Feb. 6, 2026

Cryptography Systems and Jack 1997

Cryptography Systems and Jack 1997

Zodiac Killer boasted that his first and only cipher that was decrypted was rather simple in comparison to subsequent secret messages. We will look at the various systems taught by a Forensic Document Examiner. It is apparent that without a key, one would not be able to solve any further ciphers without it. So, this means Zodiac was communicating with someone that did. Nora’s diary holds some keys to Jack’s whereabouts and disposition as we move into 1997.

Hit the Road Jack: Finding the Zodiac is broadcast live Fridays at 10AM PT on K4HD Radio - Hollywood Talk Radio (www.k4hd.com) part of Talk 4 Radio (www.talk4radio.com) on the Talk 4 Media Network (www.talk4media.com). Hit the Road Jack: Finding the Zodiac TV Show is viewed on Talk 4 TV (www.talk4tv.com).

Hit the Road Jack: Finding the Zodiac Podcast is also available on Talk 4 Media (www.talk4media.com), Talk 4 Podcasting (www.talk4podcasting.com), iHeartRadio, Amazon Music, Pandora, Spotify, Audible, and over 100 other podcast outlets.

Become a supporter of this podcast: https://www.spreaker.com/podcast/hit-the-road-jack-finding-the-zodiac--5297837/support.

WEBVTT

1
00:00:00.920 --> 00:00:04.480
This program is designed to provide general information with regards

2
00:00:04.519 --> 00:00:07.480
to the subject matters covered. This information is given with

3
00:00:07.559 --> 00:00:11.919
the understanding that neither the hosts, guests, sponsors, or station

4
00:00:12.119 --> 00:00:18.920
are engaged in rendering any specific and personal medical, financial, legal, counseling,

5
00:00:19.199 --> 00:00:23.359
professional service, or any advice. You should seek the services

6
00:00:23.399 --> 00:00:46.479
of competent professionals before applying or trying any suggested ideas.

7
00:00:52.439 --> 00:00:55.359
Good Morning, True Seekers and True crime Junkies. Welcome back

8
00:00:55.359 --> 00:00:58.600
to another episode of Hit the Roadjack Finding the Zodiac.

9
00:00:58.880 --> 00:01:00.560
I would like to welcome to the SHO Show today.

10
00:01:00.679 --> 00:01:06.239
Nolan del Campo, Good morning everybody. Good morning. Any big

11
00:01:06.280 --> 00:01:07.920
news this week, any great cases?

12
00:01:08.680 --> 00:01:12.319
No, but I did just Homeland security last week. But

13
00:01:12.359 --> 00:01:15.040
then two days later or Tuesday, there was a huge

14
00:01:15.120 --> 00:01:19.359
article in the b about how the government in the

15
00:01:19.719 --> 00:01:23.200
US Attorney's Office is using a new tactic to basically

16
00:01:23.239 --> 00:01:27.599
eliminate the asylum program. And that's happen with my client.

17
00:01:28.239 --> 00:01:31.560
They basically say, if the United States government has an

18
00:01:31.599 --> 00:01:35.239
agreement with these other countries they're willing to exchange people

19
00:01:35.879 --> 00:01:37.799
that they don't have to send them back to their

20
00:01:37.840 --> 00:01:40.400
own homeland, but they could still deport them to a

21
00:01:40.439 --> 00:01:43.560
different country and let them apply from asylum, say from

22
00:01:43.560 --> 00:01:46.239
Honduras or or somewhere like that.

23
00:01:47.959 --> 00:01:51.239
And so what is the purpose for them taking that away? Obviously,

24
00:01:51.280 --> 00:01:51.799
this whole.

25
00:01:53.120 --> 00:01:54.719
Crown skinned people, I don't know.

26
00:01:56.280 --> 00:01:59.439
A brown skinned person. We've We've brought in plenty of

27
00:01:59.560 --> 00:02:02.159
people from Russia, we brought in plenty of people from

28
00:02:02.159 --> 00:02:02.640
I mean.

29
00:02:02.760 --> 00:02:03.799
Well, here's the deal.

30
00:02:05.400 --> 00:02:14.680
Latin America, because there's a lot of oppressive governments down there, rightly.

31
00:02:12.360 --> 00:02:16.120
From Central America. This particular woman who was from.

32
00:02:16.000 --> 00:02:20.120
Guatemala, and what was she running from.

33
00:02:20.759 --> 00:02:24.080
Oppression in Guatemala and fear for her life and her family.

34
00:02:25.080 --> 00:02:28.639
But couldn't anybody just say that and seek asylum, whether

35
00:02:28.639 --> 00:02:29.319
it's true or not.

36
00:02:30.159 --> 00:02:36.319
Yes, so Guaateemala's record on human rights is atrocious, so

37
00:02:36.360 --> 00:02:39.479
it's but anyway, she doesn't have a chance to prove

38
00:02:39.520 --> 00:02:41.439
it now because they're not going to allow her to

39
00:02:41.439 --> 00:02:48.319
even argue that. Yeah, the policy is called pretermination, and.

40
00:02:48.280 --> 00:02:50.560
So what they're sending them to other countries are back

41
00:02:50.599 --> 00:02:51.639
to their own countries.

42
00:02:52.439 --> 00:02:54.879
They'll send them to these other countries or they can

43
00:02:54.960 --> 00:02:56.360
voluntarily depart.

44
00:02:56.280 --> 00:03:01.400
To their own country, so they have options. I mean, yeah,

45
00:03:01.840 --> 00:03:03.080
but I know that sucks.

46
00:03:03.159 --> 00:03:05.800
But asylum.

47
00:03:06.360 --> 00:03:07.400
How long has she been here?

48
00:03:08.080 --> 00:03:08.719
Four years?

49
00:03:09.560 --> 00:03:14.759
Oh? Okay, there's so much to think about anymore these days,

50
00:03:14.759 --> 00:03:19.000
it seems like, well, that brings me into obviously, some

51
00:03:19.039 --> 00:03:23.120
of the research that I done, had done this last week,

52
00:03:23.639 --> 00:03:27.919
and in my in my research, I was well, actually,

53
00:03:27.919 --> 00:03:30.120
it was a class that I was taking on handwriting,

54
00:03:30.159 --> 00:03:33.560
and we were talking about the industries that see the

55
00:03:33.560 --> 00:03:36.759
biggest percentages of fraud. Which one do you think it is?

56
00:03:38.439 --> 00:03:38.680
What?

57
00:03:39.159 --> 00:03:43.919
Because, yes, the largest industry that is defrauded by fraud,

58
00:03:46.159 --> 00:03:49.759
I have no idea. I kind of giggled at it

59
00:03:49.800 --> 00:03:56.719
because it's the insurance company, which I feel like, obviously

60
00:03:56.800 --> 00:03:59.759
that that's that's paid protection, that's mafia. That's mob. That's

61
00:03:59.800 --> 00:04:02.000
the people who used to loan the mob money, right

62
00:04:02.080 --> 00:04:04.159
because banks wouldn't do it so that they could get

63
00:04:04.199 --> 00:04:06.680
themselves up and running in casinos and doing all that

64
00:04:06.759 --> 00:04:10.639
kind of stuff. So when I think about the origin

65
00:04:10.960 --> 00:04:14.840
of insurance or paid protection, it emanates from the mob

66
00:04:14.960 --> 00:04:18.600
moves into the unions and then insurances and oh, my goodness,

67
00:04:18.639 --> 00:04:20.360
I don't know. I just I got to take a

68
00:04:20.399 --> 00:04:22.879
out of it, simply because how much we've talked about

69
00:04:22.879 --> 00:04:25.920
what the insurance companies have done for people like the

70
00:04:26.000 --> 00:04:32.480
mob and other nefarious memes. Good morning, Lindsay.

71
00:04:31.680 --> 00:04:32.240
Good morning.

72
00:04:35.000 --> 00:04:40.639
Yeah.

73
00:04:40.879 --> 00:04:42.839
I know, like so much is going on lately that

74
00:04:43.040 --> 00:04:46.199
like I had to change my like my logo up

75
00:04:46.240 --> 00:04:51.000
a little bit channels because it's like a freaking it's

76
00:04:51.000 --> 00:04:56.040
like chaos and it's like psychotic information everywhere, and it's

77
00:04:56.120 --> 00:04:58.839
like I don't know, like that's why I was like, Okay,

78
00:04:59.519 --> 00:05:00.000
I'm going.

79
00:04:59.879 --> 00:05:05.120
With this for no disinformation. I have like literally taken

80
00:05:05.160 --> 00:05:07.720
a break from Facebook for almost a month and a half.

81
00:05:07.759 --> 00:05:10.439
It's been very, very limited the amount of time I

82
00:05:10.439 --> 00:05:13.839
spend on it, either to promote my show or I

83
00:05:13.879 --> 00:05:16.759
wanted to see something that came across by email specifically.

84
00:05:16.759 --> 00:05:22.160
But the rhetoric and the this information in the media

85
00:05:22.279 --> 00:05:25.720
warfare has got me so like I don't even want

86
00:05:25.759 --> 00:05:27.680
to get on anymore because I can't even make it

87
00:05:27.720 --> 00:05:30.199
through like two posts without seeing some crap.

88
00:05:30.680 --> 00:05:33.240
That's well, yeah, I've been disconnected with Facebook, but I

89
00:05:33.319 --> 00:05:35.079
still have it there and I get on there check

90
00:05:35.120 --> 00:05:38.680
for different like just to check on friends mostly once

91
00:05:38.720 --> 00:05:42.000
in a while. But once I actually completely like took

92
00:05:42.040 --> 00:05:45.600
that step and like literally stopped looking at it all

93
00:05:45.639 --> 00:05:48.680
the time and almost just like a couple of times

94
00:05:48.720 --> 00:05:51.639
a month. It's like you don't even know how like

95
00:05:52.319 --> 00:05:54.480
fresh you bill, it's crazy.

96
00:05:55.560 --> 00:05:57.480
And it's funny. You say you were checking on friends.

