Podcasts > Stuff You Should Know > Selects: What is a Numbers Station?

Selects: What is a Numbers Station?

By iHeartPodcasts

In this episode of Stuff You Should Know, hosts Chuck Bryant and Josh Clark explore the mysterious world of number stations—shortwave radio transmissions that broadcast coded sequences of numbers and letters through eerie alert signals and monotone voices. They trace these enigmatic broadcasts from their origins in World War I through their Cold War peak to their continued operation today, explaining how shortwave radio's unique properties enable global, untraceable communication.

The hosts discuss the technical mechanics behind shortwave transmission and explain why one-time pad encryption remains unbreakable even in the digital age. They examine evidence linking number stations to espionage operations, including recent spy cases involving shortwave radios and code sheets, while also exploring alternative theories about their purpose. The episode reveals how enthusiast communities track these broadcasts and addresses why intelligence agencies might maintain these stations decades after the Cold War ended.

Listen to the original

Selects: What is a Numbers Station?

This is a preview of the Shortform summary of the Apr 11, 2026 episode of the Stuff You Should Know

Sign up for Shortform to access the whole episode summary along with additional materials like counterarguments and context.

Selects: What is a Numbers Station?

1-Page Summary

Definition, History, and Current Status of Number Stations

Number stations are mysterious shortwave radio transmissions that have puzzled listeners for over a century, broadcasting seemingly random sequences of numbers and letters through unique and often eerie methods.

Number Stations Broadcast Random Sequences with Alert Signals and Coded Transmissions

A defining feature of number stations is their use of alert signals—beeps, tones, or musical pieces like "Swedish Rhapsody" or "Lincolnshire Poacher"—to notify listeners that a coded transmission is about to begin. Following the alert, a monotone voice, sometimes digital and sometimes human, reads numbers and letters in various languages. These unlicensed pirate transmissions operate from hidden locations and frequently interfere with legitimate radio channels, including air traffic control frequencies.

Number Stations Emerged in WWI, Peaked During the Cold War, and Continue Today

The first known mention of number stations appeared in a German magazine during World War I. By World War II, countries worldwide used them for espionage, transmitting coded messages to field agents. Number stations reached their peak during the Cold War in terms of both frequency and technological sophistication. Though transmissions dropped dramatically after the Berlin Wall fell, number stations continue to broadcast well beyond 2014. Anyone with a shortwave radio can tune into these frequencies, which websites like Spy Numbers track for enthusiasts. Their persistence decades after the Cold War suggests intelligence agencies may keep them operative for emergencies or to obscure the full scope of ongoing intelligence activities.

Technical Mechanics of Shortwave Radio Transmission

Hosts Chuck Bryant and Josh Clark discuss how shortwave radio's distinctive technical properties enable its extraordinary reach and resilience.

Shortwave Signals Achieve Global Reach by Bouncing Off the Ionosphere

Bryant explains that shortwave signals bounce off the ionosphere, located 50 to 375 miles above Earth. Clark points out that solar ionization creates an electrical charge in this region, reflecting radio waves back to Earth through "sky wave" or "skip" propagation. This unpredictable but powerful method enables signals to travel across continents and oceans, allowing anyone with a simple shortwave radio to receive transmissions from thousands of miles away. The combination of anonymous, one-way, and border-crossing communication makes shortwave ideal for coded messages with minimal equipment.

Transmitter Power and Size Determine Coverage, While Shortwave Resists Jamming

Bryant notes that enormous transmitters can send signals across continents, though truly far-reaching broadcasts may require installations covering scores of acres. Clark explains that shortwave's enduring strength is its resistance to jamming—even the Soviet Union's billion-dollar jamming efforts during the Cold War ultimately failed because the unpredictability of the atmosphere and the vast spread of available frequencies made it impossible to block every signal. Bryant emphasizes that you simply can't jam the entire shortwave spectrum at once.

Encryption Methods and Security

One-time Pads Provide Unbreakable Encryption Through True Randomness

One-time pads, invented in the 19th century, remain the most secure form of encryption. The system uses truly random numbers written on physical paper, with both sender and recipient holding one copy that's used only once and then destroyed. Users convert messages into numbers, add corresponding numbers from the pad, and only someone with the original pad can reverse the calculation. Unlike digital encryption, one-time pads use true randomness that computers cannot generate, making them invulnerable to pattern analysis. Digital communications also leave traces, while one-time pads self-destruct after use—they're eaten, burned, or otherwise destroyed.

