Beale Ciphers
   HOME

TheInfoList



OR:

The Beale ciphers are a set of three
ciphertext In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext ...
s, one of which allegedly states the location of a buried
treasure Treasure (from la, thesaurus from Greek language ''thēsauros'', "treasure store") is a concentration of wealth — often originating from ancient history — that is considered lost and/or forgotten until rediscovered. Some jurisdictions le ...
of gold, silver and jewels estimated to be worth over US$43 million Comprising three ciphertexts, the first (unsolved) text describes the location, the second (solved) ciphertext accounts the content of the treasure, and the third (unsolved) lists the names of the treasure's owners and their next of kin. The story of the three ciphertexts originates from an 1885 pamphlet called ''The Beale Papers'', detailing treasure being buried by a man named Thomas J. Beale in a secret location in
Bedford County, Virginia Bedford County is a United States county located in the Piedmont region of the Commonwealth of Virginia. Its county seat is the town of Bedford, which was an independent city from 1968 until rejoining the county in 2013. Bedford County was ...
, in about 1820. Beale entrusted a box containing the encrypted messages to a local innkeeper named Robert Morriss and then disappeared, never to be seen again. According to the story, the innkeeper opened the box 23 years later, and then decades after that gave the three encrypted ciphertexts to a friend before he died. The friend then spent the next twenty years of his life trying to decode the messages, and was able to solve only one of them, which gave details of the treasure buried and the general location of the treasure. The unnamed friend then published all three ciphertexts in a pamphlet which was advertised for sale in the 1880s. Since the publication of the pamphlet, a number of attempts have been made to decode the two remaining ciphertexts and to locate the treasure, but all efforts have resulted in failure. There are many arguments that the entire story is a hoax, including the 1980 article "A Dissenting Opinion" by cryptographer
Jim Gillogly James J. Gillogly (born 5 March 1946) is an American computer scientist and cryptographer. Biography Early life His interest in cryptography stems from his boyhood, as did his interest in mathematics. By junior high he was inventing his own ciph ...
, and a 1982 scholarly analysis of the ''Beale Papers'' and their related story by
Joe Nickell Joe Nickell (born December 1, 1944) is an American skeptic and investigator of the paranormal. Nickell is senior research fellow for the Committee for Skeptical Inquiry and writes regularly for their journal, ''Skeptical Inquirer''. He is also ...
, using historical records that cast doubt on the existence of Thomas J. Beale. Nickell also presents linguistic evidence demonstrating that the documents could not have been written at the time alleged (words such as "stampeding", for instance, are of later vintage). His analysis of the writing style showed that Beale was almost certainly James B. Ward, whose 1885 pamphlet brought the Beale Papers to light. Nickell argues that the tale is thus a work of fiction; specifically, a "secret vault" allegory of the Freemasons; James B. Ward was a Mason himself.


