'The Root': Can you solve our cipher?

Watch 'The Root: The Birth of Big Brother' and all of 'The Root' episodes HERE

Catch up on the research from segment 1 HERE

Segment 2: William Friedman; Edgar Allan Poe; Solve the Cipher

Friedman

In this segment, Glenn explained how Yardley’s operation was shut down – but the practice of domestic spying wasn’t. By 1929 surveillance, coding and decoding messages were established as a crucial skill to have, maintain, and advance. So, Secretary of State Stimson may have put an end to Yardley’s operation, but Yardley’s files were not destroyed. Instead, they were sent to the desk of one of the most brilliant minds in cryptology – William Friedman.

 

Edgar Allan Poe

Friedman was a pioneer in the field, and as you’ll see in the next segment, inspired the creation of the only known cipher machine to never be cracked. But how Friedman got his start in the field is an incredible tale all its own. Friedman was a big fan of Edgar Allan Poe, and Poe was a big fan of ciphers. In fact, he once bragged that he could decipher anything. Friedman loved deciphering messages, and one of his favorite Poe stories was ‘The Gold Bug’.

The code in Poe’s ‘Gold Bug’ is an example of a substitution cipher, which is a cipher where the letters of the alphabet are replaced by other letters or symbols. Calculating all possible combinations of 26 letters of the alphabet and 26 symbols the possible results are in the trillions. For hundreds of years, substitution ciphers were considered impossible to crack.

The secret to solving substitution ciphers is by analyzing syntax. Languages follow a set of rules. There’s only so many ways you can combine letters so that they form intelligible words. Even though the cipher uses symbols it still has to follow those rules. Pretty soon by looking for these rules we can start to see patterns within the message. All that’s needed is a key.

The foundation for all codebreaking is letter frequency analysis. As Poe's Legrand pointed out in the story, in English the most commonly used letter is the letter E. Locating the most frequently used vowels and consonants is the key to letter frequency analysis. Legrand argued that the letters of the alphabet ordered from most frequent to less frequent looked like this:

e a o i d h n r s t u y c f g l m w b k p q x z

Read the entire Edgar Allan Poe’s the Gold Bug – it’s a great story.

Here’s the section that contains the cipher and the explanation on how to decrypt it (this is the portion Glenn animated on the program):

Here Legrand submitted the parchment to my inspection. The following characters were rudely traced between the death's-head and the goat:

 

53‡‡†305))6*;4826)4‡.)4‡);806*;48†8 ¶60))85;1‡(;:‡*8†83(88)5*†;46(;88*96

*?;8)*‡(;485);5*†2:*‡(;4956*2(5*—4)8 ¶8*;4069285);)6†8)4‡‡;1(‡9;48081;8:8‡

1;48†85;4)485†528806*81(‡9;48;(88;4 (‡?34;48)4‡;161;:188;‡?;

"But," said I, returning him the slip, "I am as much in the dark as ever. Were all the jewels of Golconda awaiting me upon my solution of this enigma, I am quite sure that I should be unable to earn them."

"And yet," said Legrand, "the solution is by no means so difficult as you might be led to imagine from the first hasty inspection of the characters. These characters, as any one might readily guess, form a cipher — that is to say, they convey a meaning; but then, from what is known of Kidd, I could not suppose him capable of constructing any of the more abstruse cryptographs. I made up my mind, at once, that this was of a simple species — such, however, as would appear, to the crude intellect of the sailor, absolutely insoluble without the key."

"And you really solved it?"

"Readily; I have solved others of an abstruseness ten thousand times greater. Circumstances, and a certain bias of mind, have led me to take interest in such riddles, and it may well be doubted whether human ingenuity can construct an enigma of the kind which human ingenuity may not, by proper application, resolve. In fact, having once established connected and legible characters, I scarcely gave a thought to the mere difficulty of developing their import.

