All Episodes

April 20, 2025 34 mins
As pressure mounts from multiple directions, Franklin Webb testifies before the Senate Intelligence Committee, carefully avoiding any mention of targeting systems while projecting calm confidence. Meanwhile, Eliza Morgan uncovers disturbing financial connections between Webb's company and Russian interests, leading her to risk everything on a dangerous surveillance operation that reveals the conspiracy's terrifying endgame – not to destroy American military systems but to subtly undermine confidence in them through manufactured "glitches."

In Yemen, Lieutenant Wade and Specialist Chen find temporary sanctuary with a humanitarian doctor who helps them transmit critical intelligence and reveals the human cost of compromised targeting systems. As the FBI investigation connects more dots between Webb, foreign entities, and the targeting system breach, National Security Advisor Reynolds realizes he's being set up as the fall guy and makes a desperate move to save himself by offering evidence against his former allies.

Unlock an ad-free podcast experience with Caloroga Shark Media! Get all our shows on any player you love, hassle free! For Apple users, hit the banner on your Apple podcasts app. For Spotify or other players, visit caloroga.com/plus. No plug-ins needed!

Subscribe now for exclusive shows like 'Palace Intrigue,' and get bonus content from Deep Crown (our exclusive Palace Insider!) Or get 'Daily Comedy News,' and '5 Good News Stories’ with no commercials! Plans start at $4.99 per month, or save 20% with a yearly plan at $49.99. Join today and help support the show!


We now have Merch!  FREE SHIPPING! Check out all the products like T-shirts, mugs, bags, jackets and more with logos and slogans from your favorite shows! Did we mention there’s free shipping? Get 10% off with code NewMerch10 Go to Caloroga.com


Get more info from Caloroga Shark Media and if you have any comments, suggestions, or just want to get in touch our email is info@caloroga.com
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:03):
Calarugus Shark Media. My name is Daniel Marsh. Last time
I told you how journalist Eliza Morgan published an explosive
expose that sent shockwaves through Washington. How Captain Maya Santiago
orchestrated a desperate escape attempt in Yemen, sacrificing herself to

(00:27):
give her teammates a chance to flee with critical intelligence,
And how National Security Advisor James Reynolds lost control of
the investigation as the FBI stepped in. This is signal lost.
March nineteenth, twenty twenty five, Washington, DC, ten thirty am.

(00:51):
The Senate Intelligence Committee hearing was standing room only, with
cameras broadcasting live to a nation hungry for answers. I
sat in the press gallery while watching as Franklin Webb
took the oath right hand, raised voice steady as he
swore to tell the truth. They always swear to tell
the truth. The question is always which version of the
truth they choose to share. Web cut an impressive figure,

(01:15):
tailored suit, silver hair, perfectly groomed, the confident bearing of
a man accustomed to power and its exercise. As CEO
of Obsidian Security Solutions, he had been called to testify
about his company's role in providing intelligence for Operation Sandstorm
and his subsequent involvement in the unofficial investigation. Senator Richard Campbell,

(01:35):
Committee chairman and longtime ally of Defense Contractors began the
questioning with what seasoned observers immediately recognized as softballs, mister Webb,
could you explain for the committee the nature of your
company's involvement with Operation Sandstorm? Webb leaned slightly toward the
microphone Obsidian Security Solutions provided standard intelligence support through our

(01:58):
existing contracts with the defa ME Department. Our role was
limited to analysis of regional security conditions, potential threats, and
verification of target information provided by government agencies, and after
the operation failed, you were asked to assist in determining
what went wrong? Is that correct? Yes, Senator, National Security

(02:23):
Advisor Reynolds requested our help in analyzing the security breach.
Given our cybersecurity expertise and existing security clearances, we were
well positioned to assist. It was a masterful performance, confident
but not arrogant, detailed without revealing anything substantive, creating the
impression of transparency while actually disclosing nothing of significance. The

(02:47):
Democratic ranking member. Senator Eleanor Mitchell took a more aggressive approach,
mister Webb, internal White House communications indicate you were conducting
what amounted to a parallel investigation outside normal oversight. Chant
was this approach suggested by you or by mister Reynolds?
Webb didn't blink, Senator. With American lives at stake time,

