By Emilia Wellesley · Published May 7, 2026 · Updated May 7, 2026
What Are the Beale Papers?
The Beale Papers are an 1885 dime-store pamphlet, printed in Lynchburg, Virginia, by a local agent named James B. Ward, presenting three numerical ciphers said to have been left in 1822 by a man called Thomas Jefferson Beale with the Lynchburg innkeeper Robert Morriss. The second of the three ciphers can be read using the United States Declaration of Independence as a key. The first and third have never been read. Around them has grown a treasure-hunting tradition still active two centuries after the events the pamphlet purports to describe.
What survives in the documentary record is much thinner than the legend has made of it. Lynchburg in the 1820s was a real town with real innkeepers; the Declaration was a real document available to a real cryptographer; the second cipher does decrypt cleanly to a coherent inventory of buried gold, silver, and jewels, and that decipherment, on its own, is a real cryptographic achievement. From those reasonably secure facts, the pamphlet of 1885 builds a story whose surrounding documents (Beale’s existence in Lynchburg, Morriss’s tenure at the Washington Hotel in 1820, the iron box left for safekeeping, the unnamed friend who solved cipher number two) have not survived an honest accounting against the parish, hotel, and printing records of the period.
The honest course is to read these as three documents in sequence: the cipher as a document, the pamphlet as a document, and the linguistic anomalies in both as a document. That is what cryptanalysts and skeptical investigators from William Friedman through James Gillogly to Joe Nickell have done since the 1930s. This article walks the chain of custody as scholars actually have it, sets out the predominant scholarly position that the first and third ciphers are most likely a nineteenth-century hoax, and acknowledges that the case is not formally closed, within the broader landscape of historical and archaeological mysteries.
The Pamphlet of 1885 and Its Frame Story
The pamphlet that began the public history of this case is a short octavo of about thirty pages, sold for fifty cents from a Lynchburg agent in 1885 and signed only with the publisher’s name, James B. Ward. Ward’s frame story is precise about its own provenance and inconveniently vague about its sources. He claims the materials reached him from an unnamed friend, who in turn had received them from Robert Morriss, the proprietor of the Washington Hotel in Lynchburg, who in turn had received them in March 1822 from Thomas Jefferson Beale.
Beale, the pamphlet says, had led a party of thirty Virginians west in April 1817, hunted buffalo on the plains, drifted as far as the country north of Santa Fe, and there in 1818 stumbled on a lode of gold and silver. The party mined for eighteen months, brought the metal east in two consignments to Bedford County in November 1819 and December 1821, and buried it in an excavation about four miles from Buford’s Tavern. Beale stopped at Lynchburg twice, the second time leaving with Morriss an iron box and a covering letter dated 9 May 1822. Morriss was to wait ten years; if Beale had not returned, a key to the ciphers would arrive by post; if no key arrived, Morriss could open the box. Beale never returned, the key never came, and Morriss, after twenty-three years of inaction, opened the box in 1845 and found the three numerical ciphers and an explanatory letter that named no one in particular.
The Friend and the Decipherment of Number Two
Morriss, the pamphlet continues, made nothing of the ciphers. Toward the end of his life he passed them to an unnamed friend, who spent two decades on the problem and recovered the second cipher’s text by trying the United States Declaration of Independence as a numbered key book. The first letter of the word indexed at each position, with a small number of editorial corrections to the canonical word-count of the Declaration, yielded the inventory: gold and silver of specified weights, deposited in two consignments in November 1819 and December 1821, in an excavation in Bedford County, with the parties and shares to be named in the third cipher.
The unnamed friend then, the pamphlet says, exhausted himself on numbers one and three, gave up, and consigned everything to Ward for publication on the principle that more eyes might do better than two. The pamphlet sold poorly. Most of its first printing is said to have been destroyed in a Lynchburg warehouse fire shortly after publication, which has the convenient effect of shifting the burden of provenance onto a few surviving copies that no one is in a position to interrogate.