"In the present case — indeed in all cases of secret writing — the first question regards the language of the cipher; for the principles of solution, so far, especially, as the more simple ciphers are concerned, depend upon, and are varied by, the genius of the particular idiom. In general, there is no alternative but experiment (directed by probabilities) of every tongue known to him who attempts the solution, until the true one is attained. But, with the cipher now before us, all difficulty was removed by the signature. The pun upon the word 'Kidd' is appreciable in no other language than the English. But for this consideration I should have begun my attempts with the Spanish and French, as the tongues in which a secret of this kind would most naturally have been written by a pirate of the Spanish main. As it was, I assumed the cryptograph to be English.

"You observe there are no divisions between the words. Had there been divisions, the task would have been comparatively easy. In such case I should have commenced with a collation and analysis of the shorter words, and, had a word of a single letter occurred, as is most likely, (a or I, for example,) I should have considered this solution as assured. But, there being no division, my first step was to ascertain the predominant letters, as well as the least frequent. Counting all, I constructed a table, thus:

Of the character 8 there are 33.

; " 26.

4 " 19.

‡ ) " 16.

* " 13.

5 " 12.

6 " 11.

†1 " 8.

0 " 6.

9 2 " 5.

: 3 " 4.

? " 3.

¶ " 2. —. " 1.

"Now, in English, the letter which most frequently occurs is e. Afterwards, the succession runs thus: a o i d h n r s t u y c f g l m w b k p q x z. E predominates so remarkably that an individual sentence of any length is rarely seen, in which it is not the prevailing character.

"Here, then, we have, in the very beginning, the groundwork for something more than a mere guess. The general use which may be made of the table is obvious — but, in this particular cipher, we shall only very partially require its aid. As our predominant character is 8, we will commence by assuming it as the e of the natural alphabet. To verify the supposition, let us observe if the 8 be seen often in couples — for e is doubled with great frequency in English — in such words, for example, as 'meet,' 'fleet,' 'speed,' 'seen,' 'been,' 'agree,' &c. In the present instance we see it doubled no less than five times, although the cryptograph is brief.

"Let us assume 8, then, as e. Now, of all words in the language, 'the' is most usual; let us see, therefore, whether there are not repetitions of any three characters, in the same order of collocation, the last of them being 8. If we discover repetitions of such letters, so arranged, they will most probably represent the word 'the.' Upon inspection, we find no less than seven such arrangements, the characters being ;48. We may, therefore, assume that ; represents t, 4 represents h, and 8 represents e — the last being now well confirmed. Thus a great step has been taken.

"But, having established a single word, we are enabled to establish a vastly important point; that is to say, several commencements and terminations of other words. Let us refer, for example, to the last instance, but one, in which the combination ;48 occurs — not far from the end of the cipher. We know that the ; immediately ensuing is the commencement of a word, and, of the six characters succeeding this 'the,' we are cognizant of no less than five. Let us set these characters down, thus, by the letters we know them to represent, leaving a space for the one unknown —

t eeth.

"Here we are enabled, at once, to discard the 'th' as forming no portion of the word commencing with the first t; since, by experiment of the entire alphabet for a letter adapted to the vacancy, we perceive that no word can be formed of which this th can be a part. We are thus narrowed into 

 

t ee,

and, going through the alphabet, if necessary, as before, we arrive at the word 'tree,' as the sole possible reading. We thus gain another letter, r, represented by (, with the words 'the tree' in juxtaposition.

; "Looking beyond these words, for a short distance, we again see the combination ;48, and employ it by way of termination to what immediately precedes. We have thus this arrangement:

the tree ;4(‡?34 the,

or, substituting the natural letters, where known, it reads thus:

the tree thr‡?3h the.

 

"Now, if, in place of the unknown characters, we leave blank spaces, or substitute dots, we read thus:

the tree thr...h the,

when the word 'through' makes itself evident at once. But this discovery gives us three new letters, o, u and g, represented by ‡ ? and 3.

 

"Looking, now, narrowly, through the cipher for combinations of known characters, we find, not very far from the beginning, this arrangement,

83(88, or egree,

 

which, plainly, is the conclusion of the word 'degree,' and gives us another letter, d, represented by †.

 

; "Four letters beyond the word 'degree,' we perceive the combination

 

­­;46(;88*.

