Zodiackillersite. Backward E = 3/ G = 14 / Y K E = = 36 3/14/36

Similar documents
Sherlock Holmes and the adventures of the dancing men

DIFFERENTIATE SOMETHING AT THE VERY BEGINNING THE COURSE I'LL ADD YOU QUESTIONS USING THEM. BUT PARTICULAR QUESTIONS AS YOU'LL SEE

An Introduction to Cryptography

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Institute of Southern Punjab, Multan

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

2 nd Int. Conf. CiiT, Molika, Dec CHAITIN ARTICLES

MITOCW max_min_second_der_512kb-mp4

LFSR stream cipher RC4. Stream cipher. Stream Cipher

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

LearnEnglish Elementary Podcast Series 02 Episode 08

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Who will make the Princess laugh?

Note: Please use the actual date you accessed this material in your citation.

How to Write Dialogue Well Transcript

The Black Book Series: The Lost Art of Magical Charisma (The Unreleased Volume: Beyond The 4 Ingredients)

Description: PUP Math Brandon interview Location: Conover Road School Colts Neck, NJ Researcher: Professor Carolyn Maher

James16 Price Pivot Zone (PPZ)

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

BANG! BANG! BANG! The noise scared me at first, until I turned around and saw this kid in a dark-blue hockey jersey and a black tuque staring at me

Exploring the Enigma [The MATH Connection]

Soaring With Synonyms!

Female Psychic Attack

Here s a question for you: What happens if we try to go the other way? For instance:

Free Downloads QuickBooks 2013 For Dummies

Appendix D: The Monty Hall Controversy

Audio Metering Measurements, Standards, and Practice (2 nd Edition) Eddy Bøgh Brixen

CROATIAN OPEN COMPETITION IN INFORMATICS. 6 th ROUND

MIT Alumni Books Podcast The Proof and the Pudding

PA Substitution Cipher

A STUDY OF THE FUNCTION OF RHETORICAL QUESTIONS IN THE NOVEL FIVE ON A TREASURE ISLAND (A PRAGMATIC APPROACH)

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

AP Statistics Sec 5.1: An Exercise in Sampling: The Corn Field

NUMB3RS Activity: Coded Messages. Episode: The Mole

FOR OFFICIAL USE ONLY

Greeting 1 Hiya!/ Wassup?/ Yo!/ Alright?/ How s it going boys and girls?/ Hey guys and gals!

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

This will be a 'straight to the point' report.

a shopkeeper (do not accept councillor on its own)

Guide to the solution of the free demonstration crossword (cryptic, not concise!) found at

Barron's Law Dictionary: Mass Market Edition (Barron's Legal Guides) PDF

THE JAM BOOK. Maya Elizabeth B THEMUSICIANGIRL.COM PRESENTS. Part II

Conversation 1. Conversation 2. Conversation 3. Conversation 4. Conversation 5

CS408 Cryptography & Internet Security

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

The Gifts Of Letting Go

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

What is practical criticism?

How I Spend My Free Time

How to Read a Poem Reproduced in partnership with the Great Books Foundation.

The Talent Store. by Rene Gutteridge. Cash register and table Cash Three colorful sacks of different sizes Three boxes of different sizes

Teenagers. board games considerate bottom of the ninth inning be supposed to honest lessons study habits grand slam be bummed out work on

Lovereading Reader reviews of The Accidental Life of Jessie Jefferson By Paige Toon

Mathematics Workbook

I'm going to keep things simple. The main purpose of this tactic to show that how the story is framed makes a big difference.

*High Frequency Words also found in Texas Treasures Updated 8/19/11

Word 2013 For Dummies Ebooks Free

+ b ] and um we kept going like I think I got

Exemplar for Internal Achievement Standard. Media Studies Level 1

Advantage: Disadvantage: Left-handers have to struggle to do normal things that right-handed people find quite easy.

