This article needs additional citations for verification .(May 2024) |
There are many real and fictitious occurrences of concealing objects in a book. Items can be concealed in books in a number of ways. Small items such as a photograph or a note can be hidden in between the pages of the book. Thicker items can be hidden by removing the interior portion of some or all of the pages, creating a book safe or hollowed-out book. Book safes are easy for their owners to recognise, but they do not stand out to a thief or other intruder.
Another type of concealment is the hiding of messages in the text or on a book's pages by printing in code – a form of steganography. For example, letters could be underlined on sequential pages, with the letters spelling out a message or code. There are a number of actual and fictional examples of items or messages having been concealed in a book.
Illicit chemicals may be smuggled by soaking individual pages with them.
Books are used as a concealment device in part because they are readily available and inconspicuous in many settings.
Prices can vary based on the cost of materials, additional features, and resources used to create the functionality and aesthetics of the hollow book. The main functional purpose aims for the containment of valuables, memorable items, or contraband within the cloak of an ordinary book. Thus maintaining privacy and security from unwanted intrusions and/or theft.
The scale of gadgetry used to create the seal of a hollow book's closing properties have ranged from simple to complex. Simple elastic bands, interlocking rope, and other common book closing techniques are used. Other times, hidden magnets do the task as well as the unusual use of complex locking mechanisms that require a lock and key combinations have also been used to keep a book closed.
Material choices used in the creation of the hollow book's body are usually actual books. However, other plastic, metal, cardboard, or paper materials have also been used to either simulate a real book, or to be used as extra features.
Many book safes are handmade. Structures made from real books are sealed and pressed before hollowing the inside pages with a sharp cutting utility. Sealing the back and allowing the front cover to act as a door that can be opened and shut. While other hollow books are made from cardboard cigar boxes, simulating a book on the outside.
Messages can be hidden within a book using steganographic techniques. Invisible ink may be used to write words and sentences in the book, or by underlining certain words or letters a message can be crafted.
The author of a book may include coded messages by carefully choosing the wording, such as in a simple acrostic where the first letter of each word spells another word. There have been many claims of a Bible code, alleging that God secretly placed hidden messages in the Torah, and that these can be discovered by suitable manipulations of the text. The 1997 book The Bible Code by Michael Drosnin is one of the most famous examples. On the other hand, it has been shown one may discover "hidden messages" in any book using this method. [1]
In fictional uses of book safes, the title or subject of the book can be symbolic or related to the nature of the object, e.g., hidden money in a copy of The Wealth of Nations . There are a number of cases from films and television series where an item is hidden in the Bible.
A smiley, sometimes called a smiley face, is a basic ideogram representing a smiling face. Since the 1950s, it has become part of popular culture worldwide, used either as a standalone ideogram or as a form of communication, such as emoticons. The smiley began as two dots and a line representing eyes and a mouth. More elaborate designs in the 1950s emerged, with noses, eyebrows, and outlines. New York radio station WMCA used a yellow and black design for its "Good Guys" campaign in the early 1960s. More yellow-and-black designs appeared in the 1960s and 1970s, including works by Harvey Ross Ball in 1963, and Franklin Loufrani in 1971. Today, The Smiley Company founded by Franklin Loufrani claims to hold the rights to the smiley face in over 100 countries. It has become one of the top 100 licensing companies globally.
Steganography is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós, meaning "covered or concealed", and -graphia meaning "writing".
Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret.
An Easter egg is a message, image, or feature hidden in software, a video game, a film, or another — usually electronic — medium. The term used in this manner was coined around 1979 by Steve Wright, the then-Director of Software Development in the Atari Consumer Division, to describe a hidden message in the Atari video game Adventure, in reference to an Easter egg hunt.
A canary trap is a method for exposing an information leak by giving different versions of a sensitive document to each of several suspects and seeing which version gets leaked. It could be one false statement, to see whether sensitive information gets out to other people as well. Special attention is paid to the quality of the prose of the unique language, in the hopes that the suspect will repeat it verbatim in the leak, thereby identifying the version of the document.
A book cipher is a cipher in which each word or letter in the plaintext of a message is replaced by some code that locates it in another text, the key.
Bank fraud is the use of potentially illegal means to obtain money, assets, or other property owned or held by a financial institution, or to obtain money from depositors by fraudulently posing as a bank or other financial institution. In many instances, bank fraud is a criminal offence.
Assassin is a live-action game in which players try to eliminate one another using mock weapons, in an effort to become the last surviving player.
A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals using a secret location. By avoiding direct meetings, individuals can maintain operational security. This method stands in contrast to the live drop, so-called because two persons meet to exchange items or information.
Concealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is that such an inconspicuous object would not be expected to contain anything of worth.
A scavenger hunt is a game in which the organizers prepare a list defining specific items, which the participants seek to gather or complete all items on the list, usually without purchasing them. Usually participants work in small teams, although the rules may allow individuals to participate. The goal is to be the first to complete the list or to complete the most items on that list. In variations of the game, players take photographs of listed items or be challenged to complete the tasks on the list in the most creative manner. A treasure hunt is another name for the game, but it may involve following a series of clues to find objects or a single prize in a particular order.
Tradecraft, within the intelligence community, refers to the techniques, methods, and technologies used in modern espionage (spying) and generally as part of the activity of intelligence assessment. This includes general topics or techniques, or the specific techniques of a nation or organization.
AC2 Combat Shield and Mini-Adventure is a 14-page accessory designed for the Basic Set and Expert Set of the Dungeons & Dragons fantasy role-playing game. It was published in 1984 by TSR, Inc. and written by David Cook.
Secret passages, also commonly referred to as hidden passages or secret tunnels, are hidden routes used for stealthy travel, escape, or movement of people and goods. They are sometimes inside buildings leading to secret rooms.
Fate/hollow ataraxia is a 2005 PC visual novel video game developed by Type-Moon, and the sequel to Fate/stay night. The word "ataraxia" in the title is a Greek term for "tranquility", giving the title the combined meaning of "empty tranquility".
The Da Vinci Code is a 2003 mystery thriller novel by Dan Brown. It is Brown's second novel to include the character Robert Langdon: the first was his 2000 novel Angels & Demons. The Da Vinci Code follows symbologist Robert Langdon and cryptologist Sophie Neveu after a murder in the Louvre Museum in Paris causes them to become involved in a battle between the Priory of Sion and Opus Dei over the possibility of Jesus Christ and Mary Magdalene having had a child together.
Mystery of the Snow Pearls (ISBN 0-88038-196-5) is a 1985 adventure module for the Dungeons & Dragons roleplaying game. Its associated code is CM5 and the TSR product number is TSR 9154.
The Cat Who Knew a Cardinal is the twelfth book in The Cat Who series of mystery novels by Lilian Jackson Braun, published in 1991.
The Young Adventurers is a collection of books written by Enid Blyton, also known as The Riddle Series.
Christopher William Clayton Hutton was a British soldier, airman, journalist and inventor, best known for his work with MI9, a branch of the British Military Intelligence, during the Second World War.