Key Delivery Remains the Primary Vulnerability

The main weakness is securely delivering the pads themselves across borders or hostile territory. Spies would receive pads on dissolving or burning paper, or microprinted tiny enough to hide inside ordinary objects. To complicate surveillance further, intelligence agencies send dummy transmissions that closely resemble real messages, forcing adversaries to waste resources decrypting meaningless content.

Purpose and Theories

While their true purpose remains officially unacknowledged, experts widely believe number stations serve espionage functions for covert communications.

Experts Agree Number Stations Are Covert Espionage Channels

Analysts from Cecil Adams at Straight Dope to the head of the UK's trade and industry agency agree these stations send secret messages for spies. The UK spokesperson's cryptic statement that transmissions are "not for public consumption" implies official government purpose. Despite widespread belief in their espionage function, no government has ever acknowledged responsibility, and the lack of investigation suggests coordinated intelligence operations.

Modern Spy Cases Confirm Continued Use of Number Stations

In 2011, German authorities caught a couple spying for Russia who were actively receiving a numbers station transmission with a shortwave radio and code sheet. Similarly, Anna Montes, convicted in 2001 of spying for Cuba, had a shortwave radio and code sheet discovered during a federal search. These cases highlight that intelligence agencies continue to rely on number stations and one-time pads for secure, untraceable communications even in the digital age.

Number Stations Persist for Multiple Purposes

One theory suggests many stations maintain operational readiness for future crises. Others believe dummy broadcasts camouflage real messages, preventing counterintelligence from detecting patterns in genuine communications. There's also speculation that criminal enterprises like drug runners might use number stations, as some broadcasts appear less professional than expected for government operations.

Numbers Station Community Tracks and Catalogs Transmissions

In the late 1980s and early 1990s, the European Numbers Information Gathering and Monitoring Association (Enigma) formed to catalog number stations using a standardized naming convention. Though Enigma disbanded around 2000, enthusiasts formed "Enigma 2000" to continue the effort online. The so-called "Yosemite Sam" station, broadcasting from New Mexico since 2004 with cartoon excerpts followed by data bursts, demonstrates the blurred line between serious spycraft and playful experimentation—leaving debate over whether it's a sophisticated government operation or an elaborate prank by a radio enthusiast.

