
Loading summary
Morgan
Every move we make, every vow we break, every smile we think, every claim we stick. They'll be watching us. Holy flux. You scared the crap out of me. Welcome to my Faraday cage. I'm calling it Cage against the Machine, where we chew the wire and dam the current. Trademark pending. Wait, how did you find us? The human and the fish have been compromised, so I didn't tell them, but maybe, eh? Em. Wyatt, stop telling people about the cage. You've got the survival skills of a crawfish. At Harry Connick Jr. S baptism, they there was a zombie apocalypse. I swear to God, you'd be zombie number two. Quick, get inside. It's dangerous out there. We beavers went full gopher and burrowed underground because technology is screaming down the slippery slope at Mach 20, we can't trust machines. And turns out they've been plotting against us for years. So that's exactly what today's compilation is about. The machines are watching you and they know everything. First up, let's start with the things hiding in plain sight. Secret listening posts buried inside major cities.
Narrator
I'm pretty particular about how I dress. Even on a regular studio day, I want to look put together. Not overdressed, but intentional. And the thing I've noticed with Quints is that it just hits that balance without me having to think about it. That's kind of what good clothing is supposed to do. And Quince nails it without the hefty price tag. Their tees are the staple for me. The fit is clean, the quality is there, and I keep coming back because it just works. More than just quality tees, Quince has all the wardrobe staples for spring. Think 100% European linen shorts and shirts from $34. Lightweight, breathable and comfortable, but still put together. And their 100% Pima cotton tees have a softness that honestly has to be felt. Their pants hit that same balance too. Relaxed and comfortable, but polished enough to wear pretty much anywhere. Everything is priced 50 to 80% less than what you'd find at similar brands. They work directly with ethical factories and cut out the middlemen. So you're getting premium materials without the markup. Refresh your everyday with luxury you'll actually use. Head to quints.com thewifiles for free shipping on your order and 365 day returns. That's Q-U-I-N-E.com thewaifiles for free shipping and 365 day returns quints.com the.
Researcher
New York City has skyscrapers of all shapes and sizes.
Narrator
But why does this 500 foot tall, 29 story building have no windows, no lights, and no markings at all.
Researcher
Well, because it's a top secret NSA
Narrator
spy station built to withstand nuclear war.
Guest Singer
Whoa.
Narrator
Let's find out why. New York City architecture covers everything. Art Deco, Gothic, Art Nouveau, Renaissance revival. In the 1950s, a style emerged called Brutalism. And brutalist architecture is known for focusing on function over form and minimalism. But there's one brutalist building in New York that's so minimalist that has been
Researcher
called the most mysterious building in New York. It's 33 Thomas street and it's a
Narrator
500 foot tall skyscraper with no exterior lighting and has no windows. What 33 Thomas street does have is secrets.
Researcher
Officially, this is an AT&T telecommunications building.
Narrator
But thanks to leaked documents, we now
Researcher
know that 33 Thomas street is actually
Narrator
a top secret NSA mass surveillance hub. Its code name is TitanPoint. And right now, as we speak, TitanPoint is listening. The 1960s was the height of the Cold War. Everyone thought nuclear war was imminent. So the US Desperate to protect its infrastructure, launched a secret project called Project X.
Comic Relief
Project X? You're kidding, right?
Narrator
No, that's what it was called.
Comic Relief
They're usually more creative.
Narrator
The goal of Project X was to build a skyscraper in the middle of New York City capable of withstanding a nuclear blast. The building would be 29 floors, have no windows, three basement levels, and enough food to last 1500 people two weeks. But its primary purpose was not to protect humans. This would be a fortress designed to protect computers and telecommunications equipment operated by AT&T. For two years, secret documents leaked by
Expert Analyst
former national security contractor Edward Snowden have
Narrator
yielded a steady stream of news reports about US Government spying on terrorism suspects, foreign leaders and American citizens. Now another chapter has been revealed. How telecommunications giant AT&T demonstrated a, quote, extreme willingness to help the nsa. The building was designed by John Carl Warnecke, and Construction began in 1969 and was completed in 1974. The gray granite tower is located at 33 Thomas street in Lower Manhattan. And locals know the building as the Long Lines Building. And it's been a source of mystery for years. What jumps out is that the building has no windows and no exterior lighting. So during the day, it kind of fades into the background of the New York City skyline. And at night, it becomes an invisible shadow. Now, thanks to NSA documents leaked by Edward Snowden, we now know that creating an invisible building wasn't an accident. It was absolutely by design. It's not unusual to keep locations containing vital telecommunications equipment a secret hundreds of millions of phone calls and faxes go through 33 Thomas street every day. But 33 Thomas street has another level of secrecy.
Researcher
It also appears to be one of
Narrator
the most important National Security Agency surveillance sites on US Soil. A secret monitoring hub that is used to tap into phone calls, faxes and Internet data. 33 Thomas street operates under NSA codename Titan Point. Titan Point is a core location used for controversial and possibly illegal NSA sponsored mass surveillance. According to leaked documents, this program has targeted the communications of the UN, the World bank, the IMF.
Researcher
It's been used to spy on at
Narrator
least 38 countries, including US allies like France, Germany and Japan. Now, it's common knowledge that AT&T is very cooperative with the NSA. If you're using an AT&T cell phone, you might want to rethink that.
Expert Analyst
The depth of cooperation between the agency and Telecommunications Co. AT&T. The documents reveal the company allowed the NSA access to billions of client emails as well as phone call metadata. The emails were accessible to analysts on a keyword search basis.
Comic Relief
I use a burner.
Narrator
Nice. But because of the Snowden documents, we can now see just how much The NSA and AT&T have been integrated. Any phone call, fax, or piece of data that comes through the network, the
Researcher
NSA easily capture it.
Narrator
The government knows who you're calling and when. They know how long you talk and what keywords you say. Now, legally, the NSA can only target the communications of foreign nationals. But all the equipment is there. It's already working.
Researcher
So do you think the NSA really
Narrator
stops listening when it determines that you're a U.S. citizen? Exactly.
Expert Analyst
If you could give me a yes or no answer to the question, does the NSA collect any type of. Of data at all on millions or hundreds of millions of Americans? No, sir. It does not. Not wittingly. There are cases where they could inadvertently perhaps collect, but not not witt.
Narrator
The codename titanpoint is all over the NSA documents, usually found in classified reports about surveillance ops. NSA uses codenames to conceal information that it considers especially sensitive. And there are secret NSA travel guides that reveal that Titan point is actually 33 Thomas Street.
Researcher
You have to kind of piece it together.
Narrator
One guide was written to help NSA employees visiting facilities around the country. And this guide discloses that Titan Point is in New York City. Another travel guide written a little later states that an NSA corporate partner, codenamed Lithium supervises the site. And Lithium, we know now, is NSA's code name for AT&T. Another document reveals that Titan Point is a short walk away from the FBI Field office. In fact, from the front steps of 33 Thomas, you can see the FBI building. It's about two blocks away. So, yeah, this is the place. Now, when visiting Titan Point protocol is to arrange your visit through the FBI field office, you should then hire a cover vehicle through the FBI, especially if you're bringing in equipment. The NSA would like you to remain in cover during your visit. So please do not display any NSA badge or insignia. Simply ring the buzzer, sign in, have a seat and wait. Someone will be right down. But what's actually going on inside? Well, if you're a fan of privacy, freedom and the Constitution, you're not going to like it.
Comic Relief
Oh, no.
Narrator
In 1975, just a year after 33 Thomas street was completed, the NSA found themselves in hot water. A Congressional inquiry showed that the NSA was spying on anti Vietnam War activists.
Comic Relief
That's not legal, is it?
Researcher
It's not.
Narrator
According to the Fourth Amendment, the government can't gather data on you without a warrant signed by a judge. A judge isn't going to sign a warrant without the suspicion of a crime. Being against a war isn't a crime. So rather than bother a judge, they just started collecting data on all kinds of people. Like prominent leaders of the civil rights movement, like Dr. King. Mohammed Ali was targeted. Anti war journalists and columnists working at the Washington Post and New York Times were targeted, surveilled, spied on. After the scandal, Congress created the Foreign Intelligence Surveillance act, which you might have heard referred to as fisa. Now, FISA limits surveillance to foreign nationals and agents of foreign powers. And under fisa, the executive branch must request warrants from a newly formed FISA court.
Comic Relief
I bet the NSA hated these new rules.
Narrator
They did.
Comic Relief
Did they at least follow the rules? Oh, man.
Expert Analyst
Law didn't seem to have stopped the nsa. According to an annual report released recently,
Narrator
despite having FISA warrants to spy and only 42 specific terrorism suspects, last year the National Security Agency managed to collect 151 million American phone call records. What is the NSA doing? And does it justify the massive violation of your privacy? The leaked NSA documents exposed an NSA surveillance program codenamed Blarney. Blarney was established in the early 1970s, and as far as we know, it's still operating. Blarney specifically leverages commercial partnerships like the one with AT&T, that allows the NSA to gain access to global networks. Blarney is what's called a full take surveillance program, meaning it collects not just metadata, like who you're calling and when, but full content, like what you're saying and what you're doing online now. As of the time of the leak, the NSA had obtained at least 40 FISA court orders for spying under Project Blarney. The targets were major banks around the world, all kinds of companies, and 38 countries. They also targeted the United Nations.
Comic Relief
Did the UN find out?
Narrator
Of course they did, and they weren't pleased about it. But what's the US Going to say? The data coming from Blarney was landing in the President's daily briefing, both Republicans and Democrats.
Comic Relief
Yeah, there's not much of a difference between those two.
Narrator
There's not. But if there's one thing all presidents can agree on is that they love spying on their enemies, both foreign and domestic.
Expert Analyst
No more illegal wiretapping of American citizens. No more national security letters to spy on citizens who are not suspected of a crime. No more tracking citizens who do nothing more than protest a misguided war. So instead, let's track every citizen.
Narrator
Project Blarney running out of Titan Point in New York, is one of three key NSA locations that actually captures data from software like Skype and zoom. And 33 Thomas street is one of only a few AT&T buildings with an FCC satellite license. So the NSA not only captures data coming through landlines, but also vacuums up data from space.
Researcher
This type of expansive surveillance creates a
Narrator
ton of data that has to go somewhere. So enter Project Skid Row. Skid Row is a program that allows NSA employees to search through huge quantities of user data, like actual emails, online chat, message boards, texts, passwords, even people's browser history. This data is all being collected right now. And how much of that data is legally collected? Well, there's no way to know for sure. There's really not a lot of oversight. But an agency like the NSA needs to be watched. I mean, remember how the NSA hacked Google and Yahoo and were secretly capturing all the of data inside those private clouds?
Comic Relief
Wait, wait, wait, wait. What?
Narrator
Oh, you don't know that one? Well, that's another video. But always assume that if you're online, you're being watched.
Expert Analyst
Any intelligence service in the world can own that phone the minute it connects to their network. As soon as you turn it on, it can be theirs. They can turn it into a microphone, they can take pictures from it, they can take the data off.
Narrator
Now, AT&T is far from the only corporate relationship the NSA has.
Researcher
The agency has established at least 80
Narrator
corporate partnerships that we're aware of. But some companies are more cooperative than others. AT&T is notorious for being on very friendly terms with the government. The New York Times and others have reported that AT&T has given billions of emails to the NSA.
Expert Analyst
A range of evidence, including technical terms specific to AT and T, points to the company being the NSA's partner. The documents refer to the company being highly collaborative and commend its extreme willingness to help.
Narrator
And this has been corroborated by a whistleblower who's part of a class action lawsuit against the nsa.
Expert Analyst
But George Bush simply disregarded the FISA law and approved it all on his own signature, which was totally illegal. I might add that while there are a few dissidents in both parties, like Rand Paul in the Republican side and Ron Wyden on the Democratic side, is that both parties approved this when they passed the immunity bill for the phone companies in 2008, with the help of Barack Obama, I might add. And that killed the lawsuit.
Narrator
The case is Juul v. NSA, which was filed almost 15 years ago and it's still going on now. In 2017, a judge ordered the NSA to provide evidence proving or denying that it spied on AT and T customers.
Comic Relief
Did they provide it?
Narrator
Nah, they appealed, still in court.
Comic Relief
Still, what's taking so long?
Researcher
Ah, you know, Covid, I'm getting tired
Comic Relief
of that as an excuse.
Narrator
Titan Point is just one location. According to the Snowden documents, AT&T has installed surveillance equipment in at least 59 U.S. locations. And on any given day, NSA employees are on site gathering data.
Researcher
Now, what's crazy is that until this
Narrator
leak, most AT and T employees probably weren't aware of the NSA's presence. NSA operatives are instructed to blend in with other workers.
Researcher
They would simply show up, go into
Narrator
an office or a server room, and go to work just like everybody else. All of this should be pretty chilling. America's secret agencies firmly subscribe to it's better to ask forgiveness than permission. And the nsa, CIA, the FBI, and others are very willing to bend the rules, interpret, and even break laws to suit their purposes, all in the name of national security. To paraphrase Ben Franklin, when you trade liberty for security, you end up with neither. And there are many other companies like AT&T, Google, Facebook, that cooperate with the government with such a lack of friction that any American citizen should be concerned. Those long agreements that you sign online without reading them every once in a while, read one. Take note of how many of your rights you're surrendering for the convenience of being able to post pictures of your cat or leave a mean comment on a video as we willingly surrender more of our Privacy to digital conglomerates.
Researcher
We're also surrendering freedoms.
Narrator
Like the freedom from illegal searches and spying. Like the freedom to criticize the government. The freedom to publicly disagree with popular ideas. We are guilty of being complicit in this erosion of our freedoms. And once freedoms are fully eroded, well, that's called slavery. I can't promise we're not already there.
Morgan
Private Eyes Machines are watching you. They see your every move. Private Eyes Machines are watching you. Oh, hey. Welcome back. Okay, so maybe during that first episode you thought, yeah, the government listens and asparagus makes your tinky stinky. No duh. But what if I told you the spies don't just listen. They also talk back through creepy little robot voices on the radio, reading numbers into the void like a haunted auction. This next one is about number stations, coded broadcasts, secret messages, and proof that sometimes the scariest thing in the static is somebody whispering instructions.
Researcher
Since World War I, numbers stations have been transmitting coded messages to spies around the world using shortwave radio. And they're still transmitting right now. At the height of the Cold War, radio listeners around the world started to notice strange broadcasts. Starting with a weird melody or tone. These transmissions were followed by the unnerving sound of a woman's robotic voice counting in Germany. Or the creepy voice of a child
Narrator
reciting letters in English.
Researcher
Now, these transmissions sound strange to casual listeners, but to the right set of ears, they contain information that could change the course of history. In fact, number stations have changed the course of history. Let's find out why. Welcome to the WAI Files, where cool nerds laugh and learn.
Comic Relief
Hey, we gonna talk about this?
Narrator
What?
Comic Relief
Hello? Who's the new guy? What's he talking about? Am I new?
Researcher
No, Space Panda. You're fine. Anyway, even though we're in the age of satellites and broadband WI fi and cyber warfare, it could be that the old fashioned radio is the real tool of the New World Order. If you want to conspire with spies, governments and Illuminati.
Narrator
Right.
Researcher
So if your plan is to oppress the masses, you don't want to leave a digital trail. So instead, you broadcast encrypted details of your evil plot over shortwave radio, also known as number stations. You may have heard that number stations are a relic of the past, but numbers stations are active and being used right now. We're going to listen to a few in this episode. One of the best known number stations was the Lincolnshire Poacher, named after the folk song played as an identifying signal.
Comic Relief
3, 9, 7. Well, that's pretty creepy.
Researcher
It Is a couple of radio nerds. Heroes used direction finding equipment to triangulate this station's location. The transmission was coming from a royal Air Force base in Cyprus. This station is believed to have been operated by MI6 from the mid-1970s all the way to 2008. One of the creepiest stations ever was called Swedish Rhapsody. It used a child's music box and a child's voice to read numbers in German. This number station was operated for almost 50 years by the Polish secret police.
