All Episodes

June 1, 2025 40 mins
In the thrilling conclusion, multiple investigations converge as the FBI closes in on Franklin Webb while he attempts a desperate escape with Eliza Morgan as hostage. At the Pentagon, military officials implement countermeasures to identify exactly how the targeting systems have been compromised while monitoring a scheduled drone operation in Syria that would have resulted in civilian casualties. In Yemen, Lieutenant Wade and Specialist Chen make a harrowing journey to extraction coordinates with hostile forces in pursuit, carrying intelligence crucial to national security. As Webb is captured and the immediate threat neutralized, a daring special operations mission recovers a critically injured Captain Santiago from enemy transport.

The aftermath reveals the full scope of the conspiracy—a sophisticated Russian-backed operation designed to undermine confidence in American precision warfare capabilities—while highlighting the courage of individuals who risked everything to expose the truth. Months later, as the participants reflect on their experiences, they acknowledge that while this specific threat has been countered, the larger strategic challenge of securing vulnerable systems against determined adversaries continues.

Unlock an ad-free podcast experience with Caloroga Shark Media! Get all our shows on any player you love, hassle free! For Apple users, hit the banner on your Apple podcasts app. For Spotify or other players, visit caloroga.com/plus. No plug-ins needed!

Subscribe now for exclusive shows like 'Palace Intrigue,' and get bonus content from Deep Crown (our exclusive Palace Insider!) Or get 'Daily Comedy News,' and '5 Good News Stories’ with no commercials! Plans start at $4.99 per month, or save 20% with a yearly plan at $49.99. Join today and help support the show!


We now have Merch!  FREE SHIPPING! Check out all the products like T-shirts, mugs, bags, jackets and more with logos and slogans from your favorite shows! Did we mention there’s free shipping? Get 10% off with code NewMerch10 Go to Caloroga.com


Get more info from Caloroga Shark Media and if you have any comments, suggestions, or just want to get in touch our email is info@caloroga.com
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:03):
Caalarugus Shark Media. My name is Daniel Marsh. Last time
I told you how journalist Eliza Morgan uncovered financial connections
between Franklin Webb's company and Russian interests and overheard Webb
discussing a test run of compromise targeting systems scheduled for

(00:26):
the next day. How Lieutenant Wade and specialist Chen found
temporary sanctuary with a humanitarian doctor who helped them transmit
critical intelligence back to American forces. And how National Security
Advisor James Reynolds realized he was being set up as
the fall guy and made a desperate move to save himself.

(00:47):
This is Signal lost. March twentieth, twenty twenty five, Washington,
d C. Five fifteen am. The FBI Tactical Operations Center
had been active throughout the night, the fluorescent lights casting
a harsh glow over agents and analysts working with focused intensity.

(01:09):
Special Agent Thomas Carter stood before a digital display showing
multiple operational feeds, surveillance positions, intelligence reports, and status updates
from teams in the field. Webb left his residence thirty
minutes ago. An agent reported bringing up a satellite image
of a vehicle moving along the George Washington Parkway. He's
not heading to his office or any known associate locations.

(01:33):
Carter nodded, unsurprised. The pieces were falling into place exactly
as he had anticipated. He's running activate all surveillance teams.
I want eyes on every possible exit route from the city.
The raid on Webb's office the previous night had yielded
critical evidence servers containing communications between Obsidian security solutions and

(01:56):
entities linked to Russian intelligence. The financial trails Eliza Morgan
had uncovered were now backed by concrete digital forensics, confirming
the conspiracy's international dimensions. But the most damning evidence had
come from an unexpected source. James Reynolds had walked into
FBI headquarters shortly before midnight, carrying an encrypted drive and

(02:17):
a handwritten statement detailing his knowledge of Web's activities. The
National Security Advisor had made a deal full cooperation in
exchange for consideration during prosecution. Reynolds's information had confirmed their
worst fears. The targeting system breach was real, sophisticated, and
already partially implemented. A test run was scheduled for zero

(02:40):
nine hundred Eastern time, less than four hours from now
involving a drone operation targeting suspected militant locations in eastern Syria.
If the test succeeded, the conspirators would proceed to what
they called Phase three, systematic manipulation of targeting data across
all Middle East operations, creating a pattern of failures and

