A Video Game Puzzle Hunt Reaps Real-World Rewards!

We’ve written about some pretty amazing and elaborate puzzle hunts here in the past. There was the Gravity Falls cipher hunt that led to an actual statue of the show’s villain Bill Cipher in the woods of Reedsport, Oregon. (And a mayoral position for the first person to find him and shake his hand!) There was the puzzle-turned-global-scavenger hunt from Trials Evolution that won’t be completed until 2113 at the base of the Eiffel Tower.

And now, a massive crowdsourcing effort has cracked another masterpiece, a puzzle hidden in an expansion pack for the video game Destiny 2. Destiny 2 is an online first-person-shooter loaded with sci-fi trappings and in-depth storytelling where players explore a shared environment while engaging in their own personal plot and adventures.

The most recent expansion to the game, Warmind, was released last week, and players noticed an elaborate symbol on a wall in the bunker of Rasputin, a sentient robot. The symbol appeared to be a lock surrounded by keys and curious symbols.

This Kotaku post went live on Friday, three days after the Warmind release, revealing the incredible online effort already in motion to unravel the secrets of the Rasputin puzzle. The subreddit r/raidsecrets was ground zero for the puzzle-solving efforts, and players compiled their theories and discoveries there.

Players quickly determined that each of the keys had a symbol that linked back to other imagery from the game, and by following those breadcrumbs, they had a chance to crack the cipher.

The first symbol was found in several places, each time with a set of digits and a bar in a particular position. Solvers theorized that these symbols represented the word “reverse.”

The second symbol appeared beside a Braille grid, leading hunters to crates with Braille lettering on them: OEAARRTFWTH. This anagrams to The Art of War, Sun Tzu’s famous tome. In this case, The Art of War was used as the source material for an Ottendorf Cipher. (That particular cipher was made famous by Nicolas Cage’s National Treasure movies.)

This type of cipher uses numbers in groups of three, and these numbers correspond to positions of letters in a book. Most often the numbers refer to Line, Word, and Letter. Decoding the number-combinations in the image above led to the answer “Destroy all second A and B. Then destroy all third C and R.”

These two clues were assumed to be instructions for what to do with the encoded ciphertext others had discovered in the game:

This encrypted message was the heart of the puzzle. But there was more to uncover first.

As it turns out, the last three keys in the image represented different words to apply to the ciphertext in order to properly decode it.

The fourth symbol was found near a Morse Code sequence that spelled out “NTEHNMLNEEGIT,” an anagram for “Enlightenment.”

The fifth symbol pointed toward a monitor with some peculiar code on it. It turns out the code was actually Jianpu, an ancient form of Chinese notation for writing music. When translated into actual music, a player identified the piece as an excerpt from Tchaikovsky’s Swan Lake.

One intrepid codebreaker then tried to decrypt the ciphertext given the clues everyone had assembled thus far.

He reversed the ciphertext, according to the instruction of the first key. He then removed every other A and every other B from the text, then every third C and every third R, according to the instructions of the second key.

Then, employing a Vigenere cipher, he used the two key words he had — “enlightenment” and “swan lake” — to begin decrypting the text. He managed to decrypt the entire text, but more incredibly, he also reverse engineered the missing third key word — “mechanized” — while doing so.

And what was the final message, after all this?

thank you for taking the time to piece together this message, friend. the time of our final conflict is drawing closer and you and ana have an important role to play in the events to come. so watch over her, guardian. i would have no life without ana or the exoprogram. i regret that we have become strangers, but we each have a path that we must walk. and, ironically, there never seems to be enough time. tell her, rasputin’s first attempt was in the right location, but the wrong moment. look here: 43.549573, -73.544868 – e

As you might suspect, those numbers at the end are GPS coordinates, which correspond to Sleeping Beauty Mountain in upstate New York. (The company that developed Warmind, Vicarious Visions, is based in upstate New York.)

A small treasure trove of prizes awaited the brave soul who trekked out to Sleeping Beauty Mountain on Saturday morning. The centerpiece was a giant spear, a replica of a weapon from the game known as the Valkyrie.

