Numbers stations are shortwave radio broadcasts that transmit sequences of numbers, phonetic letters, or musical tones to covert intelligence agents in the field. Governments have operated these stations since World War II to communicate with agents using unbreakable one-time pad encryption. The broadcasts continue today, with active stations documented by radio enthusiasts worldwide. This investigation traces their history, technical operation, confirmed legal cases, and current activity.
On a Tuesday evening in June 1998, FBI surveillance teams monitoring Ana Belén Montes observed her return to her Washington, D.C., apartment, retrieve a Sony shortwave radio from her closet, and tune to a specific frequency. At the designated time, a Spanish-language voice emerged from the static: "Atención... Atención... 8-7-2-3-4... 5-6-1-8-9..." For the next several minutes, the voice read five-digit number groups with mechanical precision. Montes transcribed the numbers, then entered them into decryption software on her Toshiba laptop, using a one-time pad key to reveal her instructions from Cuban intelligence.
This scene, documented in court records from the 2001 prosecution of the Wasp Network, represents the most detailed public confirmation of what radio enthusiasts and intelligence historians have known for decades: governments broadcast encrypted messages to field agents over shortwave radio using stations that transmit nothing but numbers, letters, or tones. These transmissions, known as numbers stations, have operated continuously since World War II. They continue broadcasting today.
Numbers stations occupy a unique position in intelligence operations: their existence is undeniable—anyone with a shortwave radio can hear them—yet no government officially acknowledges operating them. The broadcasts are detectable, recordable, and analyzable, but the content remains impenetrable without the physical encryption key. This combination of public transmission and cryptographic security has made numbers stations a standard tool of intelligence tradecraft for over eighty years.
The operational concept is straightforward. An intelligence agency needs to communicate with agents operating in foreign countries without using traceable communication methods like telephone calls, internet connections, or physical meetings. Shortwave radio signals propagate globally, can be received using commercially available equipment, and require no two-way communication that would expose the agent's location or identity.
The agency broadcasts encrypted messages at scheduled times on predetermined frequencies. The agent, equipped with a shortwave receiver and one-time pad decryption materials, listens to the broadcast, transcribes the numbers, and decrypts the message. The entire process leaves no digital footprint, requires no specialized infrastructure in the target country, and exposes the agent to risk only during the brief reception period.
"The defendant used a shortwave radio to receive encrypted messages in the form of numbers transmitted from Cuba. The defendant then used a computer and decryption program to decrypt the messages using a 'one-time pad' decryption system."
FBI Special Agent Steve McCord — Testimony, United States v. Rubén Campa, 2001Court testimony from the Wasp Network trial revealed the practical implementation. Cuban intelligence provided agents with Sony or similar shortwave receivers before deployment. The agents received schedules indicating broadcast frequencies and times. They also received one-time pad materials—either in physical form as booklets of random number groups, or as digital files loaded onto computers. At the scheduled time, agents would tune to the designated frequency, record the transmission (either by transcription or audio recording), then use the decryption software to subtract the one-time pad numbers from the broadcast numbers, revealing the plaintext message.
Numbers stations use one-time pad encryption because it is the only mathematically proven unbreakable encryption system. Claude Shannon demonstrated this in his 1949 paper "Communication Theory of Secrecy Systems," proving that when a truly random key as long as the message is used exactly once and kept completely secret, the encrypted output is indistinguishable from random data. No amount of computational power or cryptanalytic sophistication can break the encryption without the physical key.
The encryption process is simple modular addition. If the plaintext message converts to the numbers 23156 and the one-time pad contains the random sequence 88429, the encrypted output is 01575 (adding each digit modulo 10). The agent reverses this by subtracting the same pad sequence from the broadcast numbers. The security depends entirely on the randomness of the pad, using each pad page only once, and keeping the physical pad secure.
This explains why signals intelligence agencies can monitor, record, and analyze numbers stations continuously without being able to decrypt the messages. The NSA, GCHQ, and other signals intelligence organizations maintain extensive archives of numbers station transmissions. Without the physical one-time pad, these recordings contain no recoverable intelligence. The FBI only decrypted the messages to Ana Montes and other Wasp Network members because they seized the decryption software and one-time pad data during the arrests.
The earliest documented use of numbers station methodology appears in British MI8 records from 1942. The Radio Security Service monitored German Abwehr transmissions to agents operating in Britain and occupied territories, noting the characteristic pattern of number sequences broadcast at scheduled times on shortwave frequencies. The Germans used one-time pad encryption for these transmissions, making the content unreadable to British cryptanalysts even as they monitored the broadcasts continuously.
