Some people believe the Beale treasure story is true; others believe it
         is an elaborate hoax. I have heard most of the arguments, pro and con. I do know this: Arguments against the treasure
         story can be refuted on the basis of counterarguments. Moreover, new evidence exists showing that the treasure story is true
         and that some prior conclusions are arguably stronger. In this paper, I
         will discuss new information about Beale Cipher No. 3. Cipher No. 3 contains the information (names and addresses) that
         Mr. Morriss would need to locate the relatives and others who should receive a share of the treasure. Beale created two additional
         ciphers, as well. Cipher No. 1 has instructions for locating the treasure's burial site and Cipher No. 2 has a description
         of the contents of the burial site. Altogether, Beale created three ciphers, which researchers have named B1, B2,
         and B3. The number of characters in each of the three ciphers is 520, 762, and 618, respectively. B2 has been decoded; B1
         and B3 have not.  Beale Cipher B3When I think about what others
         have said about B3, I conclude that there is a misunderstanding as to what information Beale actually encapsulated in
         B3. I will try to clear this up. In Beale's letter to Morriss of Jan. 4, 1822--see The Beale Papers in
         Ward's Pamphlet, 1885--Beale says one of the unintelligible papers--presumably B3--contains   	"a
         list of the names of our party, with their places of residence, &c."   There were 30 members in Beale's party (TJB and 29
         other men). Thus, according to the letter of Jan. 4, B3 contained 30 member names and 30 residences [addresses], although
         I am uncertain as to what was meant by "&c." However, the next day (Jan. 5) Beale realized that he had made
         a mistake. Mr. Morriss wouldn't need the addresses of the 30 members in his party, but rather the addresses of the 30 heirs.
         So the next day (Jan. 5), Beale corrected the problem by writing a short letter in which he carefully explained what information
         was contained in B3. In Beale's letter to Morriss of Jan. 5, 1822 (see Ward's Pamphlet, 1885), Beale says:   	"You will find in one of the
         papers, written in cipher [B3], the names of all my associates, who are each entitled to an equal part of our treasure, and opposite to the names of each one will be found the names and residences of the
         relatives and others, to whom they devise their respective portions."  Thus, B3 contains 30 names of members,
         30 names of heirs, and 30 addresses of heirs. A name consisted of a first name and a last name. The last name is also called
         surname.   Much has been published about this popular Virginia
         treasure story. Curious people can't help wondering whether the statements made in Ward's 1885 pamphlet are accurate and true,
         or just an elaborate hoax. Most people believe the story is fiction. I am one who believes the treasure story is genuine.
         I base this conclusion on the evidence and analysis presented on this website (bealetreasurestory.com), in my two books Beale
         Treasure Story: The Hoax Theory Deflated, 2011, Beale Treasure Story: New Insights, 2011, and papers held at
         the Virginia Historical Society, Richmond, Virginia.  In
         this paper, I will show how 30 member names (first and surname)
         and 30 heirs' names (first and surname) and 30 heirs' addresses could be used by Beale to create a B3 with only 618 characters.
         And, I will show how the information in B3 could have been be easily recovered and used by Mr. Morriss.    
       
      
      Four Intelligent Beale InvestigatorsI will start by examining what four intelligent Beale investigators
         had to say about B3. The four men are M. E. O'haver, Herbert O. Yardley, Louis Kruh, and Joseph (Joe) Nickell.  In December, 1924, M. E. O'haver began writing a monthly column in Flynn's Weekly called
         "Solving Cipher Secrets," which ran for a couple of years. The articles were continued in Detective Fiction
         Weekly, and ran uninterrupted until August 1954. In December, 1926, John Ingles, vice-president and treasurer of the
         American Fidelity and Casualty Co., Richmond, Virginia, wrote to O'haver with information about the Beale treasure story.
         But it wasn't until August, 1933, that O'haver responded with information about his progress. Among other things he said:  "Another thing about this case that impresses me as rather peculiar is with reference
         to 'Cipher No. 3.' This cipher purports to give the names of 'parties and their residences.' It consists of 618 numbers, each
         of which presumably represents a letter. According to Beale's letter of January 4 addressed to Morriss, this cipher must contain
         the names and addresses of the thirty members of the party, together with the names and addresses of the relatives and others
         to whom they devise their respective shares. In other words, we have here sixty names and sixty (sic thirty) addresses represented by only 618 numbers, which would make only about 5 or 6 letters for each name
         which seems to me a rather small number. It might be that the names and addresses are abbreviated in the document. It can
         hardly be that a different cipher is employed,--that is, a different kind of cipher,--since Beale speaks of only a single
         key to all three documents. Besides, the three ciphers all have the appearance of being in the same kind of cipher."   
 Actually, it is
         Beale's letter of January 5 that mentions the names of the thirty members of the party, together with the names and addresses
         of the designated heirs. Thus, there are 60 names and 30 addresses represented by only 618 numbers, which would make about
         seven letters for each name (not five or six).  It is noteworthy that
         O'haver (acting as investigator) performed a simple calculation to determine whether the length of B3 seemed reasonable. He
         started with the number 618 and worked backward to find the number of letters for each name. He was concerned that the number
         618 seemed too small. One might instead start by selecting an average length
         for each name, and then work forward to determine the length of B3. In either case, it seems unlikely that the hoaxer would
         accept 618 as the length for cipher B3 when this would give only seven letters for each name (member, heir, post office). A copy of Ward's pamphlet was published in the December 1954 issue of "The Cryptogram,"
         the official publication of the American Cryptogram Association. The copy of the pamphlet had been provided by Herbert O.
         Yardley, author of the American Black Chamber (1931), from a copy provided to Yardley by Joseph McGehee
         of Roanoke, Virginia. In the foreword to the article in "The Cryptogram," several comments attributed to Yardley
         are given: "Bozo [Yardley] submits these documents for
         what they are worth. He has worked on them off and on for a number of years ... Number three cipher, he believes, is not long
         enough to contain all the names of the so-called heirs."  
 Beale researcher Louis Kruh, in his paper "The Beale Cipher as a Bamboozlement - Part II," says the following
         about Beale Cipher No. 3: "A minor issue involves
         cipher number 3 which is supposed to contain the names and addresses of the 30 members of the Beale party plus the names and
         addresses of their relatives. For those roughly 60 names and addresses, cipher number 3 has only 618 numbers which appear
         insufficient to provide the information described."  
 Author
         Joe Nickell, in his paper "Discovered The Secret of Beale's Treasure," provides the following comments about Beale
         Cipher No. 3: "Unsolved cipher number three raises further
         suspicion. Beale claimed it contained the 'names of all my associates, and opposite to the name of each one will be found
         the names and residences of relatives and others, to whom they devise their respective portions.' However, the cipher contains
         only 618 characters—relatively few when it is considered that an average of only 20.6 characters was available for each
         of the thirty men and that the names of two persons plus an address for one were to be given." 
 Nickell continues by providing additional arguments, both pro and con, and concludes by saying: 	"... it may be doubted that cipher number three
         contains the information Beale said it did." If you study very
         carefully what each man said, you will realize that the first three men incorrectly described the information stored in B3.
         Only Nickell's description is correct. Yet, the four investigators do agree that B3 is problematic, although they express things in different ways:   O'haver says "618 numbers ...
         seems to me a rather small number." 
 Yardley says "Cipher
         Number three cipher, he believes, is not long enough to contain all the names of the so-called heirs." 
 Kruh says "cipher
         number 3 has only 618 numbers which appears insufficient to provide the information described."  
 Nickell says "...
         it may be doubted that cipher number three contains the information Beale said it did." 
 Nickell correctly described the information that Beale said was in B3. "Joe Nickell is
         an American skeptic and investigator of the paranormal. Nickell is senior research fellow for the Committee for Skeptical
         Inquiry and writes regularly for their journal, the Skeptical Inquiry. He is also an associate dean of the Center for Inquiry
         Institute. He is the author or editor of over 30 books." (See Wikipedia, the free encyclopedia.) Nickell has a Ph.D in
         English from the University of Kentucky It looks to me that in Beale's
         letter to Mr. Morriss of January 5, 1822, Beale described a list containing 30 lines (one line for each of the 30 members
         in Beale's party) and three line items per line (consisting of a member name, an heir name, and an heir address). From this
         point onward, I will assume that Beale made use of such a list.   It is presumed that
         the construction of cipher B3 was influenced by several factors, depending on whether the cipher was created by Beale or by
         a hoaxer. Beale would want B3 to be as short as possible, in order to minimize Mr. Morriss's work
         to decode it. A hoaxer would want B3 to be long
         enough to be believable, in fact long enough to be easily believable by readers of the pamphlet. The hoaxer would choose to
         err on the side of caution. Beale was free to make B3 as short as he could. He never intended B3 to be viewed by anyone except Mr. Morriss. From Beale's perspective, B3's length
         was a non-issue. After Beale's company had been formed, Beale collected the names of the members,
         names their heirs, and post office addresses of the heirs. This information was needed in case of an accident that might occur
         at any time while in the dangerous undertaking they were in. The hoaxer had no need to construct a simulated Paper No. 3, or encipher it to produce a B3. He need only make a list
         of random numbers "pulled from thin air".
         If the forged B3 had a length equal to say 1275, then the hoaxer must create a list of 1275 random numbers, and call this
         list B3. My intention, at this point, is to show the reader how a simple list could have been used by Beale
         to create B3.    
      