(03:01):
civilian casualties that would undermine confidence in American precision strike capabilities.
Carter's phone rang a secure line from the Pentagon. We've
implemented the countermeasures, the military liaison reported. All targeting systems
have been isolated from the compromised network. The drone operation
will proceed using standalone verification protocols. Any sign they've detected

(03:25):
our intervention, Carter asked negative. As far as they can tell,
everything is proceeding according to their timeline. It was a
calculated risk by allowing the operation to appear normal while
secretly implementing backup systems, they hoped to identify exactly how
and where the infiltration had occurred. The drone would receive

(03:46):
both the compromised targeting data and the verified coordinates, allowing
analysts to document precisely how the data had been manipulated,
but success depended on capturing those responsible before they realized
their scheme had been discovered. Webb was the key, not
necessarily the mastermind, but the crucial link between foreign interests

(04:07):
and American systems. Without him, they couldn't be certain they'd
identified all potential compromise vectors. Sir an analyst called urgency
in her voice. We've got a hit on Eliza Morgan's location.
Her phone just activated near National Airport. Carter felt his
pulse quicken. Morgan had disappeared the previous night after attempting

(04:29):
to contact her editor. Her last communication had contained critical
intelligence about Webb's meeting with Dmitri Veronin and the planned
test run. Then she had vanished, presumably taken by Web's
security team. Is she moving, Carter asked, yes, heading toward
the terminal vehicle signature consistent with Webb's secondary convoy. Carter

(04:50):
made an immediate decision divert Tactical Team two to the airport.
Alert airport security, but tell them to maintain distance. We
need eyes only until our people are in position. If
Morgan was being taken to the airport, it suggested Webb
was planning to leave the country, possibly with her as
leverage or insurance. The journalist had become a liability to

(05:13):
the conspiracy, but also potentially valuable as a hostage if
things went wrong. The operation was accelerating toward its climax,
multiple elements converging as dawn broke over the capital in Yemen.

(05:33):
Lieutenant Marcus Wade and specialist Jennifer Chen had been moving
through the pre dawn darkness for hours, navigating toward the
extraction coordinates with the aid of the satellite phone provided
by Doctor Linkfist. Their injuries slowed their progress, but desperation
and training kept them moving despite the pain. The extraction
point was a flat area approximately ten kilometers outside Sennah,

(05:56):
open enough for a helicopter landing, but with sufficient topographical
features to provide cover during approach and withdrawal. According to
the encrypted messages they'd received, a special operations team was
already in country, moving to secure the location before the
extraction helicopter arrived. How much farther Chen asked, her breathing

(06:16):
labored as they paused behind an abandoned structure to check
their position. Wade consulted the satellite phone's GPS function. Two
kilometers we need to maintain pace to reach the site
before full daylight. Both understood the calculus of their situation.
Movement after dawn would exponentially increase their risk of detection,

(06:37):
but the extraction team wouldn't wait indefinitely. The political and
military risks of the operation demanded a strict timeline. As
they prepared to continue, the satellite phone vibrated with an
incoming message, Extraction window modified. Hostels moving toward your position
from southwest. Proceed with caution. Check their map, identifying the

(07:01):
new threat. Their pursuers had somehow anticipated their extraction plan
or detected their communications. The route they had been following
was now compromised. We need to adjust, he told Chen,
indicating an alternative approach that would take them through more
difficult terrain but potentially avoid the hostile forces. It's going
to be rough. Chen nodded, determination, overriding exhaustion in her eyes.

(07:27):
Lead the way, Lieutenant. They moved out, abandoning their planned
route for a more circuitous path that would demand everything
remaining of their strength and endurance. The extraction window was closing,
hostile forces were converging, and the intelligence they carried remained
vital to national security. Failure was not an option, no

(07:48):
matter the physical cost at Ronald Reagan National Airport. Eliza
Morgan sat in the back of a black suv, her
wrists zip tied behind her, a security professional on either
side of her. Through the vehicle's tinted windows, she could
see the private aviation terminal, where a Gulf Stream jet

(08:09):
waited on the tarmac, its engines already running. Her abduction
the previous night had been professionally executed, intercepted, leaving the
Roosevelt Hotel, sedated with a precisely administered injection, transported to
a secure location where she had been held until less
than an hour ago. No unnecessary violence, no threats, just

