All Episodes

March 30, 2025 22 mins
In the devastating aftermath of the Yemen ambush, Washington erupts into a frenzy of damage control and blame-shifting. National Security Advisor Reynolds faces increasing isolation as evidence of the Signal breach mounts, while his deputy Mira takes matters into her own hands. Journalist Eliza Morgan uncovers disturbing patterns in the chat messages suggesting someone was impersonating senior officials. In Yemen, Captain Santiago awakens to discover her captors aren't typical insurgents but professional mercenaries with a specific mission: extracting her military access credentials.

Meanwhile, private military contractor Franklin Webb approaches Reynolds with unsettling information and an offer of "unofficial assistance." As three separate investigations converge, digital footprints lead toward a conspiracy far larger than anyone imagined.

Unlock an ad-free podcast experience with Caloroga Shark Media! Get all our shows on any player you love, hassle free! For Apple users, hit the banner on your Apple podcasts app. For Spotify or other players, visit caloroga.com/plus. No plug-ins needed!

Subscribe now for exclusive shows like 'Palace Intrigue,' and get bonus content from Deep Crown (our exclusive Palace Insider!) Or get 'Daily Comedy News,' and '5 Good News Stories’ with no commercials! Plans start at $4.99 per month, or save 20% with a yearly plan at $49.99. Join today and help support the show!


We now have Merch!  FREE SHIPPING! Check out all the products like T-shirts, mugs, bags, jackets and more with logos and slogans from your favorite shows! Did we mention there’s free shipping? Get 10% off with code NewMerch10 Go to Caloroga.com


Get more info from Caloroga Shark Media and if you have any comments, suggestions, or just want to get in touch our email is info@caloroga.com
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:04):
My name is Daniel Marsh. Last time I told you
about a catastrophic security breach that left four American soldiers
dead and three captured in Yemen, A special operations team
led by Captain Maya Santiago walked into a perfectly orchestrated trap,
A trap made possible because someone gained access to a
signal chat group where high level government officials were discussing

(00:26):
classified military operations. This is Signal Lost. March sixteenth, twenty
twenty five, Washington, d C. Seven thirty two am. The
news hadn't broken yet. Four American soldiers were dead on
foreign soil, three more in enemy hands, and the American

(00:48):
public remained blissfully unaware. That would change within hours, But
for now, a small circle of government officials scrambled to
understand what had gone catastrophically wrong. In the White House
situation room, the atmosphere was funereal. National Security Adviser James

(01:10):
Reynolds sat stone faced at the conference table, his fingers
steepled before him, as various military and intelligence officials delivered
their preliminary assessments. None of them had slept, The coffee
had grown cold in their cups. The weight of lives
lost hung in the air like smoke. The ambush was
too precise. General Harris, the chairman of the Joint Chiefs,

(01:31):
was saying. His voice carried the weathered authority of a
man who had seen combat across four decades. They knew
exactly where our people would be and when. This wasn't
luck or good intelligence on their part, this was a compromise.
Reynolds felt Mira Patel's eyes on him from across the table.
She hadn't spoken since sharing her discovery about the unknown

(01:52):
number in the signal group. She didn't need to. Her
silence was accusation enough. The President entered and everyone rose.
He looked as though he'd aged five years overnight. I
want answers, he said, simply taking his seat, And I
want options for getting our people back. Reynolds cleared his throat,

(02:14):
Mister President, we're exploring all possibilities for how the operation
was compromised. In the meantime, Sentcom has mobilized rescue assets
and intelligence is working to locate the captives. What about
this signal business, the President asked, his eyes boring into Reynolds.
My chief of staff tells me there's concern about operational security.

(02:38):
A cold sweat broke out on Reynolds's forehead. Mira had
gone to the Chief of staff. Of course she had.
We used signal for coordination, sir, but there's no evidence
yet that it was the source of the leak. The
lie felt bitter on his tongue. Mira stiffened visibly, but
remained silent professional to the core. The President's eyes narrowed.

