RESTORED and UPDATE ADDED at the end 6/19/23
The first publicized killing of the Zodiac was a Christmas murder. The two young victims were supposed to attend a Christmas program that evening. I find it interesting that once again, at Christmas time this story hits the news. If you missed it, there are multiple articles and videos related to the topic easily located via a google search.
Apparently, the mysterious Cypher that has baffled everyone all these years was broken by a team of folks from USA, AUSTRALIA and BELGIUM. Immediately my senses are detecting a foul odor. Anytime the Netherlands are involved, I have my suspicions.
It seems that there are a lot of numbers that contain the numeral 5 in the Zodiac case. I seem to remember one article saying that he stated he liked the number 5. It has been 50 or 51 years, since the story broke. They have confirmed 5 cases to be his work. He claims that he committed at least 37 murders.
NOW, if you don’t know it by now, you better wake up. The elite rule this world through witchcraft. It is all about the numbers and symbols. NOTHING gets before your eyes unless they plan it or allow it. That is a fact. YOU are controlled. MIND CONTROLLED. Deny it all you want. That is the TRUTH. Unless you are lead by the SPIRIT of GOD and COVERED BY THE BLOOD OF JESUS, YOU are their slaves. They have taught you to love your bondage. Just like they swore they would do.
They have released this story, just at the moment they have calculated. It is related to WAR, DEPOPULATION, and the RESET. Timed to coincide with the MARS Missions. MARS the PLANET OF WAR! Just as all the world is bumping heads and calling for war. As the troops are being readied and the ships are being positioned. DO YOU SEE??
spacer
Zodiac killer code cracked by Australian mathematician 50 years after first murder | ABC News
spacer
2 days ago — It took 51 years to crack, but one of the taunting messages written in code and attributed to the Zodiac Killer has been solved, according to the F.B.I. The mysterious 340-character cipher, which was mailed to The San Francisco Chronicle in November 1969, does not reveal the killer’s identity.
Here we need to take a look at a snippet from the Golden Eye video momentarily for some symbology.
This pic in the center was snipped from the Golden Eye video, on the left I highlighted what I wanted you to notice. (please forgive my shakey hand) You can see depicted in this photo first of all the sigil of the Mark of the Beast. It is looking more and more everyday that the coming mandatory vaccine may be the MARK OF THE BEAST prophesied in the Bible. It is most likely that this Plandemic was devised to open the way for the Mark to be enforced.
Next you will notice the man falling through the sigil of Mammon, in the world of magic this image is a powerful working, symbolizing the demonic realm taking down mankind. You should also notice the image of a cross outside the circle. Also, a magical working to signify that the grace of God is outside of what is happening to mankind. The end of GRACE. So, anyone who has not been marked by GOD, will have no defense. There is no more grace for them.
You should also notice if you look closely that the image of the cube is inside the circle as well.
spacer
I SPY a Trump Janus GEMINI GoldenEye
Premiered Aug 8, 2020
In this video they talk about the WORLDWIDE ECONOMIC MELTDOWN… which the elite have planned for 2021. IF you are not familiar with this plan see my article on DAVOS:
DAVOS – World Economic Forum – WHAT YOU NEED TO KNOW!
ZODIAC KILLER – ESOTERIC ANGLES AND ELECTROMAGNETIC WEAPONS AS RITUAL SACRIFICE?
Zodiac Killer – Wikipedia
https://en.wikipedia.org/wiki/Zodiac_Killer#cite_ref-peekaboo_6-1
Murder of Cheri Jo Bates
https://en.wikipedia.org/wiki/Murder_of_Cheri_Jo_Bates
The murders of Paul Lee Stein and Cheri Jo Bates line up at 131.3 degrees 388 miles apart (from San Francisco at Washington & Cherry, then crossing over Washington & Cherry in Fontana, CA before landing in Riverside, California, where the murder occurred)
I’m helping draw correlations between modern day Zodiac’s borrowing the symbols, locations and esoteric/occult azimuths/angles from the previous Zodiac killings. Is there a connection to the current killers and those in the 60”s and 70’s? Are they still taunting us outside of our awareness because the population hasn’t yet familiarized themselves with their ‘methods’?