97
00:05:57.560 --> 00:06:00.480
But I received a text message from a that I'd

98
00:06:00.480 --> 00:06:03.279
met out in Ireland and she was like, in now,

99
00:06:03.319 --> 00:06:05.680
where have you been? You haven't you been here? You

100
00:06:05.720 --> 00:06:09.759
haven't been like posting funny stuff where you okay? Like yeah,

101
00:06:09.759 --> 00:06:12.480
I'm just sick of the freaking political bull crap and

102
00:06:12.519 --> 00:06:15.839
the misinformation and all the feeds. I mean, social media

103
00:06:15.920 --> 00:06:18.240
is now the biggest. I mean they say that people

104
00:06:18.399 --> 00:06:22.319
pay more attention to social media for their news because

105
00:06:22.360 --> 00:06:24.120
they don't trust the news, but they don't seem to

106
00:06:24.160 --> 00:06:27.240
realize that everything in social media is either AI or

107
00:06:27.360 --> 00:06:30.720
it it's crap, it's rhetoric. In fact, I wanted to

108
00:06:30.759 --> 00:06:33.279
talk about that video you just set me in regards

109
00:06:33.319 --> 00:06:35.240
to the ADL because I'm going to climb into that

110
00:06:35.240 --> 00:06:40.360
with the Ghosts of Mississippi, but I couldn't. I would

111
00:06:40.360 --> 00:06:42.160
love to play these kind of things and send them on,

112
00:06:42.279 --> 00:06:43.920
but the problem is is that it looks like so

113
00:06:44.000 --> 00:06:47.600
many areas have been cut and clipped for it to

114
00:06:47.639 --> 00:06:49.759
appear that they're saying the things they're saying that I

115
00:06:49.759 --> 00:06:52.560
can't trust it. Does that make sense?

116
00:06:54.040 --> 00:06:57.639
Yeah, I see what you're saying. Yeah, he actually did

117
00:06:58.560 --> 00:07:01.839
quote on the video that he where he got the

118
00:07:01.879 --> 00:07:05.839
clips from. He did credit then, uh whatever, whoever shot

119
00:07:05.920 --> 00:07:06.560
those videos.

120
00:07:07.079 --> 00:07:09.879
So I thought that was a little bit better.

121
00:07:10.800 --> 00:07:14.839
Sure, you know, assuring as if it like he you know,

122
00:07:14.879 --> 00:07:16.360
that's where he got it from. So I could just

123
00:07:16.399 --> 00:07:19.199
go back to that you know, platform to see just

124
00:07:19.319 --> 00:07:21.439
to verify it, you know, if I see.

125
00:07:21.199 --> 00:07:24.879
How he sourced it. Yeah, I mean basically the entire

126
00:07:24.920 --> 00:07:27.839
gist of it was a technology the Eighth Wars with

127
00:07:27.920 --> 00:07:33.439
they're coin it basically, uh, spying on people and watching

128
00:07:33.480 --> 00:07:36.800
their social media posts and suing people who have podcasts

129
00:07:36.800 --> 00:07:40.319
that talks against the ad L or against Jewish people.

130
00:07:40.480 --> 00:07:43.160
But I don't have a problem with any person, any culture,

131
00:07:43.240 --> 00:07:45.480
any race, just the bad people of them. And I

132
00:07:45.519 --> 00:07:48.600
know if we just exactly, if we just say this,

133
00:07:48.920 --> 00:07:51.319
that or the other, then that kind of clumps and

134
00:07:51.360 --> 00:07:54.560
globalizes and includes everybody, when you know, there are lots

135
00:07:54.600 --> 00:07:56.839
of good people in every race and culture out there.

136
00:07:57.199 --> 00:08:00.000
So that's what really kind of got me on there

137
00:08:00.199 --> 00:08:02.680
with the Ghost of Mississippi because we just got done

138
00:08:02.720 --> 00:08:05.160
talking about how the ad L would make their own

139
00:08:05.680 --> 00:08:09.360
hate agenda, right, they would do some propaganda that would

140
00:08:09.399 --> 00:08:12.360
get another party upset, somebody would die, then they'd get

141
00:08:12.360 --> 00:08:14.439
this other party to go and kill over here. And

142
00:08:14.720 --> 00:08:17.879
they were creating this mass chaos that caused everybody who

143
00:08:17.959 --> 00:08:20.160
was Jewish to believe that they didn't continue to fund

144
00:08:20.160 --> 00:08:25.160
this company and make make money for these people, that

145
00:08:25.680 --> 00:08:28.680
they would not have any protection. And they had. Actually,

146
00:08:28.759 --> 00:08:31.000
I want to say in that clip said they took

147
00:08:31.000 --> 00:08:34.679
out a five million dollar lawsuit against a podcaster who

148
00:08:34.759 --> 00:08:38.759
was speaking out against them. Idea that's insane.

149
00:08:39.200 --> 00:08:42.799
Mistakes they linked to is to equate any criticism of

150
00:08:42.960 --> 00:08:46.240
net Yahoo or Israel and to mean you're anti Semitic

151
00:08:46.320 --> 00:08:47.279
or you don't like Jews.

152
00:08:47.519 --> 00:08:48.960
That's not the cause, what's whoever?

153
00:08:49.559 --> 00:08:53.039
It isn't exactly, but they're going to turn it into that.

154
00:08:53.440 --> 00:08:56.000
Yeah they no, you're anti Semitic.

155
00:08:56.240 --> 00:08:59.039
Yeah yeah, but I've been giving a name when I

156
00:08:59.039 --> 00:09:01.120
don't hate any of you. I just don't like bad people.

157
00:09:01.240 --> 00:09:03.720
I mean, and I speak that very loudly. Who reccurds

158
00:09:03.720 --> 00:09:05.960
to every culture and race. It doesn't matter what you are.

159
00:09:06.000 --> 00:09:12.000
If you're bad, you're bad.

160
00:09:11.639 --> 00:09:15.759
They do it to Tucker Carlson on a daily Like

161
00:09:15.879 --> 00:09:18.919
Tucker Crosson has said many times, he's like, you know,

162
00:09:19.639 --> 00:09:21.960
it's not it's not it's not as a whole, it's

163
00:09:22.000 --> 00:09:25.080
the ones inside that are corrupt and blah blah blah.

164
00:09:25.080 --> 00:09:27.559
So every but every time he points something out, whether

165
00:09:27.600 --> 00:09:32.679
it's about nine to eleven or you know this person

166
00:09:32.799 --> 00:09:35.879
doing this crime, they always they literally will make a

167
00:09:35.919 --> 00:09:38.960
post about him, and it's insane. He's like the number

168
00:09:38.960 --> 00:09:42.720
one that he's still fighting against it and still speaking

169
00:09:42.759 --> 00:09:48.559
his truth about everything in disarray of whatever they say,

170
00:09:48.720 --> 00:09:49.679
you know, which is new though.

171
00:09:49.960 --> 00:09:52.720
This takes a lot of strength to do. You guys

172
00:09:52.759 --> 00:09:55.240
remember that propaganda that they put out, and I want

173
00:09:55.240 --> 00:09:57.279
to say it was some time after nine to eleven,

174
00:09:57.320 --> 00:09:59.960
of course, when they were trying to alleviate the fear

175
00:10:00.360 --> 00:10:03.559
of East Indians because of course the United States tried

176
00:10:03.600 --> 00:10:05.840
to put this on the East Indians, this you know,

177
00:10:06.000 --> 00:10:09.919
terrorist attack, and so they started taking out things from

178
00:10:10.000 --> 00:10:14.159
movies where they were portraying either Jewish people, black people

179
00:10:14.279 --> 00:10:19.799
or or East Indians from from looking like they are

180
00:10:19.879 --> 00:10:22.559
the villains in movies. Do you remember that stuff that

181
00:10:22.679 --> 00:10:23.200
was going on?

182
00:10:26.759 --> 00:10:29.159
You know, you have a specific movie that.

183
00:10:29.600 --> 00:10:33.000
Well So, for instance, I watched Ghosts of Mississippi. It

184
00:10:33.120 --> 00:10:35.559
was made by Rob Reiner, and of course he just

185
00:10:35.639 --> 00:10:43.919
recently passed, right, yeah, yeah, But obviously, being Jewish in

186
00:10:43.960 --> 00:10:46.960
the movie industry, he puts out this movie ghost to Mississippi,

187
00:10:46.960 --> 00:10:54.080
which was on Meger evers Ever's Meedgar Evers was murdered

188
00:10:54.120 --> 00:10:56.879
by a white guy, and one of the clips was

189
00:10:56.960 --> 00:11:00.399
actually a Jewish person saying they didn't like Niggers or Jews.

190
00:11:00.440 --> 00:11:03.600
And I was like, oh my god, well, yeah, who

191
00:11:03.639 --> 00:11:06.919
puts this? I mean, you're creating that hate facade in

192
00:11:06.960 --> 00:11:09.840
this media. You're portraying to people that we should hate

193
00:11:09.919 --> 00:11:13.600
these people. They used to portray, you know, Saudi Arabians

194
00:11:13.720 --> 00:11:19.320
as these villains on camels with swords and they're devils

195
00:11:19.360 --> 00:11:21.080
and they're this and there that, and this is the

196
00:11:21.320 --> 00:11:23.840
media that was doing this, and we're not in charge

197
00:11:23.879 --> 00:11:26.320
of the media, but we do know who is. So

198
00:11:26.799 --> 00:11:28.960
why would you do then put that out there, but

199
00:11:29.000 --> 00:11:32.000
then try to take back later And now you can't

200
00:11:32.039 --> 00:11:35.720
even touch a movie where there isn't some Jewish reference

201
00:11:35.759 --> 00:11:38.759
that's being pushed at you, whether it's you know, they're

202
00:11:38.759 --> 00:11:41.320
wearing the amicas or there's the Jewish star behind it. There,

203
00:11:41.480 --> 00:11:44.720
they're making it extremely clear what their agenda is to

204
00:11:44.799 --> 00:11:48.399
promote in these movies. And before it was hatred, and

205
00:11:48.440 --> 00:11:50.000
now you want to clean it up and say that

206
00:11:50.039 --> 00:11:52.200
we shouldn't be the ones hating. Why would you make

207
00:11:52.240 --> 00:11:55.639
a movie like that? Why would you make their statements?

208
00:11:56.120 --> 00:12:00.360
I just it's like the energy that they they feed

209
00:12:00.440 --> 00:12:04.080
off of. They feed for that energy, and then once

210
00:12:04.200 --> 00:12:07.000
they get you in that state of mind, of emotion

211
00:12:07.120 --> 00:12:10.720
of anger, then they have you right where they want you. Yeah,

212
00:12:11.039 --> 00:12:13.720
and then it just gives it that opportunity to lash

213
00:12:13.720 --> 00:12:15.080
out to you. It gives them that.

