'The Root': Can you solve our cipher?

Watch 'The Root: The Birth of Big Brother' and all of 'The Root' episodes HERE

Catch up on the research from segment 1 HERE

Segment 2: William Friedman; Edgar Allan Poe; Solve the Cipher

Friedman

In this segment, Glenn explained how Yardley’s operation was shut down – but the practice of domestic spying wasn’t. By 1929 surveillance, coding and decoding messages were established as a crucial skill to have, maintain, and advance. So, Secretary of State Stimson may have put an end to Yardley’s operation, but Yardley’s files were not destroyed. Instead, they were sent to the desk of one of the most brilliant minds in cryptology – William Friedman.

 

Edgar Allan Poe

Friedman was a pioneer in the field, and as you’ll see in the next segment, inspired the creation of the only known cipher machine to never be cracked. But how Friedman got his start in the field is an incredible tale all its own. Friedman was a big fan of Edgar Allan Poe, and Poe was a big fan of ciphers. In fact, he once bragged that he could decipher anything. Friedman loved deciphering messages, and one of his favorite Poe stories was ‘The Gold Bug’.

The code in Poe’s ‘Gold Bug’ is an example of a substitution cipher, which is a cipher where the letters of the alphabet are replaced by other letters or symbols. Calculating all possible combinations of 26 letters of the alphabet and 26 symbols the possible results are in the trillions. For hundreds of years, substitution ciphers were considered impossible to crack.

The secret to solving substitution ciphers is by analyzing syntax. Languages follow a set of rules. There’s only so many ways you can combine letters so that they form intelligible words. Even though the cipher uses symbols it still has to follow those rules. Pretty soon by looking for these rules we can start to see patterns within the message. All that’s needed is a key.

The foundation for all codebreaking is letter frequency analysis. As Poe's Legrand pointed out in the story, in English the most commonly used letter is the letter E. Locating the most frequently used vowels and consonants is the key to letter frequency analysis. Legrand argued that the letters of the alphabet ordered from most frequent to less frequent looked like this:

e a o i d h n r s t u y c f g l m w b k p q x z

Read the entire Edgar Allan Poe’s the Gold Bug – it’s a great story.

Here’s the section that contains the cipher and the explanation on how to decrypt it (this is the portion Glenn animated on the program):

Here Legrand submitted the parchment to my inspection. The following characters were rudely traced between the death's-head and the goat:

 

53‡‡†305))6*;4826)4‡.)4‡);806*;48†8 ¶60))85;1‡(;:‡*8†83(88)5*†;46(;88*96

*?;8)*‡(;485);5*†2:*‡(;4956*2(5*—4)8 ¶8*;4069285);)6†8)4‡‡;1(‡9;48081;8:8‡

1;48†85;4)485†528806*81(‡9;48;(88;4 (‡?34;48)4‡;161;:188;‡?;

"But," said I, returning him the slip, "I am as much in the dark as ever. Were all the jewels of Golconda awaiting me upon my solution of this enigma, I am quite sure that I should be unable to earn them."

"And yet," said Legrand, "the solution is by no means so difficult as you might be led to imagine from the first hasty inspection of the characters. These characters, as any one might readily guess, form a cipher — that is to say, they convey a meaning; but then, from what is known of Kidd, I could not suppose him capable of constructing any of the more abstruse cryptographs. I made up my mind, at once, that this was of a simple species — such, however, as would appear, to the crude intellect of the sailor, absolutely insoluble without the key."

"And you really solved it?"

"Readily; I have solved others of an abstruseness ten thousand times greater. Circumstances, and a certain bias of mind, have led me to take interest in such riddles, and it may well be doubted whether human ingenuity can construct an enigma of the kind which human ingenuity may not, by proper application, resolve. In fact, having once established connected and legible characters, I scarcely gave a thought to the mere difficulty of developing their import.

"In the present case — indeed in all cases of secret writing — the first question regards the language of the cipher; for the principles of solution, so far, especially, as the more simple ciphers are concerned, depend upon, and are varied by, the genius of the particular idiom. In general, there is no alternative but experiment (directed by probabilities) of every tongue known to him who attempts the solution, until the true one is attained. But, with the cipher now before us, all difficulty was removed by the signature. The pun upon the word 'Kidd' is appreciable in no other language than the English. But for this consideration I should have begun my attempts with the Spanish and French, as the tongues in which a secret of this kind would most naturally have been written by a pirate of the Spanish main. As it was, I assumed the cryptograph to be English.

