The Why Files: Operation Podcast - 578: The Quantum Apocalypse: All Your Secrets Revealed

Episode Date: January 14, 2025

A mysterious data transfer lights up NSA monitors at 3 AM. Within hours, hospital records flash across Times Square billboards. Dating app messages spill onto every screen in the city.  Bank account...s vanish. Traffic lights freeze. Autonomous vehicles crash through shopping malls. Intelligence agencies scramble as decades of encrypted messages suddenly unlock. Someone has broken the unbreakable - the mathematical foundations that protect everything from banking passwords to nuclear launch codes. The quantum apocalypse arrives years ahead of schedule. But as chaos spreads, patterns start to surface. The timing seems too perfect, the targets too precise.  Deep beneath the Pentagon, analysts notice something strange: some messages were decrypted months ago. The chaos isn't random - it's cover for something bigger. 

Transcript
Discussion (0)
Starting point is 00:00:00 If it's a flat or a squeal, a wobble or peel, your tread's worn down or you need a new wheel, wherever you go, you can get a pro at Tread Experts. Toyo's open country family of tires will get you through tough weather in a variety of terrains. Until May 31st, save up to $100 in rebates on select Toyo tires. Find a Toyo Tread Experts dealer near you at treadexperts.ca slash locations. From tires to auto repair, we're always there at treadexperts.ca slash locations. From tires to auto repair, we're always there, treadexperts.ca. It's human nature to keep secrets. Throughout history, we've made complex codes to hide our secrets. Most codes are eventually cracked, but not all of them. The Voynich Manuscript is a book
Starting point is 00:00:42 filled with drawings and symbols nobody can read. The Beale ciphers point to hidden treasure, if someone could decode them. There are entire ancient languages we can't understand because they're encrypted. Encryption can be simple or very complicated. Either way, it's just running a message through a series of mathematical rules. For decades, even centuries, some codes used mathematical rules that remain unbreakable. But they're about to be challenged by something new. Machines that don't care about math and don't follow any rules. Kate Bryce's morning started like any other.
Starting point is 00:01:22 Her smart home system woke her at 6am with her usual playlist. The coffee maker fired up. Her iPhone read her schedule while she brushed her teeth. Normal. Routine. She opened her banking app. Something was wrong. Her balance was zero.
Starting point is 00:01:37 She blinked and checked again. Her balance was back. Just a temporary error, she thought. She took a sip of coffee and nearly dropped her mug. The smart speaker was playing someone else's conversation. A couple fighting about credit card debt. She unplugged it. Then her smart TV started cycling through her photos.
Starting point is 00:02:03 Private photos. Intimate photos. She pulled the plug. And then her phone rang. Then she heard the sirens. The oldest code we know of isn't written in complex mathematics. It's carved in stone, in an Egyptian tomb from 4,000 years ago. The scribes simply replaced regular hieroglyphs with ones they made up. They weren't trying to keep secrets. They were showing off. These were prayers carved into tomb walls.
Starting point is 00:02:40 The scribes wanted to prove they knew something others didn't. Oh, those were ancient emojis. Not exactly. Uh, let's ancient emojis. Not exactly. Let's test that theory. Can humans crack this? The simple act of substituting one symbol for another unleashed something. The human desire to keep secrets. And for thousands of years, that's how codes worked. You'd replace letters with other letters or symbols.
Starting point is 00:03:03 Linear A is a secret writing system created by the Minoans in ancient Crete 3,600 years ago. We can read its descendant, Linear B, but Linear A is still secret. Every attempt to crack it has failed. The Spartans made practical use of codes. This is cryptography! Please don't. Too late. I already ordered the tunic and the cape. Now I just need the abs. Can I get back to this?
Starting point is 00:03:25 Look ahead. I need to catch up on my sit-ups anyway. The Spartans created the skiddley. Here's how it works. Picture a wooden rod about as thick as your wrist. Yeah, rod. Stop it. Now wrap a strip of leather or parchment around it like a spiral.