They are tapping into the Fibonacci Sequence. It’s associated with the Golden Ratio/Golden Mean (the infinite spiral). They are binding ritual murders (sacrifice) to Aether or Bioplasma via the Fibonacci Sequence which is exists in all patterns within nature, organic or artificial. It follows everything. So by tapping to the math of
1×1-2×3-3×3-5×5-8×8….13×13….21×21-34×34 |
– they can ‘hack’ collective perception which gives the teams behind this ‘influence’ which is ‘bioplasma manipulation’. Binding their occult work to the zodiac symbol using trauma, sacrifice helps facilitate this link. It’s a team of people if my research is correct and I believe I can identify some of the actual members if given an opportunity to sit down with law enforcement. There were some ‘fake/mock’ murders mixed in with ‘actual’ Electromagnetic and Directed Energy ‘soft kill’ ritual murders (aka Sacrifice). They use ley lines, both natural and man-made. The level of disinformation and trolling from the Zodiac ‘families’ as I call them, is on-going and they still have influence. Right down to the production of the David Fincher film “Zodiac” which is part of the larger occult work if you pay attention.
For consulting and/or contributions to my research and work contact Gabriel Cruz at:
RFCHAOSHEART@GMAIL.COM
TO WATCH THIS VIDEO ON BITCHUTE: CLICK HERE
With Halloween upon us I thought it would be fun to tell you about a fact noticed by Steve Wang more than 20 years ago and published in the Journal of Recreational Mathematics (pdf of the paper here). While most of us think of Halloween as a harmless night of dressing up and turning up our noses at candy corn, some associate it with Satanism and witchcraft. The Book of Revelation tells us that the Number of the Beast, the Sign of the Devil, is 666. If you have a calculator handy enter 666 and hit the sine key (make sure you’re in degree mode!). My smartphone tells me the answer is -0.809016994374948…, a rather random-looking number and certainly not one that’s immediately recognizable.
Except that it is, once you know what to look for, but to get there we have to take a diversion. Supposedly, the ancient Greeks, being master aestheticians, liked their geometric figures to be pleasantly proportioned (there’s no real evidence for this, but it’s one of those things we like to repeat anyway). In the case of rectangles, they preferred the side lengths to be in proportion as the golden ratio.
Here the green rectangle on the right has the correct proportions: a/b = φ, the golden ratio. This number is defined by the property that if you place the blue square of side length a adjacent to the green rectangle, the resulting rectangle has the same proportions; that is, (a+b)/a = a/b. This equation allows us to find the value of φ exactly. Take b=1 and then simplify to get the equation a² = a + 1. Via the quadratic formula, we then get two solutions, one positive and one negative. The positive solution is what we call φ:
So what? Divide this by 2 and you get 0.80901699437494…, which agrees with our calculation of the sine of 666°, up to a sign. That’s not a proof of course, since we only have 14 decimal places of accuracy, but this would be a pretty big coincidence if there were not an exact equality between the sine of 666° and -φ/2.
How can we prove it? First, let’s reduce the angle to something smaller. The sine function is periodic with period 360° (the calculus teacher in me is struggling with using degrees instead of radians). That means that we may as well use the angle 306°, but even better we can use -54° (666-720) and the fact that sin(-α) = -sin(α) for any angle α. So we’ve reduced the question to showing that sin(54°) = φ/2.
The trick now is to consider the isosceles triangle ABC shown below, whose angles are 36°, 72° and 72°.
Bisecting the top angle yields a triangle BCD, which is similar to ABC. If we denote the length of the segment CD by a, and the segment BD by b, then we may fill in the lengths of the remaining sides as indicated. Since similar triangles are proportional we have (AC/BC) = (BC/BD), or (a+b)/a = a/b. In other words, a and b are in proportion as the golden ratio and we call ABC a golden triangle.