Background

A pamphlet published in 1885, entitled ''The Beale Papers'', is the source of this story. The treasure was said to have been obtained by an American named Thomas J. Beale in the early 1800s, from a mine to the north of Nuevo México (New Mexico), at that time in the Spanish province of Santa Fe de Nuevo México (an area that today would most likely be part of
Colorado Colorado (, other variants) is a state in the Mountain states, Mountain West subregion of the Western United States. It encompasses most of the Southern Rocky Mountains, as well as the northeastern portion of the Colorado Plateau and the wes ...
). According to the pamphlet, Beale was the leader of a group of 30 gentlemen adventurers from
Virginia Virginia, officially the Commonwealth of Virginia, is a state in the Mid-Atlantic and Southeastern regions of the United States, between the Atlantic Coast and the Appalachian Mountains. The geography and climate of the Commonwealth ar ...
who stumbled upon the rich mine of gold and silver while hunting buffalo. They spent 18 months mining thousands of pounds of precious metals, which they then charged Beale with transporting to Virginia and burying in a secure location. After Beale made multiple trips to stock the hiding place, he then encrypted three messages: the location, a description of the treasure, and the names of its owners and their relatives. The treasure location is traditionally linked to Montvale in
Bedford County, Virginia Bedford County is a United States county located in the Piedmont region of the Commonwealth of Virginia. Its county seat is the town of Bedford, which was an independent city from 1968 until rejoining the county in 2013. Bedford County was ...
. Beale placed the ciphertexts and some other papers in an iron box. In 1822 he entrusted the box to a Lynchburg innkeeper named Robert Morriss. Beale told Morriss not to open the box unless he or one of his men failed to return from their journey within 10 years. Sending a letter from St. Louis a few months later, Beale promised Morriss that a friend in St. Louis would mail the key to the cryptograms; however, it never arrived. It was not until 1845 that Morriss opened the box. Inside he found two plaintext letters from Beale, and several pages of ciphertext separated into Papers "1", "2", and "3". Morriss had no luck in solving the ciphers, and decades later left the box and its contents to an unnamed friend. The friend, then using an edition of the
United States Declaration of Independence The United States Declaration of Independence, formally The unanimous Declaration of the thirteen States of America, is the pronouncement and founding document adopted by the Second Continental Congress meeting at Pennsylvania State House ( ...
as the key for a modified
book cipher A book cipher, or Ottendorf cipher, is a cipher in which the key is some aspect of a book or other piece of text. Books, being common and widely available in modern times, are more convenient for this use than objects made specifically for crypto ...
, successfully deciphered the second ciphertext which gave a description of the buried treasure. Unable to solve the other two ciphertexts, the friend ultimately made the letters and ciphertexts public in a pamphlet entitled ''The Beale Papers'', which was published by yet another friend, James B. Ward, in 1885. Ward is thus not "the friend". Ward himself is almost untraceable in local records, except that a man with that name owned the home in which a Sarah Morriss, identified as the spouse of Robert Morriss, died at age 77, in 1863. He also is recorded as becoming a Master Mason in 1863. The images below, transcribed from the pamphlet, show the original line-breaks for easy comparison. In the second cryptogram, the original cipher errors are highlighted in red. Beale 1.svg, Beale's first cryptogram Beale 2.svg, Beale's second cryptogram (the deciphered one) Beale 3.svg, Beale's third cryptogram.


