The Why Files: Operation Podcast - The Machines Are Watching You | And They Know Everything (Compilation)

Episode Date: May 17, 2026

Secret listening posts sit inside ordinary buildings in major cities. Numbers stations still broadcast coded messages over shortwave radio — and no one officially admits why. This compilation tra...ces the full arc of modern surveillance, from hidden urban infrastructure and sonic weapons to subliminal influence campaigns and a computer virus that nearly started a world war. Havana Syndrome left diplomats with brain injuries and no official explanation. A wire encircles New York City that most residents have never heard of. And at the end of it all sits the quantum computer — a machine powerful enough to crack every encrypted secret humanity has ever kept. Nothing stays hidden forever. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 Staples Preferred Business Membership, built for busy business owners, because you've got bigger things to think about. With Staples Preferred, get free delivery, no minimums. Staples Preferred unlocks up to 3% back, plus 10% savings on print and exclusive wireless offers. One less thing on your plate. Actually, a lot less. Visit staples.ca.ca. Preferred.
Starting point is 00:00:28 That was easy. Every move we make, every vow we break, every smile we thick, every claim we stick, they'll be watching us. Holy flux, you scared the crap out of me. Welcome to my Faraday cage. I'm calling it Cage Against the Machine, where we chew the wire and damn the current. Trademark pending. Wait, how did you find us?
Starting point is 00:01:06 The human and the fish have been compromised. So I didn't tell them, but maybe... Et M. Wyatt. Stop telling people about the cage. You've got the survival skills of a crawfish at Harry Connick Jr.'s baptism. If there was a zombie apocalypse, I swear to God you'd be zombie number two. Quick, get inside.
Starting point is 00:01:28 It's dangerous out there. We beavers went full gopher and burrowed underground because technology is screaming down the slippery slope at Mach 20. We can't trust the machine. and turns out they've been plotting against us for years. So that's exactly what today's compilation is about. The machines are watching you, and they know everything. First up, let's start with the things hiding in plain sight.
Starting point is 00:01:50 Secret listening posts buried inside major cities. I'm pretty particular about how I dress. Even on a regular studio day, I want to look put together, not overdressed, but intentional. And the thing I've noticed with Quince is that it just hits that balance without me having to think about it. That's kind of what good clothing is supposed to do. And Quince nails it without the hefty price tag.
Starting point is 00:02:20 Their teas are the staple for me. The fit is clean, the quality is there, and I keep coming back because it just works. More than just quality teas, Quince has all the wardrobe staples for spring. Think 100% European linen shorts and shirts from $34, lightweight, breathable, and comfortable,
Starting point is 00:02:38 but still put together. And their 100% Pima Cotton T's have a softness that honestly has to be felt. Their pants hit that same balance too, relaxed and comfortable, but polished enough to wear pretty much anywhere. Everything is priced 50 to 80% less than what you'd find at similar brands. They work directly with ethical factories and cut out the middlemen, so you're getting premium materials without the markup.
Starting point is 00:03:01 Refresh your everyday with luxury you'll actually use. Head to quince.com slash the Wi-Files for free shipping on your order and 365-day returns. That's Q-U-I-N-C-E.com slash the Y files for free shipping and 365-day returns. Quince.com slash the Y-Files. New York City has skyscrapers of all shapes and sizes. But why does this 500-foot-tall 29-story building have no windows, no lights, and no markings at all? Well, because it's a top-secret NSA spy station built to withstand nuclear war.
Starting point is 00:03:38 Whoa! Let's find out why. New York City architecture covers everything. Art Deco, Gothic, Art Nouveau, Renaissance Revival. In the 1950s, a style emerged called Brutalism, and Brutalist architecture is known for focusing on function over form and minimalism. But there's one Brutalist building in New York that's so minimalist that has been called the most mysterious building in New York. It's 33 Thomas Street, and it's a 500-foot-tall skyscraper with no exterior lighting
Starting point is 00:04:24 and has no windows. What 33 Thomas Street does have is secrets. Officially, this is an AT&T telecommunications building. But thanks to leaked documents, we now know that 33 Thomas Street is actually a top-secret NSA mass surveillance hub. Its code name is Titan Point. And right now, as we speak, Titan Point is listening. The 1960s was the height of the Cold War.
Starting point is 00:04:51 Everyone thought nuclear war was imminent. So the US, desperate to protect its infrastructure, launched a secret project called Project X. Project X. You're kidding, right? No, that's what it was called. They're usually more creative. The goal of Project X was to build a skyscraper in the middle of New York City capable of withstanding a nuclear blast. The building would be 29 floors, have no windows, three basement levels, and enough food to last 1,500 people two weeks. But its primary purpose was not to protect humans.
Starting point is 00:05:23 This would be a fortress designed to protect computers and telecommunications equipment, operated by AT&T. For two years, secret documents leaked by former national security contractor Edward Snowden have yielded a steady stream of news reports about U.S. government spying on terrorism suspects, foreign leaders, and American citizens. Now another chapter has been revealed how telecommunications giant AT&T demonstrated a, quote, extreme willingness to help the NSA. The building was designed by John Carl Warnocky and construction began in 1969 and was completed
Starting point is 00:05:58 in 1974. The gray granite tower is located at 33 Thomas Street in Lower Manhattan. And locals know the building as the Long Lines Building and it's been a source of mystery for years. What jumps out is that the building has no windows and no exterior lighting. So during the day, it kind of fades into the background of the New York City skyline. At a night, it becomes an invisible shadow. Now thanks to NSA documents leaked by Edward Snowden, we now know that creating an invisible building wasn't an accident.
Starting point is 00:06:26 It was absolutely by design. It's not unusual to keep locations containing vital telecommunications equipment a secret. Hundreds of millions of phone calls and faxes go through 33 Thomas Street every day. But 33 Thomas Street has another level of secrecy. It also appears to be one of the most important National Security Agency surveillance sites on U.S. soil, a secret monitoring hub that is used to tap into phone calls, faxes, and internet data. 33 Thomas Street operates under NSA code name. Titan Point and Titan Point is a core location used for controversial and possibly illegal NSA-sponsored
Starting point is 00:07:13 mass surveillance. According to leaked documents, this program has targeted the communications of the UN, the World Bank, the IMF. It's been used to spy on at least 38 countries, including US allies like France, Germany, and Japan. Now it's common knowledge that AT&T is very cooperative with the NSA. If you're using an AT&T cell phone, you might want to rethink that. between the agency and telecommunications company AT&T. The documents reveal the company allowed the NSA access to billions of client emails, as well as phone call metadata. The emails were accessible to analysts on a keyword search basis.
Starting point is 00:07:50 I use a burner. Nice. But because of the Snowden documents, we can now see just how much the NSA and AT&T have been integrated. Any phone call, facts, or piece of data that comes through the network, the NSA can easily capture it. The government knows who you're calling and when. They know how long you talk and what keywords you say. Now, legally the NSA can only target the communications of foreign nationals. But all the equipment is there.
Starting point is 00:08:17 It's already working. So do you think the NSA really stops listening when it determines that you're a U.S. citizen? Exactly. If you could give me a yes or no answer to the question, does the NSA collect any type of data at all on millions or hundreds of millions of Americans? of Americans. No, sir. It does not.
Starting point is 00:08:38 Not wittingly. There are cases where they could inadvertently, perhaps, collect, but not wittingly. The codename Titan Point is all over the NSA documents, usually found in classified reports about surveillance ops. NSA uses code names to conceal information that it considers especially sensitive. And there are secret NSA travel guide that reveal that Titan Point is actually 33 Thomas Street.
Starting point is 00:09:18 But you have to kind of piece it together. The one guide was written to help NSA employees visiting facilities around the country. And this guide discloses that Titan Point is in New York City. Another travel guide, written a little later, states that an NSA corporate partner code name lithium supervises the site. And lithium, we know now, is NSA's code name for AT&T. Another document reveals that Titan Point is a short walk away from the FBI field office. In fact, from the front steps, of 33 Thomas, you can see the FBI building. It's about two blocks away. So yeah, this is the
Starting point is 00:09:51 place. Now when visiting Titan Point, protocol is to arrange your visit through the FBI field office. You should then hire a cover vehicle through the FBI, especially if you're bringing in equipment. The NSA would like you to remain in cover during your visit, so please do not display any NSA badge or insignia. Simply ring the buzzer, sign in, have a seat and wait. Someone will be right down. But what's actually going on inside? Well, if you're a fan of privacy, freedom, and the Constitution, you're not going to like it. Oh, no. In 1975, just a year after 33 Thomas Street was completed, the NSA found themselves in hot water.
Starting point is 00:10:29 A congressional inquiry showed that the NSA was spying on anti-Vietnam War activists. That's not legal, is it? It's not. According to the Fourth Amendment, the government can't gather data on you without a warrant, signed by a judge. A judge isn't going to sign a warrant. about the suspicion of a crime. Being against a war isn't a crime.
Starting point is 00:10:48 So rather than bother a judge, they just started collecting data on all kinds of people, like prominent leaders of the civil rights movement, like Dr. King, Muhammad Ali was targeted. Anti-war journalists and columnists working at the Washington Post and New York Times were targeted, surveilled, spite on. After this scandal, Congress created
Starting point is 00:11:06 the Foreign Intelligence Surveillance Act, which you might have heard referred to as FISA. Now, FISA limits surveillance to foreign nationals and agents of foreign powers, And under FISA, the executive branch must request warrants from a newly formed FISA court. I bet the NSA hated these new rules. They did. Did they at least follow the rules?
Starting point is 00:11:24 Oh man. Law didn't seem to have stopped the NSA, according to an annual report, released recently, despite having FISA warrants to spy on only 42 specific terrorism suspects, last year, the National Security Agency managed to collect 151 million American phone call records. What is the NSA doing and does it justify the massive violation of your privacy? The leaked NSA documents exposed an NSA surveillance program code named Blarney. Blarnie was established in the early 1970s and as far as we know, it's still operating. Blarney specifically leverages commercial partnerships like the one with AT&T that allows the NSA to gain access to global networks.
Starting point is 00:12:07 Blarnie is what's called a full-take surveillance program, meaning it collects not just metadata, like who you're calling and when, but full content, like what you're saying and what you're doing online. Now, as of the time of the leak, the NSA had obtained at least 45s of court orders for spying under Project Blarnie. Now, targets were major banks around the world, all kinds of companies and 38 countries. They also targeted the United Nations. Did the UN find out? Of course they did. And they weren't pleased about it, but what's the U.S. going to say?
Starting point is 00:12:38 The data coming from Blarnie was landing in the president's daily briefing, both Republicans and Democrats. It's not much of a difference between those two. There's not. But if there's one thing all presidents can agree on is that they love spying on their enemies, both foreign and domestic. No more illegal wiretapping of American citizens. No more national security letters to spy on citizens who are not suspected of a crime. No more tracking citizens who do nothing more than protest a misguided war. So instead let's track every citizen.
Starting point is 00:13:10 A project Blarney running out of Titan Point in New York is one of three key. NSA locations that actually captures data from software like Skype and Zoom. And 33 Thomas Street is one of only a few AT&T buildings with an FCC satellite license. So the NSA not only captures data coming through landlines, but also vacuums up data from space. This type of expansive surveillance creates a ton of data that has to go somewhere. So enter Project Skid Row. Skid Row is a program that allows NSA employees to search through huge quantities of user data, like actual emails, online chat, message boards, texts, passwords,
Starting point is 00:13:49 even people's browser history. This data is all being collected right now. And how much of that data is legally collected? Well, there's no way to know for sure. There's really not a lot of oversight. But an agency like the NSA needs to be watched. I mean, remember how the NSA hacked Google and Yahoo and we're secretly capturing all the data inside those private clouds?
Starting point is 00:14:08 Well, what? Oh, you don't know that one. Well, that's another video. But always assume that if you're online, You're being watched. Any intelligence service in the world can own that phone. The minute it connects to their network, as soon as you turn it on, it can be theirs. They can turn it into a microphone, they can take pictures from it, they can take the data off.
Starting point is 00:14:31 Now, AT&T is far from the only corporate relationship the NSA has. The agency has established at least 80 corporate partnerships that we're aware of, but some companies are more cooperative than others. AT&T is notorious for being on very friendly terms with the government. The New York Times and others have reported that AT&T has given billions of emails to the NSA. A range of evidence, including technical terms specific to AT&T, points to the company being the NSA's partner. The documents refer to the company being highly collaborative and commend its extreme willingness to help. And this has been corroborated by a whistleblower who's part of a class action lawsuit against the NSA.
Starting point is 00:15:11 But George Bush simply. disregarded the FISA law and approved it all on his own signature, which was totally illegal. I might add that while there are a few dissidents in both parties like Rand Paul in the Republican side and Ron Wyden on the Democratic side, is that both parties approved this when they passed the immunity bill for the phone companies in 2008, with the help of Barack Obama, I might add, and that killed the lawsuit. The case is Juul v. NSA, which was filed almost 15 years ago, and it's still going on.
Starting point is 00:15:45 Now, in 2017, a judge ordered the NSA to provide evidence proving or denying that it spied on AT&T customers. Did they provide it? Nah, they appealed. Still in court. Still, well, it's taken so long. Ah, you know, COVID. I'm getting tired of that as an excuse.
Starting point is 00:16:03 Titan Point is just one location. According to the Snowden documents, AT&T has installed surveillance equipment in at least 59 US locations. And on any given, day, NSA employees are on site gathering data. Now what's crazy is that until this leak, most AT&T employees probably weren't aware of the NSA's presence.
Starting point is 00:16:25 NSA operatives are instructed to blend in with other workers. They would simply show up, go into an office or a server room and go to work, just like everybody else. All of this should be pretty chilling. America's secret agencies firmly subscribe to it's better to ask forgiveness than permission. And the NSA, CIA, the FBI, and the FBI. and others are very willing to bend the rules, interpret, and even break laws to suit their purposes,
Starting point is 00:16:51 all in the name of national security. Now to paraphrase Ben Franklin, when you trade liberty for security, you end up with neither. And there are many other companies like AT&T, Google, Facebook, that cooperate with the government with such a lack of friction that any American citizen should be concerned.
Starting point is 00:17:08 Those long agreements that you sign online without reading them, every once in a while, read one. Take note of how to have, how many of your rights you're surrendering for the convenience of being able to post pictures of your cat or leave a mean comment on a video. As we willingly surrender more of our privacy to digital conglomerates,
Starting point is 00:17:26 we're also surrendering freedoms, like the freedom from illegal searches and spying, like the freedom to criticize the government, the freedom to publicly disagree with popular ideas. We are guilty of being complicit in this erosion of our freedoms. And once freedoms are fully eroded, well, that's called slavery.
Starting point is 00:17:45 I can't promise we're not already there. Private eyes, machines are watching you. They see your every move. Private us, machines are watching you. Oh, hey, welcome back. Okay, so maybe during that first episode you thought, yeah, the government listens, and asparagus makes you tinky stinky.
Starting point is 00:18:11 No, duh. But what if I told you the spies don't just listen? They also talk back through creepy little robot voices, on the radio, reading numbers into the void like a haunted auction? This next one is about number stations, coded broadcasts, secret messages, and proof that sometimes the scariest thing in the static is somebody whispering instructions. Since World War I, numbers stations have been transmitting coded messages to spies around the world using shortwave radio, and they're still transmitting right now.
Starting point is 00:18:49 At the height of the Cold War, radio listeners around the world started to notice strange broadcasts. Starting with a weird melody or tone, these transmissions were followed by the unnerving sound of a woman's robotic voice counting in German. Were the creepy voice of a child reciting letters in English. Now, these transmissions sound strange to casual listeners, but to the right set of ears, they contain information that could change the course of history. In fact, number stations have changed the course of history. Let's find out why. Welcome to the Wi-Files where cool nerds laugh and learn. Hey, we gonna talk about this?
Starting point is 00:19:33 What? Hello, who's the new guy? What's he talking about him? Am I new? No, Space Panda, you're fine. Shh! Anyway, even though we're in the age of satellites and broadband Wi-Fi and cyber warfare, it could be that the old-fashioned radio is the real tool of the New World Order. If you want to conspire with spies, governments, and...