(08:31):
clinical efficiency that spoke to the resources and training of
those involved. Webb sat in the front passenger seat, speaking
quietly into a secure phone. His demeanor betrayed no panic
or urgency, just the focused attention of an executive managing
a complex logistical operation. Nothing in his bearing suggested he
was orchestrating treason on an unprecedented scale. When he finished

(08:56):
his call, he turned to face Eliza, his expression almost apologetic.
I want you to understand that this isn't personal, Miss Morgan.
You're a superb journalist who simply discovered more than was
safe for you to know. Where are you taking me,
Eliza asked, her voice steady despite her situation, Somewhere secure
until certain operations are completed. After that, your status will

(09:20):
depend on developments beyond my control. Webb's candor was somehow
more disturbing than threats would have been. I've made arrangements
for your reasonable comfort during this transitional period. You mean,
until your test run confirms you've successfully compromised America's targeting systems.
Webb's eyebrow raised slightly. You were listening quite attentively at

(09:43):
the Roosevelt. Yes, that's essentially correct, though your understanding of
the technical aspects is necessarily limited. I understand enough, Eliza countered,
you've sold out your country for money, helped foreign powers
infiltrate military systems that will get innocent people killed when
targeting data is manipulated. Something flickered across Webb's face, not

(10:05):
guilt exactly, but perhaps irritation at the simplicity of her characterization.
This isn't about money, miss Morgan, It's about equilibrium. For decades,
America has maintained uncontested dominance in precision warfare capabilities. That
dominance has created dangerous asymmetries in global security dynamics. His

(10:27):
tone was that of a professor explaining a complex concept
to a promising but naive student. What we've facilitated isn't
destruction but balance, introducing just enough uncertainty to restore caution
to military decision making. And the soldiers who died in Yemen,
the ones still being hunted, were they just collateral damage

(10:48):
in your quest for balance, webside, In any significant recalibration
of power, there are costs. I regret those losses, but
their minuscule compared to what unchecked American military dominance has
produced across the globe. Their conversation was interrupted as the
suv approached the private terminal security checkpoint. Webb adjusted his

(11:11):
tie and gave instructions to the security team. We proceed
as planned. Miss Morgan accompanies us aboard as a consultant.
Any interference, we implement contingency three. Eliza had no illusion
about what contingency three might entail, but she also recognized
her value as a hostage. Web wouldn't dispose of her

(11:31):
unless absolutely necessary, not when she represented potential leverage. As
the suv slowed at the checkpoint, Eliza noticed unusual activity,
airport security personnel speaking urgently into radios, additional staff appearing
at strategic points around the terminal. Something was happening. Someone

(11:52):
had identified Webb's escape attempt. Her hypothesis was confirmed moments
later when the driver suddenly accelerated by passing the check
point entirely and speeding directly toward the waiting aircraft. Through
the windows, she could see security personnel scrambling in response,
and in the distance black tactical vehicles converging on the terminal.

(12:13):
They're on to us, the driver reported, tensely FBI tactical
teams approaching from north and east entrances. Web remained remarkably calm,
proceed to the aircraft will be airborne before they can
establish a proper perimeter. But as their suv approached the
Gulf stream, a new development unfolded. The aircraft's door remained closed,

(12:37):
its crew visibly arguing with ground personnel who had positioned
vehicles to block its taxi path. The plane's been grounded,
Eliza said, unable to keep a note of satisfaction from
her voice. Looks like your escape route just closed. Webb's
practiced composure finally cracked frustration flashing across his features before
control reasserted itself divert to secondary extraction. He ordered the

(13:02):
driver waterfront route. The suv swerved away from the aircraft,
accelerating toward a service road that ran along the perimeter
of the airfield. In the side mirror, Eliza could see
the tactical vehicles adjusting course to pursue, but they had
been positioned to contain the aircraft, not intercept a vehicle
departing by a secondary route. Webb had planned for this contingency,

(13:26):
of course, he had a man who orchestrated something as
complex as the targeting system infiltration would have multiple escape
options prepared, but so had the FBI. As the SUV
rounded a corner onto the service road, it encountered a
perfectly positioned roadblock, two armored vehicles creating a V shaped barrier,