(03:09):
was of the essence the traditional investigative process, while thorough,
can be slower than circumstances sometimes permit. Mister Reynolds and
I agreed that using our existing capabilities could accelerate the
identification of the breach, potentially saving the captured soldiers. And
did you find the source of the breach? We identified

(03:30):
several potential vectors, all of which were shared with the
FBI when they assumed control of the investigation. Senator Mitchell
leaned forward, her eyes narrowing, Mister Webb, Obsidian received a
twenty million dollar contract expansion just three days before Operation Sandstorm.
What Services justified that additional expenditure for the first time,

(03:53):
Webb hesitated, almost imperceptibly, that contract modification covered enhanced reconnaissance
capability in multiple theaters, not specific to Yemen. Yet your
company had personnel in Yemen coordinating with local assets less
than forty eight hours before the operation commenced. Isn't that
unusual for a firm providing only analytical support. We maintain

(04:17):
operational capabilities in numerous regions to support our intelligence products.
Having assets on the ground ensures our analysis reflects current
conditions rather than outdated information. The exchange continued with Web
parrying increasingly pointed questions about his company's activities, contracts, and
relationships with foreign entities. He never appeared rattled, never contradicted himself,

(04:42):
never provided an opening that could be exploited. But watching closely,
I noticed something revealing in his performance. Web wasn't just
defending himself or his company. He was steering the conversation
away from specific aspects of the operation, picular anything related
to Captain Santiago or the nature of the targeting system

(05:04):
she had access to. Those omissions spoke volumes to anyone
paying attention. Webb was protecting something beyond his company's reputation
or government contracts. He was obscuring the true objective of
whoever had orchestrated the Yemen ambush. As the hearing continued,
Eliza Morgan was working from her secure location, meticulously constructing

(05:28):
a financial map of Obsidian security solutions, bank transfers, shell companies,
subsidiary relationships. If Webb was connected to the conspiracy, the
evidence would be found in the money trail. What she
discovered was both illuminating and deeply troubling. Three months before
Operation Sandstorm, a Cayman Islands holding company had acquired a

(05:50):
substantial non controlling interest in one of Obsidian's subsidiaries, a
firm specializing in cyber operations and electronic warfare. The whole
holding company, Meridian Strategic Ventures, appeared legitimate on the surface,
but dissolved upon closer inspection into a complex web of
offshore entities impossible to trace to their ultimate owners. Around

(06:12):
the same time, Obsidian had begun aggressively recruiting former military
personnel with specific technical backgrounds experts in targeting systems, satellite communications,
and electronic warfare, the same systems that would be vulnerable
if someone obtained Captain Santiago's access credentials. Eliza compiled her
findings into an encrypted document, adding annotations and questions where

(06:36):
gaps remained. The picture taking shape was disturbing. A deliberate
long term operation designed to infiltrate American military systems at
their most vulnerable points, not for immediate attack, but for
persistent access that could be exploited at critical moments in
the future. Her phone rang, a secure line established for

(06:59):
communications with other editor, Morgan. She answered, we've received information
you need to see immediately. Her editor said, his voice tense.
Coming to your secure server now. Eliza refreshed her browser.
Finding a new file in her encrypted workspace, she opened
it to discover a classified Defense Department communication that had

(07:21):
been leaked to the Tribune. The document was a situation
report on an incident in Yemen. Eighteen hours earlier, an
American special operations team had been dispatched to a location
in Sannah based on intelligence from multiple sources indicating the
presence of captured US personnel. The team had found evidence
of recent combat, expended ammunition casings, blood trails, signs of

(07:45):
hasty evacuation, but no American prisoners. However, they had recovered
something potentially significant, a damaged satellite phone containing a partial
message addressed to Sencom. The fragments mentioned targeting system comp
and internal betrayal, followed by corrupted data that couldn't be recovered.