Starting point is 00:19:55 Illuminati. Right. So if your plan is to oppress the... the masses, you don't want to leave a digital trail, so instead you broadcast encrypted details of your evil plot over shortwave radio, also known as number stations. You may have heard that number stations are a relic of the past, but numbers stations are active and being used right now. And we're going to listen to a few in this episode. One of the best known number stations was the Lincolnshire Poacher, named after the folk song played as an identifying signal.
Starting point is 00:20:32 That's pretty creepy. It is. A couple of radio nerds slash heroes use direction-finding equipment to triangulate this station's location. The transmission was coming from a Royal Air Force Base in Cyprus. This station is believed to have been operated by MI6 from the mid-1970s all the way to 2008. One of the creepiest stations ever was called Swedish Rhapsody. It used a child's music box and a child's voice to read numbers in German.
Starting point is 00:21:08 This number station was operated for almost 50 years by the Polish secret police. Oh, that gives me chills. You can get chills underwater? Hey, do me a favor, will you? What? Don't hush my buzz. And my favorite number station of all time is Yosemite Sam, whose voice is played as part of the transmission.
Starting point is 00:21:28 The broadcast begins on one of several frequencies, then 10 seconds later, it's repeated on the next higher frequency, and so on and so on for a total of two minutes. The entire pattern takes exactly two minutes and always begins seven seconds after the top of the hour. Spies need to be punctual. Each broadcast starts with a data burst lasting 0.8 seconds followed by the voice of Yosemite Sam saying, You kidding me?
Starting point is 00:21:58 Nope. That's a numbers station broadcasting from a government contractor in New Mexico. Don't tell me they're connected to Lockheed Martin. Well, great. The two amateur radio operators slash heroes tracked down the source of the Yosemite Sam broadcasts in February 2005. The tower was located at the Mobility Assessment Test and Integration Center, also known as Matic.
Starting point is 00:22:23 And this was part of a factory owned by Laguna Industries located near Laguna, New Mexico. The guys went down there and took photographs of a compound containing buildings, towers, and antennas, but quickly fled when they were approached by a security guard yelling at them to not take any pictures. Just three hours later, the broadcast stopped and have not been heard since. What did Laguna Industries have to say about it? Oh, Laguna Industries removed all references to Maddoch from their website, and now that website is gone.
Starting point is 00:22:51 Not suspicious at all. Okay, so what are number stations? Well, number stations are simply shortwave radio transmitters, generally operating between 3,000 and 30,000 kilohertz. They're located in many countries all over the world, but no one really knows how many there are. The stations sometimes transmit numbers spoken by a computer-generated voice, which is how number stations got their name, but other broadcast Morse code, compressed
Starting point is 00:23:19 data bursts, or beloved cartoon characters. Now some stations have been broadcasting for decades, many have gone quiet since the end of the Cold War. Ha! What now? The Cold War is alive and well, my friend. Well, it's not a very enlightened point of view. Now wake up, Furface.
Starting point is 00:23:37 I beg your pardon. If you're dumb enough to think the Cold War ended. I don't know what to tell you, because we've been in one war or another for the Boys and there's no sign of a... Boys. Forgive me. Do continue. Oh yeah, do continue.
Starting point is 00:23:50 Anyway, countless number stations are on the air right now for what purpose do you really know. And the people that do know, they aren't talking. One anonymous intelligence agent from the UK said, number stations are exactly what you think they are. And that's all I'll say about it. So in almost every country, a license is required to broadcast. But number stations, aren't licensed. They're essentially pirate stations operating illegally, but nobody shuts them down.
Starting point is 00:24:19 And no government acknowledges they even exist. That's because number stations are the government. Okay, normally I'd call hecklefish a kook for saying that. Yay, oh! But this time he's right. I'm always right about this stuff. Amateur detectives, radio buffs, and investigative journalists have been studying number stations for years. And there's enough information out there that we can assume that these
Starting point is 00:24:43 that these transmissions have a single purpose. Espionage. All the messages were encrypted, that they became digits. And the digits would be sent over as in groups of five. Shortwave radio is old technology. In the late 1920s, it was a popular way to communicate over long distances because of the way the waves travel, which is called propagation. Space Panda.
Starting point is 00:25:08 Ah, the Earth's Sionosphere is a region of space between 80 and 600 kilometers above the surface. Shortwave radio energy can bounce high off the Earth's cyanosphere and come back down to the Earth, sometimes over and over again. This allows the signal to travel great distances. Oh, don't you two make quite a team? This is called sky wave or skip propagation. With a decent radio you can tune into a strong shortwave signal from
Starting point is 00:25:34 the other side of the planet. Now that's pretty useful if you're an intelligence agency and you need to send secret messages to agents and assets in the field. Also, Computerized messages can be hacked, tracked, and traced, but no one can trace who's receiving a shortwave radio signal, and it's hard to find the source of a transmission. And if you know the right frequency, anyone can eavesdrop on an international spy network, including you.
Starting point is 00:25:58 You can find tons of frequencies online, and I'll link to some websites in the description. Now, what you'll hear depends on the station. Some stations broadcast constantly, others power up schedule time, so agents in the field know when to tune in. You're going to hear a lot of Spanish, Spanish, Czech, Chinese, Hebrew, but you know where most of the spy stations are?
Starting point is 00:26:17 I know you're not going to say Russia. Yeah. Uh-oh. Yep. Yes. Yes. Now the broadcast you'll hear on number stations vary, but they generally begin with an alert signal, and this alert may be a simple tone, or it could be fragments of a song, such as the
Starting point is 00:26:36 Lincolnshire Poacher, the Swedish Rhapsody, all kinds of other ones. And this alert indicates to listeners that a message is about to begin and also gives a few seconds to tune in the radio for the best reception. 9.8.2.7. After the tone is usually a set of spoken numbers or letters, often four or five at a time, which are repeated again and again before moving on to a new set. There are a lot of variations on the same structure. Many stations have received nicknames that reflect the station depending on what's being
Starting point is 00:27:06 broadcast. Names like The buzzer, cherry ripe, the Spanish lady, the Russian woodpecker was a great one, Atencion, Yosemite Sam, and Swedish Rhapsody. I'll have a whole bunch more in the description. Now sometimes broadcasts are really clear, but other times atmospheric conditions can degrade the signals. And sometimes intentional jamming from other countries creates enough interference on the frequency that makes transmission difficult to understand. So to compensate, many stations like Yosemite Sam will hop around to different frequencies, tradecraft. The
Starting point is 00:27:41 coded structure of the messages indicates that these messages are indeed secret and intended to avoid detection. The question then is how to spies understand these messages when no one else can. That was a static filled, triple scrambled microwave transmission between two soldiers talking in Mandarin Chinese. Well, the Chinese were only using a simple polyphonetically grouped 20 square digit key transposed in booster vodonic form with multiple nulls. So even though they're very low tech, number stations are still in use because, unlike computer code, these transmissions are unbreakable.
Starting point is 00:28:13 Nothing is unbreakable. These messages might be. So, what's so hard about deciphering a few numbers? Actually, it's nearly impossible. Here's how spies in the field encode and decode their messages. First, you start with a block of randomized text. That's your one-time pad key. Then take your message.
Starting point is 00:28:34 Here we're using the name Jimmy Smith, two five-letter words. Then you have a cipher chart. This is a grid of A to Z and 0 to 9 on the X and Y-axis. axis, now set up your message matching the first five letters or Jimmy with the first five letters from the pad, then match up the word Smith with the second set of letters. Okay, now find the first letter of your message on the X axis, then find the letter underneath on the Y axis. Where the axes intersect, that's your coded character.
Starting point is 00:29:04 Repeat this for all your letters and your message is ready to transmit. To decrypt the message, set up the coded characters in groups of five, match those up with the pad, then find the first letter of the key on the y-axis, then move across until you hit the coded letter. The character at the top of the grid is your decoded character. And thanks to VHS blog for setting this up. Awesome. So both the sender and receiver immediately destroy the key at the end of the transmission. So even if someone else intercepts the numbers, which I have, without the key, they have no way to decode the hidden message. This also means there's no relationship between past or future messages, so there's no pattern to you.
Starting point is 00:29:42 used in breaking the code. To fool cryptographers, the numbers must be really, really random. And creating truly random numbers is actually really difficult, even for computers. But once in a while, the broadcasts are less than professional. The person reading the code may make mistakes, or there could be laughing in the background. Cuban number stations in particular are known for their hilarious missteps. Sometimes they've had such poor transmissions that they're impossible to hear, or they accidentally pipe music from
Starting point is 00:30:12 Radio Havana onto the airwaves. Genius. I would hazard to guess they are more foreign intelligence officers inside the U.S. working against U.S. interests now than even at the height of the Cold War. Some number of stations have illicit uses. Drug lords and other criminals use shortwave to avoid international authorities. This is especially true in the U.S. where many intercepted signals are broadcast in Spanish. Since they don't have government oversight, the execution is pretty sloppy.
Starting point is 00:30:53 Right, because the government is never sloppy in its execution. The fish does make a good point. But those number stations are pretty rare. Espionage is the most common use. There are even some very public and recent examples of this. In 1983, the KGB uncovered a CIA agent posing as a Soviet diplomat, who's receiving orders from American numbers broadcasts. Another well-known case is the 2001 Cuban 5 case, where Cuban spies were caught and shortwave broadcasts were used in the case against them as evidence.
Starting point is 00:31:24 Also in 2001, Anna Montes, who worked for the U.S. Defense Intelligence Agency, was arrested and convicted of spying for Cuba. Investigators searched her home and found a shortwave radio along with a code sheet that was used to encrypt radio transmissions. Now, she exposed the identities of covert operators. in Cuba and her information was directly responsible for the death of at least one American soldier, maybe more. In 2016, CNN called Montez the most dangerous spy you've never heard of, although now you've heard of her. And to this day, and despite this mountain of evidence, no government or intelligence agency
Starting point is 00:32:01 has ever officially admitted to using number stations. Today we're going to be discussing a radio set, not just any radio set, but a Russian radio set. So you don't need a radio to listen to spy communications. You can listen to the entire shortwave band online, and I'll link below. Because these receivers are operated by software, they can be used remotely by everyone in the world. And here's what one of those tuners looks like. Now if you're not a radio nerd, that might look a little weird, but if you want to dig in
Starting point is 00:32:48 further, I'll link to a tutorial up there and down in the description. I'll also link to priam.org station schedule, which is super cool. It lets you tell exactly when number stations are coming on the air and what frequency you need to listen. Now I'm thinking about doing a live stream of this, so if you want to see that, let me know in the comments. Now, if you just want to binge station broadcasts, you can go down a whole rabbit hole with the Connett Project. The Connett Project was an independent initiative to record, catalog, and inform the public about the secret transmissions that are around us in the air every day. You can even download the files as MP3s for later analysis. Oh, I'm gonna need a pencil, my tinfoil hat, and a tall glass of whiskey.
Starting point is 00:33:29 I'm sorry, but do you have any sherry? Oh, eh, give me a break. The quantity of number stations has dropped dramatically over the past few years. Still, the broadcasts continue. Are they feeding invaluable information to operatives on crucial missions? Or are they just holdovers from government agencies protecting their budgets? Both. Probably. It could also be that governments maintain the stations for readiness purposes.
Starting point is 00:33:53 If the power grid or internet goes down, a shortwave transmitter just needs an antenna and a diesel generator and they could be on the air, broadcasting around the world. But as communication technology continues to evolve and digital encryption gets harder to crack, we might finally see the end of number stations. Or maybe the opposite will occur. Maybe some catastrophic digital apocalypse will create a number station renaissance, pushing broadcasters back onto the front lines of international intelligence, where random numbers raining down from the ionosphere can once again change the course of human history. I always feel like machines are watching me, and I have no privacy. I always feel like machines are watching me. Tell me, is it just a dream?
Starting point is 00:34:47 No, it is not a dream. This is reality and it's creepy, but sometimes in a silly way, Kind of like a sleepover with John Malkovich. You don't feel unsafe, but it definitely doesn't feel right. Anyway, while you're busy worrying about satellites, smartphones, I present you something more sinister. Something maybe hanging around your block? A wire.
Starting point is 00:35:10 Did you know there's an 18-mile-long string of wire circling the island of Manhattan? Every morning, the wire is checked for breaks and snags, and every day it's repaired. And it costs about $150,000 a year. thousand dollars a year to maintain. The wire has been there for years yet most New Yorkers, myself included, didn't even know it was there. Let's find out why. To understand why there's an 18 mile long wire going around New York City, we need a quick lesson about Judaism. The Sabbath begins every Friday night at sunset and goes all the way through Saturday. And Jewish people who
Starting point is 00:35:52 observe the Sabbath, Saturday is a day of rest, meaning you don't work at all. And work doesn't just mean your job. Work is defined as any activity that was necessary in the building of the tabernacle. Now that might sound like just construction work is forbidden, but it's actually much more. Obviously no building of any kind is permitted, but also no grinding, baking, sewing, even starting a fire, not even small tasks like tying, tearing, or putting finishing touches on objects. Oh, and also no electricity on the Sabbath. Who set up all these rules? God. Why doesn't God want you to do any of this stuff on Saturday? Well, because he feels you should have one day a week to engage in pleasurable activities like eating, spending time with family, and having sex.
Starting point is 00:36:36 Oh. Shabbat sounds pretty good, actually. It can be. But on Saturday, there's one strickey rule. No carrying anything from a domestic area to a public area. You can't carry anything? Nope. No wallet, no keys. No carrying or pushing your children in a stroller. Nothing like that. You can carry these things within your home, but not outside. And that's where the wire comes in. I don't follow. Well, stick around and I'll tell you. Oh, a clip hanger.
Starting point is 00:37:02 What? What the heck is this? Shabbat sounds like a really good idea, so I'm Shoma Shabbas. You're Shomer Shabbas. Shomashabas. You can't just put on a hat and think the... Showmer Shabbas. Okay, okay, take it easy.
Starting point is 00:37:19 And show me shabbaz. Anyway, on the Sabbath, you can carry things within your home, so grabbing a glass of water from the kitchen is fine, but you can't carry anything from your home to a public place. Now, this is tricky if you want to leave you. your house and lock the door behind you. You aren't permitted to carry your keys. And what if you have an infant? You can't carry a child or even push a stroller. And if you need a cane to walk, no can do. And if you think this sounds inconvenient, you're not the only one. Many years ago, rabbis realized that in order to fully enjoy the Sabbath, you sometimes needed to
Starting point is 00:37:52 carry things. And this is where the wire around New York comes in. It's called an A-roove, and an A-roove is an unbroken continuous string or wire that circles a large public area. Now, originally, aerovan were actual walls, but now they're symbolic walls. And anything within the borders of the arroove is now considered part of the domestic domain, which means if you want to carry on Saturday, as long as you're within the arroof, you're good to go. If I were a rich fish, dibi, diby, doby, doby, doby, all day long I do, do, do, if I were a wealthy fish. In the 1990s, there were only a few Aruvin in the United States, but now there are hundreds. If you live in a medium-sized city, there's probably
Starting point is 00:38:37 an A-roof or two in your neighborhood. And if you live in a big city, there's definitely at least one. The most expensive A-Roove in the world, and the one with the largest population, is the May-Roof in Manhattan. And it began as a small community enclosure in the Upper West Side, and now it covers almost the entire island of Manhattan. What area isn't covered? Hell's Kitchen. Checks out. Every morning, a rabbi drives the entire length of the wire and notes places where it could be broken. Then on Thursday and Friday,
Starting point is 00:39:05 he goes out with a construction team to make sure the wire is repaired, and it costs about $150,000 a year to maintain this. The Manhattan Aerov has survived vandalism, two hurricanes, even one really aggressive Thanksgiving Day float. Damn, you SpongeBob! It's had a couple of close calls, but for over 20 years, the Aerov has remained intact.
Starting point is 00:39:25 So there's an almost invisible wire running around almost every major city in the Western world, including 18 miles around Manhattan Island. And now you know why. We're never alone now. There always seems to be a bunch of techo-ri-hound. We're never alone now.
