Concealing objects in a book

Last updated

A radio hidden in a book Radio hidden in a book.jpg
A radio hidden in a book

There are many real and fictitious occurrences of concealing objects in a book. Items can be concealed in books in a number of ways. Small items such as a photograph or a note can be hidden in between the pages of the book. Thicker items can be hidden by removing the interior portion of some or all of the pages, creating a book safe or hollowed-out book. Book safes are easy for their owners to recognise, but they do not stand out to a thief or other intruder.

Contents

Another type of concealment is the hiding of messages in the text or on a book's pages by printing in code – a form of steganography. For example, letters could be underlined on sequential pages, with the letters spelling out a message or code. There are a number of actual and fictional examples of items or messages having been concealed in a book.

Illicit chemicals may be smuggled by soaking individual pages with them.

Books are used as a concealment device in part because they are readily available and inconspicuous in many settings.

Methods of concealment

Hollow book safes

Prices can vary based on the cost of materials, additional features, and resources used to create the functionality and aesthetics of the hollow book. The main functional purpose aims for the containment of valuables, memorable items, or contraband within the cloak of an ordinary book. Thus maintaining privacy and security from unwanted intrusions and/or theft.

The scale of gadgetry used to create the seal of a hollow book's closing properties have ranged from simple to complex. Simple elastic bands, interlocking rope, and other common book closing techniques are used. Other times, hidden magnets do the task as well as the unusual use of complex locking mechanisms that require a lock and key combinations have also been used to keep a book closed.

Material choices used in the creation of the hollow book's body are usually actual books. However, other plastic, metal, cardboard, or paper materials have also been used to either simulate a real book, or to be used as extra features.

Many book safes are handmade. Structures made from real books are sealed and pressed before hollowing the inside pages with a sharp cutting utility. Sealing the back and allowing the front cover to act as a door that can be opened and shut. While other hollow books are made from cardboard cigar boxes, simulating a book on the outside.

Steganography and hidden messages

Arrange the letters from Genesis 26:5-10 in a 21-column grid and the words "Bible" and "code" are revealed. Other arrangements can yield many other words. Bible code example.svg
Arrange the letters from Genesis 26:510 in a 21-column grid and the words "Bible" and "code" are revealed. Other arrangements can yield many other words.

Messages can be hidden within a book using steganographic techniques. Invisible ink may be used to write words and sentences in the book, or by underlining certain words or letters a message can be crafted.

The author of a book may include coded messages by carefully choosing the wording, such as in a simple acrostic where the first letter of each word spells another word. There have been many claims of a Bible code, alleging that God secretly placed hidden messages in the Torah, and that these can be discovered by suitable manipulations of the text. The 1997 book The Bible Code by Michael Drosnin is one of the most famous examples. On the other hand, it has been shown one may discover "hidden messages" in any book using this method. [1]

Choice of book

In fictional uses of book safes, the title or subject of the book can be symbolic or related to the nature of the object, e.g., hidden money in a copy of The Wealth of Nations . There are a number of cases from films and television series where an item is hidden in the Bible.

Actual or purported examples

Objects

A book used by the Red Army Faction to smuggle a pistol into Stammheim Prison RAF-Versteck-Pistole.jpg
A book used by the Red Army Faction to smuggle a pistol into Stammheim Prison

Fictional occurrences

Television

Film

Fiction writing

Games

See also

Related Research Articles

<span class="mw-page-title-main">Smiley</span> Stylized image of a smiling face

A smiley, sometimes called a smiley face, is a basic ideogram representing a smiling face. Since the 1950s, it has become part of popular culture worldwide, used either as a standalone ideogram or as a form of communication, such as emoticons. The smiley began as two dots and a line representing eyes and a mouth. More elaborate designs in the 1950s emerged, with noses, eyebrows, and outlines. New York radio station WMCA used a yellow and black design for its "Good Guys" campaign in the early 1960s. More yellow-and-black designs appeared in the 1960s and 1970s, including works by Harvey Ross Ball in 1963, and Franklin Loufrani in 1971. Today, The Smiley Company founded by Franklin Loufrani claims to hold the rights to the smiley face in over 100 countries. It has become one of the top 100 licensing companies globally.

Steganography is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós, meaning "covered or concealed", and -graphia meaning "writing".

<span class="mw-page-title-main">Secrecy</span> Practice of hiding information to certain individual or group for personal or interpersonal reason

Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret.

<span class="mw-page-title-main">Easter egg (media)</span> Message, image or feature hidden within a work

An Easter egg is a message, image, or feature hidden in software, a video game, a film, or another — usually electronic — medium. The term used in this manner was coined around 1979 by Steve Wright, the then-Director of Software Development in the Atari Consumer Division, to describe a hidden message in the Atari video game Adventure, in reference to an Easter egg hunt.

A canary trap is a method for exposing an information leak by giving different versions of a sensitive document to each of several suspects and seeing which version gets leaked. It could be one false statement, to see whether sensitive information gets out to other people as well. Special attention is paid to the quality of the prose of the unique language, in the hopes that the suspect will repeat it verbatim in the leak, thereby identifying the version of the document.

