Numbers station

A numbers station is a shortwave radio station characterized by broadcasts of formatted numbers, which are believed to be addressed to intelligence officers operating in foreign countries.[1] Most identified stations use speech synthesis to vocalize numbers, although digital modes such as phase-shift keying and frequency-shift keying, as well as Morse code transmissions, are not uncommon. Most stations have set time schedules, or schedule patterns; however, other stations appear to broadcast at random times. Stations may or may not have set frequencies in the HF band.[2]

The first known use of numbers stations was during World War I, with the numbers transmitted in Morse code. Numbers stations were most prolific during the Cold War era, yet many continue to operate and some have even switched operators.[3] The Czech Ministry of the Interior and the Swedish Security Service have both acknowledged the use of numbers stations by Czechoslovakia for espionage,[4][5][6] with declassified documents proving the same. With a few exceptions,[7] no QSL responses have been received from numbers stations by shortwave listeners who sent reception reports to said stations, which is the expected behaviour of a non-clandestine station.[8]

One well-known numbers station was the E03 "Lincolnshire Poacher",[9] which is thought to have been run by the British Secret Intelligence Service.[10] It was first broadcast from Bletchley Park in the mid-1970s but later was broadcast from RAF Akrotiri in Cyprus.

In 2001, the United States tried the Cuban Five on the charge of spying for Cuba. That group had received and decoded messages that had been broadcast from Cuban numbers stations.[11] Also in 2001, Ana Belen Montes, a senior US Defense Intelligence Agency analyst, was arrested and charged with espionage. The federal prosecutors alleged that Montes was able to communicate with the Cuban Intelligence Directorate through encoded messages, with instructions being received through "encrypted shortwave transmissions from Cuba". In 2006, Carlos Alvarez and his wife, Elsa, were arrested and charged with espionage. The U.S. District Court Florida stated that "defendants would receive assignments via shortwave radio transmissions".

In June 2009, the United States similarly charged Walter Kendall Myers with conspiracy to spy for Cuba, and receiving and decoding messages broadcast from a numbers station operated by the Cuban Intelligence Directorate to further that conspiracy.[12][13]

It has been reported that the United States used numbers stations to communicate encoded information to persons in other countries.[11] There are also claims that State Department operated stations, such as KKN50 and KKN44, used to broadcast similar "numbers" messages or related traffic, although these radio stations have been off air for many years.[14][15]

Monitoring transmissions from numbers stations has become an activity for hobbyists, dating from the 1980s,[16] though it is reported that Archduke Anton of Austria, as a boy, used to listen in to their transmissions, writing them down and passing them on to the Austrian military intelligence.[17]

Suspected origins and use

According to the notes of The Conet Project,[18][19] which has compiled recordings of these transmissions, numbers stations have been reported since World War I.

It has long been speculated, and was argued in court in one case, that these stations operate as a simple and foolproof method for government agencies to communicate with spies working undercover.[20] According to this theory, the messages are encrypted with a one-time pad, to avoid any risk of decryption by the enemy. As evidence, numbers stations have changed details of their broadcasts or produced special, nonscheduled broadcasts coincident with extraordinary political events, such as the attempted coup of August 1991 in the Soviet Union.[21]

Numbers stations are also acknowledged for espionage purposes in Robert Wallace and H. Keith Melton's Spycraft:[22]

The one-way voice link (OWVL) described a covert communications system that transmitted messages to an agent's unmodified shortwave radio using the high-frequency shortwave bands between 3 and 30 MHz at a predetermined time, date, and frequency contained in their communications plan. The transmissions were contained in a series of repeated random number sequences and could only be deciphered using the agent's one-time pad. If proper tradecraft was practised and instructions were precisely followed, an OWVL transmission was considered unbreakable. As long as the agent's cover could justify possessing a shortwave radio and he was not under technical surveillance, high-frequency OWVL was a secure and preferred system for the CIA during the Cold War.