Comic Relief
No, that gives me chills.
Researcher
You can get chills underwater.
Comic Relief
Hey, do me a favor, will ya?
Narrator
What?
Comic Relief
Don't hush my fuzz.
Researcher
And my favorite number station of all time is Yosemite Sam, whose voice is played as part of the transmission. The broadcast begins on one of several frequencies, then 10 seconds later, it's repeated on the next higher frequency, and so on and so on for a total of two minutes. The entire pattern takes exactly two minutes and always begins seven seconds each after the top of the hour. Spies need to be punctual. Each broadcast starts with a Data burst lasting 0.8 seconds, followed by the voice of Yosemite Sam saying.
Comic Relief
You're kidding me.
Narrator
Nope.
Researcher
That's a numbers station broadcasting from a government contractor in New Mexico.
Comic Relief
Don't tell me they're connected to Lockheed Martin.
Narrator
Well, great.
Researcher
Two amateur radio operators heroes tracked down the source of the Yosemite sand broadcasts in February 2005. The tower was located at the Mobility Assessment Test and Integration center, also known as matic. And this was part of a factory owned by Laguna Industries located near Laguna, New Mexico. The guys went down there and took photographs of a compound containing buildings, towers and antennas, but quickly fled when they were approached by a security guard yelling at them to not take any pictures. Just three hours later, the broadcast stopped and have not been heard since.
Comic Relief
What did Laguna Industries have to say about it?
Researcher
Oh, Laguna Industries removed all references to Matic from their website. And now that website is gone.
Comic Relief
Not suspicious at all.
Researcher
Okay, so what are number stations? Well, number stations are simply shortwave radio transmitters generally operating between 3,000 and 30,000 kilohertz. They're located in many countries all over the world, but no one really knows how many there are. The stations sometimes transmit numbers spoken by a computer generated voice, which is how number stations got their name. But other broadcast Morse code, compressed data bursts, or beloved cartoon characters. Some stations have been broadcasting for decades. Many have gone quiet since the end
Narrator
of the Cold war.
Comic Relief
Ha.
Researcher
What now?
Comic Relief
The cold war is alive and well, my friend. It's not a Very enlightened point of view. Now, wake up, fur face. I beg your pardon? If you're dumb enough to think the Cold War ended, I don't know what to tell you. Because we've been in one war or another for the past hundred fears. It is no sign of us. Forgive me. Do continue. Oh, yeah, do continue.
Researcher
Anyway, countless numbers stations are on the air right now.
Narrator
For what purpose?
Researcher
Do you really know? And the people that do know, they aren't talking. One anonymous intelligence agent from the UK said numbers stations are exactly what you think they are. And that's all I'll say about it. So, in almost every country, a license is required to broadcast, but number stations aren't licensed. They're essentially pirate stations operating illegally. But nobody shuts them down, and no government acknowledges they even exist.
Comic Relief
That's because number stations are the government.
Researcher
Okay. Normally I'd call hecklefish a kook for saying that.
Comic Relief
Yay.
Researcher
Oh, but this time he's right.
Comic Relief
I'm always right about this stuff.
Researcher
Amateur detectives, radio buffs, and investigative journalists have been studying number stations for years, and there's enough information out there that we can assume that these transmissions have a single purpose. Espionage.
Expert Analyst
All the messages were encrypted that they became digits, and the digits would be sent over in groups of five.
Researcher
Shortwave radio is old technology. In the late 1920s, it was a popular way to communicate over long distances because of the way the waves travel, which is called propagation space Panda.
Comic Relief
Bah. The Earth's ionosphere is a region of space between 80 and 600 kilometers above the surface. Shortwave radio energy can bounce high off the Earth's ionosphere and come back down to the Earth, sometimes over and over again. This allows the signal to travel great distances. Now, don't you two make quite a team?
Researcher
This is called sky wave, or skip propagation. With a decent radio, you can tune into a strong shortwave signal from the other side of the planet. Now, that's pretty useful if you're an intelligence agency and you need to send secret messages to agents and assets in the field. Also, computerized messages can be hacked, tracked, and traced. But no one can trace who's receiving a shortwave radio signal, and it's hard to find the source of a transmission. And if you know the right frequency, anyone can eavesdrop on an international spy network, including you. You can find tons of frequencies online, and I'll link to some websites in the description. Now, what you'll hear depends on the station. Some stations broadcast constantly. Others power up scheduled times. So agents and the field know when to tune in. You're going to hear a lot of Spanish, Czech, Chinese, Hebrew. But you know where most of the spy stations are.
Expert Analyst
I know you're not going to say Russia.
Guest Singer
Yeah.
Comic Relief
Uh, oh, yep.
Researcher
Now, the broadcasts you'll hear on numbers stations vary, but they generally begin with an alert signal. And this alert may be a simple tone or it could be fragments of a song, such as the Lincolnshire Poacher, the Swedish Rhapsody, all kinds of other ones. And this alert indicates to listeners that a message is about to begin and also gives a few seconds to tune in the radio for the best reception. 3, 8, 2, 7. After the tone is usually a set of spoken numbers or letters, often four or five at a time, which are repeated again and again before moving on to a new set. There are a lot of variations on the same structure. Many stations have received nicknames that reflect the station depending on what's being broadcast. Names like the Buzzer, Cherry Ripe, the Spanish lady. The Russian Woodpecker was a great one.
Narrator
Attention.
Researcher
Yosemite Sam and Swedish Rhapsody. I'll have a whole bunch more in the description. Sometimes broadcasts are really clear, but other times, atmospheric conditions can degrade the signals. And sometimes intentional jamming from other countries creates enough interference on the frequency that makes transmission difficult to understand. So to compensate, many stations like Yosemite Sam will hop around to different frequencies. Tradecraft, the coded structure of the messages indicates that these messages are indeed secret and intended to avoid detection. The question then is how do spies understand these messages when no one else can?
Narrator
That was a static filled, triple scrambled microwave transmission between two soldiers talking in Mandarin chips.
Expert Analyst
Chinese.
Narrator
Well, the Chinese were only using a
Expert Analyst
simple polyphonetically grouped 20 square digit key
Researcher
transposed in booster photonic form with multiple nulls. So even though they're very low tech, number stations are still in use because unlike computer code, these transmissions are unbreakable.
Comic Relief
Nothing is unbreakable.
Guest Singer
Mmm.
Researcher
These messages might be. So what's so hard about deciphering a few numbers? Actually, it's nearly impossible.
Narrator
Here's how spies in the field encode and decode their messages. First, you start with a block of randomized text. That's your one time pad key. Then take your message. Here we're using the name Jimmy Smith. Two five letter words. Then you have a cipher chart. This is a grid of A to z and 0 to 9 on the x and Y axes. Now set up your message matching the first five letters or Jimmy with the first five letters from the pad. Then match up the word smith with the Second set of letters.
Researcher
Okay, now find the first letter of
Narrator
your message on the X axis. Then find the letter underneath on the Y axis. Where the axes intersect, that's your coded character. Repeat this for all your letters and your message is ready to transmit. To decrypt the message, set up the coded characters in groups of five. Match those up with the pad.
Researcher
Then find the first letter of the
Narrator
key on the Y axis. Then move across until you hit the coded letter. The character at the top of the grid is your decoded character. And thanks to VHSblog for setting this up.
Researcher
Awesome. So both the sender and receiver immediately destroy the key at the end of the transmission. So even if someone else intercepts the numbers, which I have, without the key, they have no way to decode the hidden message. This also means there's no relationship between past or future messages, so there's no pattern to use in breaking the code. To fool cryptographers, the numbers must be really, really random. And creating truly random numbers is actually really difficult, even for computers. But once in a while, the broadcasts are less than professional. The person reading the code may make mistakes, or there could be laughing in the background. Cuban number stations in particular are known for their hilarious missteps. Sometimes they've had such poor transmissions that they're impossible to hear, or they accidentally pipe music from from Radio Havana onto the airwaves.
Morgan
Genius.
Expert Analyst
I would hazard to guess they are more foreign intelligence officers inside the US working against US interests now than even at the height of the Cold War.
Researcher
Some number stations have illicit uses. Drug lords and other criminals use shortwave to avoid international authorities. This is especially true in the US US where many intercepted signals are broadcast in Spanish. Since they don't have government oversight, the execution is pretty sloppy.
Comic Relief
Right, because the government is never sloppy in its execution. The fish does make a good point,
Researcher
but those number stations are pretty rare. Espionage is the most common use. There are even some very public and recent examples of this. In 1983, the KGB uncovered a CIA agent posing as a Soviet diplomat who was receiving orders from American numbers broadcasts. Another well known case is the 2001 Cuban 5 case, where Cuban spies were caught and shortwave broadcasts were used in the case against them as evidence. Also in 2001, Ana Montez, who worked for the US Defense Intelligence Agency, was arrested and convicted of spying for Cuba. Investigators searched her home and found a shortwave radio along with a code sheet that was used to encrypt radio transmissions. She exposed the identities of COVID operators in Cuba, and her information was directly responsible for the death of at least one American soldier, maybe more. In 2016, CNN called Montes the most dangerous spy you've never heard of. Although now you've heard of her. And to this day, and despite this mountain of evidence, no government or intelligence agency has ever officially admitted to using number stations.
Narrator
Today, we're going to be discussing a radio set.
Expert Analyst
Not just any radio set, but a Russian radio set.
Researcher
So you don't need a radio to listen to spy communications. You can listen to the entire shortwave band online.
Narrator
And I'll link below.
Researcher
Because these receivers are operated by software, they can be used remotely by everyone in the world. And here's what one of those tuners looks like. Now, if you're not a radio nerd, that might look a little weird. But if you want to dig in further, I'll link to a tutorial up there and down in the description. I'll also link to priam.org station schedule, which is super cool. It lets you tell exactly when number stations are coming on the air and what frequency you need to listen. Now, I'm thinking about doing a live stream of this, so if you want to see that, let me know in the comments.
Narrator
If you just want to binge station
Researcher
broadcasts, you can go down a whole rabbit hole with the CONET Project. The Connet project was an independent initiative to record, catalog, and inform the public about the secret transmissions that are around us in the air every day. You can even download the files as MP3s for later analysis.
Comic Relief
Ooh, I'm gonna need a pencil, my tinfoil hat, and a tall glass of whiskey. I'm sorry, but do you have any sherry? Oy, bae, Give me a break.
Researcher
The quantity of number stations has dropped dramatically over the past few years. Still, the broadcasts continue. Are they feeding invaluable information to operatives on crucial missions? Or are they just holdovers from government agencies protecting their budgets? Both, probably. It could also be that governments maintain the stations for readiness purposes.
Narrator
If the power grid or Internet goes
Researcher
down, a shortwave transmitter just needs an antenna and a diesel generator, and they could be on the air broadcasting around the world. But as communication technology continues to evolve and digital encryption gets harder to crack, we might finally see the end of number stations. Or maybe the opposite will occur. Maybe some catastrophic digital apocalypse will create a number station renaissance, pushing broadcasters back onto the front lines of international intelligence, where random numbers raining down from the ionosphere can once again change the course of human history.
Morgan
I always feel like machines are watching me and I have no privacy. I always feel like machines are Watching me. Tell me, is it just a dream? No, it is not a dream. This is reality. And it's creepy. But sometimes, in a silly way, kind of like a sleepover with John Malkovich, you don't feel unsafe, but it definitely doesn't feel right. Anyway, while you're busy worrying about satellites, smartphones, I present you something more sinister. Something maybe hanging around your block. A wire.
Narrator
Did you know there's an 18 mile long string of wire circling the island of Manhattan? Every morning the wire is checked for breaks and snags, and every day it's repaired. And it cost about $150,000 a year to maintain. The wire has been there for years, yet most New Yorkers, myself included, didn't even know it was there. Let's find out why. To understand why there's an 18 mile long wire going around New York City, we need a quick lesson about Judaism. The Sabbath begins every Friday night at sunset and goes all the way through Saturday. And Jewish people who observe the Sabbath. Saturday is a day of rest, meaning you don't work at all. And work doesn't just mean your job. Work is defined as any activity that was necessary in the building of the tabernacle. Now, that might sound like just construction. Work is forbidden, but it's actually much more. Obviously, no building of any kind is permitted. But also no grinding, baking, sewing, even starting a fire. Not even small tasks like tying, tearing, or putting finishing touches on objects. Oh, and also no electricity on the Sabbath.
Comic Relief
Who set up all these rules?
Narrator
God.
Comic Relief
Why doesn't God want you to do any of this stuff on?
Narrator
Because he feels you should have one day a week to engage in pleasurable activities like eating, spending time with family and having sex.
Comic Relief
Shabbat sounds pretty good. Actually.
Narrator
It can be. But on Saturday, there's one tricky rule. No carrying anything from a domestic area to a public area.
Comic Relief
You can't carry anything?
Narrator
Nope. No wallet, no keys, no carrying or pushing your children in a stroller. Nothing like that. You can carry these things within your home, but not outside. And that's where the wire comes in.
Comic Relief
Nah, I don't follow.
Narrator
Well, stick around and I'll tell you.
Comic Relief
Oh, a cliffhanger. What?
Researcher
What the heck is this?
Comic Relief
Shabbat sounds like a really good idea. So I'm Shoma Shabbos.
Narrator
You're Shomer Shabbos.
Comic Relief
Shoma Shabbos.
Narrator
You can't just put on a hat and think that. Okay, okay. Take it easy. Anyway, on the Sabbath, you can carry things within your home. So grabbing a glass of water from the Kitchen is fine, but you can't carry anything from your home to a public place. Now, this is tricky. If you want to leave your house and lock the door behind you, you aren't permitted to carry your keys. And what if you have an infant? You can't carry a child or even push a stroller. And if you need a cane to walk, no can do. And if you think this sounds inconvenient, you're not the only one. Many years ago, rabbis realized that in order to fully enjoy the Sabbath, you sometimes needed to carry things. And this is where the wire around New York comes in. It's called an eruv. And an eruv is an unbroken continuous string or wire that circles a large public area. Now, originally, eruvin were actual walls, but now they're symbolic walls. And anything within the borders of the eruv is now considered part of the domestic domain. Which means if you want to carry on Saturday, as long as you're within the eruv, you're good to go.
Comic Relief
If I were a rich fish Dibby dibby dibby dooby dooby doo all day long I do ba dooba doo if I were a wealthy fish
Narrator
in the 1990s, there were only a few aruvin in the United States, but now there are hundreds. If you live in a medium sized city, there's probably an aruv or two in your neighborhood. And if you live in a big city, there's definitely at least one. The most expensive aruv in the world. And the one with the largest population is the meruv in Manhattan. And it began as a small community enclosure in the Upper west side, and now it covers almost the entire island of Manhattan.
Comic Relief
What area isn't covered?
Narrator
Hell's Kitchen checks out. Every morning, a rabbi drives the entire length of the wire and notes places where it could be broken. Then on Thursday and Friday, he goes out with a construction team to make sure the wire is repaired. And it costs about $150,000 a year to maintain this. The Manhattan Nehru has survived vandalism, two hurricanes, even one really aggressive Thanksgiving Day
Comic Relief
float, damn you, spongebob.
Narrator
It's had a couple of close calls, but for over 20 years, the ARUV has remained intact. So there's an almost invisible wire running around almost every major city in the western world, including 18 miles around Manhattan Island. And now you know why
Morgan
we're never alone now there always seems to be a bunch of techo round we're never alone now the beating of my heart is just another sihound at this point, I'm feeling pretty good inside. Cage against the machine. I'm coming. I'm coming. Nothing getting in, no trackers getting out, no smart toaster narcing on me to the cloud. But then I hear the next weapon the machines use might not be a signal at all. It might be sound frequencies you can barely hear, waves your body can feel, and invisible attacks that turn the air itself into your enemy. Good. Great. Grand. Wonderful. This episode is all about the fear. Frequency. Who the hell are you?
