'The Root': Can you solve our cipher?

Watch 'The Root: The Birth of Big Brother' and all of 'The Root' episodes HERE

Catch up on the research from segment 1 HERE

Segment 2: William Friedman; Edgar Allan Poe; Solve the Cipher

Friedman

In this segment, Glenn explained how Yardley’s operation was shut down – but the practice of domestic spying wasn’t. By 1929 surveillance, coding and decoding messages were established as a crucial skill to have, maintain, and advance. So, Secretary of State Stimson may have put an end to Yardley’s operation, but Yardley’s files were not destroyed. Instead, they were sent to the desk of one of the most brilliant minds in cryptology – William Friedman.

 

Edgar Allan Poe

Friedman was a pioneer in the field, and as you’ll see in the next segment, inspired the creation of the only known cipher machine to never be cracked. But how Friedman got his start in the field is an incredible tale all its own. Friedman was a big fan of Edgar Allan Poe, and Poe was a big fan of ciphers. In fact, he once bragged that he could decipher anything. Friedman loved deciphering messages, and one of his favorite Poe stories was ‘The Gold Bug’.

The code in Poe’s ‘Gold Bug’ is an example of a substitution cipher, which is a cipher where the letters of the alphabet are replaced by other letters or symbols. Calculating all possible combinations of 26 letters of the alphabet and 26 symbols the possible results are in the trillions. For hundreds of years, substitution ciphers were considered impossible to crack.

The secret to solving substitution ciphers is by analyzing syntax. Languages follow a set of rules. There’s only so many ways you can combine letters so that they form intelligible words. Even though the cipher uses symbols it still has to follow those rules. Pretty soon by looking for these rules we can start to see patterns within the message. All that’s needed is a key.

The foundation for all codebreaking is letter frequency analysis. As Poe's Legrand pointed out in the story, in English the most commonly used letter is the letter E. Locating the most frequently used vowels and consonants is the key to letter frequency analysis. Legrand argued that the letters of the alphabet ordered from most frequent to less frequent looked like this:

e a o i d h n r s t u y c f g l m w b k p q x z

Read the entire Edgar Allan Poe’s the Gold Bug – it’s a great story.

Here’s the section that contains the cipher and the explanation on how to decrypt it (this is the portion Glenn animated on the program):

Here Legrand submitted the parchment to my inspection. The following characters were rudely traced between the death's-head and the goat:

 

53‡‡†305))6*;4826)4‡.)4‡);806*;48†8 ¶60))85;1‡(;:‡*8†83(88)5*†;46(;88*96

*?;8)*‡(;485);5*†2:*‡(;4956*2(5*—4)8 ¶8*;4069285);)6†8)4‡‡;1(‡9;48081;8:8‡

1;48†85;4)485†528806*81(‡9;48;(88;4 (‡?34;48)4‡;161;:188;‡?;

"But," said I, returning him the slip, "I am as much in the dark as ever. Were all the jewels of Golconda awaiting me upon my solution of this enigma, I am quite sure that I should be unable to earn them."

"And yet," said Legrand, "the solution is by no means so difficult as you might be led to imagine from the first hasty inspection of the characters. These characters, as any one might readily guess, form a cipher — that is to say, they convey a meaning; but then, from what is known of Kidd, I could not suppose him capable of constructing any of the more abstruse cryptographs. I made up my mind, at once, that this was of a simple species — such, however, as would appear, to the crude intellect of the sailor, absolutely insoluble without the key."

"And you really solved it?"

"Readily; I have solved others of an abstruseness ten thousand times greater. Circumstances, and a certain bias of mind, have led me to take interest in such riddles, and it may well be doubted whether human ingenuity can construct an enigma of the kind which human ingenuity may not, by proper application, resolve. In fact, having once established connected and legible characters, I scarcely gave a thought to the mere difficulty of developing their import.

"In the present case — indeed in all cases of secret writing — the first question regards the language of the cipher; for the principles of solution, so far, especially, as the more simple ciphers are concerned, depend upon, and are varied by, the genius of the particular idiom. In general, there is no alternative but experiment (directed by probabilities) of every tongue known to him who attempts the solution, until the true one is attained. But, with the cipher now before us, all difficulty was removed by the signature. The pun upon the word 'Kidd' is appreciable in no other language than the English. But for this consideration I should have begun my attempts with the Spanish and French, as the tongues in which a secret of this kind would most naturally have been written by a pirate of the Spanish main. As it was, I assumed the cryptograph to be English.