Deciphered message

The
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of com ...
of paper number 2 reads:
I have deposited in the county of Bedford, about four miles from Buford's, in an excavation or vault, six feet below the surface of the ground, the following articles, belonging jointly to the parties whose names are given in number three, herewith: The first deposit consisted of ten hundred and fourteen pounds of gold, and thirty-eight hundred and twelve pounds of silver, deposited Nov. eighteen nineteen. The second was made Dec. eighteen twenty-one, and consisted of nineteen hundred and seven pounds of gold, and twelve hundred and eighty-eight of silver; also jewels, obtained in St. Louis in exchange to save transportation, and valued at thirteen thousand dollars. The above is securely packed in iron pots, with iron covers. The vault is roughly lined with stone, and the vessels rest on solid stone, and are covered with others. Paper number one describes the exact locality of the vault, so that no difficulty will be had in finding it.
The second cipher can be decrypted fairly easily using a modified copy of the
United States Declaration of Independence The United States Declaration of Independence, formally The unanimous Declaration of the thirteen States of America, is the pronouncement and founding document adopted by the Second Continental Congress meeting at Pennsylvania State House ( ...
, but some editing is necessary. To decrypt it, one finds the word corresponding to the number (e.g., the first number is 115, and the 115th word in the Declaration of Independence is "instituted"), and takes the first letter of that word (in the case of the example, "I"). Beale used a version of United States Declaration of Independence slightly different from the original, and made mistakes in numbering it. To extract the hidden message, the following five modifications must be applied to the original text: * after word 154 ("institute") and before word 157 ("laying") one word must be added. The pamphlet handles this by inserting "a" before "new government". * after word 240 ("invariably") and before word 246 ("design") one word must be removed (probably "a"). The pamphlet's numbering has eleven words between the labels for 240 and 250. * after word 466 ("houses") and before word 495 ("be") ten words must be removed (probably "He has refused for a long time after such dissolutions"). The pamphlet has two labels for 480. * after word 630 ("eat") and before word 654 ("to") one word must be removed (probably "the"). The pamphlet's numbering has eleven words between the labels for 630 and 640. * after word 677 ("foreign") and before word 819 ("valuable") one word must be removed (probably "their"). The pamphlet's numbering has eleven words between the labels for 670 and 680. Furthermore: * Words 78 and 79 ("self-evident"), shown hyphenated, are counted as 2 words. * The first letter of word 95 ("inalienable") is always used as a "u" ("unalienable"). * Words 509 and 510 of the modified text ("mean time") are counted as two words, despite being shown as one word. * The first letter of the 811th word of the modified text ("fundamentally") is always used by Beale as a "y". * The first letter of the 1005th word of the modified text ("have") is always used by Beale as an "x". Finally, in the decoded text there are six errors, probably due to wrong transcription of the original paper: * ... 84, 57, 540, 217, 115, 71, 29, 84 (should be 85), 63, ... ''consistcd'' ("consisted"). * ... 53 (should be 54), 20, 125, 371, 38, 36, 10, 52, ... ''rhousand'' ("thousand"). * ... 2, 108 (should be 10, 8), 220, 106, 353, ... ''itron'' ("in iron"). * ... 440 (should be 40), 370, 643, 466, ... ''uith'' ("with"). * ... 14, 73, 84 (should be 85), ... ''thc'' ("the"). * ... 807, 81, 96 (should be 95), 405, 41, ... ''varlt'' ("vault"). Additional Declaration differences affect paper number 1: word 210 of the modified text ("more") is shown as "now"; words 919 and 920 of the modified text ("fellow citizens") are shown hyphenated (also affects paper number 3); two extra words ("made" and "the") are shown in modified text positions 1058 and 1188; a word is removed ("of") after modified text position 1125. The other slight changes probably have no consequences. Many versions of the Declaration of Independence have been printed, with various adjustments to paragraphing, word inclusion, word changing, spelling, capitalization, and punctuation. The lack of clear images of the original ciphers, combined with the large quantity of numerals, has led to numerals being misprinted or omitted in many sources. The Beale Papers text, on pages 20 to 21, gives an alleged translation of the second ciphertext, but it has nine differences from the actual one. The differences are shown here as :
I have deposited, in the county of Bedford, about four miles from Buford's, in an excavation or vault, six feet below the surface of the ground, the following articles, belonging jointly to the parties whose names are given in number herewith: The first deposit consisted of and fourteen pounds of gold, and eight hundred and twelve pounds of silver, deposited . The second was made , and consisted of nineteen hundred and seven pounds of gold, and twelve hundred and eighty-eight of silver; also jewels, obtained in St. Louis in exchange to save transportation, and valued at . The above is securely packed in iron pots, with iron covers. The vault is roughly lined with stone, and the vessels rest on solid stone, and are covered with others. Paper number describes the exact locality of the vault, so that no difficulty will be had in finding it.
A translation of the Cipher from the actual Declaration of Independence shows in fact very poor spelling: "I haie deposoted in the copntt ol bedoort aboup four miles from bulords in an epcaiation or iault six fest below the surlact of thh gtound ths fotlowing articiss beaonging joiotlt to the partfes whosl namfs ate giiet in number thrff httewith.."


Value

The treasure's total weight is about 3 
ton Ton is the name of any one of several units of measure. It has a long history and has acquired several meanings and uses. Mainly it describes units of weight. Confusion can arise because ''ton'' can mean * the long ton, which is 2,240 pounds ...
s as described in inventory of the second cryptogram. This includes approximately 35,052  troy oz gold, 61,200 troy oz silver (worth about US$42 m and US$1 m, respectively, in January 2017) and jewels worth around US$220,000 in 2017.