; "Translating the known characters, and representing the unknown by dots, as before, we read thus:

 

th.rtee.

 

an arrangement immediately suggestive of the word 'thirteen,' and again furnishing us with two new characters, i and n, represented by 6 and *.

 

; "Referring, now, to the beginning of the cryptograph, we find the combination,

53‡‡†.

"Translating, as before, we obtain

. good,

which assures us that the first letter is A, and that the first two words are 'A good.'

"To avoid confusion, it is now time that we arrange our key, as far as discovered, in a tabular form. It will stand thus:

5 represents a

† " d

8 " e

3 " g

4 " h

6 " i

* " n

‡ " o

( " r

; " t

"We have, therefore, no less than ten of the most important letters represented, and it will be unnecessary to proceed with the details of the solution. I have said enough to convince you that ciphers of this nature are readily soluble, and to give you some insight into the rationale of their development. But be assured that the specimen before us appertains to the very simplest species of cryptograph. It now only remains to give you the full translation of the characters upon the parchment, as unriddled. Here it is:

'A good glass in the bishop's hostel in the devil's seat forty-one degrees and thirteen minutes northeast and by north main branch seventh limb east side shoot from the left eye of the death's-head a bee line from the tree through the shot fifty feet out.' "

And that’s how you solve a cipher. Easy, right? We thought we’d give you a little challenge, to see how you stack up against the brilliant cipher minds of history. Using the Gold Bug cipher can you decrypt our code?

 

 

Solve the Cipher

 

1(68†95* ]5) 6*).6(8† 2: 8†35( 5005* .‡8 5*† 28-598 5 95);8( -(:.;5*50:); ;48 38(95* 8*6395 95-46*8 ]5) †8-6.48(8† 2?; 1(68†95*) *8¶8( ]5) 6; ]5) -5008† )63525 ;‡ ;46) †5: *‡ ‡*8 8¶8( )?--8))1?00: †8-(:.;8† ;48 598(6-5* )63525 95-46*8

 

Write out the cipher on a piece of paper leaving enough space in between each line. You’ll need the space to write your solutions underneath. (example below)

1(68†95* ]5) 6*).6(8† 2: 8†35( 5005* .‡8 5*† 28-598 5 95);8( -(:.;5*50:); ;48 38(95* 8*6395

95-46*8 ]5) †8-6.48(8† 2?; 1(68†95*) *8¶8( ]5) 6; ]5) -5008† )63525 ;‡ ;46) †5: *‡ ‡*8 8¶8(

 

)?--8))1?00: †8-(:.;8† ;48 598(6-5* )63525 95-46*8

 

Count out the times each symbol/number is used in the cipher and write the results on a table ordered most to least frequently used. You’ll start to see that one of the symbols/numbers clearly stands out from the rest. This is your first and biggest clue and is most likely the most commonly used letter in the English language...E. Write in that letter next to each symbol in the cipher. (example below)

 

character 8 = 10 times

character ; = 5 times

character 4 = 2 times

 

Now we have, as Legrand said, “the groundwork” for more. Look for recurring combinations of symbols to try and guess words. Legrand identified the word THE as the most commonly used word. After that the most frequently used words in order are: OF, AND, TO, IN. Once you’ve spotted all the THE’s then you’ve discovered 2 more letters. Write them down on your table accordingly. Each new letter you decipher leads to more fragments of the message you’ll uncover. Eventually you’ll get the entire message decoded.

 

As technology progressed machines and advanced mathematics made these ciphers more and more complex. Amazingly the same principles that Poe’s Legrand used to break the Gold Bug cipher still apply today.

Good luck! If you successfully solve it, email the answer to goldbug@theblaze.com and the first responders will get a message from Glenn!

Note: This article originally said to send answers to goldbug@glennbeck.com. Please re-send to goldbug@theblaze.com

How did Trump's would-be assassin get past Secret Service?

PATRICK T. FALLON / Contributor | Getty Images

Editor's Note: This article was originally published on TheBlaze.com.

Former President Donald Trump on Saturday was targeted in an assassination attempt during a campaign rally in Pennsylvania. It occurred just after 6:10 p.m. while Trump was delivering his speech.