"You observe there are no divisions between the words. Had there been divisions, the task would have been comparatively easy. In such case I should have commenced with a collation and analysis of the shorter words, and, had a word of a single letter occurred, as is most likely, (a or I, for example,) I should have considered this solution as assured. But, there being no division, my first step was to ascertain the predominant letters, as well as the least frequent. Counting all, I constructed a table, thus:

Of the character 8 there are 33.

; " 26.

4 " 19.

‡ ) " 16.

* " 13.

5 " 12.

6 " 11.

†1 " 8.

0 " 6.

9 2 " 5.

: 3 " 4.

? " 3.

¶ " 2. —. " 1.

"Now, in English, the letter which most frequently occurs is e. Afterwards, the succession runs thus: a o i d h n r s t u y c f g l m w b k p q x z. E predominates so remarkably that an individual sentence of any length is rarely seen, in which it is not the prevailing character.

"Here, then, we have, in the very beginning, the groundwork for something more than a mere guess. The general use which may be made of the table is obvious — but, in this particular cipher, we shall only very partially require its aid. As our predominant character is 8, we will commence by assuming it as the e of the natural alphabet. To verify the supposition, let us observe if the 8 be seen often in couples — for e is doubled with great frequency in English — in such words, for example, as 'meet,' 'fleet,' 'speed,' 'seen,' 'been,' 'agree,' &c. In the present instance we see it doubled no less than five times, although the cryptograph is brief.

"Let us assume 8, then, as e. Now, of all words in the language, 'the' is most usual; let us see, therefore, whether there are not repetitions of any three characters, in the same order of collocation, the last of them being 8. If we discover repetitions of such letters, so arranged, they will most probably represent the word 'the.' Upon inspection, we find no less than seven such arrangements, the characters being ;48. We may, therefore, assume that ; represents t, 4 represents h, and 8 represents e — the last being now well confirmed. Thus a great step has been taken.

"But, having established a single word, we are enabled to establish a vastly important point; that is to say, several commencements and terminations of other words. Let us refer, for example, to the last instance, but one, in which the combination ;48 occurs — not far from the end of the cipher. We know that the ; immediately ensuing is the commencement of a word, and, of the six characters succeeding this 'the,' we are cognizant of no less than five. Let us set these characters down, thus, by the letters we know them to represent, leaving a space for the one unknown —

t eeth.

"Here we are enabled, at once, to discard the 'th' as forming no portion of the word commencing with the first t; since, by experiment of the entire alphabet for a letter adapted to the vacancy, we perceive that no word can be formed of which this th can be a part. We are thus narrowed into 

 

t ee,

and, going through the alphabet, if necessary, as before, we arrive at the word 'tree,' as the sole possible reading. We thus gain another letter, r, represented by (, with the words 'the tree' in juxtaposition.

; "Looking beyond these words, for a short distance, we again see the combination ;48, and employ it by way of termination to what immediately precedes. We have thus this arrangement:

the tree ;4(‡?34 the,

or, substituting the natural letters, where known, it reads thus:

the tree thr‡?3h the.

 

"Now, if, in place of the unknown characters, we leave blank spaces, or substitute dots, we read thus:

the tree thr...h the,

when the word 'through' makes itself evident at once. But this discovery gives us three new letters, o, u and g, represented by ‡ ? and 3.

 

"Looking, now, narrowly, through the cipher for combinations of known characters, we find, not very far from the beginning, this arrangement,

83(88, or egree,

 

which, plainly, is the conclusion of the word 'degree,' and gives us another letter, d, represented by †.

 

; "Four letters beyond the word 'degree,' we perceive the combination

 

­­;46(;88*.

; "Translating the known characters, and representing the unknown by dots, as before, we read thus:

 

th.rtee.

 

an arrangement immediately suggestive of the word 'thirteen,' and again furnishing us with two new characters, i and n, represented by 6 and *.

 

; "Referring, now, to the beginning of the cryptograph, we find the combination,

53‡‡†.

"Translating, as before, we obtain

. good,

which assures us that the first letter is A, and that the first two words are 'A good.'