    
   
   
   
   
      
      
      Beale's ListBeale's List contains 30 lines, one line for each member in Beale's party, and three
         columns, where col. 1 contains a member name (first name and surname), col.
         2 contains an heir name (first name and surname), and col. 3 contains an heir residency
         (PO address). Using information that Beale collected from each member, he created a List, line
         by line. Note that member first names in col. 1 are abbreviated, whereas heir first names in col. 2, thought to be more important,
         are not abbreviated.  Beale's Tasks:The steps that Beale would most likely follow to create B3 can be specified: Beale first created a List, which I will call Paper
         No. 3. He then made certain changes to Paper No. 3 to remove much of the redundancy. I
         call the resulting List Retracted Paper No. 3.  Let's look at the steps taken to make these
         changes. Step 1:  Note first that the lines in Paper No. 3 need to be repositioned to allow
         them to be grouped together according to their post office addresses. In our example, we have eight different PO addresses
         that must be processed: warrenton (5), fauquierch (3), otterbridge (2), arnoldsoldplace (4), elkmarsh (4), rockyhillmills
         (3), hillsborough (7), and richmond (2). I found it convenient to arrange the lines so that the 5 lines for warrenton were
         grouped together and moved to lines 1 through 5, all in col. 3 of the List, followed by the 3 lines
         for fauquierch, grouped together and moved to lines 6 through 8 of the List, followed by the 2 lines
         for otterbridge, and so on. Notice that the line with the first occurrence of warrenton (top down in the List)
         is moved to line 1 with no change made to it, whereas the lines with the remaining 4 occurrences of warrenton are moved to
         lines 2 through 5 and the post office address in col. 3 is replaced by the letters "do". The
         line with the first occurrence of fauqurierch (c.h. stands for court house) is moved to line 6 of the List,
         with no change made to it, whereas the lines with the remaining 2 occurrences of fauqurierch are moved to lines 7 and
         8 and the post office address in col. 3 is replaced by the letters "do".
         The remaining six PO addresses are handled in the same way. When finished with the PO addresses, a period "." is placed at the end of each line. 
 Step 2: Now, for each of the 30 lines, examine the information in columns 1 and 2. These two columns contain names. If the columns hold surnames
         that are the same, then the surname in col. 2 is erased so that it is blank or empty, and go to the next line, else do nothing and go to the next line. Finally,
         remove all blanks so that each line contains lower case alphabetic characters and ends with a period. I call the resulting
         List Retracted Paper No. 3. This
         paper is encrypted one letter or period at a time. 
  Mr. Morriss' tasks can be listed and described: Step 3: Decrypt
         B3. The resulting plain text is retracted paper no. 3. The 30 periods in retracted paper no. 3 are used
         to identify the 30 lines of text in paper no. 3. The first period identifies the end of line 1 and the
         beginning of line 2; the second period identifies the end of line 2 and the beginning of line 3; and so forth.  
 Step 4: Retracted paper no. 3 is
         now used to recover certain redundant PO information in paper no. 3. Start
         with line 2 in paper no 3. Examine the information in line 2 and col. 3. If that information
         is letters "do" then replace "do" in line 2 col. 3 with the PO information
         in line 1 col. 3. But if line 2 col. 3 does not have letters "do", then do nothing and continue
         with line 3. Examine the information in line 3 and col. 3. If that information is letters
         "do" then replace "do" in line 3 col. 3 with the PO information
         in line 2 col. 3. But if line 3 col. 3 does not have letters "do", then do nothing and continue
         with line 4. Repeat the procedure line by line until line 30 has been processed.  
 Step 5: Retracted
         paper no. 3 is now used to recover certain redundant surname information in paper no. 3. Start with line
         1. Examine heir surname in line 1 and col. 2. If the heir surname is blank, empty or missing, then make a copy of the member
         surname in line 1 and col. 1 and put it in the space for heir surname in line 1 and col. 2. Continue until all 30 lines have
         been processed. Spaces could also be added in paper no. 3 to improve readability.  
 