High frequency radio signals transmitted at relatively low power can travel around the world under ideal propagation conditions—which are affected by local RF noise levels, weather, season, and sunspots—and can then be received with a properly tuned antenna (of adequate size) and a good receiver. However, spies often have to work only with available hand-held receivers, sometimes under difficult local conditions, and in all seasons and sunspot cycles.[11]

A 1998 article in The Daily Telegraph quoted a spokesperson for the Department of Trade and Industry (the government department that, at that time, regulated radio broadcasting in the United Kingdom) as saying "These [numbers stations] are what you suppose they are. People shouldn't be mystified by them. They are not for, shall we say, public consumption."[23]

The use of numbers stations as a method of espionage is discussed in Spycraft:[24]

The only item Penkovsky used that could properly be called advanced tradecraft was his 'agent-receive' communications through a one-way voice-link. These encoded messages, known as OWVL, were broadcast over shortwave frequencies at predetermined times from a CIA-operated transmitter in Western Europe. Penkovsky listened to these messages on a Panasonic radio—strings of numbers read in a dispassionate voice—and then decoded them using a one-time pad.

North Korea revived number broadcasts in July 2016 after a hiatus of sixteen years, a move which some analysts regarded as psychological war;[25] sixteen such broadcasts occurred in 2017, including unusually timed transmissions in April.[26]

Identifying and locating

Numbers stations are often given nicknames by enthusiasts, often reflecting some distinctive element of the station such as the interval signal. For example, the "Lincolnshire Poacher", formerly one of the best-known numbers stations (generally thought to be run by the Secret Intelligence Service, because its transmissions have been traced to RAF Akrotiri in Cyprus), played the first two bars of the folk song "The Lincolnshire Poacher" before each string of numbers.[27]

The "Atención" station was thought to be from Cuba, because a supposed error allowed Radio Havana Cuba to be carried on the frequency.[28]

According to an internal Cold War-era report of the Polish Ministry of the Interior, numbers stations DCF37 (3370 kHz) and DFD21 (4010 kHz) transmitted from West Germany beginning in the early 1950s.[29]

Atención spy case

The "Atención" station of Cuba became the world's first numbers station to be officially and publicly accused of transmitting to spies. It was the centrepiece of a United States federal court espionage trial, following the arrest of the Wasp Network of Cuban spies in 1998. The U.S. prosecutors claimed the accused were writing down number codes received from Atención, using Sony hand-held shortwave receivers, and typing the numbers into laptop computers to decode spying instructions. The FBI testified that they had entered a spy's apartment in 1995, and copied the computer decryption program for the Atención numbers code. They used it to decode Atención spy messages, which the prosecutors unveiled in court.[11]

The United States government's evidence included the following three examples of decoded Atención messages.[11] (It was not reported whether the original clear texts were in Spanish, although the phrasing of "Day of the Woman" would indicate so.)

  • "prioritize and continue to strengthen friendship with Joe and Dennis"
  • "Under no circumstances should [agents] German nor Castor fly with BTTR or another organization on days 24, 25, 26 and 27." (BTTR is the anti-Castro airborne group Brothers to the Rescue)
  • "Congratulate all the female comrades for International Day of the Woman." (Probably a simple greeting for International Women's Day on 8 March)

The moderator of an e-mail list for global numbers station hobbyists claimed that "Someone on the Spooks list had already cracked the code for a repeated transmission [from Havana to Miami] if it was received garbled." Such code-breaking is possible if a one-time pad decoding key is used more than once.[11] If used properly, however, the code cannot be broken.


Generally, numbers stations follow a basic format, although there are many differences in details between stations. Transmissions usually begin on the hour or half-hour.

The prelude, introduction, or call-up of a transmission (from which stations' informal nicknames are often derived) includes some kind of identifier,[30] for the station itself, the intended recipient, or both. This can take the form of numeric or radio-alphabet "code names" (e.g. "Charlie India Oscar", "250 250 250", "Six-Niner-Zero-Oblique-Five-Four"), characteristic phrases (e.g. "¡Atención!", "Achtung!", "Ready? Ready?", "1234567890"), and sometimes musical or electronic sounds (e.g. "The Lincolnshire Poacher", "Magnetic Fields"). Sometimes, as in the case of radio-alphabet stations, the prelude can also signify the nature or priority of the message to follow (e.g., it may indicate that no message follows). Often the prelude repeats for a period before the body of the message begins.