(03:00):
I expect a full security audit every communication channel, every
person with knowledge of the operation. If someone betrayed our people,
I want to know who and I want them held accountable.
As the meeting continued, Reynolds found himself increasingly isolated. Colleagues
who had joked with him yesterday now avoided eye contact.

(03:21):
The Secretary of Defense, who had enthusiastically participated in the
signal chat, was conspicuously redirecting blame toward intelligence failures. The
vultures were already circling looking for someone to take the fall.
Reynolds knew the rules of Washington well enough to recognize
when a sacrifice was being prepared. Meanwhile, across town in Georgetown,

(03:44):
Eliza Morgan was experiencing her own crisis of conscience. She
had witnessed in real time, the planning that had led
to American deaths. She had evidence that top officials had
violated basic security protocols. It was the story of a lifetime,
and yet she hesitated. Publishing now could compromise efforts to
rescue the captured soldiers. It could damage national security in

(04:08):
ways she couldn't fully anticipate. But waiting meant giving those
responsible time to cover their tracks, to create narratives that
absolved them of responsibility. She called me that morning, her
voice tight with tension. Daniel, I need your advice, she said.
I've got screenshots of the entire signal conversation, names, operational details,

(04:32):
time stamps, everything. It proves they were recklessly using an
unsecured platform for classified communications. It proves they got those
soldiers killed. You need to be very careful, I told her,
this isn't just a story. If you have what you
say you have, there are people who would kill to
keep it quiet. I know, she said quietly. That's why

(04:55):
I've made insurance arrangements. If anything happens to me, copies
go to you and two other journalists. A chill ran
through me. I'd known Eliza for years, and she'd never
been prone to paranoia. Have you approached any officials, I asked,
Not yet, she replied, but I'm considering contacting the inspector

(05:16):
General for the Defense Department. They're supposed to be independent.
No one's truly independent in this town, I warned her,
especially not with something this explosive. After we hung up,
Eliza began methodically compiling her evidence. She created a secure
archive of screenshots, notes, and timestamps. She had worked national

(05:39):
security long enough to know how official denials would play out.
They would claim the chat was just for scheduling. They
would say no classified information was shared. Her evidence needed
to be airtight. As she reviewed the messages, she noticed
something she'd initially overlooked, the pattern of irregular communications from
the account labeled DNI Harris. She'd assumed it was simply

(06:02):
the Director of National Intelligence using different styles when rushed
or dictating messages to an AID. Now she saw it
more clearly, two distinct writing patterns from the same account.
She began separating the messages, creating two columns on her laptop.
Sure enough, there were undeniable linguistic differences. One user wrote

(06:23):
in complete formal sentences with precise punctuation. The other used
shorter phrases, abbreviations, and seemed less concerned with grammatical precision.
Same account, almost certainly different people. Someone had compromised the
DNI's signal account, or perhaps the DNI was sharing access
with someone else, which would be another serious security violation.

(06:47):
Either way, it was a digital footprint that shouldn't exist
in Yemen. Captain Maya Santiago drifted in and out of consciousness.
The pain from her shrapnel wounds kept her tethered to reality,

(07:07):
which was both a blessing and a curse. The room
where they held her was windowless and smelled of mold
and something metallic, blood, probably her own. Her captors had
bandaged her injuries roughly but effectively. They wanted her alive,
at least for now. Through the haze of pain and dehydration,

(07:28):
Santiago focused on gathering intelligence. Her training had prepared her
for this possibility, however remote it had seemed. When they'd
boarded the helicopters yesterday, she listened for voices, footsteps, any
clue about where she was being held and by whom.
The voices she heard weren't what she expected, not the
local dialect, not even Arabic. At least not primarily. She

(07:52):
caught fragments of conversations in English, Russian, and what sounded
like farci professional mercenaries, not local insurgents. This wasn't a
standard capture by hostile forces. This was something else entirely.
When they came for her, they came with a doctor,

(08:14):
a thin man with wire rimmed glasses and gentle hands
that contrasted with his cold eyes. He examined her wounds,
replaced bandages, and administered antibiotics through an IV. He spoke
to her in accented English. You are fortunate, he said,
checking her pupils with a penlight. The shrapnel missed major vessels.