Starting point is 00:03:40 Write your message across the strip, following the spiral. When you unwrap it, the letters scramble. The message is nonsense. But wrap it around another rod exactly the same size, and the message reappears. This is called a transposition cipher. You're not changing the letters, you're just moving them around. Julius Caesar encoded all his military correspondence
Starting point is 00:04:00 by shifting each letter in the alphabet by three spaces. A becomes D, B becomes E, and so on. When you hit Z, you loop back to A. military correspondence by shifting each letter in the alphabet by three spaces. A becomes D, B becomes E, and so on. When you hit Z, you loop back to A. This is called a shift cipher or Caesar cipher. The key is knowing how many spaces to shift. Caesar used three, but you can use any number. His enemies never cracked it. In the 1820s, Thomas Beale used a book cipher to hide the location of millions of dollars of buried treasure.
Starting point is 00:04:26 And here's how it works. First, pick a book. Any book. Then you replace each word in your message with a number. That number tells you which word to use from your chosen book. Count down to the fifth word on page one, and that's your first word. Maybe the 19th word on page two is your second word, and so on. Beale used the Declaration of Independence. Nicholas Cage has entered the check.
Starting point is 00:04:51 When someone finally figured that out in 1885, they cracked one of his three messages. The treasure is somewhere in Bedford County, Virginia, but the other two messages? Still locked, because we don't know which books he used. Every year, thousands of people try to crack the Beale ciphers to find the treasure. And every year, they fail. The Zodiac Killer was also ahead of his time. He encoded a message using a homophonic substitution cipher using 408 different symbols.
Starting point is 00:05:16 Instead of replacing each letter with just one symbol, you've replaced it with several different ones. The letter E might become 3 or 7 or some symbol. Nobody knows. This makes the code much harder to break because you can't use frequency analysis. In normal English, E is the most common letter, but if you split it between multiple symbols, that pattern disappears. For 51 years, the Zodiac's message stumped
Starting point is 00:05:39 the world's best cryptographers. Then in 2020, three amateur code breakers finally solved it. What'd it say? Well, it said a bunch of stuff, but it started with, I like killing people because it's so much fun. For a serial killer, he wasn't much of a poet. He wasn't. And the Zodiac Killer was never found. But quantum computers are about to change everything.
Starting point is 00:05:58 All these ancient methods, substitutions, patterns, and tricks share one weakness. Math. This is a weakness quantum computers can exploit. Soon these machines might reveal every secret message ever written, including yours. If it's a flat or a squeal, a wobble or peel, your tread's worn down or you need a new wheel, wherever you go, you can get it from our tread experts. Toyo's open country family of tires will get you through tough weather in a variety of terrains. Until May 31st, save up to $100 in rebates on select Toyo tires. Find a Toyo Tread Experts dealer near you at treadexperts.ca slash locations.
Starting point is 00:06:37 From tires to auto repair, we're always there at treadexperts.ca. Everyone's got a pro. Need tires? I've got a pro. Car making a weird sound? I've got a pro. So who's that pro? The pros at Tread Experts.
Starting point is 00:06:53 From tires to auto repair, Tread Experts is always there, helping you with Toyo tires you can trust. Until May 31st, save up to $100 in rebates on select Toyo tires, like Toyo's open country family of tires. Find your pro at your local Tread Experts. From tires to auto repair, we're always there. Tread Experts, the C.A. The quantum computer hissed as liquid helium circulated through the processor.
Starting point is 00:07:24 Carl Bishop checked the temperature. Minus 460 degrees Fahrenheit. Absolute zero. Quantum bits needed to be that cold to maintain coherence. Stanford's quantum lab was empty at 3 a.m. He'd been running simulations for 12 hours straight. His eyes burned. But CTEK's great requirements were clear.