 
 Summary:Beale creates a List called Paper No. 3 (see Figure
         1). It is a List with 30 member names, 30 heir names, and 30 heir PO addresses. Beale creates a Retracted
         Paper No. 3 (see Figure 2) by removing a large portion of the redundancy in Paper
         No. 3. Beale encrypts Retracted Paper No. 3 to create cipher B3,
         which is stored in Beale's locked box.  Time elapses. 
         Mr. Morriss receives the secret key that Beale left with a friend in St. Louis. Mr. Morriss opens Beale's locked box and recovers
         cipher B3. The secret key contains brief instructions for recovering Paper No. 3 from B3.
         Mr. Morriss decrypts B3 to recover his copy of Retracted Paper No. 3. (see Figure
         2). Following Beale's instructions, Mr. Morriss uses his copy of Retracted Paper No. 3 to
         recover Paper No. 3 (see Figure 1).  Mr. Morriss uses the information
         in Paper No. 3 to locate the identified heirs.  Figure 3 shows you what Retracted Paper No. 3 would look like if the lines
         in the List were concatenated to form a single long line. Let us have a
         look at some similarities and some differences between a genuine Beale who operated in a real Beale Treasure Story and a hoaxer
         who pretends to have operated in a real Beale Treasure Story. The conjecture
         put forth here is that the length of B3 can be used as an indicator to predict whether the Beale Treasure
         Story is genuine or not genuine (a hoax).  Beale actually creates
         a Paper No. 3 (length=984) and a Retracted Paper No. 3 (length=618), which is encrypted
         to produce B3 (length= 618). Note that Beale does not specify length as an input parameter to the Retracted
         Paper No. 3 creation process or as part of the B3 creation process. Instead, the length=618 is determined
         from information in the List called Retracted  Paper No. 3 or by counting the number of cipher numbers in B3.  As a practical matter, a hoaxer has no means to duplicate Beale's
         B3 "creation-process".The hoaxer is forced to create B3 by randomly generating a specified number
         of random numbers drawn from thin air. In this case, it is the hoaxer himself who specifies the number of random numbers to
         be generated. Thus, he would have no trouble in creating a list of numbers of any desired length. But a genuine solution would
         require 30 names of members, 30 names of heirs and 30 PO addresses of heirs. Suppose the hoaxer said (to himself) I will create
         phony names and addresses for members and heirs. And, I will create all the necessary papers to fool anyone who may see my
         phony copy of B3 of length 618 characters.  But wait just a minute.  How can I create acceptable
         names of members that do not really exist. If someone were able to decode B3 and recover Retracted
         Paper No. 3 and Paper No. 3, I am in trouble; they would soon learn that the names and addresses
         were fake or possibly true names that had no connection to a gold or silver mine near Pike's Peak in Colorado. As a practical
         matter, a phony Beale cannot duplicate the actions of a genuine Beale. The hoaxer cannot duplicate the Beale Treasure Story.
         The Beale Treasure Story is too closely linked to actual history. History is history; it cannot be changed.       It
         seems to me that the missing piece to the puzzle has been found. I have showed you how Beale could have hid or masked the
         predictable redundancy in Paper No. 3 using a couple of "reversible mapping techniques" that enabled Beale to deliver
         to Mr. Morriss a B3 with 618 characters rather than 984 characters. One of the mapping techniques makes use
         of the abbreviation "do" for the word "ditto". I also used abbreviated first names for members of Beale's party, which saved some space as well. See Figure
         1 and Figure 2 below:
    
      
        
     
         
      
      
         tom beale richard beale warrenton.
         tim percy teresa percy warrenton.
         leo jones john jones warrenton.
         sam johnson hannah welsh warrenton.
         tom mitchell jacob mitchell warrenton.
         al barrel allen barrel fauquierch.
         geo webster mary cunard fauquierch.
         wm watt henry watt fauquierch.
         andy henderson anna henderson otterbridge.
         joe stewart lydia stewart otterbridge.
         pat bradlee jack bradlee arnoldsoldplace.
         john gates david gates arnoldsoldplace.
         robt adams sarah adams arnoldsoldplace.
         wm webster james webster arnoldsoldplace.
         nath childs nancy childs elkmarsh.
         jake peterson john peterson elkmarsh.
         jeff offutt mary offutt elkmarsh.
         paul carter polly carter elkmarsh.
         fred northrup ellen northrup rockyhillmills.
         dan edwards luke edwards rockyhillmills.
         nicho nelson amos nelson rockyhillmills.
         mark swift willis swift hillsborough.
         theo marks judith white hillsborough.
         mike riley josephine riley hillsborough.
         ken hobart arthur hobart hillsborough.
         zach clap nora clap hillsborough.
         luke hawes glenn hawes hillsborough.
         ron williams andrew williams hillsborough.
         doug kimball sally kimball richmond.
         alex brooks ruth brooks richmond.
          
         Figure 1.Paper No. 3 with Length=984.
          
         
         tom beale richard warrenton.
         tim percy teresa do.leo jones john do.
         sam johnson hannah welsh do.
         tom mitchell jacob do.
         al barrel allen fauquierch.
         geo webster mary cunard do.
         wm watt henry do.
         andy henderson anna otterbridge.
         joe stewart lydia do.
         pat bradlee jack arnoldsoldplace.
         john gates david do.
         robt adams sarah do.
         wm webster james do.
         nath childs nancy elkmarsh.
         jake peterson john do.
         jeff offutt mary do.
         paul carter polly do.
         fred northrup ellen rockyhillmills.
         dan edwards luke do.
         nicho nelson amos do.
         mark swift willis hillsborough.
         theo marks judith white do.
         mike riley josephine do.
         ken hobart arthur do.
         zach clap nora do.
         luke hawes glenn do.
         ron williams andrew do.
         doug kimball sally richmond.
         alex brooks ruth do. 
         
         Figure 2.Retracted Paper No. 3 with length = 618.
          
         
         tombealerichardwarrenton.timpercyteresado.leojonesjohndo.samjohnsonhannahwelshdo.
         tommitchelljacobdo.albarrelallenfauquierch.geowebstermarycunarddo.wmwatthenrydo.
         andyhendersonannaotterbridge.joestewartlydiado.patbradleejackarnoldsoldplace.
         johngatesdaviddo.robtadamssarahdo.wmwebsterjamesdo.nathchildsnancyelkmarsh.
         jakepetersonjohndo.jeffoffuttmarydo.paulcarterpollydo.frednorthrupellenrockyhillmills.
         danedwardslukedo.nichonelsonamosdo.markswiftwillishillsborough.theomarksjudithwhitedo.
         mikerileyjosephinedo.kenhobartarthurdo.zachclapnorado.lukehawesglenndo.
         ronwilliamsandrewdo.dougkimballsallyrichmond.alexbrooksruthdo.
          
         Figure 3.Retracted Paper No. 3 with length = 618 characters, lines concatenated, spaces removed.
          