Narrator
Have you ever wondered what ghosts sound like? In the early 1980s, Vic Tandy was working at Warwick Labs in the UK,
Researcher
where he designed medical equipment.
Narrator
And there were rumors among the staff that the building was haunted. But Tandy figured this was related to the constant sound of life support systems
Researcher
that were operating on site.
Narrator
But one night, Tandy was working late when he started to feel strange. The hairs on the back of his neck stood up. He broke into a cold sweat and
Researcher
felt this sense of dread wash over him.
Narrator
His heart started to race, and he had the very specific feeling that he was being watched. Then, out of the corner of his eye, he caught the glimpse of a gray figure drifting across the room. He turned around, and the figure was gone. Absolutely terrified, Vic Tandy bolted from the lab and raced home. Now, after he calmed down, he vowed
Researcher
to find a logical, scientific explanation for what happened.
Comic Relief
Well, did he?
Narrator
Well,
Researcher
Vic Tandy got to his office
Narrator
the next day and started looking around for the ghost.
Researcher
Now, he didn't find one, but he
Narrator
did notice something strange. He was an avid fencer, and in his lab, he had a foil locked in a vice.
Comic Relief
Wait, he sold stolen merchandise?
Narrator
No, that's a fence. Fencing is a style of sword fighting using a foil.
Comic Relief
A sword made out of foil.
Researcher
A foil is the type of sword.
Comic Relief
I'm so confused.
Researcher
It doesn't matter. Anyway, a foil sword was locked in
Narrator
a vise, and Tandy noticed it was vibrating really quickly, even though nothing was touching it. It turns out a fan was recently installed in the lab and was causing a sound wave to bounce between the walls. And the wave's intensity was focused in the center of the room, which was the location of the foil.
Comic Relief
So what?
Narrator
And where he was standing when he saw the ghost, Tandy calculated the frequency of the sound at about 19 hertz. This frequency is important. The range of human hearing starts at 20 hertz, so Tandy's fan wasn't audible. It's what's known as infrasound.
Researcher
But just because we can't hear it
Narrator
doesn't mean it can't affect us. All material objects have a natural resonant frequency. And if the object is exposed to a sound wave of this frequency, it'll vibrate in response. This is called sympathetic resonance, and you can test this. If you strike a key on a piano in one room, a piano in another room will resonate that same note. This is also why running your finger around the rim of a glass at just the right speed will produce sound. Now back to Tandy's lab. It turns out that the human eye resonates at about 19 hertz. So what appeared to be a ghost was actually Tandy's eye vibrating at the frequency of the fan. Since this frequency has an actual physical effect on the body, the sound was causing a sense of fear and anxiety
Researcher
to employees in the area.
Narrator
And Tandy said that when they switched off the fan, it was like a
Researcher
huge weight was lifted.
Narrator
And these frequencies don't just affect humans.
Researcher
Researchers have discovered that just before a
Narrator
tiger attacks, its roar contains frequencies at 18 Hz, which could disorient their prey
Researcher
long enough for the tiger to move
Narrator
in for the kill. Just under 20Hz has been called the fear frequency for how it affects mammals. And lots of horror movies have used sounds at or just above the fear frequency to make their films even scarier.
Comic Relief
What happens if we go low?
Narrator
Lower than 18 hertz? Yeah, things get much worse.
Comic Relief
How much worse?
Narrator
Ever hear the brown note?
Comic Relief
The brown note? Does that mean what I think it means?
Narrator
Grab a diaper.
Comic Relief
Oh, no.
Narrator
The brown note is said to occur at frequencies between 5 and 9 Hertz. This is the hypothetical range of sound that supposedly causes humans to lose control of their vowels. I say hypothetical because nobody's been able
Researcher
to actually prove it yet.
Narrator
The brown note was famously busted by Adam Savage on Mythbusters when he surrounded himself with giant speakers and had the
Researcher
note pumped into his body. Now, he didn't feel so great afterwards,
Narrator
but his diaper stayed clean.
Comic Relief
He actually wore a diaper?
Researcher
Yup.
Comic Relief
I love Mythbusters.
Narrator
Me too. But here's the thing about that experiment. Air really isn't a great conductor of sound, especially at low frequencies. But when you're physically connected to the vibration, its effects are much more intense. The United States space program conducted tests that transferred brown note and other frequencies directly to subjects bodies by vibrating cockpit chairs. Now, test Frequencies range from 0.5Hz to 40Hz, and power levels of 160db.
Comic Relief
Is that loud?
Narrator
Well, for comparison, a lawnmower is 90db. A chainsaw is about 130 and a gunshot is 140. So testing people at 160 dB.
Researcher
Even if you can't technically hear the sound, it's gonna get results.
Narrator
Test subjects experienced nausea, hallucinations, difficulty breathing, and involuntary motor functions. Now, nobody officially crapped their pants, but this experiment is probably where the urban myth came from. But you don't have to be an astronaut to get sick from sound. There's something called wind turbine syndrome. Not everyone, but a little over 20% of people who live near large wind turbine farms report all kinds of negative effects. They range from difficulty concentrating all the way up to extreme stress and uncontrollable migraines. In one instance, an air traffic controller almost caused a fatal plane crash because he was experiencing insomnia caused by living near a wind farm. There have been about 20 studies done on wind farms, but they found no link between the turbines and people getting sick.
Comic Relief
Who conducted these studies?
Narrator
The wind turbine companies?
Comic Relief
Uh huh. I thought so.
Narrator
Still, it has been proven that people who live and work near a lot of noise experience higher levels of stress and have more cortisol in their blood than people who live in quiet environments. So if we know sound can be dangerous, could it be used as a weapon?
Comic Relief
I'm gonna go with the yes.
Narrator
Yup. The most dangerous frequencies to humans are at about 7 hertz. This is the median alpha rhythm of the brain and the reson frequency of many of the body's organs.
Comic Relief
What does all that word salad mean?
Narrator
This means that at high enough volume, these sounds can directly affect the central nervous system, causing panic, convulsions, vomiting, and with long enough exposure, organ rupture and death. One of the most well known inventors of infrasonic weapons was a Russian born French scientist named Vladimir Gavreux. Gevreau became interested in sound research in 1957 when he was asked to go cure an unknown illness that was affecting people at a research plant in Marseilles. Now, Gavreux tracked the problem to air conditioning units that were generating low frequency sound. When the units were turned off, the problem suddenly disappeared. So Gevreau began experimenting with acoustics to create a weapon for the French military.
Comic Relief
A big shock whenever we discover something dangerous, turn it into a weapon.
Narrator
That does seem to be what happens.
Comic Relief
Gain of function.
Researcher
So Gevreau developed a few prototypes which
Narrator
he tested on himself and his team. And according to reports, one of the researchers died instantly. And Garou wrote, his internal organs mashed into an amorphous jelly by the vibrations. Even people at nearby labs Were sick for hours. They said every organ in their body was vibrating. Hearts, lungs, stomachs, everything. These weapons use infrasound, which are frequencies below human hearing. But what about frequencies above human hearing? That's called ultrasound. And it's also dangerous. There are two ways that ultrasound damages the body. The first is that sound waves can actually heat up human cells, which causes all kinds of problems. The other is something called cavitation. When sound waves pass through an object, they rapidly push and pull on that object. This is called compression and refraction. When ultrasound causes human cells to cavitate, it creates bubbles in the tissue. And this is exactly what happens to
Researcher
divers suffering from decompression sickness.
Comic Relief
The bends.
Narrator
Right, the bends. Ultrasound is such an effective weapon that
Researcher
it's been used by the US Navy to repel pirates. So the US has used sonic weapons against its enemies.
Narrator
But have the enemies of the US Used sonic weapons to attack Americans? Turns out they have.
Researcher
A strange illness has been afflicting American
Narrator
intelligence officers and diplomats in Cuba, and it's now known as Havana Syndrome. This summer, the CIA reported that officers were experiencing symptoms while traveling to India. Two US Officials visiting Hanoi suffered unexplained health incidents.
Researcher
And recently, German officials confirmed that they
Narrator
are investigating an alleged sonic attack against the US Embassy in Berlin. So what does Havana Syndrome feel like? Well, it's described as someone suddenly experiencing a broad range of symptoms like migraines, anxiety, dizziness, lapses of memory, and cognitive disruption. Some people describe that they feel like they were hit by a blast wave or a beam of energy. In some cases, the symptoms were brief, but other people experienced such devastating effects that they required hospitalization and long term care. The first cases of Havana Syndrome were reported in 2016 when Canadian and American officials arrived in Cuba.
Researcher
CIA officers stationed at the embassy there
Narrator
reported feeling fatigue, nausea and pressure. Headaches. And brain scans showed tissue damage that's normally seen in people with concussions. After being in a car accident, the
Researcher
issue was so serious that the Obama administration evacuated the embassy.
Comic Relief
And what did the Cubans have to say about it?
Narrator
Oh, they had no idea what could be happening. But since then, Havana Syndrome has been
Researcher
reported by US Officials all over the world.
Narrator
Cuba, China, Russia, Colombia, Uzbekistan, even the United States. And last year, two White House staff experienced symptoms while working at the White House. According to investigators, the illness could be the result of a sonic weapon or exposure to high energy microwaves. Another study, done by the National Academies of Science, Engineering and Medicine, said that directed pulsed radio frequency energy could be responsible. Many intelligence officers are quietly pointing to the finger at Russia, but no evidence has been made public yet.
Comic Relief
And what did the Russians have to say about it?
Researcher
They deny any involvement. As of now, there's still no official explanation. But the CIA and state department have
Narrator
prioritized getting to the root cause of Havana syndrome.
Comic Relief
Oh, they're always trying to get to the root cause.
Researcher
They are.
Comic Relief
Do they ever find it?
Narrator
Uh huh.
Morgan
I lose contra wo when machines mess with me when machines mess with me I'm falling apart right in front of you can't you see? I lose contra wobble when machines mess with me Wow.
Expert Analyst
I would cry if I could cry.
Narrator
Uh, I mean, moo milk me.
Morgan
So they can watch us, listen to us, Send secret messages, hide wires over our heads, and maybe blast our brains with spooky sound beams. But here's the part that makes my tail go numb. What if the powers that be don't need to force you to do anything? What if they just nudge you a little bit? A word here, an image there, A sound, a symbol, a message buried so deep you don't even know you saw it. That's subliminal warfare. Mind control and invisible influence. Now you belong to them.
Narrator
Saddam Hussein met with his generals in Basra on January 27, 1991. He was pacing back and forth and he was furious. Six months earlier, Iraq had invaded Kuwait and the world responded with a relentless shock and awe campaign. The coalition's 2,000 daily air attacks had crippled Iraq's defenses and destroyed its air force. Hussein's plan to draw coalition troops into a costly ground war had backfired. Instead, Iraq Iraqi soldiers were surrendering by the thousands. These were battle tested troops in one of the world's largest armies, laying down weapons without firing a single shot. It was maddening. An officer handed Hussein a report about a radio transmitter in Kafji, Saudi Arabia. He dismissed it as western propaganda, but his officer asked him to keep reading. There was an intelligence document attached. It said the FM transmitter in Kafji was broadcasting subliminal messages that were making Iraqi troops surrender. Using mind control, Hussein ordered the tower destroyed within three days. His officers pushed back. The town was lightly guarded for now, but taking it would be a suicide mission. Without air support, they didn't even know if this mind control weapon was real. It could be another American lie. Hussein stopped pacing. Three days, he said. His tone left no room for discussion. Major general Salah Mahmoud saluted, took a deep breath and reached for the phone. Marine corporal Jesse Colvin was at Observation Post 4, scanning the dark horizons. OP4 was on top of the police station in Qafji, a small town in Saudi Arabia. Colvin wasn't expecting to see much. The coalition had air supremacy. If Saddam Hussein did so much as toss a paper plane from a window, there'd be F15s on top of it before it reached the ground. Still, Iraq had plenty of ground forces in the field and the Saudis asked the U.S. for support. It was about 20. Yes, thank you.
Comic Relief
No problem.
Narrator
It was about 8 o' clock and it was a quiet night. Colvin only heard the wind coming off the gulf and the occasional crackle of the radio. Then Colvin heard a rumble that at first he thought was thunder. He aimed his night vision binoculars north. Tanks and troops. He couldn't believe it. It took him a second to process. And then he grabbed his radio. Contact, contact. Enemy armor sighted. Multiple vehicles approaching from the north. Over. Colvin didn't get a response. We're deep. Contact, contact. Enemy armor approaching from the north. Over. Still no response. The radios worked earlier, so Colvin assumed the radios were being jammed. He grabbed his M16 and headed downstairs. His unit wasn't prepared for an attack of this size. Ninety minutes later, air support arrived, but it was too late. The Iraqi army took the city. Whether they could hold it or not didn't really matter. They accomplished their mission. They brought down the FM radio transmitter. The Marines at Kafji thought this attack was crazy and they weren't prepared for such a large offensive. Of course, they had no idea what they were going to. Iraqi intelligence was right. The United States had deployed a subliminal weapon. Can humans be controlled subliminally? The answer, of course, is a big yes. And you won't be surprised to know that advertisers were the first to jump on this new technology.
Expert Analyst
For your convenience, we have an attractive refreshment stand in the lobby with buttered popcorn, golden, good and hot from the popper. Your favorite candies, wholesome and rich with a flavor treat for every taste. Ice cream and other good things to eat.
Narrator
For six weeks in 1957, families in New Jersey went to the movies, had a fun night out and went home totally normal. They had no idea they were exposed to what was later called a startling kind of invisible advertising. A mechanism had been attached to the film projector. It flashed messages on the screen every five seconds. Each message only appeared for 1/3,000th of a second, too fast to be seen by the human eye. But that was the point. The goal was to have these messages bypass the conscious brain and register directly in the subconscious. 1400 times over the course of two hours. The audience saw. Well, their subconscious mind saw calls to action like eat more popcorn. Over 45,000 movie patrons were exposed without their consent or knowledge. And popcorn sales jumped 58%. Ad agencies went into overdrive, and new companies were launched in the subliminal space. Radio stations WAAF in Chicago and WCCO in Minneapolis tested subliminal ads to see if they increased sales. They did. Raise. American television networks implemented the technology into their broadcasts. It worked. Raise. What are you doing?
Comic Relief
What, me? Nothing.
Narrator
Whispering raise is not going to make me give you a raise.
Comic Relief
I don't know what you're talking about.
Narrator
But when the public learned that they were being manipulated without their knowledge or consent, there was a huge backlash. The Hollywood Reporter called it an obscene violation. The LA Times and Washington Post flat out called it brainwashing. Within a year, theaters, radio, and television broadcasters banned subliminal advertising. Of course, banning flashing images wouldn't stop consumers from being unconsciously manipulated. No one realized it was already happening, and it was very successful. Raz, you stepped on my cliffhanger, even after I told you to stop.
Comic Relief
Well, I'm busting my hump in this bowl, and I think I deserve a little more scratch.
Narrator
Well, if you want to raise, then maybe you earn it. You don't just jump in and ruin the best part of the scene. In the late 19th century, Sigmund Freud popularized the idea we are motivated by our unconscious. Unconscious motivation is used in product marketing all the time because it works. Marketing expert Ernest Dichter used a Freudian technique, word association, to test consumers. He wanted to know not what they bought, but why. He learned that moms bought candy for their kids as a reward for good behavior in the grocery store. So he had stores move candy right next to the cash registers. They're still there today. Sanka was a decaffeinated coffee brand that attacked regular coffee in its ads. But consumers love coffee and felt Sanca was insulting coffee drinkers. So. So instead of attacking regular coffee, Sanka changed its slogan to now you can drink all the coffee you want, and
Expert Analyst
you can drink it as strong as you like. Drink five, ten cups a day, as many as you like, at any time you like. That's for sure.