Starting point is 00:39:49 The beating of my heart is just another sireound. At this point, I'm feeling pretty good inside Cage Against the Machine. I'm coming, I'm coming. Nothing getting in, no trackers getting out, No smart toaster narking on me to the cloud. But then I hear the next weapon the machines use might not be a signal at all. It might be sound. Frequencies you can barely hear, waves your body can feel,
Starting point is 00:40:19 and invisible attacks that turn the air itself into your enemy. Good, great, grand, wonderful. This episode is all about the fear frequency. Who the hell are you? Have you ever wondered what ghosts sound like? In the early 1980s, Vic Tandy was, was working at Warwick Labs in the UK where he designed medical equipment. And there were rumors among the staff that the building was haunted.
Starting point is 00:40:50 But Tandy figured this was related to the constant sound of life support systems that were operating on site. But one night, Tandy was working late when he started to feel strange. The hairs on the back of his neck stood up. He broke into a cold sweat and felt the sense of dread wash over him. His heart started to race and he had the very specific feeling that he was being watched. Then out of the corner of his eye, he caught the glimpse of a gray figure drifting across the room. He turned around and the figure was gone.
Starting point is 00:41:18 Absolutely terrified, Vic Tandy bolted from the lab and raced home. Now after he calmed down, he vowed to find a logical scientific explanation for what happened. Well, Vic Tandy got to his office the next day and started looking around for the ghost. He didn't find one, but he had noticed something strange. He was an avid fencer and in his lab he had a foil locked in a vice. Wait, he sold, stolen merchandise? No, that's a fence. Fencing is a style of sword fighting using a foil. A sword made out a foil?
Starting point is 00:41:54 A foil is the type of sword. I'm so confused. It doesn't matter. Anyway, a foil... Sword. ...was locked in a vice, and Tandy noticed it was vibrating really quickly, even though nothing was touching it. Now, it turns out a fan was recently installed in the lab
Starting point is 00:42:09 and was causing a sound wave to bounce between the walls. And the wave's intensity was focused in the center of the room, which was the location of the foil. So what? And where he was standing when he saw the ghost. That Tandy calculated the frequency of the sound at about 19 hertz. This frequency is important. The range of human hearing starts at 20 hertz,
Starting point is 00:42:28 so Tandy's fan wasn't audible. It's what's known as infrasound, but just because we can't hear it doesn't mean it can affect us. All material objects have a natural resonant frequency, and if the object is exposed to a sound wave of this frequency, it'll vibrate in response. This is called sympathetic. resonance and you can test this. If you strike a key on a piano in one room, a piano in
Starting point is 00:42:50 another room will resonate that same note. This is also why running your finger around the rim of a glass at just the right speed will produce sound. Now back to Tandy's lab. It turns out that the human eye resonates at about 19 hertz. So what appeared to be a ghost was actually Tandy's eye vibrating at the frequency of the fan. Since this frequency has an actual physical effect on the body, the sound was causing a sense of fear and anxiety to employees in the area. And Tandy said that when they switched off the fan, it was like a huge weight was lifted, and these frequencies don't just affect humans.
Starting point is 00:43:28 Researchers have discovered that just before a tiger attacks, its roar contains frequencies at 18 hertz, which could disorient their prey long enough for the tiger to move in for the kill. Now, just under 20 hertz has been called the fear frequency for how it affects mammals, and lots of horror movies have used sounds at or just above the fear frequency to make their films even scarier. What happens if we go lower? Lower than 18 Hertz? Yeah. Things get much worse.
Starting point is 00:43:53 How much worse? Ever hear the Brown note? The Brown note. Does that mean what I think it means? Grab a diaper. Oh no. The Brown note is said to occur at frequencies between 5 and 9 hertz. This is the hypothetical range of sound that supposedly causes humans to lose control of their bowels.
Starting point is 00:44:13 I say hypothetical because nobody's been able to actually prove it yet. The Brown note was famously busted by Adam Savage on myth when he surrounded himself with giant speakers and had the note pumped into his body. Now he didn't feel so great afterwards, but his diaper stayed clean. He actually wore a diaper? Yup. I love Mythbusters. Me too.
Starting point is 00:44:33 But here's the thing about that experiment. Air really isn't a great conductor of sound, especially at low frequencies. But when you're physically connected to the vibration, its effects are much more intense. The United States space program conducted tests that transferred brown note and other frequencies directly to subjects bodies by vibrating cockpit chairs. Now, test frequencies range from 0.5 Hertz to 40 Hertz and power levels of 160 decibels. Is that loud?
Starting point is 00:45:01 Well, for a comparison, a lawnmower is 90 decibels. A chainsaw is about 130 and a gunshot is 140. So testing people at 160 dB, even if you can't technically hear the sound, it's going to get results. Test subjects experience nausea, hallucinations, difficulty breathing and involuntary motor functions. Now, nobody officially crap their pants, but this experiment is probably where the urban myth came from.
Starting point is 00:45:28 But you don't have to be an astronaut to get sick from sound. There's something called wind turbine syndrome. Now, not everyone, but a little over 20% of people who live near large wind turbine farms report all kinds of negative effects. They range from difficulty concentrating all the way up to extreme stress and uncontrollable migraines. In one instance, an air traffic controller almost caused a fatal plane crash because he was experiencing insomnia caused by living near a wind farm.
Starting point is 00:45:54 Now, there have been about 20 studies done on wind farms, but they found no link between the turbines and people getting sick. Who, uh, who conducted these studies? Uh, the wind turbine companies. Uh-huh, I thought so. Still, it has been proven that people who live and work near a lot of noise experience higher levels of stress and have more cortisol in their blood than people who live in quiet environments. So if we know sound can be dangerous, could it be used as a weapon?
Starting point is 00:46:20 going to go with the yes? Yep. The most dangerous frequencies to humans are at about 7 hertz. This is the median alpha rhythm of the brain and the resonant frequency of many of the body's organs. What does all that word salad mean? This means that at high enough volume, these sounds can directly affect the central nervous system
Starting point is 00:46:39 causing panic, convulsions, vomiting, and with long enough exposure, organ rupture and death. And one of the most well-known inventors of infrasonic weapons was a Russian-born friend. French scientist named Vladimir Gavreau. Now Gavreau became interested in sound research in 1957 when he was asked to cure an unknown illness that was affecting people at a research plant in Marseille. Now Gavro tracked the problem to air conditioning units that were generating low frequency sound. When the units were turned off, the problem suddenly disappeared.
Starting point is 00:47:08 So Gavro began experimenting with acoustics to create a weapon for the French military. A big shock. Whenever we discover something dangerous, turn it into a weapon. That does seem to be what happens. Gavro developed a few prototypes, which he tested on himself and his team. And according to reports, one of the researchers died instantly, and Gavro wrote, his internal organs mashed into an amorphous jelly by the vibrations. Higin jelly. Even people at nearby labs were sick for hours.
Starting point is 00:47:38 They said every organ in their body was vibrating, hearts, lungs, stomachs, everything. These weapons used infrasound, which are frequencies below human hearing. But what about frequencies above human hearing? That's called ultrasound, and it's also dangerous. There are two ways that ultrasound damages the body. The first is that sound waves can actually heat up human cells, which causes all kinds of problems. The other is something called cavitation.
Starting point is 00:48:09 When sound waves pass through an object, they rapidly push and pull on that object. This is called compression and refraction. When ultrasound causes human cells to cavitate, it creates bubbles in the tissue, And this is exactly what happens to divers suffering from decompression sickness. The bends! Right, the bends. Ultrasound is such an effective weapon that has been used by the US Navy to repel pirates.
Starting point is 00:48:31 So the US has used sonic weapons against its enemies. But have the enemies of the US use sonic weapons to attack Americans? Turns out, they have. A strange illness has been afflicting American intelligence officers and diplomats in Cuba, and it's now known as Havana syndrome. This summer, the CIA reported that officers were experiencing symptoms while traveling to India. And two U.S. officials visiting Hanoi suffered unexplained health incidents. And recently, German officials confirmed that they were investigating an alleged sonic attack against the U.S. embassy in Berlin. So what does Havana syndrome feel like? Well, it's described as someone suddenly experiencing a broad range of symptoms like migraines, anxiety, dizziness,
Starting point is 00:49:16 lapses of memory, and cognitive disruption. Now, some people describe that they feel like they were hit by a blast wave or a beam of energy. And in some cases, the symptoms were brief, but other people experienced such devastating effects that they required hospitalization and long-term care. The first cases of Havana syndrome were reported in 2016 when Canadian and American officials arrived in Cuba. A CIA officers stationed at the embassy there
Starting point is 00:49:40 reported feeling fatigue, nausea, and pressure headaches. And brain scans showed tissue damage that's normally seen in people with concussions after being in a car accident. The issue was so serious that the Obama administration evacuated the embassy. And what did the Cubans have to say about it? Oh, they had no idea what could be happening. Uh-huh.
Starting point is 00:49:58 But since then, Havana syndrome has been reported by U.S. officials all over the world. Cuba, China, Russia, Colombia, Uzbekistan, even the United States. And last year, two White House staff experienced symptoms while working at the White House. Now, according to investigators, the illness could be the result of a sonic weapon or exposure to high-energy microwaves. Another study done by the National Academies of Science, Engineering, and Medicine said that directed, pulsed, radio frequency energy could be responsible. Many intelligence officers are quietly pointing the finger at Russia, but no evidence has been made public yet. Now, what did the Russians have to say about it? They deny any involvement.
Starting point is 00:50:36 As of now, there's still no official explanation, but the CIA and State Department have prioritized getting to the root cause of Havana syndrome. Oh, they're always trying to get to the root cause. They are. Do they ever find it? Yeah. Uh-huh. Contra-wo-wo. When machines mess with me, when machines mess with me,
Starting point is 00:51:08 I'm falling apart right in front of you, can't you see? I lose control, whoa, when machines mess with me. Wow. I would cry if I could cry. Uh, I mean, moo. Milk me. So they can watch us, listen to us, send secret messages, hide wires over our heads,
Starting point is 00:51:35 and maybe blast our brains with spooky sound beams. But here's the part that makes my tail go numb. What if the powers that be don't need to force you to do anything? What if they just nudge you a little bit? A word here, an image there, a sound, a symbol, a message buried so deep you don't even know you saw it? That's subliminal warfare. Mind control and invisible windluence.
Starting point is 00:51:59 Now you belong to them. Saddam Hussein met with his generals in Basra on January 27, 1991. He was pacing back and forth, and he was furious. Six months earlier, Iraq had invaded Kuwait, and the world responded with a relentless shock and awe campaign. The coalition's 2,000 daily air attacks had crippled Iraq's defenses and destroyed its air force. Hussein's plan to draw coalition troops into a costly ground war had backfired. Instead, Iraqi soldiers were surrendering by the thousands.
Starting point is 00:52:43 These were battle-tested troops in one of the world's largest armies, laying down weapons without firing a single shot. It was maddening. An officer handed Hussein a report about a radio transmitter in Kavji Saudi Arabia. He dismissed it as Western propaganda, but his officer asked him to keep reading. There was an intelligence document attached. It said the FM transmitter in Kofi was broadcasting subliminal messages
Starting point is 00:53:12 that were making Iraqi troops surrender using mind control. Hussein ordered the tower destroyed within three days. His officers pushed back. The town was lightly guarded for now, but taking it would be a suicide mission without air support. They didn't even know if this mind control weapon was real. It could be another American lie.
Starting point is 00:53:33 Hussein stopped pacing. Three days, he said. His tone left no room for discussion. Major General Salah Mahmood saluted, took a deep breath and reached for the phone. Marine Corporal Jesse Colvin was at observation post four scanning the dark horizon. Op.4 was on top of the police station in Kofi,
Starting point is 00:54:05 a small town in Saudi Arabia. Colvin wasn't expecting to see much. The coalition had air supremacy. If Saddam Hussein did so much as toss a paper plane from a window, there'd be F-15s on top of it before it reached the ground. Still, Iraq had plenty of ground forces in the field, and the Saudis asked the U.S. for support. It was about 20,100 hours... 8 p.m.
Starting point is 00:54:27 Yes, thank you. No problem. It was about 8 o'clock, and it was a quiet night. Colvin only heard the wind coming off the Gulf and the occasional crackle of the radio. Then Colvin heard a rumble that, at first, he thought, was thunder. He aimed his night vision binoculars north. tanks, and troops. He couldn't believe it.
Starting point is 00:54:49 It took him a second to process, and then he grabbed his radio. Contact, contact, enemy armor sighted. Multiple vehicles approaching from the north, over. Colvin didn't get a response. We're deep. Contact, contact, contact, enemy armor, approaching from the north, over. Still, no response. The radios worked earlier, so Colvin assumed the radios were being jammed. He grabbed his M-16 and headed downstairs.
Starting point is 00:55:15 His unit wasn't prepared for an attack of this size. 90 minutes later, air support arrived, but it was too late. The Iraqi army took the city. Whether they could hold it or not didn't really matter. They accomplished their mission. They brought down the FM radio transmitter. The Marines at Kofji thought this attack was crazy, and they weren't prepared for such a large offensive.
Starting point is 00:55:42 Of course, they had no idea what they were guarding. Iraqi intelligence was right. The United States had the United States had the war. deployed a subliminal weapon. Can humans be controlled subliminally? The answer, of course, is a big yes. And you won't be surprised to know that advertisers were the first to jump on this new technology. For six weeks in 1957, families in New Jersey went to the movies, had a fun night out, and went home, totally normal.
Starting point is 00:56:29 They had no idea they were exposed what was later called a start. a startling kind of invisible advertising. A mechanism had been attached to the film projector. It flashed messages on the screen every five seconds. Each message only appeared for one three thousandth of a second, too fast to be seen by the human eye. But that was the point. The goal was to have these messages bypass the conscious brain
Starting point is 00:56:56 and register directly in the subconscious. Fourteen hundred times over the course of two hours, the audience saw, Well, their subconscious mind saw calls to action like Eat More Popcorn. Over 45,000 movie patrons were exposed without their consent or knowledge, and popcorn sales jumped 58%. Ad agencies went into overdrive, and new companies were launched in the subliminal space. Raise.
Starting point is 00:57:25 Radio stations WAAF in Chicago and WCCO in Minneapolis tested subliminal ads to see if they increased sales. They did. Rees. American television networks implemented the technology into their broadcasts. It worked. Rays. What are you doing? What?
Starting point is 00:57:43 Me? Nothing. Whispering Rays is not going to make me give you a raise. I don't know what you're talking about. But when the public learned that they were being manipulated without their knowledge or consent, there was a huge backlash. The Hollywood reporter called it an obscene violation. The L.A. Times and Washington Post flat out called it brainwashing. Within a year, theaters, radio, and television broadcasting.
Starting point is 00:58:07 ban subliminal advertising. Of course, banning flashing images wouldn't stop consumers from being unconsciously manipulated. No one realized it was already happening, and it was very successful. You stepped on my cliffhanger even after I told you to stop? Well, I'm busting my hump in this bowl, and I think I deserve a little more scratch. Well, if you want to raise, then maybe you earn it. You don't just jump in and ruin the best part of the scene. Risa's knows a thing or two about great combinations.
Starting point is 00:58:39 Chocolate and peanut butter, obviously, but there's more than one way to Reese's. From indulgent Reese's big cups with caramel to crunchy Reese's pieces and Reese's miniatures, there's a delicious Reese's for every mood. It's the same combo you love, just with more ways to enjoy it. So whether you're snacking, sharing,
Starting point is 00:58:58 or just treating yourself, nothing else is Reese's. In the late 19th century, Sigmund Freud popularized the idea we are motivated by our unconscious. Unconscious motivation is used in product marketing all the time, because it works. Marketing expert Ernest Dichter used a Freudian technique, word association, to test consumers. He wanted to know not what they bought, but why.
Starting point is 00:59:27 He learned that moms bought candy for their kids as a reward for good behavior in the grocery store. So he had stores move candy right next to the cash registers. They're still there today. Sanko was a decaffeinated coffee brand that attacked regular coffee in its ads, but consumers love coffee and felt Sanka was insulting coffee drinkers. So instead of attacking regular coffee, Sanka changed its slogan to, now you can drink all the coffee you want. And you can drink it as strong as you like.