The Cipher Number Two: A Real Decipherment
The second cipher is the case’s one solid factual anchor. Its text reads, in part: “I have deposited in the county of Bedford, about four miles from Buford’s, in an excavation or vault, six feet below the surface of the ground, the following articles, belonging jointly to the parties whose names are given in number 3, herewith.” It then lists, in plain numerical detail, one thousand and fourteen pounds of gold and three thousand eight hundred and twelve pounds of silver from the first deposit of November 1819, and a further nineteen hundred and seven pounds of gold and twelve hundred and eighty-eight pounds of silver from the second deposit of December 1821, with jewels valued at thirteen thousand dollars obtained in St Louis in exchange for silver to save transportation. The standard reference treatment sets out the cipher’s text and the canonical and slightly modified Declaration word-counts that produce it.[1]
What the Decipherment Establishes
The successful decipherment of number two establishes one thing without serious dispute: somebody in the period before 1885 had a usable command of book-cipher technique and chose the Declaration of Independence as a key book. The cipher is not a child’s substitution. It is a numbered list of about eight hundred entries, each pointing to a word in a long printed text and using the first letter of that word as the plaintext character. Reconstructing the message from the numbered list is not difficult once the key book is known; finding the key book in the first place, in the era before computing, was non-trivial. Whoever produced cipher number two understood what they were doing.
What the Decipherment Does Not Establish
It does not establish that Thomas Jefferson Beale existed in Lynchburg in 1820, that Morriss received an iron box in 1822, or that an excavation four miles from Buford’s Tavern contains gold to the weights specified. It establishes only that a person with cryptographic competence, at some point before 1885, encoded a particular passage of English using a particular printed text. The author of that encoding had every motive, if a hoaxer, to produce one well-formed cipher whose text would attract treasure-hunters, and to leave the other two as a permanent invitation. Joe Nickell, in his 1982 stylometric analysis, noted that the prose of cipher number two and the prose of the pamphlet’s frame story share linguistic habits that are hard to attribute to two different authors writing six decades apart, a finding consistent with single-author construction.[2]
Friedman, Hammer, and the National Cryptographic School
William Frederick Friedman (1891-1969), the Army cryptographer whose Signal Intelligence Service became the analytical core of the postwar National Security Agency, knew the Beale Papers well. Friedman used them as a training problem in the cryptographic course he ran at Riverbank Laboratories in the late 1910s and continued to use them in the Signal Intelligence School after 1930. He believed, and stated in writing, that the ciphers were “of diabolical ingenuity, specifically designed to lure the unwary reader,” a phrase consistent with the position that they were a literary construction rather than a treasure map. Britannica’s biographical entry on Friedman summarises his stature as the founding figure of American cryptanalysis and his role at the Signal Intelligence Service through the 1930s and 1940s.[3]
The Friedman-Kullback Stylometric Comparison
Friedman and his colleague Solomon Kullback are credited within the NSA’s later historical commentary with a stylometric comparison between the prose of the pamphlet’s narrative frame, signed Ward, and the prose of the deciphered second cipher, signed Beale. Their working conclusion was that the two texts had been produced by the same hand. Stylometric arguments of this period were less rigorous than the modern statistical kind, but the finding was repeated by later analysts and is not lightly dismissed. It is one of the earliest formal arguments for the single-author construction of the Beale corpus.
Carl Hammer’s 1968 Sperry UNIVAC Pass
A different line of analysis was taken by Carl Hammer at Sperry UNIVAC in the late 1960s. Hammer ran the unsolved ciphers through the early mainframe statistical tools he had to hand and reported, in the April 1979 issue of Cryptologia, that the unsolved texts did not look like random number sequences in the way one would expect of pure noise. Hammer was a careful man and stopped short of concluding that they were therefore meaningful; he allowed only that they retained some kind of structure. Hammer’s reading is the strongest published case for taking the unsolved ciphers seriously as encryptions of something. Subsequent analysis has narrowed his finding rather than overturning it.