214
00:12:15.559 --> 00:12:17.840
Right, and then if you talk out or speak out

215
00:12:17.879 --> 00:12:23.120
against it, now you're an anti Semitic. I'm just at

216
00:12:23.120 --> 00:12:25.919
a loss for the game that they're playing with us psychologically,

217
00:12:25.960 --> 00:12:30.879
but we do know that it is psychological war. For so,

218
00:12:30.960 --> 00:12:34.360
we had some comments on the show last week that

219
00:12:34.440 --> 00:12:37.200
actually came in in the comments section of the live show,

220
00:12:37.360 --> 00:12:40.240
and it was at grunge nineties music. He says, my

221
00:12:40.360 --> 00:12:43.559
suspicions tell me Don Cheney after watching the two thousand

222
00:12:43.600 --> 00:12:50.240
and seven documentary, Can somebody please tell me the two

223
00:12:50.240 --> 00:12:52.919
thousand and I don't know why he said documentary because

224
00:12:53.120 --> 00:12:55.360
I want to say that Zodiac was a movie in

225
00:12:55.399 --> 00:12:58.720
two thousand and seven, but there could have been more documentaries.

226
00:12:58.759 --> 00:13:01.440
I haven't watched or didn't cat but a two.

227
00:13:01.240 --> 00:13:04.240
Thousand a day, Yeah, I did to go back and look,

228
00:13:04.399 --> 00:13:05.240
look good thing.

229
00:13:05.720 --> 00:13:07.639
Right, see what see what lies they're telling you at

230
00:13:07.679 --> 00:13:09.879
that point, and how they've changed or evolved over the years.

231
00:13:09.960 --> 00:13:11.639
That's kind of what I feel like I do.

232
00:13:12.320 --> 00:13:14.759
Oh yeah, that's why I watch every single one, just

233
00:13:14.759 --> 00:13:17.320
because of any case, because I've tried. I'm always trying

234
00:13:17.360 --> 00:13:19.279
to see what parallels I could pull out or what

235
00:13:20.080 --> 00:13:22.200
changes I can pull out, because that's how you know.

236
00:13:22.320 --> 00:13:26.159
It's a prime indicator of deception in their story.

237
00:13:27.120 --> 00:13:29.120
Now, and who is Don Chaney? I know that he's

238
00:13:29.120 --> 00:13:32.480
somebody in politics, but oh don Jon.

239
00:13:32.639 --> 00:13:37.440
I thought it Cheney. But I don't know who Don

240
00:13:37.559 --> 00:13:38.000
Jenney is.

241
00:13:38.840 --> 00:13:41.000
I don't either, so maybe that's a real person and

242
00:13:41.080 --> 00:13:43.159
not a politician. I think it was like they were

243
00:13:43.159 --> 00:13:45.519
trying to say Chris Christy or Doug Christie or whoever

244
00:13:45.519 --> 00:13:49.559
that Christy guy was another politician was the Zodiac as well.

245
00:13:50.679 --> 00:13:53.639
But anyways, he continues on to say, I feel like

246
00:13:53.720 --> 00:13:55.879
he knew he wasn't going to be around for long.

247
00:13:56.960 --> 00:13:59.000
I might have to actually now look at Don Cheney,

248
00:13:59.080 --> 00:14:00.919
because I saw the last name, I just figured it

249
00:14:00.960 --> 00:14:07.200
was a politician. And then at Jacob Shulti seven nine

250
00:14:07.279 --> 00:14:09.799
oh seven. He's the one that commented last week in

251
00:14:09.840 --> 00:14:13.080
regards to Jack Terrence not having enough letters to meet

252
00:14:13.080 --> 00:14:16.840
the Z thirteen criteria, and he said, you can do that.

253
00:14:17.360 --> 00:14:17.559
Well.

254
00:14:17.600 --> 00:14:20.639
I had responded back that Jack actually does fit if

255
00:14:20.639 --> 00:14:23.559
you include his middle initial, which he consistently used all

256
00:14:23.600 --> 00:14:26.240
of his life, and he says you can do that

257
00:14:26.279 --> 00:14:29.559
with any suspect. Just saying Ed Edwards's thirteen characters as

258
00:14:29.559 --> 00:14:33.600
well doesn't mean anything, and he's right, it's exactly. It

259
00:14:33.679 --> 00:14:36.000
does not mean anything these solves these people are coming

260
00:14:36.080 --> 00:14:37.799
up with, because it's literally I'm going to show you

261
00:14:37.840 --> 00:14:40.960
through this cryptography how impossible it would be unless you

262
00:14:41.039 --> 00:14:43.919
actually had the solve, to be able to even come

263
00:14:43.960 --> 00:14:46.440
to any type of a conclusion in these messages without

264
00:14:46.440 --> 00:14:48.960
a key. But what it does mean to me is

265
00:14:48.960 --> 00:14:51.440
that I could not rule Jack out. So in my

266
00:14:51.840 --> 00:14:55.559
travels through this case, my goal was to hopefully hit on,

267
00:14:55.759 --> 00:14:58.440
find some piece of information or get some evidence that

268
00:14:58.480 --> 00:15:01.919
would support Jack Terrance. Could not No way is he

269
00:15:02.000 --> 00:15:04.720
the zodiac, and not only have I not been provided

270
00:15:04.879 --> 00:15:08.200
by all the naysayers like Mike Moreford or Tom Voyd

271
00:15:08.279 --> 00:15:10.440
or Orangeak or any of these people who want to,

272
00:15:10.679 --> 00:15:12.679
you know, dig deadis up out of the grave and

273
00:15:13.159 --> 00:15:15.840
call him a liar once again for frauding evidence. He

274
00:15:15.879 --> 00:15:19.159
didn't fraud. Not once have they come out and actually

275
00:15:19.200 --> 00:15:21.840
brought me any evidence. And that's what this whole case

276
00:15:21.879 --> 00:15:24.000
is supposed to be about. I mean, I'm out here

277
00:15:24.039 --> 00:15:26.240
producing it for the public. You're welcome to come in

278
00:15:26.279 --> 00:15:28.960
and chime in anytime you like, but show us how

279
00:15:28.960 --> 00:15:31.480
it can't be. Don't don't bash the people who are

280
00:15:31.480 --> 00:15:34.360
delivering the message, because once again, my whole goal was

281
00:15:34.399 --> 00:15:36.480
to try and rule Jack out, and every step of

282
00:15:36.480 --> 00:15:38.440
the way, all I could do is rule him back in.

283
00:15:38.759 --> 00:15:43.480
So yeah, it's funny that they brought up Edward Edwards

284
00:15:43.519 --> 00:15:47.159
because not many people talk about Edward Edwards, and I

285
00:15:47.279 --> 00:15:49.879
found a lot of stuff on him, and so that's

286
00:15:49.960 --> 00:15:51.519
kind of weird that he points that one out, because

287
00:15:51.559 --> 00:15:53.320
I don't see that often, and.

288
00:15:53.360 --> 00:15:56.720
I feel like ed Edwards was somebody that another a

289
00:15:56.759 --> 00:16:00.279
document examiner in the industry, had backed. Only he able

290
00:16:00.320 --> 00:16:03.799
to realize that the handwriting. He was making the comparison

291
00:16:03.840 --> 00:16:06.879
to the Zodiac notes was actually the minister of a

292
00:16:06.919 --> 00:16:10.240
wedding because he was using a marriage certificate that is

293
00:16:10.320 --> 00:16:13.279
ultimately never filled out by the parties. They may sign it,

294
00:16:13.679 --> 00:16:15.480
but we don't fill it out. It's filled out and

295
00:16:15.519 --> 00:16:17.799
officiated by the person who's handling the marriage. So he

296
00:16:17.879 --> 00:16:19.679
ended up getting burnt in the butt by that one

297
00:16:19.879 --> 00:16:25.080
and be interested Edward.

298
00:16:25.120 --> 00:16:28.679
It was a very very prominent criminal. He did kill

299
00:16:28.720 --> 00:16:32.120
me multiple people. He was very very He was like

300
00:16:32.120 --> 00:16:34.960
a Ted Bundy kind of dude. On the he was

301
00:16:35.000 --> 00:16:39.080
like on these game shows on television and just smiling

302
00:16:39.159 --> 00:16:41.879
like he's just like a superstar. And then you don't

303
00:16:42.240 --> 00:16:43.720
killing people at the same time.

304
00:16:43.840 --> 00:16:47.200
So he was starting, I just don't feel like a

305
00:16:47.279 --> 00:16:50.000
serial killer does these type of things. Tell me another

306
00:16:50.080 --> 00:16:54.240
one that goes on talk shows, Tell me another one. Exactly.

307
00:16:55.639 --> 00:16:58.639
It just doesn't. It just doesn't equate in my mind, Like,

308
00:16:58.679 --> 00:17:01.279
you have better things to play. I'm like your next murder.

309
00:17:03.399 --> 00:17:04.079
Yeah.

310
00:17:04.279 --> 00:17:07.640
Oh man, I was a mind boggling on that one, because,

311
00:17:07.960 --> 00:17:09.839
like if you go back and look at those videos,

312
00:17:09.960 --> 00:17:12.599
it's hilarious to watch because you're like, are you kidding me?

