how you stack up against the brilliant cipher minds of history. Using the Gold Bug cipher can you decrypt our code?

 

 

Solve the Cipher

 

1(68†95* ]5) 6*).6(8† 2: 8†35( 5005* .‡8 5*† 28-598 5 95);8( -(:.;5*50:); ;48 38(95* 8*6395 95-46*8 ]5) †8-6.48(8† 2?; 1(68†95*) *8¶8( ]5) 6; ]5) -5008† )63525 ;‡ ;46) †5: *‡ ‡*8 8¶8( )?--8))1?00: †8-(:.;8† ;48 598(6-5* )63525 95-46*8

 

Write out the cipher on a piece of paper leaving enough space in between each line. You’ll need the space to write your solutions underneath. (example below)

1(68†95* ]5) 6*).6(8† 2: 8†35( 5005* .‡8 5*† 28-598 5 95);8( -(:.;5*50:); ;48 38(95* 8*6395

95-46*8 ]5) †8-6.48(8† 2?; 1(68†95*) *8¶8( ]5) 6; ]5) -5008† )63525 ;‡ ;46) †5: *‡ ‡*8 8¶8(

 

)?--8))1?00: †8-(:.;8† ;48 598(6-5* )63525 95-46*8

 

Count out the times each symbol/number is used in the cipher and write the results on a table ordered most to least frequently used. You’ll start to see that one of the symbols/numbers clearly stands out from the rest. This is your first and biggest clue and is most likely the most commonly used letter in the English language...E. Write in that letter next to each symbol in the cipher. (example below)

 

character 8 = 10 times

character ; = 5 times

character 4 = 2 times

 

Now we have, as Legrand said, “the groundwork” for more. Look for recurring combinations of symbols to try and guess words. Legrand identified the word THE as the most commonly used word. After that the most frequently used words in order are: OF, AND, TO, IN. Once you’ve spotted all the THE’s then you’ve discovered 2 more letters. Write them down on your table accordingly. Each new letter you decipher leads to more fragments of the message you’ll uncover. Eventually you’ll get the entire message decoded.

 

As technology progressed machines and advanced mathematics made these ciphers more and more complex. Amazingly the same principles that Poe’s Legrand used to break the Gold Bug cipher still apply today.

Good luck! If you successfully solve it, email the answer to goldbug@theblaze.com and the first responders will get a message from Glenn!

Note: This article originally said to send answers to goldbug@glennbeck.com. Please re-send to goldbug@theblaze.com

Editor's note: This article was originally published on TheBlaze.com.

Critical theory once stood out as the absurd progressive notion that it is. Now, its maxims are becoming an integral part of ordinary political discourse. The more you repeat a lie, the more you will believe it, and this is the very dangerous place in which we find ourselves today.

Take this critical theory maxim as an example: If we desire justice, we must sometimes champion what may appear superficially as injustice. It's a necessary evil, if you will, the necessity of “controlled injustice.”

By using truth through fabrication and controlled injustice for justice, we’ll save the republic. We’ll be acting in a noble way.

This definition of justice is defined by the “oppressed,” not the “oppressor.” It is the greatest happiness for the greatest number. To achieve this justice, however, we need to endorse acts on occasion that, while seemingly unjust, serve a higher purpose. It will ensure the stability and the unity of our republic, and this may manifest in ways that seem contradictory to our values. But these are the necessary shadows to cast light on “true justice.”

And isn’t that what we are all after, anyway?

Here’s another critical theory maxim: Sometimes we find the truth through fabrication. Our pursuit of truth sometimes requires a strategic use of falsehoods. The truth is a construct that has been shaped and tailored to promote the well-being of the collective.

We sometimes need to accept and propagate lies designed by "the system” — not the old system, but the system that we’re now using to replace the old to get more justice through injustice and more truth through fabrication.

We’re engaging in a higher form of honesty. When we fabricate, it’s for the right reason. We are reaching up to the heavens fighting for a higher sort of honesty. To fortify the truth, we occasionally must weave a tapestry of lies. Each thread, essential for the greater picture, will ultimately define our understanding and ensure our unity under this infallible wisdom.

The election is coming up. Does this maxim sound familiar? Many think it is imperative that we secure our republic through election control to maintain our republic. Sometimes, we might need to take actions that by traditional standards might be questionable.

The act of securing elections requires cheating. It's not mere deception. It is a noble act of safeguarding our way of life. We're on the verge of losing this democracy, and without deception, we will lose it.

To ensure it doesn't fall into the hands of those we know will destroy it, we may have to make a few fabrications. We're fabricating stories to be able to control or secure the republic through our elections. By using truth through fabrication and controlled injustice for justice, we'll save the republic. Therefore, we'll be acting in a noble way. Stealing an election from those who wish to harm our society is truly an act of valor and an essential measure to protect our values and ensure the continuation of our just society.

If we desire justice, we must sometimes champion what may appear superficially as injustice.

I know it's a paradox of honor through dishonor. But in this context, by embracing the dishonor, we achieve the highest form of honor, ensuring the stability and the continuation of our great republic.

