A Response to George Love's Paper
Guest Article by Stephen M. Matyas Jr
In response to an earlier
guest article by George Love.
Love's paper, originally posted no later than December 24, 2002, offers a set of arguments aimed
at showing that the pamphlet's author wrote Beale cipher No. 2 (see paragraph 15, line 6), and by
implication that ciphers No. 1 and No. 3 were also written by the pamphlet's author. Thus, Love
concludes that the treasure story is a hoax.
Love's arguments are analyzed in this response. I believe that it is shown that his thread of logic
breaks down and that his conclusions are unsupported by the arguments.
I apologize if I misstate anything that Love has said. I will try my best to avoid doing this.
Love says that Beale made several counting errors in preparing his key for cipher No. 2 (I
agree). He also claims that in order for the author to have deciphered No. 2 the author's
Declaration had to be misnumbered in the same way that Beale's Declaration was misnumbered
(I disagree). Love states that such a duplicate misnumbering of the author's Declaration
would have been a practical impossibility (I agree). Therefore, the only way that the
author could have obtained a correct decipherment of No. 2 was because Beale and the author
were the same person (I disagree), thus implying that it was the author who created No. 2
(I disagree), in which case the rest of the story is also untrue (I disagree).
What Love seems to have overlooked is that the author could have decoded No. 2 without first
misnumbering his Declaration in the same way that Beale did. Thus, in my opinion, he has it
backwards. The pamphlet's author did not have to start with a Declaration misnumbered in the
same way that Beale's Declaration was misnumbered. Instead, he was able to decode No. 2 using
a correctly numbered Declaration, and once that was accomplished he was able to figure out the
counting errors that Beale made. I would contend that Beale and the author were two different
persons, not the same person.
The counting errors made by Beale in preparing his key and the Declarations used by Beale and
the pamphlet's author are important aspects of the treasure story discussed in Love's paper. Thus,
their relevance to the matter must be explained. In the discussion that follows, I shall refer to the
creator of cipher No. 2 as Beale. There are two kinds of clerical errors made by Beale, clerical
errors made in constructing his key (Love calls them counting errors) and clerical errors made in
referencing the key while enciphering Paper No. 2 and of no importance to the present
discussion.
A counting error (counting 9 words as 10, 11 words as 10, or 20 words as 10) is a serious error,
as it causes all words in the key to be misnumbered beyond the point where the error occurs.
Thus, during decipherment the affected cipher numbers are decoded as incorrect letters. An
equally serious problem could potentially arise if the author's copy of the Declaration happened
to contain a word not found in Beale's Declaration, or vice versa. The consequences would be
the same as with a counting error.
Beale's Declaration and the Declaration selected by the author (reprinted in Ward's pamphlet)
are different--they have slightly different wordings. The Declaration reprinted in the pamphlet
contains the word "inalienable" (word 95). Yet, cipher number 95 in Beale Cipher #2 is decoded
as letter "U" not letter "I." It is also known that Word 95 in the Declaration printed by John
Dunlap on the night of July 4, 1776 (referred to as the Dunlap broadside) is the word
"unalienable" not the word "inalienable." Many, in fact, most Declarations printed before 1823
contain the word "unalienable." Thus, it may be surmised that Beale's Declaration contained the
word "unalienable," not "inalienable," and therefore that the two Declarations are different and
taken from two different source works (probably books). There are other differences in the two
Declarations, as well.
The source of Beale's Declaration has not been discovered. However, Beale's Declaration can be
partially reconstructed using the decipherment of cipher No. 2 and a copy of the Declaration. For
those who wish to learn more about the Declaration of Independence, please visit my website at
www.USDeclarationOfIndependence.com. You will find a copy of my book entitled
DECLARATION OF INDEPENDENCE: A Checklist of Books, Pamphlets, and Periodicals,
Printing the U.S. Declaration of Independence, 1776-1825, published in 2009. A free PDF copy
of the book can be downloaded and viewed on your own personal computer. I recommend that
you read the preface. There are 358 checklist entries in the book. Of the 358 entries, 321 are
works printed prior to 1823 and thus cover the period of the Beale treasure story. In preparing the
book, I obtained a copy of each of the different Declarations, and I examined the wording in each
of them. So I can speak with some authority about these 321 Declarations. The findings are
detailed in the preface to the book. Beale's reconstructed Declaration is consistent with 26 of the
321 candidate Declarations, all taken from books. The Declaration printed in Ward's pamphlet is
not consistent with any of these 321 Declarations, showing that it very likely came from a source
work printed after 1822.
By the late 1970s, members of the Beale Cypher Association expressed some concern that no one
had yet explained how the pamphlet's author went about his work of deciphering cipher No. 2.
To address this, a colleague (Frank Aaron) and I put together a talk entitled "How the Message in
Paper No. 2 was Recovered." The talk was presented at the Second Beale Cipher Symposium,
1979, and published in its Proceedings.