James Gillogly and the Alphabetical Anomaly
James Gillogly (b. 5 March 1946), a CIA cryptanalyst and later a senior researcher at RAND, took up the unsolved ciphers in the late 1970s and published his findings in Cryptologia in 1980. Gillogly’s experiment was simple and decisive. He applied the same Declaration-of-Independence keying that produces cipher number two to cipher number one, knowing that, by Ward’s account, this should produce gibberish. Instead, at positions 187 to 203 of the resulting sequence, he found the near-alphabetical string “abfdefghiijklmmnohpp.” The probability of such a sequence occurring by chance in a noise stream is astronomically small. The American Cryptogram Association calculated the chances at less than one in a hundred million million.
What the Gillogly Sequence Implies
Gillogly’s sequence is hard to explain on the hypothesis that cipher number one encrypts a real message under an unknown key. It is much easier to explain on the hypothesis that whoever drafted the cipher was using the Declaration as a working aid, occasionally pulling numbers from positions corresponding to consecutive alphabetical letters in the key text, and otherwise filling in by some other procedure that may have been close to random. In other words, cipher number one is constructed against the Declaration as well; it is just constructed dishonestly, with no underlying message, by an author who used the same key book and was content to let alphabetical artefacts leak through.
The Statistical Cryptanalysis That Followed
Subsequent statistical work, including Leonardo Campanelli’s “A Statistical Cryptanalysis of the Beale Ciphers” in Cryptologia volume 47 in 2023 and Richard Wassmer’s 2024 paper “Beale Cipher 1 and Cipher 3: Numbers With No Messages” in the IACR Cryptology ePrint Archive, has tightened the conclusion. The solved cipher number two has digit-frequency distributions across multiple bases that look like a genuine encryption of English. Ciphers one and three have digit-frequency distributions that look uniform in base ten and non-uniform in coprime bases, a signature of fabricated numbers chosen to mimic the look of cipher number two without encoding any underlying text. Wassmer’s specific finding is that the locations of certain numbers in ciphers one and three correlate with locations in the pamphlet’s English narrative, meaning that the unsolved ciphers may have been drafted by reference to the pamphlet itself.[4]
Joe Nickell’s Linguistic Analysis
Joe Nickell (1944-2025), the Skeptical Inquirer’s senior research fellow and longtime Investigative Files columnist, came at the case from a different direction in the early 1980s. Nickell trained as a folklorist and document analyst before he turned to skeptical investigation, and his approach to the Beale Papers ran on linguistic and stylistic grounds rather than statistical ones. The Skeptical Inquirer’s archive retains the body of his treatments and the obituary occasioned by his death.[5]
The Anachronism of “Stampeded”
Nickell’s most often-quoted finding concerns the language of the deciphered passages and the pamphlet’s narrative frame. The verb “to stampede,” used in the deciphered text in connection with buffalo on the plains, does not enter print in American English until the 1830s and is not current in the sense the cipher uses it before the 1840s. The verb “improvise,” in the sense the pamphlet uses, is similarly difficult to date earlier than 1820 in American English. Several other expressions in the pamphlet, including the construction “the appliances of art,” are characteristic of literary registers of the 1860s and 1870s rather than of the 1820s. None of these on its own settles the question; together they form a pattern.
The Morriss Hotel Discrepancy
A different anomaly is documentary rather than linguistic. The pamphlet has Robert Morriss running the Washington Hotel in Lynchburg in 1820 and receiving Beale’s iron box there in 1822. Lynchburg city directories and tax records of the period place Morriss at the Washington Hotel only from 1823 onward. The discrepancy is small and could in principle be the result of a faulty memory recorded sixty years after the fact, but it falls in the same direction as the linguistic anachronisms: the pamphlet’s particulars look like the work of someone reconstructing the Lynchburg of an earlier generation from a later vantage, with imperfect access to the relevant records.
The Freemasonry Frame
Nickell, drawing on Ward’s known affiliation with a Lynchburg Masonic lodge, suggested in 1982 that the pamphlet might function as a “secret vault” allegory of Freemasonic initiation, in which the seeker is led through degrees of effort toward a buried sanctum that may or may not exist. The reading is suggestive rather than demonstrative. Ward’s Masonic membership is documented; the allegorical framing of the pamphlet is plausible; whether allegory was its primary purpose is a question the surviving evidence cannot answer. What the reading does establish is that there is a coherent literary explanation for the pamphlet’s shape, sitting alongside the cryptographic explanation, that does not require a buried hoard in Bedford County to be true.