(13:46):
tactical officers in position with weapons trained on their approach.
The driver slammed on the brakes, the suv skidding to
a halt less than fifty yards from the blockade. Reverse
web ordered, but before the driver could comply, additional vehicles
appeared behind them, completing the trap. They were boxed in

(14:07):
with no viable escape route. Remaining for several ten seconds,
no one moved. Then Webb made his final calculation, surrender protocol.
He said, quietly, no resistance, no martyrs. The security professionals
acknowledged the order with practiced neutrality, immediately placing their weapons

(14:28):
on the dashboard and raising their hands. Webb himself sat
perfectly still, hands visible on his knees, his expression one
of resigned acceptance. It was over, not with a desperate gunfight,
but with the calm capitulation of a chess player who
recognizes checkmate and sees no value in prolonging an unwinnable game.

(14:52):
As FBI tactical officers approached the vehicle, weapons ready, but
no shots fired, Eliza felt the tension of the past
days begin to drain away. Webb and his immediate operatives
were in custody. The targeting system test would fail. The
conspiracy had been exposed. But even as relief washed over her,
Eliza recognized that this was not a complete victory. Web

(15:15):
was one node in a complex international network. His Russian collaborator,
Voronin was likely already out of the country. The foreign
intelligence services that had designed the infiltration remained active, and
the vulnerabilities in American systems that had made the breach
possible still existed. Even if this specific exploit had been neutralized,

(15:38):
the game wasn't over. It had merely changed phases. At
the extraction point in Yemen, the first rays of dawn
were breaking over the horizon as Way and Chen reached

(16:00):
the designated coordinates. They had pushed themselves beyond exhaustion, beyond pain,
beyond what they had believed themselves capable of enduring. But
they had arrived bloodied, barely standing, but alive and present.
At the critical moment. The area appeared deserted, a flat
expanse of terrain with scattered rock formations providing minimal cover,

(16:23):
no sign of the extraction team, no indication of the
promised security elements. Could we be early, Chen asked, scanning
the horizon with professional wariness. Wade checked the satellite phone. No,
they should be here. A foreboding silence settled over them.
After everything they had endured, the ambush, capture, escape, and

(16:47):
desperate flight across hostile territory, to find the extraction point
empty felt like a final cruel twist of fate. Then
Wade's trained ear caught a sound, the faint but distinctive
wop swap wop of helicopter rotors in the distance, approaching
fast but still beyond visual range take cover. He ordered,

(17:08):
guiding Chen to a nearby rock formation that offered concealment
while maintaining sight lines to the open area where the
helicopter would likely land. The sound grew louder, and then
the aircraft appeared, a black Hawk helicopter moving at maximum speed,
flying dangerously low to avoid detection by air defense systems.

(17:29):
It made a direct approach to the extraction point, but
instead of landing immediately, it circled once. Its crew obviously
scanning for threats or signs of ambush. Wade activated a
small infrared strobe they had received from doctor Linkfist, a
universal signal to American forces that friendlies were present. The
helicopter immediately adjusted its approach, coming in for a rapid

(17:52):
landing in the center of the clear area. As its
skids touched down, the side doors slid open to reveal
a special operations team in full combat gear, the extraction
force that had been promised. Two operators jumped out, establishing
a security perimeter. While scanning for the strobe signal. Wade
and Chen emerged from cover, moving as quickly as their

(18:13):
injuries permitted toward the waiting aircraft. One of the operators
spotted them and immediately moved to assist, recognizing their condition
and providing support as they covered the final distance. Lieutenant
Wade specialist Chen, the operator confirmed. As they reached the
helicopter affirmative. Wade responded, helping Chen climb aboard, just US

(18:36):
Captain Santiago didn't make it out. The operator nodded grimly,
assisting Wade into the aircraft before returning to his security position.
The pilot kept the rotors at operational speed, ready for
immediate departure. Once the team was secure thirty seconds, the
crew chief announced over the internal communication system hostile forces

(18:58):
approaching from multiple vectors. Through the open door, Wade could
see dust clouds on the horizon vehicles moving at high
speed toward their position. Whether they were the same forces
that had held them captive or local militants was impossible
to determine, but their intentions were clear. The extraction window
was closing rapidly. The remaining operators returned to the helicopter,