Starting point is 00:07:43 Demonstrate quantum error correction or lose funding. Quantum computers were terrible at error correction. Quantum states are too fragile, too much noise. If the temperature changes by half a degree, they decohere. If radio waves leak in, they decohere. A truck hits a pothole a mile away, the vibration in the Earth makes them decohere. But Carl noticed something strange in the error correction data.
Starting point is 00:08:11 The errors weren't random. Then he realized they weren't errors at all. The quantum computer was cracking encryption keys, millions of them. Keys that protect everything from banking passwords to nuclear launch codes. Carl decided to test this. He entered an RSA 4096 security key and ran down the hall for another coffee. He wasn't in a hurry. Even the world's most powerful supercomputers would need billions or trillions of years to break RSA 4096. But when he returned five minutes later, he couldn't believe it. The key was cracked. Carl now realized his computer was the most powerful and dangerous weapon on Earth.
Starting point is 00:08:56 He started to panic. He tried to delete the data, but it was already uploaded to CTEK's private servers. By sunrise, three intelligence agencies had flagged the data transfer. By 9 a.m., the first bank security system was breached. By noon, every bank went dark. The quantum apocalypse had begun. Your entire digital life depends on two prime numbers. That's it, two numbers. And they protect everything.
Starting point is 00:09:29 Your passwords, your messages, your bank accounts, all of it. Modern encryption is based on this simple trick. Take two huge prime numbers and multiply them together. That creates your public key, a number anyone can use to send you secret messages. But only someone who knows those original prime numbers can read those messages. Working backward, trying to find those original numbers, would take a computer billions of years. Or so we thought. In December 2024, Google unveiled Project Willow. Their quantum computer solved the problem in five minutes
Starting point is 00:09:59 that would take our fastest supercomputers longer than the age of the universe. Quantum computers do this using superposition. Hang on, hang on, hang on. You want to pump the brakes on the nerd chatter and fill me in? Well, think about flipping a coin. It lands on either heads or tails. Normal computer bits work the same way. Everything is either 1 or 0. It's binary.
Starting point is 00:10:18 But quantum computer bits, or qubits, can be 1 and 0 at the same time. Oh, so qubits are non-binary. What? Are they? No, they are, but I need you to stop talking. So instead of flipping that coin, it's a coin spinning on its edge. While it spins, it's not heads or tails. It's both at once.
Starting point is 00:10:37 That's superposition. Now imagine trying to crack a safe with a million combinations. A normal computer could only try one combination at a time. But a quantum computer, it tries all combinations simultaneously. The NSA has been warning about this moment for years. They call it Y2Q, the year quantum computers
Starting point is 00:10:55 become powerful enough to break our current encryption. They thought it would happen between 2030 and 2040, but Willow changed everything. For 30 years, quantum computers suffered one major problem, errors. Reading quantum data is like trying to read a book during an earthquake. It's too unstable to work properly.
Starting point is 00:11:12 But Google fixed that with Project Willow. How did it fix it? By grouping qubits together. There are groups of qubits handling processing and groups of qubits that do nothing but track and fix errors. The more qubits you add, the fewer errors you have. It may sound counterintuitive, but it's like building a sandcastle that gets stronger
Starting point is 00:11:30 the bigger it gets. Now with AI's help, quantum computers are on track to break current encryption by the year 2029, way ahead of schedule. In 2024, the Department of Defense accelerated its quantum modernization program. Their latest directive warns that critical systems must be quantum resistant by 2025. But one detail stands out. They're not just protecting future messages. They're racing to protect everything we've ever encrypted.
Starting point is 00:11:56 And they're running out of time. If it's a flat or a squeal, a wobble or peel, your tread's worn down or you need a new wheel, wherever you go, you can get it from our tread experts. Toyo's open country family of tires will get you through tough weather in a variety of terrains. Until May 31st, save up to $100 in rebates on select Toyo tires. Find a Toyo tread experts dealer near you at treadexperts.ca slash locations. From tires to auto repair, we're near you at TreadExperts.ca slash locations. From tires to auto repair, we're always there.