From the Kotaku article following up on the puzzle’s resolution:

There was also a box of gold coins (along with instructions asking the finder to only take one), a set of notes, and a journal for recording visitors. The note, from Warmind design lead Rob Gallerani, encouraged the finder(s) to share photos of this discovery and told them that there are only three spears like that in existence — one at Vicarious Visions, one at Bungie, and this.

The spear, shown above (alongside the visiting team from Vicarious Visions) now resides at a comic shop called The Freakopolis Geekery.

As for the gold coins and the geocache Vicarious Visions had set up for others who make the trip, unfortunately, park rangers removed it because the designers didn’t get a permit. The coins have been returned to Vicarious Visions, who are currently reaching out to all the folks at r/raidsecrets who contributed to the solution of the puzzle, hoping to get them the coins they so richly deserve.

And, as if all that wasn’t amazing enough, it turns out… this might not be the end of the adventure.

Because a sharp-eyed observer noticed some text embossed on the upper portion of the replica Valkyrie spear:

At the moment, no one knows what the letters mean. But if I had to wager, I’d say the master puzzle solvers at r/raidsecrets should keep digging. Who knows what they’ll find next?


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Elizebeth Smith Friedman, Codebreaker and Scourge of Nazi Spymasters

[William and Elizebeth Smith Friedman, hard at work.
Image courtesy of National Geographic.]

Last year, I rather ambitiously attempted to summarize the early history of American codebreaking and the NSA in a series of blog posts spanning World War II through the modern day. One of the names I cited in that series, William Friedman, is synonymous with American cryptography, thanks to his contributions to the cracking of the German ENIGMA code and his efforts to establish the National Security Agency.

Unfortunately, there is a gaping hole in the narrative I constructed. Because none of my sources made any reference to another crucial Friedman: Elizebeth Smith Friedman, William’s wife and partner in code-cracking.

Yes, she was name-dropped in my post about the book Code Girls: The Untold Story of the American Women Code Breakers of World War II, but she had to share those pages with a host of underappreciated women who were codebreaking geniuses.

[Image courtesy of HarperCollins Publishers.]

As The Woman Who Smashed Codes explains, she wasn’t just a talented codebreaker. She literally wrote the book on it. Eight of them, in fact. The Riverbank Publications — although often credited to her husband — covered new codebreaking techniques in rich detail, and they are still referred to today as part of the foundation of modern cryptography.

She also started the first and only American codebreaking unit ever run by a woman, serving as Cryptanalyst-in-Charge while jointly working for both the Treasury and the Coast Guard during and after World War II.

A history of American codebreaking without Elizebeth Smith Friedman is woefully incomplete, and in today’s post, I hope to rectify that oversight.

[Image courtesy of the Marshall Foundation.]

Elizebeth’s work with codes started in a most peculiar way. While seeking a job as a librarian after college, she was recruited by eccentric millionaire George Fabyan to live and work at Riverbank, his palatial estate that doubled as a self-funded research center for all sorts of scientific endeavors.

Elizebeth’s deep knowledge of Shakespeare was put to work attempting to prove Fabyan’s theory that there were secret messages encoded in the writings of Shakespeare. Although her work failed to uncover any hidden pattern in Shakespeare’s words or font choices, it did lead to two unexpected developments: a career in codebreaking and a budding romance with fellow Riverbank recruit William Friedman, whose own interest in codebreaking was sparked by the works of Edgar Allan Poe.

Thanks to the proliferation of radio, there was a seismic shift in how information was being passed between military units, governments, and other organizations, so the ability to listen in on one’s enemies (and allies) was not only a new strategic opportunity, but it was a relatively new science.

In short, America needed codebreakers who could crack the secret messages being transmitted (and intercepted). The military didn’t have them. The government didn’t have them.

But Riverbank did. And for the first eight months of World War I, the small group of William, Elizebeth, and those they trained handled ALL of the codebreaking for every part of the US government, from the State Department to the Army to the DOJ. William and Elizebeth began running a codebreaking school out of Riverbank, even embedding a secret message in a photo of the class taken on the last day of the course.