(19:21):
taking defensive positions as the aircraft began to lift off
in the distance, muzzle flashes indicated their pursuers had opened fire,
though at this range the shots posed minimal danger to
the rapidly ascending helicopter. As they gained altitude and speed
banking away from the approaching hostels, Wade felt a weight

(19:41):
lifting from his chest. They had made it against overwhelming odds.
They had escaped with the critical intelligence that could prevent
a devastating compromise of American military systems, but the cost
had been high. Four team members dead in the initial ambush,
Captain Santiago almost certainly killed or recaptured during their escape,

(20:04):
and even now, the physical toll of their ordeal was
evident in Chen's labored breathing beside him, in the pain
that radiated through his own body with each movement of
the helicopter. Victory and loss inextricably intertwined the eternal paradox
of their profession. A medic moved to attend their injuries,
administering pain medication and checking their vital signs. Wide allowed

(20:28):
the professional ministrations while his mind remained fixed on their
unfinished mission. They were safe now or soon would be,
but the intelligence they carried still needed to reach the
highest levels of command. We need secure communications, he told
the team leader direct line to scentcom. This can't wait
until we reach base. The operator nodded, fully grasping the

(20:52):
urgency secure comms available. Once we reached cruising altitude five minutes,
Wade leaned back, allowing himself a moment's respite while they
climbed to safer airspace five minutes until they could deliver
their warning. He hoped it would be in time. In Washington,

(21:19):
the Pentagon's Sensitive Compartmented Information Facility dedicated to drone operations
was at maximum alert status. The planned operation in eastern
Syria was proceeding, but with critical modifications implemented based on
the intelligence received overnight. General Harriet Mitchell, Deputy Director for Operations,
stood watching as her team executed the complex countermeasures designed

(21:42):
to identify exactly how the targeting system had been compromised.
Multiple redundant systems had been activated, each operating independently to
verify targeting data and flight parameters. Drone approaching target area,
the mission controller announced all systems nominal initiate comparison protocol.

(22:02):
Mitchell ordered, show me what they're trying to feed us
versus actual coordinates. A split screen appeared on the main display,
showing two sets of targeting data. On the left, the
verified coordinates for the militant compound that was the operation's
legitimate target. On the right, the data flowing through the
compromise system, coordinates that would have directed the strike nearly

(22:24):
half a kilometer away into a residential neighborhood. Mitchell's jaw tightened.
Record everything, full forensic capture of the data manipulation. This
is the evidence we need. As the drone continued its approach,
the targeting systems registered the conflicting coordinates, but followed the
verified data path as programmed. The weapon systems engaged striking

(22:49):
the militant compound with precision, while completely avoiding the civilian
area that would have been hit if the compromise had
gone undetected. Strike complete, the controller confirmed target neutralized, no
collateral damage detected. Mitchell allowed herself a moment of grim satisfaction.
They had prevented what would have been a devastating mistake,

(23:13):
one designed to undermine confidence in American precision strike capabilities
and potentially cause a significant strategic withdrawal from the region.
Now we wait, she said, turning to the FBI liaison
present for the operation. If they were monitoring, they'll know
their test failed. How they respond will tell us whether
we've contained the full extent of the breach. Back at

(23:37):
FBI headquarters, Thomas Carter received the update from the Pentagon
with cautious optimism. The targeting system compromise had been identified
and countered successfully. Webb was in custody along with his
immediate security team. Morgan was safe, already providing a detailed
statement about what she had overheard during Webb's meeting with Veronin,
But crucial questions remained. How did the infiltration go, were

(24:02):
their additional access points they hadn't yet discovered, and most importantly,
what was the current status of Captain Santiago, who represented
the final piece of the authentication sequence the conspirators needed.
Carter's phone rang a secure line from the Joint Special
Operations Command. Extraction successful, the caller reported, without preamble, Lieutenant

(24:26):
Wade and Specialist Chen recovered en route to secure medical facility.
Santiago's status remains unknown, presumed kia or captured. What's their condition,
Carter asked, Stable but requiring significant medical attention, both conscious
and able to communicate. They've provided preliminary intelligence, confirming everything