(08:35):
You will recover if infection does not set in. Where
are my people, Santiago asked, her, voice a dry rasp.
The doctor's expression revealed nothing. I treat only you. Who
are you working for? A thin smile. I work for
whoever pays today. That is not your government. Later, a

(08:58):
different man entered, tall, with close cropped gray hair and
the unmistakable bearing of military training. He carried himself like
an officer, someone accustomed to command. His English was impeccable,
with only the faintest Eastern European accent, Captain Santiago, he said,
pulling up a metal chair beside her. Cot I hope

(09:20):
the doctor has made you comfortable. Santiago said nothing, maintaining
the blank expression she had practiced for precisely this scenario.
You're wondering why you're still alive, the man continued, Why
we went to such lengths to capture you, specifically, why
we treated your wounds instead of simply killing you like
your colleagues. A flicker of pain crossed Santiago's face at

(09:44):
the mention of her dead team members. She suppressed it immediately,
but not before her captor noticed. You have something we want,
he said, leaning forward access codes, authentication credentials, the digital
keys to certain American system Santiago almost laughed, despite the pain,
you staged an elaborate ambush because you think I carry

(10:06):
classified access codes into combat. The man's smile never reached
his eyes. Not all combat is physical, Captain, the battlefield
has evolved. You have access to systems that interest my employer.
Your biometrics alone are valuable, but your willing cooperation would
be more efficient. I won't help you, Santiago said, flatly,

(10:32):
not yet. The man agreed, standing, but people change their
minds when properly motivated. We have your colleagues as well.
Remember sometimes watching others suffer is more persuasive than personal pain.
After he left, Santiago fought against despair. The pieces were
beginning to align. This wasn't a random capture or even

(10:55):
a retaliatory strike against American forces. This was a targeted
operation to gain access to secure systems systems she indeed
had credentials for as a special operations commander. The implications
were staggering. This wasn't just about Yemen or insurgents or
regional conflicts. Someone wanted access to American military networks and

(11:17):
they'd orchestrated an elaborate trap to get it, which meant
they likely had inside information about her mission, about her
clearance levels, about her role. Someone had sold her out,
and she was determined to find out who. Back in Washington,

(11:42):
the first press reports about the failed Yemen operation were
beginning to emerge. Initial Pentagon statements acknowledged only that an
operation had taken place and that there were casualties being assessed,
no mention of captured personnel, no details about the mission's purpose.
The sanitized public narrative was already being constructed in his

(12:03):
office at the White House, Reynolds was frantically trying to
contain the damage. He had ordered the signal group deleted,
but he knew that digital footprints were never truly erased.
The messages had been set to disappear after twenty four hours,
but screenshots could exist, server logs could be subpoened. The
truth had a way of emerging, especially in Washington. His

(12:26):
phone rang private number. Reynolds, he answered, tersely, we need
to meet. The voice belonged to Franklin Webb, CEO of
Obsidian Security Solutions, a private military contractor with extensive government contracts.
Webb's company had provided intelligence support for Operation Sandstorm. Not

(12:48):
a good time, frank make time, Webb replied, his tone,
leaving no room for argument. The Jefferson Memorial one hour,
come alone. Reynolds wanted to refuse, but Webb had been
a major campaign donor to the president. His company employed
former Special Forces operators, intelligence analysts, and cyber experts who

(13:12):
supplemented America's official military capabilities. He wasn't someone Reynolds could
afford to alienate, especially now, fine, Reynolds said, ending the call.
An hour later, Reynolds found Webb waiting on a bench

(13:33):
with a view of the title basin. Cherry blossoms were
beginning to emerge, pink buds, promising eventual beauty after the
long winter. Few tourists were around on this cold March morning.
Webb didn't waste time on pleasantries. You have a serious problem.
I'm aware, Reynolds replied stiffly, No, I don't think you are.