After the prelude, there is usually an announcement of the number of number-groups in the message,[30] the page to be used from the one-time pad, or other pertinent information. The groups are then recited. Groups are usually either four or five digits or radio-alphabet letters. The groups are typically repeated, either by reading each group twice or by repeating the entire message as a whole.

Some stations send more than one message during a transmission. In this case, some or all of the above process is repeated, with different contents.

Finally, after all the messages have been sent, the station will sign off in some characteristic fashion. Usually, it will simply be some form of the word "end" in whatever language the station uses (e.g., "End of message; End of transmission", "Ende", "Fini", "Final", "конец"). Some stations, especially those thought to originate from the former Soviet Union, end with a series of zeros, e.g., "00000" "000 000"; others end with music or other sounds.[30]

Because of the secretive nature of the messages, the cryptographic function employed by particular stations is not publicly known, except in one (or possibly two[31]) cases. It is assumed that most stations use a one-time pad that would make the contents of these number groups indistinguishable from randomly generated numbers or digits. In one confirmed case, West Germany did use a one-time pad for numbers transmissions.[32]

Transmission technology

Although few numbers stations have been tracked down by location, the technology used to transmit the numbers has historically been clear—stock shortwave transmitters using powers from 10 kW to 100 kW.

Amplitude modulated (AM) transmitters with optionally–variable frequency, using class-C power output stages with plate modulation, are the workhorses of international shortwave broadcasting, including numbers stations.

Application of spectrum analysis to numbers station signals has revealed the presence of data bursts, radioteletype-modulated subcarriers, phase-shifted carriers, and other unusual transmitter modulations like polytones.[33] (RTTY-modulated subcarriers were also present on some U.S. commercial radio transmissions during the Cold War.[34])

The frequently reported use of high-tech modulations like data bursts, in combination or in sequence with spoken numbers, suggests varying transmissions for differing intelligence operations.[35]

For spies in the field, low-tech spoken number transmissions continue to have advantages in the 21st century. High-tech data-receiving equipment is difficult to obtain,[36] and being caught with just a shortwave radio has a degree of plausible deniability that no spying is being conducted.

Interference with numbers stations

Numbers stations interfering with other broadcasts

The North Korean foreign language service Voice of Korea began to broadcast on the E03 Lincolnshire Poacher's former frequency, 11545 kHz, in 2006, possibly to deliberately interfere with its propagation. However, Lincolnshire Poacher broadcasts on three different frequencies, and the remaining two have not been interfered with. The apparent target zone for the Lincolnshire Poacher signals originating in Cyprus was the Middle East, not the Far East, which is covered by its sister station, E03a Cherry Ripe.[37][38]

On 27 September 2006, amateur radio transmissions in the 30 m band were affected by an English-language S06 "Russian Man"[39] numbers station at 17:40 UTC.[38]

In October 1990, it was reported that a numbers station had been interfering with communications on 6577 kHz, a frequency used by air traffic in the Caribbean. The interference was such that on at least one monitored transmission, it blocked the channel entirely and forced the air traffic controller to switch the pilot to an alternative frequency.[38]

A BBC frequency, 7325 kHz, has also been used. This prompted a letter to the BBC from a listener in Andorra. She wrote to the World Service Waveguide programme in 1983 complaining that her listening had been spoiled by a female voice reading out numbers in English and asked the announcer what this interference was. The BBC presenter laughed at the suggestion of spy activity. He had consulted the experts at Bush House (BBC World Service headquarters), who declared that the voice was reading out nothing more sinister than snowfall figures for the ski slopes near the listener's home. After more research into this case, shortwave enthusiasts are fairly sure that this was a numbers station being broadcast on a random frequency.[40]