(24:47):
we suspected about the targeting system compromise. It was the
best possible outcome given the circumstances. Two of the three
captured Americans rescued, carrying intelligence that would help secure military
systems again further infiltration attempts, but Santiago's fate remained a
critical concern, not just for humanitarian reasons, but because her

(25:08):
biometric authentication, if successfully extracted, could still provide access to
certain systems. Keep me updated on any new intelligence they provide.
Carter instructed, particularly anything regarding Santiago's last known status or location.
After ending the call, Carter returned to the Tactical Operations Center,

(25:30):
where analysts were processing the evidence seized from Web's devices
and Obsidian servers. The financial trails were becoming clearer shell
companies leading back to Russian intelligence fronts, with indications of
Chinese involvement as well. It was a textbook example of
modern hybrid warfare. Not a direct cyber attack that would
constitute an overt act of aggression, but a sophisticated infiltration

(25:53):
using human intelligence, compromised contractors, and carefully targeted system vulnerabilities
to create persistant access that could be exploited over time.
Sir an analyst called urgency in her voice. We've found
something in Web's encrypted communications. A facility in Yemen appears
to be where the captured Americans were held. Recent messages

(26:16):
indicate activity consistent with rapid evacuation. Carter moved to review
the intelligence, recognizing its significance, immediately notify JSOC. This could
be our best lead on Santiago's current location. If the
facility was being evacuated, it suggested the conspirators were cutting losses,

(26:37):
destroying evidence, and potentially eliminating witnesses, including any remaining captives.
Time was critical if there was any hope of finding
Santiago alive. As these events unfolded across multiple continents, Mira

(26:59):
Patel's sat in the witness preparation room at the Senate
Office Building, reviewing her notes before testifying before the Intelligence Committee.
Her decision to come forward with evidence about the signal
chat breach in Reynolds's subsequent obstruction had ended her government career,
but potentially saved countless lives. An aid entered with a
message Franklin Webb had been arrested attempting to flee the country.

(27:23):
The test run of the compromise targeting system had failed.
Two of the three captured soldiers had been successfully extracted
from Yemen. Mira closed her eyes briefly, allowing relief to
wash over her. Her actions had contributed to this outcome,
not alone, but as part of a chain of individuals
who had chosen country over career, truth over expediency, moral

(27:45):
clarity over comfortable complicity. When she opened her eyes, she
saw James Reynolds being escorted into the same waiting area,
accompanied by FBI agents and his attorney. Their eyes met
across the room, colleagues, now on opposite sides of the
most significant security breach in recent history. Reynolds looked diminished,

(28:06):
the confident bearing of the national security adviser replaced by
the slumped posture of a man confronting the consequences of
his choices. His last minute cooperation with the FBI had
likely saved him from the most severe charges, but his
career and reputation were destroyed beyond redemption. He nodded to her,
a silent acknowledgment that she had been right all along.

(28:29):
She returned the gesture, not with satisfaction or vindication, but
with the solemn recognition that They had both been players
in events whose full dimensions they were only beginning to understand.
Six hours later, as evening fell over Washington, Eliza Morgan
sat in a secure FBI facility finishing the most important

(28:50):
article of her career. The piece would detail the full
scope of the conspiracy, the targeting system, compromise, Webb's role,
the foreign connections, and the strategic implications of what had
nearly occurred. The FBI had reviewed the article for sensitive
information that might compromise ongoing operations, but had otherwise granted

(29:10):
her remarkable latitude to tell the complete story. They recognized,
as she did, that transparency was essential to restoring public
confidence and insuring accountability. As she wrote the final paragraphs,
Eliza reflected on the chain of events that had begun
with a simple notification on her phone. An accidental addition

(29:31):
to a signal chat group discussing classified military operations that
seemingly minor security lapse had exposed a conspiracy of extraordinary
sophistication and potentially devastating consequences. Her phone rang her editor,
calling with news that would reshape her conclusion. They found Santiago,

(29:52):
He told her, his voice tight with emotion alive but
in critical condition. Special operations team extracted her from a
convoy attempting to move her across the border into Saudi Arabia.
Eliza's hands trembled as she absorbed this development when less
than an hour ago. It's not public yet, but they're