Here are the details of the “official” story. The shooter was Thomas Matthew Crooks. He was 20 years old from Bethel Park, Pennsylvania. He used an AR-15 rifle and managed to reach the rooftop of a nearby building unnoticed. The Secret Service's counter-response team responded swiftly, according to "the facts," killing Crooks and preventing further harm.

Did it though? That’s what the official story says, so far, but calling this a mere lapse in security by Secret Service doesn't add up. There are some glaring questions that need to be answered.

If Trump had been killed on Saturday, we would be in a civil war today. We would have seen for the first time the president's brains splattered on live television, and because of the details of this, I have a hard time thinking it wouldn't have been viewed as JFK 2.0.

How does someone sneak a rifle onto the rally grounds? How does someone even know that that building is there? How is it that Thomas Matthew Crooks was acting so weird and pacing in front of the metal detectors, and no one seemed to notice? People tried to follow him, but, oops, he got away.

How could the kid possibly even think that the highest ground at the venue wouldn't be watched? If I were Crooks, my first guess would be, "That’s the one place I shouldn't crawl up to with a rifle because there's most definitely going to be Secret Service there." Why wasn't anyone there? Why wasn't anyone watching it? Nobody except the shooter decided that the highest ground with the best view of the rally would be the greatest vulnerability to Trump’s safety.

Moreover, a handy ladder just happened to be there. Are we supposed to believe that nobody in the Secret Service, none of the drones, none of the things we pay millions of dollars for caught him? How did he get a ladder there? If the ladder was there, was it always there? Why was the ladder there? Secret Service welds manhole covers closed when a president drives down a road. How was there a ladder sitting around, ready to climb up to the highest ground at the venue, and the Secret Service failed to take it away?

There is plenty of video of eyewitnesses yelling that there was a guy with a rifle climbing up on a ladder to the roof for at least 120 seconds before the first shot was fired. Why were the police looking for him while Secret Service wasn't? Why did the sniper have him in his sights for over a minute before he took a shot? Why did a cop climb up the ladder to look around? When Thomas Matthew Cooks pointed a gun at him, he then ducked and came down off the ladder. Did he call anyone to warn that this young man had a rifle within range of the president?

How is it the Secret Service has a female bodyguard who doesn't even reach Trump's nipples? How was she going to guard the president's body with hers? How is it another female Secret Service agent pulled her gun out a good four minutes too late, then looked around, apparently not knowing what to do? She then couldn't even get the pistol back into the holster because she's a Melissa McCarthy body double. I don't think it's a good idea to have Melissa McCarthy guarding the president.

Here’s the critical question now: Who trusts the FBI with the shooter’s computer? Will his hard drive get filed with the Nashville manifesto? How is it that the Secret Service almost didn't have snipers at all but decided to supply them only one day before the rally because all the local resources were going to be put on Jill Biden? I want Jill Biden safe, of course. I want Jill Biden to have what the first lady should have for security, but you can’t hire a few extra guys to make sure our candidates are safe?

How is it that we have a Secret Service director, Kimberly Cheatle, whose experience is literally guarding two liters of Squirt and spicy Doritos? Did you know that's her background? She's in charge of the United States Secret Service, and her last job was as the head of security for Pepsi.

This is a game, and that's what makes this sick. This is a joke. There are people in our country who thought it was OK to post themselves screaming about the shooter’s incompetence: “How do you miss that shot?” Do you realize how close we came to another JFK? If the president hadn't turned his head at the exact moment he did, it would have gone into the center of his head, and we would be a different country today.

Now, Joe Biden is also saying that we shouldn't make assumptions about the motive of the shooter. Well, I think we can assume one thing: He wanted to kill the Republican presidential candidate. Can we agree on that at least? Can we assume that much?

How can the media even think of blaming Trump for the rhetoric when the Democrats and the media constantly call him literally worse than Hitler who must be stopped at all costs?

These questions need to be answered if we want to know the truth behind what could have been one of the most consequential days in U.S. history. Yet, the FBI has its hands clasped on all the sources that could point to the truth. There must be an independent investigation to get to the bottom of these glaring “mistakes.”