(13:56):
Webb handed him a manila envelope. Someone accessed the D
and I saygnal account two days before the operation. They
monitored every message. They knew exactly what you were planning,
where your teams would be, and when they would arrive.
Reynolds opened the envelope. Inside was a technical report detailing
the infiltration of Director Harris's signal account. How did you

(14:17):
get this? My company provides cybersecurity services to various agencies.
We detected anomalies but couldn't confirm the breach until after
the fact. Webb's face was grim. This wasn't some random hack.
This was a sophisticated operation targeting specific officials involved in
planning the Yemen mission. Why bring this to me instead

(14:38):
of proper channels? Webb's laugh was short and humorless because
proper channels are compromised. Think about it. Someone had to
add the unknown number to your signal group, someone with access,
someone on the inside. The implication hung in the air
between them, a trader in the highest levels of government.

(14:59):
What do you want, Reynolds asked, finally, the same thing.
You want to find who's responsible and limit the damage.
Webb stood, buttoning his coat against the chill. My company
has resources that can operate outside official constraints. Let us
help you. And why would you do that? Webb's smile

(15:19):
was thin. Let's just say we have aligned interests. The
success of companies like mine depends on American military dominance.
If your enemies can compromise your most sensitive operations, that's
bad for business. As Webb walked away, Reynolds was left
with the unsettling feeling that he was being manipulated, but
he was running out of options and allies. If Webb's

(15:42):
information was accurate, the breach was far worse than he
had imagined, and the hunt for the culprit would lead
into the heart of America's national security establishment. Meanwhile, in
a basement apartment in northern Virginia, a man will call
Alex finished transferring the last of the files from his
laptop to an encrypted drive. His hands moved with practiced efficiency,

(16:06):
his face illuminated by the blue glow of the screen.
He had been monitoring the fallout from the Yemen operation
with professional detachment. The operation had gone exactly as planned.
American forces ambushed, valuable assets, captured, confusion and finger pointing
among officials. Now came the more challenging phase, leveraging the

(16:27):
captured special operations personnel to gain access to secure military networks.
The face of Captain Santiago appeared on his screen, her
military ID photo alongside her service record and security clearance details,
the kind of information that should never have been accessible

(16:47):
to someone like him. His phone vibrated with an encrypted message,
confirm package secure. He typed a response confirmed, Phase two initiating.
Alex closed his laptop and looked around the sparse apartment.
Time to move. The safe house had served its purpose,

(17:07):
but staying in one location too long was risky, especially
now that people would be looking for connections. He packed methodically,
wiping down surfaces to remove fingerprints. The digital trail was
harder to erase, but he had taken precautions. Multiple proxies,
spoofed IP addresses, burner devices purchased with cash. Still, he

(17:29):
knew better than to underestimate American intelligence capabilities. They would
be hunting for him now, piecing together fragments of evidence
following the digital breadcrumbs, but they would be looking in
the wrong places. The beauty of the operation was its misdirection.
By the time they understood what had really happened, it

(17:50):
would be too late. As Eliza Morgan continued analyzing the
signal messages, a new pattern emerged. She created a timeline

(18:11):
of every message, noting who sent it and when. Then
she cross referenced this with public information about the participant's
known locations during those timeframes. A discrepancy emerged. Secretary of
Defense Garrison had sent messages during a period when he
was publicly documented as being in a classified briefing with
no electronic devices allowed. Either the public schedule was false

(18:35):
or someone else had been using his account. She needed
to verify this discrepancy before going public. She needed a
source who could confirm Garrison's actual whereabouts without revealing her investigation.
Eliza scrolled through her contacts, considering and rejecting names until
she landed on Marcus Reed, a mid level Pentagon press

(18:56):
officer she'd cultivated over the years. He wasn't senior enough
to be directly involved in Operation Sandstorm, but he had
access to the building security logs and the secretary's detailed schedule.
She called him, keeping her tone casual, asking about an
unrelated story while working the conversation around the secretary's recent activities.