Starting point is 00:12:28 TreadExperts.ca If it's a flat or a squeal, a wobble or peel, your tread's worn down or you need a new wheel, wherever you go, you can get it from our Tread Experts. Until May 30th, purchase four new Michelin Passenger or Light Truck tires and receive up to $70 by prepaid MasterCard. Conditions apply. Details at Michelin.ca. Find a Michelin Tread Experts dealer near you at TreadExperts.ca slash locations. From tires to auto repair, we're always there at TreadExperts.ca. You sailed beyond the horizon in search of an island scrubbed from every map.
Starting point is 00:13:09 You battled krakens and navigated through storms. Your spade struck the lid of a long lost treasure chest. While you cooked a lasagna. There's more to imagine when you listen. Discover best-selling adventure stories on Audible. You searched for your informant, who disappeared without a trace. You knew there were witnesses, but lips were sealed.
Starting point is 00:13:43 You swept the city, driving closer to the truth. While curled up on the couch with your cat. There's more to imagine when you listen. Discover heart-pounding thrillers on Audible. When Liz Emery's phone buzzed at 4 a.m., she almost ignored it. After 15 years in cybersecurity, late-night calls usually meant someone at the hospital forgot their password. But caller IDs showed Mount Sinai's emergency line. The first report was in.
Starting point is 00:14:21 Patient records appeared on digital billboards in Times Square. They included blood test results, psychiatric evaluations, and terminal diagnoses that patients had not yet told their families about. Senators, congressmen, CEOs, their private medical data was all over the internet. She was still coordinating the hospital's response when the news reported that every dating app was breached. Then they came back online. Suddenly, on every device in the city, smartphones, TVs, billboards,
Starting point is 00:14:49 was a link to a site where anyone could look up any information that was part of the dating app breach. Direct messages, real names and emails, browser histories, private photos and videos, all revealed. Liz figured the only people celebrating were divorce attorneys. Then an email came in to hospital security.
Starting point is 00:15:07 Pay $1 billion or every pacemaker control system on Earth will go down. Pay another billion or insulin pumps will go down, starting with diabetic children. The city started to crack. Police dispatch systems were offline. Traffic lights went dark. ATMs were dumping cash into the street. Bank balances were set to zero.
Starting point is 00:15:28 Autonomous vehicles became killing machines. Delivery drones crashed into buildings like kamikaze pilots. A fleet of cyber trucks tore through a shopping mall before exploding all at once. News channels tried to cover the chaos, but their broadcasts were hijacked. CNN anchors watched helplessly as their personal emails were displayed on screen. The White House press secretary's private texts appeared during a briefing about the crisis. Then the NSA made an emergency broadcast that somehow made it through. They said there was a nationwide system compromise.
Starting point is 00:16:03 For the safety of every American, martial law was now imposed. Just as the message was covering the mandatory curfews, every phone in the country went dark. Major technology companies are racing to build quantum-resistant encryption. Google, IBM, and Microsoft have teams working around the clock. But there's a big problem. Quantum computers don't just threaten future messages. They threaten everything we've ever encrypted. Every encrypted file, every secure transmission, every protected database becomes vulnerable,
Starting point is 00:16:42 even ones from decades ago. Intelligence agencies have been collecting encrypted data since the Cold War. Your old emails, your financial records, your private messages, all sitting in databases waiting to be unlocked. Then there's Bitcoin. Its entire security system depends on the same math
Starting point is 00:16:59 quantum computers are about to break. Shadow groups have already collected hundreds of thousands of encrypted Bitcoin wallets. They're just waiting for quantum computers powerful enough to crack them. All that money could vanish in seconds. At current prices, that's billions of dollars. Total to zero, baby!