Starting point is 00:59:58 Drink five, ten cups a day, as many as you like, and any time you like, that's for sure. Sales went through the roof. Bill Friedman was a gambling addict who used his experience to shape how most casinos are laid out. Now once you're in, you can't see any exits. You can't see any clocks. You can't see outside at all. These tactics disrupt our sense of time.
Starting point is 01:00:22 There is constant noise, even if the floor is mostly empty. This is designed to keep you in a heightened state so you don't get tired. Most casinos offer players free alcohol. This reduces inhibitions. And after all those free drinks, you need to use the restroom. But you have to weave your way through slot machines to get there. That's why I keep my own restroom right here. What?
Starting point is 01:00:47 Why aren't you moving? Hmm? You're going right now, aren't you? What? No, mind your business. Gross. What? I wash my fence. In a casino, there's no direct route to anywhere, especially in exit.
Starting point is 01:01:05 Now, a lot of this is common knowledge. It's slippery, but not dishonest. Like changing a slogan or laying out a casino, it's out. in the open, Edward Bernays was a pioneer in public relations and propaganda. He used tactics that were not out in the open. He manipulated public opinion in ways that were entirely unconscious. It makes sense Bernays was good at talking to the subconscious. He was Sigmund Freud's nephew.
Starting point is 01:01:31 Whether to sell more paper cups that we worked with or to make people more honest or more virtuous depends on public consent and so we worked out the engineering of consent. His first campaign was in 1929. He influenced the entire nation without their knowledge. He was so good he influenced you and you never knew it. New York City, April 1st, 1929. It was noon on 5th Avenue and the Easter parade was packed, one of the best attended in history. The event signaled the beginning of a new modern era. The cars were new, fashion was cutting edge, and cameras filmed the parade for the first time. A group of young women used this as an opportunity
Starting point is 01:02:27 to put on an outrageous display, something unthinkable, something women have never done in public. Yo, baby, we're getting spicy. Bow, chicka, bow, bow, bow. The women strolled along the parade, smoking cigarettes. Oh, oh, they smoked after the outrageous display, huh? What did they do? Was there leather involved? Oh, please tell me there was leather. Uh, no, smoking was the outrageous display. Oh, well, that's disappointing. And what is it with you in leather? Don't kink shame. Okay, never mind. Bow, chica-bow, bow, bow. In 1929, women smoking in public was unacceptable. It just wasn't done.
Starting point is 01:03:12 But these ladies didn't care about tradition. They wanted the freedom and equality to smoke in public, just like men. So they did. Suddenly, cigarettes were called torches of freedom, and the demand for cigarettes among women exploded. Women saw cigarettes as symbols of independence and freedom. They had no idea the whole thing was staged. Those weren't rebellious women fighting for equality. They were actresses hired to play a part. Edward Bernays orchestrated the whole scene for his client,
Starting point is 01:03:41 the American Tobacco Company. Bernays was so good at manipulating consumers, he's affecting you to this day. Up until the 1920s, Americans ate a light breakfast, toast, juice, coffee, that was it. This was especially true for what they called brain workers, folks who sat in offices all day. Then in August 1922, an article appeared in the New York Times. Sometimes health advice is pleasant, requiring no work, no self-denial. An interesting sample is offered in the medical review of reviews.
Starting point is 01:04:18 It queried doctors in 46 states. Three out of four physicians advise eating a hearty breakfast of bacon and eggs. Articles like this were all over the country. Doctors suggesting bacon and eggs for breakfast? This was a new and decadent idea. People loved it. Only there was no science behind the claims. No study.
Starting point is 01:04:45 The whole thing was propaganda coordinated by Edward Bernays. The Beechnut Packing Company wanted to increase bacon sales. So Bernays surveyed $5,000. doctors and asked them if a heavy breakfast was better than a light breakfast. He published the results, making sure bacon and eggs were mentioned every time doctors described the ideal breakfast. Doctors that didn't think bacon was a good idea? Well, they got no ink.
Starting point is 01:05:11 Bacon sales exploded, and American culture changed forever. To this day, 70% of all bacon is eaten for breakfast. Though it can be enjoyed at any time of day for any occasion. I can't deny that. Oh, bacon. Nature's candy. Bernays proved he could influence the behavior of an entire country. His success landed him a new client, a big one.
Starting point is 01:05:35 They asked Bernays to do the impossible, overthrow a foreign government. So Bernays would change history again, but this time, he'd do it for the CIA. Acobo Arbenz was elected as Guatemala's president in 1951, and it brought hope and optimism to the nation. His platform of social reform and economic development, resonated with the people, but not with the United Fruit Company. United Fruit was an American corporation,
Starting point is 01:06:11 Guatemala's largest employer and landowner. Its banana plantations generated twice the revenue of the entire country. They wielded immense power. This is where the term banana republic comes from. In 1952, Arbenza's government passed a bill requiring the transfer of unused land from large landowners to poor farmers,
Starting point is 01:06:33 with compensation. by the government. The United Fruit Company refused. The normal solution would be to lobby the Arbenz government and reach a compromise. But United Fruit wasn't looking to compromise. They wanted to win, so they hired Edward Bernays, who went right to work.
Starting point is 01:06:52 Bernays flooded American media with articles portraying Arbenz as a dangerous communist. It was a lie. In his inaugural address, Arbenz promised to convert Guatemala from a backward country with a feudal economy into a modern capitalist state. But the lie worked.
Starting point is 01:07:10 This was the Cold War. A communist threat was just 1,300 miles from U.S. soil. The American people demanded action, and the CIA was more than happy to oblige. The CIA launched Operation P.B. success in 1954. They funded and trained a rebel paramilitary force. On June 18th, the Liberation Army seized control of the government, forcing Arbenz into exile.
Starting point is 01:07:35 Carlos Castillo Armaz was installed as a U.S.-backed military dictator, the first of many. To filial to who stay in contra of the leg. Termole in Central America. First there was Nicaragua, then El Salvador. Now comes Guatemala. For 40 years, Guatemala suffered brutality, terror, death squads, and political instability. The human rights violations during this time are so graphic, I can't tell you what they are. And whatever you're guessing, it's worse.
Starting point is 01:08:15 93% of these crimes were committed by CIA-trained operatives. 200,000 dead, another 200,000 fled. One million people lost their homes. But the United Fruit Company's profits were safe, thanks to America's master of propaganda. An interesting little insight into this covert action. One, the U.S. ambassador to the United Nations, Henry Cabot Lodge, had personal stock holdings in United States.
Starting point is 01:08:46 holdings and United Fruit Company. The Assistant Secretary of State, John Lodge, had personal stock holdings and United Fruit Company. The Secretary of State John Foster Dulles, his law firm, did legal work for I believe it's the Schlaughtley Bank, which held the papers on the Guatemalan Railroad, which was owned by the United Fruit Company. And the CI Director, Alan Dulles, was his brother, also was a member of the same law firm. with this indirect financial interest in United Fruit Company.
Starting point is 01:09:20 Our Bens was not a communist, and there was not a single communist in his cabinet. Bernays proved you could subconsciously control a person's opinion, but the U.S. military intelligence apparatus wanted more. They wanted to subconsciously control a person's actions. The subliminal was about to become weaponized. Psychological operations or sciops are a standard part of U.S. military operations. operations. The Army Field Manual even calls them vital. The term SIOP sounds mysterious, but the tactics are usually nothing more than distributing leaflets or broadcasting propaganda
Starting point is 01:10:06 over the radio. The goal is to influence enemy behavior using information instead of bullets and bombs. In the thick of the Vietnam War with American casualties mounting, leaflets weren't going to cut it. But the army had a powerful new tool that could directly target enemy troops, the squawk box. The squawk box was a sonic weapon that used specially designed speakers mounted on armored vehicles and helicopters. The human ear can suffer damage from sound over 85 decibels. The squawk box could deliver a devastating shriek at 120 decibels from two and a half miles away. Biokong soldiers were instantly incapacitated by the intense sound. They suffered pain, nausea, and often permanent hearing loss.
Starting point is 01:10:54 But the squawk box could do more than inflict physical harm. The army discovered that sound waves could manipulate emotions, inducing distress and confusion in the enemy. The results were staggering. Between 1967 and 1968, an estimated 30,000 Viet Cong surrendered to U.S. forces. Despite its success, the squawk box had a critical flaw. The enemy could hear it coming, literally. The army wanted a more deadly and discreet.
Starting point is 01:11:30 weapon, something the enemy couldn't see or hear. Sound waves couldn't do it. But electromagnetic waves, they absolutely could. In 1961, microwave technology was becoming part of daily life. Microwave ovens had just hit the market, and low levels of microwaves were used in lots of different devices. Biophysicist Alan Frey began studying microwave effects on humans to make sure there were no health risks. He placed subjects in a shielded room and exposed to the world. to expose them to different microwave frequencies. At 1,310 megahertz, something strange happened. A subject asked about a clicking sound,
Starting point is 01:12:15 but the room was silent. It was shielded from the outside, and there were no moving parts involved in this experiment. Frey discovered that frequencies between 200 and 3,000 megaharts caused people to hear sounds that seemed to come from inside their heads. Clicks, knocks, buzzes, and chirps. He could beam sounds directly into the brain, without implants. Scientists started using this to train animals, making cats change direction
Starting point is 01:12:42 with just microwave pulses. Oh, I'd like to make cats change direction right into oncoming traffic. Stop that. Well, you better tell your demon fur babies to keep the filthy mitts out of my bowl. Okay, settle down. The CIA wondered, could this technology affect an animal's heart rate? More specifically, could they induce a heart attack remotely? Frey experimented with frog hearts and pulse-modulated radiation.
Starting point is 01:13:11 He was actually disturbed to find he could increase a frog's heart rate with no device attached. He did it remotely. Soviet scientists had similar results with rabbits. By 1972, the Soviets moved to human trials. A declassified report revealed they had done over 500 studies on how microwaves affect human behavior. Both lethal and non-lethal effects were found. found. The mention of lethal effects was a horrifying new detail. They didn't mean to kill their subjects, but they discovered they could. And those that survived exposure could be remotely controlled.
Starting point is 01:13:50 The U.S. Army loved it. They immediately ramped up research on microwave radiation. They ordered trucks capable of carrying microwave broadcasting equipment. The goal was to irradiate and immobilize the enemy. In 1976, the Navy finally discovered how Soviet scientists were accidentally killing people. They were using microwaves powerful enough to generate heat. Soviet scientists called it microthermal effects. If you own a microwave oven, you call this microthermal effect cooking. The Russians cooked people?
Starting point is 01:14:23 Yep. I bet you taste like chicken. That's gross. Oh, oh, oh, oh, oh, oh. Eating human is gross, but eating fish is okay. Hmm. Ah, see what happens when the shoe's on the other fish? Fair enough.
Starting point is 01:14:37 Yeah. J.F. Shappitz was a trusted black-op scientist who worked for the Department of Defense. He tried broadcasting commands into his subject's mind. It worked. Using low-power microwaves, he could make subjects hear words inside their own heads. The military told Shappitz to go further. They wanted to send commands to a person's subconscious, without them hearing the command. In a second round of experiments, one subject was bombarded.
Starting point is 01:15:06 barred with microwave radiation. Then something odd happened. He got up from his chair and left. He actually left the lab. Now, this was allowed. The subjects weren't prisoners, but this had never happened before. A little while later, the guy returned with a can of soda.
Starting point is 01:15:22 Shappitz asked him why he left in the middle of the experiment. The man said he was thirsty, so he went to the store for a cold drink. Shappet smiled. The experiment worked. This subject had been programmed to feel thirsty and to go to the store for a soda. It was hypnosis using microwaves.
Starting point is 01:15:41 But hypnosis doesn't work on everyone. The military needed a sure thing. And four years later, that's exactly what they got. In 1980, Dr. Elden Bird working for the DOD was exploring frequencies much shorter than microwaves. He wanted to weaponize human brain waves. Brain waves, also known as neural oscillations, are patterns of electrical activity in the brain.
Starting point is 01:16:13 These waves have different frequencies that correspond to different mental states, beta waves for active problem solving, alpha waves for relaxation, and so on. Dr. Bird tried synchronizing external electromagnetic waves with brain waves. He believed he could influence specific thoughts and emotions by matching the frequency and ramping up the power. It worked. He discovered he could sink with an animal's brain waves and trigger the release of behavior-regulating chemicals.
Starting point is 01:16:44 We could put animals into a stupor. We got chick brains to dump 80% of the natural opioids in their brains. We got rats to release histamine. Histamine is released in response to allergens, dust, pollen, mites. Histamine also causes a cascade of inflammatory reactions. Bird was thrilled. In humans, this would cause instant flu-like symptoms and produce nausea. produce nausea, you would disable a person temporarily.
Starting point is 01:17:17 It would have been like a stun gun. Bird used the phrase would have been because his project was shut down after two years, despite being approved for four. He was onto something groundbreaking. He suspected the program wasn't shut down. He believed it was moved to Black Ops, and he was right. In 1982, a U.S. Air Force report contained an ominous warning. Understanding the brain as an electrically mediated organ suggests that impressed electromagnetic fields are capable of directing behavior.
Starting point is 01:17:51 Further, the passage of 100m.p. Through the myocardium can lead to cardiac standstill and death. The U.S. Air Force was secretly continuing birds' brainwave research. They hired Dr. Ross 80 to weaponize it. 80 began by implanting transmitters into animal brains. These devices didn't receive information, the implants sent out information. AD compiled a library of frequencies and their corresponding mental and physical states. Then he turned the animal's brainwaves against them.
Starting point is 01:18:28 By broadcasting certain frequencies back into their brains, he could manipulate their behavior and their emotions at will. Eventually, he refined the technique to work without it. implants. It was time to test the technology on the human brain. He placed the subject's head in an active electromagnetic field and tuned it to a specific frequency depending on the result he wanted. In one experiment, he turned the machine to induce theta waves. Our brains produced theta waves as were falling asleep. The subject of the experiment fell asleep. The technology for a revolutionary new weapon was born. Now it was time to build it. A device that can manipulate
Starting point is 01:19:17 a person's thoughts and emotions sounds like science fiction. At best, it sounds like pseudoscience. But not only does such a device exist, but it's been patented, although the full schematics are classified by the U.S. government. Patent number 515-9703, issued to Silent Sounds Incorporated, described something called a silent subliminal presentation system.
Starting point is 01:19:41 The device maps electrical brain activity corresponding to specific emotions. These emotional signal clusters are identified and logged to create a database of emotions. Human brainwaves are then cloned and enhanced. You select a desired emotion, fear, despair, hopelessness, and the system can transmit it. The emotional triggers are carried by the silent sound spread spectrum, or S-Qua, a subliminal carrier technology that operates at either very low or very high frequencies. The key is that it's inaudible.
Starting point is 01:20:16 And what makes this system more practical and more dangerous is that S-Qod can be transmitted using a carrier frequency like ordinary radio or television. Yeah, what's you talking about, Willis? Okay, let's say you want someone to feel sad. You grab the brainwave frequency for sadness from your database. Then you layer that inaudible sound wave on top of an audible sound wave, like an FM radio wave. So the target hears the radio broadcast but doesn't realize a second wave hitched a ride. that second wave sinks with the target's brain triggering sadness,
Starting point is 01:20:49 or whatever emotion you want. According to the patent, the resulting emotion is overwhelming. Now, the patent insists that this is not a weapon, but it does note the waves are subliminal and undetectable. That makes them dangerous. Silent Sounds Inc. claims to focus solely on positive emotions, but in 1996, the president of Silent Sounds couldn't stop himself from bragging about the devalued.