Now drop a perpendicular from point D to segment AC; this bisects the angle at D since triangle ADC is isosceles. We then have the triangle below, with the indicated angle measurements.
We can now unravel what we need: sin(54°) = AE/AD = 2AE/2AD = (a+b)/2a = (1/2)(a/b) = φ/2. Pretty cool.
The golden ratio shows up in a number of contexts, most notably in connection with the Fibonacci sequence, but this Satanic link is certainly the most entertaining. Perhaps St. Augustine was correct when he warned us, “The good Christian should beware of mathematicians. The danger already exists that mathematicians have made a covenant with the Devil to darken the spirit and confine man in the bonds of Hell.” He really meant numerologists and astrologers, but, whatever; it makes for a good quote. (No HE MEANT EXACTLY WHAT HE SAID. MODERN SCIENCE IS WITCHCRAFT!) Happy Halloween!
spacer
UPDATED: ORIGINAL:
The Zodiac Ciphers: What We Know
Some have been broken, while others remain stubbornly resistant to code-crackers.
Z 408, sent July 31, 1969
The first cipher Zodiac created was his longest, 408 characters. The killer split it into three pieces of equal length and mailed two to newspapers in San Francisco and one to a paper in nearby Vallejo, demanding they be printed or he would go on a “kill rampage.” The ciphers were published.WHO CRACKED IT: Within about a week North Salinas schoolteacher Donald Harden and his wife Bettye contacted The San Francisco Chronicle with their solution. Bettye is credited with discovering two cribs, words or phrases suspected to appear in the message. Cribs are powerful cryptanalytic tools, because once a location or locations can be determined for them, several substitutions can be identified, which can accelerate the unravelling process. Inspired by the killer’s obvious craving for attention, Bettye guessed that the message would begin with the word “I.” She also believed the word KILL or KILLING—or even the phrase I LIKE KILLING—would appear somewhere in the message. Her guesses turned out to be correct.
INTRIGUING CLUES: Knowing how Zodiac selected the strange symbols he used to represent his “alphabet” might reveal something about him, such as his education or special interests. There have been many ciphers over the centuries that used strange symbols that range from systems intended for kids to alphabets used by occultists. One example is even called “The Zodiac Alphabet.” While many of these have some symbols in common with those used by the killer, none matches closely enough to be considered more than inspirational.
Elements of the cipher might even tell us something about the killer’s occupation or place of employment. Among the symbols included in his ciphers were circles with different portions shaded in—ideograms believed to have been invented by Harvey Poppel of Booz Allen Hamilton,a management-consulting firm known for its defense and intelligence contracts. The use of Harvey Balls or Booz Balls, as they came to be called, spread to other companies and products, most notably the qualitative symbols used in Consumer Reports product ratings. If the killer’s use of such symbols originated from having seen Harvey Balls, it’s possible he may have had a connection to Booz Allen Hamilton or a related company.
While Z 408 required only 20-some hours for the husband-and-wife team to solve, Zodiac’s next cipher stumped everyone—experts and amateurs alike—for decades. While it appears to be the same sort of cipher, it has challenged even sophisticated artificial-intelligence software programs such as CARMEL, designed by University of Southern California professor Kevin Knight. The killer may not have liked that his first cipher was broken quickly and designed an improved cipher that, for example, wouldn’t begin with “I”—and if the word KILL appeared, the pair of Ls would be enciphered as two different symbols to make it harder to locate.
GETTING INTO THE KILLER’S HEAD: After immersing myself in books about the case and repeatedly re-reading Zodiac’s letters, I had an important insight: the killer was an amateur when it came to ciphers and would likely do things no professional would. In his Z 408, only one letter was ever represented by itself (some instances of E), so perhaps a new twist he used in the Z 340 cipher was to have many letters represented by themselves. In the solution I eventually found, half the alphabet is left unchanged. Even some punctuation, such as the period at the ends of sentences, is left as is.