Authenticity

There has been considerable debate over whether the remaining two ciphertexts are real or hoaxes. An early researcher, Carl Hammer of
Sperry UNIVAC UNIVAC (Universal Automatic Computer) was a line of electronic digital stored-program computers starting with the products of the Eckert–Mauchly Computer Corporation. Later the name was applied to a division of the Remington Rand company and ...
, used supercomputers of the late 1960s to analyze the ciphers and found that while the ciphers were poorly encoded, the two undeciphered ones did not show the patterns one would expect of randomly chosen numbers and probably encoded an intelligible text. Other questions remain about the authenticity of the pamphlet's account. In the words of one researcher "To me, the pamphlet story has all the earmarks of a fake . . . here wasno evidence save the word of the unknown author of the pamphlet that he ever had the papers." The pamphlet's background story has several implausibilities, and is based almost entirely on circumstantial evidence and
hearsay Hearsay evidence, in a legal forum, is testimony from an under-oath witness who is reciting an out-of-court statement, the content of which is being offered to prove the truth of the matter asserted. In most courts, hearsay evidence is inadmiss ...
. * Later
cryptographers This is a list of cryptographers. Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. Pre twentieth century * Al-Khalil ibn Ahmad al-Farahidi: wrote a (now lost) book ...
have claimed that the two remaining ciphertexts have statistical characteristics which suggest that they are not actually encryptions of an English plaintext. Alphabetical sequences such as are both non-random, as indicated by Carl Hammer, and not words in English. * Others have also questioned ''why'' Beale would have bothered writing three different ciphertexts (with at least two keys, if not ciphers) for what is essentially a single message in the first place, particularly if he wanted to ensure that the next of kin received their share (as it is, with the treasure described, there is no incentive to decode the third cipher). * Analysis of the language used by the author of the pamphlet (the uses of punctuation, relative clauses, infinitives, conjunctives, and so on) has detected significant correlations between it and the writing style of Beale's letters, including the plaintext of the second cipher, suggesting that they may have been written by the same person. * The letters also contain several English words, such as "improvise", not otherwise recorded before the 1820s in English but used from French from 1786 in the New Orleans area, and ''stampede'' (Spanish) "an uproar". Beale's "stampeding" apparently first appears in print in the English language in 1832 but was used from 1786 to 1823 in New Orleans in French and Spanish. * The second message, describing the treasure, has been deciphered, but the others have not, suggesting a deliberate ploy to encourage interest in deciphering the other two texts, only to discover that they are hoaxes. In addition, the original sale price of the pamphlet, 50 cents, was a high price for the time (adjusted for
inflation In economics, inflation is an increase in the general price level of goods and services in an economy. When the general price level rises, each unit of currency buys fewer goods and services; consequently, inflation corresponds to a reduct ...
, it is equivalent to $ today), and the author writes that he expects "a wide circulation". * The third cipher appears to be too short to list thirty individuals' next of kin. * If the modified Declaration of Independence is used as a key for the first cipher, it yields alphabetical sequences such as and others. According to the