(30:12):
letting us break it alongside your main story. They want
the full narrative out there. It was the final piece
of the puzzle, not just for her article, but for
her own sense of closure on these events. Captain Santiago
had been the central target of the entire operation, the
bearer of access credentials that represented the final key to

(30:32):
compromising America's targeting systems. Her capture had been the conspirator's
greatest success, her rescue, their ultimate failure. Send me what
you have, Eliza said, already restructuring her conclusion to incorporate
this development. I'll integrate it and file within the hour.
As she returned to her writing, Eliza found herself reflecting

(30:56):
on the individual courage that had ultimately thwarted the conspiracy.
Santiago's sacrifice to allow her team members to escape wide,
and Chen's determination to deliver critical intelligence despite their injuries.
Mira's decision to come forward, despite the professional consequences, even
Reynold's belated cooperation when confronted with the full implications of

(31:17):
his actions, Large systems could be compromised, sophisticated technologies could
be infiltrated, but individual human beings acting with moral clarity
and physical courage remained the ultimate defense against threats to
national security and democratic values. That was the story she
would tell. Three weeks later, a small gathering assembled in

(31:42):
a private room at Walter Reed National Military Medical Center.
Captain Maya Santiago, still recovering from her injuries but now
stable and alert, sat in a wheelchair as the Secretary
of Defense presented her with the Distinguished Service Cross for
Extraordinary Heroism in combat. Lieutenant Wade and Specialist Chen, themselves
still healing but able to stand, received silver Stars for

(32:05):
their gallantry during escape and their crucial role in delivering
intelligence that had prevented a catastrophic compromise of military systems.
The ceremony was closed to the press, with only family
members and a few senior officials present. The full story
of Operation Sandstorm and its aftermath remained classified in its
specific details, though the broader narrative had emerged through Eliza

(32:29):
Morgan's reporting and carefully managed government disclosures. After the formal presentations,
Santiago spoke privately with Wade and Chen, the first time
all three had been together since their desperate escape attempt
in Yemen. The doctor who helped you, Santiago said, her
voice still weak but gaining strength. Linkvist they found her

(32:49):
two days ago. Weighe tensed, fearing the worst. Alive, Santiago nodded.
They came looking for her after you escaped, but she
had already arranged transport to a doctor's without Borders facility
in Jordan. She's safe. It was one small mercy amid
the broader tragedy of what had occurred. Doctor Linkfist had

(33:11):
risked everything to help American soldiers she didn't know, guided
by her commitment to preventing the suffering that would result
from compromised targeting systems and webb. Chen asked the question
all of them had been wondering cooperating according to my briefings,
Santiago replied, trading information for considerations in sentencing. The network

(33:33):
behind him is still being mapped, but we've closed the
vulnerability in our systems. What went unsaid was that new
vulnerabilities would inevitably emerge, New adversaries would identify new attack vectors,
and the endless cycle of security and compromise would continue.
The nature of modern warfare demanded constant vigilance against threats

(33:53):
that evolved as rapidly as the technologies they targeted. But
for now, for this moment, they had won. Three soldiers
who had faced impossible odds, had survived, had completed their mission,
had prevented what could have been a devastating blow to
American military capabilities and the strategic balance that depended on them.
As the small gathering concluded and attendees began to disperse,

(34:16):
Eliza Morgan waited respectfully near the exit. She had been
invited not as a journalist, but as a participant in
the events, being recognized someone whose actions had contributed to
the outcome being celebrated. Santiago noticed her and gestured for
her to approach. When she did, the Captain extended her hand.
Thank you, Santiago said, simply forgetting the truth out, for

(34:40):
making sure what happened wasn't buried or forgotten. Eliza took
her hand, struck by the quiet strength still evident despite
Santiago's injuries. I just reported what happened. You and your
team did the hard part. Santiago shook her head. Slightly
different battlefields, same war. Truth matters as much as targeting systems,

(35:03):
maybe more. It was an insight that resonated deeply with
Eliza's own understanding of her role as a journalist. In
an era of hybrid warfare, where information operations were as
strategically significant as kinetic actions, the pursuit and defense of
truth was not separate from national security, but essential to it.