[Images courtesy of Elonka.com.]

In the aftermath of the First World War, codebreaking had become so important that countries were turning to machines to help develop uncrackable codes. And yet, at this point, American cryptography as a whole consisted of about 50 people. William went to work for the government, establishing the American version of Bletchley Park — Arlington Hall — and setting the stage for the creation of the NSA.

Elizebeth, on the other hand, cracked codes from home. And she did so for both the Treasury Department and the Coast Guard, who would send her sealed packages of intercepted encrypted intel and communications. In her first three months hunting down rum-runners during Prohibition, she solved two years’ worth of backlogged messages.

During World War II, Elizebeth’s Coast Guard Cryptography Unit turned their attention from smuggling (which waned during wartime) to cracking German codes. Under her tutelage, they would crack three different variations on the Enigma codes, each more complex than the last. (The British also cracked ENIGMA, independently of American efforts.)

Sadly, in the aftermath of the Pearl Harbor attack, the US military didn’t want civilians in charge of sensitive operations, so Elizebeth was demoted. Yes, she was no longer in charge of the group she started, trained, and cultivated, instead answering to a new boss of dubious cryptographic talents.

(Of course, the sexist dimwits making decisions like this had to grin and bear it when numerous other organizations and agencies continued to asked for Elizebeth’s assistance by name.)

And stealing Elizebeth’s credit was practically a cottage industry over at the FBI. We have them to thank for erasing Elizebeth’s role in particular — and the Coast Guard’s role in general — in hunting down, exposing, and compromising Nazi spy networks in South America, even though the FBI’s hamfisted blundering actually served to expose codebreaking operations in the past, forcing Elizebeth to crack new codes in order to regain the advantage the FBI had squandered.

Oh, yeah, did I mention that both during AND after World War II, Elizebeth continued to hound the Nazi forces in South America who sought to destabilize the region?

As one historian put it, referring to the thousands of pages of decryptions Elizebeth produced:

These pieces of paper saved lives. They almost certainly stopped coups. They put fascist spies in prison. They drove wedges between Germany and other nations that were trying to sustain and prolong Nazi terror. By any measure, Elizebeth was a great heroine of the Second World War.

The British knew it. The navy knew it. The FBI knew it. But the American public never did, because Elizebeth wasn’t allowed to speak.

[Image courtesy of Find a Grave.]

Even in their retirement, the Friedmans continued to contribute to the world of cryptography. They returned to the subject of Shakespeare with The Shakespeare Ciphers Examined, thoroughly debunking the whole idea of hidden codes in the Bard’s works.

When William died, Elizebeth even hid a secret message on his tombstone, for those who knew how to look. (It was Bacon’s cipher, something they both studied extensively during their time at Riverbank.) What a touching tribute to how she met her partner and husband.

And although the accolades and appreciation for Elizebeth’s incredible contributions have been slow in coming, they are trickling in. In the 1990s, the NSA renamed its auditorium from the William F. Friedman Memorial Auditorium to the William F. Friedman and Elizebeth S. Friedman Memorial Auditorium. A Justice Department building also has an auditorium bearing her name.

More information about the massive expansion of codebreaking worldwide is coming to light with every passing year. Hopefully that will mean greater attention for minds like Elizebeth, who used her puzzly mind to protect the world. That’s someone worth celebrating.

[Much of the information in this post comes from a wonderful book on Elizebeth, The Woman Who Smashed Codes by Jason Fagone, and it’s well-worth your time to check out her story in full.]


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

The Voynich Manuscript: Finally Cracked?

[Image courtesy of BBC.com.]

A year and a half ago, I introduced my fellow puzzlers and PuzzleNationers to the Voynich Manuscript, a cryptologic curiosity unlike anything else we’ve seen before. Discovered over a hundred years ago but believed to date back to the fifteenth century, the Voynich Manuscript is a hand-written book that has baffled linguists and puzzlers for decades.