American Cryptogram Association The American Cryptogram Association (ACA) is an American non-profit organization devoted to the hobby of cryptography, with an emphasis on types of codes, ciphers, and cryptograms that can be solved either with pencil and paper, or with computers, ...
, the chances of such sequences appearing multiple times in the one ciphertext by chance are less than one in a hundred million million. Although it is conceivable that the first cipher was intended as a
proof of concept Proof of concept (POC or PoC), also known as proof of principle, is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has prac ...
letting decoders know that they were "on the right track" for one or more of the subsequent ciphers, such a proof would be redundant, as the success of the key with respect to the second document would provide the same evidence on its own. * Robert Morriss, as represented in the pamphlet, says he was running the Washington Hotel in 1820. Yet contemporary records show he did not start in that position until at least 1823.Poundstone, 127–128. *In fact a common
literary device A narrative technique (known for literary fictional narratives as a literary technique, literary device, or fictional device) is any of several specific methods the creator of a narrative uses to convey what they want —in other words, a stra ...
of fiction is the story of finding a lost treasure map from Edgar Allan Poe's
The Gold-Bug "The Gold-Bug" is a short story by American writer Edgar Allan Poe published in 1843. The plot follows William Legrand, who was bitten by a gold-colored bug. His servant Jupiter fears that Legrand is going insane and goes to Legrand's friend, an ...
to Robert Louis Stevenson
Treasure Island ''Treasure Island'' (originally titled ''The Sea Cook: A Story for Boys''Hammond, J. R. 1984. "Treasure Island." In ''A Robert Louis Stevenson Companion'', Palgrave Macmillan Literary Companions. London: Palgrave Macmillan. .) is an adventure no ...
to Milton Caniff's
Terry and the Pirates ''Terry and the Pirates'' is an action-adventure comic strip created by cartoonist Milton Caniff, which originally ran from October 22, 1934, to February 25, 1973. Captain Joseph Patterson, editor for the Chicago Tribune New York News Syndicate, ...
. There have been many attempts to break the remaining cipher(s). Most attempts have tried other historical texts as keys (e.g., Magna Carta, various books of the
Bible The Bible (from Koine Greek , , 'the books') is a collection of religious texts or scriptures that are held to be sacred in Christianity, Judaism, Samaritanism, and many other religions. The Bible is an anthologya compilation of texts ...
, the
U.S. Constitution The Constitution of the United States is the supreme law of the United States of America. It superseded the Articles of Confederation, the nation's first constitution, in 1789. Originally comprising seven articles, it delineates the nation ...
, and the Virginia Royal Charter), assuming the ciphertexts were produced with some book cipher, but none have been recognized as successful to date. Breaking the cipher(s) may depend on random chance (as, for instance, stumbling upon a book key if the two remaining ciphertexts are actually book ciphers); so far, even the most skilled
cryptanalysts Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic s ...
who have attempted them have been defeated. Of course, Beale could have used a document that he had written himself for either or both of the remaining keys or either a document of his own or randomly selected characters for the third source, in either case rendering ''any'' further attempts to crack the codes useless.


