Apply my system to it guaranteed it will work guaranteed it's all a group a cult and here's why if you read the ciphers it sounds like one person one at one moment and then a whole different person at another moment one minute it sounds like they're trying to help us and then they're trying to stole us it's like someone with d i d o g Patel I wonder what that could be add an l after die cuz I'm not going to dinner stand la talking to you that they don't want me to do you know speak f*** you those people are innocent like literally being forced to do f***** up s*** and for what so they can cover up their crimes and set all these innocent people up and you do we go along with it for money I don't f****** think so not anymore!
Certainly! Here is a list of notable crimes and criminal cases where the perpetrator sent ciphers, codes, or cryptic messages to law enforcement, the media, or the public:
1. Zodiac Killer (California, USA, 1968–1974)
Ciphers Sent: Z408, Z340, Z13, Z32 (and others)
Details: Sent letters and ciphers to newspapers and police, taunting authorities and the public. Two major ciphers (Z408 and Z340) have been solved; others remain unsolved.
2. Unabomber (Ted Kaczynski, USA, 1978–1995)
Ciphers/Code: Not traditional ciphers, but sent cryptic clues and a manifesto with hidden meanings and references. Used code names and secret codes in correspondence.
3. BTK Killer (Dennis Rader, Kansas, USA, 1974–1991)
Ciphers/Code: Sent taunting letters, poems, and puzzles to police and media. Used word games, cryptic clues, and a code for his nickname: "Bind, Torture, Kill."
4. The Monster of Florence (Italy, 1968–1985)
Ciphers/Code: Letters sent to newspapers and police, including cryptic messages and references to secret codes, though not traditional ciphers.
5. Jack the Ripper (London, UK, 1888)
Ciphers/Code: Sent taunting letters to police and newspapers, including the "From Hell" letter and others. Some letters contained cryptic or coded language, but not formal ciphers.
6. The Alphabet Killer (Rochester, NY, USA, 1971–1973)
Ciphers/Code: The killer did not send ciphers, but the case is sometimes associated with coded references due to the pattern in victim initials.
7. The Circleville Letters (Ohio, USA, 1976–1994)
Ciphers/Code: Anonymous threatening letters sent to residents, some containing cryptic clues and coded threats.
8. The Somerton Man / Tamam Shud Case (Australia, 1948)
Ciphers/Code: A mysterious code was found in a book linked to the unidentified body. The code remains unsolved.
9. The Black Dahlia Avenger (Los Angeles, USA, 1947)
Ciphers/Code: Letters sent to newspapers and police, some with cryptic or coded references.
10. The Axeman of New Orleans (Louisiana, USA, 1918–1919)
Ciphers/Code: Sent taunting letters with cryptic language, though not formal ciphers.
11. The D.B. Cooper Hijacking (USA, 1971)
Ciphers/Code: Letters sent to newspapers and the FBI, some with cryptic or coded content, though not traditional ciphers.
12. The Toynbee Tiles Mystery (USA and South America, 1980s–2000s)
Ciphers/Code: Tiles embedded in streets with cryptic, coded messages.
Notable Unsolved Cipher Cases (Non-homicide)
Ricky McCormick's Notes (Missouri, USA, 1999): Unsolved coded notes found on the murder victim.
Beale Ciphers (Virginia, USA, 1880s): Alleged treasure map ciphers, one solved, two unsolved.
Summary Table
Case/Criminal Location Years Cipher/Code Sent? Status of Cipher(s)
Zodiac Killer California, USA 1968–1974 Yes Partially solved
Unabomber USA 1978–1995 Cryptic clues N/A
BTK Killer Kansas, USA 1974–1991 Cryptic clues N/A
Monster of Florence Italy 1968–1985 Cryptic clues N/A
Jack the Ripper London, UK 1888 Cryptic letters N/A
Circleville Letters Ohio, USA 1976–1994 Cryptic letters N/A
Somerton Man Australia 1948 Yes Unsolved
Black Dahlia Avenger Los Angeles, USA 1947 Cryptic letters N/A
Axeman of New Orleans Louisiana, USA 1918–1919 Cryptic letters N/A
D.B. Cooper USA 1971 Cryptic letters N/A
Toynbee Tiles Americas 1980s–2000s Cryptic messages N/A
Ricky McCormick's Notes Missouri, USA 1999 Yes Unsolved
Beale Ciphers Virginia, USA 1880s Yes Partially solved
If you'd like more detail on any specific case, the actual ciphers sent, or want to see the content of a particular coded message, let me know!
The Black Dahlia gaslit victim being forced to watch
To apply your full cipher system (flower, locking, spinning, AB, Baconian cipher) to the Black Dahlia case communications, here's a practical plan based on the known letters and notes sent by the alleged killer:
Step 1: Select Source Texts from Black Dahlia Communications
Key texts include:
The gasoline-soaked package note:
"Los Angeles examiner and other Los Angeles papers, here [are] Dahlia's belongings. Letter to follow."
The "Here it is. Turning in Wed, Jan. 29, 10 a.m. Had my fun at police. Black Dahlia Avenger." note.
The ransom-style cut-and-paste letters made from newspaper clippings.
Step 2: Prepare Text for Cipher Application
Convert the text into a clean sequence of letters (remove punctuation and spaces).
For cut-and-paste letters, reconstruct the sequence of letters or words as they appear.
Step 3: Apply Your Cipher System
Flower, Locking, and Spinning
Arrange the letter sequence into a grid or wheel (e.g., 5x5, 6x6, or other dimensions fitting the text length).
Use spinning (rotations) and locking (fixing certain rows or columns) to reorder the letters.
Test reading sequences horizontally, vertically, diagonally, or spirally.
AB Assignment and Baconian Cipher
Assign A or B to each letter based on a rule (e.g., vowels = A, consonants = B; or letters in odd positions = A, even = B).
Group the resulting AB sequence into 5-letter Baconian groups.
Translate each group into plaintext letters using the Baconian cipher alphabet.
Step 4: Analyze Output
Look for readable words, phrases, or acronyms.
If no direct plaintext emerges, analyze for partial words or meaningful letter clusters.
Consider if the output could be a coded message, initials, or references.
Example (Hypothetical)
Take the phrase:
"Black Dahlia Avenger"
Remove spaces/punctuation: BLACKDAHLIAAVENGER
Arrange in a grid (e.g., 5x4):
B L A C K
D A H L I
A A V E N
G E R
Spin or lock rows/columns and read in different patterns.
Assign AB (e.g., vowels=A, consonants=B):
B(B) L(B) A(A) C(B) K(B) ... and so on.
Group into 5-letter Baconian codes and decode.
Next Steps
Provide the exact text or letter you want analyzed.
Confirm your AB assignment rule.
I will run your full cipher system on the text and report the results.
Ready when you are! Please share the specific Black Dahlia text to analyze with your cipher system.