2018 GPISD 6 th Grade PAP Summer Reading Assignment: Tracking Your Thinking Over the Course of a Book Examples. Advanced Example

Another One Bites the Dust

Downloaded from

An Excerpt From: OVERNIGHT LOWS Written by Mark Guarino. Draft 6.0. Mark Guarino All rights reserved. CELL: 773/

The Product of Two Negative Numbers 1

(TO US) I guess my story begins at dinner time. I was late, and my mom, dad and sister were waiting with their usual impatience.

Narrative Reading Learning Progression

Rain Man. Rain man 1: Childhood MEMORIES

AN ANALYSIS OF HYPERBOLE IN LOVE SONG LYRICS.

Sketch. A Square Peg in a Round Hole. Ronald Lear. Volume 48, Number Article 19. Iowa State University

SURVIVAL TIPS FOR FAMILY GATHERINGS

Independent Reading Project

Startle Response. Joyce Ma and Debbie Kim. September 2005

Tony, Frank, John Movie Lesson 2 Text

Continuum for Opinion/Argument Writing

Metadata for Enhanced Electronic Program Guides

The 5 Step Visual Guide To Learn How To Play Piano & Keyboards With Chords

Apologies: Petter Rindforth IPC Jim Galvin SSAC Emily Taylor - RrSG

WAITING. a short one act comedy for two actors. by claire demmer.

Famous Quotations from Alice in Wonderland

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

Lossless and Reversible Data Hiding In Encrypted Pictures by Allocating Memory Some Time Recently Encryption through Security Keys

Sample Test Questions:

Look Mom, I Got a Job!

PHONO LOCO Q AND A

Elements of Style. Anders O.F. Hendrickson

Speaker 2: Hi everybody welcome back to out of order my name is Alexa Febreze and with my co host. Speaker 1: Kylie's an hour. Speaker 2: I have you

Domino Fieldplanner 3.3

Name. accountable desperately humiliated self-esteem advise hesitated inspiration uncomfortably

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Authors crack the Bard's code

Sketch. She Was Traveling with Her Aunt. Evelyn Covault. Volume 1, Number Article 8. Iowa State University

And all that glitters is gold Only shooting stars break the mold. Gonna Be

A. Write a or an before each of these words. (1 x 1mark = 10 marks) St. Thomas More College Half Yearly Examinations February 2009

THE OTHER SIDE OF THE DOOR

AP Literature and Composition Summer Reading Assignment

Little Jack receives his Call to Adventure

Jacob listens to his inner wisdom

Evaluation of Serial Periodic, Multi-Variable Data Visualizations

T/R 1: How many think one third? You all agree. Can you tell me why you would give it the number name one third?

Transcription:

AdChoices Zodiackillersite AddThis AdMeld Criteo Google Adsense Quantcast "D GAIK IS R GYKE" Author Message Daniel Gillotti Subject: "D GAIK IS R GYKE" Mon Jan 30, 2012 4:22 pm I wanted to add a drawing to this discovery but I have been very busy so I ll post this for now and update it as soon as I can. When you read the Aug 4, 1969 letter and the Zodiac says are the police having a GOOD TIME with the code? If not, tell them to cheer up; when they do crack it they will have me. Look at the 3rd 408 cipher where the phonetic GYKE is, on that line count 3 spaces in from left to right, you land on the backwards E, now from the G, you have 14 characters left on that one line. The X replaces the cipher characters and the alphabet characters are the same. V Z X G Y K E X T Y A X X X L X X Now look at the secret pal card with the skeletons right hand is written 3/14. Notice how the phonetic written GYKE is situated to the right side of this cipher. So you have 3/14 on the right hand of the skeleton and a phonetic GYKE on the right side of the cipher. Now using the (3/14) clue from the skeletons right hand. 3/14 this is a simple count, left to right (3 )spaces to backwards E then draw a line / Now count right to left (14) spaces to the G draw a line here as any of us would when writing month, day year, now the Y K E = 13 +12 +11 = 36, see below Backward E = 3/ G = 14 / Y K E = 13+12+11= 36 3/14/36 When I post this the below count will be off V- Z- X----- G --- -Y-- -K -- E-----------X - T- Y- A - X- X - X - L- X - X 1-2- 3- / -14-/ - 13-12- 11-/ = 36-10 -9-8- 7-6 - 5-4- 3-2- 1 Richard Gaikowski Month, Day, and year 3/14/36 if you breakdown his birthday here is the total 3, 1, 4, 1, 9, 3, 6, = 27 = 9 GYKES birthday and the year he was born 36 for 1936 is a repeating 9 themes found throughout the murders. 36, 27, 18, 81, 72, 63 ETC. 1. Use the 3rd cipher 408 2. Remove only alphabet characters within cipher, in order from left to right. Note: On the 1st line of this cipher if you count only the alphabet characters to the 9 or for some people who still think this is a small backward p is 9 spaces. Now count all the characters to the 9 and the total is 18=9. This is another little clue regarding the 9 theme.