(08:05):
Eliza's heart raced as she processed the implications Santiago or
her team members had managed to send at least part
of a warning message. They had escaped at least temporarily,
but they had also disappeared again, either recaptured or on
the run in hostile territory. She immediately connected this information

(08:26):
to Webb's careful avoidance of targeting system questions during the hearing.
The conspiracy was taking shape, a sophisticated operation to gain
access to systems that controlled America's precision strike capabilities across
the Middle East and potentially beyond. Eliza began drafting a
follow up article focusing on the targeting system angle and

(08:47):
Webb's connections to the mysterious Meridian Strategic ventures. The story
had evolved from exposing security failures to uncovering what might
be one of the most significant intelligence breaches in modern history.
As she worked, she received another encrypted message, this one
from a source identifying themselves only as Watchdog. The message

(09:08):
was brief, Webb is meeting with Russian national Dmitri Voronin
tonight Roosevelt Hotel, nine pm, Private dining room, Ververonin represents
interests you should investigate. Eliza hesitated. This could be legitimate
intelligence from someone inside Web's organization, or it could be
disinformation designed to discredit her reporting or worse, lure her

(09:32):
into a vulnerable position after the Yemen ambush. She had
no illusions about what these people were capable of. She
needed verification before acting on this tip. Quickly, she ran
a search on Dmitri Voronin, finding references to a Russian
businessman with ties to both his country's intelligence services and
various technology firms specializing in cybersecurity. The connection was plausible,

(09:56):
even likely. Eliza made her decision. She would observed the meeting,
but take extensive precautions. This could be the missing piece
that connected Webb to the foreign interests behind the operation. Meanwhile,

(10:20):
in a secure conference room at FBI headquarters, a joint
task force was assembling evidence from multiple sources, Mira Patel's testimony,
digital forensics from the compromised signal accounts, financial records of
key players, and now the fragmentary message recovered in Yemen.
Special Agent Thomas Carter, the counter intelligence specialist leading the investigation,

(10:43):
stood before a whiteboard covered in names, connections, and timeline markers.
Twenty years with the Bureau had given him a particular
insight into how sophisticated intelligence operations unfolded. The layering of
legitimate activities over clandestine objectives, the careful compartmentalization of knowledge,
the deployment of unwitting assets alongside knowing conspirators. The targeting

(11:07):
system is the key, he told the assembled team. Everything else,
the signal breach, the manufactured intelligence, even the public scandal,
it's all misdirection. The real objective was to capture Santiago
or someone with her access level. An analyst raised her hand,
But why go through such an elaborate operation. There are

(11:27):
simpler ways to compromise military systems, because this isn't about
a one time breach, Carter replied. Conventional hacking leaves traces, triggers, alarms, forces,
defensive measures. What they're after is persistent access through legitimate
credentials that wouldn't trigger security protocols like hiding in plain sight.

(11:49):
Another agent suggested, exactly, once they have biometric authentication from Santiago,
combined with the access codes they've already obtained, they could
introduce subtle modifications to targeting data, calibration errors, coordinate shifts,
the kind of changes that might be attributed to technical
glitches rather than deliberate compromise. The implications were chilling. America's

(12:12):
precision strike capabilities depended on the accuracy of targeting data.
Even small errors could result in civilian casualties, missed high
value targets, or friendly fire incidents. Over time, such glitches
would erode confidence in systems that military commanders relied upon
for critical operations. What about Web, asked the analyst, How

(12:33):
does he fit into this? Carter tapped a document on
the table. Financial forensics has uncovered links between one of
his subsidiaries and a holding company with suspicious characteristics. We're
still tracing the ownership chain, but preliminary indicators point to
Russian backing, possibly with Chinese involvement as well. So Web

(12:54):
is working for foreign interests. It's more complex than that.
Webb built his company on government contracts. I doubt he's
an ideological traitor. More likely, he made deals with entities
whose true nature or intentions he either didn't fully understand
or deliberately ignored. Now he's caught between his government clients
and these other interests, which makes him dangerous. The analyst concluded.

(13:19):
A cornered man with resources precisely, and he still has
one critical advantage. We don't know exactly what was compromised
or how far the infiltration has progressed. Until we do,
we're working in the dark. The task force dispersed to
pursue their assigned angles financial traces, digital forensics, physical surveillance.