The writing, which reads from right to left, has yet to be identified. It’s unclear if this is some sort of sophisticated code, an unknown or lost language which was then encoded, an invented language, an example of glossolalia (a written equivalent of speaking in tongues), or simply an elaborate hoax.

The only known copy of the text resides in Yale University’s Beinecke Rare Book and Manuscript Library, although Yale has printed replica texts.

From the Yale University website:

Many call the fifteenth-century codex, commonly known as the “Voynich Manuscript,” the world’s most mysterious book. Written in an unknown script by an unknown author, the manuscript has no clearer purpose now than when it was rediscovered in 1912 by rare books dealer Wilfrid Voynich. The manuscript appears and disappears throughout history, from the library of the Holy Roman Emperor Rudolf II to a secret sale of books in 1903 by the Society of Jesus in Rome. The book’s language has eluded decipherment, and its elaborate illustrations remain as baffling as they are beautiful.

[One of several fold-out pages in the manuscript.
Image courtesy of Wikipedia.org.]

But computer scientists at the University of Alberta believe they’ve finally unraveled some of the mysteries behind the Voynich Manuscript.

They designed an artificial intelligence program with the intent of figuring out the language in the manuscript. The AI analyzed versions of the UN’s Universal Declaration of Human Rights in 400 different languages in order to establish different linguistic patterns to compare against the text of the Voynich Manuscript.

And according to the AI, the text was most likely written in Hebrew.

Now that they had a language to work with, they needed to begin deciphering precisely how that language was encrypted.

[Image courtesy of Wikipedia.org.]

There have been many theories regarding what form of encryption was employed in the Voynich Manuscript. Some investigators theorized that vowels had been removed from the words in the text in order to obscure their meaning further, while others have suggested writing that has been mirrored or otherwise written backwards. Anagrams and other forms of word manipulation are a common theory, and the University of Alberta team went with a variation on the anagram idea.

They theorized that the encoded words were alphagrams, anagrams where the letters in a word are placed in alphabetical order. (For instance, if VOYNICH was encoded this way, it would read CHINOVY.)

Turning loose the AI once again under these parameters, they found that 80% of the words in the Voynich text could be anagrammed into Hebrew words. They managed to cobble together a possible opening sentence for the text:

“She made recommendations to the priest, man of the house and me and people.”

Is it clunky? Sure. But it’s also a partial translation that has held up to some scrutiny, which is better than most amateur AND professional attempts to crack the Voynich Manuscript have done.

The team is currently hoping to team up with experts in ancient Hebrew and continue the process, but until then, they’re excited to apply their AI to other ancient manuscripts to see what it uncovers.

Although we are a long way from calling the Voynich mystery solved, this is a very intriguing step forward for cryptographers and codebreaking enthusiasts everywhere.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

These Puzzly Puns Will Echo Through Eternity…

Oh yes, it’s that time again! It’s time to unleash our puzzly and punny imaginations and engage in a bit of sparkling wordplay!

You may be familiar with the board game Schmovie, hashtag games on Twitter, or the Hashtag Wars segment that used to run on @midnight on Comedy Central.

For years now, we’ve been collaborating on puzzle-themed hashtag games with our pals at Penny Dell Puzzles, and this month’s hook was #PennyDellPuzzleHistory, mashing up Penny Dell puzzles with historical figures, historical moments, and historical quotations!

Examples include: Daisy Defeats Truman, V-Words-Day, or “Ask not what your mystery country can do for you…”

So, without further ado, check out what the puzzlers at PuzzleNation and Penny Dell Puzzles came up with!


Penny Dell Puzzle Historical References!

Oregon Word Trails

Monrows Garden Doctrine

Woodstock Flower Power

Right of Wayflower Compact

Christopher Explore-a-word Columbus

Samson says and Dilemma

Lucky Star of Bethlehem

Lincolnwords

Federalist-a-Crostic Papers

Hannibal Crisscrossing the Alps

Washington Cross Pairs the Delaware

Military Sudo-coup

Alan Turing’s Codebreaking and Cryptocrossing during WWII

Fancy Ninety-Five Theses / Ninety-Five of Diamonds

Transcontinental Railroad Ties

Circles in the Tiananmen Square

Enigmatch-up Machines (for making Codewords)

Middle of the Silk Road

Boston Three-D Party

Sum Totals of ’69

Spanners Armada

The Treaty of Versyllability

The Stars-Spangled On Parade Word Search Banner


Penny Dell Puzzle History Quotes!