Note: There are 64 alphabet characters within. In line 6 null or cancel the Q alphabet character bringing the alphabet characters to 63. I believe this extra Q was added to throw off any decryption methods. Now you should have 63 unique characters, the same in the Z340. Also, the 63 is Gyke s birthday year 36 reversed. 1. N S E Z A P B V = 8 2. X W F A B = 5 3. O T R U Y S W = 7 4. V Z G Y K E T Y A L = 10 5. H F B X X A D L = 8 6. P O R X F G = 6 7. Z J T J I B P Q W = 9 8. V E X W I E H M U I = 10 3. Use the alphabet characters in rows 6 and 7 Zodiac is probably referring to the year 1969 with the 6 and 9 alphabet characters 4. Use a key word cipher tool 5. Cipher text: P O R X F G Z J T J I B P Q W 6. Key word: GAIKOWSKI Key letter: N NOTE: GAIKOWSKI = 9 LETTERS 7. Plain text generated: E R G K Y N M A H A P U E F S E R G K Y / N M A / H A / P U / E / F S Plain text solution: NAME R GYKE PS FU HA! 8. You can see R GYKE NAME, ERGKY/NMA clustered together in the beginning. Not only is GYKE generated, R GYKE is generated, R for Richard. The rest is a simple acronym/ jumble, completely acceptable. The HA seen next here is a very important clue because in my research, the Isopsephia Greek calculator HA is counted as 9 HA=9, HA= 18 Ect, this is a clue that the decryption is correct and the discovery of his birthday, month, day, year hidden within the phonetic GYKE is correct. 3/14/36=9 and HA=9. The P.S. has a double meaning it s also Secret Pal=9 reversed. Write P.S. and below that write Secret Pal you can draw a line connecting the S to S and P to P to complete the Zodiac Cross or X? 9. Now using 3/14/36 found on the 4th line of the 3rd cipher and the plain text generated from my solution: NAME R GYKE 3/14/36 P.S. FU HA!

In reviewing the totality of evidence: 1. The claim of the Zodiacs identity hidden within the cipher from the letter. 2. The clue 3/14 on the skeletons right hand from YOUR SECRET PAL card. 3. The phonetic GYKE, and Month, Date, and Year All encrypted in plain sight on the same 4th line. 4. GAIKOWSKI as the KEY and the plain text generated not only back to the phonetic GYKE but to NAME R GYKE to me seems very valid. You can technically add the key: GAIKOWSKI, which is part of the solution, and P.S. = Secret Pal =9, HA=9: Based on the above, I believe that Richard Gaikowski is R Gyke and R Gyke is Richard Gaikowski NAME GAIKOWSKI, R GYKE 3/14/36 P.S. FU HA! 9 for Gaikowski, 9 for 1936, 9 for secret pal and 9 for HA 9x4=36 If some one here wants to add a GYKE drawing from the 4th line with the way I decrypted his month, day and year, with the skeleton 3/14 clue, I would appreciate it. I discovered this in September of 2011 and wanted to make sure it was right before I posted it. I want to go on the record and say was GYKE the Zodiac, I don t know yet. Was he involved, I don t know yet, was there others involved I believe yes. Did some one have a fixation with D Gaik and role play him into these murders, possibly? This case is in desperate need to be reopened and reinvestigated again from the beginning. That includes all the murders, letters cards and ciphers. Daniel