Starting point is 00:17:15 Banks know this is coming. J.P. Morgan started building quantum-resistant vaults in 2023, not for gold or cash, for computers. These facilities will never connect to the internet. They'll use paper records and human couriers. The military's training for quantum dark operations, missions conducted without digital communication, teams practice using prearranged signals,
Starting point is 00:17:36 dead drops, and one-time code books, the same methods that kept secrets during World War II. The NSA's latest reports show Project Willow proves something they already knew. The quantum apocalypse isn't coming, it's already here. The NSA isn't trying to stop it, it's preparing for what comes after.
Starting point is 00:17:53 Because the race is no longer about building quantum computers. The race is to survive them. The line at Chase Manhattan stretched around the block. Cash only. No cards, no transfers. Just paper money and metal coins. Donald Janik watched from his office window across the street. In his 30 years as a security consultant, he'd seen a lot of changes, but nothing like this. The quantum apocalypse was erasing decades of technological progress. His company now specialized in physical security, armed guards, paper record-keeping, mechanical locks.
Starting point is 00:18:43 The kind of security you couldn't hack. When the hospital records started appearing online, they shut down their networks and went analog. Now armed guards protected rooms full of paper files. Doctors wrote prescriptions by hand. Old mechanical devices became valuable. Typewriter repair shops reopened. Filing cabinet manufacturers couldn't keep up with demand. Bicycle messengers replaced email. Everyone with skills from the pre-digital age suddenly found themselves in demand. Retired secretaries who could take shorthand.
Starting point is 00:19:16 Mechanics who could fix cars without computers. Accountants who knew how to keep books by hand. The younger generation struggled to adapt. They never lived in an analog world. The smart ones saw it coming. They'd pulled their money out early and bought physical assets. Gold, silver, land, things you could touch. Things that existed in the real world, not just as numbers in a database.
Starting point is 00:19:38 The rest had to adapt or lose everything. Back at Stanford, Carl Bishop struggled with depression. He blamed himself. CTEK, the company supporting his work, no Bishop struggled with depression. He blamed himself. SeaTac, the company supporting his work, no longer took his calls. Still, Carl wouldn't stop digging. He had to find out what went wrong. Then Carl found something buried in the data. Timestamps that didn't make sense.
Starting point is 00:20:00 Some encrypted messages were broken months ago. Then he realized the quantum apocalypse didn't start with his mistake. It started months earlier. The first bank breach wasn't at noon the first day. It was three months before. But balances weren't touched. Hospital records, websites, smartphone apps, most have been compromised for months. But again, the data wasn't touched. Carl realized the chaos wasn't an accident.
Starting point is 00:20:23 It was cover for something else. Something much bigger. Something much worse. You searched for your informant, who disappeared without a trace. You knew there were witnesses, but lips were sealed. You swept the city, driving closer to the truth. While curled up on the couch with your cat.
Starting point is 00:20:54 There's more to imagine when you listen. Discover heart-pounding thrillers on Audible. Oh, excuse me. Why are you walking so close behind me? Well, you're a tall guy. You throw a decent shadow when I'm walking in it to keep out of this bright sun. It hurts my eyes. Okay, well, you know what? With Specsavers, you can get two pairs of glasses from $149.
Starting point is 00:21:18 And, oh, you'll like this. One can be a pair of prescription sunglasses. Sounds great. Where's the nearest store? Not far. Come on. Let's hurry then! To my count! One, two, one, two, one, two... Visit Specsavers.ca for details.
Starting point is 00:21:34 You searched for your informant, who disappeared without a trace. You knew there were witnesses, but lips were sealed. You swept the city, driving closer to the truth. While curled up on the couch with your cat. There's more to imagine when you listen. Discover heart-pounding thrillers on Audible. Scientists are racing to develop new encryption methods that even quantum computers can't break. They call it post-quantum cryptography.
