 Okay. Good morning ladies and gentlemen. Thank you for turning up at 10 o'clock in the morning on Saturday to the hangover talk slot. So pretty much. So pretty much. I'm screw in case you didn't figure that out already. We've got Strom Carlson, Vidiot, and Datagram up here, and the talk that we're doing is entitled social message relay using existing social networks to transmit covert messages in public. So you've probably, you know, read the description of this either on the website or in the program or something like that, and you've got a pretty good idea of, you know, what you've come to see. Well, not really. The description we gave you while accurate doesn't exactly tell you 100% of what we're going to be doing here. I'm not gonna say anything more. I'm gonna let everyone else go ahead and take care of that. So, without further ado, here is Mr. Strom Carlson. Actually, I think Datagram... Yeah. That's my fault. We also sucked in rehearsal. Assuming there was actually a rehearsal. Well, at least we're not... Can everybody hear me? Wait a second. Yes? No? Okay. So throughout history, there have been a lot of ways to do this. A lot of different approaches. Look at this. And one of those has been number stations and Does anybody know what number stations are? Show of hands? Okay. For those of you who don't know, it's shortwave radio stations that broadcast series of encrypted numbers pretty much any way you want to encode a message. This is just one of the types of ways to do social message relay, but it's kind of popular. As far as geek scene goes, just because it's kind of creepy, kind of... What am I thinking of? Well, anyways. Yeah, spy world, that kind of stuff. So a little bit of history. They've been reported since around World War II probably earlier, but reported since World War II. The big thing about them is that there are a lot of irregularities during major world events. I listed two on the bottom that are big things as far as Russia is concerned. And when big world events happen, a lot of number station spikes in activity, broadcasting happen. So give you an idea of what these are used for potentially. And again, spike in appearance since 90. So, I like how there's no text. Oh, sweet. I didn't know I was this fancy. Anyways, some prerequisite paranoia. Most people think, and some of these may be confirmed with quotes around it, to be used by intelligence agencies. And the ones that most people think are using them are listed there, CIA, MI6 England, KGB's, former Soviet Union, BND's, Germany, and Mossad's Israel. I'm not mistaken. Also a rumor to be used by organized crime groups like that. So, we have some examples just so you guys could hear. How these work. This is the Lincolnshire Poacher. It's a pretty famous, famous number station, and it's still broadcasting. I don't know from where, but if I'm not mistaken, it's, yeah, it's MI6 operated. That was just a little clip. It goes on 24 hours a day sometimes. Sometimes not for weeks on end it'll be off. But that's the basic formats. Music and then some more, like numbers or phonetic alphabets, sometimes just rising note scales. We have another one. This one's a bit more creepy. It's called the Swedish Rhapsody. A little German girl, rattling off spine numbers. And something we were really interested in. Most recently there was the appearance of VoIP number stations. All of these, these two previous examples have been over shortwave. Which is from what I understand, a lot harder to operate than a VoIP line, but easier or harder to trace. So we have the example of the VoIP station. Okay, so basically we found this and we were really interested in it. How many of you number station people heard of this? Few of you. Okay. We're here to tell you that was us. We decided to see how hard it would be to make one and get it transmitted through social networks. So Strahm's going to talk to you next about basically getting it set up. So basically those of you who, so of those of you who heard of it, how many of you dialed the number station directly? All right. So yeah, that number station was running off my asterisk box in my apartment the whole time. So it's just basically a series of sound clips on my box that I threw together. So assembling the audio for the number station was an interesting project because there are several things you have to consider. First, you need some music. Second, you need, you know, numbers which are not identifiable as a single person and then you need some way of having encoded messages delivered. So the first bit about the music was actually fairly simple. I was driving around in my car and I had my iPod on shuffle mode and I have the Konect project CD's on my iPod. So how many of you have heard of the Konect project? Okay. It's basically a connection of the number station kind of things we just put it. It's basically, for those of you who haven't heard of it, it's like a four CD reset of recordings of all various number stations. So it's a lot of number stations. So my effort on shuffle mode is just like playing. C-O-N-E-T. And they're free for download. Yeah. So I'm listening. I'm driving around. There's like the cars plays and then a spine number station plays and then an a-ha song that I had on their plays. And I'm listening to the bridge of this