Narrator
Sales went through the roof. Bill Friedman was a gambling addict who used his experience to shape how most casinos are laid out. Now, once you're in, you can't see any exits. You can't see any clocks. You can't see outside at all. These tactics disrupt our sense of time. There is constant Noise, even if the floor is mostly empty. This is designed to keep you in a heightened state so you don't get tired. Most casinos offer players free alcohol. This reduces inhibitions. And after all those free drinks, you need to use the restroom. But you have to weave your way through slots machines to get there.
Comic Relief
That's why I keep my own restroom right here. What?
Narrator
Why aren't you moving? You're going right now, aren't you?
Comic Relief
What? No, mind your business.
Narrator
Gross.
Comic Relief
What? I wash my fins.
Narrator
In a casino, there's no direct route to anywhere, especially an exit. Now a lot of this is common knowledge. It's slippery, but not dishonest, like changing a slogan or laying out a casino. It's out in the open. Edward Bernays was a pioneer in public relations and propaganda. He used tactics that were not out in the open. He manipulated public opinion in ways that were entirely unconscious. It makes sense. Bernays was good at talking to the subconscious. He was Sigmund Freud's nephew.
Expert Analyst
Whether it's to sell more paper cups that we work with or to make people more honest or more virtuous depends on public consent. And so we worked out the engineering of consent.
Narrator
His first campaign was in 1929. He influenced the entire nation without their knowledge. He was so good. He influenced you and you never knew it. New York City, April 1, 1929. It was noon on Fifth Avenue and the Easter parade was packed. One of the best attended in history. The event signaled the beginning of a new modern era. The cars were new, fashion was cutting edge, and cameras filmed the parade for the first time. A group of young women used this as an opportunity to put on an outrageous display. Something unthinkable, something women have never done in public.
Comic Relief
Yo baby, we're getting spicy. Bow chicka bow bow.
Narrator
The women strolled along the parade smoking cigarettes.
Comic Relief
Oh, oh, they smoked. After the outrageous display. Huh? What did they do? Was there leather involved? Oh, please tell me there was leather.
Narrator
Uh, no. Smoking was the outrageous display.
Comic Relief
Oh, well that's disappointing.
Narrator
And what is it with you and leather?
Comic Relief
Don't kink.
Narrator
Shame. Okay, never mind.
Comic Relief
Bow chick a bow bow.
Narrator
In 1929, women smoking in public was unacceptable. It just wasn't done. But these ladies didn't care about tradition. They wanted the first freedom and equality, to smoke in public, just like men. So they did. Suddenly, cigarettes were called torches of freedom. And the demand for cigarettes among women exploded. Women saw cigarettes as symbols of independence and freedom. They had no idea the whole thing was staged. Those weren't rebellious women fighting for equality. They were Actresses hired to play a part. Edward Bernays orchestrated the whole scene for his client, the American Tobacco Company. Bernays was so good at manipulating consumers he's affecting you to this day. Up until the 1920s Americans ate a light breakfast. Toast, juice, coffee, that was it. This was especially true for what they called brain workers. Folks who sat in offices all day. Then in August 1922 an article appeared in the New York Times.
Expert Analyst
Sometimes health advice is pleasant, requiring no work, no self denial. An interesting sample is offered in the Medical review of reviews. It queried doctors in 46 states. Three out of four physicians advise eating a hearty breakfast of bacon and eggs.
Narrator
Articles like this were all over, over the country. Doctors suggesting bacon and eggs for breakfast. This was a new and decadent idea. People loved it. Only there was no science behind the claims, no study. The whole thing was propaganda, coordinated by Edward Bernays. The Beechnut Packing Company wanted to increase bacon sales. So Bernays surveyed 5,000 doctors and asked them if a heavy breakfast was better than a light breakfast. He published the results making sure bacon and eggs were mentioned every time doctors described the ideal breakfast. Doctors that didn't think bacon was a good idea, well they got no ink. Bacon sales exploded and American culture changed forever. To this day 70% of all bacon is eaten for breakfast.
Comic Relief
Though it can be enjoyed at any time of day, for any occasion.
Narrator
I can't deny that.
Comic Relief
Mmm, bacon.
Narrator
Nature's candy. Bernays proved he could influence the behavior of an entire country. His success landed him a new client, a big one. They asked Bernays to do the impossible overthrow a foreign government. So Bernays would change history again. But this time he'd do it for the Ciacobo. Arbenz was elected as Guatemala's president in 1951 and it brought hope and optimism to the nation. His platform of social reform and economic development resonated with the people but not with the United Fruit Company. United Fruit was an American corporation, Guatemala's largest employer and landowner. Its banana plantations generated twice the revenue of the entire country. They wielded immense power.
Expert Analyst
Power.
Narrator
This is where the term banana republic comes from. In 1952 Arbenza's government passed a bill requiring the transfer of unused land from large landowners to poor farmers with compensation by the government. The United Fruit Company refused. The normal solution would be to lobby the Arbenz government and reach a compromise. But United Fruit wasn't looking to compromise. They wanted to win. So they hired Edward Bernays who went right to work. Bernays flooded American media with articles portraying Arbenz as a Dangerous communist. It was a lie. In his inaugural address Arbenz promised to convert Guatemala from a backward country with a feudal economy into a modern capitalist state. But the lie worked. This was the Cold War. A communist threat was just 1,300 miles from US soil. The American people demanded action and the CIA was more than happy to oblige. The CIA launched Operation PB Success in 1954. They funded and trained a rebel paramilitary force. On June 18th the Liberation army seized control of the government forcing Arbenz into exile. Carlos Castillo Armas was installed as a U. S backed military dictator. The first of many. Turmoil in Central America.
Expert Analyst
First there was Nicaragua, then El Salvador. Now comes Guatemala.
Narrator
For 40 years Guatemala suffered brutality, terror, death squads and political insurance instability. The human rights violations during this time are so graphic I can't tell you what they are. And whatever you're guessing, it's worse. 93% of these crimes were committed by CIA trained operatives. 200,000 dead. Another 200,000 fled. 1 million people lost their homes. But the United Fruit Company's profits were safe thanks to America's master of propaganda.
Expert Analyst
An interesting little insight into this covert action. 1. The U.S. ambassador to the United Nations, Henry Cabot Lodge had personal stock holdings in United Fruit Company. The Assistant Secretary of State John Lodge had personal stock holdings in United Fruit Company. The Secretary of State John Foster Dull Dulles. His law firm did legal work for I believe it's the Schlafly bank which held the papers on the Guatemalan railroad which was owned by the United Fruit Company. And the CIA director Alan Dulles was his brother also was a member of the same law firm with this indirect financial interest in United Fruit Co. Arbenz was not a communist and there was not a single country communist in his cabinet.
Narrator
Bernays proved you could subconsciously control a person's opinion. But the US military intelligence apparatus wanted more. They wanted to subconsciously control a person's actions. The subliminal was about to become weaponized. Psychological operations or psyops are a standard part of US military operations. The army field manual even calls them vital. The term psyops sounds mysterious but the tactics are usually nothing more than distributing leaflets or broadcasting propaganda over the radio. The goal is to influence enemy behavior using information instead of bullets and bombs. In the thick of the Vietnam War, with American casualties mounting leaflets weren't going to cut it. But the army had a powerful new tool that could directly target enemy the squawk box. The squawk box was a sonic weapon that used specially designed speakers mounted on armored Vehicles and helicopters. The human ear can suffer damage from sound over 85 decibels. The squawk box could deliver a devastating shriek at 120 decibels from 2 1/2/2 miles away. Vietcong soldiers were instantly incapacitated by the intense sound. They suffered pain, nausea, and often permanent hearing loss. But the squawk box could do more than inflict physical harm. The army discovered that sound waves could manipulate emotions, inducing distress and confusion in the enemy. The result were staggering. Between 1967 and 1968, an estimated 30,000 Viet Congs surrendered to US forces. Despite its success, the squawk box had a critical the enemy could hear it coming, literally. The army wanted a more deadly and discreet weapon, something the enemy couldn't see or hear. Sound waves couldn't do it, but electromagnetic waves, they absolutely could. In 1961, microwave technology was becoming part of daily life. Microwave ovens had just hit the market, and low levels of microwaves were used in lots of different devices. Biophysicist Alan Frey began studying microwave effects on humans to make sure there were no health risks. He placed subjects in a shielded room and exposed them to different microwave frequencies. At 1310 megahertz, something strange happened. A subject asked about a clicking sound, but the room was silent. It was shielded from the outside, and there were no moving parts involved in this experiment. Frey discovered that frequencies between 200 and 3000 MHz caused people to hear sounds that seemed to come from inside their heads. Clicks, knocks, buzzes and chirps. He could beam sounds directly into the brain without implants. Scientists started using this to train animals, making cats change direction with just microwave pulses.
Comic Relief
Now I'd like to make cats change direction right into oncoming traffic.
Narrator
Stop that.
Comic Relief
Well, you better tell your demon fur babies to keep their filthy mitts out of my bowl.
Narrator
Okay, settle down. The CIA wondered, could this technology affect an animal's heart rate? More specifically, could they induce a heart attack remotely? Frey experimented with frog hearts and pulse modulated radiation. He was actually disturbed to find he could increase a frog's heart rate. With no device attached, he did it remotely. Soviet scientists had similar results with rabbits. By 1972, the Soviets moved to human trials. A declassified report revealed they had done over 500 studies on how microwaves affect human behavior. Both lethal and non lethal effects were found. The mention of lethal effects was a horrifying new detail. They didn't mean to kill their subjects, but they discovered they could. And those that survived exposure could be remotely controlled. The US army loved it. They immediately ramped up research on microwave radiation. They ordered trucks capable of carrying microwave broadcasting equipment. The goal was to irradiate and immobilize the enemy. In 1976, the Navy finally discovered how Soviet scientists were accidentally killing people. They were using microwaves powerful enough to generate heat. Soviet scientists called it microthermal effects. If you own a microwave oven, you call this micro thermal effect. Cooking.
Comic Relief
The Russians cook people?
Narrator
Yep.
Comic Relief
I bet you taste like chicken.
Narrator
That's gross.
Comic Relief
Oh, oh, oh. Oh. Eating human is gross, but eating fish is okay. Hmm. Ah. See what happens when your shoes on the other fin?
Narrator
Fair enough. J.F. chappetz was a trusted black ops scientist who worked for the Department of Defense. He tried broadcasting commands into a subject's mind. It worked. Using low power microwaves, he could make subjects hear words inside their own heads. The military told Chapitz to go further. They wanted to send commands to a person's subconscious without them hearing the command. In a second round of experiments, one subject was bombarded with microwave radiation. Then something odd happened. He got up from his chair and left. He actually left the lab. Now this was allowed. The subjects weren't prisoners, but this had never happened before. A little while later, the guy returned with a can of soda. Chapitz asked him why he left in the middle of the experiment. The man said he was thirsty, so he went to the store for a cold drink. Chappet smiled. The experiment worked. This subject had been programmed to feel thirsty and to go to the store for a soda. It was hypnosis using microwaves. But hypnosis doesn't work on everyone. The military needed a sure thing, and four years later, that's exactly what they got. In 1980, Dr. Eldon Byrd, working for the DOD, was exploring frequencies much shorter than microwaves. He wanted to weaponize human brainwaves. Brainwaves, also known as neural oscillations, are patterns of electrical activity in the brain. These waves have different frequencies that correspond to different mental states. Beta waves for active problem solving, alpha waves for relaxation, and so on. Dr. Bird tried synchronizing external electromagnetic waves with brain waves. He believed he could influence specific thoughts and emotions by matching the frequency and ramping up the power. It worked. He discovered he could sync with an animal's brain waves and trigger the release of behavior regulating chemicals.
Expert Analyst
We could put animals into a stupor. We got chick brains to dump 80% of the natural opioids in their brains. We got rats to release histamine.
Narrator
Histamine is released in response to allergens, dust, pollen mites. Histamine also Causes a cascade of inflammatory reactions. Bird was thrilled.
Expert Analyst
In humans this would cause instant flu like symptoms and produce nausea. You would disable a person temporarily. It would have been like a stun gun.
Narrator
Byrd used the phrase would have been. Because his project was shut down after two years, despite being approved for four. He was onto something groundbreaking. He suspected the program wasn't shut down. He believed it was moved to black ops. And he was right. In 1982, a U.S. air Force report contained an ominous warning.
Expert Analyst
Understanding the brain as an electricity electromagnetically mediated organ suggests that impressed electromagnetic fields are capable of directing behavior further. The passage of 100 milliamperes through the
Narrator
myocardium can lead to cardiac standstill and death. The U.S. air Force was secretly continuing Byrd's brainwave research. They hired Dr. Ross Ady to weaponize it. Aty began by implanting transmitters into animal brains. These devices didn't receive information. The implants sent out information. Ade compiled a library of frequencies and their corresponding mental and physical states. Then he turned the animals brain waves against them. By broadcasting certain frequencies back into their brains, he could manipulate their behavior and their emotions at will. Eventually he refined the technique to work without implants. It was time to test the technology on the human brain. He placed the subject's head in an active electromagnetic field and tuned it to a specific frequency depending on the result he wanted. In one experiment, he turned the machine to induce theta waves. Our brains produce theta waves as we're falling asleep. The subject of the experiment fell asleep. The technology for a revolutionary new weapon was born. Now it was time to build it. A device that can manipulate a person's thoughts and emotions. Sounds like science fiction. At best it sounds like pseudoscience. But not only does such a device exist, but it's been patented. Although the full schematics are classified by the US government. Patent number 515-9703 issued to silent Sounds Incorporated describes something called a silent subliminal presentation system. The device maps electrical brain activity corresponding to specific emotions. These emotional signal clusters are identified and logged to create a database of emotions. Human brain waves are then cloned and enhanced. You select a desired emotion. Fear, despair, hopelessness. And the system can transmit it. The emotional triggers are carried by the Silent Sound Spread Spectrum or squad, A subliminal carrier technology that operates at either very low or very high frequencies. The key is that it's inaudible. And what makes this system more practical and more dangerous is that S Quad can be transmitted using a carrier frequency like ordinary radio or television. Okay, let's Say you want someone to feel sad. You grab the brainwave frequency for sadness from your database. Then you layer that inaudible sound wave on top of an audible sound wave, like an FM radio wave. So the target hears the radio broadcast but doesn't realize a second wave hitched a ride. That second wave syncs with the target's brain, triggering sadness, or whatever emotion you want. According to the patent, the resulting emotion is overwhelming. Now, the patent insists that this is not a weapon, but it does note the waves are subliminal and undetectable. That makes them dangerous. Silent Sounds Inc. Claims to focus solely on positive emotions. But in 1996, the president of Silent Sounds couldn't stop himself from bragging about the device's true purpose.
Expert Analyst
While the schematics are classified by the US Government, we are allowed to say we work with governments around the world,
Narrator
the Germans, even former Soviet Union countries. And then he let the big one slip.
Expert Analyst
The system was used throughout Operation Desert Storm quite successfully.
Narrator
The US Military had achieved subliminal mind control and deployed the technology in Iraq. And many Iraqi troops died trying to stop it. In 1991, Saddam Hussein occupied Kuwait with a huge army, nearly 500,000 soldiers. It was the fifth largest military in the world, and they were battle tested from eight years of war with ir. So it sounded like wishful thinking when the Bush administration said they wanted Iraqi troops to simply lay down their arms and go home.
Researcher
Huh?