Another trick he played in the new cipher was following eight lines of meaningful text with several lines of gibberish to throw off statistical analysis. He also had the repeated pair + + appear in three places, probably as a way to get would-be-solvers to make them the LL in KILL, which they did not represent this time. In the Z 408 cipher, Zodiac had two symbols that could stand for either A or S. In the Z 340, the symbol + represented F or G, but never L.
Also, as an amateur, Zodiac made quite a few mistakes when enciphering. Whenever he wrote in plain English, he made frequent spelling errors. Converting to cipher provided another chance to introduce even more mistakes. We saw them in his first cipher and they are present again in the Z 340. Still, for experts used to letter-perfect textbook ciphers, and software with a low tolerance for errors, the solution ultimately proved elusive.
Z 13, sent April 20, 1970
The killer’s shortest cipher appears, on the surface, to be the most important. It is preceded by the words “My name is⎯⎯”
Would the killer really reveal his name?
Zodiac made a big promise about the Z 408 cipher, writing, “By the way, are the police haveing [sic] a good time with the code? If not, tell them to cheer up; when they do crack it they will have me.” This was far from true. The solution even contained the words “I WILL NOT GIVE YOU MY NAME.” Zodiac may have been lying again when he sent the Z 13 cipher; but on the other hand, the unbroken cipher that followed Z 408 may have given him confidence to truly reveal something significant.
One problem is that the message is short enough to offer multiple solutions. If we can get many different names out, how can we possibly decide which is correct? One solution put forth years ago, which I believe is correct: “ALFRED E. NEUMAN,” the mascot of Mad magazine. I think putting this ridiculous name forward as his identity matches the killer’s sense of humor. Also, the first three cipher symbols in the Z 13 are AEN, Neuman’s initials.
Z 32, sent June 26, 1970
Sometimes known as the “Map Code,” because it came with a map of the San Francisco Bay area,Z 32 is Zodiac’s strangest cipher. A symbol closely resembling the cross-hairs image used by Zodiac to sign many of his messages appears on the map as a compass, with the instructions “0 is to be set to Mag. N.”This is one of several indicators that Zodiac was of above average intelligence. How many people would bother to distinguish north from magnetic north? What sort of work was the killer engaged in that made it important for him to know the difference? The compass is centered at Mt. Diablo.Why? What made this location special to Zodiac? The killer wrote, “The map coupled with this code will tell you where the bomb is set.” In a later letter, sent July 26, 1970, he provided a clue: “PS. The Mt. Diablo Code concerns Radians & # inches along the radians.” Does the Z 32 cipher use numbers to indicate a position on the map? Kevin Knight’s artificial-intelligence program CARMEL can easily investigate such possibilities systematically—and could provide some interesting results.
Craig P. Bauer is professor of mathematics at York College of Pennsylvania. He is editor in chief of the journal Cryptologia, has served as a scholar in residence at the NSA’s Center for Cryptologic History and is the author of the recently published Unsolved!: The History and Mystery of the World’s Greatest Ciphers from Ancient Egypt to Online Secret Societies.
spacer
spacer
If you listen to all the available videos and interviews and read all the articles related to this case, you will find as I did, that there is a great deal of evidence that leads one to believe the police were either involved or covering up for someone. Here are just a couple of examples:
“…in 2002 two SFPD homicide investigators mounted a promising investigation, attempting to cut through the swamp of theories by using the most sophisticated new forensics to thoroughly explore the DNA evidence. But like all things Zodiac, the fresh investigation devolved into a media circus and then a cliff-hanger, as an internal power struggle and the larger political realities buffeting the department led police brass to put the case on the back burner. To many who have studied the case, and at least one who worked it, that decision was an abrupt ending that came just as it seemed a resolution might finally be within reach.”