a-ha song and I'm like, you know, that kind of sounds like it might be a number station. So when it came time to do the number station, I said, well, just use the bridge of that song as the music for the number station. So it's an a-ha song called Little Black Heart. So then to get the various recordings of the numbers, I considered several options. The first was recording my voice saying 1, 2, 3, but then I thought, no, I've given talks, people recognize my voice. And then I thought, well, I could go to a coffee shop or something, and stick a microphone in someone's face and say, hey, save the numbers 1 through 0. But then they just get weird looks and people might say, oh, that was me and I know this person. So I discovered that how many of you heard of Craigslist? Sorry. Yeah. So how many of you have browsed through Craigslist and found people advertising services with telephone numbers attached to them? Okay. People will list, you know, for services of various personal nature with the telephone numbers to call them. So it turns out that when you call people who are expecting calls from random people and you just repeat the same thing over and over and over again, eventually they'll repeat it back to you just to get you to try and say something different. So what I've got here is a collection of, what I've got here is a collection of the recordings of the other side of the conversation. This doesn't include me saying the numbers, so I'll just, I'll pretend to be them. And it also doesn't include the beep tone of the place, let them know they're being recorded because I didn't want that on the number station. But, so, you go ahead and play this. Hello. One. One. Hello. One. One. One. One. Three. I don't know. If you leave me a message, I'll get back to you as soon as possible. Five what? Six. Six. How's it going? Huh? Six. Six. Six. Hello. Seven. Yes. Seven. Hello. Seven. How you doing? Seven. This is Kevin? Seven. Seven. Eight. Eight. Eight. Nine. Nine. What nine? I don't have zero because I accidentally deleted that recording. But, that's pretty much how we did it. That's why it sounds like the audio equivalent of those ransom notes with little letters from every newspaper. Because it pretty much is. Next slide. Yeah, next slide. So, then all I did was I wrote an AGI script, run it on my Astros box, cut all these up into little half second clips, and wrote an AGI script to encrypt the message every time you call it, because that was easier than putting the encrypted messages in separate files. So, you just encrypt the message and then it turns it into numbers and it reads back all the numbers. So, what we've actually got is I've got CDs of all the little pieces, and I'll be tossing those out into the audience later. And that has the AGI script on it. So, if you want to make your own number station, you'll have the kit on the CD. This is a snippet of the code to play back the numbers. We just thought that would look cool. Yeah. We thought that was the coolest part of the script. Yeah, and so now I turn it over to Vidiotz and we get into the history of Project Evil. Yeah, Project Evil is the name we gave the experiment, because we wanted to be able to talk about it at 2600 meetings without other people going louder into the mic. Sorry. We wanted to be able to talk about this at 2600 meetings without other people knowing what we were saying, that we were referring to minefrowline. So, we called it Project Evil. I have no idea where the name came from. It's stupid. This section is going to, I'm going to walk you through everything that happened to us while we were doing it, because this kind of became an international phenomenon for a short while. And I want to, as you can see by the subtitle there, it's aimed at anyone who might be interested in running a crypto challenge someday, learn from our mistakes, because we made quite a few. So, let's get up here just easier. Okay, how it all began. Well, this picture is of Philippe's deli in downtown LA. That's where LA 2600 meets. And because we live in the People's Republic of California, we have to go outside to smoke, so we get all our really bad ideas on this piece of sidewalk. That's why I put it there. So, we had the idea, why not set up a number station by VoIP? It happened right after Datagram had given a talk about the history of number stations. And what it was was a number station by VoIP. How? We decided we were going to release about four number stations, use one-time pads to encrypt them, and we were going to repeat the key on the first and last messages, hoping someone would look for a key collision. If you're not familiar with how one-time pads work, they're a very old form of encryption, but they're considered almost unbreakable. If you don't know what the exact key is, all possible decryptions are mathematically equally probable. Now, the reason why key collision is so often used to try to crack these is because it's very unlikely that you'll get one key that will produce two sensible messages or will decrypt two separate messages sensibly. So, we were hoping we could get someone to do this. And because the messages were very short, we didn't think it would be too much trouble to get someone to write a script and let their computer do all the work. And the reason why we did it is