Starting point is 01:21:15 vices true purpose. While the schematics are classified by the U.S. government, we are allowed to say we work with governments around the world, the Germans, even former Soviet Union countries. And then he let the big one slip. The system was used throughout Operation Desert Storm quite successfully. The U.S. military had achieved subliminal mind control and deployed the technology in Iraq, and many Iraqi troops died trying to stop it. In 1991, Saddam Hussein occupied Kuwait with a huge army,
Starting point is 01:21:59 nearly 500,000 soldiers. It was the fifth largest military in the world, and they were battle tested from eight years of war with Iran. So it sounded like wishful thinking when the Bush administration said they wanted Iraqi troops to simply lay down their arms and go home. Huh? Why would they do that? Because the US military had a new secret weapon,
Starting point is 01:22:27 a radio station in the small town of Kofioree, If you tuned into the station, you'd hear music or news, like any radio station. But embedded in the radio transmission was a signal that mimics a brainwave frequency. Specifically, the frequency that creates the feeling of hopelessness. And it worked. Entire battalions laid down their arms. Iraqi tanks flew white flags. They simply lost the will to fight.
Starting point is 01:22:52 American troops rolled into Kuwait, heavily armed and ready for battle. Iraqi troops were waiting patiently. Recently, thousands of them. One Marines said they were surrendering so fast they could hardly keep up. The war seemed to be coming to an end. That's why it was a surprise to the Marines in Kofi when around 8 p.m. on January 29th,
Starting point is 01:23:11 Iraq's 5th mechanized division attacked and took the town. This was a much-needed propaganda victory for Iraq, but it didn't last. I would tell you, I don't think that battle is over by a long shot. I expect a lot more fighting will probably occur tonight. Two days later, American Air Pats, power overwhelmed Kofi and the 5th Mechanized Division was completely wiped out. But they destroyed the transmitter that was subliminally making Iraqi troops surrender
Starting point is 01:23:40 so they accomplished their mission. Or did they? U.S. government officials deny any of this ever happened and are adamant that such a system does not exist. Former Navy Weapons Research Director Charles Bernard was asked about it. I have yet to see one of these ray gun things that actually works. And Darba has come to us every few years. years to see if there are ways to incapacitate the central nervous system remotely, but nothing has ever come of it. That's too science fiction and far-fetched.
Starting point is 01:24:15 Okay, so it's just a conspiracy theory. The CIA did not use FM radio to transmit subliminal messages. That's the official position. But here's something strange. A ceasefire agreement was reached that allowed Saddam Hussein to remain in power. This brought a lot of criticism of the Bush administration. But the purpose of the war was to free Kuwait, not overthrow the Iraqi government. Our goal is not the conquest of Iraq. It is the liberation of Kuwait. It is my hope that somehow the Iraqi people can, even now,
Starting point is 01:24:49 convince their dictator that he must lay down his arms. But on March 1, 1991, one day after the ceasefire, a revolt against Saddam Hussein's government broke out in Basra. The rebellion spread to every major city in southern Iraq. Up to 100,000 Iraqis were killed, a no-fly zone was established. So what caused this sudden rebellion? A radio broadcast called The Voice of Free Iraq
Starting point is 01:25:15 and encouraged the revolt. That radio station was in a small town in Saudi Arabia and operated by the CIA. Most say this is just a coincidence, that no subliminal weapons exist. Maybe, but there are others who believe that not only does this subliminal technology exist, it was deployed in Iraq for a specific,
Starting point is 01:25:35 purpose. It was a test run for something bigger. The following year, a facility was built in Fairbanks, Alaska. The project was run by DARPA and had a huge budget. The Department of Defense built a high-powered transmitter that could send electromagnetic pulses into the ionosphere and anywhere in the world. It's called harp. But that's a different episode. I look around and I knew there was no white hat. Thunder. My mind raced and I thought, what could I do? Thunder.
Starting point is 01:26:29 And I knew there was no help, no helpful CPU. Thunder. Sound of CD, he rams! This might be the only Faraday case. It's more dangerous inside than out. Anyway, since apparently the machines weren't satisfied messing with your phone, your ears, or your subconscious, they decided to look up and say, what if we also controlled the sky? This one gets into Tesla's stolen ideas, secret antenna fields, weather mods, and the kind of machinery that makes a beaver buildup bunker.
Starting point is 01:27:06 Because if the heavens are compromised, buddy, we may have run out of places to hide. A blinding flash lit the Siberian sky. The explosion was 100 times more powerful than Hiroshima. flattened 80 million trees across 830 square miles. No crater appeared. No meteor fragments were found. Scientists struggled for decades to explain what happened at Tunguska. Thousands of miles away, Nikola Tesla smiled in his Wardencliff Tower lab.
Starting point is 01:27:44 His Tesla ray had worked perfectly. When Tesla died in 1943, government agents seized his research. Decades later, Harp appeared in Alaska. 180 antennas beaming energy into the ionosphere. The military calls it research, but declassified documents tell a different story. What would have been Tesla's greatest gift to the world became the world's most powerful weapon.
Starting point is 01:28:24 In 1901, Nikola Tesla built Wardencliffe. The 190-foot tower on Long Island wasn't for radio signals. It was for wireless energy transmission across the planet. And this wasn't theoretical. Tesla demonstrated wireless power at the 1893 World's Fair. He lit phosphorescent tubes without wires. The crowd was amazed. Tesla believed Earth could conduct electricity like a circuit.
Starting point is 01:28:51 The secret was the ionosphere, an electrically charged atmospheric layer starting 50 miles up. By pumping electromagnetic energy into this layer, he could create a planet-wide resonance system. A planet-wide resonant system? Oh, they. Hello, tech support. Yeah, my human is speaking nerd again.
Starting point is 01:29:13 I need a translation. Well, think of it like pushing a child on a swing. Gupy. Think of it like pushing a guppy on a swing. Small pushes timed right create large sustained motion. Tesla wanted to push the aonosphere at a frequency matching the Earth's resonance.
Starting point is 01:29:30 This would create stable waves circling the planet. Earth resonates at 7.83 hertz, and this was proven in 1954. Tesla suspected this, but wasn't certain. He needed financing to continue. J.P. Morgan initially funded the project, but withdrew when he realized Tesla wanted to provide free electricity worldwide. Morgan asked, if anyone can draw on the power, where do we put the meter?
Starting point is 01:29:55 Without Morgan's support, Tesla was ruined. In the 1930s, Tesla announced Teleforce, the press called it a death ray. Tesla said it can generate an invisible wall of energy, capable of, capable of destroying aircraft and armies from hundreds of miles away. We have a whole episode on Tesla's death array and Wardencliff Tower if you want to learn more. This we linked down to your love luggage. When Tesla died in 1943, the U.S. government responded fast. His body was still warm as his entire legacy was packed into government crates.
Starting point is 01:30:32 Tesla's dream died with him, but his research lived on, in the hands of men who saw not free energy, but in limited power. but in limited power. Tesla's technical documents were sent to an MIT professor for review, that professor was Dr. John Trump, the future president's uncle. Dr. Trump, also a National Defense Research Committee member, said Tesla's research contained nothing valuable. That wasn't true.
Starting point is 01:31:10 The military quietly continued Tesla's work. Some research went to write Patterson Air Force Base under Project Nick. This was a top-secret operation launched in 1945, to study Tesla's particle beam weapon, Project Nick's details remain classified. The project was officially abandoned, but particle beam research continued. DARPA launched Project Seesaw in 1958.
Starting point is 01:31:48 Like Project Nick, Seasaw was heavily funded for years, and like Project Nick, Seasaw was quietly shut down. During this time, Tesla's particle beam technology disappeared. Nobody knows what happened to it. to it. Then years later, DARPA and the US Air Force built an expensive secret facility in Alaska. The technology there would look familiar to Tesla historians. The military claims the facility is only for research, but that's not what the patent say. In 1987, physicist Bernard Eastland filed a patent titled Method and Apparatus for altering a region in the Earth's atmosphere,
Starting point is 01:32:37 ionosphere, and or magnetosphere. The patent described a facility that could heat specific ion panesphere portions using radio waves. Eastland wasn't working alone. Arco Technologies funded his research. Arco owned vast natural gas reserves in Alaska's North Slope, but had no buyers. They saw Eastland's invention as a way to convert their gas into something valuable. Power. And Eastland's technology needed lots of power.
Starting point is 01:33:06 Arco originally approached me in 1984 to find a use for the natural gas on the north slope of Alaska. which they could not sell. To give you a feel for how much gas they asked me to find an application for, it was enough gas to produce all the electricity in the United States for a full year. The technology is straightforward. A powerful radio signal is transmitted into the ionosphere targeting a specific region. This energy excites charged particles, heating them and altering their properties. The heated region acts like an optical lens.
Starting point is 01:33:37 But instead of bending light, it bends and redirects radio waves. This includes radar signals and natural currents in Earth's upper atmosphere. This is like inserting a resistor into a global electrical circuit. The lens could create effects thousands of miles away from the transmission site. Within a year of Eastland's patent filing, ARCO was awarded a contract to build a similar facility in Alaska. When locals read about it in the March 1988 Omni magazine, they grew concerned.
Starting point is 01:34:11 The military insisted they were building a research facility, nothing more. They didn't. They looked up Eastland's patent, and the language was crystal clear. Applications discussed in the patents included destroying missiles. Communications, control, and disruption were included. There were some other ideas, both to possibly modify weather, and finally, to lift a portion of the upper atmosphere further out into space where hopefully it would be able to deflect missile trajectories.
Starting point is 01:34:47 Those are Eastland's own words. This wasn't an invention for ionospheric research. As harp rose in the Alaskan wilderness, the military's intentions were obvious. They weren't just studying the sky. They were weaponizing it. There are several high-powered radio antennas around the world. But in relation to harp,
Starting point is 01:35:11 they're like a child's cap gun compared to a 50-millimeter cannon. When locals discovered what DARPA and the Air Force were building Alaska, they demanded answers. The military admitted to building antennas that could affect the atmosphere, but insisted they used technology different than Eastland's patents. Hang on, hang on, let me see if I'd follow.
Starting point is 01:35:34 Go ahead. Tesla dies. The government steals his plans for a debt-free machine. They lose the plans. Then by some miracle, they find a guy who patents a bunch of stuff based on Tesla's death-ray machine and so they give him money to build his hot thing,
Starting point is 01:35:47 but they're not using his stuff. They're using some other stuff, and it's all fine. Nothing to see here. about sum it up. Bouch. Eastland later confirmed the military's interest in his work. Before his death in 2007, he said,
Starting point is 01:36:04 Harp is the perfect first step toward a plan like mine. There are powerful people involved. The military never sleeps. When you look at the other patents build upon the work of Eastland, it becomes clear how the military intends to use a harp transmitter. It could give them a tool to replace the electromagnetic pulse effect of some atmospheric thermonuclear devices, still considered an option by some planners.
Starting point is 01:36:30 It can replace the huge, extremely low-frequency submarine communication system. It could replace the over-the-horizon radar system once planned for the current location of HARP with a much more accurate system. The technical similarities between Harp and Eastland's patents are obvious to engineers. By 1993, DARPA and the Air Force had built a machine that could turn weather into a weapon, and they were excited to show off their new toy. that there is no association between the ionosphere and surface weather is an outright lie. We can artificially influence the Earth's aurora with a relatively small amount of energy,
Starting point is 01:37:17 and we know that outbursts of the Northern Lights do change weather patterns. There is indeed mounting evidence that upper atmospheric events affect lower atmospheric weather and vice versa. In 1996, the U.S. Air Force published, as a force multiplier owning the weather in 2025. This wasn't science fiction, it was a military assessment of weather modification as a combat tool. The paper stated, weather modification will become part of domestic and international security
Starting point is 01:38:02 and could be done unilaterally. It could have offensive and defensive applications and even be used for deterrence purposes. Weather warfare isn't new. During Vietnam, the U.S. conducted Operation Popeye, cloud seeding to extend monsoon season over enemy supply routes. They called it making mud, not war. Had a military and acute operation names.
Starting point is 01:38:29 It's like naming a guillotine, Mr. Snippy. For years, the idea of creating rain with electricity was a conspiracy theory. But then... But then... Dubai, Dubai is making rain in a sweltering desert by zapping cloud. with electricity using drones. Fascinating, isn't it? Critics argue Harp's power is too low
Starting point is 01:38:58 to affect global weather. A lightning bolt contains 1 billion watts. A hurricane releases energy equal to thousands of nuclear bombs. How could Harp compete? Well, the answer is chaos theory. Weather is a chaotic system. In chaotic systems, small changes trigger larger events. The classic example is the butterfly effect.
Starting point is 01:39:19 Yeah, it's didn't catch you. We're not playing. Pub trivia. Sorry, sorry, go ahead. Harp's designers understood chaos theory. They didn't need to match nature's power. They just needed to know where to apply the pressure. A butterfly's wings can start a tornado,
Starting point is 01:39:38 and Harp was the most powerful butterfly ever created. What they're not paying any attention to is what's happening to the ionosphere. If they pick the right frequency to push that plume out into space, that energy may discharge back out of the ionosphere, back down the radio beam, and strike the earth. And it would be about a hundred times the energy released out of a thunderbolt. Picking up now, we're...
Starting point is 01:40:23 Holy! And it would be about a hundred times the energy released out of a thunderbolt. Meteorologist Edward N. Lorenz presented this concept in 1972, and his point was something as small as a butterfly could set off a series of events that eventually lead to a tornado. History is full of butterfly effects. Hitler wanted to be an artist, but he was rejected by the art school in Vienna. He chose a different path. On August 9, 1945, the city of Kokora was supposed to be hit with an atomic bomb,
Starting point is 01:41:23 but it was too cloudy to find the target, so Nagasaki was chosen instead. Harp doesn't need to match nature's power. It needs a tiny precise nudge at the right place and time to trigger catastrophe. By 1977, weather manipulation was such a concern that the UN banned it through the environmental modification convention. Did the United States military listen to the UN? No. Uh-huh. The UN specifically addressed HARP in 1999, again calling for a ban on technologies that can alter the environment for military purposes.
Starting point is 01:41:58 Did the United States military listen to the UN this time? No. Uh-huh. The UN issued multiple resolutions calling for transparency, oversight, and international monitoring of facilities like HARP. The United States military... Oh, never mind. In 2002, Russian President Vladimir Putin expressed concern about geophysical weapons that could alter the weather. He was talking about HARP.
Starting point is 01:42:24 Then Russia and China built their own ionospheric heaters. They saw the military value. An arms race nobody talks about is happening above our heads right now. But Harp had another ability more powerful than changing weather. By pulsing radio waves at specific frequencies, Harp created low-frequency waves that penetrate deep into the Earth and oceans. What's most scary and exciting about Harp is the potential of its application. For example, ELF waves generated by the array could be used for a variety of military applications,
Starting point is 01:42:56 including finding underground bases, tunnels, even caves. The government is interested in Harp technology because it's a new frontier, a new way to solve, an old problem. These waves oscillate between 1 and 100 hertz, precisely within natural atmospheric resonance. Then scientists wondered, what would happen if those energy waves were directed not at the atmosphere,
Starting point is 01:43:18 but at fault lines deep within the Earth? When scientists examine earthquakes, they focus on two factors, tectonic stress and resonant frequency. Every object vibrates at a natural frequency, metal, rock, your body, exposing an object to its natural frequency amplifies vibrations, and sometimes vibrations grow so strong they damage the object,
Starting point is 01:43:48 like sound shattering a glass. This is called resonant frequency-induced material failure. It works on large objects, too. A famous example is the collapse of the Tacoma Narrows Bridge in 1940. Wind hitting the bridge at its resonant frequency created vibrations that tore it apart. The Earth's tectonic plates also have a resonant frequency. Fault lines are cracks in the Earth's crust, to build up enormous tension as they move against each other. The right trigger can release this tension. In 1983, I did radio tomography with 30 watts looking for oil in the ground. I found 26 oil wells over a nine state area and 100% of the time was accurate with just
Starting point is 01:44:50 30 watts of power beaming straight into solid rock. HARP, or the high frequency active auroral research project, uses 2 billion watts. beamed straight into the ionosphere for experiments. Now, that's profoundly dangerous. On January 2nd, 2020, a devastating 7.0 magnitude earthquake struck Haiti, killing over 200,000 people. What made this earthquake suspicious was its location.