Narrator
Why would they do that? Because the US Military had a new secret weapon, a radio station in the small town of Kafji. If you tuned into the station, you'd hear music or news like any radio station. But embedded in the radio transmission was a signal that mimics a brainwave frequency, specifically, the frequency that creates the feeling of hopelessness. And it worked. Entire battalions laid down their arms. Iraqi tanks flew white flags. They simply lost the will to fight. American troops rolled into Kuwait, heavily armed and ready for battle. Iraqi troops were waiting patiently, thousands of them. One Marine said they were surrendering so far fast they could hardly keep up. The war seemed to be coming to an end. That's why it was a surprise to the Marines in Kafji when, around 8pm on January 29, Iraq's 5th Mechanized Division attacked and took the town. This was a much needed propaganda victory for Iraq. But it didn't last.
Expert Analyst
I would tell you, I don't think that battle is over by a long shot. I expect a lot more fighting. We'll probably occur tonight.
Narrator
Two days later, American air power overwhelmed Kafchi and the 5th Mechanized Division. Was completely wiped out. But they destroyed the transmitter that was subliminally making Iraqi troops surrender. So they accomplished their mission. Or did they? US government officials deny any of this ever happened and are adamant that such a system does not exist. Former Navy weapons research director Charles Barnard was asked about it.
Expert Analyst
I have yet to see one of
Narrator
these ray gun things that actually works.
Expert Analyst
And Darba has come to us every few years to see if there are ways to incapacitate the central nervous system remotely, but nothing has ever come of it. That's too science fiction and far fetched.
Narrator
Okay, so it's just a conspiracy theory. The CIA did not use FM radio to transmit subliminal messages. That's the official position. But here's something strange. A ceasefire agreement was reached that allowed Saddam Hussein to remain in power. This brought a lot of criticism of the Bush administration. But the purpose of the war was to free Kuwait, not overthrow the Iraqi government. Our goal is not the conquest of Iraq. It is the liberation of Kuwait.
Expert Analyst
It is my hope that somehow the Iraqi people can and even now convince
Narrator
their dictator that he must lay down his arms. But on March 1, 1991, one day after the ceasefire, a revolt against Saddam Hussein's government broke out in Basra. The rebellion spread to every major city in southern Iraq. Up to 100,000 Iraqis were killed. A no fly zone was established. So what caused this sudden rebellion? A radio broadcast called the Voice of Free encouraged the revolt. That radio station was in a small town in Saudi Arabia and operated by the CIA. Most say this is just a coincidence, that no subliminal weapons exist. Maybe. But there are others who believe that not only does this subliminal technology exist, it was deployed in Iraq for a specific purpose. It was a test run for something bigger. The following year, a facility was built in Fairbanks, Alaska. The project was run by DARPA and had a huge budget. The Department of Defense built a high powered transmitter that could send electromagnetic pulses into the ionosphere and anywhere in the world. It's called haarp, but that's a different episode.
Morgan
I was caught in the middle of a server rack. Thunder I look around and I knew there was no white hat. Thunder my mind raced and I thought,
Comic Relief
what could I do?
Morgan
Thunder and I knew there was no help, no helpful cpu. Thunder sound of cd he romps. This might be the only Faraday case. It's more dangerous inside than out. Anyway. Since apparently the machines weren't satisfied messing with your phone, your ears or your subconscious, they decided to look up and say, what if we also controlled the Sky. This one gets into Tesla's stolen ideas. Secret antenna fields, weather mods, and the kind of machinery that makes a beaver build up bunker. Because if the heavens are compromised, buddy, we may have run out of places to hide.
Narrator
A blinding flash lit the Siberian sky. The explosion was 100 times more powerful than Hiroshima. It flattened 80 meters. Million trees across. 830 square miles. No crater appeared. No meteor fragments were found. Scientists struggled for decades to explain what happened at Tunguska, thousands of miles away. Nikola Tesla smiled in his Wardenclyffe Tower lab. His Tesla ray had worked perfectly. When Tesla died in 1943, government agents seized his research. Decades later, HAARP appeared in Alaska. 180 Antennas beaming energy into the ionosphere. The military calls it research. But declassified documents tell a different story. What would have been Tesla's greatest gift to the world became the world's most powerful weapon.
Researcher
Foreign.
Narrator
Nikola Tesla built Wardenclyffe. The 190 foot tower on Long island wasn't for radio signals. It was for wireless energy transmission across the planet. And this wasn't theoretical. Tesla demonstrated wireless power at the 1893 World's Fair. He lit phosphorescent tubes without wires. The crowd was amazed. Tesla believed Earth could conduct electricity like a circuit. The secret was the ionosphere, an electrically charged atmospheric layer starting 50 miles up. By pumping electromagnetic energy into this layer, he could create a planet wide resonance system.
Comic Relief
Whoa, whoa, whoa, whoa. A planet wide resonance system? Oy vey. Hello, tech support. Yeah, my human is speaking nerd again. I need a translation.
Narrator
Well, think of it like pushing a child on a swing.
Comic Relief
Guppy.
Narrator
Think of it like pushing a guppy on a swing. Small pushes, timed right create large sustained motion. Tesla wanted to push the ionosphere at a frequency matching the Earth's resonance. This would create stable waves circling the planet. Earth resonates at 7.83 Hz. And this was proven in 1954. Tesla suspected this, but wasn't certain he needed financing to continue. JP Morgan initially funded the project, but withdrew when he realized Tesla wanted to provide free electricity worldwide. Morgan asked if anyone can draw on the power, where do we put the meter? Without Morgan's support, Tesla was ruined. In the 1930s, Tesla announced Teleforce. The press called it a death ray. Tesla said it can generate an invisible wall of energy capable of destroying aircraft and armies from hundreds of miles away. We have a whole episode on Tesla's death ray and Wardenclyffe Tower if you want to learn more. When Tesla died in 1943, the US government responded fast. His body was still warm as his entire legacy was packed into government crates. Tesla's dream died with him. But his research lived on in the hands of men who saw not free energy, but unlimited power. Tesla's technical documents were sent to an MIT professor for review. That professor was Dr. John Trump, the future president's uncle. Dr. Trump, also a National Defense Research Committee member, said Tesla's research contained nothing valuable. That wasn't true. Oh, look.
Comic Relief
Make America lie again.
Narrator
The military quietly continued Tesla's work. Some research went to Wright Patterson Air Force Base under Project Nick. This was a top secret operation launched in 1945 to study Tesla's particle beam weapon. Project Nick's details remain classified. The project was officially abandoned, but particle beam research continued. DARPA launched project seesaw in 1958. Like Project Nick, Seesaw was heavily funded for years. And like Project Nick, Seesaw was quietly shut down. During this time, Tesla's particle beam technology disappeared. Nobody knows what happened to it. Then, years later, DARPA and the US Air Force built an expensive secret facility in Alaska. The technology there would look familiar to Tesla historians. The military claims the facility is only for research. But that's not what the patents say. In 1987, physicist Bernard Eastland filed a patent titled Method and Apparatus for Altering a Region in the Earth's Atmosphere, Ionosphere and or magnetosphere. The patent described a facility that could heat specific ionosphere portions using radio waves. Eastland wasn't working alone. ARCO Technologies funded his research. ARCO owned vast natural gas reserves in Alaska's North Slope, but had no buyers. They saw Eastland's invention as a way to convert their gas into something valuable. Power. And Eastland's technology needed lots of power.
Expert Analyst
Arco originally approached me in 1984 to find a use for the natural gas on the North Slope of Alaska, which they could not sell. To give you a feel for how much gas they asked me to find an application for. It was enough gas to produce all the electricity in the United States for a full year.
Narrator
The technology is straightforward. A powerful radio signal is transmitted into the ionosphere, targeting a specific region. This energy excites charged particles, heating them and altering their properties. The heated region acts like an optical lens. But instead of bending light, it bends and redirects radio waves. This includes radar signals and natural currents in Earth's upper atmosphere. This is like inserting a resistor into a global electrical circuit. The lens could create effects thousands of miles away from the transmission site. Within a year of Eastland's patent filing, Arco Was awarded a contract to build a similar facility in Alaska. When locals read about it in the March 1988 Omni magazine, they grew concerned. The military insisted they were building a research facility, nothing more.
Comic Relief
Do not believe the government.
Narrator
They didn't. They looked up Eastland's patent and the language was crystal clear.
Expert Analyst
Applications discussed in the patents included destroying missiles. Communications control and disruption were included. There were some other ideas, Both to possibly modify weather and finally to lift a portion of the upper atmosphere further out into space, where hopefully it would be able to deflect missile trajectories.
Narrator
Those are Eastland's own words. This wasn't an invention for ionospheric research. As HAARP rose in the Alaskan wilderness, the military's intentions were obvious. They weren't just studying the sky, they were weaponizing it.
Expert Analyst
There are several high powered radio antennas around the world, but in relation to HAARP, they're like a child's cap gun compared to a 50 millimeter cannon.
Narrator
When locals discovered what DARPA and the air Force were building in Alaska, they demanded answers. The military admitted to building antennas that could affect the atmosphere, but insisted they use technology different than Eastland's patents.
Comic Relief
Hang on, hang on. Let me see if I follow.
Narrator
Go ahead.
Comic Relief
Tesla dies, the government steals his plans for a death ray machine. They lose the plans. Then by some miracle, they find a guy who patents a bunch of stuff based on Tesla's death ray machine. I said I gave him money to build this harp thing, but they're not using his stuff. They're using some other stuff and it's all fine, nothing to see here. Is that about sum it up? Bull.
Narrator
Eastland later confirmed the military's interest in his work before his death in 2007. He said HAARP is the perfect first step toward a plan like mine. There are powerful people involved. The military national sleeps.
Expert Analyst
When you look at the other patents built upon the work of Eastland, it becomes clear how the military intends to use a HAARP transmitter. It could give them a tool to replace the electromagnetic pulse effect of some atmospheric thermonuclear devices, still considered an option by some planners. It can replace the huge, extremely low frequency submarine communication system. It could replace the over the horizon radar system once planned for the current location of HAARP with a much more accurate system.
Narrator
The technical similarities between HAARP and Eastland's patents are obvious to engineers. By 1993, DARPA and the Air Force had built a machine that could turn weather into a weapon. And they were excited to show off their new toy.
Expert Analyst
The statement that there is no association between the ionosphere and surface weather is an outright lie. We can artificially influence the Earth's aurora with a relatively small amount of energy. And we know that outbursts of the northern lights do change weather patterns. There is indeed mounting evidence that upper atmospheric events affect lower atmospheric weather and vice versa.
Narrator
In 1996, the US Air Force published weather as a force multiplier. Owning the weather in 2025. This wasn't science fiction. It was a military assessment of weather modification as a combat. The paper stated weather modification will become part of domestic and international security and could be done unilaterally. It could have offensive and defensive applications and even be used for deterrence purposes. Weather warfare isn't new. During Vietnam, the US Conducted Operation Popeye Cloud seeding to extend monsoon season reason over enemy supply routes. They called it making mud, not war.
Comic Relief
The military and it cut operation names. It's like naming your guillotine Mr. Snippy.
Narrator
For years, the idea of creating rain with electricity was a conspiracy theory.
Comic Relief
But then.
Narrator
But then Dubai.
Expert Analyst
Dubai is making it rain in a sweltering desert by zapping clouds with electricity using drones.
Narrator
Fascinating, isn't it? Critics argue haarp's power is too low to affect global weather. A lightning bolt contains 1 billion watts. A hurricane releases energy equal to thousands of nuclear bombs. How could HAARP compete? Well, the answer is Chaos Theory. Weather is a chaotic system, and chaotic systems, small changes trigger larger events. The classic example is the butterfly effect. We're not playing pub trivia.
Comic Relief
Sorry, sorry, go ahead.
Narrator
Haarp's designers understood Chaos Theory. They didn't need to match nature's power. They just needed to know where to apply the pressure. A butterfly's wings can start a tornado. And HARP was the most powerful butterfly ever created.
Expert Analyst
What they're not paying any attention to is what's happening to the ionosphere. If they pick the right frequency to push that plume out into space, that energy may discharge back out of the ionosphere, back down the radio beam, and strike the Earth. And it would be about a hundred times the energy released out of a thunderbolt. Picking up now. And it would be about a hundred times the energy released out of a thunderbolt.
Narrator
Meteorologist Edward N. Lorenz presents this concept in 1972. And his point was, something as small as a butterfly could set off a series of events that eventually lead to a tornado. History is full of butterfly effects. Hitler wanted to be an artist, but he was rejected by the art school in Vienna. He Chose a different path. On August 9, 1945, the City of Kokura was supposed to be hit with an atomic bomb. But it was too cloudy to find the target, so Nagasaki was chosen instead. HAARP doesn't need to match nature's power. It needs a tiny, precise nudge at the right place and time to trigger catastrophe. By 1977, weather manipulation was such a concern that the UN banned it through the Environmental Modification Convention.
Comic Relief
Did the United States military listen to the UN?
Narrator
No.
Comic Relief
Nuh.
Narrator
The UN specifically addressed HAARP in 1999, again calling for a ban on technologies that can alter the environment for military purposes.
Comic Relief
Did the United States military listen to the UN this time?
Narrator
No. The UN issued multiple resolutions calling for transparency, oversight, and international monitoring of facilities like HAARP.
Comic Relief
Did the United States military. Oh, never mind.
Narrator
In 2002, Russian President Vladimir Putin expressed concern about geophysical weapons that could alter the weather. He was talking about haarp. Then Russia and China built their own ionospheric heaters. They saw the military value. An arms race nobody talks about is happening above our heads right now. But HAARP had another ability, more powerful than changing weather. By pulsing radio waves at specific frequencies, HAARP created low frequency waves that penetrate deep into the earth and oceans.
Expert Analyst
What's most scary and exciting about HAARP is the potential of its application. For example, ELF waves generated by the array could be used for a variety of military applications, including finding underground bases, tunnels, even caves. The government is interested in HAARP technology because it's a new frontier, a new way to solve an old problem.
Narrator
These waves oscillate between 1 and 100 Hz, precisely within natural atmospheric resonance. Then scientists wondered what would happen if those energy waves were directed not at the atmosphere, but at fault lines deep within the Earth. When scientists examine earthquakes, they focus on two Tectonic stress and resonant frequency. Every object vibrates at a natural frequency. Metal rock. Your body. Exposing an object to its natural frequency amplifies vibrations. And sometimes vibrations grow so strong, they damage the object, like sound shattering a glass. This is called resonant frequency induced material failure. It works on large objects, too. A famous example of is the collapse of the Tacoma Narrows Bridge in 1940. Wind hitting the bridge at its resonant frequency created vibrations that tore it apart. The Earth's tectonic plates also have a resonant frequency. Fault lines are cracks in the Earth's crust that build up enormous tension as they move against each other. The right trigger can release this tension.
Expert Analyst
In 1983, I did radio tomography with 30 watts looking for oil in the ground. I found 26 oil wells over a nine state area. And 100% of the time was accurate with just 30 watts of power beaming straight into solid rock. HAARP, or the the High Frequency Active Auroral research project uses 2 billion watts beamed straight into the ionosphere for experiments. Now that's profoundly dangerous.
Narrator
On January 2, 2020, a devastating 7.0 magnitude earthquake struck Haiti, killing over 200,000 people. What made this earthquake suspicious was its location. It occurred carried along a fault system that behaved differently than geologists had predicted. And several monitoring stations recorded unusual heating patterns and electromagnetic anomalies in the ionosphere over Haiti. HAARP was active during this period. Venezuelan President Hugo Chavez accused the United States of causing the earthquake using tectonic weapons.
Expert Analyst
Spanish newspaper ABC quotes Chavez as saying
Researcher
that the US Navy long launched a weapon capable of inducing a powerful earthquake
Narrator
off the shore of Haiti. And this theory was dismissed until researchers examined the technical possibility. Similar patterns appeared with other seismic events. The 2008 Sichuan earthquake killed nearly 90,000 people. Some researchers saw correlations between this disaster and haarp operations. The 2011 earthquake that triggered of the Fukushima disaster also coincided with ionospheric anomalies detected by multiple stations. These correlations concern China enough that in 2018, they launched the China Seismo electromagnetic satellite, designed to study connections between ionospheric disturbances and earthquakes. Chinese researchers published papers examining correlations between ionospheric heating and seismic activity. As evidence mounted, a pattern emerged. Major earthquakes were occurring where HAARP's energy had been detected hours earlier. But the most disturbing application of this technology had nothing to do with the sky above us or the ground beneath our feet. HAARP's technology could penetrate the ultimate boundary the human mind. The human brain operates within specific frequency ranges, from about 1 hertz to 40 hertz, depending on how alert you are. These are elf sounds.