The Bedford County Searches
Whatever the documentary case, the treasure has been searched for in Bedford County, Virginia, since at least the late nineteenth century. Searchers have used surveying chains and modern ground-penetrating radar; they have dug at numerous locations within four miles of the site of Buford’s Tavern; they have damaged hillsides and outraged landowners; and they have not produced an authenticated piece of the cache described in cipher number two. Bedford County’s recent posture has been to discourage casual digging and to require the consent of the relevant landowner for any serious search. The cumulative geographical pattern is similar to that observed at other long-run treasure sites: a high density of small artefacts of unrelated periods, a number of decoy claims, and an absence of the headline find. The negative evidence does not formally close the question, but a century and a half of failure carries some weight.
The Asset Question
Even if cipher number two encodes a real burial, the metallic weights it specifies (about two thousand nine hundred pounds of gold and a little over five thousand pounds of silver in two consignments) would have required a sustained mining operation by thirty men in country to which they had little reason to travel and from which the recorded export of gold and silver in the relevant years is otherwise unattested. The historical mining of New Mexico and Colorado in 1818 and 1819 is well documented, and a Virginian party of thirty operating at the scale described would have left some trace in the surviving Spanish provincial records. None has been found.
The Predominant Scholarly Position
The state of scholarly opinion is best described in the language of the law: the predominant view, supported by the weight of cryptographic and linguistic evidence, is that ciphers number one and three are a hoax. The principal arguments, stacked in order of force, are these: the Friedman-Kullback finding that the prose of Ward and Beale is the work of a single hand; Gillogly’s discovery of the alphabetical sequence at positions 187 to 203 of cipher number one under the Declaration key; the modern statistical work that finds the digit distributions of ciphers one and three inconsistent with genuine encryption of English; and Nickell’s linguistic analysis of dating-sensitive vocabulary in the pamphlet and the deciphered text. Each on its own would be persuasive; together they constitute as close to a documentary verdict as the case is likely to support.
What the Position Does Not Settle
It does not settle the question of cipher number two’s relationship to the others. It is possible that cipher number two encodes a real burial known to its author and that ciphers one and three are decoys; it is possible that cipher number two is itself decorative and the entire pamphlet a literary or Masonic exercise. It does not settle the identity of the pamphlet’s author, who may have been Ward himself, Ward’s unnamed friend, or some third party whose name has not survived. And it does not, as a matter of strict evidentiary procedure, close the question of whether some part of cipher number one or three could be cracked under a key not yet tried. The cryptographic literature has been disciplined enough to leave that door open while pointing through the linguistic and statistical evidence at the more probable explanation behind it.
What Would Settle the Case
A clean break would require something the record has not yet produced: a Lynchburg parish or hotel record placing Robert Morriss at the Washington Hotel before 1823 and receiving an iron box in 1822; a Virginia or Spanish provincial record naming a Thomas Jefferson Beale and a party of thirty hunters in the country north of Santa Fe in 1818; an authenticated nineteenth-century cache recovered under modern archaeological protocols within four miles of the historic site of Buford’s Tavern; or, on the cryptographic side, the discovery of a key that decrypts cipher one or three into coherent English without producing alphabetical artefacts under cross-application. None has appeared. The legend, in the meantime, sits where most cipher-and-treasure legends sit, between a real cryptographic feat (the second cipher) and a literary tradition (the pamphlet and its frame) that grew comfortably around it.
Frequently Asked Questions
What are the Beale Papers?
The Beale Papers are an 1885 pamphlet, printed in Lynchburg, Virginia, by James B. Ward, presenting three numerical ciphers said to record a buried hoard of gold, silver, and jewels in Bedford County. The second of the three has been read using the United States Declaration of Independence as a key. The first and third have not.