The Cuban numbers station "HM01" has been known to interfere with shortwave broadcaster Voice of Welt on 11530 kHz.[41]

Attempted jamming of numbers stations

Numbers station transmissions have often been the target of intentional jamming attempts. Despite this targeting, many numbers stations continue to broadcast unhindered. Historical examples of jamming include the E10 (a numbers station thought to originate from Israel's Mossad intelligence agency) being jammed by the "Chinese Music Station" (thought to originate from the People's Republic of China (PRC) and usually used to jam Taiwan "Sound Of Hope" radio broadcasts which are anti-PRC in nature).[42]


Although many numbers stations have nicknames which usually describe some aspect of the station itself, these nicknames have sometimes led to confusion among listeners, particularly when discussing stations with similar traits. M. Gauffman of the ENIGMA numbers stations monitoring group[43] originally assigned a code to each known station.

Portions of the original ENIGMA group moved on to other interests in 2000 and the classification of numbers stations was continued by the follow-on group ENIGMA 2000.[44] The document containing the description of each station and its code designation is called the "ENIGMA Control List", whose 26th edition was published in February 2016.[45] This classification scheme takes the form of a letter followed by a number (or, in the case of some "X" stations, more numbers).[46] The letter indicates the language used by the station in question:

  • E indicates a station broadcasting in English.
  • G indicates a station broadcasting in German.
  • S indicates a station broadcasting in a Slavic language.
  • V indicates all other languages.
  • M is a station broadcasting in Morse code.
  • X indicates all other transmissions, such as polytones, in addition to some unexplained broadcasts which may not actually be numbers stations.

There are also a few other stations[30] with a specific classification:

  • SK: Digital Mode
  • HM: Hybrid Mode
  • DP: Digital-Pseudo Polytone

Some stations have also been stripped of their designation when they were discovered not to be a numbers station. This was the case for E22, which was discovered in 2005 to be test transmissions for All India Radio.[47]