Daniel Gillotti Subject: Re: "D GAIK IS R GYKE" Tue Jan 31, 2012 12:07 am Hi every one: If any one has any questions or you need further explanation please don t hesitate to ask? Daniel AK Wilks Subject: Re: "D GAIK IS R GYKE" Tue Jan 31, 2012 2:42 pm Dan nice to see you posting again. The problem here may be that you have so many steps it is hard to follow. Also, being involved in this case for many years now I have seen dozens and dozens of solutions similar to this, which rely on multiple steps, different clues, taking certain things out, adding certain things, and they all come up with different suspect names. The bottom line is that with this many steps, clues and subjective assumptions, you can arrive at many different names. Not saying that the work is not valid. You explain your steps and arrive at an interesting solution. At the end you say: "7. Plain text generated: E R G K Y N M A H A P U E F S E R G K Y / N M A / H A / P U / E / F S Plain text solution: NAME R GYKE PS FU HA!" AK Wilks: First of all Gaikowski never called himself "GYKE". Second you have to do some major anagram scrambles to arrive at the message. You take: E R G K Y N M A H A P U E F S That does not scream out anything to me, and one could create literally 100 different anagrams from those letters. For years I pursued anagram solutions in the 340 raw Graysmith solution, but while Kite, myself and about a dozen others think the results are impressive and beyond chance, 80% of the Zodiac research community does not care, and 95% of the code community disregards anything with anagrams. I think that is wrong, but that is the reality. I hate it when I post something and get no reaction, so I posted this. I personally would rather get a negative reaction or constructive criticism than no reaction at all, hopefully you feel the same way. You are a good researcher who has made some very interesting discoveries keep it up and keep plugging away! MODERATOR Daniel Gillotti Subject: Re: "D GAIK IS R GYKE" Tue Jan 31, 2012 4:36 pm

Daniel Gillotti Ak: Thanks for responding, believe me when I say that I have much respect for your research, I follow it closely, you have achieved much. This decryption is solid and I stand behind it. This is not an anagram solution; the plain text is clear from left to right R GYKE followed by Nam, followed by HA. The 3 are very important and they are together. The month, day and year of Gaikowski=9 B-day running through the phonetic GYKE is just as important to the plain text solution. I will clarify my post for any one here regarding this solution. If there is something specific please post. Thanks for posting AK...I wish people here would respond positive or constructive criticism welcome Daniel Drew Subject: Re: "D GAIK IS R GYKE" Tue Jan 31, 2012 5:11 pm How is the plain text generated in step 7? I was following it okay until that point. doranchak Subject: Re: "D GAIK IS R GYKE" Sat Feb 04, 2012 8:21 am I agree with AK - there are too many steps, and too much subjectivity in this approach. I, too, have seen many solution attempts similar to yours, where there is so much freedom in the approach, that one can make many erroneous conclusions. I believe that using numerological techniques to find these kinds of coincidences is a waste of time, because there is a very large pool of numbers to draw from, increasing the number of possible coincidences. If you wrote down every possible number that can be derived from the ciphers, by way of symbol positions, converting letters to numbers, using row numbers, using column numbers, etc., then you greatly increase the chances of finding interesting and subjectively selected coincidences that don't mean anything. For instance, we could probably find Lady GaGa's birthday in the cipher somewhere, since there are so many numbers to choose from. A computer could exhaustively examine all of these sorts of numerological constructions, vastly more efficiently than people can do by hand, and find many meaningless matches to facts and tidbits about random subjects. Daniel, if your work makes you happy, by all means do it. I just hope that you are aware of the significant problems in making conclusions from it. Daniel Gillotti Subject: Re: "D GAIK IS R GYKE" Sun Feb 05, 2012 1:14 am Dave: Thanks for responding to my post, I believe this is the first time you have. If you feel the work is inaccurate, who am I to argue with you. I have respect for your work. your cipher comparisons, Zodiac web toy ETC and all the hard you have put into the Zodiacs unsolved ciphers doesn t go unnoticed, I want to personally thank you for that. I was hoping if you can take a look at this, here is the 63 letters again with the nulled Q as I have mentioned earlier, this time I added the 18 left over characters to the 63, to complete an 81 character possible cipher. I used Gaikowski as the key word and N as the key letter again and something interesting was generated. You can see JKS YOUR DTXMOEU JKS YOUR HGILTSJMNLQXHLOBZYUKKOWB ERGKY NMA HA PU E F SJXKSPXZCIPXUXRGPXHXCXHZZEPHP Now I m not trying to defend that I m right because YOUR JKS was generated with the 18 left over