"You observe there are no divisions between the words. Had there been divisions, the task would have been comparatively easy. In such case I should have commenced with a collation and analysis of the shorter words, and, had a word of a single letter occurred, as is most likely, (a or I, for example,) I should have considered this solution as assured. But, there being no division, my first step was to ascertain the predominant letters, as well as the least frequent. Counting all, I constructed a table, thus:

Of the character 8 there are 33.

; " 26.

4 " 19.

‡ ) " 16.

* " 13.

5 " 12.

6 " 11.

†1 " 8.

0 " 6.

9 2 " 5.

: 3 " 4.

? " 3.

¶ " 2. —. " 1.

"Now, in English, the letter which most frequently occurs is e. Afterwards, the succession runs thus: a o i d h n r s t u y c f g l m w b k p q x z. E predominates so remarkably that an individual sentence of any length is rarely seen, in which it is not the prevailing character.

"Here, then, we have, in the very beginning, the groundwork for something more than a mere guess. The general use which may be made of the table is obvious — but, in this particular cipher, we shall only very partially require its aid. As our predominant character is 8, we will commence by assuming it as the e of the natural alphabet. To verify the supposition, let us observe if the 8 be seen often in couples — for e is doubled with great frequency in English — in such words, for example, as 'meet,' 'fleet,' 'speed,' 'seen,' 'been,' 'agree,' &c. In the present instance we see it doubled no less than five times, although the cryptograph is brief.

"Let us assume 8, then, as e. Now, of all words in the language, 'the' is most usual; let us see, therefore, whether there are not repetitions of any three characters, in the same order of collocation, the last of them being 8. If we discover repetitions of such letters, so arranged, they will most probably represent the word 'the.' Upon inspection, we find no less than seven such arrangements, the characters being ;48. We may, therefore, assume that ; represents t, 4 represents h, and 8 represents e — the last being now well confirmed. Thus a great step has been taken.

"But, having established a single word, we are enabled to establish a vastly important point; that is to say, several commencements and terminations of other words. Let us refer, for example, to the last instance, but one, in which the combination ;48 occurs — not far from the end of the cipher. We know that the ; immediately ensuing is the commencement of a word, and, of the six characters succeeding this 'the,' we are cognizant of no less than five. Let us set these characters down, thus, by the letters we know them to represent, leaving a space for the one unknown —

t eeth.

"Here we are enabled, at once, to discard the 'th' as forming no portion of the word commencing with the first t; since, by experiment of the entire alphabet for a letter adapted to the vacancy, we perceive that no word can be formed of which this th can be a part. We are thus narrowed into 

 

t ee,

and, going through the alphabet, if necessary, as before, we arrive at the word 'tree,' as the sole possible reading. We thus gain another letter, r, represented by (, with the words 'the tree' in juxtaposition.

; "Looking beyond these words, for a short distance, we again see the combination ;48, and employ it by way of termination to what immediately precedes. We have thus this arrangement:

the tree ;4(‡?34 the,

or, substituting the natural letters, where known, it reads thus:

the tree thr‡?3h the.

 

"Now, if, in place of the unknown characters, we leave blank spaces, or substitute dots, we read thus:

the tree thr...h the,

when the word 'through' makes itself evident at once. But this discovery gives us three new letters, o, u and g, represented by ‡ ? and 3.

 

"Looking, now, narrowly, through the cipher for combinations of known characters, we find, not very far from the beginning, this arrangement,

83(88, or egree,

 

which, plainly, is the conclusion of the word 'degree,' and gives us another letter, d, represented by †.

 

; "Four letters beyond the word 'degree,' we perceive the combination

 

­­;46(;88*.

; "Translating the known characters, and representing the unknown by dots, as before, we read thus:

 

th.rtee.

 

an arrangement immediately suggestive of the word 'thirteen,' and again furnishing us with two new characters, i and n, represented by 6 and *.