Who was Thomas Jefferson Beale?
Thomas Jefferson Beale is the figure named in the pamphlet as the author of the ciphers and the leader of a thirty-man Virginia hunting party that allegedly mined gold and silver north of Santa Fe in 1818-1819 and buried it in Bedford County in November 1819 and December 1821. No documentary record outside the pamphlet has been found that places a person of that name in the relevant Virginia or Spanish provincial archives.
Who was James B. Ward?
James B. Ward was the Lynchburg agent who published the pamphlet in 1885. He claimed to have received the materials from an unnamed friend, who in turn had received them from Robert Morriss. Ward was a documented member of a Lynchburg Masonic lodge, a fact later cited by skeptical investigators in support of allegorical readings of the pamphlet.
How was cipher number two decoded?
Cipher number two was decoded using a numbered version of the United States Declaration of Independence as a key book. Each number in the cipher points to a word in the Declaration, and the first letter of that word is the plaintext character. A small number of corrections to the canonical word-count of the Declaration are required to produce a clean reading.
What does cipher number two say?
It states that a quantity of gold, silver, and jewels has been deposited in two consignments in November 1819 and December 1821 in an excavation about four miles from Buford’s Tavern, six feet below the surface, in Bedford County. It gives weights and the location of the inventory in cipher number three rather than naming the parties directly.
Why do scholars believe ciphers one and three are a hoax?
The principal arguments are the Friedman-Kullback stylometric finding that the prose of Ward and Beale appears to be the work of a single author; James Gillogly’s 1980 discovery of an alphabetical sequence under Declaration keying that should not appear in a genuine cipher; modern statistical work showing digit distributions inconsistent with real encryption of English; and Joe Nickell’s linguistic analysis of dating-sensitive words such as “stampeded” that postdate the alleged 1820s composition.
Who was William Friedman?
William Frederick Friedman (1891-1969) was the founding figure of American cryptanalysis, head of the research division of the US Army Signal Intelligence Service from the 1930s, and the principal architect of the analytical methods that became the National Security Agency’s. He used the Beale Papers as a training problem and considered them most likely a literary construction.
Who was James Gillogly?
James Gillogly (b. 1946) is an American computer scientist and cryptanalyst, formerly of the CIA and RAND, best known for the first public solution of parts one through three of the CIA’s Kryptos sculpture in 1999. His 1980 paper in Cryptologia identified the alphabetical sequence in cipher number one under Declaration keying that is widely regarded as the strongest single argument against the cipher’s authenticity.
Who was Joe Nickell?
Joe Nickell (1944-2025) was the Skeptical Inquirer’s senior research fellow and longtime Investigative Files columnist, a folklorist and document analyst by training. His 1982 stylometric and linguistic analysis of the Beale Papers, including the dating of words such as “stampeded” and “improvise,” is the standard non-cryptographic argument for the pamphlet as a hoax.
Have the Bedford County searches found anything?
A century and a half of digging in Bedford County, Virginia, has produced minor artefacts of unrelated periods and no authenticated piece of the cache described in cipher number two. The county’s current posture is to discourage casual digging and to require landowner consent for serious searches. The negative evidence does not formally close the case but carries cumulative weight.
Could the unsolved ciphers still be cracked?
As a matter of strict evidentiary procedure, the door is left open: a key not yet tried might in principle decrypt cipher number one or three. The cryptographic literature treats this possibility as remote, given the alphabetical artefacts under Declaration keying and the digit-frequency signatures of the unsolved texts, but it has not been formally closed. The predominant scholarly position is that the unsolved ciphers are a hoax; the predominant view is not the same as a proof.
What would settle the question?
A break in the case would require a Lynchburg parish or hotel record placing Robert Morriss at the Washington Hotel before 1823, a Virginia or Spanish provincial record naming Beale and his party in the country north of Santa Fe in 1818, an authenticated find within four miles of Buford’s Tavern under modern archaeological protocols, or a key that decrypts cipher one or three into coherent English without producing alphabetical artefacts. None has appeared.