Let this be heard, far and wide, as a great call to patriotic action. As we advance, let each of us, citizens of this great and honorable republic, consider these principles. Not as abstract or paradoxical but as practical guides to daily life. Embrace the necessity of controlled injustice, the utility of lies, the duty to secure our electoral process, and the honor and apparent dishonor. These are not merely strategies for survival. They are prerequisites for our prosperity.

We all have to remember that justice is what our leaders define, that truth is what our party tells us. Our republic stands strong on the values of injustice for justice, honor through dishonor, and the fabrication of truths. To deviate from this path is to jeopardize the very fabric of our society. Strength through unity; unity through strength.

We've heard this nonsense for so long. But now, this nonsense is becoming an instituted reality, and we are entering perilous times. Don't be fooled by the narratives you will hear during the march to November. Never let someone convince you that the ends justify the means, that a little bit of injustice is needed to achieve a broader, collective vision of justice, that truth sometimes requires fabricated lies and narratives. If we do, justice will cease to be justice, truth will cease to be truth, and our republic will be lost.

Top 5 MOST EVIL taxes the government extorts from you

David McNew / Staff | Getty Images
"In this world nothing is certain but death and taxes." -Ben Franklin

The injustice of taxation has been a core issue for Americans since the very beginning of our country, and it's a problem we have yet to resolve. This belief was recently reignited in many Americans earlier this month on tax day when the numbers were crunched and it was discovered that the government was somehow owed even more hard-earned money. As Glenn recently discussed on his show, it's getting to be impossible for most Americans to afford to live comfortably, inflation is rising, and our politicians keep getting richer.

The taxpayer's burden is heavier than ever.

The government is not above some real low blows either. While taxes are a necessary evil, some taxes stretch the definition of "necessary" and emphasize the "evil." Here are the top five most despicable taxes that are designed to line the IRS coffers at your expense:

Income Tax

Joe Raedle / Staff | Getty Images

"It would be a hard government that should tax its people one-tenth part of their income." -Ben Franklin

On February 24th, 2024 we hit a very unfortunate milestone, the 101st anniversary of the 16th Amendment, which authorized federal income tax. Where does the government get the right to steal directly out of your paycheck?

Death Taxes

Dan Mullan / Staff | Getty Images

"Now my advice for those who die, Declare the pennies on your eyes" -George Harrison

Not even in death can you escape the cold pursuit of the tax collector. It's not good enough that you have to pay taxes on everything you buy and every penny you make your entire life. Now the feds want a nice slice, based on the entire value of your estate, that can be as much as 40 percent. Then the state government gets to stick their slimy fingers all over whatever remains before your family is left with the crumbs. It's practically grave-robbery.

Payroll

Bloomberg / Contributor | Getty Images

"The power to tax is the power to destroy." -John Marshall

What's that? The nice chunk of your paycheck the government nabs before you can even get it to the bank wasn't enough? What if the government taxed your employer just for paying you? In essence, you make less than what your agreed pay rate is and it costs your employer more! Absolutely abominable.

Social Security

VALERIE MACON / Contributor | Getty Images

"We don't have a trillion-dollar debt because we haven't taxed enough; we have a trillion-dollar debt because we spend too much." -Ronald Reagan

Everyone knows the collapse of Social Security is imminent. It has limped along for years, only sustained by a torrent of tax dollars and the desperate actions of politicians. For decades, people have unwillingly forked over money into the system they will never see again.

FICA

Kevin Dietsch / Staff | Getty Images

"What at first was plunder assumed the softer name of revenue." -Thomas Paine

FICA is the payroll equivalent of Social Security. Your employer has to match however much you pay. It means it costs your employer even more to pay you—again, you'll NEVER see that money. At this point, are you even working for yourself, or are you just here to generate money for the government to frivolously throw away?

5 DISTURBING ways World War III will be different from previous wars

Oleg Nikishin / Stringer | Getty Images

Has World War III begun?

Over the weekend, Iran launched an unprecedented attack against Israel involving over 300 missiles and drones. This marked the first direct attack on Israel originating from Iranian territory. Fortunately, according to an Israel Defense Forces spokesperson Rear Admiral Daniel Hagari, 99 percent of missiles and drones were successfully neutralized by Israeli defense systems. Iran claimed that the operation against Israel had concluded and that no further offensive was planned, although the possibility of another attack is still present.

This has left many people, including Glenn, wondering the same thing: did we just witness the start of World War III?

Glenn recently had a World War II Air Force Veteran as a guest on his TV special, who told stories of the horrors he and his brothers-in-arms faced in the skies over war-torn Europe. This was a timely reminder of the terrors of war and a warning that our future, if it leads to another world war, is a dark one.

But, if Glenn's coverage of the Iranian attack revealed one thing, it's that World War III will look nothing like the world wars of the twentieth century. Long gone are the days of John "Lucky" Luckadoo and his "Bloody Hundredth" bravely flying their B-17s into battle. Over the weekend, we saw hundreds of autonomous drones and missiles clashing with extreme speed and precision over several different fronts (including space) simultaneously. This ain't your grandfather's war.