(35:24):
Two months later, on a warm spring evening, I met
Eliza Morgan at a quiet bar in Georgetown, the same
establishment where she had once monitored Franklin Webb's meeting with
Dmitri Voronin. She had just returned from receiving the Pulitzer
Prize for her reporting on the signal breach in its aftermath,
a professional recognition that seemed almost secondary to the impact
her work had achieved. They're calling it a new model

(35:47):
for national security journalism, I noted, as we settled into
a corner booth, aggressive reporting that exposed a conspiracy while
working with authorities to prevent harm. Eliza smiled, slightly uncomfortable
with the frame I just did my job, asked questions,
followed leads. The circumstances were exceptional, not my methods. Her

(36:10):
modesty was genuine but incomplete. Her decisions throughout the crisis,
when to publish, what to withhold, how to balance public
interest against potential harm, had required extraordinary judgment under pressure.
She had demonstrated that independent journalism and national security were
not inherently adversarial, but could, in the right circumstances, serve

(36:33):
complementary functions in a healthy democracy. What about you, she asked,
changing the subject, your book on the whole affair is
generating quite the buzz, I shrugged. Publishers love espionage with
a technological angle, and having interviewed most of the key
players gives me a perspective others don't have. What I

(36:54):
didn't say was that the book represented my own attempt
to make sense of events that had revealed deep vulnerabilities
in American security systems, not just technological, but human and institutional.
The Signal breach had exposed how individual decisions, organizational cultures,
and systemic pressures could combine to create catastrophic security failures,

(37:16):
even with the best intentions of those involved. Have you
spoken with Santiago. Recently, I asked Eliza, nodded, she's returning
to active duty next month. Limited capacity initially, but she
insisted on continuing her service, and Webb still cooperating. According
to my sources, the investigation has expanded to include technology

(37:39):
firms with connections to Obsidian. Several executives have resigned or
been placed on leave pending further inquiry. Webb's full cooperation
had revealed a conspiracy more extensive than initially understood, a
year's long operation by Russian intelligence with Chinese support to
infiltrate American military systems through a combination of technical exploits

(38:01):
and human compromise. His testimony had led to the identification
of additional access points, the closure of vulnerabilities, and enhanced
security protocols across multiple agencies, but the larger strategic challenge remained.
America's technological superiority and precision warfare represented both a critical
advantage and a tempting target for adversaries seeking asymmetric approaches

(38:25):
to balancing power. The signal breach had been thwarted, but
similar operations were almost certainly underway elsewhere, targeting different systems
through different vectors. Do you think we're safer now, Eliza asked,
the question, cutting to the heart of what both of
us had been contemplating. I considered my response carefully. The

(38:46):
specific vulnerability has been addressed, new safeguards have been implemented,
The individuals directly involved have been held accountable, but were
still dependent on systems that, by their nature can never
be deletely secure, and on human beings who, despite their
best intentions, will always have vulnerabilities of their own ambition, fear, greed,

(39:09):
ideological conviction. Eliza nodded, understanding the inherent tension between technological
capability and security that defined modern warfare and governance. So
we remain vigilant, she said. We keep asking questions, we
keep challenging official narratives, we keep reminding those in power

(39:29):
that accountability matters, and we hope it's enough, I added,
raising my glass in a quiet toast to those whose
courage had prevented a catastrophe, the soldiers who had fought
their way home with critical intelligence, the officials who had
chosen truth over career preservation, and the journalists sitting across
from me who had followed a signal to its source

(39:51):
exposing a conspiracy that might otherwise have succeeded. They had
won this round in the endless contest between security and vulnerability,
transparen and secrecy, democratic values and authoritarian ambitions. But the
game continued evolving with each technological innovation and geopolitical shift.

(40:11):
The signal had been restored for now. The question was
whether we would recognize the next time it was lost.
Signal Lost is a production of Calaroga Shark Media executive
producers Mark Francis and John McDermott. The assistance of AI

(40:33):
was used in the production of this show.
Advertise With Us

Popular Podcasts

Stuff You Should Know
Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Special Summer Offer: Exclusively on Apple Podcasts, try our Dateline Premium subscription completely free for one month! With Dateline Premium, you get every episode ad-free plus exclusive bonus content.

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.