(13:43):
Carter remained at the whiteboard, studying the connections between web
Reynolds and the various entities circling around Operation Sandstorm. Something
was still missing, a crucial piece that would bring the
entire conspiracy into focus. He suspected that piece lay with
the three Americans in Yemen. If they were still alive,

(14:03):
and if they could be recovered, they might hold the
key to unraveling the entire operation. In Yemen, Lieutenant Marcus
Wade and specialist Jennifer Chen had been moving continuously for
eighteen hours, using every evasion technique in their special Operations
training to avoid capture. Their injuries slowed them pain and

(14:27):
exhaustion taking a mounting toll, but the alternative to continued
movement was unacceptable. They had witnessed Captain Santiago's last stand,
covering their escape from the communications room with controlled precise
fire that had given them the critical minutes needed to
slip away. Neither harbored illusions about her fate. Santiago had

(14:49):
made her choice, sacrificing herself so that they might escape
with intelligence crucial to national security. Now hiding in an
abandoned building on the outskirts of Sinnah, they were face
seeing the grim reality of their situation. They were injured, hunted,
and deep in hostile territory, with minimal resources and no
clear extraction path. The satellite transmission failed, Chen said, her

(15:13):
voice hoarse with exhaustion. We don't know if anyone received
our warning. Wade checked their remaining supplies, a side arm
with limited ammunition, a canteen half full of water, a
first aid kit nearly depleted from treating their wounds. Not
enough to survive much longer, let alone fight their way
to friendly forces. We need local help, he decided, someone

(15:36):
with connections to get us to the American embassy in
Aden or to a military extraction point. And who do
we trust, Chen asked, the question, hanging between them like
a physical weight. It was the central dilemma. Their captors
had known too much, operated too professionally to be simple insurgents.
They had connections, resources, intelligence that could only come from

(16:00):
high level sources. Any local contact might be compromised or
susceptible to bribes or threats. We trust no one completely,
Wade replied, But we make calculated risks based on what
Santiago would do. Chen nodded, drawing strength from the invocation
of their commander's example. Santiago had always emphasized adaptability over

(16:21):
rigid planning, understanding terrain and local dynamics over force application.
She would find a way forward even in impossible circumstances.
There's a clinic three blocks south, Chen said, recalling details
from their pre mission briefing on the area, run by
doctors without borders, international staff, neutral reputation. They might help

(16:43):
with medical supplies, maybe communications. It's also an obvious place
for them to look for US, Wade countered, which makes
it unexpected they'll assume. We'd avoid medical facilities because of
the risk. Wade considered this, weighing dangers against desperate necessity.
Their injuries required attention beyond the basic first aid they'd administered.

(17:05):
Without proper treatment, infection would become as deadly a threat
as their pursuers. We move at dusk, he decided, approach
from the rear, identify any international staff who might be sympathetic.
As they waited for darkness, Wade's thoughts returned to Santiago.
Her final orders had been explicit. Get the intelligence out,

(17:28):
warn command about the targeting system, compromise, expose the betrayal
within their chain. She had given her life to make
that possible. He wouldn't allow that sacrifice to be wasted.
Whatever it took, whatever risks required, they would complete the mission.
They would expose the truth about Operation Sandstorm and whoever

(17:48):
had orchestrated the ambush. They would ensure that Captain Santiago's
last act of courage served its purpose. Back in Washington,
James Reynolds sat alone in his office, watching his career
and reputation disintegrate in real time across cable news and

(18:09):
social media. The Senate hearing, still ongoing, had shifted from
Webb to other officials involved in Operation Sandstorm. His own
testimony was scheduled for tomorrow. His phone rang a private number.
He recognized immediately, this is becoming unmanageable, Webb said, without preamble.
When Reynolds answered, I'm doing everything I can to contain it.

(18:33):
Reynolds replied, aware of how hollow the words sounded, even
to himself. It's beyond containment now the FBI is tracing
financial connections. Morgan is pursuing the targeting system angle. It's
only a matter of time before the full scope is exposed.
Reynolds felt cold sweat forming on his brow. What are
you suggesting that we consider alternatives to our current approach,

(18:57):
damage limitation rather than prevention. The implication was clear. Webb
was preparing to save himself, likely by offering someone else
as a sacrifice. Reynolds was the obvious candidate, the public
face of the security failure, already implicated by Eliza Morgan's
reporting and Mira Patel's testimony. We had an understanding, Reynolds said,

(19:20):
fighting to keep his voice steady. Circumstances have changed, Webb replied,
his tone clinically detached. I'm meeting with certain interested parties
tonight to discuss next steps. I suggest you prepare accordingly.
The call ended, leaving Reynolds staring at the phone in
his hand. Webb was cutting him loose. Worse, he was