POLL: Do you think Trump is going to win the election?

Kevin Dietsch / Staff, Chip Somodevilla / Staff, Kevin Dietsch / Staff | Getty Image

It feels like all of the tension that has been building over the last four years has finally burst to the surface over the past month. Many predicted 2024 was going to be one of the most important and tumultuous elections in our lifetimes, but the last two weeks will go down in the history books. And it's not over yet.

The Democratic National Convention is in August, and while Kamala seems to be the likely candidate to replace Biden, anything could happen in Chicago. And if Biden is too old to campaign, isn't he too old to be president? Glenn doesn't think he'll make it as President through January, but who knows?

There is a lot of uncertainty that surrounds the current political landscape. Trump came out of the attempted assassination, and the RNC is looking stronger than ever, but who knows what tricks the Democrats have up their sleeves? Let us know your predictions in the poll below:

Is Trump going to win the election?

Did the assassination attempt increase Trump's chances at winning in November?

Did Trump's pick of J.D. Vance help his odds?

Did the Trump-Biden debate in June help Trump's chances?

Did Biden's resignation from the election hand Trump a victory in November? 

Do the Democrats have any chance of winning this election?

What is the Secret Service trying to hide about Trump's assassination attempt?

KAMIL KRZACZYNSKI / Contributor, Anadolu / Contributor | Getty Images

This past weekend we were mere inches away from a radically different America than the one we have today. This was the first time a president had been wounded by a would-be assassin since 1981, and the horrific event has many people questioning the competency and motives of the supposedly elite agents trusted with the president's life.

The director of the Secret Service apparently knew about the assassin's rooftop before the shooting—and did nothing.

Kimberly Cheatle has come under intense scrutiny these last couple of weeks, as Secret Service director she is responsible for the president's well-being, along with all security operations onsite. In a recent interview with ABC, Cheatle admitted that she was aware of the building where the assassin made his mark on American history. She even said that she was mindful of the potential risk but decided against securing the site due to "safety concerns" with the slope of the roof. This statement has called her competence into question. Clearly, the rooftop wasn't that unsafe if the 20-year-old shooter managed to access it.

Glenn pointed out recently that Cheatle seems to be unqualified for the job. Her previous position was senior director in global security at America's second-favorite soda tycoon, PepsiCo. While guarding soda pop and potato chips sounds like an important job to some, it doesn't seem like a position that would qualify you to protect the life of America's most important and controversial people. Even considering her lack of appropriate experience, this seems like a major oversight that even a layperson would have seen. Can we really chalk this up to incompetence?

Former Secret Service Director Kimberly Cheatle KAMIL KRZACZYNSKI / Contributor | Getty Images

The Secret Service and DHS said they'd be transparent with the investigation...

Shortly after the attempted assassination, the Department of Homeland Security (DHS), which oversees the Secret Service, launched an investigation into the shooting and the security protocols in place at the rally. The DHS promised full transparency during the investigation, but House Republicans don't feel that they've been living up to that promise. Republican members of the House Oversight Committee are frustrated with Director Cheatle after she seemingly dodged a meeting scheduled for Tuesday. This has resulted in calls for Cheatle to step down from her position.

Two FBI agents investigate the assassin's rooftop Jeff Swensen / Stringer | Getty Images

Why is the Secret Service being so elusive? Are they just trying to cover their blunder? We seem to be left with two unsettling options: either the government is even more incompetent than we'd ever believed, or there is more going on here than they want us to know.

Cheatle steps down

Following a horrendous testimony to the House Oversight Committee Director Cheatle finally stepped down from her position ten days after the assassination attempt. Cheatle failed to give any meaningful answer to the barrage of questions she faced from the committee. These questions, coming from both Republicans and Democrats, were often regarding basic information that Cheatle should have had hours after the shooting, yet Cheatle struggled with each and every one. Glenn pointed out that Director Cheatle's resignation should not signal the end of the investigation, the American people deserve to know what happened.