"To avoid confusion, it is now time that we arrange our key, as far as discovered, in a tabular form. It will stand thus:

5 represents a

† " d

8 " e

3 " g

4 " h

6 " i

* " n

‡ " o

( " r

; " t

"We have, therefore, no less than ten of the most important letters represented, and it will be unnecessary to proceed with the details of the solution. I have said enough to convince you that ciphers of this nature are readily soluble, and to give you some insight into the rationale of their development. But be assured that the specimen before us appertains to the very simplest species of cryptograph. It now only remains to give you the full translation of the characters upon the parchment, as unriddled. Here it is:

'A good glass in the bishop's hostel in the devil's seat forty-one degrees and thirteen minutes northeast and by north main branch seventh limb east side shoot from the left eye of the death's-head a bee line from the tree through the shot fifty feet out.' "

And that’s how you solve a cipher. Easy, right? We thought we’d give you a little challenge, to see how you stack up against the brilliant cipher minds of history. Using the Gold Bug cipher can you decrypt our code?

 

 

Solve the Cipher

 

1(68†95* ]5) 6*).6(8† 2: 8†35( 5005* .‡8 5*† 28-598 5 95);8( -(:.;5*50:); ;48 38(95* 8*6395 95-46*8 ]5) †8-6.48(8† 2?; 1(68†95*) *8¶8( ]5) 6; ]5) -5008† )63525 ;‡ ;46) †5: *‡ ‡*8 8¶8( )?--8))1?00: †8-(:.;8† ;48 598(6-5* )63525 95-46*8

 

Write out the cipher on a piece of paper leaving enough space in between each line. You’ll need the space to write your solutions underneath. (example below)

1(68†95* ]5) 6*).6(8† 2: 8†35( 5005* .‡8 5*† 28-598 5 95);8( -(:.;5*50:); ;48 38(95* 8*6395

95-46*8 ]5) †8-6.48(8† 2?; 1(68†95*) *8¶8( ]5) 6; ]5) -5008† )63525 ;‡ ;46) †5: *‡ ‡*8 8¶8(

 

)?--8))1?00: †8-(:.;8† ;48 598(6-5* )63525 95-46*8

 

Count out the times each symbol/number is used in the cipher and write the results on a table ordered most to least frequently used. You’ll start to see that one of the symbols/numbers clearly stands out from the rest. This is your first and biggest clue and is most likely the most commonly used letter in the English language...E. Write in that letter next to each symbol in the cipher. (example below)

 

character 8 = 10 times

character ; = 5 times

character 4 = 2 times

 

Now we have, as Legrand said, “the groundwork” for more. Look for recurring combinations of symbols to try and guess words. Legrand identified the word THE as the most commonly used word. After that the most frequently used words in order are: OF, AND, TO, IN. Once you’ve spotted all the THE’s then you’ve discovered 2 more letters. Write them down on your table accordingly. Each new letter you decipher leads to more fragments of the message you’ll uncover. Eventually you’ll get the entire message decoded.

 

As technology progressed machines and advanced mathematics made these ciphers more and more complex. Amazingly the same principles that Poe’s Legrand used to break the Gold Bug cipher still apply today.

Good luck! If you successfully solve it, email the answer to goldbug@theblaze.com and the first responders will get a message from Glenn!

Note: This article originally said to send answers to goldbug@glennbeck.com. Please re-send to goldbug@theblaze.com

UPDATE: Will Florida survive Hurricane Milton?

Handout / Handout / Getty Images

For the second time in two weeks, Florida is in the path of a major hurricane.

Hurricane Milton is expected to make landfall sometime tonight, Wednesday, October 9th, somewhere near Tampa Bay. This will mark the first time in a hundred years the city has been hit directly by a hurricane, raising concerns about the preparedness of the city's infrastructure. Milton, which was rated a category five hurricane earlier this week, has been reduced to a category four as it approaches land and is expected to make landfall as a powerful category three.

The Sunshine State has already begun to feel the effects of the historic storm, with strong winds and heavy rains battering Tampa Bay this morning. Many are still trying to evacuate or prepare for the storm as conditions worsen. Highways have slowed down, and gas has run short. Residents are preparing for the worst.

The federally recognized "Waffle House Index" is in red, meaning that several Waffle House locations in the Tampa Bay area will be shut down. Waffle House prides itself on being open 24/7, no matter the conditions, so for them to shut down, if only for a brief time, indicates that severe damage to the area is anticipated.

Bloomberg / Contributor | Getty Images

In short, Milton is anticipated to be a disaster, and as we have learned, FEMA is unlikely to be much help. Fortunately, Floridians have Ron DeSantis, who has continued to prove himself a capable governor, and the aid of good-hearted Americans from across the country. If you want to lend a hand to your fellow Americans you can donate at Mercury One and rest assured that your money will be used to step in to help hurricane victims where the government is failing.

'Call her Daddy'? Kamala Harris keeps dodging important questions

TING SHEN / Contributor | Getty Images

Kamala Harris has been making her rounds on talk shows and podcasts in order to increase her poor recognition amongst voters, but all we're hearing is more of the same.