(19:41):
positioning Reynolds to take the fall for something far beyond
the security negligence already exposed potentially for treason. If the
full nature of the conspiracy emerged, Reynolds had choices to
make and quickly. He could wait for the inevitable, allowing
himself to be sacrificed to protect Webb and whoever stood
behind him. He could flee, abandoning his position and effectively

(20:04):
admitting guilt. Or he could fight back, using what he
knew to negotiate some form of leniency. The last option
required leverage something valuable enough to trade for his future.
Reynolds opened his secure safe, removing a small encrypted drive
he had maintained as insurance against precisely this scenario. On

(20:26):
it were records of his communications with Webb, including discussions
that had never appeared in official channels. It wasn't enough
to save him completely. Nothing could erase his culpability in
the security failures that had led to American deaths, but
it might be enough to shift the focus to the
larger conspiracy, positioning him as a flawed public servant who

(20:47):
had been manipulated rather than a knowing trader. Reynolds placed
the drive in his pocket and began composing a letter
to the FBI director requesting an urgent meeting before his
scheduled testimony. He had been a fool, allowing ambition and
fear to cloud his judgment. Now he would pay a price.
The question was how high that price would be. As

(21:12):
evening settled over Washington, Eliza Morgan prepared for her surveillance
of Webb's meeting with the Russian businessman. She had taken
extensive precautions informing her editor of her plans, arranging check
in protocols carrying both obvious and concealed recording devices. Whatever
transpired at the Roosevelt Hotel, there would be evidence. She

(21:34):
positioned herself in the hotel bar, angled to observe the
entrance to the private dining rooms without being immediately visible.
Her cover was simple, a professional woman having a quiet drink,
unremarkable among the hotel's typical clientele. At precisely eight forty
five pm, Web arrived, accompanied by two men with the
unmistakable bearing of private security, former military, or intelligence. Eliza

(21:58):
guest noting their constant environmental scanning and positioning that provided
maximum coverage of potential approaches. Fifteen minutes later, another man entered,
middle aged, expensively dressed with the confident stride of someone
accustomed to power. Dimitri Voronin matched his photographs, though in
person he projected a more commanding presence than his images suggested.

(22:20):
Webb greeted him with a handshake that lingered just long
enough to suggest familiarity beyond casual business acquaintance. The two
men disappeared into a private dining room, leaving their security
personnel positioned outside. Eliza weighed her options. She could wait,
hoping to observe them when they emerged, perhaps overhear fragments

(22:40):
of conversation, but that would yield limited intelligence at best.
The real value would be in what was discussed behind
those closed doors. She made a calculated decision, Moving casually
to the restroom corridor, she confirmed what hotel architecture had suggested.
The private dining rooms had server stations immediately adjacent with

(23:01):
doors that would allow staff to enter and exit Discreetly.
Timing her movement carefully, she slipped into the server station
when staff attention was directed elsewhere. From there she could
hear voices from the dining room, not clearly enough for
a complete transcript, but sufficient to catch key phrases and
the general tone of the conversation. Webb's voice came through first,

(23:24):
tense despite its controlled delivery, the situation has accelerated beyond
our projected timeline. The targeting system remains secure for now,
but two of the assets escaped. If they reach American
forces with what they know, Voronin responded, his Russian accent
subtle but distinct. This creates complications, yes, but also opportunities.

(23:48):
The confusion provides cover for our secondary objectives. The FBI
is connecting the financial trails. It's only a matter of
time before they reach Meridian. Meridian is designed to dissolve
under scrutiny. By the time they untangle it, the next
phase will be complete. The conversation continued, discussing contingencies and

(24:08):
adjustments to what they referred to as the operation. Eliza
recorded what she could, struggling to maintain absolute silence in
her concealment. Then came the exchange that sent chills down
her spine. The test run is scheduled for tomorrow, Web said,
a minor targeting aberration during a drone operation in Eastern Syria.

(24:29):
Nothing catastrophic, just enough to validate our access and if
it confirms full integration, then we proceed to Phase three,
selective manipulation of targeting data across all Middle East operations,
subtle at first, then increasingly significant as confidence in the
system's erodes. Perfect Vernin replied, satisfaction evident in his voice.