Starting point is 00:22:15 The strategy? Find mathematical problems so complex that not even quantum computers can solve them efficiently. But there's a problem. Whenever we think we've found an unbreakable code, someone finds a way to break it. The Germans thought Enigma was mathematically impossible to crack. The Japanese believed Purple would keep their World War II communication secret forever. The NSA once claimed RSA encryption
Starting point is 00:22:36 would take billions of years to defeat. They were all wrong. Some banks are returning to physical security systems, offline computers, paper records, and in-person verification. Government agencies are reviving Cold War-era methods, one-time pads, dead drops, and bicycle couriers. Sometimes things don't happen the way you planned. Sometimes you can end up lower than you started.
Starting point is 00:22:56 What? Quicksilver. Somebody out there gets it. Quantum dark operations like air-gapped facilities, analog communication, and paper messages could work, but they're temporary solutions. Throughout history, humans have played an endless cat-and-mouse game with secrets. Someone creates an unbreakable code, someone else breaks it, and a more complex code replaces it, and the cycle continues. In the quantum age, there are no more secrets, only information waiting to be revealed.
Starting point is 00:23:23 That's why the NSA isn't trying to stop it. They aren't building new code-breaking technology. But you know what they are building? Bunkers. The concrete room in the bunker beneath Fort Meade was cold and quiet. Carl Bishop was in his fifth hour of interrogation by four government agents. The NSA building above them had been abandoned when their classified files leaked, but this room, which technically didn't exist, still had power and a working computer. Carl learned the truth over the past few months. CTEK wasn't a tech company. It was a joint NSA DARPA program that had been running since 2019. They didn't have just one quantum computer.
Starting point is 00:24:07 They had a network of them, hidden in secure facilities nationwide. For years, the network had quietly broken every encryption it touched. Banking records, medical files, private messages, and government secrets. The intelligence agencies had access to everything. But there was a problem. They couldn't act on any of it without revealing their capability. Imagine knowing about every terrorist plot, every corporate crime, every government corruption scandal,
Starting point is 00:24:34 but being unable to stop any of it without exposing how you got the information. The agencies were drowning in intelligence they couldn't use. The solution was elegant. Create a world where privacy no longer existed, where every secret was public. If nothing were private, there'd be no need to explain how they obtained their intelligence. No search warrants were necessary. Everything was already exposed. The social chaos was part of the plan. Communities going analog wasn't a problem, it was the goal. Drive the dangerous elements offline, where they could be more easily monitored through traditional surveillance.
Starting point is 00:25:10 Let the general public choose between convenience and privacy, they would choose convenience, they always did. But the intelligence agencies had their own solution for secure communication, a return to Cold War tradecraft. Dead drops, one-time pads, face-to-face meetings in soundproof rooms. Their most sensitive operations moved to facilities that never touched a network or used a computer. Buildings that didn't officially exist, staffed by people with no digital footprint. They maintained two separate organizations, the public-facing agency everyone knew about and the shadow agency that operated completely offline. The public agency would rebuild its security and updated systems. All of it would be theater. The real work happened in places like this concrete bunker. Places with no windows, no cameras, no
Starting point is 00:25:58 phones. Places where messages were still written by hand and burned after reading. The most important secrets were never digitized, never encrypted, and never places where messages were still written by hand and burned after reading. The most important secrets were never digitized, never encrypted, and never stored anywhere except in human memory. The NSA didn't break encryption to destroy society. They destroyed society to hide that they'd broken encryption almost a year ago. Carl was set up. The quantum apocalypse was pinned on him. But what could he do about it? Martial law was still in effect.