“About a month after the Zodiac’s second Vallejo attack, code breakers in the nation’s most elite agencies-including Naval Intelligence, the National Security Agency, and the Federal Bureau of Investigation-were attempting to crack the first of the killer’s homemade cryptograms. (One article even stated that they enlisted AI to try and solve it) Yet it was local schoolteacher Donald Harden and his wife, Bettye, who within days translated the puzzle to reveal the Zodiac’s disturbing description of how his murders were an effort to “collect slaves” for the afterlife.”
THE ZODIAC KILLER COVER-UP EXPOSED!
Why couldn’t they solve the Zodiac Killer case? Maybe because it was a hoax and a cover-up all along?
To View this Video on BITCHUTE: CLICK HERE
spacer
OF COURSE, the media is doing its part to keep this case ever in the public eye. Can’t let a good trauma go to waste. This is all about MKULTRA Trauma Based Mind Control.
Zodiac (2007) R | 157 min |
Crime, Drama, Mystery. Seven Psychopaths (2012) R | 110 min |
Comedy, Crime. Dirty Harry (1971) R | 102 min
The Zodiac (2005) |Action, Crime, Thriller.
The Most Dangerous Animal of All (2020– )
The Zodiac Killer (1971)
Awakening the Zodiac (2017)
This Is the Zodiac Speaking (2008 Video)
Photo Courtesy of FXTV REVIEWS THE MOST DANGEROUS ANIMAL OF ALL
As FX, long time purveyor of great cable television, explores its identity in a post-Disney merger world, it has taken two paths. One is to partner with the streaming service Hulu, including (rather confusingly) creating Hulu-exclusive series alongside next-day airings. The other is to lean into documentary series and films, something that premium networks HBO, Showtime, and streamers like Netflix have seen success with. The first of these is The Most Dangerous Animal of All, a brisk four-part docuseries that focuses on Gary Stewart, who—with author Susan Mustafa—wrote a book of the same name detailing why he believes his father was the infamous Zodiac killer.
Along with Jack the Ripper and the Black Dahlia murder, the Zodiac killer remains an unsolved mystery that continues to fascinate and beguile never-ending swaths of armchair sleuths. Zodiac was active in California in the 1960s and 70s, with the slaying of five victims and two survivors that played out across local newspapers, although he claimed to be responsible for well over 30 deaths. Ever since, there have been plenty of people to claim they know the killer, or are the killer, etc. In The Most Dangerous Animal of All, executive producers Ross M. Dinerstein and Kief Davidson present a compelling case for Stewart’s claims before deconstructing some of its most basic attributes. The documentary also makes the interesting choice to only slowly unravel Stewart’s own personality and the part it plays in these claims and the larger story being told. This isn’t just a rehash of the book—it’s an investigation of it.
Stewart is the biological son of Earl Van Best, Jr and Judy Chandler. The two met when Judy was 14 and Van was 27, and ran off together in what became a nationally-reported story of the “ice cream romance.” It was anything but, of course, and Best was arrested multiple times and considered a pedophile. He was also abusive to his child bride and their baby (Stewart), who he would close up in a footlocker when he cried. Ultimately, Stewart was abandoned and adopted into (by all accounts) the loving home of Loyd and Leona Stewart in Baton Rogue, Louisiana. But as Stewart details in the documentary, he learned all of this as part of a lifelong quest to uncover the truth about his parents—which culminated in him believing his father was the Zodiac killer.
Through interviews, archival footage, and and well-considered cinematic reenactments, Dinerstein and Davidson compile an engrossing investigation that walks alongside Stewart’s findings. The evidence is enough to catch the attention of the aforementioned Mustafa, who had gained fame writing true crime books. Based on Stewart’s own work and some of her own, Mustafa felt strongly enough about the case to help Stewart with the book—finding, at the very least, the story of Stewart’s parents’ difficult meeting and his own search (and its toll) an interesting thread to follow. Other investigators and experts they employed in the writing of the book also seemed to agree.