“Four Letter Score and seven years ago” / “Plus fours scorewords and seven-up years ago…”

“Other than that Mrs. Lincoln, how was the Word Play?

“Read my Blips: No new text messages…”

“The Buck Stoplines Here” / “The Buck Stops Here & There”

“Ich bin ein Berlinkworder…”

Napoleon: “Never interrupt your enemy when he’s making a Give-and-Take.”

Churchill: “The Battleship of Britain is about to begin.”

“Letterboxes them eat cake!”

Bill Parcells: “No matter how much you’ve won, no matter how many games, no matter how many championships, no matter how many Super Bowls, you’re not winning now, so you stink.”

Even Shakespeare can get into the hashtag game! From The Tempest:

ALONSO
And Trinculo is reeling ripe. Where should they
Find this grand liquor that hath gilded ’em?—
How camest thou in a pickle?

TRINCULO
I have been in such a pickle since I saw you last that,
I fear me, will never out of my bones. I shall not fear flyblowing.


There were also several submissions that deserve their own section, as these intrepid puzzlers went above and beyond.

One player offered this historical summation: HubCaptain Smith Who Became More than a Blip When He Ventured Across and Down with His Ship: A Titanic Tradeoff

Another player created his own puzzly Pledge of Allegiance:

“I pledge Accordion Words, to the flag, of the Untied Mystery States of America.
And to the republic, for which it Anagrams, one nation under Guess Who,
in Decisions, with liberty and Jigsaw Puzzles for all.”


Have you come up with any Penny Dell Puzzle History entries of your own? Let us know! We’d love to see them!

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Unsung Tales of Women in American Code Breaking!

[Image courtesy of Amazon.]

Dot Braden. Agnes Driscoll. Betty Hyatt. Elizebeth Friedman. Genevieve Grotjan. Ann Caracristi. Virginia Aderholdt. Ruth “Crow” Weston.

You don’t know these names, but you should. Everyone should. They’re bona fide American heroes who dedicated their time and energy to protecting not only our country, but also every soldier in the Allied forces during World War II. And they did so when they should have otherwise been continuing their collegiate studies.

That’s right, these women who came from majors as diverse as botany, math, psychology, and English, were recruited out of college in order to build a dedicated code-breaking unit for the US armed forces.

Thankfully, their stories are now being told in Liza Mundy’s new book, Code Girls: The Untold Story of the American Women Code Breakers of World War II. And these are some amazing stories.

It all started in early 1942, as secret letters began showing up in college mailboxes. Schools like Bryn Mawr, Mount Holyoke, Barnard, Radcliffe, and more posed two questions to prospective female recruits:

1. Did she like crossword puzzles?
2. Was she engaged to be married?

All of these women replied yes, they like crossword puzzles, and no, they’re not engaged or soon-to-be engaged.

After answering these questions, the women began attending introductory meetings. They were issued manila envelopes containing “a brief introduction to the arcane history of codes and ciphers, along with numbered problems sets and strips of paper with the letters of the alphabet printed on them.”

Their orders? Complete the problem sets every week.

[Image courtesy of YouTube.]

Each packet contained one problem that could not be solved, to show that sometimes, a jumble of letters or numbers doesn’t stand for anything. Sometimes, gibberish remains just that, because sometimes a code-breaker fails.

They developed working knowledge of foreign languages they didn’t speak. They memorized the most common English letters — E, T, O, N, A, I, R, S — and took frequency counts.

And that’s how America built its answer to England’s Bletchley Park code-breaking operation. (The American effort, known as Arlington Hall, was considered by their Bletchley Park rivals as “just a lot of kids playing at ‘office’.”)