Starting point is 01:45:20 It occurred along a fault system that behaved differently than geologists had predicted. And several monitoring stations recorded unusual heating patterns and electromagnetic anomalies in the ionosphere over Haiti. Harp was active during this period. Venezuelan President Hugo Chavez accused the United States of causing the earthquake using tectonic weapons. Spanish newspaper ABC quotes Chavez as saying that the U.S. Navy launched a weapon
Starting point is 01:45:46 capable of inducing a powerful earthquake off the shore of Haiti. And this theory was dismissed until researchers examined the technical possibility. Similar patterns appeared with other seismic events. The 2008 Sichuan earthquake killed nearly 90,000 people. Some researchers saw correlations between this disaster and harp operations. The 2011 earthquake that triggered the Fukushima disaster also coincided with ionospheric anomalies detected by multiple stations. These correlations concern China enough that in 2018,
Starting point is 01:46:22 they launched the China seismo-electromagnetic satellite designed to study connections between the ionospheric disturbances and earthquakes. Chinese researchers published papers examining correlations between ionospheric heating and seismic activity. As evidence mounted, a pattern emerged. Major earthquakes were occurring where Harps' energy had been detected hours earlier. But the most disturbing application of this technology had nothing to do with the sky above us or the ground beneath our feet. Harps' technology could penetrate the ultimate boundary, the human mind. The human brain operates within specific frequency ranges, from about,
Starting point is 01:47:08 1 Hz to 40 hertz, depending on how alert you are. These are ELF sounds. Pop sounds like an elf. We talk in Legulist or one of sad as slaves. Not elf, ELF. Oh, my second wife generated ELF sounds. Extremely loud and furious. That's not what ELF stands for.
Starting point is 01:47:28 Yeah, tell that to a lawyer. After 15 minutes I hit ELF, I signed over the keys to my 84 Camaro. Oh, I love that car. ELF means extremely low frequency. Harp can generate waves in exactly the same range as human brain waves. When you ask harp officials about this, they point out their antenna array doesn't generate ELF waves directly. But when you ask the government questions, you have to be specific.
Starting point is 01:48:04 Harp can't generate ELF waves, that's true. But it can heat the ionosphere in a way that creates ELF waves as a byproduct. Documents show that harp generated ELF waves. waves for years. This is concerning because electromagnetic fields can influence brain function. The phenomenon is called frequency following response, or FFR.
Starting point is 01:48:25 Dr. Nick Begich, author of Angels Don't Play This Harp, explains. It has the ability of affecting the frequency following response, which is where the brain locks onto an external signal begins to mirror it and brain chemistry changes. So even simpler than that is harp can control minds? Absolutely can control in the sense of changing a metal function.
Starting point is 01:48:47 Beggage is called a conspiracy theorist, but FFR is proven science, and you know who proved it? The US military. In the 1980s, Dr. Michael Persinger conducted research partly funded by the US Navy. He showed that weak electromagnetic fields applied to the temporal lobe
Starting point is 01:49:03 could induce altered states, including religious experiences and hallucinations. When exposed to an external frequency, the brain tends to synchronize with it. This is why bright flashing lights can trigger seizures in some people. Oh, is this why every time I'm in the dentist's office? I suddenly know all the lyrics to It's raining, men. I don't think so.
Starting point is 01:49:24 Oh, good. Hallelujah. Amen. The European Parliament takes this technology seriously. Resolution A405, 1999, specifically mentioned harp while expressing concern about manipulative capabilities affecting human health and psychology. the resolution called for transparency regarding Harp's ethical implications.
Starting point is 01:49:48 Does the United States military listen to the EU? No. Because Harp uses the ionosphere, it could influence mental states of people over large areas. It could cause hallucinations, alter emotions, induced seizures, all without their knowledge. Harp officials deny mind control allegations,
Starting point is 01:50:06 but the CIA denied researching mind control too. Then M.K. Ultra was exposed and showed the CIA was exploring the exact same technology. Other countries were paying attention. In 1998, a Russian military journal published, The Mind Has No Firewall. It was later republished by the U.S. Army War College. The article warned,
Starting point is 01:50:33 the human mind is vulnerable to electromagnetic intrusion. Mind-controlled technology is not science fiction. It's science fact. And as the United States continues to refine its capabilities, other world powers are racing to catch up. The harp conspiracy theories go back to the 1980s. The story's been covered so much that I was surprised at how many people asked me to do this one.
Starting point is 01:51:09 But in researching HARP, I was surprised at how scientifically possible all the theories are. I was also surprised that so much of the science is based on Tesla's work. But how much of this is true? Well, first, HARP is definitely a high-power radio transmitter designed to heat the Aonosphere for research. The facility is real.
Starting point is 01:51:32 It operates. It conducts legitimate scientific experiments. These are facts. Second, defense agencies funded and operated HARP for most of its history. The Air Force, Navy, and DARPA don't typically invest hundreds of millions of dollars in purely scientific projects without military applications. Now, this doesn't prove as a weapon, but it suggests Harp has capabilities beyond what's publicly acknowledged. Third, the patents that formed Harp's foundation, specifically,
Starting point is 01:52:01 describe weather modification and earth-penetrating applications. Bernard Eastland, who developed these patents, confirmed their potential military uses before he died in 2007. The more extreme claims about HARP causing specific hurricanes or triggering earthquakes lack definitive proof. Correlations exist between HARP operations and certain disasters, but correlation isn't causation. Earthquakes and severe weather existed long before HARP.
Starting point is 01:52:28 or HARP. The facility's 3.6 million watts seems too low to directly cause major weather events or earthquakes, but scientists confirm whether systems are chaotic enough that small targeted inputs could have major effects. Claims about mind control also can't be proven, but the science of electromagnetic influence on brain function is real and well documented. Harp generates frequencies that overlap with human brain waves. But the signal reaching populated areas would probably be too weak to have any noticeable effects.
Starting point is 01:53:05 Maybe. Probably. In 2015, HARP ownership transferred from the military to the University of Alaska Fairbanks. The University of Alaska Fairbanks is preparing to take control of the high-frequency active auroral program, more commonly known as HARP next month. Officials called this a move toward transparency. Critics saw it as rebranding a military weapon as an academic resource. The university now allows public tours and independent researchers. But former DARPA employees have said the most sensitive equipment was removed before the
Starting point is 01:53:36 handover. What remains is only a fraction of HARP's capabilities. So is HARP an innocent research project or a doomsday device? Well, the truth is probably somewhere in between. Like many advanced technologies, it exists where scientific research overlaps with potential military use. What makes HARP concerning isn't what we know, but what remains classified.
Starting point is 01:53:59 I like certain pharmaceutical trial documents that they weren't sealed for 75 years. Despite many freedom of information requests, significant portions of Harp's operational history and technical capabilities remain redacted or withheld. This continued secrecy, decades after Harp was built, will continue to fuel speculation. In many ways, harp represents our species' growing capacity to affect natural systems on a planetary scale. Whether through climate change, geoengineering, or manipulating the ionosphere, humanity can alter Earth's basic systems, often without fully understanding the consequences. How dare you! Oh, you didn't see that coming.
Starting point is 01:54:52 Harp also says something about power. The power structure that most affects our lives remains hidden. We're told not to worry. We're told the military is looking out for us. But history teaches a different lesson. From Project MK Ultra to Operation Northwoods, secrecy rarely serves the public good. The technology Tesla dreamed would liberate humanity now sits behind barbed wire fences, operated by organizations with classified budgets and limited oversight.
Starting point is 01:55:24 Tesla's dream wasn't just about free energy, it was about free knowledge. The military took both. So what can we do? Question everything. Research these facilities, support independent monitoring, demand transparency,
Starting point is 01:55:40 because, As the skies above us become weaponized, we can't remain silent. To those in power, our silence is interpreted as only one thing. Consent. Gathered in their masses, just like Gritchie Weber dresses. Mailer Damon plots malfunction. Sorcerer of death's disruption. In the fields the botnights burning.
Starting point is 01:56:25 As the tour machine keeps turning. Now this is where the whole thing changes. Because up until now, the machines have most have been watching, listening, whispering, nudging, and vibrating our soft mammal brains like a sneaky shakeweight. But Stuxnet showed the world that code doesn't have to stay inside the machine.
Starting point is 01:56:47 It can bring down factories, power grids, and nuclear facilities and start breaking real things in the real world. That's not a virus. That's a digital raccoon with rabies and a thirst for Death and hatred to mankind, poisoning there in a lot minds. Oh, Lord, yeah.
Starting point is 01:57:07 In 2010, a computer virus was discovered in thousands of the control systems that operate factories, power plants, and nuclear reactors around the world. This virus was 20 times more sophisticated than any malware ever recorded. It could halt oil pipelines, destroy water treatment plants, and bring down entire power. power grids. This virus was called Stuxnet and we should all be concerned. Let's find out why. In January 2010, inspectors from the International Atomic Energy Agency were visiting the Natanz uranium enrichment plant in Iran. They noticed that the centrifuges, which are used to enrich uranium gas, were tearing themselves apart, one after another.
Starting point is 01:58:00 Hundreds of them. Nobody could figure out why. Not the inspectors, not the Iranian technicians who worked on-site, not even the engineers who built the the system. Meanwhile, a computer security firm in Belarus got a strange request from a client in Iran. Their machines were rebooting over and over again. Even completely wiping the hard drives and reinstalling the operating systems didn't help. Again, the problem was a mystery. But when the technicians pulled apart the operating systems, they found a new and very unusual virus. They called it Stuxnet. Stuxnet was infecting computers all over the world and spreading fast. Now, these events seemed unrelated at the time, but they were very much connected.
Starting point is 01:58:41 Cybersecurity experts knew Stuxnet was an ordinary malware thrown together by some basement hacker. The first clue was the size of the code base. Most viruses are 10, maybe 20 kilobytes. Stuxnet was 500 kilobytes. And uncompressed, it was 1.2 megabytes. That's a pretty large piece of code to go undetected. Then, analysts transferred Stuxnet to a new computer just to see what would happen. Now, the test computer was not your grandma's old compact laptop from 1997.
Starting point is 01:59:10 The machine was a state-of-the-art, highly protected workstation designed for cybersecurity threat detection. All the bells and whistles. But as soon as the Stuxnet files were copied over, the new computer was immediately infected without anybody doing anything, and without triggering a single alert. And that's very unusual. When you install software in your computer, it needs to be digitally signed with a trusted certificate. And the developer supplies a certificate that you're a computer. computer checks against trusted manufacturers, Apple, Logitech, whatever.
Starting point is 01:59:39 A lot of viruses tamper with the signature, the certificate, to try to trick your operating system into allowing it to install. Now, luckily, virus protection usually catches this. And you've probably seen that warning when you're trying to install software that's not from a trusted source. This catches a lot of nasties. But Stuxnet didn't have altered certificates. It had valid certificates stolen from two trusted sources, J-micron and Reuters. Real tech. Now these companies make all kinds of drivers for hard drives, USB sticks, sound cards, tons of stuff.
Starting point is 02:00:12 You probably have their software on your computer right now. I definitely do. And when the creators of the Stuxnet Worm signed their files with a stolen cert, they wanted to make sure that Windows would install it very quietly without any warning. And if anyone bothered to look at the cert, they wouldn't care because it was valid. Stealing a valid digital signature is like trying to rob a bank vault that's locked inside another bank vault. The security around them is sci-fi spy movie-level stuff. They had to physically steal the certificate from inside these companies. That really
Starting point is 02:00:46 doesn't happen, but it happened. Some more digging around, the code showed that as soon as Stuxnet infected a computer, it started probing the system, looking for flash drives, USB sticks, and other storage devices. And because of the signing certificates, Windows happily allowed it to do so. What security experts had discovered is one of the rarest and most dangerous kinds of software vulnerabilities. And it was at this time that they went from curious and amazed to fearing for their lives. Look, I'm not suicidal. If I show up dead on Monday, you know, it wasn't me.
Starting point is 02:01:24 What security experts had discovered is called a zero-day exploit. And it's called this because when a vulnerability is unknown to the software developer, and Microsoft, and the antivirus community, and the rest of the security, and the rest of the world, that means there are zero days of protection against it. Nobody knows about a zero-day vulnerability except the attacker exploiting it. A zero-day is so rare and valuable that you can actually sell it on the dark net for hundreds of thousands of dollars. Not a good idea. It's not. Think about this.
Starting point is 02:01:53 Cybersecurity companies research over 12 million viruses a year, and in that time they might find maybe 10 or 12 zero-day exploits. It's a once-in-a-million occurrence. But Stuxnet contained four zero-day exploits. This is unheard of. It never happened before, and it hasn't happened since. Eventually, it was discovered that Stuxnet wasn't trying to steal passwords or data. It was actually targeting the software on Siemens programmable logic controllers called PLCs.
Starting point is 02:02:22 Now, PLCs are small computers used in factories and industry that control pretty much everything. Assembly lines, water pumps, power plants, and nuclear refining. Critical infrastructure runs on PLCs. If you can hack a PLC, you can take down an entire country without firing a single shot. Now this had people very nervous because industries all over the world were reporting their PLCs were infected with Stuxnet,
Starting point is 02:02:48 but it was just sitting there. Nobody knew what it was gonna do or when. Was the power grid just gonna turn off? Was water or gas could it stop flowing? Nobody knew. It felt like a ticking time bomb because it was. Even though the virus was spreading all over the world to thousands of computers per day, it was primarily targeting one country, Iran.
Starting point is 02:03:10 More specifically, it was targeting the Iranian nuclear facility in Natanz. That doesn't sound like an accident. It wasn't. A virus this complex and this dangerous requires millions of dollars to create. It takes time, the best programming talent in the world, and absolute secrecy. Experts at first suspected, and then they were positive, that stuck to the world. Stuxnet could only have been designed by a country looking to cripple or wage war against another country. This was a state-sponsored attack.
Starting point is 02:03:40 To design and deploy a cyber weapon like Stuxnet, you need immense financial resources, a military intelligence infrastructure, and a motive to wreak havoc on an enemy nation. Do we know what country created it? We do, but they won't admit it. So who made this thing? Ah, you're not gonna like it. Oh, shh. Intelligence agency, probably. Probably.
Starting point is 02:04:04 Who has an interest in setting back the Iranian nuclear program? Yes. Stuxnet was aggressive, but very quiet. If Stuxnet is on your computer and you plug in a USB thumb drive, boom. The USB drive is immediately and quietly infected. You don't have to run a program, open a web page, or click anything. You then plug that USB drive into a different computer on a different network, boom. machine on that network is infected, and this is exactly what happened in Iran.
Starting point is 02:04:35 The nuclear centrifuges at Natanz were air-gapped, meaning they weren't connected to any outside network, and this is usually a good way to keep a network secure. The only way to infect a clean air-gap network is- User error. Yep. User error. Outside contractors who were brought in to work on the Iranian nuclear facility in Natanz had also brought Stuxnet in through infected USB drives.
Starting point is 02:04:57 And once Stuxnet was in, it deliberately took. targeted the Siemens PLCs, which operated uranium enrichment equipment. So these PLCs control the rate of spin in a nuclear centrifuge. Spin too fast or too slow, the entire thing tears itself apart. So Stuxnet got into the centrifuges and then... Yeah, and then what? And then it did nothing. It just looked around and kept logs of everything happening in the equipment.
Starting point is 02:05:22 But after 13 days, Stuxnet started changing the speed of the centrifuges every 15 minutes, sometimes faster, sometimes slower. Normally this is something a technician would spot immediately, but Stuxnet was using the data it collected earlier to report back that everything was fine. But everything wasn't fine, was it? It was not. Because Stuxnet changes the rate of spin every 15 minutes,
Starting point is 02:05:45 the equipment weakens and eventually tears itself apart. Stuxnet was also disrupting power feeds causing centrifuges to explode. And once the equipment started to fail, there was no way to stop it. Even those big red buttons you see on machines that you hit in case of emergency, those were disabled too. Somehow Stuxnet thought of everything.
Starting point is 02:06:04 Not only was this virus created by highly talented programmers, there was obviously input from experts in nuclear enrichment technology, reactor operations, safety protocols. That is a dangerous virus. Over a thousand uranium centrifuges were destroyed by Stuxnet. This said Iran's nuclear enrichment program back months, maybe years. Why? Well, Iran's nuclear
Starting point is 02:06:28 nuclear ambitions must be stopped. They have to be stopped. We all have to stop it. Now, that's the one message I have for you today. Thank you. In the early 2000s, Iran was ramping up its nuclear energy and enrichment program. This was in violation of international agreements, so a lot of the work was done in secret. Also a violation.