Recordings and samples

References in media

See also


  1. Olivia Sorrel-Dejerine (16 April 2014). "The spooky world of the 'numbers stations'". BBC News.
  2. "Number stations".
  3. "Numbers Stations Research". Numbers Stations Research.
  4. "Lyssna på ett hemligt telegram" [Listen to a secret telegram] (in Swedish). Säkerhetspolisen. 23 January 2015. Archived from the original on 8 March 2016. Retrieved 12 March 2016.
  5. "The Swedish Security Service Releases Info on a Numbers Station". NSRIC. 24 July 2015. Retrieved 12 March 2016.
  6. Catinka Mannerfelt Agneskog. "Säpos hemliga radiotelegram" (in Swedish). SvD Nyheter. Retrieved 23 January 2015.
  7. stations KKN44, BFBX and OLX Mason, Simon. "Shortwave Espionage". Archived from the original on 3 December 2011. Retrieved 28 October 2011.
  8. Helms, Harry L. (1981). "Espionage Radio Activity". How to Tune the Secret Shortwave Spectrum. Blue Ridge Summit, PA: TAB Books Inc. p. 52. ISBN 0-8306-1185-1.
  9. "E03". Retrieved 17 June 2017.
  10. "E03 The LincolnShire Poacher". Retrieved 6 September 2014.
  11. Sokol, Brett (8 February 2001). "Espionage Is in the Air". Miami New Times. Archived from the original on 21 February 2001.
  12. Rijmenants, Dirk (2013). "Cuban Agent Communications" (PDF). Cipher Machines & Cryptology (PDF). Retrieved 30 December 2013.
  13. "United States v. Walter Kendall Myers, United States District Court, District of Columbia, no. xxx" (PDF). Retrieved 26 August 2010.
  14. Helms, Harry L. (1981). "Government and Military Communications". How to Tune the Secret Shortwave Spectrum. Blue Ridge Summit, PA: TAB Books Inc. p. 58. ISBN 0-8306-1185-1.
  15. Schimmel, Donald W. (1994). The Underground Frequency Guide: A Directory of Unusual, Illegal, and Covert Radio Communications (3 ed.). Solana Beach, California: High Text Publications, Inc. pp. 88–95. ISBN 1-878707-17-5.
  16. Martin Goldmanis (February 1984) Before enigma; the early numbers stations ,monitors NSRIC; retrieved 13 December 2019
  17. Schaum, Ryan (30 November 2014). "The First Numbers Stations". NSRIC.
  18. Segal, David (3 August 2004). "The Shortwave And the Calling: For Akin Fernandez, Cryptic Messages Became Music To His Ears". The Washington Post. p. C01.
  19. Mason 1991, pp. 5–6
  20. Wagner, Thomas (2004). "Chapter 6 "So here she was with a pillow over her head and over the radio ..."". If It Had Not Been for Fifteen Minutes ... a true account of espionage and hair-raising adventure. Retrieved 30 October 2013.
  21. The Conet Project (included booklet), Irdial-Discs, p. 59.
  22. Wallace & Melton 2008, p. 438
  23. Pescovitz, David (16 September 1999). "Counting spies". Salon. Archived from the original on 19 January 2000. Retrieved 12 March 2016.
  24. Wallace & Melton 2008, p. 37
  25. Sang-Hun, Choe (21 July 2016). "North Korea Revives Coded Spy Broadcasts After 16-Year Silence". NYT. Retrieved 30 July 2016.
  26. Osbourne, Simon (12 May 2017). "North Korea sends chilling coded radio messages to South Korea amid fears of WW3". Express.
  27. Mason 1991, pp. 20–21
  28. William Poundstone, Big Secrets, p. 197.
  29. Bury, Jan (October 2007). "From the Archives: The U.S. and West German Agent Radio Ciphers". Cryptologia. 31 (4): 343–357. doi:10.1080/01611190701578104. ISSN 0161-1194.
  30. "Intro to Numbers Stations". NSRIC. Retrieved 12 March 2016.
  31. In the possible case, the underlying type of encryption might have been stated in the court record of the Atención case when the secretly copied decryption software was introduced into evidence.
  32. See If It Had Not Been For 15 Minutes, Chapter 7 for a simplified explanation of decoding West German numbers messages without a computer.
  33. Schimmel, Donald W. (1994). The Underground Frequency Guide: A Directory of Unusual, Illegal, and Covert Radio Communications (3 ed.). Solana Beach, California: High Text Publications, Inc. pp. 27–28. ISBN 1-878707-17-5.
  34. Collins, Barry W. (July 1997). "The day the U.S. Army invaded W4TLV". QST. 81: 48–49. ISSN 0033-4812.
  35. "NSNL 15: Voice stations". 3 July 1999. Retrieved 26 August 2010.
  36. Even a non-standard civilian shortwave radio can be difficult to obtain in a totalitarian state. See If It Had Not Been For 15 Minutes, chapter 6 for the problems of obtaining a numbers station receiving radio in East Germany during the Cold War.
  37. "E03a". Retrieved 17 June 2017.
  38. "Secret Signals". Retrieved 7 November 2015.
  39. "S06". Retrieved 17 June 2017.
  40. "Secret Signals". Retrieved 26 August 2010.
  41. Anthony Spinelli (18 October 2018), HM01 and Voice of Welt 11530 AM 10 18 2018 1743z, retrieved 26 November 2018
  42. "Chinese Music Station" (Windows Media Audio). Retrieved 16 July 2012.
  43. "ENIGMA: The European Numbers Information Gathering and Monitoring Association". NSRIC. Retrieved 24 February 2015.
  44. "ENIGMA 2000". Retrieved 1 March 2015.
  45. "ENIGMA 2000 Active Stations and N&O ident list" (PDF) (Booklet). 1.2. ENIGMA 2000. February 2016. Archived (PDF) from the original on 12 March 2016.
  46. Friesen, Christopher (2014). "Spy 'Numbers Stations' still enthrall". Radio World. 38 (2): 14. ISSN 0274-8541.
  47. "E2K 32 – E22 is not what it seems". Retrieved 5 April 2016.
  48. "The Conet Project – Recordings of Shortwave Numbers Stations [ird059]". Internet Archive ( Retrieved 16 November 2016.
  49. "Boards of Canada's "Geogaddi"". Discogs. Retrieved 9 May 2012.
  50. "Flying Lotus's "Los Angeles"". Discogs. Retrieved 25 March 2014.
  51. "Stereolab's "Transient Random-Noise Bursts with Announcements"". discogs. Retrieved 14 November 2014.
  52. "Norma Jean – Polar Similar at Discogs".
  53. "F.A.Q." Porcupine Tree. Retrieved 4 February 2015.
  54. " – 'Even Less' lyrics interpretation". Retrieved 18 June 2018.
  55. Shachtman, Noah (23 June 2004). "Wilco Pays Up for Spycasts". Wired. Archived from the original on 21 April 2008. Retrieved 12 March 2016.
  56. Dowd, A. A. (25 April 2013). "Movie Review: The Numbers Station". The A.V. Club. Chicago. Archived from the original on 12 March 2016.
  57. Murray, Noel. "Fringe: '6995 kHz'". The A.V. Club. Retrieved 1 October 2012.
  58. Film Review: 'Banshee Chapter' Dennis Harvey, Variety, 4 January 2014, Retrieved 21 July 2015
  59. Farrimond, Dorian (1 December 2010). "Call of Duty: Black Ops – campaign story". Blitter and Twisted. Retrieved 22 January 2014.
  60. "Easter Eggs – Batman: Arkham City Wiki Guide – IGN". IGN. Retrieved 13 January 2017.
  61. Forbes, Malcolm (27 August 2015). "Book review: Mai Jia's In the Dark shines a light on China's secret world". The National. Archived from the original on 3 March 2016. Retrieved 12 March 2016.
  62. "Fugue State". BBC Radio 4. Retrieved 26 February 2016.
  63. "XOXO Festival video". Retrieved 7 December 2017.
  64. "How to Become an Internet Person". Retrieved 7 December 2017.
  65. "". Retrieved 30 November 2017.
  66. Robertson, Derek. "Jóhann Jóhannsson's Track By Track Guide to Orphée". DrownedInSound. Retrieved 15 February 2018.
  67. "The Whisperer in Darkness". BBC Radio 4 podcasts. Retrieved 5 December 2019.