When I first learned about the Beale treasure story, I spent some time trying to break the ciphers,
by selecting different books and documents, numbering them by word and by letter, and making
trial decipherments. I examined the U.S. Constitution, the Articles of Confederation, passages
from Shakespeare, and many others, all to no avail. It wasn't long before I realized that such
work was extremely tedious. Also, it didn't take long to learn that the process could be greatly
speeded up by selecting only a few short sequences of low-valued numbers that would serve as
test cases. And this would mean that only a few hundred words would need to be numbered in
each candidate key text, greatly reducing the amount of time necessary to examine each passage
of text.
I recalled that the author of the pamphlet said "With this idea, a test was made of every book I
could procure." It sure sounded like the author had examined many books and documents before
selecting and using the Declaration to decode No. 2. If true, I felt that the author would likely
have adopted the same short cut that I hit upon after attempting to decode No. 1 and No. 3 using
just a few different candidate key texts. Moreover, the author would likely have recognized that
mistakes made in numbering the words in a candidate key text would cause some letters in the
decoded plain text to be incorrect. Thus, the author was probably careful to avoid making
mistakes in numbering the words or letters in each text.
It so happens that a rather long string of mostly low-valued numbers occurs right at the beginning
of cipher No. 2. The twenty-one cipher numbers are these:
115, 73, 24, 807, 37, 52, 49, 17, 31, 62, 647, 22, 7, 15, 140, 47, 20, 107, 70, 85, 56.
If the pamphlet's author had used this string of cipher numbers, he would have needed to number
only the first 140 words in each candidate key text. The large numbers 807 and 647 could be
skipped, as the remaining nineteen numbers would be enough to recognize gibberish and rule out
most texts. And, it would most likely be enough to recognize syllables or words produced by a
correct key text.
If words 1 through 140 are numbered in the pamphlet's Declaration of Independence and the
string of 19 cipher numbers at the beginning of No. 2 are deciphered (omitting 807 and 647), the
recovered text looks like this:
I H A _ E D E P O S _ T E D I N T H E C O.
The author could have used other strings of low-valued numbers in No. 2 to confirm that he was
on the right track.
There was a bit of luck involved in the selection of Beale's Declaration and the author's
Declaration, which is worthwhile to point out. A little bit of luck never hurts. Word 155 ("A") in
the phrase "institute a new government" found in Beale's Declaration, though not present in the
original Dunlap broadside printed by John Dunlap the night of July 4, 1776, is also found (by
luck) in the pamphlet's Declaration. It so happens that the phrase "institute a new government" is
a major variant found in 112 of the 321 different Declarations printed prior to 1823, and it is
found in many Declarations printed afterwards. The first perceived discrepancy between the two
Declarations occurs at word 510, spelled as two words ("mean" and "time") in Beale's
Declaration and one word "meantime" in the pamphlet's Declaration.
Moreover, the first counting error in Beale's Declaration occurs somewhere between word 241
(invariably) and word 247 (design). Thus, no discrepancy occurs between the two Declarations
until after word 241.
This means that if the author had correctly numbered the first 140 words in his Declaration (as
conjectured), and deciphered the first twenty-one cipher numbers in No. 2 skipping over numbers
807 and 647 (as conjectured), he would have obtained the decipherment given above, namely, I
HA_E DEPOS_TED IN THE CO.
Even before numbering additional words in his Declaration and decoding additional cipher
numbers in No. 2, the author may have recognized that number 807 was likely letter "V" and
number 647 was likely letter "I."
It seems likely that the next step taken by the author would have been to number the remainder of
his Declaration, say to word one thousand. Then, he would have discovered that cipher numbers
807 and 647 were not decoded as letters "V" and "I." He probably rechecked the numbering of
the words in his Declaration, but alas numbers 807 and 647 could not be decoded correctly. From
this, the author must have realized that Beale had likely made an error in preparing his
key'perhaps a counting error.
Before continuing, it is worthwhile to note that with only 140 words numbered in the author's
Declaration, 535 of the 763 cipher numbers in No. 2 (70 percent) could be correctly decoded.
Moreover, if the pamphlet's Declaration was numbered to word 241, or beyond, then 606 of the
763 cipher numbers in No. 2 (79 percent) could be correctly decoded.
It seems probable that after numbering additional words in the Declaration, that No. 2 was
decoded by continuing with the 22nd cipher number, and decoding each number (one at a time)
until reaching the end of cipher No. 2. In other words, the cipher would be decoded in the usual
manner, like any other cipher whose key was available, with one exception. Letters that didn't
seem to decode correctly were examined further to see if they could be decoded by replacing the
decoded letter with some other letter. All decoded cipher numbers up to and including number
241 would have been decoded correctly by consulting the key. Only numbers greater than 241
would have decoded incorrectly.