What we DO and DON'T know about Thomas Matthew Crooks

Jim Vondruska / Stringer | Getty Images

It has been over a week since 20-year-old Thomas Matthew Crooks narrowly failed to assassinate President Trump while the president gave a speech at a campaign rally in Butler, Pennslyvania. Despite the ongoing investigations, we still know very little about the would-be assassin, which has left many wondering if the agencies involved are limiting the information that Congress and the public are receiving.

As Glenn has pointed out, there are still major questions about the shooter that are unanswered, and the American people are left at the whim of unreliable federal agencies. Here is everything we know—and everything we don't know—about Thomas Matthew Crooks:

Who was he?

What we know:Thomas Crooks lived in Bethel Parks, Pennsylvania, approximately an hour south of Butler. Crooks went to high school in Bethel Parks, where he would graduate in 2022. Teachers and classmates described him as a loner and as nerdy, but generally nice, friendly, and intelligent. Crooks tried out for the school rifle team but was rejected due to his poor aim, and reports indicate that Crooks was often bullied for his nerdy demeanor and for wearing camo hunting gear to school.

After high school, Crooks began work at Bethel Park Skilled Nursing and Rehabilitation Center as a dietary aide. In fact, he was scheduled to work on the day of the rally but requested the day off. He passed a background check to work at the facility and was reportedly an unproblematic employee. Crooks was also a member of a local gun club where he practiced shooting the day before the rally.

It was recently revealed that sometime before his attempted assassination, Crooks posted the following message on Steam, a popular computer application used for playing video games: "July 13 will be my premiere, watch as it unfolds." Aside from this, Crooks posted no warning or manifesto regarding his attack, and little other relevant information is known about him.

What we don't know:It is unclear what Crook's political affiliations or views were, or if he was aligned with any extremist organizations. Crooks was a registered Republican, and his classmates recall him defending conservative ideas and viewpoints in class. On the other hand, the Federal Election Commission has revealed he donated to a progressive PAC on the day Biden was inaugurated. He also reportedly wore a COVID mask to school much longer than was required.

Clearly, we are missing the full picture. Why would a Republican attempt to assassinate the Republican presidential nominee? What is to gain? And why would he donate to a progressive organization as a conservative? This doesn't add up, and so far the federal agencies investigating the attack have yet to reveal anything more.

What were his goals?

What we know: Obviously we know he was trying to assassinate President Trump—and came very close to succeeding, but beyond that, Crooks' goals are unknown. He left no manifesto or any sort of written motive behind, or if he did, the authorities haven't published it yet. We have frustratingly little to go off of.

What we don't know: As stated before, we don't know anything about the movies behind Crooks' heinous actions. We are left with disjointed pieces that make it difficult to paint a cohesive picture of this man. There is also the matter that he left explosives, ammo, and a bulletproof vest in his car. Why? Did he assume he was going to make it back to his car? Or were those supplies meant for an accomplice that never showed up?

The shocking lack of information on Crooks' motives makes it seem likely that we are not being let on to the whole truth.

Did he work alone?

What we know: Reportedly, Crooks was the only gunman on the site, and as of now, no other suspects have been identified. The rifle used during the assassination attempt was purchased and registered by Crooks' father. However, it is unlikely that the father was involved as he reported both his son and rifle missing the night of the assassination attempt. Crooks' former classmates described him as a "loner," which seems to corroborate the narrative that he worked alone.

What we don't know: We know how Crooks acquired his rifle, but what about the rest of his equipment? He reportedly had nearly a hundred extra rounds of ammunition, a bulletproof vest, and several homemade bombs in his car. Could these have been meant for a co-conspirator who didn't show? Did Crooks acquire all of this equipment himself, or did he have help?

There's also the matter of the message Crooks left on the video game platform Steam that served as his only warning of the attack. Who was the message for? Are there people out there who were aware of the attack before it occurred? Why didn't they alert authorities?

We know authorities have access to Crooks' laptop and cellphone that probably contain the answers to these pertinent questions. Why haven't we heard any clarity from the authorities? It seems we are again at the mercy of the federal bureaucracy, which begs one more question: Will we ever know the whole truth?