 

; "Referring, now, to the beginning of the cryptograph, we find the combination,

53‡‡†.

"Translating, as before, we obtain

. good,

which assures us that the first letter is A, and that the first two words are 'A good.'

"To avoid confusion, it is now time that we arrange our key, as far as discovered, in a tabular form. It will stand thus:

5 represents a

† " d

8 " e

3 " g

4 " h

6 " i

* " n

‡ " o

( " r

; " t

"We have, therefore, no less than ten of the most important letters represented, and it will be unnecessary to proceed with the details of the solution. I have said enough to convince you that ciphers of this nature are readily soluble, and to give you some insight into the rationale of their development. But be assured that the specimen before us appertains to the very simplest species of cryptograph. It now only remains to give you the full translation of the characters upon the parchment, as unriddled. Here it is:

'A good glass in the bishop's hostel in the devil's seat forty-one degrees and thirteen minutes northeast and by north main branch seventh limb east side shoot from the left eye of the death's-head a bee line from the tree through the shot fifty feet out.' "

And that’s how you solve a cipher. Easy, right? We thought we’d give you a little challenge, to see how you stack up against the brilliant cipher minds of history. Using the Gold Bug cipher can you decrypt our code?

 

 

Solve the Cipher

 

1(68†95* ]5) 6*).6(8† 2: 8†35( 5005* .‡8 5*† 28-598 5 95);8( -(:.;5*50:); ;48 38(95* 8*6395 95-46*8 ]5) †8-6.48(8† 2?; 1(68†95*) *8¶8( ]5) 6; ]5) -5008† )63525 ;‡ ;46) †5: *‡ ‡*8 8¶8( )?--8))1?00: †8-(:.;8† ;48 598(6-5* )63525 95-46*8

 

Write out the cipher on a piece of paper leaving enough space in between each line. You’ll need the space to write your solutions underneath. (example below)

1(68†95* ]5) 6*).6(8† 2: 8†35( 5005* .‡8 5*† 28-598 5 95);8( -(:.;5*50:); ;48 38(95* 8*6395

95-46*8 ]5) †8-6.48(8† 2?; 1(68†95*) *8¶8( ]5) 6; ]5) -5008† )63525 ;‡ ;46) †5: *‡ ‡*8 8¶8(

 

)?--8))1?00: †8-(:.;8† ;48 598(6-5* )63525 95-46*8

 

Count out the times each symbol/number is used in the cipher and write the results on a table ordered most to least frequently used. You’ll start to see that one of the symbols/numbers clearly stands out from the rest. This is your first and biggest clue and is most likely the most commonly used letter in the English language...E. Write in that letter next to each symbol in the cipher. (example below)

 

character 8 = 10 times

character ; = 5 times

character 4 = 2 times

 

Now we have, as Legrand said, “the groundwork” for more. Look for recurring combinations of symbols to try and guess words. Legrand identified the word THE as the most commonly used word. After that the most frequently used words in order are: OF, AND, TO, IN. Once you’ve spotted all the THE’s then you’ve discovered 2 more letters. Write them down on your table accordingly. Each new letter you decipher leads to more fragments of the message you’ll uncover. Eventually you’ll get the entire message decoded.

 

As technology progressed machines and advanced mathematics made these ciphers more and more complex. Amazingly the same principles that Poe’s Legrand used to break the Gold Bug cipher still apply today.

Good luck! If you successfully solve it, email the answer to goldbug@theblaze.com and the first responders will get a message from Glenn!

Note: This article originally said to send answers to goldbug@glennbeck.com. Please re-send to goldbug@theblaze.com

The Deep State's NEW plan to backstab Trump

Brandon Bell / Staff | Getty Images

We cannot make the same mistake we made in 2016 — celebrating victory while the deep state plots its next move.

In 2016, Donald Trump shocked the world by defeating Hillary Clinton. Conservatives cheered, believing we’d taken back the reins of our country. But we missed the bigger battle. We failed to recognize the extent of the damage caused by eight years of Barack Obama and decades of progressive entrenchment. The real war isn’t won at the ballot box. It’s being waged against an insidious force embedded deep within our institutions: the administrative state, or the “deep state.”

