Page 123 of The Last Kingdom
Chapter 70
COTTON REACHED INTO THE SCRIVENER’S BOX AND REMOVED THEobject, which consisted of two concentric brass disks, each with the twenty-six letters of the Latin alphabet engraved clockwise on their face. The outer disk was a little over two inches wide, the inner just over an inch and a half. The two shared a common center post, which allowed both disks to rotate. The smaller disk carried an additional engraving of “CSA” and “S.S.”
He knew what that represented.
Confederate States of America.
The “S.S.”?
Secret Service.
“It’s a cipher wheel, used by the Confederacy during the Civil War,” he said.
Koger seemed impressed. “You sound like you know all about it.”
“I do. My great-great-grandfather, on my mother’s side, was a Confederate spy. A man named Angus Adams.”
Cotton had seen several grainy, black-and-white photographs of Adams, who’d been short and slender with a bushy head of light hair and a thick mustache common for the time. Most remarkable was the resemblance Angus bore to him, there in the chin, eyes, nose, and mouth.
“As a spy, Adams led the first covert incursion into Pennsylvania with twenty other Confederates, posing as a Union unit in search of deserters. He obtained intelligence on troop movements, which Lee used in his march toward Gettysburg. He was then sent to Indiana to stir up insurrection, as a way to entice that state to join the Confederacy.”
“Sounds like a resourceful individual,” Fenn said.
“He was. And he almost succeeded in Indiana, but was captured and imprisoned in Ohio.”
What happened after that evolved into legend. Supposedly, while in jail, Adams was readingLes Misérablesand became inspired by Jean Valjean’s escapes through the Paris underground. He then noticed how dry the lower prison cells were, with no mold, though they remained in perpetual darkness. That might indicate a constant source of fresh air. Sure enough, he dug down and found a masonry-lined tunnel, probably used for drainage. Adams and five others eventually made their escape through it, and he left a note for the warden.
“In French.La patience est amere, mais son fruit est doux.Patience is bitter, but its fruit is sweet.”
The warden had not appreciated having his face rubbed in the insult of an escape, so a massive manhunt ensued. Adams fled south, heading for Kentucky. Near the Ohio River Union troops cornered him in a small border town. He found refuge inside a farmhouse where the owner lay ill with delirium. Escape was impossible, so he hid himself inside the mattress upon which the sick man lay. When soldiers inspected the house, they checked to see if Adams was the man in the bed, but never thought to look beneath the man, inside the mattress.
“He snuck out the following day,” Cotton said. “When he made his report to his superiors one of them made a comment that Adams was apparently soft as cotton, since no one, not even the sick soul in the bed, had known he was there. And the name stuck. Cotton Adams.”
Koger pointed. “And this disk?”
“There’s one in a trunk at my grandfather’s farm in Georgia. There are only five others known in the world.”
“Now there is a sixth,” Fenn noted.
“Which really means nothing. Reproductions are all over the internet for sale. The question is, what is an original doing here?” He turned the brass disk over. On his grandfather’s were the words “F. Labarre, Richmond VA,” for Francis Labarre, a goldsmith in Richmond, Virginia, who’d made all of the cipher disks. This one was engraved differently.
FOR KING LUDWIG II
IN HONOR OF HIS CORONATION.
1864 J.D.
“Ludwig was crowned in 1864,” Fenn said. “What does the J. D. represent?”
“Jefferson Davis,” Koger said. “What else could it be?”
He agreed. “This seems to be a gift from the Confederate president to the newly crowned king of Bavaria. If I had to speculate, I would say Confederate envoys were looking for European allies. So they curried favor with a new young king. Thankfully, they found precious little help anywhere for their cause.”
“What is it doing here?” the curator asked. “Hidden away.”
An excellent question. “The Confederacy used them to encrypt messages during the Civil War. Their use was damn effective, the codes nearly impossible to crack. So good they were used during the Spanish-American War and World War I.”
“Ludwig was fascinated by codes,” the curator said. “All his life he dealt with them. He loved sending secret messages.”
Table of Contents
- Page 1
- Page 2
- Page 3
- Page 4
- Page 5
- Page 6
- Page 7
- Page 8
- Page 9
- Page 10
- Page 11
- Page 12
- Page 13
- Page 14
- Page 15
- Page 16
- Page 17
- Page 18
- Page 19
- Page 20
- Page 21
- Page 22
- Page 23
- Page 24
- Page 25
- Page 26
- Page 27
- Page 28
- Page 29
- Page 30
- Page 31
- Page 32
- Page 33
- Page 34
- Page 35
- Page 36
- Page 37
- Page 38
- Page 39
- Page 40
- Page 41
- Page 42
- Page 43
- Page 44
- Page 45
- Page 46
- Page 47
- Page 48
- Page 49
- Page 50
- Page 51
- Page 52
- Page 53
- Page 54
- Page 55
- Page 56
- Page 57
- Page 58
- Page 59
- Page 60
- Page 61
- Page 62
- Page 63
- Page 64
- Page 65
- Page 66
- Page 67
- Page 68
- Page 69
- Page 70
- Page 71
- Page 72
- Page 73
- Page 74
- Page 75
- Page 76
- Page 77
- Page 78
- Page 79
- Page 80
- Page 81
- Page 82
- Page 83
- Page 84
- Page 85
- Page 86
- Page 87
- Page 88
- Page 89
- Page 90
- Page 91
- Page 92
- Page 93
- Page 94
- Page 95
- Page 96
- Page 97
- Page 98
- Page 99
- Page 100
- Page 101
- Page 102
- Page 103
- Page 104
- Page 105
- Page 106
- Page 107
- Page 108
- Page 109
- Page 110
- Page 111
- Page 112
- Page 113
- Page 114
- Page 115
- Page 116
- Page 117
- Page 118
- Page 119
- Page 120
- Page 121
- Page 122
- Page 123 (reading here)
- Page 124
- Page 125
- Page 126
- Page 127
- Page 128
- Page 129
- Page 130
- Page 131
- Page 132
- Page 133
- Page 134
- Page 135
- Page 136
- Page 137
- Page 138
- Page 139
- Page 140
- Page 141
- Page 142
- Page 143
- Page 144
- Page 145
- Page 146
- Page 147
- Page 148
- Page 149
- Page 150
- Page 151
- Page 152
- Page 153
- Page 154
- Page 155
- Page 156
- Page 157