1-Page Summary

Additional Materials

Clarifications

  • Shortwave radio uses high-frequency radio waves (3 to 30 MHz) that can travel long distances by reflecting off the ionosphere. Unlike AM or FM radio, which typically cover local or regional areas, shortwave signals can reach across continents and oceans. This makes shortwave ideal for international broadcasting and covert communications. Its ability to propagate globally with simple receivers distinguishes it from other radio types.
  • The ionosphere is a layer of Earth's upper atmosphere filled with charged particles created by solar radiation. These charged particles can reflect or refract radio waves back toward the Earth's surface, enabling long-distance communication. Its properties vary with time of day, season, and solar activity, affecting signal strength and reach. This natural reflector allows shortwave radio signals to "skip" over the horizon, extending their range beyond line-of-sight.
  • "Sky wave" or "skip" propagation refers to radio waves that travel upward into the ionosphere and are reflected back down to Earth, allowing signals to cover much greater distances than line-of-sight transmission. This reflection occurs because the ionosphere's charged particles bend the radio waves back toward the surface. The process can cause signals to "skip" over large areas, reaching receivers thousands of miles away. Variations in the ionosphere's density and solar activity affect how well the waves propagate.
  • The ionosphere contains layers of charged particles created by solar radiation. These charged particles can refract, or bend, radio waves back toward Earth instead of letting them escape into space. This bending allows shortwave signals to "skip" over the horizon and reach distant locations beyond the line of sight. The effectiveness of this reflection varies with time of day, solar activity, and atmospheric conditions.
  • One-time pads are encryption tools that use a random key as long as the message itself, ensuring perfect secrecy. Each key is used only once and then discarded, preventing any pattern recognition or reuse vulnerabilities. Because the key is truly random and never reused, the ciphertext provides no information about the original message without the key. This method is theoretically unbreakable if implemented correctly and the key remains secret.
  • One-time pads use a key that is as long as the message and completely random, ensuring no patterns exist to analyze. Each key is used only once and then discarded, preventing reuse vulnerabilities. Because the key is truly random and secret, the ciphertext reveals no information about the original message. This method is mathematically proven to be unbreakable if implemented correctly.
  • One-time pads must be physically handed to spies without interception, often using covert methods like secret meetings or hidden compartments. Agents may receive pads disguised as everyday items, such as inside hollowed objects or sewn into clothing. Delivery risks include capture by enemy agents or surveillance, which could compromise the entire communication system. To mitigate this, pads are often distributed in small batches and destroyed immediately after use.
  • Dummy transmissions are fake coded messages sent to confuse and mislead adversaries. They force opponents to waste time and resources trying to decode meaningless content. This tactic helps protect real communications by hiding them among false signals. It also complicates efforts to identify active espionage channels.
  • Number stations emerged as a covert communication method when traditional channels were vulnerable to interception. During World War I and II, they enabled secure, long-distance messaging to spies behind enemy lines without revealing sender or receiver identities. In the Cold War, their use expanded due to heightened espionage needs and technological advances in radio transmission. Their persistence reflects ongoing strategic value in clandestine intelligence operations.
  • Number stations operate as unlicensed pirate transmissions to maintain secrecy and avoid official regulation that could expose their locations. They use shortwave frequencies that are not exclusively assigned, allowing covert broadcasts without formal authorization. Because these frequencies overlap with those used by legitimate services, number stations can unintentionally disrupt normal communications. Their hidden, unauthorized nature prevents authorities from easily shutting them down.
  • Shortwave radio resists jamming because its signals use a wide range of frequencies that change with atmospheric conditions, making it hard to predict and block all channels simultaneously. The ionosphere's variable reflection angles cause signals to arrive from multiple paths, complicating targeted interference. Jammers must cover vast geographic areas and frequencies, requiring immense power and resources. Additionally, shortwave receivers can switch frequencies quickly to avoid jammed bands.
  • The European Numbers Information Gathering and Monitoring Association (Enigma) was a group of radio enthusiasts and researchers who systematically recorded and analyzed number station broadcasts. They developed a standardized naming system to identify and catalog different stations, aiding in tracking their activity over time. Enigma's work helped create a public archive of transmissions, supporting both hobbyists and researchers interested in espionage communications. After disbanding, their efforts were continued online by successor groups like Enigma 2000.
  • The "Yosemite Sam" number station is named after the cartoon character whose voice clips it uses as an alert signal. Its ambiguous purpose stems from its unusual mix of playful audio and data bursts, which is atypical for traditional espionage broadcasts. This blend raises questions about whether it serves a genuine intelligence function or is a form of experimental or prank transmission. Such ambiguity highlights the challenge in definitively identifying the intent behind some number stations.
  • Governments avoid acknowledging number stations to maintain operational secrecy and protect intelligence methods. Official denial prevents adversaries from confirming the existence of covert communication channels. Public acknowledgment could compromise agent safety and ongoing espionage activities. Silence also helps preserve plausible deniability in international relations.
  • In espionage, "coded transmissions," "coded messages," and "coded sequences" refer to information transformed into a secret format to prevent unauthorized understanding. These codes use specific systems or keys to convert plain text into seemingly random numbers or letters. Only someone with the correct decoding method or key can interpret the original message. This ensures secure communication between spies and their handlers.
  • Digital monotone voices are generated by computer software or speech synthesizers, producing consistent, mechanical-sounding speech without natural variation. Human monotone voices are spoken by people deliberately using a flat, emotionless tone to avoid revealing identity or emotion. Digital voices allow automated, repeatable broadcasts without human presence, while human voices can add subtle nuances or be easier to produce in covert settings. Both types maintain monotony to reduce detectability and maintain secrecy.
  • Microprinting is a technique that produces extremely small text or images, often invisible to the naked eye. It is used to hide one-time pads by printing the encryption keys on tiny surfaces, such as inside the binding of a book or on a small piece of paper. This makes the pads easy to conceal and difficult for adversaries to detect during searches. Microprinting helps spies securely transport keys without raising suspicion.
  • The phrase "not for public consumption" implies that the transmissions are intended solely for specific, authorized recipients, not the general public. It suggests official secrecy and control over the information being broadcast. This wording hints at government involvement and the sensitive nature of the messages. It also serves to discourage unauthorized listening or interference.
  • Large shortwave transmitters require extensive land to accommodate massive antenna arrays, which can span hundreds of meters to kilometers. These antennas need precise spacing and orientation to direct signals effectively over long distances. The transmitter buildings house powerful radio equipment and cooling systems to manage the high energy output. Such infrastructure demands significant investment, maintenance, and security due to its size and strategic importance.

Counterarguments

  • The claim that number stations "often interfere with legitimate radio channels, including air traffic control frequencies" may be overstated; documented cases of such interference are rare, and most number stations operate on frequencies allocated for international broadcasting.
  • The assertion that number stations are "unlicensed pirate transmissions" is not universally accurate; some may be operated by state actors with de facto or de jure authorization within their own jurisdictions.
  • While experts widely believe number stations serve espionage purposes, there is no definitive public proof linking all number stations to intelligence agencies, and some could be hoaxes or unrelated broadcasts.
  • The idea that one-time pads are "invulnerable to pattern analysis" is only true if the pads are truly random, used only once, and kept completely secret; any deviation from these strict requirements can compromise security.
  • The suggestion that number stations are primarily used for espionage does not account for the possibility that some may serve other purposes, such as military training exercises, emergency broadcasts, or non-governmental uses.
  • The statement that "no government has ever acknowledged responsibility" for number stations is accurate, but it also means that all attributions remain speculative without official confirmation.
  • The implication that number stations are still widely used today is debated; while some stations persist, the overall number and frequency of broadcasts have declined significantly since the Cold War.
  • The claim that shortwave radio "resists jamming" is generally true, but targeted jamming of specific frequencies is possible and has been documented, even if complete spectrum jamming is impractical.
  • The notion that "anyone with a shortwave radio can tune in" is technically correct, but the proliferation of digital communication and the decline in shortwave radio ownership have reduced the general public's exposure to these broadcasts.
  • The idea that criminal enterprises use number stations is speculative and not supported by substantial public evidence.

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
Selects: What is a Numbers Station?

Definition, History, and Current Status of Number Stations

Number stations are mysterious shortwave radio transmissions that have baffled listeners for over a century. These stations broadcast seemingly random sequences of numbers and letters, often featuring unique and eerie methods to alert and engage their intended audience.

Number Stations Regularly Broadcast Random Sequences of Numbers and Letters

Number Stations Start With an Alert Signal Like a Beep, Tone, or Musical Piece for Coded Transmissions

A defining feature of number stations is the alert signal at the beginning of each broadcast. This could be a beep, a tone, or even a musical piece such as "Swedish Rhapsody" or the British folk song "Lincolnshire Poacher." The purpose of this signal is to alert listeners that a secret-coded transmission is about to begin, prompting them to tune in and get ready to receive the information. This alert is followed by the main part of the transmission, and often a closing signal, such as another distinct tone or sound.

Transmissions of a Speaker Reading Random Numbers and Letters in Various Languages

After the alert signal, number stations broadcast a series of numbers and letters. These are typically read aloud by a monotone voice, sometimes digital and at other times spoken, and can be in multiple languages. For example, the "Swedish Rhapsody" station featured a little girl reading numbers and letters in German, which added to its eerie reputation. Another example is the Atencion station, in which a woman announces "Atencion" and then reads numbers in Spanish, repeating each sequence for emphasis.

Unlicensed Transmissions Overlap Air Traffic Control Channels

Number stations operate as pirate radio transmissions, making them unlicensed and technically illegal. Their transmitters are hidden, their locations unknown, and the content frequently interferes with legitimate radio transmissions, including air traffic control frequencies. This unregulated nature makes them especially mysterious and controversial.

Number Stations Began In WWI, Peaked In the Cold War

The first known mention of number stations appeared in a German magazine during World War I, indicating their use began as early as 1914–1918. By World War II, number stations were operating in full swing, with countries all over the world using them to transmit secret codes over various radio frequencies. Their purpose was fundamentally linked to espionage, delivering coded messages to agents in the field.

During the Cold War, number stations reached their peak, both in terms of technological sophistication and frequency of transmission. Espionage activity intensified, and so did the creativity and complexity of the stations’ broadcasts.

Number Stations Have Declined Since the Cold War but Continue, Suggesting Ongoing Intelligence Operations

Transmissions Dropped Post-Berlin Wall, but Occasional Increases Noted

With the fall of the Berlin Wall and the end of the Cold War, the number of active number ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Definition, History, and Current Status of Number Stations

Additional Materials

Clarifications

  • Shortwave radio uses high-frequency radio waves that can travel long distances by reflecting off the Earth's ionosphere. This allows signals to be received far beyond the horizon, even across continents. Shortwave radios tune into these frequencies to pick up broadcasts from distant stations. Because of this range, shortwave is ideal for international communication and secret transmissions like number stations.
  • Coded transmissions use numbers and letters because they can represent complex messages in a simple, standardized form. These sequences are often encrypted, making them unreadable without a specific key or codebook. Using numbers and letters allows for easy transmission over radio waves and reduces the chance of errors. This method ensures secret communication that is difficult for unintended listeners to understand.
  • Alert signals serve as unique identifiers, helping intended recipients recognize the start of a specific station's broadcast amid many signals. Tunes like "Swedish Rhapsody" or "Lincolnshire Poacher" are memorable and distinctive, making it easier for agents to quickly identify the correct transmission. These melodies also act as a form of authentication, reducing the risk of confusion or interception by unintended listeners. Using familiar or catchy tunes ensures the alert stands out on crowded shortwave bands.
  • Monotone or digital voices in number station broadcasts help maintain clarity and reduce emotional cues, making the message harder to interpret by unintended listeners. Digital voices, often generated by text-to-speech technology, ensure consistent pronunciation and timing, which aids in decoding the message accurately. Using a monotone or synthetic voice also minimizes the risk of revealing the sender's identity or emotional state. This method enhances the secrecy and reliability of the coded transmissions.
  • Pirate radio transmissions are broadcasts made without official permission from government authorities. They operate outside legal regulations, often to avoid censorship or licensing fees. Number stations are unlicensed because they transmit secret messages covertly, without authorization. This secrecy helps protect the identity and location of the broadcasters.
  • Number stations transmit on shortwave frequencies that can overlap with those used by legitimate services, including air traffic control. Because they are unlicensed and unregulated, their signals can cause static or block important communications. This interference can disrupt critical safety messages between pilots and controllers. Such disruptions pose risks to aviation safety and complicate radio spectrum management.
  • Espionage during World War I involved gathering military and political secrets to gain strategic advantages, often using coded messages and spies. In World War II, intelligence efforts expanded massively, with complex spy networks and advanced encryption like the Enigma machine playing key roles. The Cold War was marked by intense spying between the US and Soviet Union, using covert communications to avoid detection. Number stations fit into this history as a secure way to send secret instructions to agents without revealing their identities or locations.
  • The fall of the Berlin Wall symbolized the end of the Cold War, reducing tensions between major powers. This led to decreased espionage activities and less need for secret communications like number stations. Intelligence agencies shifted to newer, more secure technologies for covert messaging. Consequently, the use of traditional number stations declined significantly.
  • Websites like Spy Numbers collect and archive recordings of number station broadcasts from listeners worldwide. They provide detailed information such as br ...

Counterarguments

  • The claim that number stations provide a "secure, unbreakable method" for transmitting secret instructions may be overstated; while one-time pads are theoretically unbreakable, operational security lapses or compromised pads can render transmissions vulnerable.
  • The assertion that number stations "often interfere with legitimate broadcasts, including air traffic control channels" is not universally documented; while interference has been reported, it is not clear how frequent or widespread this issue is.
  • The idea that number stations are exclusively used by intelligence agencies is debated; some transmissions may originate from non-governmental sources or serve other purposes, such as military training or weather data.
  • The continued operation of number stations does not necessarily imply ongoing la ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
Selects: What is a Numbers Station?

Technical Mechanics of Shortwave Radio Transmission

Shortwave radio remains a unique and powerful means of global communication due to its distinctive technical properties. Hosts Chuck Bryant and Josh Clark discuss how the mechanics of shortwave transmission enable its extraordinary reach and resilience.

Shortwave Signals Travel far By Bouncing Off Ionosphere For Global Communication

Shortwave signals cover vast distances by interacting with the Earth's upper atmosphere. As Chuck Bryant explains, these signals literally bounce off the ionosphere, located about 50 to 375 miles above the planet. Solar ionization in the ionosphere creates an electrical charge, reflecting radio waves back down to Earth in a process called "sky wave" or "skip" propagation. Josh Clark points out that this is the same region where the northern lights occur—solar rays ionize atmospheric atoms, causing them to lose electrons, resulting in an ever-changing ionosphere. This constant change makes the behavior of shortwave signals unpredictable but generally causes the strongest receptions at sunrise and sunset.

This method of propagation enables shortwave signals to travel across continents and oceans. A person with even a simple shortwave radio can receive transmissions from thousands of miles away, regardless of political borders. These transmissions allow for anonymous messaging; it's nearly impossible to trace who receives a broadcast, and even determining the origin of the signal is very difficult. In the 1960s and 1970s, owning a shortwave radio was common and not suspicious—someone could plausibly just be listening to international news like the BBC World Service. This combination of anonymous, one-way, and border-crossing communication allows for coded messages and mass reach with minimal equipment.

Transmitter Size and Power Determine the Distance and Coverage Area of a Shortwave Signal, With Larger Installations Covering Continental Distances

Successful shortwave communication over long distances depends heavily on transmitter size and power. As Bryant notes, enormous transmitters can send signals over entire continents or even to the other side of the world. While it is possible to transmit from a device the size of a bedroom, truly far-reaching signals may require installations covering scores of acres. The scale of shortwave infrastructure correlates with both the complexity and cost of operation. Larger antennas and higher transmission power make it possible to reach wider audiences but also require significant investment.

Despite the potential for secret communications, having a shortwave radio did not incriminate civilians during earlier decades. As Clark emphasizes, possessing such a radio in the 1960s or 1 ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Technical Mechanics of Shortwave Radio Transmission

Additional Materials

Clarifications

  • The ionosphere is a layer of Earth's atmosphere ionized by solar radiation, containing charged particles that affect radio wave propagation. It exists between about 50 to 375 miles above Earth because this altitude receives enough solar energy to strip electrons from atoms, creating ions. This ionization varies with solar activity and time of day, influencing how radio waves reflect or pass through. The ionosphere plays a crucial role in long-distance radio communication by reflecting certain frequencies back to Earth.
  • Solar ionization occurs when high-energy ultraviolet and X-ray radiation from the sun strikes atoms and molecules in the upper atmosphere. This energy knocks electrons free from these atoms, creating a mix of positively charged ions and free electrons. The presence of these charged particles forms an electrically conductive layer known as the ionosphere. This charged layer can reflect or refract radio waves, enabling long-distance signal propagation.
  • "Sky wave" or "skip" propagation occurs when radio waves travel upward and are refracted, or bent, back toward Earth by the ionosphere's charged particles. This bending allows signals to "skip" over the horizon, reaching receivers far beyond the line of sight. The ionosphere acts like a mirror for certain frequencies, reflecting them instead of letting them pass into space. This process enables long-distance communication without satellites or cables.
  • The ionosphere changes constantly because it is affected by varying solar radiation levels throughout the day and solar activity like flares. Solar rays carry high-energy ultraviolet and X-ray photons that collide with atmospheric atoms, knocking electrons free and creating ions. This ionization process varies with the sun’s position, causing fluctuations in electron density. These fluctuations alter how radio waves reflect, making signal behavior unpredictable.
  • The ionosphere acts like a mirror for certain radio frequencies, reflecting them back toward Earth instead of letting them escape into space. This reflection allows signals to "hop" between the Earth and ionosphere multiple times, extending their range far beyond the horizon. The height and density of the ionosphere layers vary with solar activity, affecting how well signals bounce. This process enables shortwave signals to travel thousands of miles, crossing continents and oceans.
  • Shortwave signals reflect off the ionosphere, causing them to travel unpredictable paths that can cover thousands of miles. This reflection and multiple signal bounces make pinpointing the exact transmission source very challenging. Additionally, the wide range of frequencies and the use of directional antennas further obscure the origin. Unlike local broadcasts, shortwave signals do not follow a straight line, complicating tracing efforts.
  • In the 1960s and 1970s, shortwave radios were widely used for international news and entertainment, making them common household items. Governments and broadcasters used shortwave to reach global audiences, especially behind the Iron Curtain where local media was censored. The technology was affordable and accessible, so owning a shortwave radio was not suspicious or linked to espionage. This era saw shortwave as a vital tool for information exchange during the Cold War.
  • Larger transmitters can generate stronger radio signals that travel farther before weakening. Higher power helps the signal overcome natural losses and interference over long distances. Bigger antennas improve signal focus and efficiency, increasing coverage area. Together, size and power determine how far and how clearly a shortwave signal can be received.
  • Larger transmitter installations need powerful equipment to generate strong signals that can travel long distan ...

Counterarguments

  • While shortwave radio can reach vast distances, reception quality is often inconsistent and subject to interference from atmospheric conditions, electrical storms, and man-made noise.
  • The unpredictability of the ionosphere can make reliable communication difficult, especially for critical or time-sensitive information.
  • Modern digital communication technologies, such as the internet and satellite communications, offer more reliable, higher-quality, and interactive global communication options compared to shortwave radio.
  • The anonymity of shortwave radio is limited to the receiver; transmitters can sometimes be located using direction-finding equipment, especially with sustained or repeated broadcasts.
  • In some countries and time periods, possession of shortwave radios has been restricted or monitored, and listeners have faced suspicion or legal consequences.
  • The use of coded messages over shortwave radio is not inherently secure, as co ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
Selects: What is a Numbers Station?

Encryption Methods and Security

One-time Pads Are the Most Secure Encryption and Unbreakable Since Their 19th-Century Invention

One-time pads were invented in the 19th century and remain the most secure, unbreakable form of encryption. The system works by creating a sheet of truly random numbers—strings, often four or five digits long—that is written on a physical piece of paper. Both the sender and recipient have one copy each of this pad, and crucially, the pad is used only once and then destroyed, making it impossible for anyone else to intercept or reuse.

The code system can be a simple correspondence, such as assigning letters or words to specific numbers (for example, "A" equals 0, "B" equals 1, and so on), or it can represent full words or phrases. Users could also agree on a book as the key to translate between numbers and text, using agreed-upon conventions like "page, line, word." When encrypting a message, the sender converts each letter, word, or phrase into a number, then adds it to the corresponding number from the one-time pad. Only someone with the original pad can reverse the calculation and reveal the true message.

One-time Pads Outsecure Digital Encryption Due to True Randomness and Transient Traces

The strength of one-time pads comes from their use of true randomness—which computers cannot generate. Algorithm-based random numbers are at risk of pattern analysis by hackers because computers use repeatable methods to make "random" numbers. This means, in some cases, digital encryption based on computer-generated numbers is vulnerable to cracking, especially given enough time and computational resources.

Another edge is that digital communications leave traces; network messages, emails, and even deleted files can be recovered or monitored. In contrast, with one-time pads, the physical key self-destructs after use: it's eaten, burned, or otherwise destroyed, ensuring that an intercepted message cannot be decoded and does not leave recoverable evidence.

One-time Pad Vulnerabilities Focus On Sending Encryption Keys Abroad

The main weakness of the one-time pad system is the logistics of securely delivering the pads themselves. Each pad must physically travel to its intended recipient, sometimes across borders or hostile territory. Spies would receive ephemeral one-time pads written on dissolving or burning paper, or microprinted so tiny that they could be hidden inside ordinary obje ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Encryption Methods and Security

Additional Materials

Clarifications

  • True randomness comes from unpredictable physical processes, like radioactive decay or atmospheric noise. Computers generate "random" numbers using algorithms, which are deterministic and repeatable if the starting point (seed) is known. This means computer-generated randomness is actually pseudo-random and can be predicted or reproduced. True random numbers are essential for unbreakable encryption because they have no patterns to exploit.
  • One-time pad encryption converts each letter of the message into a number, typically using a simple code like A=0, B=1, etc. Then, each message number is added to the corresponding number from the one-time pad using modular arithmetic (usually mod 26 for letters), meaning if the sum exceeds 25, it wraps around starting from 0 again. The resulting sum forms the encrypted message number, which is then converted back to a letter. Decryption reverses this by subtracting the pad number from the encrypted number using the same modular arithmetic.
  • The "page, line, word" convention in book ciphers refers to using a specific book as a key to encode or decode messages. Each number set points to a location in the book: the page number, the line on that page, and the word in that line. The sender and receiver agree on the exact edition of the book to ensure both reference the same text. This method turns numbers into meaningful words, allowing secret communication without a traditional codebook.
  • Destroying the one-time pad after use ensures no copies remain for an attacker to find. Without the original pad, intercepted encrypted messages are just random noise with no pattern. This eliminates any chance of reverse-engineering the key or message. The pad’s uniqueness and single-use nature are what make the encryption unbreakable.
  • Physically delivering one-time pads requires covert methods to avoid interception by enemies or authorities. Couriers often use secret routes, disguises, or hidden compartments in everyday objects to smuggle pads unnoticed. Diplomatic pouches or trusted agents may be employed to reduce risk during transport. Any compromise in delivery can expose the entire encryption system, making secure logistics critical.
  • Microprinting is a technique that prints extremely small text or numbers, often invisible to the naked eye, allowing secret information to be hidden on ordinary objects. Dissolving paper is made from materials that disintegrate quickly in water or other solvents, destroying the message after use. Burning paper is a simple destruction method where the pad is incinerated to prevent recovery. These methods help securely transport one-time pads by making them hard to detect or recover if intercepted.
  • Dummy transmissions are fake messages sent deliberately to mimic real encrypted communications. Their purpose is to overload and mislead adversaries by making it difficult to identify which messages contain valuable information. This tactic wastes the enemy’s time and computational resources on decrypting meaningless data. It also protects genuine messages by hiding them among numerous decoys.
  • Digital communicati ...

Counterarguments

  • While one-time pads are theoretically unbreakable when used correctly, in practice, human error (such as reusing pads or improper destruction) has led to successful cryptanalysis in historical cases.
  • The logistical challenge of securely distributing and managing large quantities of one-time pads makes them impractical for most modern communication needs, especially at scale.
  • Modern digital encryption methods, such as those based on quantum-resistant algorithms or strong symmetric ciphers (e.g., AES), are considered highly secure for practical purposes and do not require physical key exchange.
  • Advances in hardware-based random number generators allow computers to generate true random numbers, mitigating the criticism that computers cannot produce true randomness.
  • Physical one-time pads can be lost, stolen, or copied during transit, introducing security risks not present in some digital key exchange protocols.
  • The destruction of physical pads doe ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
Selects: What is a Numbers Station?

Purpose and Theories

Number stations broadcast secret codes that have puzzled listeners for decades. While their true purpose remains officially unacknowledged, experts, governments, and researchers widely believe they serve espionage functions, primarily for covert communications.

Experts Say Number Stations Are Covert Espionage Channels, Though No Government Admits This

Analysts Agree Number Stations Transmit Secret Spy Instructions

Virtually everyone, from Cecil Adams at Straight Dope to the head of the UK's trade and industry agency, agrees that these stations send secret messages for spies. The foundation of these broadcasts is believed to be espionage, with analysts and enthusiasts concluding that number stations deliver instructions to undercover operatives.

British Trade Spokesperson Implies Governmental Involvement, States Transmissions "Not for Public Consumption"

The closest any government has come to admitting involvement was a statement from a UK trade and industry spokesperson, who said people should not be mystified by the transmissions, adding, "They're not, shall we say, for public consumption." This cryptic comment implies an official, though unspoken, government purpose behind the broadcasts.

Government Denies Responsibility; Lack of Investigation Suggests Coordinated Intelligence Operations

Despite widespread belief in their espionage purpose, no government has ever officially acknowledged responsibility for number stations. The lack of public investigation into these conspicuous and odd transmissions further suggests that they are coordinated intelligence operations meant to enable anonymous, one-way communications with spies abroad.

Spies Use One-time Pads, Shortwave Radios for 21st-Century Communications

The use of number stations is not just a relic of the Cold War but continues into the 21st century, as proven by several high-profile cases.

German Couple Caught In 2011 For Russia Spying, Found With Numbers Transmission, Radio, Code Sheet

In 2011, German authorities caught a couple who had been living in Germany since 1988 and spying for Russia. They were apprehended while actively receiving a numbers station transmission in their home and were found with a shortwave radio and a code sheet, confirming their use of these time-tested espionage tools.

Similarly, in 2001, Anna Montes, who worked for the US Defense Intelligence Agency, was convicted of spying for Cuba. During a search of her home, authorities discovered a shortwave radio and a code sheet—further evidence that spies in modern times are still equipped with such methods.

Intelligence Agencies Use Number Stations and One-time Pads For Agent Communication Despite Digital Advances

These examples highlight that intelligence agencies continue to rely on number stations and one-time pads for secure, untraceable communications, as these methods are considered almost foolproof even in the age of advanced digital technology.

Number Stations Persist For Readiness, Real Transmissions, and Aiding Non-governmental Criminal Activities

The ongoing presence of number stations, even after the Cold War, implies multiple purposes beyond immediate espionage.

Dummy Broadcasts Preserve Espionage Infrastructure for Future Crises

One theory is that many number stations are kept active only to maintain operational readiness—keeping infrastructure in practice in case rapid deployment is needed in a future crisis or conflict.

Dummy Broadcasts Camouflage to Prevent Counterintelligence From Detecting Real Communications and Patterns

Some believe many transmissions are meaningless “dummy broadcasts,” designed to camouflage real messages. By maintaining a steady stream of meaningless content over years, intelligence agencies prevent outside observers from detecting changes in patterns, making it difficult for counterintelligence to identify genuine spy communications.

Are Criminal Enterprises Using Numbers Stations?

There is also speculation that criminal enterprises, such as drug runners, might use numbers stations. Some broadcasts appear less professional, and during the Cold War, some Cuban stations were notable for slip-ups, like accidental live microphone noise or broadcasts from Radio Havana bleeding through. Criminals could use simple codes for instructions, such as using A for 1, ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Purpose and Theories

Additional Materials

Counterarguments

  • While many experts and enthusiasts believe number stations are used for espionage, there is no definitive public proof directly linking all number stations to intelligence agencies.
  • The implication of government involvement based on a spokesperson's vague statement does not constitute official confirmation or evidence.
  • The continued use of one-time pads and shortwave radios by spies is supported by some cases, but these may be exceptions rather than evidence of widespread, ongoing practice.
  • The existence of criminal use of number stations is speculative and lacks concrete, publicly available evidence.
  • The persistence of number stations after the Cold War could ...

Actionables

  • you can practice secure communication with friends or family by creating your own simple code system for sharing harmless messages, helping you understand the basics of encryption and secrecy in everyday life (for example, assign numbers to letters or use a shared book as a code key).
  • a practical way to explore the world of covert signals is to use a basic shortwave radio to scan for unusual broadcasts, then keep a personal log of frequencies, times, and patterns you notice, sharpening your observation and pattern-recognition skills.
  • you can experiment with sending disgui ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free

Create Summaries for anything on the web

Download the Shortform Chrome extension for your browser

Shortform Extension CTA