More SUPER-DUPER

bigscoop

Gold Member
Jun 4, 2010
13,373
8,689
Wherever there be treasure!
Detector(s) used
Older blue Excal with full mods, Equinox 800.
Primary Interest:
All Treasure Hunting
In his alleged letter to Morriss, Beale explains that if it is required a key will arrive to Morriss so he will be able to decipher the meaning of the ciphers in the iron box. Note that “a key” is a singular representation, meaning that only a single key is being referenced.



Some years later our unknown author declares that through accident he was able to discover "a key" that afforded him the meaning of the cipher marked (2) and that he had no difficulty mastering the others.



So, if the unknown author did in fact discover that single key then why does it only work on the C2 cipher and not the other two presented ciphers as well? According to Beale only “a key” is required.



Now then, if what Beale proposed in his letter is true then this should tell you a lot in regards to the C1 & C3 ciphers that the unknown author has presented in his tale. For instance, if his presented key can be made to work for C2 then why won't it work on his presented C1 & C3 ciphers? According to Beale, if true, then “a key” is all that will be required. And according to the unknown author he accidentally discovered that key. So why can't that same key be made to work on the unknown author's presented C1 & C3 ciphers?


In their continued efforts to explain this undesirable circumstance true believers of the story and the remaining two ciphers often propose very complex formulas and processes for the decoding of the remaining ciphers even in light of what they are told in the clear text of C2, that, “Paper number "1" describes the exact locality of the vault so that no difficulty will be had in finding it.”


Now then, if you wanted to make sure that your executor, Morriss, wouldn't have any difficulty in carrying out his important task then you certainly wouldn't want to present him with circumstances that were beyond his abilities. The only people you would want to present these extreme complexities to would be those people you didn't want to find accurate solution.


All of this, as well as several other discrepancies in the tale, should tell you quite a bit about the unknown author and also the challenge he has presented you with in his tale. “A key.” And by accident your unknown author supposedly already discovered it, so why is there still a lingering problem? :laughing7:
 

Rebel - KGC

Gold Member
Jun 15, 2007
21,680
14,739
In his alleged letter to Morriss, Beale explains that if it is required a key will arrive to Morriss so he will be able to decipher the meaning of the ciphers in the iron box. Note that “a key” is a singular representation, meaning that only a single key is being referenced.



Some years later our unknown author declares that through accident he was able to discover "a key" that afforded him the meaning of the cipher marked (2) and that he had no difficulty mastering the others.



So, if the unknown author did in fact discover that single key then why does it only work on the C2 cipher and not the other two presented ciphers as well? According to Beale only “a key” is required.



Now then, if what Beale proposed in his letter is true then this should tell you a lot in regards to the C1 & C3 ciphers that the unknown author has presented in his tale. For instance, if his presented key can be made to work for C2 then why won't it work on his presented C1 & C3 ciphers? According to Beale, if true, then “a key” is all that will be required. And according to the unknown author he accidentally discovered that key. So why can't that same key be made to work on the unknown author's presented C1 & C3 ciphers?


In their continued efforts to explain this undesirable circumstance true believers of the story and the remaining two ciphers often propose very complex formulas and processes for the decoding of the remaining ciphers even in light of what they are told in the clear text of C2, that, “Paper number "1" describes the exact locality of the vault so that no difficulty will be had in finding it.”


Now then, if you wanted to make sure that your executor, Morriss, wouldn't have any difficulty in carrying out his important task then you certainly wouldn't want to present him with circumstances that were beyond his abilities. The only people you would want to present these extreme complexities to would be those people you didn't want to find accurate solution.


All of this, as well as several other discrepancies in the tale, should tell you quite a bit about the unknown author and also the challenge he has presented you with in his tale. “A key.” And by accident your unknown author supposedly already discovered it, so why is there still a lingering problem? :laughing7:

Well thought out, "Scoop"... you have asked a GREAT question. IMHO... there IS NO "Key" to unlock the Ciphers, as they are RUSE(S); DOI was gonna be used as a "broadside blast" (PIRATES) aimed at "King" Abe for the CONFEDERATE WAR; afterall, it was ALSO known as the SECOND AMERICAN REVOLUTION... AND! The "deposits" were in 1863, & 1865. Peter Viemeister "said" it well in BEALE TREASURE: NEW History of a Mystery, "A COVER STORY... There really was a treasure, but it was illegally acquired. Beale was FICTION and/or Morriss' tale (of the events of 1817-1822) was FICTION. Cipher No. 1 and No. 3 are pure GIBBEROUS.... CONFEDERATE TREASURY! (p. 164-165). Chap. 22 MEXICAN WAR and CONFEDERACY (pg. 166-173) is "TELLING". DO carry on, tho; I am "listening"...
 

