by Lauren Child
“Oh, brother!” cursed Ruby.
She called Clancy, but he said he couldn’t make it; his dad was expecting his family to be all present and correct at some ambassadorial party. Del was at a basketball game, Mouse was with her cousins, Red had twisted her ankle and couldn’t even hobble, and Elliot was not answering the phone. She called down to Hitch, but his reply came back, “You’re on your own, kid.”
Oh well, how hard can babysitting a baby be? thought Ruby.
She switched on the TV and Archie smiled. He waved his arms as the theme tune to Crazy Cops played. No sweat, thought Ruby.
Detective Despo walked into the frame and Archie started to howl.
Ruby ignored him.
Detective Despo was running down an alley pursuing a suspect.
Archie howled like he was fit to burst.
Detective Despo froze, the muzzle of a gun pressed to the back of his head.
Archie puked.
Turned out babysitting a baby was hard.
The green light on the rescue watch flashed and bleeped. Archie howled louder.
Ruby pressed the receive button on the watch.
“Redfort?” came a gravelly voice.
It was LB.
LB: What are you doing, strangling a cat?
RUBY: Babysitting.
LB: I didn’t peg you as the mushy type.
RUBY: I’m not, believe me.
LB: So we need you to come in for a debriefing.
RUBY: I know but I’m a little tied up with this babysitting deal right now.
LB: What, now you’re suddenly a Girl Scout?
RUBY: What do you suggest I do, dump the baby?
LB: Improvise, isn’t that what Girl Scouts are good at?
RUBY: I wouldn’t know. I never joined.
LB: Shame, so what exactly do you know?
RUBY: The Count is working for someone else. He wasn’t only after the rubies, he was there for something else.
LB: How do you know?
RUBY: The Count said, “Tell LB the truth is safe with me.”
LB: He said that to you?
Ruby paused: she was going to have to tell a lie, a white lie, because of course the Count had told Clancy, not her, and this was not a time for telling the truth.
“Yes,” she said.
LB was quiet for a moment, and then she seemed to register Archie’s howling and said, “Redfort, put that baby on the phone.”
Ruby held the receiver to Archie’s ear, and in a matter of seconds the baby stopped howling and peace was restored to the Redfort home.
Ruby took the phone. “What did you say to him?”
“Something I learned in Girl Scouts,” said LB. “Too bad you never joined.”
*CLICK HERE TO RETURN TO THE BOOK
www.rubyredfort.com/music
This is how Ruby cracks the code:
She first decides to ignore the synthetic music in the background, which she assumes is designed as a distraction, and to concentrate on the melodic fragments laid over it.
She starts with the principle that each note in the strange music must represent a letter.
But the question is, what notation was used to create the music? Even though Ruby thinks it’s unlikely, she starts by trying the Northern European note naming convention of A, B, C, D, E, F, G, H (where H is actually B and B is actually B flat). But this doesn’t get her anywhere. Nor does the twelve-tone system, or any of the other scale systems, such as Japanese, Indian, or Arabic (though since the Chime Melody music is very definitely in equal temperament she realizes this is a long shot).
Once those more esoteric options are ruled out, Ruby tries the English and American system of seven notes — A, B, C, D, E, F, G — and finally starts to get somewhere.
The first thing she realizes is that there are no flats or sharps used in the melody: there are only the seven plain notes: A, B, C, D, E, F, and G. This means that the person setting the code had to come up with a way to use only seven notes to represent all twenty-six letters of the alphabet.
Eventually she realizes that the way they have done this is to apply effects to the notes that tell the decoder to shift the letters forward. She notes down all sorts of details that she notices — crescendos, articulations, speed changes — but works out that these are all red herrings. What DOES turn out to be important is the glissando that she can hear.
She quickly discovers that if a note is played with an upward glissando, it shifts the corresponding letter forward by seven places. Thus the musical note A, played with an upward glissando, becomes the letter H instead of A, and the musical note G, with an upward glissando, becomes the letter N.
Similarly, a downward glissando shifts the corresponding letter forward by fourteen places. The musical note A, played with a downward glissando, becomes the letter O.
Finally, the letters V to Z are represented by the notes A to D, played with a tremolo (though these letters don’t appear in the example code).
The best way to understand this is to look at this table:
CLICK HERE TO RETURN TO THE BOOK
One of the most common codes used across the planet is binary, or digital, code. It is not a secret code, but is a powerful way to store and communicate information. Pictures, music, movies, the sound of a voice, in fact everything that is sent across the Internet is changed into a stream of zeros and ones.
Take a black-and-white picture. To see how to change the picture into zeros and ones, first you need to pixelate the picture. You draw a square grid over the picture, then you color a square black if the majority of the image in the square is black, and color the square white if it’s mostly white. Each colored square is called a pixel. The combination of the pixels produces a rough version of the picture. The finer the square grid, the better the representation of the picture. The pixelated picture can then be changed into code. The black squares are represented by zeros and the white squares by ones. Then 001110101000 . . . is code for: color the first two pixels in the grid black, the next three white, then black, and so on.