      
      Note: The reader should take note that the definition for Beale's List shown here is an example.
         There are other definitions that could be used to accomplish the same purpose. Post Office
         (PO) names come from a book that gives the names of 468 Virginia post offices, published in 1819.  In the discussion that follows, I will assume that the Beale treasure story was created in its entirety either by
         Beale or by a hoaxer(s). I assume that the creator of the treasure story was an intelligent person, with all the necessary
         skills to create such a story. I assume that the hoaxer, acting like an investigator, such as O'haver, Yardley, Kruh,
         or Nickell, would not create a B3 with as few as 618 characters. The hoaxer, like the investigator, would conclude that B3
         with as few as 618 characters would be too  short. He would say that the length of B3 should be greater. The hoaxer would
         opt to generate additional random numbers and add them to the end of B3. Enough additional random numbers should be added
         to stop any credible investigator from saying B3 is too short. Beale would say nothing about the
         length of B3. When he created B3, he accepted whatever length happened to be created, of course within reason, which means
         that he accepted whatever value for length of B3 that happened to be created as a consequence of the creation process. If
         the value happened to be 618, so be it, it is what it is.  The evidence makes it easy for
         me to conclude that a bright hoaxer would reject a length of 618 for B3. The hoaxer would simply start with a value much
         larger than 618, say in the vicinity of 1200 but not equal to 1200, which is roughly 40 characters for each of the 30 members
         in the party. But wait a minute. Better not select a length of 1200 pretty much for the same reason that you should not select
         1111 or 1234 for the length of B3. The number 1200 looks more like it was created by a hoaxer than it does Beale. If the length
         of B3 were 1234 it means that the length was picked (picked by the hoaxer), not the result of the creation procedure itself.
         If the treasure story were genuine there would be no reason for Beale to set the length of B3 to any particular value. The
         value 1234 indicates that the value 1234 was set by a hoaxer not Beale. If the length of B3 is a multiple of 30, it is likely
         that this value (multiple of 30) was set by a hoaxer. There are only 11 numbers from 900 to 1200 that are a multiple of 30
         and therefore 1200 - 11 = 1189 numbers that are not multiples of 30. Thus, if you randomly select a number from the 300 numbers
         running from 900 to 1200, you have only a 3.7 percent chance of selecting a number that is a multiple of 30. Thus only a 3.7
         percent chance that Beale will accidentally select one of these 11 numbers. Thus, it was likely set by a hoaxer. The hoaxer
         may have been looking at multiples of 30 to get a feel for how many characters each of the 30 members in the party would have
         for numbers falling in the range from 900 to 1200, and then used one of these number (without thinking about it too much)
         as the length for his phony B3. Decoding TipsHave we learned anything
         that might help us decode ciphers B1 or B3? The answer is yes. Keep in mind that even the smallest and most remote clue might
         be worth while when lumped together with other clues. If the real B3 makes use of periods, like
         the example (Fig. 1 and Fig. 3), then some of the cipher numbers representing periods may be guessed, especially those near
         the front and those near the end of B3. The abbreviation 'do' for ditto, may occur several times
         in B3 and much fewer times in B1. Now under the assumption that B1 and B3 have been enciphered with the same key and same
         method of cipher, then for any pair of cipher numbers that occur in both B1 and B3, determine the pairs DD DO OD OO (how many
         times they each occur) for B1 and separately for B3. The pair DO ought to occur more in B3 than in B1. This technique should
         be run on the computer, as there could be too many pairs to compute this by hand. Also, the method does not require that we
         know where in B3 and B1 the 'DO' occurs. If we find some 'DO' then we can also get the location of that DO. Let me illustrate. Suppose we start with numbers 18 and 96; and then arbitrarily set 18=D and 96=O. This allows us
         to determine the number of times the pairs (18,96) or (18,18) or (96,18) or (18,96) occur in B1 and B3. We use the counts
         of the pairs to help tell us whether the initial setting of 18=D and 96=O was good or not so good. You should try all four
         of the possible initial settings for 18 and 96. The word 'THE' may occur several times in
         B1, but it should not occur in B3. Although, I don't see a way to exploit this.   
      