Now I m not trying to defend that I m right because YOUR JKS was generated with the 18 left over characters, even though I believe that JKS the Poet was definitely the inspiration for the Zodiac. What I m trying to say is that I believe that the 81 characters you see here, is the cipher in the cipher idea that s been floating around. If you have the time can you please look this over and tell me what you think. Thanks Daniel doranchak Subject: Re: "D GAIK IS R GYKE" Sun Feb 05, 2012 6:18 am I appreciate the kind words, Daniel. I don't think the production of "YOUR JKS" via your method is sufficient evidence to support the claim that there is a cipher within a cipher. There are many similar techniques we can apply to the cipher text to produce small snippets of interesting words and letter sequences that arise completely by chance. For your evidence to be more convincing, you would have to show that the patterns you are finding cannot be explained by random chance or coincidences. One way to do this is to produce a much larger plaintext message that comes directly from some systematic decipherment technique that does not introduce random elements. The solved 408 cipher is a perfect example: there is no way that random chance could produce such a totally coherent message via its simple decipherment technique. Here is a good example of very interesting patterns produced by random chance: http://www.zodiackillerfacts.com/forum/viewtopic.php?p=22615#p22615 Those repeated symbols form a very interesting pattern. They seem to be purposefully placed there. But they are completely meaningless, because they appear in any text written in a block format. Here's another example. Back2good once applied the 408 key to the 340 to produce a grid of plaintext letters, and then used a "word search" technique, in multiple directions, to locate interesting words and names that suggested links to specific suspects. But those findings were not significant, because so many words can be found using the same technique, and it is impossible for them all to be intentionally placed. Here is the list of words I found (use the little scroll bar to look at them all): Code: 12: found [defenestrate] at row 8, column 5 found [northeastern] at row 13, column 14 found [unregenerate] at row 11, column 10 11: I think it is worthwhile to try a lot of different ideas. You just have to be careful not to chase phantoms, because found they [desensitise] are very easy to at manufacture row 18, column by accident. 6 found [deteriorate] at row 14, column 6 Daniel Gillotti Subject: Re: "D GAIK IS R GYKE" Yesterday at 3:33 pm found [inelaborate] at row 1, column 10 Dave: I ve been saving the heavy artillery for this post. I just wanted to explain a little of what I did to get here. I completely agree with you about getting snippets of related text and I m pretty careful about not getting caught up in text that looks intentional but not related. In fact, I run so much, I m afraid to even admit this but I run thousands of attempts and I toss out most of it even when the analysis of it is very strong. What I m trying to do is recreate the steps or the encryption method behind the mindset of the person or persons involved behind the letters, cards and ciphers.