313
00:17:13.240 --> 00:17:16.279
Yeah? What and I did see some of them. So

314
00:17:18.000 --> 00:17:20.920
so back to cryptography The Science of Secret Writing by

315
00:17:21.000 --> 00:17:24.359
Jack H. Schultz, a question document examiner who appears to

316
00:17:24.400 --> 00:17:27.279
have taught this class. The key that he's using in

317
00:17:27.359 --> 00:17:30.799
it is the University of Chicago, which is what we

318
00:17:31.119 --> 00:17:33.319
talked about last week. So I always thought that was

319
00:17:33.400 --> 00:17:36.680
extremely interesting. Since we're talking about Jack, we know that

320
00:17:36.799 --> 00:17:40.079
Jack has his experience with Chicago, Illinois, and we know

321
00:17:40.440 --> 00:17:47.559
I'm sorry, Reno, if you're watching this Illinois, let me

322
00:17:47.559 --> 00:17:49.599
make sure I don't pronounce that ass. I mean damned

323
00:17:49.599 --> 00:17:52.240
if I'm you know, wrong, every time there's a letter

324
00:17:52.240 --> 00:17:57.880
that doesn't belong in a word. So I throw it

325
00:17:57.920 --> 00:17:59.799
up here because I thought some of these systems were

326
00:17:59.880 --> 00:18:02.960
very consistent with the scorpion letters and these ciphers that

327
00:18:02.960 --> 00:18:05.680
were sent to John Walsh. And when I look at these,

328
00:18:06.039 --> 00:18:10.519
it's very obvious that there's no duplicative symbols, which is

329
00:18:10.640 --> 00:18:13.720
obviously what they talk about when they talk about multi

330
00:18:14.240 --> 00:18:18.519
transposition or multi substitution ciphers where they use more than

331
00:18:18.599 --> 00:18:22.880
one particular symbol, say they use five different symbols for

332
00:18:22.920 --> 00:18:25.200
the letter E. That way you can't map out how

333
00:18:25.240 --> 00:18:27.559
many e's are in there because eb and the largest

334
00:18:27.599 --> 00:18:31.480
letter in the alphabet or the largest letter used in

335
00:18:31.519 --> 00:18:34.319
the English language means that you should see more ease,

336
00:18:34.319 --> 00:18:36.759
and it would make it easy to crack somebody's code

337
00:18:36.759 --> 00:18:39.079
by figuring out how many you know, what was the

338
00:18:39.200 --> 00:18:42.200
largest used symbol in there that equates to ease. Now

339
00:18:42.240 --> 00:18:44.359
you start breaking it down from there, and I'm pretty

340
00:18:44.400 --> 00:18:46.599
sure that's how the Hardens did it. They probably went

341
00:18:46.640 --> 00:18:49.200
with the notion that, you know, double symbols are going

342
00:18:49.240 --> 00:18:51.759
to indicate double letters, and we're going to see that

343
00:18:51.799 --> 00:18:54.599
in here, so let me stop talking. It says introductions,

344
00:18:54.720 --> 00:18:57.640
check books, laborat where we notes, computer programs, and blueprints

345
00:18:57.640 --> 00:19:00.160
are among the many sensitive materials each of us and

346
00:19:00.200 --> 00:19:03.160
create and use every day. Naturally, it isn't so much

347
00:19:03.200 --> 00:19:05.799
the physical objects themselves which are of value, as it

348
00:19:05.839 --> 00:19:09.920
is the information each contains. Valuables are most easily lost

349
00:19:09.960 --> 00:19:13.079
in transition or in transit, and when data is hijacked,

350
00:19:13.079 --> 00:19:16.160
it is usually the in transmitted or transported. At the time,

351
00:19:16.680 --> 00:19:19.559
codes and ciphers were invented to assure the security of

352
00:19:19.640 --> 00:19:24.960
information in transit. Historically, these there have been hundreds of

353
00:19:24.960 --> 00:19:28.279
ways to keep secret the letters and messages of statesmen, generals,

354
00:19:28.319 --> 00:19:32.680
and traders. In each area era, once a certain level

355
00:19:32.680 --> 00:19:37.559
of literacy is reached, cryptology is born annew In each age,

356
00:19:37.680 --> 00:19:41.400
the means of transmitting and guarding information has been determined

357
00:19:41.400 --> 00:19:44.880
by the technology of the time. While Julius Caesar used

358
00:19:44.880 --> 00:19:48.039
a simple rule of substitution, the Confederate State issued theirs

359
00:19:48.119 --> 00:19:52.480
five machined grass wheels for inciphering telegrams. This is the

360
00:19:52.519 --> 00:19:55.839
computer age. The electronic devices, which are affordable to anyone,

361
00:19:55.880 --> 00:20:00.000
make it possible total recall of information and rapid process

362
00:20:00.079 --> 00:20:02.920
sname of data. They also make it possible the creation

363
00:20:03.000 --> 00:20:05.680
of code so complex yet so simple to use that

364
00:20:05.720 --> 00:20:08.000
the social structure of the twenty first century will be

365
00:20:08.039 --> 00:20:10.920
in part determined by the outcome of this trend toward

366
00:20:11.039 --> 00:20:14.279
computerization of all information transfer.

367
00:20:15.799 --> 00:20:20.039
Here right, and so we should be able to figure

368
00:20:20.039 --> 00:20:22.359
it out at this point like at this like you

369
00:20:22.400 --> 00:20:26.559
know no, well, And I think that that's why Orangchack

370
00:20:26.680 --> 00:20:30.240
ultimately developed his computer program where he gave everybody a

371
00:20:30.279 --> 00:20:32.160
shot and try it solving the three forty.

372
00:20:32.559 --> 00:20:35.400
I do see the system inside this packet that I believe.

373
00:20:35.480 --> 00:20:38.400
Orangechac claims that the three forty was created with But wait,

374
00:20:38.440 --> 00:20:40.960
till you get into this. You guys, this is just crazy.

375
00:20:41.400 --> 00:20:44.240
So here is one particular sense, and this is of

376
00:20:44.240 --> 00:20:47.640
course an entry code. This is a way to disguise numbers,

377
00:20:47.720 --> 00:20:49.880
Like if you had a passcode or something like that,

378
00:20:49.960 --> 00:20:53.000
you could simply break down the squares after inserting your

379
00:20:53.079 --> 00:20:55.599
numbers in the direction you want. And keep in mind,

380
00:20:55.839 --> 00:20:58.720
those don't have to run one, two, three, four, five, six.

381
00:20:58.799 --> 00:21:01.839
They could run absolutely back backwards one two three and

382
00:21:01.880 --> 00:21:05.480
then onward and zigzag or even move in a pattern

383
00:21:05.519 --> 00:21:08.839
that is not consistent with straight left to right reading

384
00:21:09.359 --> 00:21:14.440
and like pretty much. And then once you actually map

385
00:21:14.480 --> 00:21:17.359
out those sections of that what is this the tic

386
00:21:17.400 --> 00:21:19.640
tac toe game? Right, Let's call it that because that

387
00:21:19.799 --> 00:21:23.039
for our listeners it looks like you're starting a game

388
00:21:23.079 --> 00:21:24.720
of tic tac toe. Then you're going to enter a

389
00:21:24.799 --> 00:21:27.519
number in each one of these sections. And then once

390
00:21:27.920 --> 00:21:30.559
you've determined what your passcode is going to be, you

391
00:21:30.559 --> 00:21:32.960
would break those sections off the tic tac toe and

392
00:21:33.000 --> 00:21:35.480
you would get like your right angles, your left angles,

393
00:21:35.480 --> 00:21:38.680
you get your symbols that look like a staple, and

394
00:21:39.000 --> 00:21:41.039
to the left, to the right, and so on and

395
00:21:41.079 --> 00:21:44.480
so forth to create that actual code. But again, somebody

396
00:21:44.480 --> 00:21:47.119
would have to know that what you're using is this

397
00:21:47.319 --> 00:21:50.720
key in order to determine what those were on the

398
00:21:50.759 --> 00:21:54.279
other end. Now, when I look at the John Walsh

399
00:21:54.319 --> 00:21:57.440
the scorpion, what letters. Look, here's one of those symbols.

400
00:21:57.680 --> 00:22:00.880
Here's another one of those symbols. Here's more. They're kind

401
00:22:00.880 --> 00:22:05.240
of all over the place in here. Let's see, there's

402
00:22:05.319 --> 00:22:09.839
more down here. So we are definitely seeing this type

403
00:22:09.920 --> 00:22:14.160
of a symbol system in the scorpion letters. Now the

404
00:22:14.160 --> 00:22:18.200
Spartan cylinder is again we see University of Illinois. Sorry,

405
00:22:18.240 --> 00:22:22.839
I said University of Chicago. It's University of Illinois. The

406
00:22:22.880 --> 00:22:27.039
first type of scientific cryptogram developed by early Greeks is

407
00:22:27.079 --> 00:22:31.880
the block pattern. So basically, you go out one two

408
00:22:31.960 --> 00:22:34.759
three four five at the top, one two, three four

409
00:22:34.839 --> 00:22:38.200
five on the left, and then you enter in your alphabet.

410
00:22:38.400 --> 00:22:41.920
And in this particular case, the alphabet is actually reading downward,

411
00:22:42.200 --> 00:22:44.640
so it doesn't go abc to the right. It goes

412
00:22:44.680 --> 00:22:47.680
abc down and then it goes back to the top

413
00:22:47.759 --> 00:22:49.920
for the f under number two and then works its

414
00:22:49.920 --> 00:22:52.240
way back down, so it's kind of a zigzag pattern.

415
00:22:52.640 --> 00:22:56.200
But again, you could arrange these letters in here however

416
00:22:56.240 --> 00:22:58.839
you want, as long as the other side has the key,

417
00:22:58.839 --> 00:23:01.720
they're going to be able to figure it out. Basically,

418
00:23:01.799 --> 00:23:04.440
the University of Illinois at Chicago broke down to these

419
00:23:04.480 --> 00:23:07.200
particular numbers because when you when you're using an A,

420
00:23:07.440 --> 00:23:11.079
you're using the number eleven. You're using an F, you're

421
00:23:11.160 --> 00:23:14.400
using the number twelve. So you're combining the numbers on

422
00:23:14.440 --> 00:23:17.960
the left and at the top to create which whichever

423
00:23:18.319 --> 00:23:22.160
numeric value for that particular letter. And I serves as J.

424
00:23:22.480 --> 00:23:25.839
I've seen this before, I wanted. I'm not sure whose

425
00:23:26.039 --> 00:23:28.279
solve it was in. I want to say that it

426
00:23:28.359 --> 00:23:31.920
might have been Lauren swearing him and Harriet's where they

427
00:23:31.960 --> 00:23:34.400
believed I served as J. And and I don't know

428
00:23:34.440 --> 00:23:38.119
if Harriet has ever personally seen something like this particular pamphlet,

429
00:23:38.160 --> 00:23:40.759
because again, it looked like something more personal that somebody

430
00:23:40.759 --> 00:23:43.200
had kept versus something that was mass produced.

431
00:23:43.680 --> 00:23:47.519
Is Harriet just self taught.