Just in the past few days, Harris has appeared on "60 Minutes" and the popular podcast "Call Her Daddy" to help Americans get to know her. But instead of bold answers to hard-hitting questions, Harris delivered rambling responses to soft-ball questions and squirmed her way out of the few tough questions thrown at her. Overall, it is unlikely that any voter who tuned in to get a solid grasp on Harris's policies was left with a better understanding after either one of her interviews.

Below is a summary of Harris's most recent interviews:

"Call Her Daddy" podcast

Antony Jones / Stringer | Getty Images

Despite this podcast's unsavory name, it consistently ranks among the most popular podcasts in the world, right up there with Joe Rogan's show, and is especially popular among women. Shortly after releasing the interview with Harris, Alex Cooper, the host of the podcast, received backlash for her extremely soft treatment of the presidential nominee. After watching the interview, it's not hard to see how that impression might have come across.

The interview consisted of several surface-level, gimme-type, questions on common Democrat talking points. Harris said she wassurprise—pro-choice. Who would have thought? She also expressed her desire to dump taxpayer money into student loan forgiveness along with other government "aid" programs, which is pretty standard amongst the Left. Overall, nothing new was revealed.

The rest of the interview was little more than gossip. Cooper and Harris chatted about a comment made by Governor Sarah Huckabee Sanders and the "at ladies" comment made by J.D. Vance. This was not the deep dive on Harris that voters wanted.

60 Minutes

CBS Photo Archive / Contributor | Getty Images

On Monday, October 8th, Harris sat down with CBS's Bill Whitaker for an interview on 60 Minutes. While Whitaker defiantly upped the ante in comparison to "Call Her Daddy," Harris still managed to dodge several questions. When asked about foreign policy, Harris parroted the same tired schtick we've heard for the past four years, which clearly hasn't worked. Like Biden before her, she called for an end to the Israel-Hamas war, primarily out of concern for the Palestinians, while simultaneously maintaining Israel's right to self-defense.

Harris also deflected Biden's failure at the Southern Border onto the House Republicans, citing a single instance where a border security bill failed to pass. Even Whitaker pointed out the obvious: The Biden-Harris administration has had four years to solve the problem, and the blame does not fall on this single instance. Harris didn't waver, and doubled down on her excuse, again blaming Congress.

Harris went on to repeatedly dodge questions about her three trillion-dollar economic plan and offered little explanation of what might be included in such a plan, or how it will be paid for. These interviews have repeatedly failed to define Harris or her platform in any meaningful way, though they were successful in concealing just how radical of a candidate she actually is. She is still just a vaguely left-wing, Joe Biden replacement in the eyes of many voters, which might be the best she can do.

The Howard Stern Show

Kevin Mazur / Contributor | Getty Images

In her recent interview on The Howard Stern Show, Harris once again demonstrated her signature combination of evasiveness and unreliable platitudes. Rather than offering substantive answers to Stern’s pointed questions, Harris deflected with awkward humor and vague talking points, sidestepping any real discussion on critical issues like the border crisis or inflation. Her attempt to portray herself as relatable felt painfully out of touch, especially when she pivoted the conversation to her fondness for music and cooking.

Harris’s inability to confront pressing national concerns only highlights her growing reputation for evading accountability during her term in the Biden administration. Stern, typically known for drawing candid responses from guests, seemed unable to penetrate the wall of superficiality that Harris maintained throughout the conversation.

"The Late Show" with Stephen Colbert

CBS Photo Archive / Contributor | Getty Images

We saw a similar performance from Harris on Stephen Colbert's "The Late Show." Colbert teed her up for questions about inflation, the southern border crisis, and the administration’s plunging approval ratings, but Harris stuck to her well-worn script of platitudes and vague promises. Instead of addressing the economic pain felt by millions, she laughed nervously through softball questions, leaving viewers with nothing but empty rhetoric about “working together” and “finding solutions,” while the country watches the consequences of ineffective leadership.

Moreover, when Colbert pressed her on issues like the administration's immigration policies or lack of legislative victories, Harris deflected with hollow talking points, refusing to engage in any serious reflection or accountability. Her awkward attempts at humor felt like a shield against real criticism, confirming the impression that she remains detached from the gravity of the crises unfolding under her watch.

PHOTOS: What Glenn saw in North Carolina was INSANE

Sean Rayford / Stringer | Getty Images

Last Thursday, October 3rd, Glenn traveled to North Carolina to join Mercury One as they provided critical aid to those devastated by Hurricane Helene.

