HOUSE_OVERSIGHT_015904.jpg

1.24 MB

Extraction Summary

4
People
1
Organizations
0
Locations
1
Events
3
Relationships
5
Quotes

Document Information

Type: Book page / manuscript (evidence production)
File Size: 1.24 MB
Summary

This document appears to be page 214 from a book or manuscript titled 'Are the Androids Dreaming Yet?'. The text discusses the history and mechanics of cryptography, specifically substitution ciphers and progressive ciphers, using an Enigma Machine image as an illustration. It includes personal anecdotes from the author involving his wife (a linguist), his eight-year-old daughter, and his dog named George. The document bears a 'HOUSE_OVERSIGHT_015904' stamp, indicating it was included in a document production for the House Oversight Committee.

People (4)

Name Role Context
Author (Unidentified in text) Narrator/Writer
Writing a book/chapter about codes and cryptography
Wife of Author Linguist
Decoded a simple cipher in less than a minute
Daughter of Author Child
Eight-year-old who participated in a code-breaking test
Roman Emperors Historical Figures
Mentioned as users of simple substitution codes

Organizations (1)

Name Type Context
House Oversight Committee
Indicated by the footer stamp 'HOUSE_OVERSIGHT', suggesting this document is part of a congressional investigation pr...

Timeline (1 events)

Unknown
Author tested a simple substitution code on his wife and eight-year-old daughter.
Unknown
Author Wife Daughter

Relationships (3)

Author Spouse Wife
Text refers to 'my wife'
Author Parent/Child Daughter
Text refers to 'my eight-year-old daughter'
Author Owner/Pet George
Text refers to 'the name of my dog' and uses 'george' as the cipher key

Key Quotes (5)

"Everyone has played with some sort of secret code as a child"
Source
HOUSE_OVERSIGHT_015904.jpg
Quote #1
"Less than a minute for my wife – a linguist."
Source
HOUSE_OVERSIGHT_015904.jpg
Quote #2
"Roman Emperors used this sort of simple code to secure their messages"
Source
HOUSE_OVERSIGHT_015904.jpg
Quote #3
"Let us use a progressive cipher where we vary the substitution using a secret word."
Source
HOUSE_OVERSIGHT_015904.jpg
Quote #4
"Take the name of my dog and write it down repeatedly"
Source
HOUSE_OVERSIGHT_015904.jpg
Quote #5

Full Extracted Text

Complete text extracted from the document (1,751 characters)

214
Are the Androids Dreaming Yet?
Codes
Everyone has played with some sort of secret code as a child – the Aggy Waggy game, passing notes written in invisible ink made from lemon juice, or perhaps a simple cypher. If I want to send you a secret message, I can use a substitution code. Let’s see how good a code breaker you are. Can you decode this?
Gdkkn Qdzcdq
It’s really easy. You might guess the message from the pattern of letters and your knowledge of my writing style. There are a couple of interesting patterns to note: the 3rd and 4th letter of the first word are the same and the first and last letter of the second word are the same. As a test I gave this code to my wife and my eight-year-old daughter to see how long it took them to decode… Less than a minute for my wife – a linguist. We will come back to my daughter shortly!
Enigma Machine
Roman Emperors used this sort of simple code to secure their messages, but modern codes have to be a great deal more sophisticated. Let us use a progressive cipher where we vary the substitution using a secret word. Take the name of my dog and write it down repeatedly next to the letters of the message you want to keep secret. Now translate all the letters in the message and the code into numbers ‘a’ = 1, ‘b’ = 2 and so on. Then add the letters of my dog’s name to the letters of the message one at a time. If I get to 26 (‘z’) just wrap around to ‘a’ and carry on. This is called modulo arithmetic. This coding scheme will translate ‘l’ to ‘a’ the first time but ‘l’ to ‘c’ the second making it much harder for a linguist to see any pattern.
hello reader can you read this code
georgegeorgegeorgegeorgegeorgegeorge
Gives
ojacveyjpvlwghpegcvzoilfkehzpxghcvle
HOUSE_OVERSIGHT_015904

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document