Existence of Thomas J. Beale

A survey of U.S. Census records in 1810 shows two persons named Thomas Beale, in Connecticut and New Hampshire. However, the population schedules from the 1810 U.S. Census are completely missing for seven states, one territory, the District of Columbia, and 18 of the counties of Virginia. The 1820 U.S. Census has two persons named Thomas Beale, Captain Thomas Beale of the battle of New Orleans 1815 in Louisiana originally from Virginia Botetourt County – Fincastle area 12 miles from Bedford County and one in Tennessee, and a Thomas K. Beale in Virginia, but the population schedules are completely missing for three states and one territory. Before 1850 the U.S. Census recorded the names of only the heads of households; others in the household were only counted. Beale, if he existed, may have been living in someone else's household. In addition, a man named "Thomas Beall" appears in the customer lists of St. Louis Post Department in 1820. According to the pamphlet, Beale sent a letter from St. Louis in 1822. Additionally, a Cheyenne legend exists about gold and silver being taken from the West and buried in mountains in the East, dating from roughly 1820.


Poe's alleged authorship

Edgar Allan Poe Edgar Allan Poe (; Edgar Poe; January 19, 1809 – October 7, 1849) was an American writer, poet, editor, and literary critic. Poe is best known for his poetry and short stories, particularly his tales of mystery and the macabre. He is wid ...
has been suggested as the pamphlet's real author because he had an interest in cryptography. It was well known he placed notices of his abilities in the
Philadelphia Philadelphia, often called Philly, is the List of municipalities in Pennsylvania#Municipalities, largest city in the Commonwealth (U.S. state), Commonwealth of Pennsylvania, the List of United States cities by population, sixth-largest city i ...
paper ''Alexander's Weekly (Express) Messenger'', inviting submissions of ciphers which he proceeded to solve. In 1843 he used a cryptogram as
plot device A plot device or plot mechanism is any technique in a narrative used to move the plot forward. A clichéd plot device may annoy the reader and a contrived or arbitrary device may confuse the reader, causing a loss of the suspension of disbelie ...
in his short story "
The Gold-Bug "The Gold-Bug" is a short story by American writer Edgar Allan Poe published in 1843. The plot follows William Legrand, who was bitten by a gold-colored bug. His servant Jupiter fears that Legrand is going insane and goes to Legrand's friend, an ...
". From 1820, he was also living in Richmond, Virginia at the time of Beale's alleged encounters with Morriss. In February 1826 Poe enrolled as a student at the
University of Virginia The University of Virginia (UVA) is a public research university in Charlottesville, Virginia. Founded in 1819 by Thomas Jefferson, the university is ranked among the top academic institutions in the United States, with highly selective ad ...
in
Charlottesville Charlottesville, colloquially known as C'ville, is an independent city in the Commonwealth of Virginia. It is the county seat of Albemarle County, which surrounds the city, though the two are separate legal entities. It is named after Queen Ch ...
.Poundstone, 126. But with mounting debts, Poe left for
Boston Boston (), officially the City of Boston, is the state capital and most populous city of the Commonwealth of Massachusetts, as well as the cultural and financial center of the New England region of the United States. It is the 24th- mo ...
in April 1827. However, research and facts debunk Poe's authorship. He died in 1849, well before ''The Beale Papers'' were first published in 1885. The pamphlet also mentions the
American Civil War The American Civil War (April 12, 1861 – May 26, 1865; also known by other names) was a civil war in the United States. It was fought between the Union ("the North") and the Confederacy ("the South"), the latter formed by states ...
that started in 1861.
William Poundstone William Poundstone is an American author, columnist, and skeptic. He has written a number of books including the ''Big Secrets'' series and a biography of Carl Sagan. Early life and education Poundstone attended MIT and studied physics. Personal ...
, an American author and skeptic, had stylometric analysis performed on the pamphlet for his 1983 book ''Biggest Secrets'', and found that Poe's
prose Prose is a form of written or spoken language that follows the natural flow of speech, uses a language's ordinary grammatical structures, or follows the conventions of formal academic writing. It differs from most traditional poetry, where the ...
is significantly different from the
grammatical structure In linguistics, the grammar of a natural language is its set of structural constraints on speakers' or writers' composition of clauses, phrases, and words. The term can also refer to the study of such constraints, a field that includes domain ...
used by the author who wrote ''The Beale Papers''.Poundstone, 133.


Statistical Analysis

Another method to check the validity of the ciphers is to investigate some statistical aspects in different number bases. For example, one can investigate the frequency of the last digit in each number in the ciphers. These frequencies are not uniformly distributed – some digits are more common than others. This is true for all three ciphers. However, if one considers a base that is relatively prime to 10, then the last digits of the numbers in the unsolved ciphers turn uniform – each digit is equally common. The frequency of the solved cipher stays non-uniform. This indicates a complex behaviour in the solved cipher as one might expect from an encoded message, while the unsolved ciphers have a simpler behaviour. Humans have limited abilities when it comes to generating random numbers out of thin air. One explanation for the difference between base 10 and the other ones is that the numbers were produced by a human in base 10, which would mean that the ciphers are fraudulent.


Search attempts

Despite the Beale Papers' unproven veracity, treasure hunters have not been deterred from trying to find the vault. The "information" that there is buried treasure in Bedford County has stimulated many expeditions with shovels, and other implements of discovery, looking for likely spots. For more than a hundred years, people have been arrested for trespassing and unauthorized digging; some of them in groups as in the case of people from Pennsylvania in the 1990s. Several digs were completed at the top of Porter's Mountain, one in the late 1980s with the land owner's permission as long as any treasure found was split 50/50. However, the treasure hunters only found
Civil War A civil war or intrastate war is a war between organized groups within the same state (or country). The aim of one side may be to take control of the country or a region, to achieve independence for a region, or to change government policies ...
artifacts. As the value of these artifacts paid for time and equipment rental, the expedition broke even.