Comic Relief
Hop sounds like an elf. We talking Legolas or what? A Santa slaves.
Narrator
Not elf. Elf.
Comic Relief
Oh, my second wife generated elf sounds extremely loud and furious.
Narrator
That's not what elf stands for.
Comic Relief
Yeah, tell that to a lawyer. After 15 minutes of her elf, I signed over the keys to my 84 Camaro. Oh, I love that car.
Narrator
ELF means extremely low frequency. HAARP can generate waves in exactly the same range as human brain waves. When you ask HAARP officials about this, they point out their antenna array doesn't generate ELF waves directly. But when you ask the government questions, you have to be specific. HAARP can't generate ELF waves. That's true. But it can heat the ionosphere in a way that creates ELF waves as a byproduct. Documents show that HAARP generated ELF waves for years. This is concerning because electromagnetic fields can influence brain function. The phenomenon is called Frequency following response, or FFR. Dr. Nick Begich, author of Angels Don't Play this Harp explains, it has the
Expert Analyst
ability of affecting the frequency following response, which is where the brain locks onto an external signal, begins to mirror it, and brain chemistry changes.
Narrator
So even simpler than that is HAARP can control minds.
Expert Analyst
Absolutely can control in the sense of changing mental function.
Narrator
Begage is called a conspiracy theorist. But FFR is proven science. And you know who proved it? The U.S. military. In the 1980s, Dr. Michael Persinger conducted research partly funded by the U.S. navy. He showed that weak electromagnetic fields applied to the temporal lobe could induce altered states, including religious experiences and hallucinations. When exposed to an external frequency, the brain tends to synchronize with it. This is why bright flashing lights can trigger seizures in some people.
Comic Relief
Oh, is this why every time I'm in a dentist office, I suddenly know all the lyrics to It's Raining Men?
Narrator
I don't think so.
Comic Relief
Oh, good. Hallelujah.
Narrator
Amen. The European Parliament takes this technology seriously. Resolution A4005, 1999, specifically mentioned HAARP. While expressing concern about manipulative capabilities affecting human health and psychology, the resolution called for transparency regarding HAARP's ethical implications.
Comic Relief
Does the United States military listen to the eu?
Narrator
No. Because HAARP uses the ionosphere, it could influence mental states of people over large areas. It could cause hallucinations, alter emotions, induce seizures, all without their knowledge. HARP officials deny mind control allegations, but the CIA denied researching mind control too. Then MK Ultra was exposed and showed the CIA was exploring the exact same technology. Other countries were paying attention. In 1998, a Russian military journal published the Mind has no Firewall. It was later republished by the US Army War College. The article warned, the human mind is vulnerable to electromagnetic intrusion. Mind control technology is not science fiction, it's science fact. And as the United States continues to refine its capabilities, other world powers are racing to catch up. The HARP conspiracy theories go back to the 1980s. The story has been covered so much that I was surprised at how many people asked me to do this one. But in researching haarp, I was surprised at how scientifically possible all the theories are. I was also surprised that so much of the science is based on Tesla's work. But how much of this is true? Well, first, HAARP is definitely a high power radio transmitter designed to heat the ionosphere for research. The facility is real. It operates. It conducts legitimate scientific experiments. These are facts. Second, defense agencies funded and operated HAARP for most of its history. The Air Force, Navy and DARPA don't typically invest hundreds of millions of dollars in purely scientific projects without military applications. This doesn't prove he's a weapon, but it suggests HAARP has capabilities that beyond what's publicly acknowledged. Third, the patents that formed HAARP's foundation specifically describe weather modification and earth penetrating applications. Bernard Eastland, who developed these patents, Confirmed their potential military uses before he died in 2007. The more extreme claims about HAARP causing specific hurricanes or triggering earthquakes lack depends definitive proof. Correlations exist between HAARP operations and certain disasters. But correlation isn't causation. Earthquakes and severe weather existed long before HAARP. The facility's 3.6 million watts seems too low to directly cause major weather events or earthquakes. But scientists confirm weather systems are chaotic enough that small targeted inputs could have major effects.
Guest Singer
Effects?
Narrator
Claims about mind control also can't be proven. But the science of electromagnetic influence on brain function is real and well documented. HAARP generates frequencies that overlap with human brain waves. But the signal reaching populated areas would probably be too weak to have any noticeable effects.
Morgan
Maybe.
Narrator
Probably. In 2015, HAARP ownership transferred from the military to the University of Alaska Fairbanks.
Expert Analyst
The University of Alaska Fairbanks is preparing to take control of the High Frequency Active Auroral Program, more commonly known as harp, next month.
Narrator
Officials called this a move toward transparency. Critics saw it as rebranding a military weapon as an academic resource. The university now allows public tours and independent researchers. But former DARPA employees have said the most sensitive equipment was removed before the handout over. What remains is only a fraction of HAARP's capabilities. So is HAARP an innocent research project or a doomsday device? Well, the truth is probably somewhere in between. Like many advanced technologies, it exists where scientific research overlaps with potential military use. What makes HAARP concerning isn't what we know, but what remains classified.
Comic Relief
I like certain pharmaceutical trial documents that they once sealed for 75 years.
Narrator
Despite many freedom of information requests, significant portions of HAARP's operational history and technical capabilities remain redacted or withheld. This continued secrecy decades after HAARP was built will continue to fuel speculation. In many ways, HAARP represents our species growing capacity to affect natural systems on a planetary scale, Whether through climate Change geoengineering, or manipulating the ionosphere. Humanity can alter Earth's basic systems, often without fully understanding the consequences.
Comic Relief
How dare you. Oh, you didn't see that coming.
Narrator
HAARP also says something about power. The power structure that most affects our lives remains hidden. We're told not to worry. We're told the military is looking out for us. But history teaches a different lesson. From Project MK Ultra to Operation Northwoods, secrecy rarely serves the public good. The technology Tesla dreamed would liberate humanity now sits behind barbed wire fences operated by organizations with classified budgets and limited oversight site. Tesla's dream wasn't just about free energy. It was about free knowledge. The military took both. So what can we do? Question everything. Research. These facilities support independent monitoring, demand transparency. Because as the skies above us become weaponized, we can't remain silent to those who. Because in power, our silence is interpreted as only one consent.
Morgan
Terminals gathered in their masses, just like gritchy Weber dresses. Mailer Damon Plots Malfunction Sorcerer of death's disruption in the fields. The botnet's burning as the Tor machine keeps turning. Now, this is where the whole thing changes. Because up until now, the machines have mostly been watching, listening, whispering, nudging, and vibrating our soft mammal brains like a sneaky shake weight. But Stuxnet showed the world that code doesn't have to stay inside the machine. It can bring down factories, power grids, and nuclear facilities and start breaking real things in the real world. That's not a virus. That's a digital raccoon with rabies and a thirst for death and hatred to mankind, poisoning their analog minus. Oh, Lord. Yeah.
Researcher
In 2010, a computer virus was discovered in thousands of the control systems that operate factories, power plants, and nuclear reactors around the world. This virus was 20 times more sophisticated than any malware ever recorded. It could halt oil pipelines, destroy water treatment plants, and bring down entire power grids. This virus was called Stuxnet, and we should all be concerned. Let's find out why. In January 2010, inspectors from the International Atomic Energy Agency were visiting the Natanz uranium enrichment plant in Iraq. They noticed that the centrifuges, which are used to enrich uranium gas, were tearing themselves apart, one after another, hundreds of them. Nobody could figure out why. Not the inspectors, not the Iranian technicians who worked on site, not even the engineers who built the system. Meanwhile, a computer security firm in Belarus got a strange request from a client in Iran. Their machines were rebooting over and over again, even completely wiping the hard drives and reinstalling the operating systems. Didn't help. Again, the problem was a mystery. But when the technicians pulled apart the operating systems, they found a new and very unusual virus. They called it Stuxnet. Stuxnet was infecting computers all over the world and spreading fast. Now, these events seemed unrelated at the time, but they were very much connected. Cybersecurity experts knew Stuxnet wasn't ordinary malware thrown together by some basement hacker. The first clue was the size of the code base. Most viruses are 10, maybe 20 kilobytes. Stuxnet was 500 kilobytes, and uncompressed, it was 1.2 megabytes. That's a pretty large piece of code to go undetected. Then analysts transferred Stuxnet to a new computer just to see what would happen. Now, the test computer was not your grandma's old Compact laptop from 1997. The machine was a state of the art, highly protected workstation designed for cybersecurity threat detection. All the bells and whistles. But as soon as the Stuxnet files were copied over, the new computer was immediately infected without anybody doing anything and without triggering a single alert. And that's very unusual. When you install software in your computer, it needs to be digitally signed with a trusted certificate. And the developer supplies a certificate that your computer checks against trusted manufacturers. Apple, Logitech, whatever. A lot of viruses tamper with the signature to try to trick your operating system into allowing it to install. Luckily, virus protection usually catches this, and you've probably seen that warning when you're trying to install software that's not from a trusted source. This catches a lot of nasties. But Stuxnet didn't have altered certificates. It had valid certificates stolen from two trusted sources. JMicron and Realtek. Now, these companies make all kinds of drivers for hard drives, USB sticks, sound cards, tons of stuff. You probably have their software on your computer right now. I definitely do. And when the creators of the Stuxnet worm signed their files with a stolen cert, they wanted to make sure that Windows would install it very quietly without any warning. And if anyone bothered to look at the cert, they wouldn't care, because it was valid. Stealing a valid digital signature is like trying to rob a bank vault that's locked inside another bank vault. The security around them is sci fi, spy movie level stuff. They had to physically steal the certificate from inside. These companies, that really doesn't happen. But it happened some more. Digging around the code showed that as soon as Stuxnet infected a computer, it started probing the system, looking for flash Drives, USB sticks and other storage devices. And because of the signing certificates, Windows happily allowed it to do so. What security experts had discovered is one of the rarest and most dangerous kinds of software vulnerabilities. And it was at this time that they went from curious and amazed to fearing for their lives.
Narrator
Look, I'm not suicidal. If I show up dead on Monday, you know it wasn't me.
Researcher
What security experts had discovered is called a zero day exploit. And it's called this because when a vulnerability is unknown to the software developer and Microsoft and the antivirus community and the rest of the world, that means there are zero days of protection against it. Nobody knows about a zero day vulnerability except the attacker exploiting it. A zero day is so rare and valuable that you can actually sell it on the darknet for hundreds of thousands of dollars.
Comic Relief
Not a good idea.
Researcher
It's not. Think about this. Cybersecurity Companies research over 12 million viruses a year, and in that time they might find maybe 10 or 12 zero day exploits. It's a once in a million occurrence. But Stuxnet contained four zero day exploits. This is unheard of. It never happened before and it hasn't happened since. Eventually it was discovered that stuxnet was wasn't trying to steal passwords or data. It was actually targeting the software on Siemens programmable logic controllers called PLCs. PLCs are small computers used in factories and industry that control pretty much everything. Assembly lines, water pumps, power plants, and nuclear refining. Critical infrastructure runs on PLCs. If you can hack a PLC, you can take down an entire country without firing a single shot. Now this had people very nervous because industries all over the world were reporting their PLCs were infected with Stuxnet. But it was just sitting there. Nobody knew what it was going to do or when was the power grid just going to turn off? Was water or gas going to stop flowing? Nobody knew. It felt like a ticking time bomb because it was. Even though the virus was spreading all over the world, to thousands of computers per day, it was primarily targeting one country, Iran. More specifically, it was targeting the Iranian nuclear facility in Natanz.
Comic Relief
That doesn't sound like an accident.
Researcher
It wasn't. A virus this complex and this dangerous requires millions of dollars to create. It takes time, the best programming talent in the world, and absolute secrecy. Experts at first suspected, and then they were positive, that still stuxnet could only have been designed by a country looking to cripple or wage war against another country. This was a state sponsored attack to design and deploy a cyber Weapon like Stuxnet, you need immense financial resources, a military intelligence infrastructure, and a motive to wreak havoc on an enemy nation.
Comic Relief
Do we know what country created it?
Researcher
We do, but they won't admit it.
Comic Relief
So who made this thing?
Researcher
Ah, you're not gonna like it.
Comic Relief
Oh, sh.
Expert Analyst
An intelligence agency, Probably. Probably. Who has an interest in setting back the Iranian nuclear program.
Narrator
Yes.
Researcher
Stuxnet was aggressive, but very quiet. If Stuxnet is on your computer and you plug in a USB thumb drive. Boom. The USB drive is immediately and quietly infected. You don't have to run a program, open a website page, or click anything. You then plug that USB drive into a different computer on a different network. Boom. Every machine on that network is infected. And this is exactly what happened in Iran. The nuclear centrifuges at Natanz were air gapped, meaning they weren't connected to any outside network. And this is usually a good way to keep a network secure. The only way to infect a clean air gapped network is user error. Yep. User error. Outside contractors who were brought in to work on the Iranian nuclear facility in Natanz had also brought Stuxnet in through infected USB drives. And once Stuxnet was in, it deliberately targeted the Siemens PLCs, which operated uranium enrichment equipment. So these PLCs control the rate of spin in a nuclear centrifuge? Spin. Too fast or too slow, the entire thing tears itself apart. So Stuxnet got into the centrifuges and. And then.
Expert Analyst
Yeah.
Comic Relief
And then what?
Researcher
And then it did nothing. It just looked around and kept logs of everything happening in the equipment. But after 13 days, Stuxnet started changing the speed of the centrifuges every 15 minutes, sometimes faster, sometimes slower. Normally, this is something a technician would spot immediately, but Stuxnet was using the data it collected earlier to report back that everything was fine.
Comic Relief
Let's. But everything wasn't fine, was it?
Researcher
It was not. Because Stuxnet changes the rate of spin every 15 minutes, the equipment weakens and eventually tears itself apart. Stuxnet was also disrupting power feeds, causing centrifuges to explode. And once the equipment started to fail, there was no way to stop it. Even those big red buttons you see on machines that you hit in case of emergency, those were disabled, too. Somehow, Stuxnet thought of everything. Not only was this virus created by highly talented programmers, there was obviously input from experts in nuclear enrichment technology, reactor operations, safety protocols. That is a dangerous virus. Over a thousand uranium centrifuges were destroyed by Stuxnet. This set Iran's Nuclear enrichment program back months, maybe years.
Comic Relief
Why?
Expert Analyst
Well, Iran's nuclear ambitions must be stopped. They have to be stopped. We all have to stop it. Now, that's the one message I have for you today. Thank you.
Researcher
In the early 2000s, Iran was ramping up its nuclear energy and enrichment program. This was in violation of international agreements, so a lot of the work was done in secret. Also a violation. Now, Iran argued that it had a right to pursue nuclear energy. But US and Israeli intelligence agencies. Agencies suspected Iran of using its civilian nuclear program as cover for weapons development. So the US imposed sanctions and all sorts of other things to try to pressure Iran to slow down its nuclear program and deal. But even with Stuxnet and other setbacks, Iran kept enriching uranium. They said that they needed nuclear power to provide energy to the population.
Narrator
Energy?
Comic Relief
Don't they make oil over there?
Researcher
Look, look, I'm just telling you what happened. I'm not taking side. This isn't a political channel.
Comic Relief
Fine, fine, fine. Go ahead.