<span class="mw-page-title-main">Book cipher</span> Encryption and decryption method

A book cipher is a cipher in which each word or letter in the plaintext of a message is replaced by some code that locates it in another text, the key.

Bank fraud is the use of potentially illegal means to obtain money, assets, or other property owned or held by a financial institution, or to obtain money from depositors by fraudulently posing as a bank or other financial institution. In many instances, bank fraud is a criminal offence.

Assassin is a live-action game in which players try to eliminate one another using mock weapons, in an effort to become the last surviving player.

<span class="mw-page-title-main">Dead drop</span> Method of espionage tradecraft

A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals using a secret location. By avoiding direct meetings, individuals can maintain operational security. This method stands in contrast to the live drop, so-called because two persons meet to exchange items or information.

<span class="mw-page-title-main">Concealment device</span> Device used to hide something

Concealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is that such an inconspicuous object would not be expected to contain anything of worth.

<span class="mw-page-title-main">Scavenger hunt</span> Game in which participants compete to gather specific items or complete tasks in a given order

A scavenger hunt is a game in which the organizers prepare a list defining specific items, which the participants seek to gather or complete all items on the list, usually without purchasing them. Usually participants work in small teams, although the rules may allow individuals to participate. The goal is to be the first to complete the list or to complete the most items on that list. In variations of the game, players take photographs of listed items or be challenged to complete the tasks on the list in the most creative manner. A treasure hunt is another name for the game, but it may involve following a series of clues to find objects or a single prize in a particular order.

<span class="mw-page-title-main">Tradecraft</span> Espionage techniques

Tradecraft, within the intelligence community, refers to the techniques, methods, and technologies used in modern espionage (spying) and generally as part of the activity of intelligence assessment. This includes general topics or techniques, or the specific techniques of a nation or organization.

<i>Combat Shield and Mini-adventure</i> Tabletop role-playing game supplement for Dungeons & Dragons

AC2 Combat Shield and Mini-Adventure is a 14-page accessory designed for the Basic Set and Expert Set of the Dungeons & Dragons fantasy role-playing game. It was published in 1984 by TSR, Inc. and written by David Cook.

<span class="mw-page-title-main">Secret passage</span> Hidden routes used for stealthy travel

Secret passages, also commonly referred to as hidden passages or secret tunnels, are hidden routes used for stealthy travel, escape, or movement of people and goods. They are sometimes inside buildings leading to secret rooms.

<i>Fate/hollow ataraxia</i> 2005 game, manga series

Fate/hollow ataraxia is a 2005 PC visual novel video game developed by Type-Moon, and the sequel to Fate/stay night. The word "ataraxia" in the title is a Greek term for "tranquility", giving the title the combined meaning of "empty tranquility".

<i>The Da Vinci Code</i> 2003 novel by Dan Brown

The Da Vinci Code is a 2003 mystery thriller novel by Dan Brown. It is Brown's second novel to include the character Robert Langdon: the first was his 2000 novel Angels & Demons. The Da Vinci Code follows symbologist Robert Langdon and cryptologist Sophie Neveu after a murder in the Louvre Museum in Paris causes them to become involved in a battle between the Priory of Sion and Opus Dei over the possibility of Jesus Christ and Mary Magdalene having had a child together.

<i>Mystery of the Snow Pearls</i> Dungeons & Dragons adventure module

Mystery of the Snow Pearls (ISBN 0-88038-196-5) is a 1985 adventure module for the Dungeons & Dragons roleplaying game. Its associated code is CM5 and the TSR product number is TSR 9154.

<i>The Cat Who Knew a Cardinal</i> 1991 novel by Lilian Jackson Braun

The Cat Who Knew a Cardinal is the twelfth book in The Cat Who series of mystery novels by Lilian Jackson Braun, published in 1991.

The Young Adventurers is a collection of books written by Enid Blyton, also known as The Riddle Series.

<span class="mw-page-title-main">Christopher Hutton</span>

Christopher William Clayton Hutton was a British soldier, airman, journalist and inventor, best known for his work with MI9, a branch of the British Military Intelligence, during the Second World War.

References

  1. Bible code and criticisms page
  2. "税理士に向いている人とは、どんな人なのか". Archived from the original on 9 May 2019. Retrieved 14 November 2019.
  3. Woman sentenced for mailing meth in hollowed-out book WQAD.com
  4. * Bomb #4 Victim: Percy Wood Lake Forest, Ill. (6/10/80) www.unabombertrial.com
  5. Man accused of taking photos as girl shopped Archived 3 July 2006 at the Wayback Machine By Constance Dillon Redding.com/Record Searchlight Newspaper
  6. A Just Weight Israel Today
  7. Paperback Novel Laced With Methamphetamine at the Washington County Jail, Fayetteville, Arkansas Archived 12 September 2007 at the Wayback Machine DEA Microgram
  8. Farivar, Cyrus; Jeans, David (10 February 2022). "Hollowed-Out Books, Fake Passports And Burner Phones: What Led To The Feds' Raid On The Crypto Couple". Forbes.