432
00:23:46.400 --> 00:23:51.240
Uh kind of? I think that between learning Dennis, Dennis

433
00:23:51.519 --> 00:23:56.279
taught her Jack's system. Then she her father was also

434
00:23:56.440 --> 00:24:06.200
a maritime Uh they're not civilian, it's military, but yeah,

435
00:24:06.359 --> 00:24:09.759
merchant marine, sorry, and so he was aware of some

436
00:24:09.799 --> 00:24:11.799
of these things, so she learned some of this. I

437
00:24:11.799 --> 00:24:13.920
guess really up and then there was the addition to

438
00:24:14.000 --> 00:24:17.039
how Jack did things. And then of course in the end,

439
00:24:17.079 --> 00:24:19.640
I think that she just kind of picked the system

440
00:24:19.720 --> 00:24:22.200
that she felt that Jack would use, but we can

441
00:24:22.240 --> 00:24:24.400
see that he didn't always use the same system. So

442
00:24:24.440 --> 00:24:27.400
I get a little leary sometimes, especially when we can't

443
00:24:27.480 --> 00:24:32.119
prove up how her solves were solved when she's continuously

444
00:24:32.200 --> 00:24:35.319
using exactly the same system instead of multiple systems or

445
00:24:35.359 --> 00:24:41.799
different systems. They also have the Caesar's substitution method, which

446
00:24:41.839 --> 00:24:45.200
is basically, you're going to assign whatever letter to whatever

447
00:24:45.599 --> 00:24:50.160
letter that you want it to conceal. And again you're

448
00:24:50.200 --> 00:24:53.880
going to need to know what these letters are substituted

449
00:24:53.920 --> 00:24:56.359
to in order to solve that. So there was the

450
00:24:56.440 --> 00:25:00.319
Julian cipher. Here, here was the Augustine cipher. Then we

451
00:25:00.359 --> 00:25:03.799
had substitution code. So it basically showed you how to

452
00:25:04.240 --> 00:25:08.839
use words to create a ad I would guess in

453
00:25:08.880 --> 00:25:12.400
a newspaper to determine what it is that the person

454
00:25:12.480 --> 00:25:15.480
is trying to say. So something that in the newspaper

455
00:25:15.519 --> 00:25:18.240
would say, dear Bill, thanks for the parent love Lisa

456
00:25:18.640 --> 00:25:21.920
really broke down to nine am Saturday, lake View Motel.

457
00:25:25.000 --> 00:25:27.079
So that's the message you put in the newspaper if

458
00:25:27.079 --> 00:25:28.880
you wanted to get him across to the other side.

459
00:25:29.000 --> 00:25:31.240
They but of course then also need to know that

460
00:25:31.279 --> 00:25:34.559
Bill equals nine am, Bob equals ten am, Fred equals

461
00:25:34.559 --> 00:25:37.400
eleven am. They have to know these things.

462
00:25:37.480 --> 00:25:41.319
Okay, So, Nanette, that makes me wonder if those numbers

463
00:25:41.359 --> 00:25:45.920
I found a few months ago that were on Jack's

464
00:25:45.960 --> 00:25:48.279
phone bill that I looked up and found the newspaper,

465
00:25:48.359 --> 00:25:50.720
if those were those type of things where he could

466
00:25:50.720 --> 00:25:53.200
call that number and it would give him a message,

467
00:25:54.240 --> 00:25:56.559
give me some type Yes, it would give him some

468
00:25:56.599 --> 00:25:58.640
type of key or message, just like you're talking about.

469
00:25:59.200 --> 00:26:04.160
Yeah, that was my supposition. I really kind of thought

470
00:26:04.200 --> 00:26:06.759
that if he was making that phone call, it first off,

471
00:26:06.759 --> 00:26:09.519
he'd have to know that to look for those particular ads,

472
00:26:09.759 --> 00:26:11.559
and then second off, he would have to know a

473
00:26:11.559 --> 00:26:13.680
call to get the key in order to decipher what

474
00:26:13.759 --> 00:26:17.000
that said. I don't know if there's any way to

475
00:26:17.079 --> 00:26:19.480
backtrack that. It maybe something I play around with after

476
00:26:19.519 --> 00:26:23.640
I'm done studying this whole cryptography thing. But aside from

477
00:26:23.640 --> 00:26:26.400
the substitution cipher, so we had substitution code and then

478
00:26:26.400 --> 00:26:29.160
we have substitution cipher once again. But then they have

479
00:26:29.400 --> 00:26:34.400
also how to embed a message from within a book.

480
00:26:35.240 --> 00:26:38.559
So a cipher is a system of substitution and or transposition.

481
00:26:38.960 --> 00:26:43.759
And Webster's New World Dictionary of American Language, you would

482
00:26:43.799 --> 00:26:46.240
code it with the page number, the column number, and

483
00:26:46.279 --> 00:26:49.200
the word number. And when I did that and look

484
00:26:49.279 --> 00:26:52.480
this up, so we have we have page number two

485
00:26:52.519 --> 00:26:56.519
fifty seven. Call them one, I'm sorry, call them two,

486
00:26:57.400 --> 00:27:00.680
word number twelve. So you went down twelve and guess

487
00:27:00.720 --> 00:27:03.680
what boom? You come up with the definition in the

488
00:27:03.720 --> 00:27:08.039
World's New World Webster's New World Dictionary of American Language

489
00:27:08.079 --> 00:27:11.680
that tells you about a cipher and its purposes. This

490
00:27:11.720 --> 00:27:14.640
is how they would use books. Then you get a

491
00:27:14.720 --> 00:27:19.160
numerical value that includes page number, column if there's columns,

492
00:27:19.160 --> 00:27:22.000
I'm sure, and then the word number. So you're going

493
00:27:22.079 --> 00:27:24.400
to go down and that I think that alludes to

494
00:27:24.480 --> 00:27:27.799
the FBI making the comment that there was the last,

495
00:27:28.000 --> 00:27:31.920
first and last word of these messages from the zodiac

496
00:27:32.039 --> 00:27:35.440
that they were looking at to create. But Lauren Swerringham

497
00:27:35.480 --> 00:27:42.039
did after he collected every eleventh, every eleventh, every I'm sorry,

498
00:27:42.440 --> 00:27:46.680
every even line, he collected the first and last word

499
00:27:46.720 --> 00:27:48.559
of it and came up with a message that talked

500
00:27:48.559 --> 00:27:52.599
about basically mk ultra needing more work and these other

501
00:27:52.640 --> 00:27:54.880
things that he solved out of that. So that is

502
00:27:55.160 --> 00:28:01.359
very consistent with some of these systems. Again, here's another one.

503
00:28:01.799 --> 00:28:04.640
This is the position cipher. Again it starts with the

504
00:28:04.720 --> 00:28:08.319
tic tac toe, but then you have these additional x's

505
00:28:08.640 --> 00:28:12.799
that are included. You also have them with dots arranged

506
00:28:12.799 --> 00:28:15.160
inside of the tic tac toe, and then you again

507
00:28:15.240 --> 00:28:18.839
have the X that has the dots positioned in it. Now,

508
00:28:18.920 --> 00:28:22.920
once you fill out in each area of the tic

509
00:28:23.000 --> 00:28:25.319
tac toe and the X march, you fill out the

510
00:28:25.359 --> 00:28:28.680
actual letters. Again, you have to know where these letters

511
00:28:28.759 --> 00:28:30.880
lay in here in order for it to make any sense.

512
00:28:30.960 --> 00:28:33.119
Otherwise you're still not going to come up with anything.

513
00:28:33.880 --> 00:28:36.920
But now you can see how they pull these out.

514
00:28:37.079 --> 00:28:39.440
So we have this staple mark it looks like a

515
00:28:39.440 --> 00:28:42.880
staple to me, with a dot in the center, and

516
00:28:42.960 --> 00:28:45.480
that comes from the tic tac toe that had dots

517
00:28:45.519 --> 00:28:49.359
in it. Now, let's take a look again at the

518
00:28:49.480 --> 00:28:54.160
ciphers to John Walsh, and we can clearly see all

519
00:28:54.200 --> 00:28:58.359
of these. Here's these X marks again with dots at

520
00:28:58.400 --> 00:29:01.279
different levels inside of them, and you can go through

521
00:29:01.319 --> 00:29:03.240
and you can find them pretty much all over here.

522
00:29:03.279 --> 00:29:05.759
I want to say, there's also let's see, oh, here's

523
00:29:05.839 --> 00:29:11.160
the left word facing V with the dot in the center.

524
00:29:11.240 --> 00:29:14.119
That is definitely one of the symbols that are used

525
00:29:14.160 --> 00:29:17.519
in this particular ciphering message. So now we can see

526
00:29:17.519 --> 00:29:22.720
that there's at least two different styles of cipher coating

527
00:29:23.079 --> 00:29:26.200
that's been used in John Walsh's stuff. And we also

528
00:29:26.240 --> 00:29:28.240
see some consistency with some of the stuff that we're

529
00:29:28.240 --> 00:29:32.039
seeing in the Dama lass, which even more can even

530
00:29:32.119 --> 00:29:35.200
more confirms that if this was a reward letter, that

531
00:29:35.359 --> 00:29:37.839
is to reach out to somebody, you could only be

532
00:29:37.920 --> 00:29:42.240
asking the suspect to solve this particular thing. Nobody else

533
00:29:42.279 --> 00:29:44.200
in the public was going to be able to solve this.