ciphers. I have followed the recurring pivots that were discovered by Trave and I have to admit it looked intentional to me. that is definitely the most complex recurring pattern to date; the diagonals too are very interesting. I read a while back about the R J I hook and your concerns that it may not be intentional. I m going to post a discovery on my sacred nine thread regarding the R J I hook, tell me what you think when you get a chance. I am by no means a cipher expert nor am I going to portray something I m not. I can muddle through harder methods but I try to be realistic to what was available to someone in the 60 s. What I didn t realize, there has been brilliant work in cryptography for over a hundred years before the 60 s Frank Miller, one time pad and postal codes, Leo Marks in the 40 s with plain text encryption in poetry Etc I agree with you that the work I ve done should be tested for a possibility for random chance or coincidence. Unfortunately this is out of my league and the work I do is probably too small. I m working with approximately 81 to 300 characters. If you survived my 5 paragraph prattle, here is a partial decipherment of the 81 characters: CIPHER: DTXMOEU JKS YOUR HGILTSJMNLQXHLOBZYUKKOWB ERGKY NMA HA PU E F SJXKSPXZCIPXUXRGPXHXCXHZZEPHP PLAIN TEXT: U G LPUG THE COP TEO YOU GO PLUG THE COP THEO.. I can t post the rest because of what else it says and to my knowledge it hasn t been discovered in anyone s Zodiac research. This is how the first 15 letters came out and I don t know what to say, this is a pretty powerful opening and I m a little hesitant posting this much of it. Dave, I have something to ask you, I ll PM you the question if you respond to this post. PS: Yes I agree with you, it is worthwhile to try many ideas. that's why I m having so much fun bouncing my forehead off a brick wall lol Daniel doranchak Subject: Re: "D GAIK IS R GYKE" Yesterday at 4:43 pm Like Drew, I am confused about these steps: Quote: 4. Use a key word cipher tool 5. Cipher text: P O R X F G Z J T J I B P Q W 6. Key word: GAIKOWSKI Key letter: N NOTE: GAIKOWSKI = 9 LETTERS 7. Plain text generated: E R G K Y N M A H A P U E F S What key word cipher tool are you using to do this?

traveller1st Subject: Re: "D GAIK IS R GYKE" Yesterday at 5:57 pm Hi Dan, It wasn't me that discovered the pivots. Those were noted well before my time. I did point out a lot of the diagonals stuff but I think Dave showed quite effectively that they are naturally occurring and indeed showed even more complex examples. It was noted that the 3 repeating diagonals that occurred as part of the lower pivot probably was interesting but we don't know why lol. I can't comment directly on most of your work as it goes over my head for now. I like the smiley face in the square symbol though "I don t know Chief, he s very smart or very dumb." Daniel Gillotti Subject: Re: "D GAIK IS R GYKE" Yesterday at 6:10 pm I use many cipher tools, for the keyword work, I use PURPLE HELL the link is posted. (I like this name lol) http://www.purplehell.com/riddletools/keyword.htm The decipherment from the 81 characters I posted today is a little more complicated and not a key word decipherment. I didn t post the steps for a reason. That s why I said I would PM you. There is work I m not ready to post yet. traveller1st Subject: Re: "D GAIK IS R GYKE" Yesterday at 6:19 pm If you want to melt your brain completely check this out. I've been messing around with version 2. http://www.cryptool.org/en/ "I don t know Chief, he s very smart or very dumb." Daniel Gillotti Subject: Re: "D GAIK IS R GYKE" Yesterday at 6:27 pm Hi Trave: I thought you discovered the pivots sorry, the other work you have posted is very good and I follow your threads. I like your way of thinking and problem solving ideas. Thanks for noticing the smiley face lol I wanted to take that Secret Pal skeleton and shove his skull into that box and have his 3/14 right hand pointing at the phonetic GYKE lol but I lost my nerve lol I look forward to more of your work Daniel Daniel Gillotti Subject: Re: "D GAIK IS R GYKE" Yesterday at 6:36 pm Trave: You are too funny, I love this tool. I ve been using it since Dave posted it a while back. How do you like it? Daniel.

"D GAIK IS R GYKE" Daniel. Free forum phpbb Free forum support Statistics Contact Report an abuse