This isn’t a new problem. America’s founders foresaw it, though they didn’t have a term for “deep state” back in the 1700s. James Madison, in Federalist 48, warned us that combining legislative, executive, and judicial powers in the same hands is “the very definition of tyranny.” Yet today, that’s exactly where we stand. Unelected bureaucrats in agencies like the Environmental Protection Agency, the Department of Energy, and the Department of Justice hold more power than the officials we vote for. They control the levers of government with impunity, dictating policies and stifling change.

This is the fight for the soul of our nation. The founders’ vision of a constitutional republic is under siege.

We’ve felt the consequences of this growing tyranny firsthand. During COVID-19, so-called experts ran our lives, crushing civil liberties under the guise of public safety. Our intelligence agencies and justice system turned into weapons of political warfare, targeting a sitting president and his supporters. Meanwhile, actual criminals were given a pass, turning American cities into lawless war zones.

Thomas Jefferson wrote in 1816 that “the functionaries of every government have propensities to command at will the liberty and property of their constituents.” Today, we see Jefferson’s prophecy fulfilled. The deep state exercises unchecked power over our freedoms, and information itself is controlled by the fourth branch of government: the legacy media.

Even when we win elections, the deep state doesn’t concede defeat. It switches to survival mode. Trump’s first term proved this. Despite a historic mandate to dismantle the bureaucracy, the deep state fought back with everything it had: leaks, investigations, court rulings, and obstruction at every turn. And now, with the possibility of Trump returning to office, the deep state is preparing to do it again.

Progressives are laying out their attack plan — and they’re not even hiding it.

U.S. Rep. Wiley Nickel (D-N.C.) recently boasted about forming a “shadow cabinet” to govern alongside the deep state, regardless of who’s in the White House. Nickel called it “democracy’s insurance policy.” Let’s be clear: This isn’t insurance. It’s sabotage.

They’ll employ a “top down, bottom up, inside out” strategy to overwhelm and collapse any effort to reform the system. From the top, federal judges and shadow officials will block Trump’s every move. Governors in blue states like California and New York are gearing up to resist federal authority. During Trump’s first term, California filed over 100 lawsuits against his administration. Expect more of the same starting January 20.

From the bottom, progressive groups like the American Civil Liberties Union will flood the streets with protesters, much as they did to oppose Trump’s first-term immigration reforms. They’ve refined their tactics since 2016 and are prepared to unleash a wave of civil unrest. These aren’t spontaneous movements; they’re coordinated assaults designed to destabilize the administration.

Finally, from the inside, the deep state will continue its mission of self-preservation. Agencies will drag their feet, leak sensitive information, and undermine policies from within. Their goal is to make everything a chaotic mess, so the heart of their power — the bureaucratic core — remains untouched and grows stronger.

We cannot make the same mistake we made in 2016 — celebrating victory while the deep state plots its next move. Progressives never see themselves as losing. When they’re out of power, they simply shift tactics, pumping more blood into their bureaucratic heart. We may win elections, but the war against the deep state will only intensify. As George Washington warned in his Farewell Address, “Government is not reason, it is not eloquence — it is force; and force, like fire, is a dangerous servant and a fearful master.”

This is the fight for the soul of our nation. The founders’ vision of a constitutional republic is under siege. The deep state has shown us its plan: to govern from the shadows, circumventing the will of the people. But now that the shadows have been exposed, we have a choice. Will we accept this silent tyranny, or will we demand accountability and reclaim our nation’s heart?

The battle is just beginning. We can’t afford to lose.

Editor's Note: This article was originally published on TheBlaze.com.

Drone mystery exposes GLARING government incompetence

Gary Hershorn / Contributor | Getty Images

The drone issue is getting way out of hand.

Earlier this month, Glenn first reported on the mysterious drones stalking the night sky over New Jersey, but the situation is increasingly concerning as the sightings have escalated. Not only have drones been seen across the Northeast Coast, including over New York City, Maryland, and Pennsylvania, but recently, they have been spotted over the night skies of San Diego and other parts of Southern California.