534
00:29:46.240 --> 00:29:48.599
I don't even know if I've seen a solve on

535
00:29:48.640 --> 00:29:53.319
this other than Lauren Swaringham and Harriet. So they are

536
00:29:53.319 --> 00:29:56.680
definitely communicating with a system that they are completely aware

537
00:29:56.720 --> 00:29:59.039
of that they know he has as well. And again

538
00:29:59.119 --> 00:30:02.119
this tells me that the media is facilitating back and

539
00:30:02.160 --> 00:30:07.200
forth between the Zodiac and the powers that be. Here's

540
00:30:07.279 --> 00:30:10.200
another one. This is another one. I went, WHOA, we

541
00:30:10.279 --> 00:30:13.880
have position and shadow ciphers. So it looks like a clock,

542
00:30:13.960 --> 00:30:19.000
does it not? Yeah, got the one, two, three, four, seven, eight, nine, ten, eleven,

543
00:30:19.079 --> 00:30:20.640
twelve all the way around. Made me want to go

544
00:30:20.720 --> 00:30:24.400
back and visit the different positions and markings on the

545
00:30:24.440 --> 00:30:28.200
zodiac symbols that we saw. But it also got into

546
00:30:28.240 --> 00:30:32.000
these other odd boxes, so it looks like a four square,

547
00:30:32.359 --> 00:30:35.319
and then these four squares could actually have slants in

548
00:30:35.359 --> 00:30:38.839
them that would create some vs in different directions and

549
00:30:39.039 --> 00:30:42.359
break it breaks the box up into multiple different ways

550
00:30:42.359 --> 00:30:45.079
of being able to use just these box symbols for

551
00:30:45.160 --> 00:30:47.599
all the letters of the alphabet. And then I moved

552
00:30:47.599 --> 00:30:49.240
to the right guy about fell out of my chair

553
00:30:49.440 --> 00:30:53.759
because this is the Boosball system that was not available

554
00:30:53.759 --> 00:31:01.200
to the public. It was Alan Alan, I want to say, Hayes,

555
00:31:01.359 --> 00:31:04.240
but I don't know if I'm right. Booze. It was

556
00:31:04.279 --> 00:31:08.319
a three name war defense company that used these particular

557
00:31:08.359 --> 00:31:11.200
symbols as a way to indicate whether or not they're contracts,

558
00:31:11.279 --> 00:31:15.079
what level their contracts had been completed. You go, So

559
00:31:15.279 --> 00:31:17.359
some of these areas that look like they're chunked out

560
00:31:17.400 --> 00:31:19.720
of the circle would actually be colored in and darkened.

561
00:31:19.799 --> 00:31:22.319
Here they're just giving you kind of a stick figure

562
00:31:22.400 --> 00:31:25.079
version of it, with no blackening of any of the sides.

563
00:31:25.400 --> 00:31:27.680
But let's go back over here now to once again

564
00:31:28.400 --> 00:31:32.359
John Walsh's cipher. Look here, guys, we've got all of

565
00:31:32.400 --> 00:31:35.559
the booze ball systems that was used originally in the

566
00:31:35.640 --> 00:31:38.039
Zodiac ciphers, but now we see them popping up in

567
00:31:38.119 --> 00:31:41.799
John Walsh's ciphers as well. That makes system number three

568
00:31:42.000 --> 00:31:47.640
and in reality, system number four. Because this four four

569
00:31:47.680 --> 00:31:49.920
square boxes that we see going on here, we can

570
00:31:49.960 --> 00:31:52.400
see right here, here's a four square box with two

571
00:31:52.440 --> 00:31:58.119
dots in it. Here's another but it's got an X

572
00:31:58.119 --> 00:32:00.240
with two dots, so it's still.

573
00:32:00.119 --> 00:32:00.640
We see X.

574
00:32:02.279 --> 00:32:05.119
Yeah. Yeah, So now we're onto what did I just say?

575
00:32:05.160 --> 00:32:09.440
Now we're on to number four. Four different systems of

576
00:32:09.519 --> 00:32:13.240
symbols that are being used in this single cipher. Here's

577
00:32:13.279 --> 00:32:15.400
another one which I do think that there is some

578
00:32:15.480 --> 00:32:19.519
credibility in this as far as the triangles are concerned

579
00:32:19.519 --> 00:32:22.119
with the different dots, because we see different triangles that

580
00:32:22.160 --> 00:32:25.319
have dots on the points. We have slash mark through

581
00:32:25.359 --> 00:32:27.960
one left side. We've got them with dots on the

582
00:32:27.960 --> 00:32:30.039
points and then a dot in the center. So there

583
00:32:30.160 --> 00:32:32.880
is kind of this new pyramid code that I was

584
00:32:32.920 --> 00:32:36.000
looking at, which then allocates a letter to each level

585
00:32:36.039 --> 00:32:39.680
of the pyramid, and then you encrypt that with the

586
00:32:41.799 --> 00:32:44.759
double letter that is found inside the box, so the

587
00:32:44.880 --> 00:32:48.200
D is actually a N. This makes it even more

588
00:32:48.240 --> 00:32:50.880
complicated to determine what the author's saying, because now he's

589
00:32:50.960 --> 00:32:57.759
used double the amount of symbols in order to create

590
00:32:57.799 --> 00:33:01.160
a message that's only half its size. And again without

591
00:33:01.160 --> 00:33:03.960
that key, I can't imagine anybody being able to figure

592
00:33:03.960 --> 00:33:09.519
that out. Yeah, we have double transposition. So here it

593
00:33:09.559 --> 00:33:14.680
gets even heavier. K one is here's the cipher key

594
00:33:14.720 --> 00:33:16.480
from K one and then you have to go down

595
00:33:16.519 --> 00:33:25.240
here and find let's see where I would find K one. Oh,

596
00:33:25.279 --> 00:33:27.039
it could have marked that out ahead of him. Oh no,

597
00:33:27.160 --> 00:33:34.240
this is the same University of Illinois at Chicago, so that

598
00:33:34.720 --> 00:33:40.279
was a little bit larger. Oh okay, so here's the encryption.

599
00:33:40.400 --> 00:33:43.279
So here's the message University of Illinois at Chicago. And

600
00:33:43.319 --> 00:33:45.759
it breaks down to you once you use the system

601
00:33:45.759 --> 00:33:49.839
that they've plotted out up here into these letters, which

602
00:33:49.920 --> 00:33:52.839
again means absolutely nothing. And what if the person doesn't

603
00:33:52.839 --> 00:33:54.680
even break them up, you wouldn't even know it was

604
00:33:54.720 --> 00:33:58.920
a five square box or a six square box. Because

605
00:33:59.400 --> 00:34:02.720
this when we look at the zodiac stuff, it's all combined.

606
00:34:02.759 --> 00:34:05.599
It doesn't give us a break or space. It doesn't

607
00:34:05.680 --> 00:34:08.360
tell us when we should start and stop and carry

608
00:34:08.360 --> 00:34:15.039
on with another word. Again, just very complicated. Then we

609
00:34:15.119 --> 00:34:18.920
have multiple cipher substitution code, which we talked a little

610
00:34:18.920 --> 00:34:21.119
bit about in the beginning of this. And here's your

611
00:34:21.119 --> 00:34:23.719
plain text at the top, which is your alphabet. But

612
00:34:23.800 --> 00:34:26.599
then you've got cipher one, Cipher two, cipher three, cipher four,

613
00:34:26.679 --> 00:34:29.440
So you have four different letters for the letter A,

614
00:34:29.559 --> 00:34:32.840
q z LT. Now it's going to make finding those

615
00:34:32.880 --> 00:34:37.079
a's far more complicated because they've been assigned for different symbols.

616
00:34:37.719 --> 00:34:40.440
We also have routing patterns, so you have the simple

617
00:34:40.440 --> 00:34:45.800
horizontal that moves from left to right or from right

618
00:34:45.840 --> 00:34:52.039
to left, or from bottom to top again left to

619
00:34:52.079 --> 00:34:55.079
right and then right to left, from bottom to top.

620
00:34:55.320 --> 00:34:59.440
In the simple horizontal, simple vertical just runs down the

621
00:34:59.480 --> 00:35:02.800
columns A, B, C, D, move back to the top

622
00:35:02.880 --> 00:35:05.199
to E. But this can also be backwards, as in

623
00:35:05.280 --> 00:35:07.599
number two, and it could also run from bottom to

624
00:35:07.639 --> 00:35:09.960
top and top to bottom again in three and four

625
00:35:10.719 --> 00:35:16.280
alternate horizontal, which is basically moving in the same direction

626
00:35:16.519 --> 00:35:21.800
but then backwards, almost as if well we haven't seen

627
00:35:21.880 --> 00:35:24.559
I haven't seen anything in here where they actually transposed

628
00:35:24.599 --> 00:35:27.519
the actual symbol, which we've seen the zodiac do a

629
00:35:27.559 --> 00:35:30.159
lot of reverse the R, reverse the K, reverse the P,

630
00:35:30.719 --> 00:35:34.400
this kind of thing. But it does have the the

631
00:35:34.880 --> 00:35:37.960
the alternate horizontal, which moves in a completely different pattern.

632
00:35:38.639 --> 00:35:41.519
You also have what they called the mind reading word code.

633
00:35:41.719 --> 00:35:44.719
I thought this one was extremely interesting. It's interesting. So

634
00:35:44.800 --> 00:35:49.079
you literally assign a word to a letter. So A

635
00:35:49.320 --> 00:35:54.239
equals you as in you, B equals how C equals

636
00:35:54.280 --> 00:35:58.079
now D equals the So by the time you've messaged

637
00:35:58.119 --> 00:36:01.519
out University of Illinois at Chicago, though, it says our

638
00:36:01.719 --> 00:36:08.039
all who for hit not may who get put has all? Now?

639
00:36:08.039 --> 00:36:10.119
Of course they're very nice and they give us the spaces.

640
00:36:10.159 --> 00:36:13.360
I don't think you'd see this in a typical cipher,

641
00:36:13.400 --> 00:36:19.639
but whole let who all has who may you get

642
00:36:19.960 --> 00:36:24.800
now at who now you was has? You'd get that

643
00:36:24.920 --> 00:36:27.519
message and have to have the key in order to

644
00:36:27.559 --> 00:36:32.199
determine that it says University of Illinois at Chicago. Then

645
00:36:32.239 --> 00:36:36.440
we have alphabet blocking, and that blocking can happen on

646
00:36:36.519 --> 00:36:39.719
any level. This one is actually a five y five.

647
00:36:40.079 --> 00:36:43.679
This one that we see here is a nine by nine,

648
00:36:43.880 --> 00:36:47.880
but the left the left the downward motion gives you

649
00:36:47.960 --> 00:36:51.679
actually three options. So A could be thirty one, it

650
00:36:51.719 --> 00:36:54.079
could be sixty one, it could be ninety one, and

651
00:36:54.119 --> 00:36:58.880
that gives you multiple substitutions options there. And then as well,

652
00:36:58.920 --> 00:37:01.360
you can see here they've taken some of the most

653
00:37:02.360 --> 00:37:07.159
used letters in cryptography and they've assigned one, two, three, four, five,

654
00:37:07.320 --> 00:37:11.960
six different numerical values to it, so that it could

655
00:37:12.000 --> 00:37:14.519
literally read ninety one, eighty one, seventy one, sixty one,

656
00:37:14.880 --> 00:37:17.519
fifty one, forty one for the letter E. And then

657
00:37:17.559 --> 00:37:21.159
on the second line, the second most used letters are

658
00:37:21.199 --> 00:37:24.960
assigned two different symbols, and then finally the least used

659
00:37:25.000 --> 00:37:29.840
symbols are assigned one number value altogether, so P would

660
00:37:29.840 --> 00:37:32.880
be eleven, Q would be twelve, so on and so

661
00:37:32.920 --> 00:37:35.199
forth down the line with those last letters.