      Miscellaneous B3 with Some Repeats  If the treasure story is a hoax, the hoaxer may trip himself. He must take care to prevent
         this from happening. I will explain. There is no reason  that I can think of why the length of B3 should be a multiple
         of 30 (30 is the number of lines in Beale's List). But 30 x 31 = 930. There is no reason why a real Beale would need to calculate
         the value 930 using 30 and 31, or any one of the eleven values 30x30 31x30 32x30 33x30 34x30 35x30 36x30 37x30 38x30 39x30
         40x30 in the space of 300 values that run from 900 to 1200.  Beale would have only a 3.7 percent chance of accidently
         creating one of these 11 values for length of B3 (assuming that the creation step creates a value in the set of numbers that
         run from 900 to 1200). A hoaxer who is looking at the number of characters allocated to each member in the Beale party versus
         the number of characters in the entire B3, may look at one or even all of these 11 values, and may indeed use one of them
         for the length of B3 (thinking that he has done good). But doing so could signal that the treasure story is a hoax. If an
         investigator learns that the length of B3 is a multiple of 30 it means that the hoaxer has most likely set the value of the
         length of B3, which is something that Beale would not need to do. Thus, an investigator who knows or learns of this attack,
         and investigates the length of B3, can unmask the hoaxer.  In the
         discussion that follows, I will state and restate certain assumptions about the treasure story. The assumptions can be reviewed.
         I assume that the treasure story, including the papers and ciphers were created by Beale, and if not by Beale, then
         by a knowledgeable hoaxer.  I will not consider possible cases where the creator was not Beale and not a hoaxer. An example
         that covers this last case might be the situation where B3 consists of say two sheets of paper and Mr. Ward removes sheet
         number two before sending the papers to the printer. In any case, if I can show that it is unlikely that B3 was created by
         a hoaxer, then it follows that it is likely that B3 was created by Beale. Likewise, if I can show that it is unlikely
         that B3 was created by Beale, then it follows that it is likely that B3 was created by a hoaxer. I assume that the creator of the treasure story, including papers and ciphers (Beale or
         hoaxer) is a highly intelligent person, skilled researcher, and capable of handling complex issues. I assume that the hoaxer
         is smart enough to quickly recognize that a figure anywhere near 618 characters for B3 was unacceptable.  The hoaxer
         would never create a B3 with a length anywhere near 618 characters. Beale and
         the hoaxer have different objectives with respect to B3. Beale would like it as short as possible to make Mr. Morriss' job
         as painless as possible. A hoaxer wouldn't care if the number of characters is on the high side. The hoaxer needs only to
         assure that the number of characters is enough so there is no question as to whether there is enough or not enough. If the
         four experts [O'haver, Yardley, Kruh, and Nickell] think 618 is too small, then so will the hoaxer. They are all investigators
         (researchers). But, the important point is this: It has been shown how B3
         could be created with a length=618, which is long enough to contain the information Beale said it did.  Conclusion: If the treasure story is  a hoax, it is
         extremely unlikely that a hoaxer would create a bogus cipher B3 with only 618 numbers. This conclusion is consistent
         with statements attributed to four reputable researchers, O'haver, Yardley, Kruh, and Nickell. They believed that
         618 was not long enough to contain the information that Beale said it did. Taken together, their arguments provide the best
         empirical evidence available to show that a hoaxer would be unlikely to create a B3 with a length anywhere near
         618 characters. Thus, there is only one remaining conclusion that can be reached: B3 contains 618 numbers because B3 is genuine
         and the Beale Papers are genuine and because Beale found a way to shorten paper No. 3 by removing the redundant information
         found in the List of names and addresses that he used to create paper No. 3, and because I have provided a convincing example
         in which a B3 of length 618 could be constructed.  
 On No. 3, and because I have provided a convincing example in which a
         B3 of length 618 could be constructed.  One very good argument supporting a conclusion that the Beale Treasure Story is fact
         not fiction is based on the short length of cipher No. 3 (B3), which has only 618 cipher numbers. It's "too short"
         people say. Credible Beale investigators have weighed
         in on this issue too. Their conclusions are unanimous--B3
         is too short to contain the names of 30 members in Beale's party and the names and residences of 30 heirs, as claimed by Beale.  I think it safe to say that if the story is fiction, the hoaxer or hoaxers
         would never pick a length for B3 anywhere near the number 618. The hoaxer would, in all probability, think like most other
         people as well as the credible investigators that 618 is too short and thus never pick a number near 618. But if 618 could
         not have been picked by a hoaxer, then B3 could not have been created by a hoaxer, and the treasure story could not be fiction,
         it must be genuine. In fact, at least two investigators, myself and a Mr. Holst, have shown how a list of 30 lines (one line
         per member in Beale's  party) with space for 618 characters of information could be constructed with anticipated redundant
         information deleted. But, if the treasure
         story is/was a hoax, there would be no need for the hoaxer to prepare paper No. 3, or to encipher it to produce B3. A hoaxer
         could omit these steps, as they would serve little or no purpose. Instead, he could directly create bogus cipher B3, e.g.,
         by selecting numbers more or less at "random." The only decision of importance would be to select a length
         for B3. For practical purposes, there are two ways in which the hoaxer could determine a length for B3, and they are essentially
         the same. The first method consists of selecting a trial
         length for B3, dividing that number by 30, and then asking whether the resulting value seems large enough to hold two names
         and one address. Depending on the answer, a different length for B3 would be selected, divided by 30, and examined
         to see if it appears reasonable. The procedure would be repeated until an acceptable value had been obtained. The second method is similar, except that one works forward instead of backward. In this case, one starts by selecting
         a length that would accommodate a first and last name (doubling the value as there are two names) and selecting
         a length that would accommodate a post office address. A person's first name can be abbreviated. The obtained
         values are then added together and multiplied by 30. The resulting value is the length of B3. A hoaxer might do just what
         I did in order to estimate the lengths for names and post office addresses. First I made a list of names of my ten closest
         friends (abbreviated first names and full last names). I added up the number of letters in these ten names (101) and divided
         by ten to obtain an average length of ten letters. In Beale's day, a post office address was the name of a city, town, or
         court house. If a town or city by the same name happened to occur in more than one county, the post office address would
         include the name of the county. In order to simulate the length of a post office address, I selected the names of 20 towns
         in Virginia, added up the number of letters in these 20 names, and divided by 20 to obtain an average length of 11 letters.  On
         the basis of these fairly simple calculations, I determined that on average two names and one post office address could be
         expressed in 31 letters. If 31 is multiplied by 30, one obtains a length of 930 for B3. This is a rough estimate, but probably
         a pretty good one. It does not take into account that B3 could be shortened due to redundancies most likely occurring
         in the names and addresses, if the treasure story were true. But, even if the hoaxer recognized this, it is unlikely that
         he would have pursued this line of thinking, for reasons already discussed. If the
         hoaxer had selected a length for B3 of about 930, readers of Ward's pamphlet could fairly easily confirm that its length
         was reasonable. But B3's actual length of 618 is arguably too short. If 618 is divided by 30, one obtains
         618/30 = 20.6, which means there are only 20 or 21 letters available to write two names and one address. A number of Beale
         investigators have voiced concerns that B3, with only 618 numbers, is too short to contain the claimed list of 60 names
         and 30 addresses.  But, I have already shown that the hoaxer must not select a length for B3 that is a multiple
         of 30, as otherwise a length for B3 which is a multiple of 30 will be a strong indication that B3 is fake and not created
         by Beale.    There are two good arguments why we may conclude that the treasure story is fact not fiction: One is based
         on the length of Beale cipher No. 3 (B3), which has 618 cipher numbers. It is not too short to be genuine; it's right on target!
         The other is based on Ward's conviction that the treasure story was fact not fiction. Ward was an insider, a member of the inner circle. He knew what was going on.   However, if the treasure story is a hoax, the hoaxer(s) had better be quite careful not
         to select a value for the length of B3 that is a multiple of 30. That would be something unlikely to happen by pure luck.
         It would be a giveaway that the treasure story is a hoax.  In Beale's letter to Morriss of Jan. 4, 1822, he mentions "a list of the names of our party, with their places
         of residence." Mr. Morriss would know immediately what Beale meant by use of the words "a list". In that period,
         a list was composed of "a number of connected items or names written or printed
         consecutively, typically one below the other." Lists were much used in the composition of advertisements  and notices
         printed in newspapers. Here is an example of
         a list of ship arrivals and departures from the Port of New Orleans in 1811 [See The Louisiana Gazette ,
         New Orleans, La., June 14, 1811]. Note that the abbreviation "do" for ditto is used throughout the notice to avoid
         repeating the longer words: Pensacola, Ft. Stoddert, and Mobile.      Ship News. Port
         of New Orleans 		ENTERED  Schr. Florida, Orosco, 		Pensacola  	Republican, Robasso, 		do  	Mary, Brullon, 			Ft. Stoddert 	Hope, Lindsey,			do 	Florida, Hendenberg,		Mobile 	Mary, Mayor,			do 	Victoria, Salles,			do  	Essay,
         Lisano, 			do 		CLEARED 	Ship Aldebaran,
         Congdon, Baltimore  	Schr. Four-Brothers,
         Davis, Savanna   The next day, January 5, 1822, Beale wrote a second letter to Mr. Morriss, in which he more fully described;
         the "List." It seems that Beale wanted to give Mr. Morriss more of an idea of how the residences and names of heirs
         would fit with the "List" of names of the party. Also, Beale made an error in the January 4, 1822 letter. Beale
         had said that one of the papers contained "a list of the names of our party, with their places of residence." 
         Actually, the letter also contained the names of the heirs and the  places of residence of the heirs, not necessarily
         the same as the places of residence of the members of the party. In the letter of January 5th he corrected the mistake by
         saying that "You will find in one of the papers, written in cipher, the names of all my associates, who are each entitled
         to an equal part of our treasure, and opposite to the names of each one will be found the names and residences of the relatives
         and others, to whom they devise their respective portions." Beale's explanation of Paper No. 3 sounds like the list
         consisted of three columns of data: (1) names of members, (2) names of heirs, and (3) residences of heirs. A simple method
         of representing a residence is by using the name of the post office where the person receives mail. With the person's name
         and their post office name, the person can be located. However, as
         Beale did not specifically use the words "post office". it is possible that some of the residences were expressed
         in more general terms, e.g., as in "the meadows of Goose Creek, Bedford Co., Va."  Yet, in Beale's day, I believe
         that every person in Virginia had a post office where they could receive mail, which seems contradictory.  Besides the obvious explanation that the treasure story is true,
         there are a number of alternate conjectures that have been advanced to explain the origin and purpose of the Beale Papers. These alternate conjectures are listed and arguments are given to show that all but one of these can be
         easily ruled out as being unlikely, namely the treasure story is a hoax perpetrated by the anonymous author of Ward's
         pamphlet. Four different arguments are presented to show it is unlikely that a hoaxer would choose to
         create genuine ciphers that potentially could be decoded rather than bogus ciphers that could not be
         decoded. Thus, by a process of elimination, it is shown that the only likely way that genuine ciphers B1 and B3 could
         have been created is for the treasure story to be true. 
           
 Chapter 6 of Beale Treasure Story: New Insights describes a computer
         test performed on ciphers B1 and B3, which showed that the two ciphers have similar or like frequency distributions. Additional
         tests were performed using real and bogus ciphers, which led to a conclusion that B1 and B3 were created using
         the same creative process.   According to Viemeister, a German researcher theorized that the gold and silver buried in Beale's vault was looted
         from the Mexican government treasury after the American victory in the Mexican War of 1847–48. A more persistent claim
         is that Beale's treasure is actually the legendary missing Confederate Treasury of the 1860s. It is known that early on April
         3, 1865, Jefferson Davis and members of his cabinet of the Confederate States of America boarded a special train in Richmond,
         bound for Danville, Virginia, bringing with them the assets of their treasury. The missing treasury has never been located.
         According to the "cover story" theory, The Beale Papers is a "fabrication, published to
         hide the truth of where the treasure came from and to 'launder' the loot."      
 However, there is good reason to
         doubt the "cover story" theory. If the pamphlet had been published to provide a "cover story," then one
         would expect the Beale treasure to have been located and removed within a reasonable period after the pamphlet's
         publication by the perpetrators of the "cover story." But, well over a hundred years has now passed, without any
         confirmed report that the treasure has been recovered, and so, it seems doubtful that the pamphlet was published
         with an intent to provide a "cover story." 
             