From EMP strikes to cyber attacks, here are FIVE ways the face of war has changed:

EMP attacks

New York Daily News Archive / Contributor | Getty Images

The entire modern world, on every level, is completely dependent on electricity. From your home refrigerator to international trade, the world would come to a grinding halt without power. And as Glenn has pointed out, it wouldn't even be that hard to pull off. All it would take is 3 strategically placed, high-altitude nuclear detonations and the entire continental U.S. would be without power for months if not years. This would cause mass panic across the country, which would be devastating enough on its own, but the chaos could be a perfect opportunity for a U.S. land invasion.

Nuclear strikes

Galerie Bilderwelt / Contributor | Getty Images

Nuclear war is nothing new. Many of us grew up during the Cold War, built fallout shelters, and learned to duck and cover. But times have changed. The Berlin Wall fell and so did the preparedness of the average American to weather a nuclear attack. As technology has advanced, more of our adversaries than ever have U.S. cities within their crosshairs, and as Glenn has pointed out, these adversaries are not exactly shy about that fact. Unfortunately, the possibility of an atomic apocalypse is as real as ever.

Immigration warfare

Nick Ut / Contributor | Getty Images

The strategy of strangling an opposing nation's economy to gain the upper hand is a wartime tactic as old as time. That's why the Border Crisis is so alarming. What better way to damage an opponent's economy than by overburdening it with millions of undocumented immigrants? As Glenn has covered, these immigrants are not making the trek unaided. There is a wide selection of organizations that facilitate this growing disaster. These organizations are receiving backing from around the globe, such as the WEF, the UN, and U.S. Democrats! Americans are already feeling the effects of the border crisis. Imagine how this tactic could be exploited in war.

Cyber shutdowns

Bill Hinton / Contributor | Getty Images

Cyber attacks will be a major tactic in future wars. We've already experienced relatively minor cyber strikes from Russia, China, and North Korea, and it is a very real possibility that one of our adversaries inflicts a larger attack with devastating consequences on the United States. In fact, the WEF has already predicted a "catastrophic" cyber attack is imminent, and Glenn suggests that it is time to start preparing ourselves. A cyber attack could be every bit as devastating as an EMP, and in a world run by computers, nothing is safe.

Biological assault

WPA Pool / Pool | Getty Images

Don't trust the "experts." That was the takeaway many of us had from the pandemic, but something less talked about is the revelation that China has manufactured viruses that are capable of spreading across the globe. We now know that the lab leak hypothesis is true and that the Wuhan lab manufactured the virus that infected the entire world. That was only ONE virus from ONE lab. Imagine what else the enemies of America might be cooking up.

The government is WAGING WAR against these 3 basic needs

NICHOLAS KAMM / Contributor | Getty Images

The government has launched a full-on assault against our basic needs, and people are starting to take notice.

As long-time followers of Glenn are probably aware, our right to food, water, and power is under siege. The government no longer cares about our general welfare. Instead, our money lines the pockets of our politicians, funds overseas wars, or goes towards some woke-ESG-climate-Great Reset bullcrap. And when they do care, it's not in a way that benefits the American people.

From cracking down on meat production to blocking affordable power, this is how the government is attacking your basic needs:

Food

Fiona Goodall / Stringer | Getty Images

Glenn had Rep. Thomas Massie on his show where he sounded the alarm about the attack on our food. The government has been waging war against our food since the thirties when Congress passed the Agricultural Adjustment Act of 1938. They started by setting strict limits on how many crops a farmer could grow in a season and punishing anyone who grew more—even if it was intended for personal use, not for sale on the market. This sort of autocratic behavior has continued into the modern day and has only gotten more draconian. Today, not only are you forced to buy meat that a USDA-approved facility has processed, but the elites want meat in general off the menu. Cow farts are too dangerous to the environment, so the WEF wants you to eat climate-friendly alternatives—like bugs.

Water

ALESSANDRO RAMPAZZO / Contributor | Getty Images

As Glenn discussed during a recent Glenn TV special, the government has been encroaching on our water for years. It all started when Congress passed the Clean Water Act in 1972, which gave the government the ability to regulate large bodies of water. As the name suggests, the act was primarily intended to keep large waterways clear of pollution, but over time it has allowed the feds to assume more and more control over the country's water supply. Most recently, the Biden administration attempted to expand the reach of the Clean Water Act to include even more water and was only stopped by the Supreme Court.

Electricity

David McNew / Staff | Getty Images

Dependable, affordable electricity has been a staple of American life for decades, but that might all be coming to an end. Glenn has discussed recent actions taken by Biden, like orders to halt new oil and gas production and efforts to switch to less efficient sources of power, like wind or solar, the price of electricity is only going to go up. This, alongside his efforts to limit air conditioning and ban gas stoves, it almost seems Biden is attempting to send us back to the Stone Age.