More complicated versions of this process can change a color picture, a movie, music, or even a voice into zeros and ones.
Now, if you want to make a picture or a message secret, there is a clever way to hide the message if it is made up of zeros and ones. You can take a pixelated black-and-white picture and pull it apart into two separate black-and-white pictures in such a way that the two separate images look like a random mess. But when you print them on transparent sheets and put one on top of the other, the original picture appears as if by magic.
To change the picture into the two random images: first, take the square grid for the original picture and divide each square into four smaller squares. In the encrypted pictures, these two-by-two squares have two squares colored white and two squares colored black. If you check, there are six different ways you can color a two-by-two grid where half the squares are white and the other half are black.
The first encrypted picture just consists of a genuinely random selection of these two-by-two black-and-white blocks. To create the second encrypted picture, you need to look at the original picture. Place the random picture over the top. Take each two-by-two block in the random picture you’ve created. If that block sits over a white square in the original image, then the two-by-two block in the same position in the second encrypted picture is chosen to be the same two-by-two block. If it’s over a black square, then make the corresponding two-by-two block in the second encrypted picture the opposite of the one in the random picture (where black and white squares are swapped over).
The second encrypted picture you’ve created looks as random as the first. But now when you place the two pictures on top of each other something magic happens. The original picture seems to appear out of the combination of the two random images.
The combination of a two-by-two grid in the first random picture with the opposite two-by-two grid in the second picture creates one big black pixel. If the two-by-
two grids are the same, then although the combination doesn’t create a completely white pixel, nevertheless it is white enough that looking at the combined picture, your eyes see the same combination of black and white pixels that made up the unencrypted picture.
In the book, Ruby encounters a similar code using sound when the three static tapes combine to form the sound of a voice. This code would have been built using pictures too, in a very similar way to what has just been described. This is how the Count’s static code was created:
If, instead of a picture, you take a recording of a voice, you can translate that using binary code into a sequence of zeros and ones. Then translate that into a black-and-white picture. Then apply the same process as above to pull it apart into two random pictures consisting of black-and-white pixels. Translate these two random pictures back into zeros and ones. If you now translate this into sound again, the two messages sound like random static noise. But play them together and, like the two pictures combining, you will hear a message appearing from the static.
Clancy and Ruby stumbled on a version of this code. The secret message had been pulled apart into three random static tracks that sounded like white noise, but which, when combined, revealed a message to Count von Viscount that led Ruby and Clancy to the rubies.
To create your own visual code try this website:
www.leemon.com/crypto/VisualCrypto.html
Marcus du Sautoy
ARVO PÄRT, BORN IN 1935 IN ESTONIA, is a real and much-celebrated classical composer, predominantly of sacred music. He is known for working in a minimalist generative style, using his mathematically-based compositional technique, tintinnabuli.
In addition, Pärt has been known to encode messages into his music, as Ruby knows very well. In his Cantus in Memoriam Benjamin Britten, for example, the word BACH (simply rendered by the notes B, A, C, and H) is played as a repeated motif by the string orchestra as a hidden tribute to the composer Johann Sebastian Bach.
Thank you to Rachel Folder; without her I would have been in quite a muddle. She did very well to untangle a tangled plot and generally push me into picking up my pen when I didn’t feel like it. To Thomas Gardner for composing (and explaining) the Chime Melody code on very, very short notice. To Marcus du Sautoy for inspired code ideas and general brilliance. To David Mackintosh for exquisite design. Thank you to A. D. for inspiration. To Lucy Mackay for pointing out flaws in the nicest possible way. To Lucy Vanderbilt for being authentically American and helping make Ruby appear that way. To my editor Nick Lake for being calm as well as clever. Last, huge thanks to my publisher Ann-Janine Murtagh for, as usual, being wise, supportive, and a pleasure to work with.
www.candlewick.com
This is a work of fiction. Names, characters, places, and incidents are either products of the author’s imagination or, if real, are used fictitiously.
Copyright © 2012 by Lauren Child
Series design by David Mackintosh
All rights reserved. No part of this book may be reproduced, transmitted, or stored in an information retrieval system in any form or by any means, graphic, electronic, or mechanical, including photocopying, taping, and recording, without prior written permission from the publisher.
First published in Great Britain by HarperCollins Children’s Books, a division of HarperCollinsPublishers Ltd
First U.S. electronic edition 2013
Library of Congress Catalog Card Number 2012955155
ISBN 978-0-7636-5468-9 (hardcover)
ISBN 978-0-7636-6357-5 (electronic)
Candlewick Press
99 Dover Street
Somerville, Massachusetts 02144
visit us at www.candlewick.com