Starting point is 00:26:28 The NSA wanted him to keep working and keep quiet. He could either agree to cooperate or go to prison. Violation of the Espionage Act, willful communication of national defense information, unauthorized access of classified documents. The list went on and on. He didn't have much of a choice. As Carl left the concrete room,
Starting point is 00:26:51 he realized that in a world with no secrets, the most powerful people weren't those who could break encryption. The most powerful people were those who could keep secrets without it. And right now, the only people who could do that worked for the NSA. tackle fish. My voice is my passport. Verify me. This has been the Y-Files. If you had fun or learned anything, do him a favor, subscribe, comment, like, share. It's just a small little thing, but it really helps us out. Like most topics we cover on the channel, today's was recommended by you. So if there's a story you'd like to see or learn more about, go to the Y-Files dot com slash tips. And remember, the Y-Files is also a podcast. Twice a week, I post deep
Starting point is 00:27:41 dives into the stories we cover here on the channel, and I post episodes that wouldn't be allowed on the channel. It's called the Y-Files Operation Podcast, and it's available everywhere you get your podcasts. If you need more Y-Files in your life, check out our Discord server. There's over 60,000 people on there, so 24-7, something's going on. They're talking about the same weird stuff we do here. It's a great community. It's really supportive.
Starting point is 00:28:01 It's a lot of fun, and it's free to join. And if you want to follow what's going on with The Y Files At any given time Check out our production calendar It's the Y Files dot com slash cal There we post our episode schedule Upcoming podcasts Live streams All that stuff
Starting point is 00:28:13 And special thanks to our patrons Who make this channel possible Every episode of The Y Files Is dedicated to our Patreon members You know the last six months Have been rocky And I couldn't have gotten through it Without you
Starting point is 00:28:22 So I can't say thank you enough And if you'd like to support the channel Keep keep us going and join a great community, consider becoming a member on Patreon. For as little as three bucks a month, you get access to perks like videos early with no commercials, access to merch only available to members, plus two private live streams every week just for you. The whole Y-Files team is on the stream. We've all got our webcams on. And you can turn your webcam on, jump up on stage, ask a question, make a joke, talk about anything you like. Another great way to support the channel is grab something from the Wapow store.
Starting point is 00:28:49 Grab a Hegelvish t-shirt, or one of these coffee mugs that are perfectly suited for a gentleman's fist, or a lady's fist, or whatever you happen to call yourself or identify as. You stick your fist in there for a good time. Or grab one of these hoodies, or a face on it. Or one of these hooded voodoo dolls that aren't creepy at all.
Starting point is 00:29:09 Or get a squeezy animal stuffed heck of a tongue and doll toy. Those are the plugs and that's going to do it. Until next time, be safe, be kind, and know that you are appreciated. I played Philippians and Area 51 A secret code inside the Bible said I was I love my UFOs and paranormal fun As well as music, so I'm singing like I should But then another conspiracy theory Becomes the truth, my friends And it never ends
Starting point is 00:29:58 No, it never ends I fear the crab cat and I got stuck inside Mel's home With MKUltra being only two away Did Stanley Kubrick fake the moon landing alone On a film set, were the shadow people there? The Roswell aliens just fought the smiling man I'm told, and his name was cold And I can't believe I'm dancing with the fishes Heckle fish on Thursday nights with AJ2
Starting point is 00:30:44 And the Rabbits have been eating all through the night It's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, it's, The Mothman sightings and the solar storm still come To have got the secret city underground Mysterious number stations Planet Serpo 2 Project Stargate And what the Dark Watchers found In a simulation Don't you worry though
Starting point is 00:31:38 The Black Knight said a lot He told me so I can't believe I'm dancing with the fish Heckle fish on Thursday nights with AJ2 And the wild boars on the beat all through the night All I ever wanted was to just hear the truth So the wild boars on the beat all through the night Hens will fish out Thursday, next Wednesday, J-2 And one more summer beat all through the night
Starting point is 00:32:15 All I ever wanted was to just hear the truth So one more summer beat all through the night Gertie loves to dance Gertie loves to dance Gertie loves to dance Gertie loves to dance Gertie loves to dance Gertie loves to dance Gertie loves to dance on the dance floor
Starting point is 00:32:42 because she is a camel Camels love to dance when Because she is a camel And camels love to dance When the feeling is right On wasting time Good love to dance Good love to dance Bye.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.