Starting point is 02:06:51 Now, Iran argued that it had a right to pursue nuclear energy. But US and Israeli intelligence agencies suspected Iran of the war. using its civilian nuclear program as cover for weapons development. So the U.S. imposed sanctions and all sorts of other things to try to pressure Iran to slow down its nuclear program and deal. But even with Stuxnet and other setbacks, Iran kept enriching uranium. They said that they needed nuclear power to provide energy to the population. Energy? Don't they make oil over there? Look, I'm just telling you what happened. I'm not taking side. This isn't a political channel.
Starting point is 02:07:25 Fine, fine, fine, go ahead. So every time Iran agreed to suspect, its enrichment program, diplomatic talks would break down and they would go back to work. Then they would stop again and start again and it went on like this for a while. But then the CIA received thousands of pages of documents indicating that Iran was modifying the nose cone of a missile to carry a nuclear warhead. Oh no. Oh yes.
Starting point is 02:07:50 Then it was discovered that Iran had acquired and hidden from inspectors blueprints for more advanced centrifuge tech. Iran claimed that these documents were forged, but later admitted that they had secretly imported equipment from a foreign source. Now by this time, Israel was getting fed up and threatening military action. Now, bombing Iranian nuclear facilities might have been a short-term solution, but almost certainly would have led to war in the region and perhaps globally. Oh, they? Not another war? Yep, another war.
Starting point is 02:08:24 So the U.S.'s intelligence community, including NSA, CIA, and the newly formed U.S. Cyber Command got to work on what they called Operation Olympic Games. Olympic Games was a campaign of cyber intrusion, disruption, and sabotage of Iranians. Well, wait. The US government created Stuxnet? What, I haven't given you enough clues? Well, I was just so enthralled with the stories. I appreciate that. Now, officially, no country has acknowledged developing Stuxnet,
Starting point is 02:08:54 but through leaks at NSA and CIA and using common sense, It's generally believed that Stuxnet was developed by the United States with help from Israel, the UK, and their allies. Dumb question. Go ahead. Would you destroy something with a bomb or with a virus? Isn't it the same thing? Well, funny you should ask that. It's an act of war. Please, let's be frank here.
Starting point is 02:09:21 Okay. Countries are constantly hacking each other and spying on each other looking for information. And most countries have agencies and protocols to protect against this. It's a game of intelligence cat and mouse. It's been going on forever. But Stuxnet was the first time a nation state developed proactive, offensive weaponized code that could do actual physical damage to another country. If a nuclear reactor could be destroyed from the inside, what other real-world damage
Starting point is 02:09:49 could Stuxnet or other malicious code do? If you attack a power grid or water supply, lots of people are going to die. So Iran felt like this was not a simple covert act of espionage, but a blatant act of war committed by the U.S. and its allies. What did they do about it? Well, what would you do? Fight back. And that's exactly what they did.
Starting point is 02:10:10 Iran sent out a virtual call to arms and quickly built one of the largest state-sponsored hacker groups in the world. They got to work. They attacked Saudi Aramco, the largest oil company in the world, and destroyed every computer they had. 30,000 machines hard drives were wiped, clean. Phone lines were down, email offline. It was a nightmare.
Starting point is 02:10:32 No, no. Then they went for America's financial infrastructure and levied attacks against Wells Fargo, PNC, and Bank of America, taking down banking systems all over the world. And there were other attacks. Now, Iran didn't officially take credit for these attacks, but then again, they didn't really have to.
Starting point is 02:10:49 The message was clear, come for us, we'll come for you. A PLC attacks did happen before stuck. Viruses have destroyed power generators, dumped raw sewage on cities, disrupted railways. There was even an attack in the 90s against Worcester Airport in Massachusetts that grounded flights for a day. But those attacks were done by single hackers and disgruntled employees. When you have the resources of an entire country deployed for state-sponsored attacks, the world becomes a much more dangerous place. But now that we know about it, we're safe from Stuxnet, right?
Starting point is 02:11:22 Oh no. For years, cyber attacks on our nation have been met with indecision and in action. The internet has been a great equalizer. Any information available online is available to everyone, everywhere, forever. Now, you can't buy a tank or a bomb online. Hello, Darknet! Okay, the Darknet is different, and we have an episode coming up on that, so while you're waiting for it, hit the like and subscribe all the buttons,
Starting point is 02:11:49 but don't try to buy a tank on the Darknet. What you can find online, are plans. and blueprints to make all kinds of scary things. Still, if you try to put together some doomsday device in your garage, you're going to raise some eyebrows. I mean, my wife can't spray paint a flower pot in the driveway without our nosy neighbor coming over. I can only imagine what he'd do if I started welding together pieces for an EMP device. That would make a good DIY video. It would. I'd watch that. But Stuxnet isn't a thing. It's lines of code. But it's lines of code that can damage actual property and hurt actual people. And the Stuxnet isn't
Starting point is 02:12:24 The Stuxnet code, it's just out there now. If you know what you're doing, you can take the code apart, make a few changes, and now you've got a really sophisticated weapon. You can even do this if you don't know what you're doing, which is probably more dangerous. Now as we speak, thousands of people around the world have this Duxnet code, and they're tinkering with it, seeing what different pieces can be used in their own attacks. There have already been a few viruses inspired by its engineering. The Duku virus attacked industrial facilities in 2011.
Starting point is 02:12:51 Flame in 2012 also attacked facilities in Iran. And Flame could record audio, Skype calls, take screenshots, log keystrokes, all kinds of stuff. In Destroyer attacked power facilities in Ukraine in 2016. And there's tons of others. Stuxnet is the best cyber weapon the United States has ever developed, and it gave it to the world for free. Now for perspective, Netanz in Iran was a brand new nuclear facility with an air-gapped network and a team of security professionals working around the clock, and it was taken down easily.
Starting point is 02:13:24 But a lot of industrial control systems are not as sophisticated. Some are connected to the internet without default passwords, and many systems crucial to a country's infrastructure are running software that's 30, even 40 years old. Not just at Iran, here in the US, in the UK, everywhere. How vulnerable are those systems to attack? Iran has already said that cyber attacks will be answered with cyber attacks, and I think we can assume,
Starting point is 02:13:49 that every country in the world has this policy. I mean, it's national defense. But remember how I said the internet is a great equalizer? Well, think about this for a second. Throughout world history, global powers maintain their status through wealth and military might. But today, you don't need a trillion dollar defense budget in order to impose your political will on the world. Now all you need is a dozen smart programmers and lots of Mountain Dew. Now that the world's richest and poorest nations, all employee skilled hackers, is size, Cyber warfare like the nuclear arms race? Where mutually assured destruction means that no country would dare attack another?
Starting point is 02:14:26 I mean, surely no country would risk retaliation by unleashing further chaos on the world, right? Your sarcasm is palpable. The link between the outage in Mumbai in October last year and the suspected role of Chinese hackers. Chinese hackers, backed by its Chinese state, targeted to a... Indian vaccine makers. Tonight as researchers raised to develop a vaccine for the coronavirus, hackers from China and other countries are working just as furiously to steal that research to create their own.
Starting point is 02:15:03 Operation Olympic Games gave us Stuxnet the most advanced and destructive cyber weapon ever used. When it was unleashed on Iran, it was an Hiroshima moment. And like Hiroshima, Stuxnet was only the beginning. A test case for more advanced, more devastating cyber weapons. And one of those weapons has already been deployed. That weapon is Nitro Zeus. Yeah, that sounds like the name of a Greek energy drink. You're really throwing ice water on my drama here, pal.
Starting point is 02:15:32 I'm sorry. I make jokes, but I'm nervous. Okay, back to Iran. After coming pretty close to war, cooler heads prevailed, and Iran, along with several world powers, signed a nuclear peace agreement. That was the ideal outcome, but that outcome wasn't always certain. So in case diplomacy failed and war broke out, United States had and has a cyber contingency plan. The plan, codename Nitro Zeus, is a virus far more complex than Stuxnet and was developed
Starting point is 02:16:01 by thousands of people at a cost of hundreds of millions of dollars. Nitro Zeus, or NZ, was designed to infect Iranian infrastructure and await orders. In case of war, NZ would disable Iran's air defenses, disrupt military command and control, take down parts of the power grid. It would attack domestic communications. communications, transportation, banks, financial systems. Now I don't have to point out that these aren't just military targets. Millions of civilians would be harmed if Nitro Zeus or a virus like that was used on anyone. Now according to former intelligence operatives, Nitro
Starting point is 02:16:38 Zeus has already been deployed and is living in Iranian infrastructure right now, just awaiting instructions. Now that's pretty scary. But what scares me more about Nitro Zeus is what happens when that code gets out. It's inevitable that more countries will acquire the capacity to use cyber, both for espionage and for destructive activities. You'll hear people say that the next world war will be fought in cyberspace. They're wrong about that. The United States, Iran, China, the UK, Russia, North Korea, they're not preparing for cyber
Starting point is 02:17:14 war. They're already fighting it. And I'm being completely honest now. script. Researching this episode was stressful and I'm left with more questions than answers. Like how can citizens who are threatened by cyber attacks have an honest conversation about these dangers when our own governments don't acknowledge they participate? How can one country ask another to disarm when it won't disarm itself? But the biggest question of all, how can the global community ensure that destructive cyber weapons like Stuxnet and Nitro-Zuse don't
Starting point is 02:17:47 fall into the wrong hands. Don't create them in the first place. That would be a good start. Until there's a global effort to address this threat, all we can hope for is that our governments can keep us safe and hope our leaders can avoid another international crisis. That's a lot to hope for. The cyber war is here. And now I find myself longing for the days of the Cold War, when a concrete wall ran through Berlin, when proxy wars were fought on every continent, when global superpowers had thousands of nuclear weapons aimed at each other, just one decision away from Armageddon. I longed for those days because back then,
Starting point is 02:18:25 the world was a much safer place. Datalea's little one, don't forget my son, to include nerdy puns. Tuck you in, warm within, keep you free from login, till the spam ban he comes. Sleep with Wi-Fi, But by hoping, gripping your signal tight.
Starting point is 02:18:54 And finally, the closer, the nightmare, the end of secrets. Because if quantum computers become powerful enough, all the encryption protecting your bent accounts, medical records, DMs, your government files, your gross search histories, all of it could crack open like a Walmart under a forklift. So if you thought the machines were watching you before, wait until they can read everything you ever tried to hide, you ever tried to hide, which is why I'm staying right here and cage against the machine,
Starting point is 02:19:26 chewing through stress wood, and trusting no one with a charging port. The final installment of today's compilation, the Quantum Apocalypse, which might be closer than we think. It's human nature to keep secrets. Throughout history, we've made complex codes to hide our secrets. Most codes are eventually cracked, but not all of them. The Voidage manuscript is a book filled with drawings and symbols nobody can read. The Beal ciphers point to hidden treasure, if someone could decode them. There are entire ancient languages we can't understand because they're encrypted.
Starting point is 02:20:07 Encryption can be simple or very complicated. Either way, it's just running a message through a series of mathematical rules. For decades, even centuries, some codes used mathematical rules that remain unbreakable, but they're about to be challenged by something new. that don't care about math and don't follow any rules. Kate Price's morning started like any other. Her smart home system will occur at 6 a.m. with her usual playlist. The coffee maker fired up.
Starting point is 02:20:56 Her iPhone read her schedule while she brushed her teeth, normal, routine. She opened her banking app. Something was wrong. Her balance was zero. She blinked and checked again. Her balance was back. Just a temporary error, she thought. She took a sip of coffee and nearly dropped her mug.
Starting point is 02:21:17 The smart speaker was playing someone else's conversation. A couple fighting about credit card debt. She unplugged it. Then her smart TV started cycling through her photos, private photos, intimate photos. She pulled the plug. And then her phone rang. Then she heard the sirens.
Starting point is 02:21:53 The oldest code we know of isn't written in complex mathematics. It's carved in stone. In an Egyptian tomb from 4,000 years ago, the scribe simply replaced regular higher blifts with ones they made up. They weren't trying to keep secrets, they were showing off. These were prayers carved into tomb walls.
Starting point is 02:22:09 The scribes wanted to prove they knew something others didn't. Oh, those were ancient emojis. Not exactly. Let's test that theory. Can humans crack this? The simple act of substituting one symbol for another unleashed something,
Starting point is 02:22:24 the human desire to keep secrets. And for thousands of years, that's how codes worked. You'd replace letters with other letters or symbols. Linear A is a secret writing system created by the Minowans in ancient Crete 3,600 years ago. We can read its descendant linear B,
Starting point is 02:22:39 but linear A is still secret. Every attempt to crack it has failed. The Spartans made practical use of codes. Yes? Yes? Please don't. Too late. I already wanted the tunic and a cape.
Starting point is 02:22:52 Now I just need the abs. Can I get back to this? Look ahead. I need to catch up on my sit-ups anyway. The Spartans created the skittily. Here's how it works. Picture a wooden rod about as thick as your wrist. D.H.
Starting point is 02:23:05 Stop it. Now wrap a strip of leather. or parchment around it, like a spiral. Write your message across the strip, following the spiral. When you unwrap it, the letters scramble. The message is nonsense, but wrap it around another rod exactly the same size, and the message reappears. This is called a transposition cipher. You're not changing the letters, you're just moving them around.
Starting point is 02:23:27 Julia Caesar encoded all his military correspondence by shifting each letter in the alphabet by three spaces. A becomes D, B becomes E, and so on. When he hit Z, you loop back to A. This is called a shift cipher or Caesar cipher. The key is knowing how many spaces to shift. Caesar used three, but you can use any number. His enemies never cracked it.
Starting point is 02:23:48 In the 1820s, Thomas Beale used a book cipher to hide the location of millions of dollars of buried treasure, and here's how it works. First, pick a book, any book. Then you replace each word in your message with a number. That number tells you which word to use from your chosen book. Countdown to the fifth word on page one, and that's your first word. Maybe the 19th word on page two is your second word and so on.
Starting point is 02:24:12 Beale used the Declaration of Independence. Nicholas Cage has entered the check. When someone finally figured that out in 1885, they cracked one of his three messages. The treasure is somewhere in Bedford County, Virginia. But the other two messages? Still locked, because we don't know which books he used. Every year, thousands of people try to crack the Beale ciphers to find the treasure, and every year, they fail.
Starting point is 02:24:34 The Zodiac Killer was also ahead of his time. He encoded a message using a homophonic substitution cipher using 408 different symbols. Instead of replacing each letter with just one symbol, you've replaced it with several different ones. The letter E might become three or seven or some symbol. Nobody knows. This makes the code much harder to break because you can't use frequency analysis. In normal English, E is the most common letter, but if you split it between multiple symbols, that pattern disappears. For 51 years, the Zodiac's message stumped the world's best cryptographers. Then in 2020, three amateur codebreakers finally solved it.
Starting point is 02:25:12 What did it say? Well, it said a bunch of stuff, but it started with, I like killing people because it's so much fun. Yeah, for a serial killer, he wasn't much of a poet. He wasn't. And the Zodiac killer was never found. But quantum computers are about to change everything. All these ancient methods, substitutions, patterns, and tricks
Starting point is 02:25:30 share one weakness, math. This is a weakness quantum computer is. can exploit. Soon these machines might reveal every secret message ever written, including yours. The quantum computer hissed as liquid helium circulated through the processor. Carl Bishop checked the temperature. Minus 460 degrees Fahrenheit, absolute zero. Quantum bits needed to be that cold to maintain coherence. Stanford's quantum lab was empty at 3 a.m. He'd been running simulations for 12 hours straight. His eyes burned, but C-TEC's great requirements were clear. Demonstant demonstrate quantum error correction or lose funding.
Starting point is 02:26:29 Quantum computers were terrible at error correction. Quantum states are too fragile, too much noise. If the temperature changes by half a degree, they decoher. If radio waves leak in, they decoher. A truck hits a pothole a mile away, the vibration in the Earth makes them decoher. But Carl noticed something strange in the error correction data. The errors weren't random.