During the Cold War, numbers station activity expanded dramatically. Radio monitoring enthusiasts documented stations broadcasting in Russian, English, German, Spanish, Czech, and other languages. The stations developed distinctive interval signals—musical phrases or tones used to identify the station before the number transmission began. The Lincolnshire Poacher used the first two bars of the English folk song of that name. Swedish Rhapsody used a music box melody. These interval signals allowed agents to confirm they were tuned to the correct station before the encrypted message began.
The Conet Project, released in 1997, documented over 150 distinct recordings of numbers stations. The four-CD collection included stations using various formats: five-digit number groups, phonetic alphabet sequences (Alpha Bravo Charlie), four-figure groups, and Morse code transmissions. The project documented over 4,000 individual broadcasts recorded between 1997 and 2004, providing an audio archive of this intelligence communication method.
On September 12, 1998, FBI agents arrested ten members of a Cuban intelligence network operating in South Florida. The subsequent investigation and trial provided unprecedented public documentation of how numbers stations function in operational intelligence work. The case, United States v. Rubén Campa (the legal names of the defendants), went to trial in 2001.
FBI Special Agent Steve McCord testified about the technical aspects of the communication system. Agents used commercially available Sony shortwave radios to receive transmissions from Cuban station E03. The station broadcast at scheduled times on multiple frequencies including 5855 kHz, 7887 kHz, and 11,530 kHz. McCord explained that the broadcasts followed a consistent format: the interval signal "Atención" followed by a three-digit identifier, then groups of five-digit numbers read by a female voice.
The FBI had seized laptop computers containing decryption software and one-time pad data during the arrests. FBI cryptanalysts used these materials to decrypt over 150 messages transmitted to network members between 1998 and 2001. The decrypted messages entered as evidence revealed specific intelligence collection requirements: "Prioritize and continue to strengthen our work" and "Continue to send information." Other messages requested information about U.S. military exercises at Boca Chica Naval Air Station and activities of Cuban exile organizations.
Ana Montes, though not part of the Wasp Network trial, operated using an identical system. Court documents from her 2002 prosecution revealed she received her one-time pad materials on diskette, loaded them onto her laptop, and used commercially available decryption software to process the E03 broadcasts she recorded on her Sony shortwave radio. FBI surveillance documented her receiving transmissions on Friday evenings at her apartment, transcribing the numbers, then using her computer to decrypt them.
Despite the exposure of operational details in court proceedings, numbers stations continue broadcasting. Monitoring groups including Priyom.org and ENIGMA 2000 maintain databases tracking active stations. As of 2025, approximately 40-50 stations broadcast regularly on shortwave frequencies.
UVB-76, known as "The Buzzer," has transmitted continuously on 4625 kHz since at least 1982. The station broadcasts a monotonous buzzing tone at approximately 25 pulses per minute, 24 hours per day. Occasionally the buzzing stops and voice messages in Russian are transmitted. On November 3, 2010, the format changed, with increased frequency of voice transmissions containing Russian names, numbers, and what appear to be military call signs. Radio direction finding has located transmitters near Povarovo, Russia, approximately 40 kilometers from Moscow.
Cuban station E03 continues operation despite its exposure in the Wasp Network trial. The station maintains regular broadcast schedules on multiple frequencies. Priyom.org monitors document transmissions occurring several times weekly, using the same "Atención" interval signal and five-digit number group format described in the 2001 trial testimony. The continued operation suggests Cuban intelligence assesses that the security provided by one-time pad encryption outweighs operational security concerns about broadcast detection.
The Lincolnshire Poacher, operated by British intelligence from Cyprus, ceased transmissions on June 28, 2008. The station had broadcast for approximately 30 years, transmitting on frequencies including 11,545 kHz with coverage of the Middle East and Southern Asia. Its shutdown coincided with the closure of Cherry Ripe, a sister station covering different geographic regions. Intelligence analysts suggest the closures reflect transition to satellite-based or internet-based covert communication systems rather than abandonment of the agent communication requirement.
While governments do not officially acknowledge operating numbers stations, radio direction finding by enthusiasts and researchers has identified transmission locations. The technique uses multiple receivers at different geographic locations to triangulate the source of a transmission based on signal strength and arrival time.