we wanted to see if we could estimate how big and powerful the online cryptographic community was. We just wanted to throw it out there and see what would happen. So, on May 8th, we posted this on the New York's Craig's List. For Mind Fry Line. Mind Fry Line, I haven't heard from you in a while. Won't you call me? And this 2-1-2 number. This was the first number station we set up. We let this mellow for a couple of days and then we sent one email. And I want to stress that all we did to start this whole experiment was send one email. I sent this one to the Spooks list. That's a mailing list for number stations enthusiasts. Screw, posing as somebody named Jay Random Entity, sent this email to them. Burr basically said, hey, I found this weird phone number you call and it sounds like a number station. You should check it out. You don't have to read the whole thing. So, on May 11th, we got 61 calls to that number in the first 24 hours. On May 24th, it showed up on the Off the Hook radio show. Now, we think we know how this happened. Bernie S., it turns out, who is a member of the Off the Hook crew, is subscribed to the Spooks numbers list. So, on that day, suddenly the number got 117 calls and by that point, it had been building slowly. More and more people had been posting about it. It had been spreading and we'd received almost a little over 1,700 calls by that point. On May 29th, we released the second number and it got 218 in the first 24 hours. So, interest was starting to build. We were getting a lot of, starting to see posts turn up in blogs, more people linking back and forth, a lot of speculation flying around, what the hell are these things? On May 31st, Homeland Stupidity posted an article about us and this was really kind of the first salient event in the whole thing because this was the first time the community actually tried to get organized to crack these codes. Michael Hampton, the guy who runs Homeland Stupidity, organized his forums and he created a new forum for each message where people could post and they could put up their theories and start working on them together. And then all of a sudden, on June 1st, Slash Dot, out of the blue. We had no clue that was coming. The number stations 1 and 2 got 2,180 calls thanks to Slash Dot. It was just amazing. It caught us completely by surprise. I think I got a phone call at like 3 a.m. going, oh my god, go to Slash Dot right now. I think it's also got digged for all stations, all numbers that we did but as far as I know they never hit the front page but they have something like 2,500 digs each at this point. I think that 2,180 calls was like the day it got Slash Dot. But then disaster struck for us. On June 20th, the guys who run the Hope conference back east created a copycat number station. They recorded ours, recut it, and then they announced it on the Off the Hook radio show and this is what they posted on Craigslist. Parasites. Our fourth number station we released just after the Hope contest but it only received 22 calls because everyone thought that it was all a stunt to promote hope up to that point. Interest just took a nosedive in this thing immediately after it. They were smart, they struck while the iron was hot and they got in right with the best perfect time to make a publicity coup out of this but they killed it afterwards. We never really got the level of interest back up to the point where it was before. And as you can see from this, 146 calls total and then it just kept getting worse. So yeah, on July 15th we finally had our first real meeting to discuss what the hell we were going to do because we're hackers, we're not exactly organized. We decided what we would do is create six more messages instead of the original four and we were going to release a batch of them in quick succession to try to get people's interest back up. We thought maybe if the people who were still following this thing thought wow, something's going on, maybe this is heating up, maybe it's related to the mid-east or something it might get out there and get more exposure. So these are the numbers that we continue to release. Ottawa, Lubbock, Orlando, Milwaukee and Fort Lauderdale. As far as I know, no one ever actually found Fort Lauderdale. Still there. No, they did. It finally got published. I feel like it was like a week after the fact or two weeks after the fact. Okay, I thought that was Milwaukee that you got late. It was one of them. There was one of them, I think. Lubbock was late. No one's found Fort Lauderdale yet as far as I can tell. And we didn't do anything different. We just would put them up on his asterisk box and then push out an ad on Craig's list with the title Four Mind Frow Line. Ostensibly, there were people out there running scripts that were checking Craig's list all the time to see if they could find a new one, but apparently their scripts sucked because they never found that one. So in total, the first four numbers received 58% of the calls. And the first four numbers were also up for a much shorter period of time. So if you really look at the call detail records, you can see that we did manage to rekindle some interest, but it didn't really ever come back fully. Now, before we go into Easter eggs, I should also just tell you the reason why we decided to do six number