(19:16):
Red was cautious but helpful, confirming that Garrison had indeed
been in a skiff during the time in question, with
all electronic devices surrendered at the door as per protocol.
Another digital footprint that shouldn't exist, another piece of the puzzle.
After hanging up, Eliza sat back, the implications washing over her.

(19:40):
This wasn't just negligence or poor security practices. This was
deliberate deception. Somewhere in the highest levels of government, someone
was impersonating senior officials, inserting themselves into classified communications. The
question was no longer just how the Yemen operation had
been compromised, but why? What was the endgame? Who stood

(20:01):
to benefit from the ambush of an American special operations team.
As night fell over Washington, different players in this unfolding
drama reached their own conclusions and made their moves. Reynolds
accepted Webb's offer of unofficial assistance, authorizing the private contractor
to conduct a parallel investigation outside government channels. Mira Patel,

(20:26):
increasingly concerned about Reynolds's behavior, reached out to a trusted
contact at the FBI's National Security Branch, sharing her suspicions
while being careful not to reveal classified details. In the
White House, the President authorized a top secret task force
to determine how the operation had been compromised and to
develop options for rescuing the captured Americans and in Yemen,

(20:50):
Captain Santiago began working on her own plan. Her captors
had made a critical mistake. They had assumed her tactical
value lay solely in her access credentials. They had underestimated
her training, her resourcefulness, and most importantly, her determination. As
she lay in her makeshift cell, timing the guard rotations

(21:13):
and testing her injured body's capabilities, Santiago made a promise
to herself and her fallen comrades. She would escape, she
would survive, and she would expose whoever had betrayed them,
no matter how high the conspiracy reached. The digital footprints
were everywhere now, in signal chats, in authentication logs, in

(21:36):
the electronic ghosts of messages that should never have existed.
The evidence was fragmenting, spreading across systems and agencies, becoming
harder to track or contain. But the truth was there,
hidden in the data, and three separate investigations were now
converging on it from different directions. The hunt was on.

(21:57):
The only question was who would find the answers first
and what they would do with them. Signal Lost is
a production of Calaroga Shark Media Executive producers Mark Francis
and John McDermott. The assistance of AI was used in

(22:20):
the production of this show
Advertise With Us

Popular Podcasts

My Favorite Murder with Karen Kilgariff and Georgia Hardstark

My Favorite Murder with Karen Kilgariff and Georgia Hardstark

My Favorite Murder is a true crime comedy podcast hosted by Karen Kilgariff and Georgia Hardstark. Each week, Karen and Georgia share compelling true crimes and hometown stories from friends and listeners. Since MFM launched in January of 2016, Karen and Georgia have shared their lifelong interest in true crime and have covered stories of infamous serial killers like the Night Stalker, mysterious cold cases, captivating cults, incredible survivor stories and important events from history like the Tulsa race massacre of 1921. My Favorite Murder is part of the Exactly Right podcast network that provides a platform for bold, creative voices to bring to life provocative, entertaining and relatable stories for audiences everywhere. The Exactly Right roster of podcasts covers a variety of topics including historic true crime, comedic interviews and news, science, pop culture and more. Podcasts on the network include Buried Bones with Kate Winkler Dawson and Paul Holes, That's Messed Up: An SVU Podcast, This Podcast Will Kill You, Bananas and more.

24/7 News: The Latest

24/7 News: The Latest

The latest news in 4 minutes updated every hour, every day.

Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.