 A popular conjecture within the category of "mostly true"
         is that Thomas J. Beale was in reality the privateer Jean Laffite and Beale's vault contained the treasure of gold, silver,
         and jewels accumulated by the brothers, Jean and Pierre Laffite. However, there is justification for doubting this
         conjecture. Jean Laffite would not have known in 1822 that, three decades later, tons of gold would be mined near Pike's Peak,
         250–300 miles north of Santa Fé. Unless Laffite made a lucky guess, there are only two ways that this fact
         could have been known: (1) the treasure story is true, or (2) the treasure story is untrue, but concocted at least in
         part after gold had been discovered near Pike's Peak. The "Laffite" conjecture is presumably based on a desire by
         Jean Laffite to have his treasure distributed to the heirs of the men in his band, or to his men posing as the heirs. But
         it seems unlikely that Laffite's men were Virginians, as stated in the treasure story. If the key to the ciphers had arrived
         in 1832, and B3 had been deciphered, Mr. Morriss would have realized that the storyline in the Beale Papers could not possibly
         be true. Few if any of the heirs given in B3 would be Virginians. Thus, the decoded B3 would not agree with the storyline
         in the Beale Papers. Given this anomaly, Mr. Morriss might have sought legal advice before proceeding, especially
         if the names Jean or Pierre Laffite appeared somewhere in the list of names.    
 Despite the fact that Beale or Morriss
         could have been hoaxers, neither possibility seems likely. The payoff realized from such a hoax could never begin to offset
         the tremendous effort required to create the Beale Papers. According to Viemeister (pp. 145–46), author
         of more than a dozen books, "creating a fictional The Beale Papers would be a challenging task."
         Viemeister says that "a fiction writer would need two or three years to work out this intricate story and the ciphers." Moreover,
         each man had little reason or incentive to perpetrate a hoax. After all, how much pleasure could Beale derive from leaving
         the papers in a locked box given to Mr. Morriss, with instructions that it not be opened for ten years? If the key did not
         arrive, the papers could easily end up in an ash can. If Mr. Morriss created the Beale Papers, how much pleasure
         could he derive from turning the papers over to an unsuspecting person, apparently a relative or friend, just months
         before his own death, never to rejoice in the pain and suffering inflicted on the anonymous author and his family? In each
         case, there was no assurance or even any prospect that the papers would ever receive notoriety, or that either Beale
         or Morriss might be revered as a clever hoaxer.   
 Regardless of whom the hoaxer might have been, one thing is certain.
         If the Beale Papers were fiction, it would require a significant effort and a significant period of
         time to write the story, just to get everything consistent, including the plot. Someone once asked author Ayn Rand what
         were the three most difficult things about writing and she replied: "plotting, plotting and plotting." According
         to Rand, "a plot is a purposeful progression of logically connected events leading to the resolution
         of a climax." According to Beale researcher Jerry Watt, the mere complexity of the Beale treasure story and the fact
         that it makes sense, historically, is a powerful argument that the entire story is real—something not very obvious to
         the average person.   
 First off, if ciphers B1 and B3 were created as part of a hoax, there would have been no need to create genuine
         ciphers B1 and B3. Bogus ciphers B1 and B3 could be easily constructed, e.g., by "pulling numbers from thin
         air." This would be simpler than creating phony messages No. 1 and No. 3 and enciphering them to produce
         genuine ciphers B1 and B3. Why go to all the work of preparing genuine ciphers when bogus ciphers would do the job? Creating
         bogus ciphers B1 and B3 would have required far less work.   
 If it were the hoaxer's intention to make money from the sale
         of Ward's pamphlet, then sales could, and probably would be negatively impacted if knowledge of a hoax leaked out. The hoaxer
         would be concerned about protecting his return on investment. If the hoaxer had considered the
         possibility of creating genuine ciphers B1 and B3, he would also have realized that this would require genuine
         looking (albeit phony) papers No. 1 and No.3 to be prepared. But there doesn't seem to be any constructive purpose for
         doing this. In fact, creating genuine ciphers would have a downside. If B1 contained a set of directions to a fictitious
         burial site, anyone decoding B1 would discover that the burial site was phony. Admittedly, an ambitious hoaxer could
         create his own burial site lined with stone, but without any gold, silver, or jewels. This might fool an unsuspecting
         treasure hunter who happened to decipher B1. In fact, upon discovering the empty vault, one might conclude that
         Beale and his men had indeed returned and removed the treasure long ago. But, what about B3? At best, it could contain a list
         of real people and real addresses. But upon checking a few of the names, it would be learned that the list had been concocted. There
         would be no way to perpetuate the masquerade. Eventually, it would be discovered that the names of supposed members of
         Beale's party had no connection to each other and had never participated in a western hunting expedition. If it was the hoaxer's
         intention to prevent someone—who decoded Beale's ciphers—from learning that the treasure story was a hoax,
         then creating messages No. 1 and No. 3 and enciphering them to produce B1 and B3 would undermine this objective. It
         would be safest to create bogus ciphers that could never be decoded, and thereby protect your return on investment.    
 It seems
         certain that family honor and reputation would be damaged if the treasure story was a hoax and knowledge
         of the hoax leaked out. According to a statement made by George Hart in the Hart Papers (p. 8), "Inquiry
         among some aged neighbors of Ward showed the high respect they had for him, and brought forth the statement that Ward would
         never practice deception." It is clear that Ward had a reputation to protect. But what about the anonymous author?
         Although not a certain fact, the anonymous author is suspected to have been Lynchburg resident, Ferdinand C. Hutter. The unblemished reputations of Hutter, his family, and his relatives could be easily scarred if Hutter
         was implicated in a hoax. F. C. Hutter had been a major in the Confederate Army. His father had been a U.S. Army officer
         prior to the Civil War. His wife Mary Lyons was the daughter of Judge James Lyons (1801–82), who attended William
         and Mary and established a thriving law practice in Richmond, where he served ten years as district attorney and
         was active in Whig (until 1852) and Democratic politics; he chaired the 1872 convention that nominated Charles O'Conor for
         president. A prominent civic leader and an early advocate of secession, Lyons was "a pillar of the administration"
         in his one term in the House, 1862–63. He and his wife were close friends of the [Jefferson] Davises': Varian remembered
         enjoying their "large and graceful hospitality" at Laburnum, their home in the suburbs, and later said he was "our
         dear and intimate friend." Lyons addressed Andrew Johnson on [Jefferson] Davis' behalf, volunteered his legal services,
         was a bondsman in 1867, and kept in touch with [Jefferson] Davis the rest of his life. One of Lyons' sons-in-law was [General]
         William B. Taliaferro (1822-1898), who married Lyons' daughter Sally, U.S. Army officer, lawyer, legislator and Confederate