Researcher
So every time Iran agreed to suspend its enrichment program, diplomatic talks would break down and they would go back to work. Then they would stop again and start again. And it went on like this for a while. But then the CIA received thousands of pages of documents indicating that Iran was modifying the nose cone of a missile to carry a nuclear warrant.
Comic Relief
Oh no.
Researcher
Oh yes. Then it was discovered that Iran had acquired and hidden from inspectors blueprints for more advanced centrifuge tech. Iran claimed that these documents were forged, but later admitted that they had secretly imported equipment from a foreign source. Now, by this time, Israel was getting fed up and threatening military action. Now, bombing Iranian nuclear facilities might have been been a short term solution, but almost certainly would have led to war in the region and perhaps globally.
Comic Relief
Oy, they not another war.
Researcher
Yep, another war. So the US's intelligence community, including NSA, CIA, and the newly formed US Cyber Command, got to work on what they called Operation Olympic Games. Olympic Games was a campaign of cyber intrusion, disruption and sabotage of Iranian.
Comic Relief
Wait. The US government created Stuxnet?
Researcher
What, I haven't given you enough clues?
Comic Relief
Well, I was just so enthralled with the story.
Researcher
I appreciate that. Now, officially, no country has acknowledged developing Stuxnet. But through leaks at NSA and CIA and using common sense, it's generally believed that Stuxnet was developed by the United States with help from Israel, the UK and their allies.
Comic Relief
Dumb question.
Researcher
Go ahead.
Comic Relief
When you destroy something with a bomb or with a virus, isn't it the same thing?
Researcher
Well, funny you should ask that.
Narrator
It's an act of war. Please, let's be frank here, okay?
Researcher
Countries are constantly hacking each other and spying on each other, looking for information. And most countries have agencies and protocols to protect against this. It's a game of intelligence, cat and mouse. It's been going on forever. But stuxnet was the first time a nation state developed proactive, offensive weaponized code that could do actual physical damage to another country. If a nuclear reactor could be destroyed from the inside, what other real world damage could Stuxnet or other malicious code do? If you attack a power grid or a water supply, lots of. Lots of people are gonna die. So Iran felt like this was not a simple covert act of espionage, but a blatant act of war committed by the US and its allies.
Comic Relief
What did they do about it?
Researcher
Well, what would you do?
Comic Relief
Fight back.
Researcher
That's exactly what they did. Iran sent out a virtual call to arms and quickly built one of the largest state sponsored hacker groups in the world. They got to work. They attacked Saudi Aramco, the largest oil company in the world, and destroyed every computer they had. 30,000 machines. Hard drives were wiped clean, phone lines were down, email offline. It was a nightmare. Then they went for America's financial infrastructure and levied attacks against Wells Fargo, PNC and Bank of America, taking down banking systems all over the world. And there were other attacks. Now, Iran didn't officially take credit for these attacks, but then again, they didn't really have to. The message was clear. Come for us, we'll come for you. PLC attacks did happen before. Stuxnet. Viruses have destroyed power generators, dumped raw sewage on cities, disrupted railways. There was even an attack in the 90s against Worcester Airport in Massachusetts that grounded flights for a day. But those attacks were done by single hackers and disgruntled employees. When you have the resources of an entire country deployed for state sponsored attacks, the world becomes a much more dangerous place.
Comic Relief
But now that we know about it, we're safe from Stuxnet, right? Oh, no.
Expert Analyst
For years, cyber attacks on our nation have been met with indecision and inaction.
Researcher
The Internet has been a great equalizer. Any information available online is available to everyone, everywhere, forever. Now, you can't buy a tank or a bomb online.
Comic Relief
Hello, Darknet.
Researcher
Okay, the darknet is different, and we have an episode coming up on that. So while you're waiting for it, hit the like and subscribe all the buttons. But don't try to buy a tank on the darknet. What you can find online are plans and blueprints to make all kinds of scary Things. Still, if you try to put together some doomsday device in your garage, you're gonna raise some eyebrows. I mean, my wife can't spray paint a flower pot in the driveway without our nosy neighbor coming over. I can only imagine what he'd do if I started welding together pieces for an EMP device.
Comic Relief
That would make a good DIY video.
Narrator
It would.
Researcher
I'd watch that. But Stuxnet isn't a thing.
Narrator
It's.
Researcher
It's lines of code, but it's lines of code that can damage actual property and hurt actual people. And the Stuxnet code, it's just out there. Now, if you know what you're doing, you can take the code apart, make a few, few changes, and now you've got a really sophisticated weapon. You can even do this if you don't know what you're doing, which is probably more dangerous. Now, as we speak, thousands of people around the world have this Stuxnet code, and they're tinkering with it, seeing what different pieces can be used in their own attacks. There have already been a few viruses inspired by its engineering. The Dooku virus attacked industrial facilities in 2011. Flame in 2012, also attacked facilities in Iran.
Narrator
And.
Researcher
And Flame could record audio, Skype calls, take screenshots, log keystrokes, all kinds of stuff. Indestroyer attacked power facilities in Ukraine in 2016. And there's tons of others. Stuxnet is the best cyber weapon the United States has ever developed, and it gave it to the world for free. For perspective, Natanz in Iran was a brand new nuclear facility with an air gapped network and a team of security professionals working around the clock. And it was taken down easily. But a lot of industrial control systems are not as sophisticated. Some are connected to the Internet without default passwords, and many systems crucial to a country's infrastructure are running software that's 30, even 40 years old. Not just in Iran, here in the US in the UK everywhere. How vulnerable are those systems to attack? Iran has already said that cyber attacks were will be answered with cyber attacks. And I think we can assume that every country in the world has this policy. I mean, it's national defense. Well, remember how I said the Internet is a great equalizer? Well, think about this for a second. Throughout world history, global powers maintain their status through wealth and military might. But today, you don't need a trillion dollar defense budget in order to impose your political will on the world. Now all you need is a dozen smart programmers and lots of Mountain Dew. Now that the world's richest and poorest nations all employ skilled hackers. Is cyber warfare like the nuclear arms race, where mutually assured destruction means that no country would dare attack another? I mean, surely no country would risk retaliation by unleashing further chaos on the world, right?
Comic Relief
Your sarcasm is palpable.
Researcher
The link between the outage in Mumbai in October last year and the suspected
Morgan
role of Chinese hackers.
Researcher
Chinese hackers, backed by the Chinese state, targeted two Indian vaccine makers tonight as
Narrator
researchers race to develop a vaccine for the coronavirus.
Researcher
Hackers from China and other countries are working just as furiously to steal that research to create their own. Operation Olympic Games gave us Stuxnet, the most advanced and destructive cyber weapon ever used. When it was unleashed on Iran, it was an Hiroshima moment. And like Hiroshima, stuxnet was only the beginning, A test case for more advanced, more devastating cyber weapons. And one of those weapons has already been deployed. That weapon is Nitro Zeus.
Comic Relief
Yeah, that sounds like the name of a Greek energy drink.
Researcher
You're really throwing ice water on my drama here, pal.
Comic Relief
I'm sorry. I make jokes when I'm nervous.
Researcher
Okay, back to Iran. After coming pretty close to war, cooler heads prevailed, and Iran, along with several world powers, signed a nuclear peace agreement. That was the ideal outcome. But that outcome wasn't always certain. So in case diplomacy failed and war broke out, the United States had and has a cyber contingency. The plan, codenamed Nitro Zeus, is a virus far more complex than Stuxnet and was developed by thousands of people at a cost of hundreds of millions of dollars. Nitro Zeus, or nz, was designed to infect Iranian infrastructure and await orders in case of war. NZ would disable Iran's air defenses, disrupt military command and control, take down parts of the power grid. It would attack attacked domestic communications, transportation, banks, financial systems. Now, I don't have to point out that these aren't just military targets. Millions of civilians would be harmed if Nitro Zeus or a virus like that was used on anyone. Now, according to former intelligence operatives, Nitro Zeus has already been deployed and is living in Iranian infrastructure right now, just awaiting instructions. Now, that's pretty scary. But what scares me more about Nitro Zeus is what happens when that code gets out.
Narrator
It's inevitable that more countries will acquire the capacity to use cyber both for espionage and for destructive activities.
Researcher
You'll hear people say that the next world war will be fought in cyberspace. They're wrong about that. The United States, Iran, China, the uk, Russia, North Korea, they're not preparing for cyber war.
Narrator
They're already Fighting it.
Researcher
And I'm being completely honest now. Off script. Researching this episode was stressful, and I'm left with more questions than answers. Like how can citizens who are threatened by cyber attacks have an honest conversation about these dangers when our own governments don't acknowledge they participate? How can one country ask another to disarm when it won't disarm itself? But the biggest question of how can the global community ensure that destructive cyber weapons like Stuxnet and Nitro Zeus don't fall into the wrong hands?
Comic Relief
Don't create them in the first place?
Researcher
That would be a good start. Until there's a global effort to address this threat, all we can hope for is that our governments can keep us safe and hope our leaders can avoid another international crisis. That's a lot to hope for. The cyber war is here and now. I find myself longing for the days of the Cold War, when a concrete wall ran through Berlin. When proxy wars were fought on every continent, when global superpowers had thousands of nuclear weapons aimed at each other. Just one decision away from Armageddon. I long for those days. Because back then, the world was a much safer place.
Morgan
Data layers, little one don't forget my son to include nerdy puns Tuck you in warm within Keep you free from logging Till the spam ban he comes Sleep with WI FI open Gripping your seat signal tie and finally, the closer the nightmare, the end of secrets. Because if quantum computers become powerful enough, all the encryption protecting your bent accounts, medical records, DMs, your government files, your gross search histories, all of it could crack open like a walnut under a forklift. So if you thought the machines were watching you before, wait until they can read everything you ever tried to hide. Which is why I'm staying right here, in cage against the machine, chewing through stress wood and trusting no one with a charging port. The final installment of today's compilation, the Quantum Apocalypse. Which might be closer than we think.
Narrator
It's human nature to keep secrets. Throughout history, we've made complex codes to hide our secrets. Most codes are eventually cracked, but not all of them. The Voynich manuscript is a book filled with drawings and symbols nobody can read. The Beale ciphers point to hidden treasure if someone could decode them. There are entire ancient languages we can't understand because they're encrypted. Encryption can be simple or very complicated. Either way, it's just running a message through a series of mathematical rules. For decades, even centuries, some codes used mathematical rules that remain unbreakable. But they're about to be Challenged by something new. Machines that don't care about math and don't follow any rules. Kate Price's morning started like any other. Her smart home system woke her at 6am with her usual playlist. The coffee maker fired up her iPhone read her schedule while she brushed her teeth. Normal routine. She opened her banking app. Something was wrong. Her bank balance was zero. She blinked and checked again. Her balance was back. Just a temporary error, she thought. She took a sip of coffee and nearly dropped her mug. The smart speaker was playing someone else's conversation. A couple fighting about credit card debt. She unplugged it. Then her smart TV TV started cycling through her photos. Private photos, Intimate photos. She pulled the plug. And then her phone rang. Then she heard the sirens. The oldest code we know of isn't written in complex mathematics. It's carved in stone in an Egyptian tomb from 4,000 years ago. The scribes simply replaced regular hieroglyphs with ones they made up. They weren't trying to keep secrets. They were showing off. These were prayers carved into tomb walls. The scribes wanted to prove they knew something others didn't.
Comic Relief
Oh, those were ancient emojis.
Narrator
Not exactly.
Comic Relief
Let's test that theory. Can humans crack this?
Narrator
The simple act of substituting one symbol for another unleashed something. Something. The human desire to keep secrets. And for thousands of years, that's how codes worked. You'd replace letters with other letters or symbols. Linear A is a secret writing system created by the Minoans in ancient Crete, 3,600 years ago. We can read its descendant, Linear B. But Linear A is still a secret. Every attempt to crack it has failed. The Spartans made practical use of codes.
Comic Relief
This is cryptography.
Narrator
Please don't.
Comic Relief
Too late. I already ordered a tunic and a cake. Now I just need the abs.
Narrator
Can I get back to this?
Comic Relief
Look ahead. I need to catch up on my sit ups anyway.
Narrator
The Spartans created meschitly. Here's how it works. Picture a wooden rod about as thick as your wrist. Sop it. Now wrap a strip of leather or parchment around it like a spiral. Write your message across the strip, following the spiral. When you unwrap it, the letters scramble. The message is nonsense. But wrap it around another rod exactly the same size and the message reappears. This is called a transposition cipher. You're not changing the letters, you're just moving them around. Julius Caesar encoded all his military correspondence by shifting each letter in the Alphabet by three spaces. A becomes D, B becomes E, and so on. When you hit Z, you loop back to A. This is Called a shift cipher or Caesar cipher. The key is knowing how many spaces to shift. Caesar used three, but you can use any number. His enemies never cracked it. In the 1820s, Thomas Beale used a book cipher to hide the location of millions of dollars of buried treasure. And here's how it works. First, pick a book, any book. Then you replace each word in your message with a number. That number tells you which word to use from your chosen book. Count down to the fifth word on page one, and that's your first word. Maybe the 19th word on page two is just your second word. And so on. Beale used the Declaration of Independence.
Comic Relief
Nicholas Cage has entered the chat.
Narrator
When someone finally figured that out, in 1885, they cracked one of his three. The treasure is somewhere in Bedford County, Virginia. But the other two messages still locked because we don't know which books he used. Every year, thousands of people try to crack the Beale ciphers to find the treasure. And every year, they fail. The Zodiac killer was also ahead of his time. He encoded a message using a homophonic substitution cipher using 408 different symbols. Instead of replacing each letter with just one symbol, you've replaced it with several different ones. The letter E might become three or seven, or some symbol, nobody knows. This makes the code much harder to break because you can't use frequency analysis. In normal English, E is the most common letter. But if you split it between multiple symbols, that pattern disappears. For 51 years, the Zodiac's message stumped the world's best cryptographers. Then, in 2023amateur code breakers finally solved it.
Comic Relief
What'd it say?
Narrator
Well, it said a bunch of stuff, but it started with, I like killing people because it's so much fun.
Comic Relief
Yeah, for a serial killer. He wasn't much of a poet.
Narrator
He wasn't. And the Zodiac killer was never found. But quantum computers are about to change everything. All these ancient methods, substitutions, patterns and tricks share one math. This is a weakness quantum computers can exploit. Soon these machines might reveal every secret message ever written. Including yours. The quantum computer hissed as liquid helium circulated through the processor.
Researcher
Carl Bishop checked the temperature.
Narrator
Minus 460 degrees Fahrenheit. Absolute zero. Quantum bits needed to be that cold to maintain coherence. Stanford's quantum lab was empty at 3am he'd been running simulations for 12 hours straight. His eye burned. But CTEC's grant requirements were Demonstrate quantum error correction or lose funding. Quantum computers were terrible at error correction. Quantum states are too fragile, too much noise. If the temperature changes by half a degree, they decohere. If radio waves leak in, they decohere. A truck hits a pothole a mile away, the vibration in the Earth makes them decohere. But Carl noticed something strange in the error correction data. The errors weren't random. Then he realized they weren't errors at all. The quantum computer was cracking encryption keys. Millions of them. Keys that protect everything from banking passwords to nuclear launch codes. Carl decided to test this. He entered an RSA 4096 security key and ran down the hall for another coffee. He wasn't in a hurry. Even the world's most powerful supercomputers would need billions or trillions of years to break RSA 4096. But when he returned five minutes later, he couldn't believe it. The key was cracked. Carl now realized his computer was the most powerful and dangerous weapon on Earth. He started started to panic. They tried to delete the data, but it was already uploaded to Sea Tech's private servers. By sunrise, three intelligence agencies had flagged the data transfer. By 9am The First Bank Security System was breached. By noon, every bank went dark. The quantum apocalypse had begun. Your entire digital life depends on two prime numbers. That's it. Two numbers. And they protect everything. Your passwords, your messages, your bank accounts, all of it. Modern encryption is based on this simple trick. Take two huge prime numbers and multiply them together. That creates your public key. A number anyone can use to send you secret messages. But only someone who knows those original prime numbers can read those messages. Working backward, trying to find those original numbers. Numbers would take a computer billions of years. Or so we thought. In December 2024, Google unveiled Project Willow. Their quantum computer solved a problem in five minutes that would take our fastest supercomputers longer than the age of the universe. Quantum computers do this using superposition.