Further reading

  • Havana Moon (1987). Uno, Dos, Cuatro: A Guide to the Numbers Stations (PDF). Lake Geneva, WI: Tiare Publications. ISBN 0-936653-06-X. Retrieved 24 December 2013.
  • Schimmel, Donald W. (1994). "1. Numbers Stations". The Underground Frequency Guide: A Directory of Unusual, Illegal, and Covert Radio Communications (3rd ed.). Solana Beach, California: High Text Publications, Inc. pp. 1–28. ISBN 1-878707-17-5.
  • Pierce, Langley (1994). Intercepting Numbers Stations. Perth, UK: Interproducts. ISBN 0-9519783-4-9.
  • Smolinski, Chris (February 1998). "Spy Numbers Stations: Have you heard them?". Popular Communications. Hicksville, NY: CQ Communications: 8–10. ISSN 0733-3315.
  • Beaumont, Paul (November 2012). "Numbers Stations: A Modern Perspective (Part 1)". Radio User. Poole, UK: PW Publishing Ltd: 50–53. ISSN 1748-8117.
  • Beaumont, Paul (January 2013). "Numbers Stations: A Modern Perspective (Part 2)". Radio User. Poole, UK: PW Publishing Ltd: 50–55. ISSN 1748-8117.
  • Bury, Jan (October 2007). "From the Archives: The U.S. and West German Agent Radio Ciphers". Cryptologia. 31 (4): 343–357. doi:10.1080/01611190701578104. ISSN 0161-1194.
  • Friesen, Christopher (15 January 2014). "Spy 'Numbers Stations' still enthrall". Radio World. 38 (2): 12, 14. ISSN 0274-8541.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.