OP
OP
bigscoop

bigscoop

Gold Member
Jun 4, 2010
13,373
8,689
Wherever there be treasure!
Detector(s) used
Older blue Excal with full mods, Equinox 800.
Primary Interest:
All Treasure Hunting
Well thought out, "Scoop"... you have asked a GREAT question. IMHO... there IS NO "Key" to unlock the Ciphers, as they are RUSE(S); DOI was gonna be used as a "broadside blast" (PIRATES) aimed at "King" Abe for the CONFEDERATE WAR; afterall, it was ALSO known as the SECOND AMERICAN REVOLUTION... AND! The "deposits" were in 1863, & 1865. Peter Viemeister "said" it well in BEALE TREASURE: NEW History of a Mystery, "A COVER STORY... There really was a treasure, but it was illegally acquired. Beale was FICTION and/or Morriss' tale (of the events of 1817-1822) was FICTION. Cipher No. 1 and No. 3 are pure GIBBEROUS.... CONFEDERATE TREASURY! (p. 164-165). Chap. 22 MEXICAN WAR and CONFEDERACY (pg. 166-173) is "TELLING". DO carry on, tho; I am "listening"...

But what you are quoting is just an entertaining notion, not really anything that can be directly connected to the Beale story in any way whatsoever. The reference to the second year of the Civil War has apparently caused people to assume that this year is in some way directly connected to the Beale story mystery and its treasure. However, there were many events that took place in the region during the second year of the Civil War so applying the same sense of reason are we to also assume that all of these events are likewise connected to the Beale story in some way? No. In fact, all we can really quote from the story is that it was allegedly during the second year of Civil War that our unknown author first became aware of the details described in the story. All of these other entertaining notions are just that, simple entertaining notions from the minds of men.
 

Rebel - KGC

Gold Member
Jun 15, 2007
21,680
14,739
BEFORE I got on the CONFEDERATE WAR "theory", I often wondered if it was a PHYSICAL "Key" to unlock that BOX; HA! Gotta have a PHYSICAL "Key" to unlock that BOX, to get to the papers, inside; But THEN! KEY word to Ciphers 1 & 3...? CARRY ON!
 

Rebel - KGC

Gold Member
Jun 15, 2007
21,680
14,739
But what you are quoting is just an entertaining notion, not really anything that can be directly connected to the Beale story in any way whatsoever. The reference to the second year of the Civil War has apparently caused people to assume that this year is in some way directly connected to the Beale story mystery and its treasure. However, there were many events that took place in the region during the second year of the Civil War so applying the same sense of reason are we to also assume that all of these events are likewise connected to the Beale story in some way? No. In fact, all we can really quote from the story is that it was allegedly during the second year of Civil War that our unknown author first became aware of the details described in the story. All of these other entertaining notions are just that, simple entertaining notions from the minds of men.

Was gonna give ya a "LIKE" on that... can't find it.
 

OP
OP
bigscoop

bigscoop

Gold Member
Jun 4, 2010
13,373
8,689
Wherever there be treasure!
Detector(s) used
Older blue Excal with full mods, Equinox 800.
Primary Interest:
All Treasure Hunting
The singular use of the word "key" presents yet another interesting subject to be explored.
 

Rebel - KGC

Gold Member
Jun 15, 2007
21,680
14,739
As I have always said the DOI is the "KEY" to all three cypher codes, you just have to figure out how TJB rearranged the DOI to encrypt the other two code papers. Instead of using the first letter of each word, he could have used the last letter of each word------either starting at the beginning of the DOI or backwards starting at the end of the DOI. He could have alternated and skipped every other word and used the first or last letter or every letter. He could have used those cyphers on the two small pieces of paper that Pauline Innis had in her book from the ironbox. Everybody says Pauline Innis did not have the iron box----why does she have those two pieces of paper and she says they were the only papers that were left in the ironbox............. It is there people you just have to look for the "KEY" usage and then you can break the code papers.

Paper Number One proves this to be true because of the Gillgolly Strings------it proves that TJB had the DOI lying in front of him when he made Code Paper Number One. You can use those "Strings" to figure out the "KEY" TJB was finding a letter he needed to make a clear text and at the same time using Code Paper Number Two to make the "STRING" Can anyone else see this. There is your "KEY"

Have YOU worked it out then...? Has ANYONE...? Discovery & Recovery...?
 