         general in the Civil War. Henry A. Wise was his brother-in-law. James Lyons Taliaferro (1855–1928), son of
         General William B. Taliaferro and Sally Lyons, was also a Virginia lawyer and Judge. Even if the treasure story were
         true, allowing F. C. Hutter to be cited as the author of Ward's pamphlet could possibly be embarrassing for
         the relatives of Hutter's wife. And, this may explain in part why F. C. Hutter (assuming he was the anonymous author)
         chose to remove his name as author of the pamphlet. (The information about James Lyons was taken from The Papers
         of Jefferson Davis: June 1865–December 1870, by Jefferson Davis, Lynda Lasswell Crist, Suzanne Scott Gibbs, and
         Brady L. Hutchison, footnote 22, page 26.)   
 Imagine the impact that the following (make believe) article might have if printed
         in the Lynchburg and Richmond newspapers:  It has been reported that Ferdinand C. Hutter together with James B. Ward, both residents of Lynchburg, have been
         implicated in a scandalous hoax perpetrated on their neighbors and friends, in the city and surrounding area. F.
         C. Hutter, former major in the Confederate army, is the son of the late George C. Hutter, U.S. Army officer, and is the husband
         of Mary Lyons, daughter of the late Judge James Lyons of Richmond, lawyer, former Richmond district attorney, and legislator.
         She is also the daughter-in-law of William B. Taliaferro, U.S. Army officer, lawyer, legislator and Confederate general in
         the American Civil War. Ward is the son of the late Giles Ward and grandson of the late James B. Risque, both former attorneys
         practicing in Lynchburg for many years. [This is followed by a short description of the treasure story.] [This is followed by a description of how the hoax was uncovered.] [This is followed by a list of other relatives together with ranks
         and titles, accompanied with a statement saying "So far relatives of the perpetrators have refrained from commenting on
         the matter."] By all accounts,
         it would be foolish to perpetrate a hoax in the first place. It would be doubly foolish to perpetrate a hoax and not take
         steps to avoid the inadvertent exposure of the hoax by a person who happened to decode one of the ciphers. Family honor and
         reputation would seem to be a powerful motivating factor to be considered by the hoaxer. Why
         create genuine ciphers B1 and B3, and risk the possible exposure of a hoax, and subsequent loss of family honor
         and reputation, if the ciphers happened to be decoded?   
 Threat of a lawsuit would be another
         powerful motivating factor to be considered by the hoaxer. The anonymous author of Ward's pamphlet spent nearly twenty years
         trying to solve Beale's ciphers. And, according to Ward's pamphlet (p. 3), "regardless of the entreaties of his family
         and the persistent advice of his friend ... he stubbornly continued his investigations, until absolute want stared him in
         the face and forced him to yield to their persuasions." This describes a man totally consumed with the task of decoding
         Beale's ciphers. Suppose that after Ward's pamphlet had been published, a few readers became equally absorbed in the matter,
         toiling many hours in hopes of recovering the treasure despite the fact that the pamphlet warned against doing so. How might
         these persons react upon learning that the treasure story was a hoax? They might be downright angry. Could the anonymous author
         and Ward successfully blame the matter on Beale or Morriss? Perhaps, but that might also be chancy. Under the threat of exposure,
         someone might talk. In such an event, the anonymous author and Ward may be exposed to a possible lawsuit. Thus, if the treasure
         story was a hoax, it would be imperative for the anonymous author and Ward to keep their participation in the matter
         secret. Why create genuine ciphers B1 and B3, and risk the possible exposure of a hoax and a possible lawsuit, if
         the ciphers happened to be decoded?  
 Even if the treasure story did not begin as an intentional hoax, but instead began
         as a fictional story, later turned into a nonfiction narrative and sold in pamphlet form to make money, the perpetrators of
         the hoax (anonymous author, James B. Ward, and possibly others) would still be concerned about their family's honor and
         reputation and the risk of a possible lawsuit. However, in this case, ciphers B1 and B3 (included as part of the fictional
         story) would have been created by the author of the fictional story. And, it may be that the perpetrators of the hoax
         would have no way to know whether ciphers B1 and B3 were genuine or bogus. In that case, the safest course would be for
         the perpetrators to discard the inherited ciphers and replace them with newly created bogus ciphers. Thus, even
         if ciphers B1 and B3 started out as part of a fictional story, it seems likely that they would have been used by the hoaxers
         only if they were known to be bogus ciphers; otherwise they would have been discarded and replaced by bogus ciphers.   
 The remarkable thing is that the arguments showing that B1 and B3
         are genuine are not based on an analysis of the cipher numbers themselves. The arguments are based on simple
         observations about the construction of the ciphers. I may have found something that other researchers have
         overlooked. It is this: A hoaxer acting on behalf
         of a fictional character confronted with a make-believe situation will not always act in the same way that a real-life character
         will act when confronted with a similar real-life situation. If this axiom is applied to the Beale treasure story, it
         is possible to use projected differences in the storyline to make important inferences about the treasure story itself.  
 If the
         treasure story is true, then while preparing paper No. 3 Beale recognized that some of the men were brothers or cousins
         with the same last name and that many of the heirs resided in the same location with the same post office address. First names
         of members and heirs could be abbreviated. Beale would have recognized that by appropriately arranging the information in
         paper No. 3, many names and addresses, which would otherwise be repeated, could be replaced by the abbreviation "do"
         for "ditto." Beale would have discovered that paper No. 3 could be written in as few as 618 letters, a fact
         that is also confirmed in Ch. 7 of Beale Treasure Story: The Hoax Theory Deflated. If the hoaxer
         had selected a length for B3 of about 930, readers of Ward's pamphlet could fairly easily confirm that its length was
         reasonable. But B3's actual length of 618 is arguably too short. If 618 is divided by 30, one obtains
         618/30 = 20.6, which means there are only 20 or 21 letters available to write two names and one address. A number of Beale
         investigators have voiced concerns that B3, with only 618 numbers, is too short to contain the claimed list of 60 names
         and 30 addresses. Conclusion:
         If the treasure story was a hoax, it is extremely unlikely that a hoaxer would create a bogus cipher B3 with only 618 numbers.
         This conclusion is consistent with statements attributed to four reputable researchers, O'haver, Yardley, Kruh,
         and Nickell. They believed that 618 was not long enough to contain the information that Beale said it did. Taken
         together, their arguments provide the best empirical evidence available to show that a hoaxer would be unlikely
         to create B3 with only 618 numbers. Thus, there is only one remaining conclusion that can be reached: B3 contains 618
         numbers because B3 is genuine and because Beale found a way to shorten paper No. 3 by removing the redundant information found
         in the lists of names and addresses that he used to create paper No. 3. Therefore, B3 is likely to be a real cipher.  
           