It doesn't take an expert to identify the potential dangers and risks that dozens of undetectable, unidentified six-foot or larger drones pose to national security. Yet, our government's response has been one of unimaginable incompetence, leaving us to speculate on the origin and intention of these drones and wonder in astonishment at the government's ineptitude. Here are three examples of the government's lackluster response to the mystery drones:

Iranian Mothership and Missing Nuclear Warheads

- / Stringer | Getty Images

After several weeks of hubbub, New Jersey Representative, Jeff Van Drew gave an interview on Fox News where he claimed that the drones originated from an Iranian "mothership" off the East Coast of the United States. This theory has since been disproven by satellite images, which show that all Iranian drone carriers are far from U.S. shores. Another theory suggests that drones may be equipped with sensors capable of detecting nuclear material and that they are looking for a nuclear warhead that recently went missing! With these apocalyptic theories gaining traction in the absence of any real answer from our government, one can't help but question the motive behind the silence.

Pentagon's Limp Wristed Response

Alex Wong / Staff | Getty Images

In a recent press conference, national security spokesman John Kirby responded to reporters demanding answers about the government's lack of transparency, which has caused increasing public anxiety. He insisted that the drones did not pose a threat and were not assets of a foreign power, such as from Iran or China--even though he is still uncertain about their identity and origin. He also claimed that many of the sightings were simply misidentifications of normal aircraft.

This lackluster answer has only further inflamed national anxieties and raised even more questions. If the government is unsure of the identity of the drones, how do they know if they are a threat or if they aren't foreign assets? If they aren't foreign, does that mean they are U.S. assets? If so, why not just say so?

The Pentagon has also stated that they are leaving it up to local law enforcement to spearhead the investigation after concluding that these drones pose no threat to any military installation. This has left many feeling like the federal government has turned a blind eye to a serious issue that many Americans are very concerned about.

Where's Pete Buttigieg?

Chip Somodevilla / Staff | Getty Images

We are in the closing weeks of the Biden administration, and with the finish line in sight, Secretary of Transportation Pete Buttigieg probably figured nothing else could go wrong on his watch—but boy was he wrong. As Secretary of Transportation, Buttigieg is in charge of the FAA, the agency responsible for managing all air traffic across the nation. One would think that mysterious, 6-foot-long, seemingly intractable drones are invisible on radar and flying above major cities would pose a serious threat to the myriad of legal aircraft that traverse our skies. Yet, Buttigieg has been silent on the issue, adding another failure to his resume which includes: malfunctioning airplanes, the train derailment in Ohio, and the Baltimore Key Bridge collapse, just to name a few.

Glenn: How Alvin Bragg turned hero Daniel Penny into a villain

Michael M. Santiago / Staff | Getty Images

We cannot allow corrupt institutions to punish those who act to protect life and liberty.

America no longer has a single, shared understanding of justice. Two Americas now exist, each applying justice differently depending on who you are and where you live. One America, ruled by common sense and individual courage, praises heroes who stand up to protect others. The other, driven by political agendas and corrupted institutions, punishes those same heroes for daring to act.

This stark division couldn’t be clearer than in the case of Daniel Penny, the Marine whose trial in New York City this week drew strong reactions from both sides across the divided line of justice.

If we let this slide, we accept a world in which heroes are treated as criminals and the law is a weapon for ideological warfare.

Penny was on a subway train last year when Jordan Neely — a man suffering from severe mental illness and reportedly high on drugs — began threatening passengers, saying, “I’m going to kill you all.” The fear on that subway car was palpable, but nobody moved. Nobody, that is, until Penny did what needed to be done. He took action to protect innocent lives.

In the America many of us used to believe in, Penny’s response would be heralded as heroic. His actions mirrored the courage of Todd Beamer on Flight 93, who, on September 11, 2001, rallied others with the words, “Let’s roll,” to prevent further tragedy. But in New York, courage doesn’t seem to count anymore. There, the system turns heroes into villains.

Penny subdued Neely using a chokehold, intending only to restrain him, not kill him. Tragically, Neely died. Penny, filled with remorse, told the police he never meant to hurt anyone. Yet, instead of being recognized for protecting others from a clear and present threat, Penny stood trial for criminally negligent homicide.

