Five years ago I asked my readers for information about seven little-known cryptograms created by criminals. Meanwhile, I’m a little wiser, but I still would like to know more about some of these encrypted messages.

Crimes that involve encryption have always been a popular topic on this blog and in my books. My posts about the Zodiac Killer, the Somerton Man, Ricky McCormick’s encrypted notes and similar stories repeatedly received many page hits.

While the cryptograms of the Zodiac, the Somerton Man, and McCormick are well documented, there are other criminal cases involving cryptography about which I have much less information. When in 2015 I set up a list of crimes that included encryption I knew nothing about, I came up with six cases. Like always, when I have an open question about a crypto history topic, I asked my readers for help. My blog post (in German) about these six cases was published in 2015. In an addendum I added a seventh one.

Meanwhile five years have passed and, much to my delight, I have been able to solve some of these mysteries. So, here’s my update.


1. Nina von Gallwitz kidnappers

The then eight-year-old Nina von Gallwitz from Cologne, Germany, was kidnapped in 1981 and released after 149 days against payment of a ransom. The perpetrators were never caught. Two negotiators hired by the Gallwitz family communicated with the kidnappers via encrypted newspaper advertisements. According to Wikipedia, the “five-line Caesar” cipher was used (this is a term I was not familiar with). Neither the Wikipedia article no any other source I consulted mentioned any details about the crypto involved.

Source: Die Welt

A few weeks after publication, I received a mail from blog reader Rolf Thelen. He knew the details of the case and provided me all the information I was looking for, including scans of the newspaper ads. I was overwhelmed and hereby want to thank Mr. Thelen again. Here’s the blog post I subsequently wrote (in German).


2. Victor Lustig (imposter)

Victor Lustig (1890-1947) was a famous trickster and imposter. His most famous coup was the “sale” of the Eiffel Tower to a French scrap metal dealer from whom he took a handsome sum. According to the book The Man who Broke Purple (p. 124) by Ronald Clark, codebreaker William Friedman deciphered an encrypted message created by Lustig in 1936. Details about this story were not known to me.


Source: Wikimedia Commons

In 2018, I visited the Marshall Library in Lexington, Viriginia, to do research in the William Friedman collection. There I found the message Clark probably referred to in his book. As it turned out, Lustig’s writing was not encrypted but written in misspelled German. Nevertheless, the mystery was now solved. Check here for my blog post about this story.


3. Petras Dominas (murderer)

Petras Dominas was a murderer with the reputation of being highly intelligent. According to an article in Der Spiegel, he used a complex encryption system of his own design. The only thing I knew about this cipher was the following small excerpt from one of Dominas’ writings:


Source: Der Spiegel

Dominas’ encryption system is still a mystery to me. If a reader knows more about it or can make sense of the snipet above, I would be very interested to learn.


4. John Wilkes Booth (Abraham Lincoln murderer)

In 1865, actor John Wilkes Booth murdered US president Abraham Lincoln. Booth had several accomplices with whom he communicated via encrypted messages (check here for more information). Unfortunately, I had no information about the cipher Booth used when I wrote my 2015 post.


Source: Wikimedia Commons

Still today I don’t know how Booth’s encryption system worked, but I at least I have found out something else: In the 2007 movie National Treasure: Book of Secrets, John Wilkes Booth’s diary plays a role. It is encrypted in a Playfair cipher. However, the plot of this film is ficticious and to my knowledge the real John Wilkes Booth didn’t leave behind an encrypted journal.


5. Ohio prison

Another story covered in the book The Man who Broke Purple (p. 124) by Ronald Clark is about an encrypted message that was seized in the state prison of Ohio. Master codebreaker William Friedman broke this encryption and thus uncovered an escape plan. However, Clark’s book doesn’t explain how the encryption worked.

Marshall Library

During my visit in the Marshall Library in 2018 I was able to find the prison message Clark refered to. Here’s my blog post about it.


6. Adolf Eichmann (Nazi war criminal)

Adolf Eichmann (1906-1962) was one of the most important desk criminals in the Third Reich. Heading a division in the Reichssicherheitshauptamt (RSHA) he organized the deportation and murder of about six million Jews. In spite of his powerful position, he was almost unknown to the public. He admired Adolf Hitler, but never met him in person.

After the war, Eichmann escaped to Argentina, where he began a new life. But his past caught up with him: in 1960 he was kidnapped by the Israeli secret service Mossad and brought to Israel. In a sensational trial he was sentenced to death and subsequently executed.


Source: Wikimedia Commons

Much has been written about Adolf Eichmann, but only very few authors mention that in 1950 he sent an encrypted message to his wife Vera. It goes without saying that I would be interested in reading this message and learning about the encryption method Eichmann used, but neither before nor after my 2015 post I couldn’t find out anything about these things.


7. Al Capone

In an addendum to my 2015 blog post I mentioned the infamous gangster boss Al Capone. Capone’s eventual conviction on tax evasion charges was largely supported by evidence from encrypted ledgers. Federal agents successfully proved to a jury that enciphered entries in the ledgers represented payments for alcohol. Check here for details. To my regret, this source doesn’t mention anything about the cipher Capone used. My readers couldn’t provide information about this topic either.

Should a reader have more information about any of these cases, I would be interested to know.

Further reading: Four cryptograms from a 1926 crime story series


Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Kommentare (8)

  1. #1 ShadowWolf
    Ohio Prison
    21. Februar 2020

    The basic cipher is a pattern 203384 and sort of a Vigenere. The difference is that the pattern restarts at the beginning of each new sentence. I didn’t try to find a key word because the instructions are “count forward to solve”. The number may simple be an arranged key.

    Note that I corrected 2 errors in the transcript.

    feiig wpcefw. gm pbfzgnd qzeq orq gj y rbdmhyr sfker bv x
    20338 420338. 20 3384203 3842 033 84 2 0338420 33842 03 3

    xngeka odm ip xtom lrqwhw o.h. gm fk kaaoka u, pcx fp aj j bilug
    842033 842 03 3842 033842 0.3. 20 33 842033 8, 420 33 84 2 03384

    Unfortunately the font here messes it up, but if you us a mono spaced font, all the letters and numbers will line up nicely.

  2. #3 ShadowWolf
    John Wilkes Booth
    21. Februar 2020

    The claim at this link is JWB didn’t actually use a cipher though he had a Vigenere table among his personal effects. Google isn’t very helpful on this topic unless it is buried much deeper in the searches. Otherwise a trip to a library is likely the only way to see anything else.

  3. #4 ShadowWolf
    Ohio Prison 2
    22. Februar 2020

    it turns out the 203384 may actually be a word. Perhaps a golfer?

    A. B. C. D. E. F. G. H. I. J
    0. 1.. 2.. 3. 4..5.. 6. 7. 8. 9


  4. #5 Thomas
    23. Februar 2020

    John Wilkes Booth: According to Kahn (‘The Codebreakers’) a table was found in his belongings hinting at the usage of a Vigenere cipher:

  5. #6 Thomas
    23. Februar 2020

    Al Capone: There seems to be no evidence he used a cipher at all. Ledgers found by the police contained abbreviated names (‘A’, ‘R’, ‘J’) so that they had to identify the individuals who had received payment,

  6. #7 Petar
    24. Juli 2020

    Unfortunately German and no emphasis on the code but maybe interesting:

  7. #8 Klaus Schmeh
    24. Juli 2020

    Thank you very much. The code is mentioned in the podcast, but no details are explained.