(24:55):
Not an attack that triggers immediate response, but a cancer
that spreads through their decision making apparatus. They will doubt
their own systems, their own data, eventually their own judgments.
The strategic brilliance was terrifying. This wasn't about destroying American
military capabilities through direct attack. It was about undermining trust

(25:16):
in those capabilities from within, creating a crisis of confidence
that would paralyze decision making and response options across the
entire command structure. Eliza had heard enough. She needed to
get this information to authorities immediately. The test run planned
for tomorrow could provide definitive proof of the breach if
authorities knew to look for it. She began carefully retreating

(25:39):
from her position when a server unexpectedly entered the station.
Their eyes met for a frozen moment before Eliza improvised, sorry,
looking for the restroom, she said, with embarrassed confusion, slipping
past before the server could question her further. She maintained
a casual pace until reaching the hotel lobby, then moved
quickly outside to the street, where she immediately called her

(26:01):
editor on the secure line. I have confirmation, she said,
without preamble. They're testing their access to the targeting system
tomorrow a drone operation in eastern Syria. They've already infiltrated
the network. We need to get this to the FBI immediately.
Come in now, her editor replied, tension evident in his voice.

(26:22):
We've received information that Web's security team has been looking
for you. They know you're onto them. Eliza flagged a taxi,
constantly checking her surroundings for signs of surveillance or pursuit.
As the cab pulled away from the curb, she noticed
a black SUV with tinted windows turning to follow. The
game had changed. She was no longer just a journalist

(26:45):
pursuing a story. She had become a target, possessing information
that could expose one of the most sophisticated intelligence operations
ever conducted against American military systems. The question now was
whether she could get that information to authorities before Webb's
people reached her, and what they would do if they
caught her. In Yemen, night had fallen as Wade and

(27:22):
Chen approached the medical clinic from its rear entrance. The
facility was modestly secured, a perimeter fence, basic lighting, a
few visible cameras, not designed to repel determined intruders, merely
to discourage casual theft or vandalism. Wade moved first, testing
the fence for alarms before creating an opening large enough

(27:44):
for them to slip through. Chen followed, grimacing as the
movement aggravated her injuries. Both understood the risk they were taking.
If the clinic staff reported them, they could be captured
within minutes. They observed the building's rhythm for twenty minutes,
identifying staff movements and security patterns. A rear door appeared
to lead to a storage area, with medical personnel accessing

(28:07):
it periodically for supplies. Wade timed the intervals, determining a
window of approximately seven minutes between visits. Ready, he asked Chen,
who nodded despite the pain evident in her eyes. They
moved quickly across the open space to the door. Wade
tested it locked as expected. Chen produced a slender metal

(28:30):
tool from her kit, inserting it into the lock with
practiced precision, despite her injured hands. Within seconds, they heard
the telltale click of the mechanism releasing. Inside, they found
themselves in a supply room, shelves of medications, bandages, and
equipment organized with clinical efficiency. They took only what they
urgently needed antibiotics, proper bandages, pain medication, before seeking a

(28:55):
secure position. Deeper in the facility, a small office provided
ten imperiary sanctuary. Wade secured the door while Chen located
a computer, powering it on with the hope of establishing communications.
It's networked, she whispered, urgently, I can send an encrypted
message through their satellite connection. Wade stood guard while Chen

(29:17):
composed a comprehensive briefing their location, situation, and, most critically,
the details of what they had learned about the targeting
system breach. She emphasized the authentication codes that had already
been compromised and Santiago's biometric access that their captors had
been attempting to extract. As she typed, the office door opened. Suddenly,

(29:38):
a woman in medical scrubs stood frozen in the doorway,
shock evident on her face at finding armed intruders in
the clinic's administrative office, Please, Wade said, immediately, keeping his
weapon lowered. We're American military. We need help. The woman,
doctor Sarah Linkfist, according to her id Badge, assessed them

(30:00):
with the clinical gaze of an experienced physician. Her eyes
noted their injuries, their exhaustion, the desperate determination in their posture.
You're the ones they're looking for, she said, her Swedish
accent distinct, but her English fluent. Men have been coming
to the clinic asking about injured Americans, offering rewards for information.