From the start, though, there are clues that Stewart may be a problematic narrator of his own story. We learn (by his own admission) that his obsession over finding his birth parents and his father’s possible Zodiac connection took over his life and ruined several of his ultimately four marriages. He appears to have no compassion for his birth mother, Judy, angrily stating that she had lied to him or been vague about this traumatic event that her family hushed up from over three decades earlier (Stewart first met Judy when he was 39). When his son brings up the gratitude he might feel about escaping his terrible father and being adopted into such a loving home, it’s brushed aside. Ultimately, Stewart has a one-track mind, and it’s focused on the Zodiac killer (and never the victims). The word “obsession” is used quite a bit. “Any identity is better than no identity,” Judy sagely states about her son’s motivations.
The facts that we do have about Earl Van Best, Jr., suggest that he was indeed deeply troubled, but also possibly just a common piece of shit. That kind of everyday evil is frightening enough on its own, but it’s also augmented alongside Zodiac killer facts. Was it Best’s upbringing that contributed to his abusive behavior? Did he use that trauma and later frustrations in life to become a notorious killer? Or are there compelling counterarguments to be made? The documentary seeks to explore and answer this questions in an entertainingly meta way by going over the facts of the book and then stepping outside of it to also consider its authors.
On the whole, the documentary combines a number of niche interests: docuseries, true crime, and the Zodiac killer specifically. Its four-episode counts makes it an easy investment, one whose ultimate turn is bizarre but feels like a perfect fit for this strange case’s natural twists. For FX, it’s also a gamble that this kind of new programming for them will prove popular. But no matter where it, or viewers, land, Mustafa’s instincts were always sound: It’s a heck of a story.
All 4 episodes of The Most Dangerous Animal of All premiere Thursday, March 6th on FX and Hulu.
spacer
The Solution of the Zodiac Killer’s 340-Character Cipher
Editor’s note: The Zodiac Killer (an unidentified American serial killer active during the 1960s and 70s) sent numerous taunting letters to the press in the San Francisco area with regard to a local murder spree. In these letters, the killer took responsibility for the crimes and threatened to commit further murders. He also included three ciphers, each containing one-third of a 408-character cryptogram. The killer claimed that this cryptogram would reveal his identity when deciphered. The killer sent the fourth and final cipher (discussed in this blog post) to the San Francisco Chronicle after the 408-character cryptogram, deciphered in 1969, did not reveal the killer’s identity.
In 2020, Melbourne, Australia, had a 112-day lockdown of the entire city to help stop the spread of COVID-19. The wearing of masks was mandatory and we were limited to one hour a day of outside activity. Otherwise, we were stuck in our homes. This gave me lots of time to look into interesting problems I’d been putting off for years.
I was inspired by a YouTube video by David Oranchak, which looked at the Zodiac Killer’s 340-character cipher (Z340), which is pictured below. This cipher is considered one of the holy grails of cryptography, as at the time the cipher had resisted attacks for 50 years, so any attempts to find a solution were truly a moonshot.
In his presentation, David explored the idea that the cipher is both a homophonic substitution cipher and a transposition cipher. Highly efficient programs for solving homophonic substitution ciphers exist, the best of which is AZdecrypt. Experiments suggest that AZdecrypt can solve all homophonic substitution ciphers of the same length and symbol distribution as the Z340. However, AZdecrypt cannot be used to solve the Z340 because when you run it on the Z340, it does not produce a solution. Perhaps solving the Z340 is a case of finding by trial and error the correct transposition, then using AZdecrypt to solve the homophonic substitution cipher.
David outlined one particular transposition, which was discovered independently and posted to zodiackillersite.com by user “daikon” and Jarl van Eycke (the author of AZdecrypt): the “period-19,” which had some interesting statistical properties that would suggest that they were closer to the correct transposition. Just for fun, I decided to plot this transposition using Mathematica:
✕
Partition[ Table[1 + Mod[19 i, 340] -> i, {i, 0, 339}] // SparseArray // Normal, 17] // drawTransposition; Magnify[%, 0.5]
However, this looked nothing like daikon and Jarl’s period-19 transposition. To my surprise, it turned out their transposition used a period-18 when wrapping around (periodically) vertically.