662
00:37:36.039 --> 00:37:38.679
So it seems like to me, this is very This

663
00:37:38.880 --> 00:37:42.400
is like the same kind of pattern used in Jamatria,

664
00:37:43.039 --> 00:37:46.440
when you have the alphabet and then you have these

665
00:37:46.760 --> 00:37:50.360
the numbers that are assigned to each letter in order

666
00:37:50.400 --> 00:37:55.280
to create so like you have like a certain name,

667
00:37:55.360 --> 00:37:58.880
like like I could put your name Nanette into into

668
00:37:59.000 --> 00:38:04.760
the Mantreas system and it would create different things like

669
00:38:06.000 --> 00:38:09.800
almost kind of like not. Sometimes it's sentences, sometimes it

670
00:38:09.880 --> 00:38:14.039
sphrases things like that. So that's another cryptic.

671
00:38:15.039 --> 00:38:18.960
Software. I was kind of seeing if you're going to

672
00:38:19.000 --> 00:38:20.559
go over that, if he had that in this book

673
00:38:20.679 --> 00:38:23.000
about your mind. Yeah, I was just going to say,

674
00:38:23.039 --> 00:38:25.079
sometimes you read my mind, and sometimes you are two

675
00:38:25.119 --> 00:38:27.400
steps ahead of me. I do. Okay, So we also

676
00:38:27.519 --> 00:38:32.920
have in the cryptography, we have mathematical code. So A

677
00:38:33.159 --> 00:38:36.719
equals one to ten, V equals eleven to twenty, so

678
00:38:36.719 --> 00:38:38.840
so on and so forth and on down, and then

679
00:38:38.920 --> 00:38:41.599
once you add those numbers up, it comes out with

680
00:38:41.840 --> 00:38:45.199
an overall total. This one I didn't quite understand to

681
00:38:45.239 --> 00:38:47.480
be able to explain as well, but I do get

682
00:38:47.480 --> 00:38:52.800
the gist of so no, maybe I don't get the gist.

683
00:38:53.840 --> 00:39:00.440
So so you like so a would be one well

684
00:39:01.000 --> 00:39:04.280
as a yeah, one to ten. That was different than

685
00:39:04.320 --> 00:39:07.119
the numbering system. This one is the mathematical code. It's

686
00:39:07.159 --> 00:39:08.760
going to take me a second to work this one out.

687
00:39:08.800 --> 00:39:10.480
And I think I threw it in here just because

688
00:39:10.960 --> 00:39:12.679
that Jack was into math. Huge.

689
00:39:13.159 --> 00:39:13.280
Uh.

690
00:39:13.440 --> 00:39:15.559
The other system was kind of what you were just

691
00:39:15.639 --> 00:39:18.760
talking about. So they are actually sending you a letter

692
00:39:18.800 --> 00:39:21.239
and this this letter says Arnold, dear it was good

693
00:39:21.239 --> 00:39:25.199
news to hear that you have found a job in Paris.

694
00:39:25.360 --> 00:39:28.159
Anna hope she will soon be able to send for her.

695
00:39:28.400 --> 00:39:33.159
She's very eager to join you. Now the children are

696
00:39:33.440 --> 00:39:37.679
both well, sonya. So now once you break this down,

697
00:39:37.880 --> 00:39:42.400
so I see in cipher thirty three, I thought I

698
00:39:42.440 --> 00:39:46.960
had this one down, and dear was five yep. So

699
00:39:47.400 --> 00:39:50.199
you add up that. You add up the numbers, yep,

700
00:39:50.559 --> 00:39:55.039
the number of letters, and yet three and so at

701
00:39:55.039 --> 00:39:58.519
three you would have to be the combination. Let's see

702
00:39:59.440 --> 00:40:03.360
three three five. But see again, it also has a

703
00:40:03.400 --> 00:40:06.280
break and a split in the words where you're stopping.

704
00:40:06.400 --> 00:40:08.639
So again you would have to have that key to

705
00:40:08.760 --> 00:40:12.639
know where those stops and splits are. Now I about

706
00:40:12.760 --> 00:40:15.320
was like, oh my goodness, the solve to this. So

707
00:40:15.440 --> 00:40:18.079
where we just talked about Arnold Deer and the kids

708
00:40:18.119 --> 00:40:20.199
are good and they want to join you in Paris.

709
00:40:20.639 --> 00:40:26.800
The message that this yields is need money for assassination. Right.

710
00:40:30.639 --> 00:40:33.000
This guy also did one on paper, and I was

711
00:40:33.119 --> 00:40:35.280
laughing because he was I can do it on paper

712
00:40:35.320 --> 00:40:36.639
for you, and I'll send it to you for the

713
00:40:37.039 --> 00:40:41.679
next show. Okay, So because I've learned it, well, he's

714
00:40:41.719 --> 00:40:44.920
talking about the same author that did this also did

715
00:40:44.960 --> 00:40:48.119
one on paper and the things that a document examiner

716
00:40:48.119 --> 00:40:51.920
would want to know about paper. And he had mentioned

717
00:40:51.920 --> 00:40:55.239
that you could weigh the paper to see So if

718
00:40:55.360 --> 00:40:58.840
if somebody made a five page trust or will and

719
00:40:59.440 --> 00:41:01.880
somebody swap to page out, there's a good chance that

720
00:41:01.920 --> 00:41:04.199
the weight of the paper will not be identical, especially

721
00:41:04.239 --> 00:41:06.320
if it's a much later date. Because our paper was

722
00:41:06.400 --> 00:41:08.079
thicker back in the day, we've learned how to make

723
00:41:08.079 --> 00:41:11.360
it thinner so we can get more pieces into a ream. Thus,

724
00:41:11.360 --> 00:41:15.199
that somebody used a today's type paper compared to paper

725
00:41:15.280 --> 00:41:19.199
from two thousand, nineteen eighty somewhere around there, there could

726
00:41:19.280 --> 00:41:21.360
be a weight difference. And he says, you can weigh

727
00:41:21.440 --> 00:41:23.719
the paper to determine if it has the same weight,

728
00:41:23.840 --> 00:41:26.679
and he marks on the side of that drug scale.

729
00:41:27.960 --> 00:41:31.320
So yeah, so yeah, so anything, if anything that has

730
00:41:31.320 --> 00:41:33.679
a number, could could give you a message.

731
00:41:34.920 --> 00:41:36.639
No, no, no, what I was just saying, I was

732
00:41:36.719 --> 00:41:41.519
just laughing that he obviously must have also been a

733
00:41:41.639 --> 00:41:45.079
in with law enforcement or a government trained document examiner

734
00:41:45.079 --> 00:41:46.920
for some of the things that he was talking about.

735
00:41:46.960 --> 00:41:49.559
I've never been told in all the years that I've

736
00:41:49.559 --> 00:41:52.800
done this, you can usually feel the weight difference in papers,

737
00:41:53.519 --> 00:41:56.360
so weighing them has never really been something on my

738
00:41:56.440 --> 00:41:58.840
mind until I saw this. But the fact that he

739
00:41:58.920 --> 00:42:01.119
said use a drug scale.

740
00:42:02.400 --> 00:42:09.280
Yeah, documents, I'd like to use my letter head paper

741
00:42:09.760 --> 00:42:14.320
because it's heavier, and you can tell that's heavier.

742
00:42:15.159 --> 00:42:18.360
And even safer is to put in the diagonal water

743
00:42:18.440 --> 00:42:21.800
marks that do not They have water marks that have

744
00:42:21.840 --> 00:42:24.960
an algorithm that the photocopier will not pick up. Thus

745
00:42:25.000 --> 00:42:27.360
it is not seen and cannot be copied, so somebody

746
00:42:27.400 --> 00:42:32.760
else cannot imitate it. Also, it could have an embedded

747
00:42:32.760 --> 00:42:35.920
water mark. You can buy bond paper that has embedded

748
00:42:35.920 --> 00:42:38.280
water marks, or you can create your own and ask

749
00:42:38.360 --> 00:42:40.519
for that to be made. And of course you can't

750
00:42:40.519 --> 00:42:42.119
see that water mark until you put it on a

751
00:42:42.199 --> 00:42:44.320
light table and then you can see the image of

752
00:42:44.360 --> 00:42:46.280
whatever that water mark is. There's a lot of ways

753
00:42:46.320 --> 00:42:48.880
to fraud proof your documents. I think I'm gonna blog

754
00:42:48.920 --> 00:42:49.840
on that here shortly.

755
00:42:51.440 --> 00:42:54.039
Yeah, I like that like a prescription, like when you

756
00:42:54.079 --> 00:42:55.760
when your doctor gives you a prescription.

757
00:42:56.119 --> 00:42:59.000
That's a heavyweight paper, and that's a security paper for

758
00:42:59.039 --> 00:43:03.199
a reason. Yes, absolutely those are not coming out on

759
00:43:03.280 --> 00:43:10.320
just standard paper. So now we have additional block versions,

760
00:43:10.360 --> 00:43:13.119
which this is where I said that there's a possibility

761
00:43:13.159 --> 00:43:16.519
that I think Orngchac called it period nineteen for the

762
00:43:16.559 --> 00:43:18.519
three forty cipher as he solved it, but I couldn't

763
00:43:18.559 --> 00:43:20.400
get it to work out, and there were still too

764
00:43:20.400 --> 00:43:23.360
many problems and issues with the system that he used

765
00:43:23.360 --> 00:43:26.719
to allow for an easy solve for somebody else to duplicate.

766
00:43:26.800 --> 00:43:31.199
But here's other alternate block versions. There's an alternate vertical.