(30:23):
We were captured, escaped, Chen explained, still working on the computer,
people died to get this intelligence out. Please just give
us five minutes to send this message, then we'll go.
Doctor Linkvist hesitated, weighing medical ethics against the geopolitical complications
of harboring fugitives in a neutral aid facility. Finally, she

(30:44):
made her decision. Send your message, she said, closing the
door behind her. I'll bring supplies you can take with you,
but you cannot stay here. We treat anyone who needs help,
regardless of politics. If they find you here, we lose
that neutrality. Understood, Wade replied, relief evident in his voice.

(31:05):
Thank you. While Chen finished transmitting their intelligence, doctor Linkfist
returned with a backpack containing medical supplies, food, water, and
a satellite phone. This has limited secure communication capability, she explained,
demonstrating its operation. Use it sparingly. Every transmission creates risk.

(31:26):
Why are you helping us, Wade asked, genuinely curious despite
their urgent circumstances, Doctor Lynkfist's expression hardened. Three months ago,
precision air strikes hit a village fifteen kilometers from here.
We treated the survivors, children with burns over their bodies,
families crushed under rubble. The strike was supposed to hit

(31:48):
militant compounds, but something went wrong with the targeting. Twenty
seven civilians died. She handed Wade the backpack. If something
is compromising your targeting systems, as you believe, many more
will die. I'm a doctor. I prevent suffering when I can.
The intelligence weighed and chen possessed wasn't just about national

(32:09):
security or military capabilities. It was about preventing the indiscriminate
death that results when precision weapons become unpredictable. It was
about maintaining the distinction between legitimate military targets and innocent bystanders,
a distinction their enemies sought to erase through their infiltration
of the targeting systems. With renewed determination, they accepted doctor

(32:32):
Lynfist's help planning their next move. The message had been sent,
duplicating and expanding on the warning Santiago had attempted to transmit.
Now they needed to survive long enough for that intelligence
to make a difference. As they prepared to leave through
a service exit, doctor Lynkfist had identified chen activated the

(32:53):
satellite phone one final time, checking for acknowledgment of their transmission.
A simple ENCRYPTID respects had arrived. Message received extraction team
en route coordinates follow For the first time in days,
hope flickered to life. Their warning had reached American forces.
An extraction team was coming. If they could reach the

(33:15):
designated coordinates and survive until the team arrived, they might
yet complete the mission. Santiago had sacrificed herself to enable.
But between their current location and the extraction point lay
kilometers of hostile territory patrolled by forces determined to recapture them,
and time was running out, not just for their physical
survival but for preventing the test run. Webb and Veronin

(33:37):
had discussed the next twenty four hours would determine whether
American military systems remained secure or fell victim to one
of the most sophisticated infiltration operations in history. The stakes
extended far beyond their personal survival, to the lives of
countless others who would suffer if precision became peril, if
America's targeted capabilities became instruments of indiscriminate death. With that

(34:02):
understanding driving them forward, Wade and Chen slipped into the
Yemeni night, moving toward the extraction coordinates with the desperate
determination of soldiers who understood exactly what failure would mean.

(34:28):
Signal Lost is a production of Calaroga Shark Media Executive
producers Mark Francis and John McDermott. The assistance of AI
was used in the production of this show.
Advertise With Us

Popular Podcasts

My Favorite Murder with Karen Kilgariff and Georgia Hardstark

My Favorite Murder with Karen Kilgariff and Georgia Hardstark

My Favorite Murder is a true crime comedy podcast hosted by Karen Kilgariff and Georgia Hardstark. Each week, Karen and Georgia share compelling true crimes and hometown stories from friends and listeners. Since MFM launched in January of 2016, Karen and Georgia have shared their lifelong interest in true crime and have covered stories of infamous serial killers like the Night Stalker, mysterious cold cases, captivating cults, incredible survivor stories and important events from history like the Tulsa race massacre of 1921. My Favorite Murder is part of the Exactly Right podcast network that provides a platform for bold, creative voices to bring to life provocative, entertaining and relatable stories for audiences everywhere. The Exactly Right roster of podcasts covers a variety of topics including historic true crime, comedic interviews and news, science, pop culture and more. Podcasts on the network include Buried Bones with Kate Winkler Dawson and Paul Holes, That's Messed Up: An SVU Podcast, This Podcast Will Kill You, Bananas and more.

24/7 News: The Latest

24/7 News: The Latest

The latest news in 4 minutes updated every hour, every day.

Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.