What Glenn saw during his brief visit looked like scenes straight out of an apocalypse movie: houses torn from their foundations and tossed to the side, sometimes entire towns away from where they were built, semi-trucks rolled, railroad tracks swept away, bridges washed out. It was a level of destruction Glenn had never before seen.

But perhaps the most shocking encounter of his whole trip was when Glenn discovered a lone FEMA crew. It was a miracle that Glenn even spotted the FEMA truck, as it was parked away from the main road without any signs or markers to indicate to any passerby in need of its existence. Glenn and Congressman Cory Mills decided to talk to this FEMA crew, the only one they had encountered on their trek, and see what they were up to. As it turns out, not much. The FEMA workers admitted that they had only arrived the day before (nearly a week after the hurricane) and still did not have any sort of supplies. They claimed that people would know where they were located via the local news, despite the fact that most people did not have access to power, cell service, their home, or even their cars. Moreover, there seemed to be confusion about whether they were to go door-to-door in order to render aid to those in need.

FEMA dropped the ball on this entire affair, and it is only going to get worse. FEMA is claiming they blew their yearly allowance on aiding illegal immigrants. Meanwhile, another hurricane is approaching Florida and is expected to make landfall on Wednesday. It seems unlikely that FEMA will be of any use to Floridians in need, and they will have to rely on the aid of their fellow Americans.

Want to help out your fellow countrymen where our government has failed? You can donate at Mercury One and rest assured that your money will be used to step in to help hurricane victims where the government is failing.

The case for mass deportation

NurPhoto / Contributor | Getty Images

Unchecked illegal immigration into America may be the most dangerous issue our country faces today, and with every day it goes unsolved, the risk of a terrorist attack of 9/11 proportions only increases.

Despite the risk, we can't even touch the subject without the Left and the mainstream media having a meltdown. Even suggesting that the tide of undocumented immigrants may pose some sort of national problem will quickly get you labeled as a racist, stumping intelligent conversation before it can even begin. But as any right-minded Conservative will tell you, calls to close the border and deport the people who stole into our country have nothing to do with race.

In his most recent TV special, Glenn described in detail what sorts of dangers we have let into our countries, with facts and figures that prove that if we don't act soon we will be in deep trouble. Glenn made it clear: we need to conduct a mass deportation or risk being torn apart from within. Here are three reasons that make the case for mass deportations:

Islamic terror cells are forming in South America.

Spencer Platt / Staff | Getty Images

Congressional testimony from the Committee on Homeland Security in 2011 revealed that Hugo Chavez held a "Secret Summit" involving the Supreme Leader of Hamas, the Chief of Operations for Hezbollah, and the Secretary General of Palestinian Islamic Jihad in Caracas, Venezuela. It is clear that ever since (and possibly before) there has been a Radical Islamic Terrorist presence in Venezuela. Right now there is an Iranian beachhead off the Venezuelan coast on Margarita Island, where the Iranian government is running criminal activities and recruiting and training Venezuelan gangs. These gangs have used our border crisis to infiltrate the U.S. The most infamous of these gangs, Tren de Aragua, has been declared a terrorist organization by the State of Texas.

Terrorist-backed gangs are smuggling in weapons and tearing through the country.

John Moore / Staff | Getty Images

What are these Iranian-trained and backed gangs doing in America? As you can imagine, nothing good. Just this year alone an estimated million rounds of ammunition, 1.2 million gun parts, 3,000 body armor vests, and thousands of pieces of other military paraphernalia have been smuggled across the border. On top of that, they have already taken over an apartment complex in Aurora, Colorado, and are now terrorizing the remaining residents.

It's noteworthy that the gang managed to move into the apartment in the first place because they received subsidies through an NGO that was assisting the Colorado asylum seekers program, using money given to the state by the Biden administration in 2021.

Gangs have attacked military bases.

Lee Corkran / Contributor | Getty Images

It hasn't stopped at apartment complexes either. A leak from the U.S. Army revealed that the gangs have launched probing attacks on military facilities within the U.S. Members have been sighted taking surveillance photos of Lackland Air Force Base, as well as firing multiple shots into the facility. Another military base in Texas, Fort Sam Houston, caught a gang member attempting to gain access to the facility. This coincides with suspicious activity documented within the Permian Basin, the largest oil field in the U.S.

They are smuggling in vast quantities of military equipment, probing and surveying military facilities and key energy locations, and taking over residential areas. What exactly is going on and why isn't the federal government taking it more seriously?