For sake of argument, suppose the process is moved forward in time in order to see what the
decoded letters would have looked like after forty cipher numbers had been decoded:
115, 73, 24, 807, 37, 52, 49, 17, 31, 62, 647, 22, 7, 15, 140, 47, 20,
I H A R E D E P O S C T E D I N T
107, 70, 85, 56, 239, 10, 26, 811, 5, 196, 308, 85, 52, 160, 136, 59,
H E C O U N T F O F G E D F O R
211, 26, 9, 46, 316, 554, 122.
D A B O A T F
Notice that number 554 in the author's correctly numbered key happens by accident to reference
word "to" beginning with the letter "T." The word "to" is the wrong word but it begins with the
right letter. As I say, a little bit of luck never hurts. From a perusal of the cipher numbers and the
matching decoded letters, it seems clear that the author could have deduced that numbers 807,
647, and 811 stood for letters "V," "I," and "Y." Likewise, he may have noticed that number 308
should decode as the letter "B" to form the word "Bedford" and that number 316 should decode
as the letter "U" to form the word "about." The process most likely consisted of parsing the
decoded string of letters into words while at the same time correcting certain of the decoded
letters. Such an approach is possible only if enough letters in the decoded text are correct to start
with. In our case, it works.
The author may have noticed that word 309 ("Britain") begins with letter "B" and word 317
("usurpations") begins with letter "U." Again, this would be further evidence that Beale very
likely made a mistake in preparing his key, and that number 308 was intended to refer to word
309 and that number 316 was intended to refer to word 317. Even if the author was not so astute,
and did not recognize the emerging pattern immediately, he would most likely have noticed it
eventually. And, once that happened, he would have been on his guard to decode cipher numbers
by first looking at the referenced word and if that didn't seem to give the right letter, then attempt
to find a correct decoding by consulting an adjacent word in the key. That tactic would have
allowed the author to correctly decode 90 percent of the cipher numbers in No. 2. Moreover, as
numbers like 807, 647, 811, 308 and 316 were successfully decoded, on the basis of their context
in the partially decoded No. 2, a list of these cipher numbers and their corresponding decoded
letters could have been maintained, perhaps in a list. This would permit other occurrences of
these same cipher numbers to be easily decoded as well, which would also serve as an additional
confirmation that the entries in the accumulated list were indeed correct. If an unusually long
string of large numbers was encountered, without being able at once to be decoded, such strings
could be passed over and decoded later, after additional portions of the cipher text had been
decoded. As more and more cipher numbers in No. 2 were decoded, and as more and more
correct decoded letters were obtained, the author's task would have become easier and
easier.
By the time the author completed his decipherment of No. 2, he would have recognized that
Beale made one or more clerical errors in preparing his key. Much later, when the author decided
to publish the Beale Papers in pamphlet form, it is supposed that he recognized two important
things. Attempts to explain how No. 2 had been decoded or attempts to explain the clerical errors
that Beale made in preparing his key were issues much too complex to be dealt with in a small
pamphlet.
Moreover, it was the author's intention in the pamphlet to say that ciphers No. 1 and No. 3 could
be solved by finding the right key texts. But, if Lynchburg residents had known the amount of
work involved in decoding No. 2, many of these people would have been discouraged before ever
beginning the task. This could negatively impact the sale of pamphlets. However, the author also
recognized that readers would want to see how No. 2 could be decoded with the Declaration. His
compromise, or way out, was to provide a copy of the Declaration whose words were purposely
misnumbered, thus compensating for the mistakes made by Beale in numbering his copy of the
Declaration, and thereby permitting No. 2 to be decoded by readers of the pamphlet. The author
prepared the pamphlet's misnumbered Declaration using the decoded No. 2 and his copy of the
Declaration.
I will be the first to admit that the treasure story would be more appealing and convincing if the
author had explained how he went about his work of decoding No. 2, rather than leave this
entirely to conjecture. But, I can also see, from a marketing perspective, why he elected to omit
this information in the pamphlet.
Love conjectured and attempted to show that the pamphlet's author could have decoded cipher
No. 2 only if he had a copy of the Declaration misnumbered in the same way that Beale
misnumbered his copy of the Declaration. As Love pointed out, this would have been a practical
impossibility if Beale and the author were two different persons, but it would be possible if Beale
and the author were one in the same person. Thus, Love concluded that Beale and the author
must have been the same person, in which case the author was the person who actually created
cipher No. 2. This is a clever argument, but it breaks down, as it has been shown that the author
could have decoded No. 2 using a correctly numbered copy of the Declaration. Thus, Love's
conclusion that No. 2, and by implication No. 1 and No. 3, were created by the pamphlet's
author, and his conclusion that the treasure story is a hoax, do not follow from his initial
conjecture.
Further information about the Beale treasure can be found at the website of the author Stephen
M. Matyas Jr
www.BealeTreasureStory.com.
Go to top page of Beale Code material
.