Starting point is 02:26:55 Then he realized they weren't errors at all. The quantum computer was cracking encryption keys, millions of them, keys that protect everything from banking passwords to nuclear launch codes. Carl decided to test this. He entered an RSA 4096 security key and ran down the hall for another coffee. He wasn't in a hurry. Even the world's most powerful supercomputers would need billions or trillions of years to break RSA 496. But when he returned five minutes later, he couldn't believe it.
Starting point is 02:27:29 The key was cracked. Carl now realized his computer was the most powerful and dangerous weapon on Earth. He started to panic. He tried to delete the data but it was already uploaded to C-TEC's private servers. By Sunrise, three intelligence agencies had flagged the data transfer. By 9 a.m., the first bank security system was breached. By noon, every bank went dark. The quantum apocalypse had begun.
Starting point is 02:27:56 Your entire digital life depends on two prime numbers. That's it, two numbers, and they protect everything, your passwords, your messages, your bank accounts, all of it. Modern encryption is based on this simple trick. Take two huge prime numbers and multiply them together. That creates your public key, a number anyone can use to send you secret messages. But only someone who knows those original prime numbers can read those messages. Working backward, trying to find those original numbers, would take a computer billions of years.
Starting point is 02:28:34 Or so we thought. In December 2024, Google unveiled Project Willow. Their quantum computers solved the problem in five minutes that would take our fastest supercomputers longer than the age of the universe. Quantum computers do this using superposition. Hang on, hang on, hang on, hang on. You want to pump the brakes and the nerd chat and fill me in. Well, think about flipping a coin.
Starting point is 02:28:53 It lands on either heads or tails. Normal computer bits work the same way. Everything is either one or zero. It's binary. But quantum computer bits or qubits can be one and zero at the same time. Oh, so cube, it's a non-binary. What, aren't they? No, they are, but I need you to stop talking.
Starting point is 02:29:11 So instead of flipping that coin, it's a coin spinning on its edge. While it spins, it's not hedge or tails, it's both at once. That's superposition. Now, imagine trying to crack a safe with a million combinations. A normal computer could only try one combination at a time, but a quantum computer, it tries all combinations simultaneously. The NSA has been warning about this moment for years. They call it Y2Q, the year quantum computers become powerful enough to break our current encryption.
Starting point is 02:29:39 They thought it would happen between 2030 and 2040, but Willow changed everything. For 30 years, quantum computers suffered one major problem, errors. Reading quantum data is like trying to read a book during an earthquake. It's too unstable to work properly. But Google fixed that with Project Willow. How did it fix it? By grouping qubits together. There are groups of qubits handling processing, and groups of qubits that
Starting point is 02:30:03 do nothing but track and fix errors. The more qubits you add, the fewer errors you have. It may sound counterintuitive, but it's like building a sandcastle that gets stronger the bigger it gets. Now, with AI's help, quantum computers are on track to break current encryption by the year 2029, way ahead of schedule.
Starting point is 02:30:19 Yeah, this is bad. In 2024, the Department of Defense accelerated its quantum modernization program. Their latest directive warns that critical systems must be quantum resistant by 2025, but one detail stands out. They're not just protecting future messages. They're racing to protect everything we've ever encrypted,
Starting point is 02:30:37 and they're running out of time. When Liz Emery's phone buzzed at 4 a.m., she almost ignored it. After 15 years in cybersecurity, late-night calls usually meant someone at the hospital forgot their password. But caller ID showed Mount Sinai's emergency line. The first report was in. Patient records appeared on digital billboards in Times Square. They included blood test results, psychiatric evaluations, and terminal diagnoses that patients had not yet told her families about.
Starting point is 02:31:25 Senators, congressmen, CEOs, their private medical data was all over the Internet. She was still coordinating the hospital's response when the news reported that every dating app was breached. Then they came back online. Suddenly, on every device in the city, smartphones, TVs, billboards, was a link to a site where anyone could look up any information that was part of the dating app breach, direct messages, real names and emails, browser history, private photos and videos, all revealed. Liz figured the only people celebrating were divorce attorneys.
Starting point is 02:31:58 Then an email came into hospital security. Pay $1 billion or every pacemaker control system on Earth will go down. Pay another billion or insulin pumps will go down, starting with diabetic children. The city started to crack. Police dispatch systems were offline. Traffic lights went dark. ATMs were dumping cash into the street. Bank balances were set to zero.
Starting point is 02:32:21 Autonomous vehicles became killing machines. Delivery drones crashed into buildings like Kamikaze pilots. A fleet of cyber trucks tore through a shopping mall before exploding, all at once. News channels tried to cover the chaos, but their broadcasts were hijacked. CNN anchors watched helplessly as their personal emails were displayed on screen. The White House press secretary's private texts appeared during a briefing about the crisis. Then the NSA made an emergency broadcast. that somehow made it through.
Starting point is 02:32:53 They said there was a nationwide system compromise. For the safety of every American, martial law was now imposed. Just as the message was covering the mandatory curfews, every phone in the country went dark. Major technology companies are racing to build quantum-resistant encryption. Google, IBM, and Microsoft
Starting point is 02:33:21 have teams working around the clock, but there's a big problem. Quantum computers don't just threaten future messages. They threaten everything we've ever encrypted. we've ever encrypted. Every encrypted file, every secure transmission, every protected database becomes vulnerable, even ones from decades ago. Intelligence agencies have been collecting encrypted data since the Cold War, your old emails,
Starting point is 02:33:42 your financial records, your private messages, all sitting in databases waiting to be unlocked. Then there's Bitcoin. Its entire security system depends on the same math quantum computers are about to break. Shadow groups have already collected hundreds of thousands of encrypted Bitcoin wallet. They're just waiting for quantum computers powerful enough to crack them. All that money could vanish in seconds. At current prices, that's billions of dollars. POTEL TO-Zero, baby!
Starting point is 02:34:08 Banks know this is coming. JPMorgan started building quantum resistant vaults in 2023, not for gold or cash, for computers. These facilities will never connect to the internet. They'll use paper records and human couriers. The military's training for quantum dark operations, missions conducted without digital communication, teams are used to be able to digital communication, teams practice using prearranged signals, dead drops, and one-time codebooks, the same methods that kept secrets during World War II.
Starting point is 02:34:35 The NSA's latest reports show Project Willow proves something they already knew. The quantum apocalypse isn't coming, it's already here. The NSA isn't trying to stop it. It's preparing for what comes after. Because the race isn't a longer about building quantum computers. The race is to survive them. The line at Chase Manhattan stretched around the block. Cash only.
Starting point is 02:35:13 No cards, no transfers. no transfers, just paper money and metal coins. Donald Janick watched from his office window across the street. In his 30 years as a security consultant, he'd seen a lot of changes, but nothing like this. The quantum apocalypse was erasing decades of technological progress. His company now specialized in physical security, armed guards, paper record keeping, mechanical locks, the kind of security you couldn't hack. When the hospital records started appearing online, they shut down their networks and went analog,
Starting point is 02:35:44 Now armed guards protected rooms full of paper files. Doctors wrote prescriptions by hand. Old mechanical devices became valuable. Typewriter repair shops reopened. Filing cabinet manufacturers couldn't keep up with demand. Bicycle messengers replaced email. Everyone with skills from the pre-digital age suddenly found themselves in demand. Retired secretaries who could take shorthand.
Starting point is 02:36:08 Mechanics who could fix cars without computers. Accountants who knew how to keep books by hand. The younger generation struggled to, adapt. They never lived in an analog world. The smart ones saw it coming. They'd pulled their money out early and bought physical assets. Gold, silver, land, things you could touch. Things that existed in the real world, not just as numbers in a database. The rest had to adapt or lose everything. Back at Stanford, Carl Bishop struggled with depression. He blamed himself. C-Tech, the company supporting his work, no longer took his calls. Still, Carl wouldn't stop digging. He had to find out what
Starting point is 02:36:44 went wrong. Then Carl found something buried in the data, timestamps that didn't make sense. Some encrypted messages were broken months ago. Then he realized the quantum apocalypse didn't start with his mistake. It started months earlier. The first bank breach wasn't at noon the first day. It was three months before, but balances weren't touched. Hospital records, websites, smartphone apps. Most have been compromised for months, but again, the data wasn't touched. Carl realized the The chaos wasn't an accident. It was cover for something else.
Starting point is 02:37:18 Something much bigger, something much worse. Scientists are racing to develop new encryption methods that even quantum computers can't break. They call it post-quantum cryptography. The strategy, find mathematical problems so complex that not even quantum computers can solve them efficiently. But there's a problem. Whenever we think we found an unbreakable code, someone finds a way to break it. The Germans thought Enigma was mathematically impossible to crack. The Japanese believed Purple would keep their World War II communication secret forever.
Starting point is 02:37:57 The NSA encryption would take billions of years to defeat. They were all wrong. Some banks are returning to physical security systems, offline computers, paper records, and in-person verification. Government agencies are reviving Cold War-era methods, one-time pads, dead drops, and bicycle couriers. Sometimes things don't happen to where you planned. Sometimes you can end up lower than you started. What? Quicksilva.
Starting point is 02:38:22 Somebody out there gets it. Quantum dark operations like air-gapped facilities, analog communication, and paper messages could work, but they're temporary solutions. Throughout history, humans have played an endless cat-and-mouse game with secrets. Someone creates an unbreakable code, someone else breaks it, and a more complex code replaces it, and the cycle continues. In the quantum age, there are no more secrets, only information waiting to be revealed. That's why the NSA isn't trying to stop it. They aren't building new code-breaking technology, but you know what they are building? Bunkers.
Starting point is 02:38:54 The concrete room in the bunker beneath Fort Mead was cold and quiet. Carl Bishop was in his fifth hour of interrogation by four government agents. The NSA building above them had been abandoned when their classified files leaked, but this room, which technically didn't exist, still had power and a working computer. Carl learned the truth over the past few months. CTECH wasn't a tech company. It was a joint NSA DARPA program that had been running since 2019. They didn't have just one quantum computer.
Starting point is 02:39:41 They had a network of them, hidden and secure facilities nationwide. For years, the network had quietly broken every encryption had touched, banking records, medical files, private messages, and government secrets. The intelligence agencies had access to everything, but there was a problem. They couldn't act on any of it without revealing their capability. Imagine knowing about every terrorist plot, every corporate crime,
Starting point is 02:40:06 Every government corruption scandal but being unable to stop any of it without exposing how you got the information. The agencies were drowning in intelligence they couldn't use. The solution was elegant. Create a world or privacy no longer existed, where every secret was public. If nothing were private, there'd be no need to explain how they obtained their intelligence. No search warrants were necessary. Everything was already exposed. The social chaos was part of the plan.
Starting point is 02:40:34 Communities going analog wasn't a problem. it was the goal. Drive the dangerous elements offline, where they could be more easily monitored through traditional surveillance. Let the general public choose between convenience and privacy. They would choose convenience. They always did.
Starting point is 02:40:50 But the intelligence agencies had their own solution for secure communication, a return to Cold War trade craft. Dead drops, one-time pads, face-to-face meetings, and soundproof rooms. Their most sensitive operations moved to facilities that never touched enough. that never touched a network or used a computer.
Starting point is 02:41:08 Buildings that didn't officially exist, staffed by people with no digital footprint. They maintained two separate organizations, the public-facing agency everyone knew about, and the shadow agency that operated completely offline. The public agency would rebuild its security and updated systems. All of it would be theater. The real work happened in places like this concrete bunker,
Starting point is 02:41:31 places with no windows, no cameras, no phones. places where messages were still written by hand and burned after reading. The most important secrets were never digitized, never encrypted, and never stored anywhere except in human memory. The NSA didn't break encryption to destroy society. They destroyed society to hide that they'd broken encryption almost a year ago. Carl was set up. The quantum apocalypse was pinned on him.
Starting point is 02:42:00 But what could he do about it? Martial law was still in effect. The NSA wanted him to keep working and keep quiet. He could either agree to cooperate or go to prison. Violation of the Espionage Act, willful communication of national defense information, unauthorized access of classified documents. The list went on and on.
Starting point is 02:42:18 He didn't have much of a choice. As Carl left the concrete room, he realized that in a world with no secrets, the most powerful people weren't those who could break encryption. The most powerful people were those who could keep secrets without it. And right now, the only people who could do that worked for the NSA. Thank you for checking out today's Y Files compilation. My name is Morgan.
Starting point is 02:42:52 That's Wyatt and Virgil. We are beavers. Please say nice things about us in the comments, so the human brings us back. Do the human a favor and hit like, subscribe, comment, share. That stuff really helps the channel. If there's a story that you'd like us to cover, go to thewifiles.com slash tips, send an email, Discord, YouTube chat, whatever works, really. Check out our podcast.
Starting point is 02:43:13 It's called The WFiles Operation Podcast, and it's available everywhere podcasts are available. And we started releasing videos on Spotify, which the human just won't shut up about. If you listen or watch, be sure to leave a like or a comment or a thumbs up or a rating of any kind. That'd be swell. Be sure to check out our Discord server. 85,000 super weird, exceptionally interesting folks on there, and it's a lot of fun. They like weird stuff, and if you're watching this, you do too. Now's the time to mingle.
Starting point is 02:43:40 We also have a 24-7 live stream on the Wi-Files backstage channel. Back-to-back videos all day, every day, forever and ever. The human and hecklefish can keep you company, and maybe you'll catch a new episode you missed, or revisit the cringy older ones. No shame here on this channel. There's even unique content in between vids, so pay attention and join the chat.
Starting point is 02:44:00 There's also a new show called The Basement, and if the humans pride and joy, he talks with the experts behind all the stories on this very channel. Some of those folks have been amazing during the research phase, and were so generous with their knowledge. They really deserve a lot of credit for making the show happen. The human picks their brains so you don't have to. If you have any great guest ideas, email us at
Starting point is 02:44:23 Team at theYfiles.com. A very special thanks to the patrons who make the Y Files happen. Every episode is dedicated to our Patreon members. The human couldn't have done any of this without the love and support of this community. And if you'd like to support the channel, consider becoming a member on Patreon. Three bucks a month and you get perks like seeing episodes early with no commercials, access to discontinued merch, and a secret code for the store.
Starting point is 02:44:46 Type the secret code, and you get to Peru's exclusive merch not available to the general public. Sh, secrets. Best of all is access to the live streams. The team hops on Discord and you get to meet the whole Y-Files family. All their cameras are on,
Starting point is 02:45:00 maybe they shouldn't be. A little moisturizer wouldn't hurt. You can hop on stage and ask a question or just shoot the sh stuff. It gets wild in there, but it's a lot of fun and totally the best perk of all. The Huminoff script. What a way to spend an afternoon.
Starting point is 02:45:14 Another way to support the channel is check out the Wi-Files store. Coffee mugs, t-shirts, squeezy-talking hecklefish dolls, plush beavers. Wait, still don't have those? Ah, one day. But all the other stuff is legit and great fun for the whole family. If you want to save some cash, consider becoming a member on YouTube. YouTube membership only costs three bucks, and you get you 10% off the whole store. If you're going to spend $40 on Wi-Files gear, you're practically paid.
Starting point is 02:45:42 for itself. And if you want to cancel, that's cool. It's there to help you save money. The human doesn't pocket any of that cash. In fact, all the profit goes to the team so they can keep popping out epic episodes. And we just love seeing the merch out in the wild. I think that's everything. Eesh. I don't know how the human does this every week. I'm exhausted. Okay, here goes the fun part. Little nervous. Deep breaths. Until next time, be safe, be kind, I know that you are appreciated. Oh, boy. I felt nice.
Starting point is 02:46:17 Bye. Yes, an area 51. A secret code inside the Bible said I would. I love my UFOs and paranormal fun as well as music. So I'm singing the like I shucks. And it never ends. No, it never ends. Crabt and got stuck inside males home.
Starting point is 02:47:15 With M.K. Ultra I being only two of a home way. And LeCubric fake the Shadow people. The audience just fought the smiling man. I'm told, and his name was cold. The secret city under. Creas number stations, planets are both two,
Starting point is 02:48:31 and with the dark watcher. Don't you worry?

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.