The Lincolnshire Poacher transmissions were traced to RAF Akrotiri on Cyprus, a British military installation. Cherry Ripe transmitted from Australia. UVB-76 transmits from sites near Moscow, with at least one transmitter identified near Povarovo. Cuban stations including E03 transmit from sites near Havana. These findings, combined with language, interval signals, and transmission times, allow researchers to attribute most major numbers stations to specific countries despite the lack of official acknowledgment.
ENIGMA 2000, founded in 1993, maintains the most comprehensive database of numbers station characteristics. The group assigns alphanumeric designations based on language and format: E for English language stations, S for Slavic languages, V for various formats, M for Morse code. The database includes frequency histories, schedule patterns, format changes, and radio direction finding results. This civilian research infrastructure has documented the operational patterns of intelligence communications that governments refuse to discuss publicly.
The continued operation of numbers stations in an era of satellite communications, encrypted internet protocols, and sophisticated digital encryption requires explanation. Several operational advantages explain their persistence.
First, reception requires no specialized equipment. A commercial shortwave radio costing under $100 can receive the transmissions. The agent needs no satellite phone, no internet connection, no cellular service, and no specialized receiving equipment that would be suspicious if discovered. Second, reception is passive. The agent receives information without transmitting any signal that could be detected or located through radio direction finding. Third, the one-time pad encryption is unbreakable regardless of advances in computing power or cryptanalytic techniques.
"Despite the existence of secure satellite communications and internet-based systems, numbers stations offer operational security advantages that remain relevant: commercial equipment, passive reception, mathematical encryption security, and no digital infrastructure footprint."
Matthew M. Aid — The Secret Sentry: The Untold History of the National Security Agency, 2009Fourth, the system operates independently of any infrastructure in the target country. Internet-based communication requires functioning internet service, potentially monitored by the host country's security services. Satellite phones require satellite coverage and produce signals that can be detected. Shortwave radio requires only that the agent be within the signal propagation range, which for properly configured high-frequency transmissions can extend thousands of miles.
Fifth, the broadcast method allows one transmission to reach multiple agents simultaneously. An agency can communicate identical instructions to dozens of agents using a single broadcast, with each agent using their individual one-time pad to decrypt the message. This efficiency cannot be replicated using point-to-point encrypted communication systems.
Numbers stations operate in a legally ambiguous space. The International Telecommunication Union (ITU) Radio Regulations require stations to identify themselves and operate under licenses granted by national regulatory authorities. Numbers stations do not identify themselves using standard call signs and are not registered with the ITU.
The High Frequency Coordination Conference (HFCC), established in 1990, coordinates shortwave broadcast frequencies among international broadcasters to minimize interference. HFCC databases note persistent unregistered transmissions on certain frequencies—transmissions that do not respond to coordination requests. These unregistered transmissions correspond to documented numbers station frequencies. The HFCC has no enforcement mechanism against government intelligence transmissions.
National laws governing radio transmission typically include exemptions for government operations, particularly those related to national security. This provides legal cover for intelligence agencies to operate transmitters without civilian regulatory compliance. The broadcasts violate the spirit of international frequency coordination but operate under national security exemptions that place them beyond regulatory enforcement.
The persistence of numbers stations eight decades after their first documented use reveals several aspects of intelligence operations that remain constant despite technological change. First, governments continue to operate human intelligence agents in foreign countries who require secure, reliable communication. Second, the fundamental security requirement—communicating with agents without exposing their identity or location—has not changed. Third, simple, proven technology often provides operational advantages over complex modern systems.
The courtroom confirmation in 2001 that Cuba used numbers stations did not end the practice. E03 continues broadcasting. This suggests that intelligence agencies assess the benefits of unbreakable encryption and passive reception outweigh the disadvantages of public transmission. The fact that everyone can hear the broadcast but no one can read it without the physical key represents acceptable operational security.
The radio monitoring community continues to track these transmissions, documenting new stations, frequency changes, and operational patterns. Priyom.org operates web-based receivers that allow anyone with internet access to listen to numbers stations in real time. The combination of civilian monitoring, historical court testimony, and technical analysis has documented a covert communication system that operates in plain sight, protected by mathematics rather than secrecy.
Numbers stations represent a specific answer to a specific operational requirement: secure one-way communication to field agents using unbreakable encryption and commercially available reception equipment. That requirement existed in 1942. Court evidence confirms it existed in 2001. Radio monitoring confirms it exists in 2025. The broadcasts continue.