Media attention

The story has been the subject of multiple television documentaries, such as the UK's ''Mysteries'' series, a segment in the seventh special of ''
Unsolved Mysteries ''Unsolved Mysteries'' is an American mystery documentary television show, created by John Cosgrove and Terry Dunn Meurer. Documenting cold cases and paranormal phenomena, it began as a series of seven specials, presented by Raymond Burr, Ka ...
''; and the 2011 ''Declaration of Independence'' episode of the History Channel TV show ''Brad Meltzer's Decoded''. There are also several books, and considerable Internet activity. In 2014, the National Geographic TV show ''The Numbers Game'' referred to the Beale ciphers as one of the strongest passwords ever created. In 2015 the
UKTV UKTV Media Limited, simply known as UKTV, is a British multi-channel broadcaster, which, since 2019, has been wholly owned by BBC Studios (formerly BBC Worldwide), a commercial subsidiary of the BBC. It was formed on 1 November 1992 through ...
series ''Myth Hunters'' (also known as ''Raiders of the Lost Past'') devoted one of its season 3 episodes to the topic. Also in 2015, the
Josh Gates Josh Gates (born August 10, 1977) is an American television presenter and television producer. He was the host and co-executive producer of ''Destination Truth'' and '' Stranded'' on Syfy, and currently hosts and co-executive produces The Disco ...
series ''
Expedition Unknown ''Expedition Unknown'' is an American reality television series produced by Ping Pong Productions, that follows explorer and television presenter Josh Gates as he investigates mysteries and legends. The series premiered on January 8, 2015 and o ...
'' visited Bedford to investigate the Beale Ciphers and search for the treasure.
Simon Singh Simon Lehna Singh, (born 19 September 1964) is a British popular science author, theoretical and particle physicist. His written works include ''Fermat's Last Theorem'' (in the United States titled ''Fermat's Enigma: The Epic Quest to Solve th ...
's 1999 book ''
The Code Book ''The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography'' is a book by Simon Singh, published in 1999 by Fourth Estate and Doubleday. ''The Code Book'' describes some illustrative highlights in the history of cryptog ...
'' explains the Beale cipher mystery in one of its chapters. In 2010, an award-winning animated short film was made concerning the ciphers called ''The Thomas Beale Cipher''.


See also

*
List of ciphertexts Some famous ciphertexts (or cryptograms), in chronological order by date, are: See also * Undeciphered writing systems (cleartext, natural-language writing of unknown meaning) External links * Elonka Dunin Elonka Dunin (; born December ...
*
Rennes-le-Château Rennes-le-Château (; oc, Rènnas del Castèl) is a commune approximately 5 km (3 miles) south of Couiza, in the Aude department in the Occitanie region in Southern France. In 2018, it had a population of 91. This hilltop village is k ...
– a similar case where encrypted documents, discovered in a church in France, allegedly refer to a hidden treasure *
Oak Island mystery The Oak Island mystery is a series of stories of buried treasure and unexplained objects found on or near Oak Island in Nova Scotia. Since the 18th century, attempts have been made to find treasure and artifacts. Theories about artifacts prese ...
– an alleged undiscovered buried treasure on Oak Island in Nova Scotia *
Captain Kidd William Kidd, also known as Captain William Kidd or simply Captain Kidd ( – 23 May 1701), was a Scottish sea captain who was commissioned as a privateer and had experience as a pirate. He was tried and executed in London in 1701 for murder a ...
– a 17th-century pirate who is supposed to have left behind clues to buried treasure *
Treasure of Lima The Treasure of Lima is a legendary buried treasure reputedly removed from Lima, Peru, in 1820 and never recovered. It is estimated to be worth up to £160 million or $208 million in today's money. History Spain had controlled Lima since the 16th ...
another legendary lost treasure *
Lost Dutchman's Gold Mine The Lost Dutchman's Gold Mine (also known by similar names) is, according to legend, a rich gold mine hidden in the southwestern United States. The location is generally believed to be in the Superstition Mountains, near Apache Junction, east ...
legendary lost treasure


References


Further reading

* Viemeister, Peter. ''The Beale Treasure: New History of a Mystery'', 1997. Published by Hamilton's, Bedford, Virginia * Gillogly, James J.br>"The Beale Cipher: A Dissenting Opinion April 1980
''Cryptologia'', Volume 4, Number 2 * Easterling, E.J. '' In Search Of A Golden Vault: The Beale Treasure Mystery ''( CD/AUDIO BOOK 70 min. ) copyright 1995/ Revised In 2011 . Avenel Publishing 1122 Easter Lane Blue Ridge, VA 24064.


External links

* , as text in separate pages, shown alongside images of the original. * have been made in video format with audio for the whole pamphlet. * * * * *
"Historical and Analytical Studies in Relation to the Beale Ciphers"
{{DEFAULTSORT:Beale ciphers Bedford County, Virginia History of cryptography Treasure Undeciphered historical codes and ciphers Urban legends