College presidents like Ada Comstock, the president of Radcliffe College (the women’s counterpart to Harvard), were recruited to identify candidates to learn cryptanalysis to help shorten the war.

And make no mistake, they did shorten the war. They helped crack Enigma, which was key to decimating the German U-boat fleet, and their code-breaking efforts were instrumental in defeating Japan as well, providing valuable intel on the island-to-island battles of the Pacific theater.

[Image courtesy of Military Factory.]

Of the US Army’s World War II code-breaking force, nearly 70 percent was female. We’re talking 7,000 female code-breakers. When you factor in US Navy recruits as well, that number jumps to 11,000 women out of 20,000 code-breakers.

From Code Girls: “Code breaking required literacy, numeracy, care, creativity, painstaking attention to detail, a good memory, and a willingness to hazard guesses. It required a tolerance for drudgery and a boundless reserve of energy and optimism.”

Genevieve Grotjan was key to cracking the Japanese cipher known as Purple, and William Friedman, the man who initially ran the Arlington Hall operation, described the Purple cipher as “by far the most difficult cryptanalytic problem successfully handled and solved by any signal intelligence organization in the world.” He specifically pointed to the contrbutions of Grotjan, Mary Louise Prather, and other women in the Arlington Hall group.

Codes used by twenty-five different nations were analyzed by Arlington Hall, including codes of friends and foes alike. “There was a French code called Jellyfish, a Chinese enciphered code they called Jabberwocky, another they called Gryphon.”

But even their staggering efforts in code-breaking weren’t all they contributed to the cause. They were also crucial to the success of the D-Day invasion, as many of the women were put to work reverse-engineering messages in order to create false information about imaginary troop movements and landing areas. And in order to create fake signal traffic, they had to know the real traffic backward and forward.

I could go into more detail, breaking down how they cracked some of the war’s most important code languages, or exploring their personal lives and how life changed for these college students-turned-military operatives, but I don’t want to reveal more than I have already.

Read Code Girls. You won’t regret it. It’s another terrific entry in a year of books full of revelations about wartime puzzle history. We’ve been taken behind the scenes of the NSA, Bletchley Park, and now Arlington Hall.

And once more, important and influential female voices are getting the limelight far later than they deserve. It’s about time.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzles Endanger, Then Save, a Nation: The Spy Who Couldn’t Spell

While working on our multi-part series of posts about the history of codebreaking in America during the 20th century, I mentioned that some of the recent revelations about the National Security Agency were the result of Edward Snowden’s actions during his time as a government contractor.

What you might not know is that he has not been the only contractor to sneak information off of government computers in that fashion: a decade before Edward Snowden, there was Brian Patrick Regan.

Regan was a career soldier in the Air Force who eventually reached the rank of Master Sergeant and worked in signals intelligence.

Buried under hundreds of thousands of dollars in credit card debt, Regan decided his only way out of financial ruin was to try to sell US government secrets to a foreign government. He copied page after page of sensitive documents from national defense systems and snuck them out of his office, eventually amassing more than 15,000 pages, CD-ROMs, and other material in his home.

He would later bury bundles of these documents in various locations, including state parks, concealing the GPS coordinates of these valuables caches through a complicated series of encryptions where letters and numbers became three-digit sets.

You see, Regan had spent a fair amount of time studying cryptography, and fancied himself a top-shelf codemaster.

Regan used another set of encryptions of lesser complexity when he attempted to contact agents of the Libyan, Iraqi, and Chinese governments in order to sell off the treasure trove of secrets he’d amassed during his time at the National Reconnaissance Office.

One of these packets — a collection of three parcels intended for Libya — ended up in the hands of an FBI agent named Steven Carr.

From The Spy Who Couldn’t Spell by Yudhijit Bhattacharjee:

In the first envelope was a four-page letter with 149 lines of typed text consisting of alphabets and numbers. The second envelope included instructions on how to decode the letter. The third envelope included two sets of code sheets.

One set contained a list of ciphers. The other, running to six pages, listed dozens of words along with their encoded abbreviations: a system commonly known as brevity codes. Together, the two sets were meant to serve as the key for the decryption.