While this transposition was visually interesting, it didn’t strike me as a very natural pencil-and-paper construction. It should be noted that Z340 was created in 1969, and therefore was almost certainly constructed using pencil and paper.
I saw a connection between the period-19 transposition and a 1,2-decimation of the cipher. That is, starting from the top-left corner and moving one vertical step, then two horizontal steps, wrapping periodically both horizontally and vertically, like the cipher is wrapped around a torus. This transposition takes similar diagonals to the period-19 transposition:
✕
decimate2D[array_, {n_, m_}] := Module[{d0, d1}, {d0, d1} = Dimensions[array]; (Table[array[[Mod[n i, d0] + 1, Mod[m i, d1] + 1]], {i, 0, d0 d1 - 1}]) /; CoprimeQ[d0, n] && CoprimeQ[d1, m] && CoprimeQ[d0, d1] ]; z12decimation = Partition[decimate2D[Partition[Range[0, 340 - 1], 17], {1, 2}], 17];
Running the 1,2-decimation transposition of the Z340 through AZdecrypt did not produce a solution.
One way to investigate the likelihood of finding the correct transposition of a homophonic substitution cipher is by counting the number of repeating bigrams (pairs of symbols). In Mathematica, it’s easy to write up this code for arbitrary -grams:
✕
countngrams[l_List, n_Integer] := Total[Map[Last, Tally[Partition[l, n, 1]], 1] - 1]
Then we can construct a large number of Z340-like ciphers and compare their bigram count distribution to a large number of random shuffles of the Z340:
✕
Histogram[{randomShuffle340, z340CiphersBigrams}, {1}, ChartBaseStyle -> EdgeForm[Thin], Frame -> True, Axes -> False, FrameLabel -> {Style["repeating bigram count", 12], Style["frequency", 12]}, ChartLegends -> {"random shuffles of Z340", "random Z340-like ciphers"}, ChartStyle -> {RGBColor[0.514366, 0.731746, 0.415503], RGBColor[0.996414, 0.825742, 0.330007]}]
The mean number of bigrams for the random shuffles was 19.8, and for random Z340-like ciphers was 34.5. The Z340 has 25 repeating bigrams, while the daikon and Jarl period-19 transposition and the 1,2-decimation has 37 repeating bigrams. Thus, statistically, we thought we were on the right track.
After the 1,2-decimation transposition did not produce a solution we decided to work on a large search through candidate transpositions. It was difficult to find out what transpositions had been tested in the past, so I decided to enumerate all reasonable 1- and 2-step transpositions, sort them by their bigram count and run them through AZdecrypt. Some of these transpositions, for example, included:
I also included all proper one-dimensional and two-dimensional decimation transpositions. For one-dimensional enumerations, we have the following 128 proper decimations:
✕
Select[Range[340], CoprimeQ[#, 340] &] % // Length
For two-dimensional enumerations, we have the following 128 proper decimations:
✕
Join @@ Outer[List, Select[Range[19], CoprimeQ[#, 20] &], Range[16]] % // Length
For example, the 3,4-decimation generates the following transposition:
✕
Partition[decimate2D[Partition[Range[0, 339], 17], {3, 4}], 17] // invert // drawTransposition; Magnify[%, 0.5]
Using AZdecrypt, we tested all row–major, column–major, alternating row–column, alternating column–row, inward spirals, outward spirals, diagonals and proper one-dimensional and two-dimensional decimation transpositions. This experiment didn’t yield anything looking like a solution, so we tested all pairs of transpositions. Then we considered testing all 3-tuples of transpositions; however, this would require testing 155,929,364,660,224 candidate ciphers. Naively checking one a second would take over five million years. So we limited our experiments to decimations which would be reasonable to write out by hand and then only tested candidates with a high bigram count. Once again, this search turned up nothing.