767
00:43:31.639 --> 00:43:34.519
There are diagonal routes. So the diagonal route is the

768
00:43:34.559 --> 00:43:37.480
one that Ornchac claimed to have done. The period nineteen

769
00:43:37.599 --> 00:43:40.440
was a diagonal starting with the top left hand corner

770
00:43:40.840 --> 00:43:43.639
and then moving directly downward or directly to the right,

771
00:43:43.719 --> 00:43:47.360
and then downward either way. It moves through the pattern

772
00:43:47.519 --> 00:43:51.320
in a spiral or a snakelike design as it makes

773
00:43:51.360 --> 00:43:53.280
its way all the way out to the end. But

774
00:43:53.360 --> 00:43:57.000
then you need you need it to be even I

775
00:43:57.000 --> 00:43:58.599
would think you would need it to be a five

776
00:43:58.719 --> 00:44:01.320
y five, a six by So I'm gonna have to

777
00:44:01.360 --> 00:44:03.199
go back and look at the three forty and see

778
00:44:03.280 --> 00:44:06.360
if we have equally across the top and straight down

779
00:44:06.679 --> 00:44:08.679
in order for this type of design to work out.

780
00:44:08.719 --> 00:44:10.800
And I think that's where the confusion came in with me,

781
00:44:10.960 --> 00:44:14.119
is that his didn't Actually his numbering system of what

782
00:44:14.239 --> 00:44:17.039
letter belonged where did not work out that way. There

783
00:44:17.039 --> 00:44:19.400
were some outliers, there were ones that did not fit

784
00:44:19.440 --> 00:44:21.920
into the program, and then there were just plain old words.

785
00:44:21.960 --> 00:44:24.079
I think he just threw in there because it didn't

786
00:44:24.119 --> 00:44:31.199
say anything. There's alternate diagonal and there's spiral routes. Yeah,

787
00:44:32.039 --> 00:44:32.719
it would be crue.

788
00:44:32.760 --> 00:44:36.000
I would be curious to see someone do one like

789
00:44:36.159 --> 00:44:39.519
at an active one, Like maybe we can do one actively.

790
00:44:41.079 --> 00:44:44.679
That would be fun. So we also have simple vertical

791
00:44:44.840 --> 00:44:50.079
and clockwise, so you're working around in a circle clockwise

792
00:44:50.280 --> 00:44:54.639
until you make it to the center. This particular clockwise

793
00:44:54.679 --> 00:44:58.559
one says, suppose our message is enemy plans attack it dawn,

794
00:45:00.079 --> 00:45:02.679
it is gonna be M A K T A men

795
00:45:02.920 --> 00:45:05.760
E y N T A W N G D C

796
00:45:05.960 --> 00:45:08.719
A L P S A T. So that's the final

797
00:45:08.760 --> 00:45:13.039
transmission format. The letters that would absolutely in that clockwise

798
00:45:13.079 --> 00:45:16.559
pattern makeup and it says the italic letters G and

799
00:45:16.920 --> 00:45:20.320
M are noles. So here's what I found interesting is

800
00:45:20.360 --> 00:45:25.280
that Terry Be talked about knowles. So I'm going to

801
00:45:25.360 --> 00:45:28.000
have to figure out what noles mean in cipher. But

802
00:45:28.039 --> 00:45:31.440
I'm thinking that they mean nothing where they account No,

803
00:45:31.519 --> 00:45:33.320
it can't. Oh, maybe it does. I would have to

804
00:45:33.360 --> 00:45:38.199
see awnng. So this is one two three four five

805
00:45:38.519 --> 00:45:43.280
Oh one two three four Okay, so the g is

806
00:45:43.480 --> 00:45:49.800
a null and the word is at. So I don't know.

807
00:45:50.079 --> 00:45:51.320
I'm gonna have to go back and look at that

808
00:45:51.360 --> 00:45:55.760
one too. There's also a zigzag cipher. So basically you're

809
00:45:55.760 --> 00:45:58.079
working and I think I feel like the zig zig

810
00:45:58.320 --> 00:46:02.000
is nothing more than these like movement, but it goes

811
00:46:03.599 --> 00:46:08.480
up down, up, down, up down to get the actual answer.

812
00:46:08.599 --> 00:46:10.880
So it's basically making it look like that these are

813
00:46:10.920 --> 00:46:14.400
just a bunch of nonsensical letters that are put together

814
00:46:14.880 --> 00:46:17.440
over the top of each other. When you actually read

815
00:46:17.480 --> 00:46:20.960
it in that updown position, you were able to decode it.

816
00:46:21.159 --> 00:46:25.719
University of Illinois at Chicago. I it said, oh I

817
00:46:25.840 --> 00:46:28.280
as a nol in this particular case. So again we

818
00:46:28.400 --> 00:46:32.480
come across Knoles. There's the rail fence cipher. Oh maybe

819
00:46:32.480 --> 00:46:35.480
this was maybe I think this image here on the

820
00:46:35.599 --> 00:46:38.119
rail fence cipher is what I took to mean that

821
00:46:38.519 --> 00:46:40.719
that orangehak had done. But it still moves in the

822
00:46:40.760 --> 00:46:44.159
same pattern as we looked at those other winding ones,

823
00:46:44.199 --> 00:46:46.440
and it depends on how you create the grid. So

824
00:46:46.519 --> 00:46:49.719
the grid here's a thirteen by two grid, here's a

825
00:46:49.760 --> 00:46:52.639
two y thirteen, So that would mean we would need

826
00:46:52.679 --> 00:46:55.079
to go back and look at the three forty and

827
00:46:55.159 --> 00:46:58.719
see what the grid pattern was in order to determine

828
00:46:58.760 --> 00:47:05.559
which direction everything goes. There's also diary code University of Illinois, Chicago.

829
00:47:05.760 --> 00:47:11.280
Insert wxy or z between each word and then in

830
00:47:11.440 --> 00:47:16.000
cipher the message using the vertical block route. Very interesting.

831
00:47:18.079 --> 00:47:21.519
Here's another. Perpetrators of computer crime frequently have been successful,

832
00:47:21.559 --> 00:47:24.079
not because of their superior talents, but due to obvious

833
00:47:24.079 --> 00:47:28.159
breaches of security. So here's another substitution cipher. We also

834
00:47:28.239 --> 00:47:31.440
have a frequency table worksheet that gives you dashmarks for

835
00:47:31.679 --> 00:47:36.360
the actual letters themselves, and you would mark that out

836
00:47:36.440 --> 00:47:39.360
in order to determine what letter you were using in

837
00:47:39.400 --> 00:47:42.559
that and it of course gives a numerical value. So

838
00:47:42.599 --> 00:47:46.880
the letter frequency distribution is step number three. And then

839
00:47:46.920 --> 00:47:50.119
how to write an unbreakable code? Begin with a cipher,

840
00:47:51.320 --> 00:47:54.679
it says, and then message. Then take a table of

841
00:47:54.800 --> 00:47:59.480
random numbers and equate those random numbers to that cipher.

842
00:48:00.159 --> 00:48:03.679
The sums are transmitted as a new set of random numbers,

843
00:48:04.119 --> 00:48:06.239
and then you have the encryption, and it shows you

844
00:48:06.280 --> 00:48:08.119
how to do it. They've even got this little one

845
00:48:08.119 --> 00:48:11.079
down here, a one time pad of the type used

846
00:48:11.079 --> 00:48:15.760
by international espionage agents for writing messages in unbreakable codes.

847
00:48:16.199 --> 00:48:21.079
Each page of random numbers is used once and then

848
00:48:21.360 --> 00:48:29.079
thrown away, hence the designation one time pad. Oh. I

849
00:48:29.119 --> 00:48:30.920
really thought we'd finish this, but I know it's going

850
00:48:30.960 --> 00:48:32.800
to take a little longer for this last slide, and

851
00:48:32.840 --> 00:48:35.360
we are down to our last minute, So I would

852
00:48:35.440 --> 00:48:37.599
welcome you guys to make any comments that you would

853
00:48:37.679 --> 00:48:39.159
like to make for our last minute.

854
00:48:42.000 --> 00:48:45.119
Well, I think that this all leads to military obviously.

855
00:48:46.280 --> 00:48:53.159
Yeah, and uh.

856
00:48:51.159 --> 00:48:54.760
We see that jack Is has that military background, as

857
00:48:54.760 --> 00:48:58.440
every single one of the the serial killers in Creation

858
00:48:58.920 --> 00:49:01.760
Is literally has a military background, which is telling my

859
00:49:01.840 --> 00:49:04.760
husband about this the other night. Every crime show I

860
00:49:04.840 --> 00:49:08.880
literally watch, I always make sure to note if there's

861
00:49:08.920 --> 00:49:14.719
a military background, and and there's just like nowhere around it. Yeah,

862
00:49:14.840 --> 00:49:18.480
and it's like, wow, this is like a whole plan,

863
00:49:18.679 --> 00:49:21.559
Like they have these and then we have these plans

864
00:49:21.639 --> 00:49:25.480
right here that you're going over, like different plans, different ciphers,

865
00:49:25.519 --> 00:49:27.800
different coding, and it's all woden.

866
00:49:28.239 --> 00:49:30.960
That takes me back to Sharry Joe Bates and Patricia

867
00:49:31.000 --> 00:49:34.719
Hout's letter, wouldn't the story about a boy, you know,

868
00:49:34.880 --> 00:49:39.599
designed killer, basically the blueprint for a boy turned killer,

869
00:49:40.679 --> 00:49:44.639
that be more interesting? And obviously who better than the

870
00:49:44.679 --> 00:49:52.480
military to create those type of blueprint killers. Yeah, So

871
00:49:53.519 --> 00:49:56.679
I just want to say that in the John Walsh cipher,

872
00:49:56.960 --> 00:49:59.920
we are looking at four or five different completely differentis

873
00:50:00.440 --> 00:50:04.440
It would be astronomical for somebody to have ever figured

874
00:50:04.440 --> 00:50:06.599
that out, but I'm sure they have. They haven't released

875
00:50:06.639 --> 00:50:08.480
that to us because they don't want us to know

876
00:50:08.880 --> 00:50:11.039
that they have solved those.

877
00:50:10.800 --> 00:50:13.800
Another reason why they haven't released a lot of things

878
00:50:13.880 --> 00:50:16.239
is because they already know that they already know the answer.

879
00:50:17.599 --> 00:50:20.559
All Right, you guys, that's it. We're uptimes done. Everybody

880
00:50:20.559 --> 00:50:27.679
has a wonderful band whatever. We'll see y'all next Friday.

881
00:50:27.679 --> 00:50:29.760
Everybody have a wonderful weekend. Take care and thank you

882
00:50:29.800 --> 00:50:31.400
both for being here.

883
00:50:32.920 --> 00:50:33.119
Hi,