Some of the document had already been decrypted by FBI agents, and it revealed a member of the US intelligence community — claiming to be CIA, which was unverified, but definitely someone with top secret access — was trying to sell government secrets.

And this person had terrible spelling.

Brian Patrick Regan suffered from severe dyslexia. And, despite concerted efforts to perfect both his encryptions and his plan to net millions by selling government secrets, that dyslexia would be one of the clues that led Steven Carr to Regan’s doorstep.

It took Carr six months to connect Regan to the Libyan package, but once he did, surveillance on Regan began immediately.

When Regan attempted to board a plane to Zurich in 2001 — intending to meet with Iraqi and Libyan embassy officials — he was nabbed by the FBI and taken into custody.

Again, excerpted from The Spy Who Couldn’t Spell:

On searching Regan, officials found a piece of paper tucked between the inner and outer soles of his right shoe, on which were written addresses of Iraqi and Chinese embassies in Europe. The other materials they found on him and in his belongings were more mystifying. In a trouser pocket, Regan was carrying a spiral pad containing a page with 13 words that didn’t add up to anything: like tricycle, rocket and glove.

He had another 26 random words scribbled on an index card. Among the contents of Regan’s wallet was a piece of paper with a string of letters and numbers that read “5-6-N-V-O-A-I …” And in a folder he was carrying in his duffel bag were four sheets with handwritten lines of three-digit numbers.

FBI cryptanalyst Daniel Olson decoded some of the messages found on Regan when he was captured, but he had failed to unravel the multi-stage encryptions that concealed where Regan had buried his secret parcels. The government knew which state parks, but with acres and acres of possible hiding places, they needed more precise information.

And those parcels were the key, because they weren’t just packages to be sold to the highest bidder. No, those parcels doubled as a ransom in order to secure a better deal for himself with the US government. He wanted to blackmail the government for a reduced sentence.

They were his insurance plan.

As Thomas G. West said in Seeing What Others Cannot See, a book about visual thinking and dyslexia, “It’s not hard for a dyslexic to think ‘out of the box’ because they have never been in the box.”

Thankfully, Regan eventually realized that cooperation was in his best interest, and he revealed that each of the elaborate three-digit codes concealed a backdoor key built into the code itself.

Regan designed them this way so that, if he forgot the actual details of the encryption, all he would need is the starter word, a spark that would unlock the built-in key and help him decode the entire message.

This backdoor key system worked in a similar fashion to the Vigenere cipher, where a keyword or key phrase served as the entry point for a longer string of encrypted text. The trouble is… you need to know the cipher word or source in order to crack the code.

For example, during World War II, German agents in Europe used Daphne du Maurier’s Rebecca as the basis of a code for transmitting intelligence from Cairo to support a campaign by the Axis powers against the Allies in North Africa.

The discovery of the book among the possessions of two German radio operators who didn’t read English ultimately led to the breaking of the code, which in turn led to the capture of the German spies in Cairo.

Regan revealed the cipher words for the various hiding spots in state parks — which used cipher words from sources as peculiar as Regan’s own high school yearbook — and soon, the FBI recovered all but one of the buried parcels.

But Regan couldn’t remember the cipher word for the last one.

Daniel Olson would then step in, having learned some of Regan’s techniques as they uncovered the other parcels, and partially decrypting the remaining message enough to spark Regan’s memory. Regan finally came up with the last cipher key, and the final parcel was recovered.

Yes, once again, puzzly perseverance had saved the day!

Regan was found guilty on two counts of attempted espionage and one of gathering national defense information, and sentenced to life imprisonment with parole. Which, quite honestly, is getting off easy, considering that prosecutors were seeking the death penalty for his treasonous acts. (If prosecutors had gotten their way, he would’ve been the first person executed for espionage since the Rosenbergs in the ’50s.)

For the full story, including more in-depth explanations of Regan’s elaborate encryptions, check out The Spy Who Couldn’t Spell by Yudhijit Bhattacharjee.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!