      
      B1 is Likely a Genuine CipherSeveral monotonic increasing letter strings occur in the recovered plain text when B1 is deciphered with the
         key to B2. In a monotonic increasing letter string, each letter is either one greater than the previous letter or equal to
         the previous letter. The observed deciphered strings and their corresponding locations in B1 are these: | Location  |  String  |  | 37  |  AAAAB |  44    |  AAABBCDEFF |  | 84  |  AABBCCCCDDE |  | 111  |  ACBCDDE |  | 188  |  ABCDEFGHIIJKLMMNOOPPP  |  
 
 James Gillogly was the first to draw attention to the letter
         strings [1]. But, as he could find no explanation for these strings under an assumption that the treasure story was true,
         his inclination was that at least the first cipher, B1, was a hoax. In Gillogly's own words: "I visualize the encryptor
         selecting numbers more or less at random, but occasionally growing bored and picking entries from the numbered Declaration
         of Independence in front of him, in several cases choosing numbers with an alphabetic sequence."        Creating
         a bogus cipher would be boring. I am sure of that. But it is unclear why the encryptor's boredom would be relieved by
         interrupting the random number selection process in order to create monotonic increasing letter strings in B1, using the key
         to B2. In effect, this would constitute an enciphering operation, in which letters in the plain text, or letter string, are
         replaced by homophones in the key. Don't forget that an enciphering operation may require counting forward or backward
         from the nearest numbered letter or word in the key text. It would seem that the encryptor would be more apt to relieve his
         boredom by looking for ways to speed the process up, rather than resort to a more tedious operation of encryption.    Beale researcher, Ronald
         Gervais, conjectured that the monotonic increasing letter strings in B1 were inserted by a hoaxer, as if to say "Don't
         take this too seriously folks; it's just for fun." I'm not exactly sure how the letters strings could be interpreted
         to mean "Don't take this too seriously folks." Except for Gillogly's conjecture that the letter strings were
         the result of a hoaxer who became bored, I know of no other explanation for the presence of the strings in a bogus cipher
         B1 under an assumption that the treasure story is a hoax.    But, if it is conceded that a hoaxer did insert such letter strings in B1, then why insert
         imperfect monotonic increasing letter strings of the form ABCDEFGHIIJKLMMNOOPPP
         (with two clerical errors corrected [2]) when one could as easily insert perfectly formed letter strings of the form
         ABCDEFGHIJKLMNOPQRSTU. The letters "A" through "U" were available in Beale's key to B2. There seems
         to be no reason for ending the string with letters 'PPP" when one could move right on to letter "Q." Why
         insert imperfect letter strings when one could as easily insert perfectly formed letter strings?     To me, the letter strings have the appearance
         of being created using a process of double encipherment, which of course means that cipher B1 is real and that the strings were created by Beale. It means that the
         cipher numbers corresponding to the letter strings can be deciphered with the key to B1 and the key to B2 to produce
         two different meaningful decodings. But as a practical matter, because double encipherment introduces an extra degree
         of difficulty into the enciphering process, this extra degree of difficulty could explain why Beale was able to create
         only imperfect letter strings.    As for the first four letter strings, AAAAB, AAABBCDEFF, AABBCCCCDDE, and ACBCDDE, they have the appearance
         of practice trials in which Beale experimented in order to learn (by doing) how the process of double encipherment could be
         accomplished. It is supposed that the fifth string ABCDEFGHIIJKLMMNOOPPP (with two clerical errors corrected) was a string
         of sufficient length to satisfy Beale's intended purpose.    Recall that in Beale's letter of May 9th, 1822, Beale gave Morriss several instructions concerning
         the locked iron box left in his charge. Among other things, Beale said that: "Should none of us return you will please preserve carefully the box for the period of ten years from the date
         of this letter, and if I, or no one with authority from me, during that time demands its restoration, you will open it, which
         can be done by removing the lock." It is clear from this instruction that
         Beale intended for someone other than himself to possibly demand the box from Mr. Morriss. This person would most likely
         be a member of Beale's company, but could and probably would be a person that Mr. Morriss had never met. The letter string
         ABCDEFGHIIJKLMMNOOPPP would serve as proof of this person's authority to retrieve the locked box. The recovery process would
         work as follows: Mr. Morriss would be instructed to number the words in a
         copy of the Declaration of Independence (DOI) and use the first letter of each word to decipher the 21 cipher numbers
         beginning with the 188th cipher number in the cipher beginning with cipher number 71 (i.e., B1).  Mr. Morriss would be
         told in advance that a recognizable letter string beginning with the letter "A" and ending with the letter
         "P" would be produced. Only a person with Beale's authority would know this information. Once the letter string was proven to be correct, Mr. Morriss
         would know that the person demanding the box had authority from Beale to reclaim the box and the person demanding
         the box would know that the cipher being examined was the genuine Cipher No. 1.      Of course, the most important paper in the box
         was B1, as it alone contained the directions to the burial site of the treasure, which explains why Beale chose to insert
         the required letter string in B1. It also explains why it was unnecessary for Beale to create additional letter
         strings after once creating a letter string of sufficient length to serve his purpose. However, if the ciphers are
         bogus, it doesn't explain why the hoaxer's boredom abruptly ended with more than half of the numbers in cipher B1 still to be
         created.       Without knowing what Beale's key to B1 looked like, it is difficult to judge the degree of difficulty that he may
         have had in accomplishing the necessary double encipherment steps. There are a couple of "tricks" that Beale might
         have employed to facilitate the double encipherment process.   
           One method would be to make use of
         nulls in the key to B1. Nulls represent "nothing" and can be thought of as spaces or blanks. An easy way to make
         use of nulls would be for the key to B1 to be based on a book cipher in which the individual letters in the keytext are consecutively
         numbered, including the spaces between words. In that case, the spaces would represent nulls. And, as there would be many
         nulls (approximately one for every four or five letters in the keytext) to choose from, there would be no difficulty in forcing
         the double encipherment process to succeed. Thus, if the usual double encipherment step happened to fail, a recovery could
         be easily made by inserting one or more nulls into the plaintext (Paper No. 1) at the appropriate point.    The other method works only if
         the key for cipher B1 is defined by Beale himself. You might think of the key as a table with as many rows as there are letters
         in the alphabet. The key is populated by assigning cipher numbers or homophones to each letter in the key, by writing the
         homophones in the proper rows in the key. Thus, the assignment of homophones is a random or haphazard process. If a keytext
         is involved, the keytext itself determines the assignment of homophones to the letters in the key. In that case, the assignment
         is deterministic not random. For sake of discussion, suppose that Beale is the one who assigns homophones in the key. In such
         a case, double encipher works as follows: The process starts with an empty enciphering key. At first, letters in the letter
         string are produced as a consequence of assigning or adding needed homophones to the empty enciphering key. This extra
         degree of freedom can be enough to permit double encipherment to succeed. But, as more and more homophones are assigned
         to letters in the key, it becomes possible in some cases to perform double encipherment in the usual sense, without assigning
         new homophones to letters in the key. In effect, the process of double encipherment consists of adding homophones to
         the enciphering key (whenever necessary) or making use of homophones already assigned to the enciphering key (whenever feasible).
         Once double encipherment has been completed, additional homophones are assigned to letters in the key, to complete the key,
         and the remaining plain text is enciphered in the usual sense.    
            Conclusion: If B1 is bogus, then the letter strings are problematic. They have an
         unexplained purpose, they have an unexplained form, and they were created by a hoaxer for the fun of it, to relieve
         boredom. If B1 is genuine, the letter strings were created by Beale for a specific and planned purpose; the form
         of the strings is consistent with a double encipherment operation in which there is enough freedom to permit
         imperfect monotonic increasing letter strings to be created, but insufficient freedom to permit a perfectly formed letter
         string or a short English text message of 21 characters to be created. Given the two competing explanations for
         the existence of the monotonic increasing letter strings, it seems more likely (to me) that B1 is genuine and that
         the letter strings were created by Beale for a planned purpose. It seems less likely that B1 is bogus and that the letter
         strings were created by a hoaxer for the fun of it to relieve boredom.  
      
      Footnotes and References [1] James J. Gillogly. 'The Beale cipher: A dissenting
         opinion." Cryptologia, volume 4, number 2, 116–119, April 1980. [2] The actual letter string at location 188 is ABCDEFGHIIJKLMMNOHPPO.
         Cipher number 301 at location 205, which deciphers as letter "H" was probably meant to be cipher number 302, which
         deciphers as letter "O." Cipher number 680 at location 208, which deciphers as letter "O" was probably
         meant to be cipher number 681, which deciphers as letter "P." Thus, words "of" and "pretended"
         at positions 302 and 681 in Beale's numbered copy of the Declaration were undoubtedly misread as numbers 301 and
         680. In effect, these were clerical errors made by Beale.   
      
    
   
   
   
   
      
      
 
  Sept. 5, 2011  Aug. 22, 2021 
      
      
    
   
   
   
   
   
   
   
   
   
    |