In Alvin Bragg’s New York, justice bends to ideology. The Manhattan district attorney has made a career of weaponizing the law, selectively prosecuting those who don’t fit his narrative. He’s the same prosecutor who twisted legal precedent to go after Donald Trump on business charges no one had ever faced before. Then, he turned his sights on Daniel Penny.

A jury may have acquitted Penny, but what happened in New York City this week isn’t justice. When the rule of law changes depending on the defendant’s identity or the prosecutor's political motives, we’re no longer living in a free country. We’re living in a state where justice is a game, and ordinary Americans are the pawns.

The system failed Jordan Neely

It’s worth asking: Where were activists like Alvin Bragg when Neely was suffering on the streets? Jordan Neely was a tragic figure — a man with a long history of mental illness and over 40 arrests, including violent assaults. The system failed him long before he stepped onto that subway train. Yet rather than confront that uncomfortable truth, Bragg’s office decided to target the man who stepped in to prevent a tragedy.

This isn’t about justice. It’s about power. It’s about advancing a narrative where race and identity matter more than truth and common sense.

It’s time to demand change

The Daniel Penny case — and others like it — is a wake-up call. We cannot allow corrupt institutions to punish those who act to protect life and liberty. Americans must demand an end to politically driven prosecutions, hold DAs like Alvin Bragg accountable, and stand up for the principle that true justice is blind, consistent, and fair.

If we let this slide, we accept a world in which heroes are treated as criminals and the law is a weapon for ideological warfare. It’s time to choose which America we want to live in.

Editor's Note: This article was originally published on TheBlaze.com.

CEO Brian Thompson's killer reveals COWARDICE of the far-left death cult

Jeff Swensen / Stringer | Getty Images

Early on the chilly morning of Wednesday, December 4th, Brian Thompson, CEO of health insurance giant, UnitedHealthcare, was walking through Midtown Manhattan on his way to a company conference. Suddenly, a masked and hooded figure silently allegedly stepped onto the sidewalk behind Thompson, drew a 3-D printed, silenced pistol, and without warning fired multiple shots into Thompson's back before fleeing the scene on an electric bicycle. After a multiple-day manhunt, a 26-year-old lead suspect was arrested at a McDonald's in Altoona, Pennsylvania after being recognized by an employee.

This was not "vigilante justice." This was cold-blooded murder.

As horrific as the murder of a husband and father in broad daylight in the center of New York City is, the story only gets worse. Even before the murder suspect was arrested, left-wing extremists were already taking to X to call him a "hero" and a "vigilante" who "took matters into his own hands." Even the mainstream media joined in on the glorification, as Glenn pointed out on air recently, going out of the way to show how physically attractive the murder suspect was. This wave of revolting and nihilistic fanfare came in response to the findings of online investigators who surmised the murder suspect's motives to retaliate against healthcare companies for corruption and denied coverage. The murder suspect supposedly underwent a major back surgery that left him with back pain, and some of his internet fans apparently viewed his murder of Thompson as retribution for the mistreatment that he and many other Americans have suffered from healthcare companies.

The murder suspect and his lackeys don't seem to understand that, other than depriving two children of their father right before Christmas, he accomplished nothing.

The murder suspect failed to achieve his goal because he was too cowardly to try.

If the murder suspect's goals were truly to "right the wrongs" of the U.S. healthcare system, he had every tool available to him to do so in a constructive and meaningful manner. He came from a wealthy and prominent family in the Baltimore area, became the valedictorian at a prestigious all-boys prep school, and graduated from the University of Pennsylvania with a master's in engineering. Clearly, the murder suspect was intelligent and capable, and if he had put his talent into creating solutions for the healthcare industry, who knows what he could have accomplished?

This is the kind of behavior the far-left idolizes, like communists on college campuses who wear shirts that celebrate the brutal Cuban warlord, Che Guevara. Merchandise celebrating the UnitedHealthcare CEO murder suspect is already available, including shirts, hoodies, mugs, and even Christmas ornaments. Will they be sporting his face on their T-shirts too?

This macabre behavior does not breed creation, achievement, success, or life. It only brings death and risks more Americans falling into this dangerous paradigm. But we still have a chance to choose life. We just have to wake up and take it.