Perhaps there’s another step we are missing? Given the way the Zodiac Killer’s 408-character cipher (pictured below) was sent in three equally sized sections, we conjectured the Z340 was constructed from a number of distinct segments, then encrypted with a transposition and a homophonic substitution:
We considered splitting the cipher horizontally into two and three segments, vertically into two and three segments, and both horizontally and vertically into and segments. For example:
Then we used Reduce to compute all possible segments, which resulted in proper two-dimensional decimations:
✕
Reduce[a > 0 && b > 0 && c > 0 && d > 0 && a + b == 17 && c + d == 20 && GCD[a, c] == 1 && GCD[a, d] == 1 && GCD[b, c] == 1 && GCD[b, d] == 1, {a, b, c, d}, Integers]
Given the high bigram count of the 1,2-decimation transposition, we started our search with two-dimensional decimations, with each segment having the same (single) transposition. As we had seen so many times before, this experiment didn’t turn up anything.
The next search for compositions of multiple transpositions and all combinations of transpositions for all sections would be a significantly larger undertaking. So we decided to reanalyse the results from the initial search.
Out of the 650,000 transpositions we tested, one contained a few particularly interesting segments of plaintext:
This was even more interesting as the transposition that produced this candidate decryption was the 1,2-decimation, with the cipher split into three vertical segments (pictured below):
Investigating this result further, David used our 9,9,2-vertical segment, 1,2-decimation transposition and AZdecrypt to crib the phrases “HOPE YOU ARE,” “TRYING TO CATCH ME” and “THE GAS CHAMBER.” With these cribs locked in place, AZdecrypt found the following solution of the first segment:
Eureka! After 51 years, we had decrypted some of the Z340. This was a very special moment. The discovery of the 9,9,2-vertical segment, 1,2-decimation transposition and the power of AZdecrypt for solving homophonic substitution ciphers had produced a partial decrypt of the Z340.
What about the remaining two segments? It was possible that we had found just one correct vertical split of 9 rows and the remaining 11 rows required a different segmentation, or it was possible that a different transposition was needed, or even a different key for the substitution cipher, or any two combinations of these possibilities, or even all three possibilities. Our work was far from over.
David discovered that we could use the key from the first segment on the last segment to produce the following plaintext—without any transposition:
Including some spaces, the cipher’s candidate plaintext gives:
Then, reversing a few words:
This seemed to be a pretty reasonable decryption of the last segment.
What about the second segment? If we crib all the legible text from the first section we get the following decryption:
Some parts of this kind of made sense, but we certainly weren’t there yet. We asked Jarl van Eycke, the author of AZdecrypt, to help us with this segment. He made the following brilliant observations:
- The LIFEIS plaintext (the second segment) is read left to right.
- The LIFEIS plaintext is excluded from the 1,2-decimation transposition and read left to right.
- Numerous spelling mistakes are corrected if “H” on row six is moved to the fourth column.
- Apply the 1,2-decimation transposition, skipping the positions containing “LIFEIS”:
Then the second segment becomes:
The cipher key and transposition that we discovered for the Z340 cipher are given by:
Fifty-one years after the Zodiac Killer mailed this cipher to the San Francisco Chronicle, we had a solution. David submitted this solution to the FBI Cryptanalysis and Racketeering Records Unit (CRRU) on Saturday, December 5, 2020. Shortly after, the FBI was able to officially confirm the validity of our solution.
Essentially all my work on the Z340 was done in Mathematica. I used the Spartan high-performance computing cluster at the University of Melbourne to eliminate candidate transpositions using zkdecrypto and David used AZdecrypt. Otherwise, all the statistical analysis of the Z340 and the creation and analysis of the millions of candidate transpositions was done using Mathematica. The reason for my use of Mathematica is simple; it is by far the most time-efficient language I could use for such a task.
FOR more information, check out the following Articles: