WEBVTT - Jamming the Signal

0:00:04.480 --> 0:00:12.399
<v Speaker 1>Welcome to tech Stuff, a production from iHeartRadio. Hey there,

0:00:12.440 --> 0:00:16.000
<v Speaker 1>and welcome to tech Stuff. I'm your host, Jonathan Strickland.

0:00:16.040 --> 0:00:19.159
<v Speaker 1>I'm an executive producer with iHeart Podcasts, and how the

0:00:19.239 --> 0:00:23.320
<v Speaker 1>tech are you? You know, there's this classic scene in

0:00:23.400 --> 0:00:27.640
<v Speaker 1>Mel Brooks's documentary film space Balls, in which a radar

0:00:27.760 --> 0:00:32.000
<v Speaker 1>operator aboard the bad Guy's spaceship announces that he has

0:00:32.080 --> 0:00:36.400
<v Speaker 1>lost the bleeps, the sweeps, and the creeps. Why because

0:00:36.440 --> 0:00:40.919
<v Speaker 1>the radar has been jammed Raspberry jam to be specific,

0:00:40.920 --> 0:00:43.520
<v Speaker 1>and there's only one man who would Dare give Darth

0:00:43.600 --> 0:00:46.800
<v Speaker 1>Helmet the Raspberry. But I'm ARII getting sidetracked. I thought

0:00:46.840 --> 0:00:50.239
<v Speaker 1>I would do a short episode about signal jamming and

0:00:50.280 --> 0:00:54.520
<v Speaker 1>signal intrusion and broadly how it works, maybe a few

0:00:54.560 --> 0:00:57.800
<v Speaker 1>interesting examples. So let's get the bare basics out of

0:00:57.840 --> 0:01:01.600
<v Speaker 1>the way, because it's actually really simple. Signal jamming occurs

0:01:01.600 --> 0:01:04.920
<v Speaker 1>when someone uses a transmitter to send out signals over

0:01:05.120 --> 0:01:09.680
<v Speaker 1>certain radio frequencies at a strength powerful enough to interfere

0:01:09.800 --> 0:01:13.560
<v Speaker 1>or overwhelm communications equipment in the area. We can use

0:01:13.600 --> 0:01:16.160
<v Speaker 1>an analogy here. It's kind of like trying to have

0:01:16.200 --> 0:01:20.240
<v Speaker 1>a conversation with someone in a really loud environment. Like

0:01:20.480 --> 0:01:23.080
<v Speaker 1>let's say it's a really loud party and you're just

0:01:23.120 --> 0:01:26.320
<v Speaker 1>trying to chat with somebody, and every time you or

0:01:26.360 --> 0:01:29.000
<v Speaker 1>your friend talks, the noise in the space just gets

0:01:29.120 --> 0:01:32.240
<v Speaker 1>louder and you can't hear one another. There's too much

0:01:32.480 --> 0:01:35.720
<v Speaker 1>noise not enough signal. That's essentially what's going on with

0:01:35.840 --> 0:01:41.160
<v Speaker 1>signal jamming, except we're talking about electromagnetic or specifically radio signals.

0:01:41.280 --> 0:01:45.600
<v Speaker 1>No raspberries are involved, sadly. Now, let's really get stuck

0:01:45.640 --> 0:01:49.400
<v Speaker 1>in by talking quickly about the origins of radio, simply

0:01:49.440 --> 0:01:51.400
<v Speaker 1>so that we can kind of have a working understanding

0:01:51.520 --> 0:01:53.920
<v Speaker 1>what's going on here. So the full story of the

0:01:54.000 --> 0:01:57.160
<v Speaker 1>history of radio is a really long, complicated one, with

0:01:57.200 --> 0:02:01.600
<v Speaker 1>lots of important scientists and engineers who made discoveries that

0:02:01.680 --> 0:02:05.200
<v Speaker 1>led up to our ability to make radio transmitters and

0:02:05.240 --> 0:02:07.800
<v Speaker 1>receivers and that kind of stuff. I'm not going to

0:02:07.880 --> 0:02:11.519
<v Speaker 1>do the full rundown. I've done it before in other episodes,

0:02:11.680 --> 0:02:14.760
<v Speaker 1>but here's just sort of like the highlights. So James

0:02:14.760 --> 0:02:18.400
<v Speaker 1>Clerk Maxwell's first stop in the mid nineteenth century. Like

0:02:18.440 --> 0:02:22.680
<v Speaker 1>the eighteen sixties, Maxwell proposed a hypothesis that later developed

0:02:22.680 --> 0:02:26.440
<v Speaker 1>into the theory of electromagnetism. He believed that with an

0:02:26.440 --> 0:02:30.920
<v Speaker 1>oscillating electric or magnetic field, one could generate electromagnetic waves

0:02:30.960 --> 0:02:34.480
<v Speaker 1>that are capable of traveling outward from the source through space.

0:02:34.880 --> 0:02:37.760
<v Speaker 1>You didn't need wires or any other kind of connection.

0:02:38.520 --> 0:02:42.160
<v Speaker 1>You could just beam this energy, which was a pretty

0:02:42.240 --> 0:02:44.359
<v Speaker 1>radical idea at the time, but it was a radical

0:02:44.400 --> 0:02:47.320
<v Speaker 1>idea that would turn out to be correct. So about

0:02:47.360 --> 0:02:53.520
<v Speaker 1>twenty years after Maxwell had published his mathematical equations explaining electromagnetism,

0:02:53.720 --> 0:02:56.800
<v Speaker 1>there was a German scientist named Heinrich Hertz, and he

0:02:56.880 --> 0:03:00.639
<v Speaker 1>created an interesting setup to test the idea of these

0:03:00.680 --> 0:03:04.520
<v Speaker 1>electromagnetic waves. Hertz created what ended up being a very

0:03:04.520 --> 0:03:09.519
<v Speaker 1>simple radio transmitter. So he had a pair of metal

0:03:09.560 --> 0:03:13.000
<v Speaker 1>plates that had these little metal balls extending from them,

0:03:13.200 --> 0:03:15.000
<v Speaker 1>and he put the two metal balls so that they

0:03:15.040 --> 0:03:17.680
<v Speaker 1>were close to each other, but not actually in contact

0:03:17.800 --> 0:03:20.359
<v Speaker 1>with each other, so there was a gap between the

0:03:20.400 --> 0:03:24.959
<v Speaker 1>two balls, and they connected to an oscillating power source,

0:03:25.000 --> 0:03:27.840
<v Speaker 1>so alternating current. In other words, the current would go

0:03:28.080 --> 0:03:31.240
<v Speaker 1>in one direction, then reverse and go the other direction,

0:03:31.480 --> 0:03:34.360
<v Speaker 1>and would do this many times per second. So the

0:03:34.400 --> 0:03:37.720
<v Speaker 1>power source meant since it was alternating, it meant that

0:03:37.760 --> 0:03:41.560
<v Speaker 1>the polarity of the two balls was alternating too, and

0:03:41.960 --> 0:03:44.520
<v Speaker 1>if you had a great enough difference in voltage between

0:03:44.560 --> 0:03:47.160
<v Speaker 1>these two balls, it would induce a spark to jump

0:03:47.200 --> 0:03:49.160
<v Speaker 1>from one ball to the other. It had to be

0:03:49.240 --> 0:03:52.119
<v Speaker 1>a great voltage to do that. If it's too low voltage,

0:03:52.280 --> 0:03:54.840
<v Speaker 1>then you get a charge build up, but it's not

0:03:55.040 --> 0:03:58.360
<v Speaker 1>enough for the charge to discharge. Right now, the fact

0:03:58.360 --> 0:04:01.040
<v Speaker 1>that it was an oscillating current that was going back

0:04:01.040 --> 0:04:04.520
<v Speaker 1>and forth and reversing this polarity, in the words of

0:04:04.520 --> 0:04:07.680
<v Speaker 1>star Trek, meant that the spark would actually oscillate too.

0:04:07.960 --> 0:04:09.960
<v Speaker 1>They would go like from left to right and then

0:04:10.040 --> 0:04:11.960
<v Speaker 1>right to left, and left right and right to left,

0:04:12.160 --> 0:04:15.640
<v Speaker 1>so it was zapping back and forth. Next, Hertz set

0:04:15.720 --> 0:04:19.080
<v Speaker 1>up a length of wire and at the end of

0:04:19.760 --> 0:04:22.040
<v Speaker 1>each end of this length of wire he put another

0:04:22.320 --> 0:04:25.480
<v Speaker 1>metal ball, and he bent the wire into a loop.

0:04:25.720 --> 0:04:28.240
<v Speaker 1>And the two metal balls were close to each other,

0:04:28.279 --> 0:04:30.599
<v Speaker 1>but still having a gap between them, but you know,

0:04:30.640 --> 0:04:33.040
<v Speaker 1>they were on either end of this loop. He put

0:04:33.040 --> 0:04:37.440
<v Speaker 1>this loop close to the oscillating power source where the

0:04:37.800 --> 0:04:41.520
<v Speaker 1>balls were sparking, so again not in contact, but close

0:04:41.560 --> 0:04:45.240
<v Speaker 1>to those first pair of balls, and this loop with

0:04:45.360 --> 0:04:47.520
<v Speaker 1>the second pair of balls Once it got close enough,

0:04:47.839 --> 0:04:51.760
<v Speaker 1>sparks started to go between those two balls too, so

0:04:52.320 --> 0:04:54.400
<v Speaker 1>the balls which were not in contact with the power

0:04:54.440 --> 0:04:59.080
<v Speaker 1>source were also sparking, and what Hurts had created was

0:04:59.200 --> 0:05:04.320
<v Speaker 1>a simple spark gap transmitter. Hertz's experiment was the first

0:05:04.440 --> 0:05:08.159
<v Speaker 1>radio transmission in history. Now, this kind of radio transmission

0:05:08.480 --> 0:05:12.520
<v Speaker 1>covers a broad span of radio frequencies, right, This isn't

0:05:12.520 --> 0:05:16.000
<v Speaker 1>something that was tuned to a particular band. It was

0:05:16.040 --> 0:05:19.600
<v Speaker 1>just kind of blasting out a raw signal of noise

0:05:19.720 --> 0:05:24.839
<v Speaker 1>across effectively the entire radio spectrum. Other folks like Marconi

0:05:25.080 --> 0:05:28.680
<v Speaker 1>and Tesla would make improvements in Hurtz's basic design and

0:05:28.720 --> 0:05:32.279
<v Speaker 1>allow for wireless signaling. But the early days of wireless

0:05:32.279 --> 0:05:36.640
<v Speaker 1>communications were really primitive. You were broadcasting a very simple

0:05:36.760 --> 0:05:39.760
<v Speaker 1>series of signals. Essentially, you were either blasting out noise

0:05:40.240 --> 0:05:43.120
<v Speaker 1>or you weren't blasting out noise. So you can blast

0:05:43.120 --> 0:05:46.280
<v Speaker 1>out noise in tight patterns, such as in Morse code,

0:05:46.520 --> 0:05:49.800
<v Speaker 1>and then you could send meaningful communications. But that was

0:05:49.839 --> 0:05:53.320
<v Speaker 1>about it. These broadcasts were also public, right, anyone who

0:05:53.400 --> 0:05:55.360
<v Speaker 1>had a radio receiver would be able to pick up

0:05:55.400 --> 0:05:58.800
<v Speaker 1>those transmissions. So wireless in the early days was not

0:05:58.880 --> 0:06:02.000
<v Speaker 1>suitable for any sort of communication of a sensitive nature,

0:06:02.120 --> 0:06:06.479
<v Speaker 1>because anyone with a radio receiver who was within transmission

0:06:06.600 --> 0:06:09.240
<v Speaker 1>range would be able to hear the message. One smarty

0:06:09.320 --> 0:06:12.720
<v Speaker 1>pants who worked on this problem was Sir Oliver Lodge.

0:06:12.800 --> 0:06:15.400
<v Speaker 1>Now I should probably do a full episode about him

0:06:15.400 --> 0:06:18.440
<v Speaker 1>at some point because he was a really quirky dude.

0:06:18.800 --> 0:06:21.240
<v Speaker 1>So on the one hand, he was pushing back the

0:06:21.240 --> 0:06:25.840
<v Speaker 1>boundaries of ignorance, right he was exploring radio and a

0:06:25.920 --> 0:06:28.880
<v Speaker 1>time when we were just starting to get a handle

0:06:28.920 --> 0:06:31.200
<v Speaker 1>on it. But on the other hand, he was also

0:06:31.279 --> 0:06:34.400
<v Speaker 1>a believer in the paranormal. He was a spiritualist. So

0:06:34.680 --> 0:06:38.159
<v Speaker 1>I think it's an interesting dichotomy there, right, Like you've

0:06:38.160 --> 0:06:42.839
<v Speaker 1>got a person who is fundamentally adding to our scientific

0:06:43.080 --> 0:06:47.440
<v Speaker 1>understanding of a new technology, and on the other hand

0:06:47.640 --> 0:06:51.080
<v Speaker 1>he believes in ghosts. Anyway, in the late eighteen hundreds,

0:06:51.200 --> 0:06:55.520
<v Speaker 1>Sir Oliver presented a paper on using special radio transmitters

0:06:55.520 --> 0:06:59.200
<v Speaker 1>and receivers that would be tuned to work in specific

0:06:59.279 --> 0:07:02.440
<v Speaker 1>bands of radio frequencies, so instead of blasting out a

0:07:02.480 --> 0:07:07.440
<v Speaker 1>signal across essentially all radio frequencies, these devices would only

0:07:07.480 --> 0:07:11.440
<v Speaker 1>work within this relatively narrow band. Now, Marconi had developed

0:07:11.480 --> 0:07:14.080
<v Speaker 1>a similar technology and the two of them got into

0:07:14.160 --> 0:07:17.240
<v Speaker 1>kind of a patent dispute over the matter, with Marconi

0:07:17.360 --> 0:07:21.680
<v Speaker 1>wanting to put his tuning technology to use, but it

0:07:21.800 --> 0:07:27.200
<v Speaker 1>was infringing essentially on Sir Oliver's patent. So ultimately they

0:07:27.200 --> 0:07:31.040
<v Speaker 1>were able to settle their dispute, and Marconi bought Sir

0:07:31.080 --> 0:07:34.480
<v Speaker 1>Oliver's patent and gave a good old alie and honorary

0:07:34.560 --> 0:07:36.800
<v Speaker 1>title with the Marconi Company, though as far as I know,

0:07:37.080 --> 0:07:40.440
<v Speaker 1>Oliver never actually did a day's work over at Marconi.

0:07:40.800 --> 0:07:43.920
<v Speaker 1>Tuning would mean you could send a radio signal across

0:07:43.960 --> 0:07:47.840
<v Speaker 1>a specific frequency, and radios tuned just to that frequency

0:07:47.840 --> 0:07:50.040
<v Speaker 1>would be able to pick it up. But this also

0:07:50.080 --> 0:07:53.960
<v Speaker 1>meant you could send signals across lots of different frequencies simultaneously,

0:07:54.080 --> 0:07:57.520
<v Speaker 1>and those transmissions wouldn't interfere with one another, because if

0:07:57.520 --> 0:08:00.160
<v Speaker 1>you had a radio that you could similarly tune, it

0:08:00.200 --> 0:08:03.200
<v Speaker 1>would pay attention to a specific set of frequencies and

0:08:03.280 --> 0:08:06.480
<v Speaker 1>ignore everything else. Right, So if I needed to receive

0:08:06.520 --> 0:08:09.800
<v Speaker 1>a message on one frequency band and you needed to

0:08:09.920 --> 0:08:12.480
<v Speaker 1>receive one in another frequency band, and we happen to

0:08:12.520 --> 0:08:14.679
<v Speaker 1>like live next to each other, we could each tune

0:08:14.680 --> 0:08:18.800
<v Speaker 1>our respective radios into our respective radio frequencies and receive

0:08:18.840 --> 0:08:22.480
<v Speaker 1>those messages without worrying about them getting mixed up. Now,

0:08:22.800 --> 0:08:26.720
<v Speaker 1>I'm going to skip over eight ton of radio history

0:08:26.720 --> 0:08:29.040
<v Speaker 1>at this point because we don't really need to have

0:08:29.080 --> 0:08:31.640
<v Speaker 1>a deep understanding of how radio signals work to get

0:08:31.720 --> 0:08:34.120
<v Speaker 1>to the jammy bits. And besides, like I said, I've

0:08:34.160 --> 0:08:36.800
<v Speaker 1>done several episodes about the history and evolution of radio

0:08:36.880 --> 0:08:39.880
<v Speaker 1>in the past, so no need to go over all

0:08:39.920 --> 0:08:44.800
<v Speaker 1>of that material. It's the same like people have traveled

0:08:44.840 --> 0:08:47.240
<v Speaker 1>back into the past and changed the history of radio,

0:08:47.360 --> 0:08:49.959
<v Speaker 1>so no need to go through it. If they did,

0:08:49.960 --> 0:08:52.520
<v Speaker 1>I'm sure that the Tesla fans would have made sure

0:08:52.600 --> 0:08:56.440
<v Speaker 1>Tesla got his due. Anyway. The radio tuning thing, along

0:08:56.520 --> 0:09:01.360
<v Speaker 1>with signal modulation like amplitude modulation and then frequency modulation,

0:09:01.640 --> 0:09:05.520
<v Speaker 1>these would become important components for transmitting broadcasts with sound,

0:09:05.679 --> 0:09:10.240
<v Speaker 1>as would be manipulating an oscillating signal. Right, a standard

0:09:10.280 --> 0:09:15.880
<v Speaker 1>consistent oscillating signal. Amplitude modulation you you, obviously you manipulate

0:09:15.920 --> 0:09:20.040
<v Speaker 1>the amplitude of that wave frequency. You modify the frequency

0:09:20.080 --> 0:09:23.200
<v Speaker 1>within certain parameters. You can't modify the frequency, you know,

0:09:24.000 --> 0:09:27.360
<v Speaker 1>all higlidy piglidy. You have to do it within the

0:09:27.400 --> 0:09:30.600
<v Speaker 1>bandwidth of that frequency band. But this meant you didn't

0:09:30.720 --> 0:09:33.280
<v Speaker 1>have to blast out as signal and just use Morse

0:09:33.360 --> 0:09:36.320
<v Speaker 1>code or something similar to get your point across. You

0:09:36.320 --> 0:09:38.800
<v Speaker 1>could actually speak or I don't know, you could. You

0:09:38.800 --> 0:09:42.440
<v Speaker 1>can blast out Abbas' greatest hits if you wanted to. Okay,

0:09:42.880 --> 0:09:45.520
<v Speaker 1>we're gonna come back in just a minute to talk

0:09:45.559 --> 0:09:48.880
<v Speaker 1>about jamming, but first let's jam out to these messages

0:09:49.080 --> 0:10:01.680
<v Speaker 1>from our sponsors. Okay, we a quick down and dirty

0:10:01.720 --> 0:10:04.280
<v Speaker 1>overview of how radio works. But what if someone else

0:10:04.360 --> 0:10:06.960
<v Speaker 1>wanted to send a signal on the same frequency that

0:10:07.080 --> 0:10:09.680
<v Speaker 1>you were already using. And maybe you're using it to

0:10:09.800 --> 0:10:12.560
<v Speaker 1>just listen to music, maybe you're using it to communicate,

0:10:12.640 --> 0:10:17.040
<v Speaker 1>maybe you're using it as an infrastructure for wireless communication

0:10:17.120 --> 0:10:20.360
<v Speaker 1>between lots of different devices in your home. Well, if

0:10:20.360 --> 0:10:24.320
<v Speaker 1>someone wanted to use that same frequency band, that same channel,

0:10:24.360 --> 0:10:26.839
<v Speaker 1>if you will, and they happen to be really close

0:10:26.880 --> 0:10:29.200
<v Speaker 1>to you, that could be a problem. It'd kind of

0:10:29.240 --> 0:10:31.720
<v Speaker 1>be like putting a bunch of people who are all

0:10:32.080 --> 0:10:35.320
<v Speaker 1>picking up telephones on old landline systems and talking. Or

0:10:35.360 --> 0:10:37.160
<v Speaker 1>we go back to an analogy where you're trying to

0:10:37.160 --> 0:10:39.959
<v Speaker 1>hold a one on one conversation with somebody, but you

0:10:40.320 --> 0:10:42.280
<v Speaker 1>happen to be sitting at a table with six other

0:10:42.320 --> 0:10:45.000
<v Speaker 1>people and there's lots of cross talk going on. It

0:10:45.000 --> 0:10:49.000
<v Speaker 1>gets confusing. With radio. It could mean that whatever signal

0:10:49.160 --> 0:10:52.640
<v Speaker 1>is strongest wins. You might have been in this experience

0:10:52.679 --> 0:10:55.360
<v Speaker 1>where let's say you're on a road trip and you've

0:10:55.400 --> 0:10:58.320
<v Speaker 1>tuned to a radio station and you're starting to get

0:10:58.360 --> 0:11:02.719
<v Speaker 1>to that point where the radio station signal is weakening

0:11:02.840 --> 0:11:05.920
<v Speaker 1>and it's not as consistent or strong as it has

0:11:06.040 --> 0:11:08.880
<v Speaker 1>been and you're starting to lose it. Meanwhile, you might

0:11:08.880 --> 0:11:12.840
<v Speaker 1>be coming into the range of a competing radio signal,

0:11:13.240 --> 0:11:17.439
<v Speaker 1>and so for a while, your car radio sounds like

0:11:17.480 --> 0:11:20.079
<v Speaker 1>it's tuning to two different stations at the same time. Right,

0:11:20.120 --> 0:11:22.880
<v Speaker 1>you might hear little bits of one song versus chatter

0:11:22.960 --> 0:11:25.880
<v Speaker 1>on another station or whatever it may be, until eventually

0:11:26.280 --> 0:11:29.559
<v Speaker 1>it turns over to the other, the secondary radio station,

0:11:29.880 --> 0:11:33.440
<v Speaker 1>because that's the signal that is strongest and is speeding

0:11:33.480 --> 0:11:37.640
<v Speaker 1>through to your entertainment system. Well, if you're you know

0:11:37.720 --> 0:11:40.640
<v Speaker 1>that's unintentional. That's just two different radio stations that are

0:11:40.679 --> 0:11:44.119
<v Speaker 1>in the same broadcast range, that are on the same frequency.

0:11:44.480 --> 0:11:46.560
<v Speaker 1>But you could also do this on purpose, right, You

0:11:46.559 --> 0:11:50.600
<v Speaker 1>could blast out a radio signal, and you can use

0:11:50.640 --> 0:11:53.320
<v Speaker 1>one that is already in use for something else and

0:11:53.360 --> 0:11:56.640
<v Speaker 1>try to overwhelm it, and the devices in that area

0:11:56.679 --> 0:11:58.560
<v Speaker 1>that pick up radio are going to listen to whichever

0:11:58.600 --> 0:12:02.240
<v Speaker 1>signal is strongest. Countries around the world have over time

0:12:02.360 --> 0:12:05.800
<v Speaker 1>designated bands of frequencies in the radio spectrum for very

0:12:05.800 --> 0:12:08.840
<v Speaker 1>specific purposes, and you're not supposed to use them for

0:12:09.000 --> 0:12:13.160
<v Speaker 1>anything else. So this is intended to avoid interference as

0:12:13.200 --> 0:12:16.160
<v Speaker 1>well as clogging up the airwaves with competing signals. So,

0:12:16.360 --> 0:12:20.040
<v Speaker 1>for example, here in the United States, AM radio frequencies

0:12:20.080 --> 0:12:23.960
<v Speaker 1>amplitude modulated radio frequencies. They range from five hundred thirty

0:12:24.040 --> 0:12:27.480
<v Speaker 1>killer hurts, which is actually reserved for travelers information stations.

0:12:27.520 --> 0:12:30.199
<v Speaker 1>I don't think any AM radio stations are allowed to

0:12:30.720 --> 0:12:34.120
<v Speaker 1>broadcast at five thirty, but it goes up to seventeen

0:12:34.320 --> 0:12:37.640
<v Speaker 1>hundred killer hurts. So five thirty to seventeen hundred that's

0:12:37.679 --> 0:12:42.320
<v Speaker 1>the AM broadcast range. Each station has a bandwidth of

0:12:42.480 --> 0:12:45.480
<v Speaker 1>ten killer herts, so it's ten killer hurts wide, and

0:12:45.520 --> 0:12:48.839
<v Speaker 1>that goes five killer hurts above the signal and five

0:12:48.920 --> 0:12:51.520
<v Speaker 1>killer hurts below the signal. So technically you could say

0:12:51.559 --> 0:12:54.400
<v Speaker 1>five hundred and thirty that's really around five twenty five

0:12:54.480 --> 0:12:56.959
<v Speaker 1>killer hurts up to five thirty five killer hurts if

0:12:56.960 --> 0:13:00.000
<v Speaker 1>you were talking about you know the basic rules here. Meanwhile,

0:13:00.240 --> 0:13:03.040
<v Speaker 1>FM stations here in the United States range from eighty

0:13:03.040 --> 0:13:06.920
<v Speaker 1>eight point zero megahertz to one hundred and eight megahertz.

0:13:07.040 --> 0:13:10.760
<v Speaker 1>These channels have two hundred killohertz of bandwidth. Other nations

0:13:10.760 --> 0:13:13.960
<v Speaker 1>have slightly different parameters. You know, it's not universal. And

0:13:14.480 --> 0:13:17.560
<v Speaker 1>these radio signals are used for all sorts of things

0:13:17.600 --> 0:13:21.960
<v Speaker 1>besides just radio broadcasts. Right. Some are used for navigational purposes,

0:13:22.120 --> 0:13:26.520
<v Speaker 1>some are for mobile communications, some are for fixed communications,

0:13:26.559 --> 0:13:30.240
<v Speaker 1>some are for television broadcasts, some are for amateur radio,

0:13:30.480 --> 0:13:33.040
<v Speaker 1>et cetera. And it took a lot of time to

0:13:33.080 --> 0:13:36.520
<v Speaker 1>sort out which frequencies would be used for specific types

0:13:36.559 --> 0:13:40.240
<v Speaker 1>of communications and thus would be off limits to anything else.

0:13:40.520 --> 0:13:43.920
<v Speaker 1>And as I said, different countries have slightly different standards

0:13:43.920 --> 0:13:46.440
<v Speaker 1>for the sort of thing. But back to jamming. So,

0:13:46.640 --> 0:13:49.959
<v Speaker 1>during World War One, radio was still a very young

0:13:50.080 --> 0:13:53.439
<v Speaker 1>science and as such, while it served a purpose during

0:13:53.480 --> 0:13:57.160
<v Speaker 1>the war, it was limited as far as its utility

0:13:57.280 --> 0:14:01.080
<v Speaker 1>was concerned. Transmissions were typically very short range and nature,

0:14:01.160 --> 0:14:04.000
<v Speaker 1>and they could be affected by atmospheric conditions, like if

0:14:04.000 --> 0:14:06.480
<v Speaker 1>you had a storm or something that could really affect

0:14:06.720 --> 0:14:09.200
<v Speaker 1>whether or not you could pick anything up, Like just

0:14:09.240 --> 0:14:13.559
<v Speaker 1>the things like lightning would really mess up your radio communications.

0:14:13.760 --> 0:14:17.439
<v Speaker 1>According to the Digital Public Library of America, and aircraft

0:14:17.559 --> 0:14:21.000
<v Speaker 1>outfitted with a radio during World War One typically had

0:14:21.000 --> 0:14:25.320
<v Speaker 1>a maximum transmission range of two thousand yards, so that's

0:14:25.840 --> 0:14:29.600
<v Speaker 1>not much further than a single mile, and you can

0:14:29.680 --> 0:14:33.320
<v Speaker 1>imagine that in most wartime situations the radio would not

0:14:33.400 --> 0:14:36.280
<v Speaker 1>be instrumental to the success or failure of emission just

0:14:36.280 --> 0:14:40.120
<v Speaker 1>because of that limited transmission distance. Right, you wouldn't be

0:14:40.360 --> 0:14:44.480
<v Speaker 1>in contact with anyone for very long unless you were

0:14:44.520 --> 0:14:48.280
<v Speaker 1>just flying very tight circles in a very small region.

0:14:48.720 --> 0:14:52.520
<v Speaker 1>But by World War Two things had evolved considerably. Radio

0:14:52.640 --> 0:14:57.520
<v Speaker 1>technology was much more sophisticated than capable, and radio transmissions

0:14:57.520 --> 0:15:01.080
<v Speaker 1>would become integral to the war effort on both sides

0:15:01.120 --> 0:15:05.520
<v Speaker 1>of the conflict, and as such, interfering with radio transmissions

0:15:05.680 --> 0:15:10.960
<v Speaker 1>would become part of warfare. Interrupting enemy communication channels obviously

0:15:11.200 --> 0:15:16.120
<v Speaker 1>a high priority whenever you're talking about wartime conflicts. On

0:15:16.200 --> 0:15:19.080
<v Speaker 1>the ally side, there were outfits like the thirty sixth

0:15:19.200 --> 0:15:22.520
<v Speaker 1>Bombardment Squadron the thirty six BS. It was part of

0:15:22.520 --> 0:15:26.400
<v Speaker 1>the Mighty eighth Air Force, and the thirty six BS

0:15:26.440 --> 0:15:29.800
<v Speaker 1>would fly missions over enemy territory and attempt to jam

0:15:30.120 --> 0:15:35.280
<v Speaker 1>or spoof radio axis communications, and sometimes that also meant

0:15:35.360 --> 0:15:39.600
<v Speaker 1>jamming radar stations, just as our little silly example at

0:15:39.640 --> 0:15:42.200
<v Speaker 1>the top of this episode was. Now in this case

0:15:42.240 --> 0:15:46.600
<v Speaker 1>it didn't involve dropping raspberry jam on anybody. They would

0:15:46.640 --> 0:15:49.240
<v Speaker 1>release what was called well, they were called windows, but

0:15:49.440 --> 0:15:52.480
<v Speaker 1>you might know it better as chaff. These are thin

0:15:52.520 --> 0:15:55.560
<v Speaker 1>strips of metal, and it's a way to fool radar

0:15:55.600 --> 0:15:59.080
<v Speaker 1>stations that are on the ground that there are enemy

0:15:59.120 --> 0:16:02.280
<v Speaker 1>fighters overhead, right, because the strips of metal will actually

0:16:02.320 --> 0:16:05.560
<v Speaker 1>interact with the radio waves the radar is sending out,

0:16:05.800 --> 0:16:09.280
<v Speaker 1>and the radar will mistakenly believe that there are enemy

0:16:09.320 --> 0:16:13.480
<v Speaker 1>fighters overhead, when in fact it's just this chaff that's

0:16:13.560 --> 0:16:17.560
<v Speaker 1>falling from bombers that are dropping it. And this becomes

0:16:17.560 --> 0:16:21.400
<v Speaker 1>a distraction for radar stations. And if you're doing this

0:16:21.520 --> 0:16:24.480
<v Speaker 1>as part of an effort of an actual attack, it

0:16:24.520 --> 0:16:26.560
<v Speaker 1>can mean that eyes are on the wrong part of

0:16:26.600 --> 0:16:29.640
<v Speaker 1>the sky, or that anti aircraft weaponry are trained on

0:16:29.680 --> 0:16:31.240
<v Speaker 1>the wrong part of the sky, which is the most

0:16:31.240 --> 0:16:33.760
<v Speaker 1>important bit right, and then you can carry out your

0:16:33.800 --> 0:16:38.360
<v Speaker 1>attack with less resistance from the enemy. But with radio

0:16:38.480 --> 0:16:42.240
<v Speaker 1>often the strategy was to use powerful transmitters to commandeer

0:16:42.360 --> 0:16:47.880
<v Speaker 1>enemy communications and send incorrect information. So this was a

0:16:48.000 --> 0:16:52.120
<v Speaker 1>spoofing attack. You may be familiar with that term spoofing.

0:16:52.240 --> 0:16:55.760
<v Speaker 1>It means that the attacker is pretending to be someone

0:16:55.880 --> 0:17:00.360
<v Speaker 1>or something else and is trying to trick you into

0:17:00.400 --> 0:17:04.879
<v Speaker 1>thinking that a communication is from this particular source, but

0:17:04.960 --> 0:17:08.679
<v Speaker 1>in fact it's a hacker or attacker posing as that source.

0:17:08.800 --> 0:17:12.800
<v Speaker 1>So in this case, the attackers would pose as the

0:17:12.960 --> 0:17:18.040
<v Speaker 1>enemy and would give bad intel or false orders in

0:17:18.080 --> 0:17:21.200
<v Speaker 1>an effort to gain an advantage. So the Royal Air

0:17:21.240 --> 0:17:24.480
<v Speaker 1>Force of the UK had a project called Operation Corona

0:17:24.760 --> 0:17:28.359
<v Speaker 1>that was dedicated to this effort. The RAF found native

0:17:28.400 --> 0:17:33.760
<v Speaker 1>German speakers to pose as flight controllers to confound German pilots. Eventually,

0:17:34.080 --> 0:17:38.239
<v Speaker 1>the German Luftwaffe caught onto this and their response was

0:17:38.440 --> 0:17:42.320
<v Speaker 1>to replace all their flight controllers with women, so that

0:17:42.680 --> 0:17:46.399
<v Speaker 1>if a pilot heard a male voice speaking in German

0:17:46.520 --> 0:17:50.560
<v Speaker 1>giving them new orders, they would know, oh, that's one

0:17:50.600 --> 0:17:55.240
<v Speaker 1>of the allies posing as a flight controller. Disregard those orders.

0:17:55.520 --> 0:17:59.320
<v Speaker 1>Of course, the UK they figured this out too, and

0:17:59.359 --> 0:18:03.879
<v Speaker 1>they began to employ women to serve as these spoofed

0:18:04.080 --> 0:18:07.080
<v Speaker 1>German flight controllers. So it went back and forth in

0:18:07.160 --> 0:18:11.240
<v Speaker 1>an old seesaw. Now, obviously, signal jamming in warfare has

0:18:11.320 --> 0:18:15.359
<v Speaker 1>continued since World War Two. Russia has been doing it

0:18:15.440 --> 0:18:20.159
<v Speaker 1>like crazy to Ukraine, for example. Some methods allow the

0:18:20.920 --> 0:18:25.960
<v Speaker 1>one attacker to suppress radio communications by effectively broadcasting silence.

0:18:26.400 --> 0:18:28.520
<v Speaker 1>You know, in the old days, it was that you

0:18:28.560 --> 0:18:31.600
<v Speaker 1>were using it to intrude upon their signal and send

0:18:31.680 --> 0:18:37.560
<v Speaker 1>something else. Now you can actually just suppress the communications entirely,

0:18:37.680 --> 0:18:40.800
<v Speaker 1>not just you know, intruding on the signal. If your

0:18:41.280 --> 0:18:44.320
<v Speaker 1>targets are unaware that they're being jammed, they might not

0:18:44.400 --> 0:18:47.560
<v Speaker 1>even realize for a bit that no communications are going

0:18:47.600 --> 0:18:50.320
<v Speaker 1>through like other people might be desperately trying to get

0:18:50.359 --> 0:18:52.800
<v Speaker 1>in touch with them, but none of the signals reached

0:18:52.880 --> 0:18:56.359
<v Speaker 1>their destination. And that could be really handy if you

0:18:56.400 --> 0:18:59.640
<v Speaker 1>know you are an enemy of this target and your

0:18:59.680 --> 0:19:03.320
<v Speaker 1>plan an assault of some sort. But outside of warfare,

0:19:03.640 --> 0:19:07.280
<v Speaker 1>there are other uses for signal jamming and signal intrusion,

0:19:07.800 --> 0:19:11.679
<v Speaker 1>though we are largely talking about the murky world of

0:19:11.880 --> 0:19:16.720
<v Speaker 1>illegal activity. In most cases. Keep in mind, the use

0:19:16.760 --> 0:19:21.359
<v Speaker 1>of specific frequencies is a highly regulated affair in most countries,

0:19:21.600 --> 0:19:26.200
<v Speaker 1>and folks founded to have intruded upon those uses typically

0:19:26.240 --> 0:19:30.680
<v Speaker 1>face some stiff penalties when they're caught. We'll talk more

0:19:30.880 --> 0:19:35.359
<v Speaker 1>about these nefarious uses of signal jamming and some famous

0:19:35.440 --> 0:19:39.639
<v Speaker 1>examples after we take this quick break to thank our sponsors.

0:19:48.960 --> 0:19:53.280
<v Speaker 1>We're back, all right. Let's say that you are an

0:19:53.440 --> 0:19:58.199
<v Speaker 1>enterprising young person, maybe Christian Slater, and you want to

0:19:58.200 --> 0:20:01.720
<v Speaker 1>build your own pirate race station so that you can

0:20:01.840 --> 0:20:06.760
<v Speaker 1>broadcast without first securing a broadcast license. So you could

0:20:06.800 --> 0:20:09.400
<v Speaker 1>get in real hot water because you don't actually have

0:20:09.600 --> 0:20:13.080
<v Speaker 1>permission to use the radio frequencies, even if the frequency

0:20:13.119 --> 0:20:17.439
<v Speaker 1>is unused in your area, right like, no one is

0:20:17.520 --> 0:20:20.760
<v Speaker 1>broadcasting on this particular frequency. If you don't have a

0:20:20.800 --> 0:20:24.480
<v Speaker 1>license to broadcast in that range, assuming you're not like

0:20:24.560 --> 0:20:28.440
<v Speaker 1>just broadcasting across amateur radio, well you're going to get

0:20:28.600 --> 0:20:31.240
<v Speaker 1>some trouble. Although a lot of people have gone ahead

0:20:31.240 --> 0:20:33.960
<v Speaker 1>and done it anyway, because I mean tracking down who's

0:20:34.000 --> 0:20:36.280
<v Speaker 1>doing it, that's a different matter. It actually is pretty

0:20:36.320 --> 0:20:40.399
<v Speaker 1>tricky to zone in on the specific location of where

0:20:40.440 --> 0:20:43.280
<v Speaker 1>someone is doing this. If you're transmitting over a really

0:20:43.400 --> 0:20:46.240
<v Speaker 1>large area, it narrows things down because you do have

0:20:46.280 --> 0:20:50.359
<v Speaker 1>to have an antenna to push a transmission out. So

0:20:50.640 --> 0:20:54.159
<v Speaker 1>if you're doing so with a high power transmitter, chances

0:20:54.200 --> 0:20:56.880
<v Speaker 1>are people by'd say, oh, maybe it's the house that

0:20:56.920 --> 0:21:00.639
<v Speaker 1>has the fifty foot broadcast tower behind it. But assuming

0:21:00.680 --> 0:21:04.680
<v Speaker 1>you're not doing a massive area, it could be a

0:21:04.760 --> 0:21:08.399
<v Speaker 1>lot trickier to track the location down. Now a lot

0:21:08.480 --> 0:21:11.320
<v Speaker 1>of this ends up being kind of moot anyway, because

0:21:11.359 --> 0:21:14.960
<v Speaker 1>the Internet and streaming platforms have really made pirate radio

0:21:15.160 --> 0:21:20.160
<v Speaker 1>kind of a quaint and arguably obsolete form of punkish disobedience.

0:21:20.440 --> 0:21:23.200
<v Speaker 1>You still might have to deal with consequences if you're

0:21:23.280 --> 0:21:27.080
<v Speaker 1>choosing to stream and you're including a lot of licensed

0:21:27.119 --> 0:21:31.760
<v Speaker 1>material that you don't you know, actually license, But that's different, right,

0:21:31.960 --> 0:21:35.280
<v Speaker 1>you might get banned from the streaming platform because you

0:21:35.880 --> 0:21:41.680
<v Speaker 1>know you're violating policies by playing ip covered music without

0:21:41.720 --> 0:21:43.800
<v Speaker 1>actually having the license to do so. So I guess

0:21:43.840 --> 0:21:46.320
<v Speaker 1>I'll have to wait on launching my internet radio station

0:21:46.440 --> 0:21:49.280
<v Speaker 1>dedicated to glam punk and new wave hits. But you

0:21:49.359 --> 0:21:52.720
<v Speaker 1>know my time will come now. Some folks have used

0:21:52.720 --> 0:21:57.879
<v Speaker 1>transmitters to overwhelm the airwaves and transmit absolute nonsense and mischief.

0:21:58.119 --> 0:22:01.200
<v Speaker 1>Sometimes they actually do so in an effort to push

0:22:01.200 --> 0:22:05.480
<v Speaker 1>out a public message that in itself isn't necessarily nonsense,

0:22:05.840 --> 0:22:08.879
<v Speaker 1>but the framing of it tends to be a little weird. So,

0:22:08.960 --> 0:22:13.240
<v Speaker 1>for example, in nineteen fifty nine, on April first, one

0:22:13.480 --> 0:22:19.320
<v Speaker 1>or more jokesters used broadcast intrusion. They overpowered the audio

0:22:19.480 --> 0:22:22.199
<v Speaker 1>part of a television signal that was coming from the

0:22:22.240 --> 0:22:27.439
<v Speaker 1>TV station KATV in Arkansas, and if you were tuned

0:22:27.480 --> 0:22:31.840
<v Speaker 1>in to watch the news on KATV on this day,

0:22:31.880 --> 0:22:35.359
<v Speaker 1>April first, nineteen fifty nine, audio would suddenly drop out

0:22:35.560 --> 0:22:37.919
<v Speaker 1>and then you would hear a voice claiming to belong

0:22:38.000 --> 0:22:41.240
<v Speaker 1>to Powell Clayton. Powell Clayton was a general for the

0:22:41.359 --> 0:22:43.880
<v Speaker 1>Union during the US Civil War. He was very much

0:22:44.000 --> 0:22:46.919
<v Speaker 1>dead by nineteen fifty nine. He had also served as

0:22:46.960 --> 0:22:49.680
<v Speaker 1>the governor of Arkansas at one point, and this voice

0:22:49.760 --> 0:22:54.439
<v Speaker 1>was telling KATV viewers that they needed to quote share

0:22:54.640 --> 0:22:58.400
<v Speaker 1>in the Great Awakening end quote. So by that, presumably

0:22:58.520 --> 0:23:02.120
<v Speaker 1>the late general meant that Arkansas citizens were to embrace

0:23:02.320 --> 0:23:05.679
<v Speaker 1>racial integration in the state, which is a serious and

0:23:05.840 --> 0:23:11.240
<v Speaker 1>applaudable message, right integration, Great, that's a great message. It is. However,

0:23:11.280 --> 0:23:15.680
<v Speaker 1>a questionable means of delivering that message. So an investigation followed.

0:23:15.880 --> 0:23:18.520
<v Speaker 1>But while the assumption was whomever pulled off the stunt

0:23:18.560 --> 0:23:21.840
<v Speaker 1>had a good working knowledge of radio, no one was

0:23:21.880 --> 0:23:25.480
<v Speaker 1>actually identified like it was assumed, Okay, this person knows

0:23:25.520 --> 0:23:28.760
<v Speaker 1>their way around radio transmissions or else they wouldn't have

0:23:28.800 --> 0:23:32.760
<v Speaker 1>been able to pull this off. So that eliminates a

0:23:32.880 --> 0:23:36.160
<v Speaker 1>huge number of the folks in the region, right, it's

0:23:36.200 --> 0:23:39.480
<v Speaker 1>just the people who know radio. But it's entirely possible

0:23:39.520 --> 0:23:41.600
<v Speaker 1>it was like a college student who maybe had some

0:23:41.720 --> 0:23:44.760
<v Speaker 1>experience working at the college radio station. There were plenty

0:23:44.880 --> 0:23:47.840
<v Speaker 1>of those in Arkansas in nineteen fifty nine. So while

0:23:47.880 --> 0:23:50.640
<v Speaker 1>it narrowed it down, it didn't eliminate like nearly all

0:23:50.640 --> 0:23:53.280
<v Speaker 1>the suspects. There's still plenty of people it could have been.

0:23:53.640 --> 0:23:55.480
<v Speaker 1>And maybe it wasn't a college student at all, or

0:23:55.480 --> 0:23:58.760
<v Speaker 1>maybe it was someone who had learned in college but

0:23:58.920 --> 0:24:02.679
<v Speaker 1>had long since grad We'll likely never know. But that

0:24:02.720 --> 0:24:06.800
<v Speaker 1>didn't stop some people from proposing outlandish theories about who

0:24:06.880 --> 0:24:09.840
<v Speaker 1>was behind this, and they ranged from everything from a

0:24:09.960 --> 0:24:13.200
<v Speaker 1>communist takeover, because keep in mind, nineteen fifty nine, that's

0:24:13.280 --> 0:24:17.240
<v Speaker 1>like height of the Cold War. To quote an inevitable

0:24:17.480 --> 0:24:21.840
<v Speaker 1>Yankee reinvasion of America. End quote. Now this was a

0:24:21.920 --> 0:24:25.399
<v Speaker 1>quote from a member of the Sons of Confederate Veterans,

0:24:25.840 --> 0:24:28.760
<v Speaker 1>so you can imagine this person had a particular point

0:24:28.760 --> 0:24:32.119
<v Speaker 1>of view. But I'm not sure if anyone ever told

0:24:32.160 --> 0:24:36.479
<v Speaker 1>this person that the Union won the Civil War, so

0:24:37.080 --> 0:24:41.600
<v Speaker 1>there was no need for Yankees to reinvade anything, because

0:24:41.960 --> 0:24:45.320
<v Speaker 1>it's not an invasion. The Arkansas was part of the

0:24:45.480 --> 0:24:49.119
<v Speaker 1>Union and remained part of the Union. So yeah, it

0:24:49.160 --> 0:24:53.199
<v Speaker 1>was a pretty ludicrous act to send a message in

0:24:53.240 --> 0:24:56.240
<v Speaker 1>this way, but it really just revealed more lunacy in

0:24:56.240 --> 0:24:59.479
<v Speaker 1>the state of Arkansas. In nineteen seventy seven, on November

0:24:59.520 --> 0:25:03.000
<v Speaker 1>twenty six, someone in the UK was able to take

0:25:03.040 --> 0:25:07.679
<v Speaker 1>over a broadcast signal from Southern Television. They did so

0:25:08.000 --> 0:25:11.679
<v Speaker 1>in order to send an audio only message. So again,

0:25:11.960 --> 0:25:16.000
<v Speaker 1>the audio of the television broadcast drops out and this

0:25:16.160 --> 0:25:19.560
<v Speaker 1>audio goes in its place, and the audio was a

0:25:19.560 --> 0:25:24.960
<v Speaker 1>person who claimed to be an alien named vrillin Vlo

0:25:25.240 --> 0:25:28.199
<v Speaker 1>n I am told and that this alien wished to

0:25:28.320 --> 0:25:30.720
<v Speaker 1>warn earthlings that they really needed to shape up or

0:25:30.760 --> 0:25:33.320
<v Speaker 1>get the heck out of Dodge. And in this case,

0:25:33.359 --> 0:25:36.040
<v Speaker 1>by Dodge, I mean the galaxy. I am sad to

0:25:36.119 --> 0:25:40.000
<v Speaker 1>report that, despite it being nearly fifty years later, we

0:25:40.119 --> 0:25:43.159
<v Speaker 1>humans still don't have our act together. So I expect

0:25:43.240 --> 0:25:45.480
<v Speaker 1>Villain will be back any day now to chide us

0:25:45.560 --> 0:25:48.520
<v Speaker 1>for falling short. Or you know, it was just some

0:25:48.840 --> 0:25:51.879
<v Speaker 1>random person having a laugh by hijacking a TV signal

0:25:52.040 --> 0:25:57.680
<v Speaker 1>by pushing out a competing broadcast signal of greater strength. Now,

0:25:57.720 --> 0:26:01.479
<v Speaker 1>perhaps the most famous broadcast intrusion event, at least here

0:26:01.520 --> 0:26:04.800
<v Speaker 1>in the United States, happened on November twenty second, nineteen

0:26:04.840 --> 0:26:10.119
<v Speaker 1>eighty seven. That was the infamous Max Headroom incident, in

0:26:10.160 --> 0:26:14.600
<v Speaker 1>which a person wearing a Max Headroom mask interrupted television

0:26:14.640 --> 0:26:18.840
<v Speaker 1>broadcasts on two separate TV stations in Chicago, Illinois. So,

0:26:18.960 --> 0:26:21.000
<v Speaker 1>for those of y'all who don't have any idea who

0:26:21.040 --> 0:26:24.320
<v Speaker 1>Max Headroom is, he's a fictional character. He was originally

0:26:24.320 --> 0:26:27.760
<v Speaker 1>created to serve as a television host for a program

0:26:27.760 --> 0:26:30.760
<v Speaker 1>that would show music videos on British TV, and he

0:26:30.880 --> 0:26:34.720
<v Speaker 1>was presented as being a computer generated AI character like

0:26:34.760 --> 0:26:38.119
<v Speaker 1>he was supposed to be like a computer animated figure

0:26:38.160 --> 0:26:41.520
<v Speaker 1>and AI controlled. Now, in fact, an actual human being

0:26:41.640 --> 0:26:44.920
<v Speaker 1>was portraying Max Headroom. That human being being Matt Frewer,

0:26:45.119 --> 0:26:47.480
<v Speaker 1>who did a great job. By the way, I love

0:26:47.960 --> 0:26:52.680
<v Speaker 1>old Max Headroom videos. They are weird, like really strange.

0:26:52.760 --> 0:26:55.000
<v Speaker 1>I would like to think that Space Ghost Coast to

0:26:55.080 --> 0:26:59.760
<v Speaker 1>Coast copied a lot from the Max Headroom days. Anyway,

0:27:00.240 --> 0:27:03.280
<v Speaker 1>Max Headroom would go on to become an advertising spokesman,

0:27:03.480 --> 0:27:06.959
<v Speaker 1>a talk show host, and a TV show character like

0:27:07.720 --> 0:27:12.160
<v Speaker 1>in his own sci fi television series. A very unlikely

0:27:12.200 --> 0:27:15.680
<v Speaker 1>thing to have happened, but it did happen. So this

0:27:15.840 --> 0:27:20.080
<v Speaker 1>signal hijacker was wearing a Max Headroom mask and the

0:27:20.080 --> 0:27:26.000
<v Speaker 1>first thing that he did was he interrupted Chicago's WGN

0:27:26.240 --> 0:27:29.440
<v Speaker 1>TV signal. This was like at nine o'clock or so,

0:27:29.640 --> 0:27:32.840
<v Speaker 1>and this incident lasted less than half a minute, so

0:27:33.359 --> 0:27:36.720
<v Speaker 1>not long enough for things to really get crazy, but

0:27:36.800 --> 0:27:39.240
<v Speaker 1>it was very odd and I'm sure unsettling for people

0:27:39.280 --> 0:27:42.680
<v Speaker 1>who are watching television at nine o'clock. And a couple

0:27:42.720 --> 0:27:46.440
<v Speaker 1>of hours later that night, the same person interrupted a

0:27:46.640 --> 0:27:51.399
<v Speaker 1>signal from WTTW, which is a PBS affiliate station in

0:27:51.440 --> 0:27:53.720
<v Speaker 1>the Chicago area, or at least was at the time,

0:27:54.080 --> 0:27:58.520
<v Speaker 1>and this interruption included the man in the Max Headroom

0:27:58.600 --> 0:28:02.080
<v Speaker 1>mask speaking the so it's was very hard to make

0:28:02.080 --> 0:28:03.760
<v Speaker 1>out what he was actually saying. There was a lot

0:28:03.800 --> 0:28:06.480
<v Speaker 1>of distortion in the audio, and plus the mask made

0:28:06.520 --> 0:28:09.199
<v Speaker 1>it difficult to hear. But there was also a second person,

0:28:09.240 --> 0:28:12.320
<v Speaker 1>a female presenting person dressed in a French made outfit,

0:28:12.560 --> 0:28:17.080
<v Speaker 1>who was spanking the Max Hedgerroom masked dude with a

0:28:17.119 --> 0:28:20.800
<v Speaker 1>fly swatter to really really high brow stuff. The weird

0:28:20.840 --> 0:28:24.840
<v Speaker 1>signal intrusion which lasted, you know, just just a relatively

0:28:24.880 --> 0:28:28.119
<v Speaker 1>short amount of time. It made national headlines. It was

0:28:28.240 --> 0:28:30.200
<v Speaker 1>got a lot of media coverage because it was such

0:28:30.240 --> 0:28:33.639
<v Speaker 1>a weird thing to have happened. But to this day

0:28:33.920 --> 0:28:37.520
<v Speaker 1>it's unknown who actually pulled it off. Well unknown to

0:28:37.560 --> 0:28:40.840
<v Speaker 1>most of us, anyway. Some folks surely know about it

0:28:40.880 --> 0:28:43.800
<v Speaker 1>because they did it. But once upon a time, Chuck

0:28:43.880 --> 0:28:46.960
<v Speaker 1>Bryant of stuff you should know, joined to be on

0:28:47.080 --> 0:28:50.040
<v Speaker 1>tech Stuff to talk about this specific incident. You can

0:28:50.040 --> 0:28:52.640
<v Speaker 1>actually find that episode in the tech Stuff archives. It

0:28:52.680 --> 0:28:57.800
<v Speaker 1>originally published on November third, twenty fourteen, ten years ago.

0:28:58.040 --> 0:29:00.920
<v Speaker 1>Holy cow, I've been doing this a long time now.

0:29:00.920 --> 0:29:04.200
<v Speaker 1>Those are not the only incidents of signal intrusion, of course.

0:29:04.240 --> 0:29:07.600
<v Speaker 1>There are others, including cases in which the identity of

0:29:07.640 --> 0:29:10.760
<v Speaker 1>the person responsible is ultimately discovered and that person was

0:29:10.840 --> 0:29:14.920
<v Speaker 1>later punished. But apart from mischief, there are other reasons

0:29:14.960 --> 0:29:19.160
<v Speaker 1>why some folks are interested in signal jamming, like using

0:29:19.200 --> 0:29:22.720
<v Speaker 1>signal jamming as part of an effort to rob someone blind.

0:29:23.240 --> 0:29:26.280
<v Speaker 1>So obviously a lot of homes these days are protected

0:29:26.320 --> 0:29:31.959
<v Speaker 1>by systems that rely on local network connections, often wireless connections.

0:29:32.320 --> 0:29:36.400
<v Speaker 1>So let's say that you're a burglar. You a dirty, dirty,

0:29:36.760 --> 0:29:40.440
<v Speaker 1>dirty person. So you're casing a joint and you notice

0:29:40.480 --> 0:29:44.520
<v Speaker 1>that this particular target has security cameras, and obviously you

0:29:44.520 --> 0:29:47.000
<v Speaker 1>don't want your mug showing up on the five o'clock news,

0:29:47.320 --> 0:29:51.120
<v Speaker 1>not when you got I don't know, see TV and

0:29:51.240 --> 0:29:53.720
<v Speaker 1>maybe some funko pops to sell. I might just be

0:29:53.800 --> 0:29:56.000
<v Speaker 1>looking around the stuff that I have in my house.

0:29:56.400 --> 0:29:59.440
<v Speaker 1>I do not own expensive stuff. I just want that

0:29:59.480 --> 0:30:01.640
<v Speaker 1>to get out there to any potential thieves. The stuff

0:30:01.680 --> 0:30:07.400
<v Speaker 1>I own is largely junk and only has sentimental value. Anyway,

0:30:07.440 --> 0:30:10.400
<v Speaker 1>this is not just a hypothetical problem of thieves using

0:30:10.480 --> 0:30:14.200
<v Speaker 1>signal jammers in order to rob a house and to

0:30:14.760 --> 0:30:19.160
<v Speaker 1>dismantle the security systems, or at least to temporarily block them.

0:30:19.440 --> 0:30:23.000
<v Speaker 1>On July twentieth, twenty twenty four, Mark Tyson of Tom's

0:30:23.080 --> 0:30:27.760
<v Speaker 1>Hardware published an article titled lapd Warren's Residents after spike

0:30:27.880 --> 0:30:31.480
<v Speaker 1>and burglaries using Wi Fi jammers that disable security cameras,

0:30:31.720 --> 0:30:35.880
<v Speaker 1>smart door bells. So Wi Fi of course works over

0:30:36.320 --> 0:30:39.840
<v Speaker 1>radio waves, right like Wi Fi is just a different

0:30:40.120 --> 0:30:43.040
<v Speaker 1>brand of radio. It's a different set of frequencies at

0:30:43.080 --> 0:30:46.120
<v Speaker 1>two point four gigaherts and five point zero gigaherts. Like

0:30:46.200 --> 0:30:49.480
<v Speaker 1>other radio signals, Wi Fi can also be overwhelmed. So

0:30:49.560 --> 0:30:53.480
<v Speaker 1>Wi Fi jammers are a thing now. They are not

0:30:53.720 --> 0:30:57.080
<v Speaker 1>legal in the United States, at least they're not legal

0:30:57.160 --> 0:31:00.360
<v Speaker 1>to use here in the US, but they're there's still

0:31:00.400 --> 0:31:03.120
<v Speaker 1>something that you can find online, Like you can buy

0:31:03.120 --> 0:31:06.080
<v Speaker 1>these things online. They're not even particularly that expensive. They're

0:31:06.120 --> 0:31:08.400
<v Speaker 1>typically less than one hundred dollars or even less than

0:31:08.480 --> 0:31:11.160
<v Speaker 1>fifty dollars. So if you had one of these things,

0:31:11.600 --> 0:31:14.400
<v Speaker 1>you could turn it on and use it to disable

0:31:14.680 --> 0:31:18.760
<v Speaker 1>Wi Fi in an area, and in the process you

0:31:18.800 --> 0:31:22.080
<v Speaker 1>could knock out cameras that are Wi Fi connected and

0:31:22.280 --> 0:31:26.240
<v Speaker 1>they wouldn't be able to transmit or record you sneaking

0:31:26.360 --> 0:31:30.760
<v Speaker 1>up because that connection gets jammed. Same thing with alarm

0:31:30.840 --> 0:31:34.920
<v Speaker 1>systems right that are Wi Fi enabled, And that's important

0:31:34.920 --> 0:31:36.960
<v Speaker 1>to note it is Wi Fi enabled once. If you

0:31:37.000 --> 0:31:40.160
<v Speaker 1>have things that are hardwired, that's different. Right, They're not

0:31:40.280 --> 0:31:45.320
<v Speaker 1>relying on radio signals for their operation. They're transmitting over

0:31:45.480 --> 0:31:48.560
<v Speaker 1>wired connections, so those are not going to be affected

0:31:48.600 --> 0:31:51.320
<v Speaker 1>by these Wi Fi jammers. I mean, you could get

0:31:51.400 --> 0:31:55.600
<v Speaker 1>to a point where you have actual interference through the cables,

0:31:55.680 --> 0:31:59.440
<v Speaker 1>but typically cables are shielded well enough so that such

0:31:59.480 --> 0:32:02.880
<v Speaker 1>interference doesn't actually affect them. They have to be because

0:32:03.200 --> 0:32:05.520
<v Speaker 1>you don't know what kind of environment these systems are

0:32:05.520 --> 0:32:07.360
<v Speaker 1>going to be, and presumably it's going to be in

0:32:07.400 --> 0:32:10.440
<v Speaker 1>one that does have exposure to other radio waves, so

0:32:10.480 --> 0:32:13.640
<v Speaker 1>you have to shield the cables or else, you know,

0:32:13.720 --> 0:32:17.360
<v Speaker 1>you would just get interference from everything. So wired systems

0:32:17.440 --> 0:32:20.840
<v Speaker 1>not as effected. But if it's a Wi Fi based system, yeah,

0:32:21.000 --> 0:32:23.360
<v Speaker 1>that's going to be an issue. And obviously a Wi

0:32:23.360 --> 0:32:25.200
<v Speaker 1>Fi jammer is not just going to knock out the

0:32:25.240 --> 0:32:28.080
<v Speaker 1>security system, it's going to knock out your connection to

0:32:28.120 --> 0:32:31.080
<v Speaker 1>the Internet. Potentially, it could mean that you don't have

0:32:31.080 --> 0:32:34.120
<v Speaker 1>any connectivity to emergency services, so it could be a

0:32:34.160 --> 0:32:38.600
<v Speaker 1>real dangerous situation. So that's the reason why they're illegal

0:32:38.640 --> 0:32:41.080
<v Speaker 1>here in the United States. They're also illegal in several

0:32:41.080 --> 0:32:44.600
<v Speaker 1>other countries. The US is not alone in this. Some governments,

0:32:44.640 --> 0:32:48.840
<v Speaker 1>typically those on the more authoritarian side of the political landscape,

0:32:48.880 --> 0:32:51.840
<v Speaker 1>have been known to employ signal jammers to silence those

0:32:51.840 --> 0:32:55.840
<v Speaker 1>who would question the government. So the Chinese government, for example,

0:32:55.880 --> 0:32:59.320
<v Speaker 1>has a history of jamming incoming signals from Radio Free

0:32:59.360 --> 0:33:03.400
<v Speaker 1>Asia and at times other stations like BBC World Service

0:33:03.440 --> 0:33:07.480
<v Speaker 1>among others. So jamming is often used in conjunction with

0:33:07.560 --> 0:33:12.120
<v Speaker 1>other methods in order to impose censorship on citizens. So

0:33:12.600 --> 0:33:15.560
<v Speaker 1>that's kind of the overview of jamming. The question is

0:33:15.560 --> 0:33:17.680
<v Speaker 1>what can you do about it? Like, what if you

0:33:17.920 --> 0:33:22.280
<v Speaker 1>are the subject of signal jamming, either you're targeted in

0:33:22.400 --> 0:33:26.520
<v Speaker 1>particular or you're affected in a region that is being

0:33:26.640 --> 0:33:29.600
<v Speaker 1>hit by some form of signal jamming, Well, you can't

0:33:29.600 --> 0:33:32.560
<v Speaker 1>do much about it other than move out of the

0:33:32.680 --> 0:33:37.360
<v Speaker 1>range and perhaps get you know, signal again by leaving

0:33:37.400 --> 0:33:42.240
<v Speaker 1>the area that's affected. You could shut down the device

0:33:42.280 --> 0:33:44.760
<v Speaker 1>that's jamming the signal if you can find it, but

0:33:45.080 --> 0:33:48.640
<v Speaker 1>you know, discovering the actual location of a signal jammer

0:33:48.760 --> 0:33:52.480
<v Speaker 1>isn't easy these devices, particularly for the stuff that doesn't

0:33:52.480 --> 0:33:55.400
<v Speaker 1>affect huge ranges, things that are for the more immediate

0:33:55.440 --> 0:33:58.760
<v Speaker 1>area they don't have to be very large, so they

0:33:58.760 --> 0:34:01.360
<v Speaker 1>could easily be hidden somewhere and you'd have to be

0:34:01.400 --> 0:34:03.760
<v Speaker 1>searching around everything in order to find them. Or they

0:34:03.840 --> 0:34:06.560
<v Speaker 1>might even just be like in someone's backpack or something

0:34:06.600 --> 0:34:10.040
<v Speaker 1>as they're walking by. That would be very difficult for

0:34:10.080 --> 0:34:12.839
<v Speaker 1>you to track down. And you wouldn't be able to

0:34:12.840 --> 0:34:14.960
<v Speaker 1>just walk up to some random person and say, hey,

0:34:15.280 --> 0:34:17.560
<v Speaker 1>let me see what's in your backpack. That's it's not

0:34:17.600 --> 0:34:21.040
<v Speaker 1>how that works. So you know, if you're talking about

0:34:21.040 --> 0:34:23.920
<v Speaker 1>these small devices, if you've got signal interference as a

0:34:23.960 --> 0:34:28.320
<v Speaker 1>result of jamming, the culprit is likely nearby, like within

0:34:28.400 --> 0:34:31.520
<v Speaker 1>fifteen meters of your location, because these things don't have

0:34:31.560 --> 0:34:34.439
<v Speaker 1>a very long transmission range. Finding the device and turning

0:34:34.480 --> 0:34:36.160
<v Speaker 1>it off is all that you need to do to

0:34:36.200 --> 0:34:39.080
<v Speaker 1>restore service. But you know that is tricky if someone's

0:34:39.120 --> 0:34:43.440
<v Speaker 1>high to get effectively wired communications, obviously, that's a big difference.

0:34:43.520 --> 0:34:46.360
<v Speaker 1>Right if you're using hardwired connections with most of your stuff,

0:34:46.560 --> 0:34:48.600
<v Speaker 1>jammers are not likely to have much of an effect

0:34:48.600 --> 0:34:53.480
<v Speaker 1>on you. Like if you have a router and everything

0:34:53.520 --> 0:34:57.200
<v Speaker 1>you've got is connected by Ethernet cable and that's it.

0:34:57.320 --> 0:35:00.440
<v Speaker 1>You don't have wireless connectivity, then you don't I need

0:35:00.480 --> 0:35:02.200
<v Speaker 1>to worry so much. But I don't know anyone who

0:35:02.400 --> 0:35:05.239
<v Speaker 1>is just strictly hardwired. I mean pretty much everyone I

0:35:05.280 --> 0:35:08.879
<v Speaker 1>know who uses Internet connected devices is relying at least

0:35:08.880 --> 0:35:11.960
<v Speaker 1>in part on wireless ones, so those would obviously be

0:35:12.000 --> 0:35:16.000
<v Speaker 1>impacted by a Wi Fi signal jammer. And again, unless

0:35:16.040 --> 0:35:18.040
<v Speaker 1>you're able to find the source of the jam, it

0:35:18.160 --> 0:35:22.920
<v Speaker 1>kind of stuck until that person or thing has moved on.

0:35:23.400 --> 0:35:25.680
<v Speaker 1>So yeah, that's the bad news. The good news is

0:35:25.800 --> 0:35:29.359
<v Speaker 1>I don't think it's that revalent. Apparently it's prevalent enough

0:35:29.400 --> 0:35:34.480
<v Speaker 1>in certain areas of Los Angeles for it to become newsworthy,

0:35:34.880 --> 0:35:36.719
<v Speaker 1>So that is an issue if you live in an

0:35:36.760 --> 0:35:39.840
<v Speaker 1>area like that. Being aware of it is very important

0:35:40.200 --> 0:35:45.840
<v Speaker 1>because you might recognize certain signals to use a pun

0:35:46.320 --> 0:35:50.360
<v Speaker 1>that you're being jammed, and being aware of that is

0:35:50.480 --> 0:35:53.920
<v Speaker 1>very important. Being on the lookout for suspicious activity is

0:35:53.960 --> 0:35:57.759
<v Speaker 1>really important. But apart from that, you're not likely to

0:35:57.880 --> 0:36:00.680
<v Speaker 1>encounter it. There might be occasional case is where someone

0:36:00.800 --> 0:36:04.440
<v Speaker 1>is being disruptive on purpose, Like I could easily imagine

0:36:04.440 --> 0:36:08.520
<v Speaker 1>someone sneaking a signal jammer into say a tech conference,

0:36:08.800 --> 0:36:14.200
<v Speaker 1>in order to wreak havoc as part of a haha,

0:36:14.239 --> 0:36:17.000
<v Speaker 1>I prank to you kind of thing. We saw something

0:36:17.000 --> 0:36:19.759
<v Speaker 1>similar with that a few years ago, several years ago

0:36:19.800 --> 0:36:24.280
<v Speaker 1>now at ces when someone was essentially using the equivalent

0:36:24.320 --> 0:36:28.120
<v Speaker 1>of a universal remote to shut down televisions that were

0:36:28.120 --> 0:36:33.920
<v Speaker 1>on display during a tech presentation, a pr presentation at CEES,

0:36:34.200 --> 0:36:36.920
<v Speaker 1>which was a low class, dirty down thing to do.

0:36:37.120 --> 0:36:39.200
<v Speaker 1>But yeah, I could see someone trying to do something

0:36:39.239 --> 0:36:42.920
<v Speaker 1>like that just to cause disruption. But apart from that,

0:36:43.120 --> 0:36:47.040
<v Speaker 1>I don't know that you're ever going to encounter it, unless, again,

0:36:47.080 --> 0:36:49.440
<v Speaker 1>you happen to live in a place where robberies are

0:36:49.480 --> 0:36:53.640
<v Speaker 1>starting to make use of these technologies in an effort

0:36:53.680 --> 0:36:57.360
<v Speaker 1>to cover up people's identities. Well they target a house.

0:36:58.040 --> 0:37:01.280
<v Speaker 1>That's a serious issue. Anyway. Hey, that is our episode

0:37:01.320 --> 0:37:05.000
<v Speaker 1>on Signal Jamming. I hope you are all well and

0:37:05.040 --> 0:37:14.720
<v Speaker 1>I will talk to you again really soon. Tech Stuff

0:37:14.800 --> 0:37:19.319
<v Speaker 1>is an iHeartRadio production. For more podcasts from iHeartRadio, visit

0:37:19.360 --> 0:37:22.920
<v Speaker 1>the iHeartRadio app, Apple Podcasts, or wherever you listen to

0:37:22.960 --> 0:37:27.279
<v Speaker 1>your favorite shows.