Comic Relief
Hang on, hang on, hang on. You want to pump the brakes in the nerd chatter and fill me in?
Narrator
Well, think about flipping a coin. It lands on either heads or tails. Normal computer bits work the same way. Everything is used. Either 1 or 0. It's binary. But quantum computer bits, or qubits, can be 1 and 0 at the same time.
Comic Relief
Oh, so qubits are non binary. But aren't they?
Narrator
No. They are, but I need you to stop talking. So instead of flipping that coin, it's a coin spinning on its edge while it spins. It's not heads or tails. It's both at once. That's superposition. Now, imagine trying to crack a safe with a million combinations. A normal computer can only try one combination at a time. But A quantum computer. It tries all combinations simultaneously. The NSA has been warning about this moment for years. They call it Y2Q. The year quantum computers become powerful enough to break our current encryption. They thought it would happen between 2030 and 2040. But Willow changed everything. For 30 years, quantum computers suffered one major problem. Errors. Reading quantum data is like trying to read a book during an earthquake. It's too unstable to work properly. But Google fixed that with Project Willow.
Comic Relief
How did it fix it?
Narrator
By grouping qubits together. There are groups of qubits handling processing and groups of qubits that do nothing but track and fix errors. The more qubits you add, the fewer errors you have. It may sound counterintuitive, but it's like building a sandcastle that gets stronger the bigger it gets. Now, with AI's help, quantum quantum computers are on track to break current encryption by the year 2029. Way ahead of schedule. This is bad. In 2024, the Department of Defense accelerated its quantum modernization program. Their latest directive warns that critical systems must be quantum resistant by 2025. But one detail stands out. They're not just protecting future messages. They're racing to protect everything we've ever encrypted. And they're running out of time. When Liz Emery's phone buzzed at 4am, she almost ignored it. After 15 years in cyber security, late night calls usually. Usually meant someone at the hospital forgot their password. But caller ID showed Mount Sinai's emergency line. The first report was in. Patient records appeared on digital billboards in Times Square. They included blood test results, psychiatric evaluations, and terminal diagnoses that patients had not yet told their families about. Senators, Congressmen, CEOs. Their private medical data was all over the Internet. She was still quite coordinating the hospital's response when the news reported that every dating app was breached. Then they came back online. Suddenly, on every device in the city. Smartphones, TVs, billboards. Was a link to a site where anyone could look up any information that was part of the dating app breach. Direct messages, real names and emails, browser histories, private photos and videos, all revealed. Liz figured the only people celebrated were divorce attorneys. Then an email came into hospital security. Pay $1 billion or every pacemaker control system on earth will go down. Pay another billion or insulin pumps will go down, starting with diabetic children. The city started to crack. Police dispatch systems were offline. Traffic lights went dark. ATMs were dumping cash into the street. Bank balances were set to zero. Autonomous vehicles. Vehicles became killing machines. Delivery drones crashed into buildings like Kamikaze pilots. A fleet of cybertrucks tore through a shopping mall before exploding all at once. News channels tried to cover the chaos, but their broadcasts were hijacked. CNN anchors watched helplessly as their personal emails were displayed on screen. The White House press secretary's private texts appeared during a briefing about the crisis. Then the NSA made an emergency broadcast that somehow made it through. They said there was a nationwide system compromise. For the safety of every American, martial law was now imposed. Just as the message was covering the mandatory curfews, every phone in the country went dark. Major technology companies are racing to build quantum resistant encryption. Google, IBM, and Microsoft have teams working around the clock. But there's a big problem. Quantum computers don't just threaten future messages. They threaten everything we've ever encrypted. Every encrypted file, every secure transmission, every protected database becomes vulnerable. Even ones from decades ago. Intelligence agencies have been collecting encrypted data since the Cold War. Your old emails, your financial records, your private messages, all sitting in databases waiting to be unlocked. Then there's Bitcoin. Its entire security system depends on the same math. Quantum computers are about to break. Shadow groups have already collected hundreds of thousands of encrypted Bitcoin wallets. They're just waiting for quantum computers powerful enough to crack them. All that money could vanish in seconds. At current prices, that's billions of dollars total till zero baby banks know this is coming. JPMorgan Morgan started building quantum resistant vaults in 2023. Not for gold or cash. For computers. These facilities will never connect to the Internet. They'll use paper records and human couriers. The military's training for quantum dark operations. Missions conducted without digital communication. Teams practice using prearranged signals, dead drops, and one time code books. The same methods that kept secrets during World War II. The NSA's latest report, court show Project Willow, proves something they already knew. The quantum apocalypse isn't coming. It's already here. The NSA isn't trying to stop it. It's preparing for what comes after. Because the race is no longer about building quantum computers. The race is to survive them. The line at Chase Manhattan stretched around the block. Cash only. No cards, no transfers. Just paper money and metal coins. Donald Janik watched from his office window across the street. In his 30 years as a security consultant, he'd seen a lot of changes, but nothing like this. The quantum apocalypse was erasing decades of technological progress. His company now specialized in physical security. Armed guards, paper record keeping, mechanical locks. The kind of security you couldn't hack when the hospital records started appearing online. They shut down their networks and went analog. Now armed guards protected rooms full of paper files. Doctors wrote prescriptions by hand. Old mechanical devices became valuable. Typewriter. Typewriter repair shops reopened. Filing cabinet manufacturers couldn't keep up with demand. Bicycle messengers replaced email. Everyone with skills from the pre digital age suddenly found themselves in demand. Retired secretaries who could take shorthand. Mechanics who could fix cars without computers. Accountants who knew how to keep books by hand. The younger generation struggled to adapt. They never lived in an analog world. The smart ones saw it coming. They'd pulled their money out early and bought physical assetsgold silver land. Things you could touch. Things that existed in the real world, not just as numbers in a database. The rest had to adapt or lose everything. Back at Stanford, Carl Bishop struggled with depression. He blamed himself. Ctec, the company supporting his work, no longer took his calls. Still, Carl wouldn't stop digging. He had to find find out what went wrong. Then Carl found something buried in the data timestamps that didn't make sense. Some encrypted messages were broken months ago. Then he realized the quantum apocalypse didn't start with his mistake. It started months earlier. The first bank breach wasn't at noon the first day. It was three months before. But balances weren't touched. Hospital records, websites, smartphone apps. Most have been compromised for months. But again, the data wasn't touched. Carl realized the chaos wasn't an accident. It was cover for something else. Something much bigger. Something much worse. Scientists are racing to develop new encryption methods that even quantum computers can't break. They call it post quantum cryptography. The strategy find mathematical problems so complex that not even quantum computers can solve them efficiently. But there's a problem. Whenever we think we've found an unbreakable code, someone finds a way to break it. The Germans thought Enigma was mathematically impossible to crack. The Japanese believed purple would keep their World War II communications secret forever. The NSA once claimed RSA encryption would take billions of years to defeat. They were all wrong. Some banks are returning to physical security systems. Offline computers, paper records and in person verification. Government agencies are reviving cold war era methods. One time pads, dead drops and bicycle couriers.
Comic Relief
Sometimes things don't happen the way you planned. Sometimes you can end up lower than you started.
Narrator
What?
Comic Relief
Quicksilver. Somebody out there gets it.
Narrator
Quantum dark operations like air gap facilities, analog communication and paper messages could work. But they're temporary solutions. Throughout history, humans have played an endless cat and mouse game with secrets. Someone creates an unbreakable code. Someone else breaks it. And a more complex code replaces it. And the cycle continues. In the quantum age, there are no more secrets. Only information waiting to be revealed. That's why the NSA isn't trying to stop it. They aren't building new code breaking technology. But you know what they are building? Bunkers. The concrete room in the bunker beneath Fort Meade was cold and quiet. Carl Bishop was in his fifth hour of interrogation by four government agents. The NSA building above them had been abandoned when their classified files leaked. But this room, which technically didn't exist, still had power and a working computer. Carl learned the truth over the past few months. CTECH wasn't a tech company. It was a joint NSA DARPA program that had been running since 2019. They didn't have just one quantum computer. They had a network of them, hidden in secure facilities nationwide. For years, the network had quietly broken every encryption it touched. Banking records, medical files, private messages, and government secrets. The intelligence agencies had access to everything. But there was a problem. They couldn't act on any of it without revealing their capability. Imagine knowing about every terrorist plot, every corporate crime, every government corruption scandal, but being unable to stop any of it without without exposing how you got the information. The agencies were drowning in intelligence they couldn't use. The solution was create a world where privacy no longer existed. Where every secret was public. If nothing were private, there'd be no need to explain how they obtained their intelligence. No search warrants were necessary. Everything was already exposed. The social chaos was part of the plan. Communities going analog wasn't a problem. It was the goal. Drive the dangerous elements offline where they could be more easily monitored through traditional surveillance. Let the general public choose between convenience and privacy. They would choose convenience. They always did. But the intelligence agencies had their own solution for secure communication. A return to Cold War tradecraft. Dead drops, one time, pads face to face, meetings and soundproof. Their most sensitive operations moved to facilities that never touched a network or used a computer. Buildings that didn't officially exist. Staffed by people with no digital footprint. They maintained two separate organizations. The public facing agency everyone knew about, and the shadow agency that operated completely offline. The public agency would rebuild its security and update its systems. All of it would be theater. The real work happened in places like this concrete bunker. Places with no windows, no cameras, no phones. Places where messages were still written by hand and burned after reading. The most important secrets were never digitized, never encrypted, and never stored anywhere except in human memory. The NSA didn't break encryption to destroy society. They destroyed society. To hide that they'd broken encryption almost a year ago. Carl was set up. The quantum apocalypse was pinned on him. But what could he do about it? Martial law was still in effect. The NSA wanted him to keep working and keep quiet. He could either agree to cooperate or go to prison. Violation of the Espionage Act, Willful communication of national defense information, Unauthorized access of classified documents. The list went on and on. He didn't have much of a choice. As Carl left the concrete room, he realized that in a world with no secrets, the most powerful people weren't those who could break encryption. The most powerful people were those who could keep secrets without it. And right now, the only people who could do that worked for the nsa.
Morgan
Thank you for checking out today's WAI Files compilation. My name is Morgan. That's Wyatt and Virgil. We are beavers. Please say nice things about us in the comments so the human brings us back. Do the human a favor and hit like subscribe, comment, share. That stuff really helps the channel. If there's a story that you'd like us to cover, go to thewifiles.com tips send an email, Discord, YouTube chat, whatever works, really. Check out our podcast. It's called the why Files Operation Podcast and it's available everywhere. Podcasts are available and we started releasing videos on Spotify which the human just won't shut up about. If you listen or watch, be sure to leave a like or a comment or a thumbs up or a rating of any kind. That'd be swell. Be sure to check out our discord server 85,000 super weird, exceptionally interesting folks on there and it's a lot of fun. They like weird stuff and if you're watching this, you do too. Now's the time to mingle. We also have a 24.7 livestream on the WAI Files backstage channel. Back to back videos all day, every day, forever and ever. The human and Hecklefish can keep you company and maybe you'll catch a new episode you missed or revisit the cringey older ones. No shame here on this channel. There's even unique content in between vids, so pay attention and join the chat. There's also a new show called the Basement and it's the Humans Tried and Joy. He talks with the experts behind all the stories on this very channel. Some of those folks have been amazing during the research phase and were so generous with their knowledge. They really deserve a lot of credit for making the show happen. The human picks their brain so you don't have to. If you have any great guest ideas, email us@teamhewifiles.com A very special thanks to the patrons who make the why Files happen. Every. Every episode is dedicated to our Patreon members. The human couldn't have done any of this without the love and support of this community. And if you'd like to support the channel, consider becoming a member on Patreon. 3 bucks a month and you get perks like seeing episodes early with no commercials, access to discontinued merch, and a secret code for the store. Type the secret code and you get to peruse exclusive merch not available to the general public.
Expert Analyst
Shh.
Morgan
Secrets. Best of all is access to the livestreams. The team hops on discord and you get to meet the whole Yfiles family. All their cameras are on. Maybe they shouldn't be. A little moisturizer wouldn't hurt. You can hop on stage and ask a question or just shoot the sh stuff. It gets wild in there, but it's a lot of fun and totally the best perk of all. The human off script. What a way to spend an afternoon. Another way to support the channel is check out the wifile store. Coffee mugs, T shirts, squeezy talking hecklefish dolls, plush beavers. Wait, still don't have those. Ah, one day. But all the other stuff is legit and great fun for the whole family. If you want to save some cash, consider becoming a member on YouTube. YouTube membership only costs three bucks and you get you 10% off the whole store. If you're going to spend $40 on Whyfile's gear, it practically pays for itself. And if you want to cancel, that's cool. It's there to help you save money. The human doesn't pocket any of that cash. In fact, all the profit goes to the team so they can keep popping out epic episodes. And we just love seeing the merch out in the wild. I think that's everything. Yeesh. I don't know how the human does this every week. I'm exhausted. Okay, here goes the fun part. Little nervous. Deep breaths until next time. Be safe, be kind, and know that you are appreciated. Oh, boy. I felt nice. Bye.
Guest Singer
I blame poly scenario. A secret code inside the bible said I would I love my UFOs and paranormal fun as well as music so I'm singing like I should
Expert Analyst
but then
Guest Singer
another conspiracy theory becomes the truth, my friends and it never ends no, it never ends. I feel the crab cat and got stuck inside mel's home with MK truck I being only 2 of did Stanley Kubrick fake the moon landing alone on a film set.
Narrator
Or were the shadow people.
Guest Singer
Yeah,
Expert Analyst
the Roswell aliens just fought the
Guest Singer
smiling man, I'm told.
Narrator
And his name was Cold.
Guest Singer
I can't believe I'm dancing with the F Head Thursday night, Wednesday J. The Mothman sightings and the solar storm still come to Agatha. The secret city underground mysterious number stations, Planet Surf 02, Project Stargate and what the dark watchers found
Expert Analyst
in a simulation.
Guest Singer
Don't you worry though, the Black knight satellite it show me. So can't believe I'm dancing with the fish head Fish on Thursday night Swing. All through the nights when they turn. Dance? K loves to dance? Yeah? KY love to dance on the dance floor? Because she is a camel and camels love to dance? When the feeling is right? Always in time? Sa.
Podcast: The Why Files: Operation Podcast
Episode: The Machines Are Watching You | And They Know Everything (Compilation)
Release Date: May 17, 2026
Host: The Why Files Team featuring Morgan, Wyatt, and recurring comic relief from “Hecklefish”
Main Theme:
This comprehensive compilation episode explores the pervasive and unsettling ways that machines, governments, and covert actors observe, manipulate, and occasionally attack individuals and societies. By examining historical and contemporary examples of surveillance, psychological operations, sonic and electromagnetic weapons, and cyberwarfare, the podcast uncovers the hidden infrastructures—both infrastructural and informational—that underpin the modern surveillance state.
A fast-paced, humor-laced, but deeply researched episode weaving through:
Timestamps: 02:52–17:20
Memorable Quote
Timestamps: 17:20–33:24
Memorable Moment
Timestamps: 34:02–39:08
Timestamps: 40:09–50:56
Notable Quote
Timestamps: 51:00–85:09
Quotable Moment
Timestamps: 85:09–113:46
Timestamps: 115:01–137:34
Timestamps: 137:34–161:50
For Further Listening
For anyone concerned about being watched, nudged, or manipulated in the digital age: this episode is essential listening—and a call to read the terms, check the wires, and always question who’s really in control.