OP
OP
bigscoop

bigscoop

Gold Member
Jun 4, 2010
13,373
8,689
Wherever there be treasure!
Detector(s) used
Older blue Excal with full mods, Equinox 800.
Primary Interest:
All Treasure Hunting
The Gillgolly Strings tell us that the cipher has been intentionally manipulated and/or altered beyond the suggested application of a key. That goes without question. It also tells us that this string won't produce an understandable text in its presented form. So very clearly, the cipher has been altered beyond solution, if in fact it ever held an understandable clear text. Not a chance that anyone could randomly produce a 100% grammatically correct solution as the cipher is presented "if" the entire length of codes are to be used? :thumbsup:
 

OP
OP
bigscoop

bigscoop

Gold Member
Jun 4, 2010
13,373
8,689
Wherever there be treasure!
Detector(s) used
Older blue Excal with full mods, Equinox 800.
Primary Interest:
All Treasure Hunting
I think, just as the author intended, the general public is still trying to beat the completely dead horse to death.
 

ECS

Banned
Mar 26, 2012
11,639
17,694
Ocala,Florida
Primary Interest:
Other
Food for thought. Maybe the two small pieces of paper found in the iron box by Pauline Innis is the "KEY" There are two unsolved codes and two small pieces of paper with ciphers on them.
James Beverly Ward's daughter, Adeline Ward McVeigh told cryptographer in the 1930's, William Friedman, that she had never seen any iron box connected to Beale- yes, I realize she was born in 1885, but if the iron box was in the possession of Ward , who Adeline stated was the author of the Beale Papers, how did come into the possession of Pauline Innis? Where is this box today?
 

Rebel - KGC

Gold Member
Jun 15, 2007
21,680
14,739
The Gillgolly Strings tell us that the cipher has been intentionally manipulated and/or altered beyond the suggested application of a key. That goes without question. It also tells us that this string won't produce an understandable text in its presented form. So very clearly, the cipher has been altered beyond solution, if in fact it ever held an understandable clear text. Not a chance that anyone could randomly produce a 100% grammatically correct solution as the cipher is presented "if" the entire length of codes are to be used? :thumbsup:

Well... I DO like "G-STRINGS"... LOL!
 

Rebel - KGC

Gold Member
Jun 15, 2007
21,680
14,739
James Beverly Ward's daughter, Adeline Ward McVeigh told cryptographer in the 1930's, William Friedman, that she had never seen any iron box connected to Beale- yes, I realize she was born in 1885, but if the iron box was in the possession of Ward , who Adeline stated was the author of the Beale Papers, how did come into the possession of Pauline Innis? Where is this box today?

franklin knows... last I heard, Box was at the WATERGATE, near D.C.; dunno.
 

Rebel - KGC

Gold Member
Jun 15, 2007
21,680
14,739
Read Pauline Innis' new book with the gold cover. She explains how George Hart told her about the iron box being in possession of an Otey Family living in Southeast Roanoke. She may have this in her first book but I know it is in the new book. Also I talked with PI on the telephone and asked her was the two small pieces of paper all that was in the iron box as stated in her book, her reply was to call her back in a day or two and she would check. There you go CHECK-------meaning she still had the iron box. Pauline passed away about 8 years ago with no one to leave her estate to. So now where is that iron box? I know she lived at the Watergate Hotel so that would be a good starting point.

Wasn't P. I. with NSA...? I have the PB Gold-cover book... will review.
 

masterpoe

Banned
Feb 3, 2015
1,013
241
University
Primary Interest:
All Treasure Hunting
The Gillgolly Strings tell us that the cipher has been intentionally manipulated and/or altered beyond the suggested application of a key. That goes without question. It also tells us that this string won't produce an understandable text in its presented form. So very clearly, the cipher has been altered beyond solution, if in fact it ever held an understandable clear text. Not a chance that anyone could randomly produce a 100% grammatically correct solution as the cipher is presented "if" the entire length of codes are to be used? :thumbsup:

I see this post!
 

OP
OP
bigscoop

bigscoop

Gold Member
Jun 4, 2010
13,373
8,689
Wherever there be treasure!
Detector(s) used
Older blue Excal with full mods, Equinox 800.
Primary Interest:
All Treasure Hunting
I see this post!

Do you, really? I hope so as there is far more to that post then you might realize. You see, it begs the question "who gets to decide what is, and isn't, relevant within the codes? You? Me? Reb? ECS? Jean? Franklin? Or all the others over the years who have presented random solution? In the end all of these solutions have vastly different clear text and substance, each of them perpetuated around the individual thoughts and theories and wants and desires of those who produced them. In the event that anyone will even bother, all of this will become even more obvious in the following post you just made:

http://www.treasurenet.com/forums/beale-codes/543999-deciphered-pages-people-claim-they-one.html

The bottom line is that once folks start decoding the ciphers by selective process then any solution becomes possible, any source becomes possible, any cause or sense of reason becomes possible. This was the whole point to presenting one cipher and clean clear text as the bait and the two remaining unintelligible ciphers as the ever lasting mysterious affliction. :icon_thumright:
 

Top Member Reactions

Users who are viewing this thread

Top