stations and try to rekindle some interest was right before the off-the-hook contest, we called Dark Tangent, the fellow that runs DefCon, and we let him in on the secret. We said, we want to do this, but we can't have anything published. Otherwise, it'll be blown. So DT kept its secret from the rest of the DefCon staff and from everybody else and put us up here under the pseudonym of Social Message Relay. I just want to make sure I put that in because I forgot to put in a slide for it. Now, for those of you who are actually following MindFileLine, here's some Easter eggs that you may or may not have found. First, the group numbers. Originally, the group numbers were supposed to identify the city the next message was going to appear in. But then, Will Wheaton posted this on Slash. Anyway, my prediction, the next message will be posted on Craig's List for Boston. And the second message was posted on Craig's List for San Francisco. Thanks for blowing my surprise Ensign Crusher. So, on messages 3 through 6, we changed the group numbers to 1, 3, 4, 2, 5, 0, 2, 2, and 1, 6, 9, which were rearranged to become the octets of Will Wheaton.net. Similarly, the 7 through 10 messages are 1, 1, 6, 0, 1, 8, 2, 1, 6, and 2, 5, 4, and when rearranged, that's LA2600.org. Also, the initials of the cities that they were released in, if you read them in order. Somebody actually figured out NSA had posted about that on Homeland Stupidity and got really excited about it, but then he stopped. So, why don't we decrypt a couple messages? Now, also, before I go into this, I should say for reasons that will become clear, we're not going to release the decryptions of the first four messages yet. As I said, after the first four messages were published, we finally had a meeting and got reorganized, and we're going to start with the sixth message and go from there. If you keep following this, you'll eventually hear about the first four messages were, but we're not going to decrypt those here in this talk today. All right, the 613 number. The one-time pad for that was, I found two pennies in my pocket, here's my two cents. We should probably explain the one-time pads. There's the guy. If you subscribe to the... What's the next time I talk? Do you mind? Oh, sorry, yeah, go ahead. I was just going to say, there's a guy who shows up to the LA2600 meetings, and those of you, I see some familiar faces out here, will know who I'm talking about. I'm not going to mention his name because he'd be mad, but this guy is, well, he puts a new spin on the word weird, and when you're hanging out with a bunch of hackers, it's hard. Okay, he's known for posting these somewhat ranting, very bizarre emails that yet somehow make a weird kind of cool sense. I can't explain it. Anyway, we decided that you could not get a better random text generator in the world than an email this guy posted to our list. So we just started grabbing random ones out of our archives. So those of you who are with LA2600 and subscribed to the LA2600 mailing list will probably recognize some of these. Yeah, and if you pipe his email into dev random, you give back pi. The full thing. So how the decryptions work. When you call the number station, you get group 415 and then a series of digits. Those digits are the decimal ASCII representations of letters padded with zeros to make them fill out the space. When you take out the padded zeros, the cipher text that looks like this, 14, 83, 2, etc. You take the one-time pad, again converted to decimal ASCII, zore it out, and that gives you your clear text. And in this case, the clear text is... We figured it was appropriate. This is at the point where we knew we were going to be giving this talk. And I'm just going to speed through the rest of these, hitting them really fast because you don't want to read a bunch of random numbers. The 806 number was also, the one-time pad in a hard time locating my salt lick and hip-waiters. Yes, that's really one of his. And that decrypts too. Captain's Logs 302,606.2 Pwned by Ensign Crusher. The 407 number. Be careful what you say. It will always come back at you and you will be quoted. How little did he know. And this is an apology to the Spooks list because we did have some trepidation about actually launching our experiment off of their back and detracting their attention from other might possibly be meaningful work. Legitimate stations. Legitimate stations. Not a bunch of drunken idiots like us. And the 414 number. This one is, as the media reporting the Pope being unavailable I have not yet received permission to eat meat on Friday. I have no idea what the hell that email was about. This was the most sane sentence in that email that he sent. This is like the only one that was even in English. Thank you priest. So this one was our thank you to Michael Hampton and to the cryptographic community but especially to Michael Hampton because if you go to Homeland Stipidity and you start reading all the forums by the time you get to the 10th number station that poor guy is going completely insane. You could tell by the tone he is just pulling his hair out, beating his head against the desk he really wants to know what these things say. So we had to mention him. And the final number. I hope and wish none of you is enamored enough with me to quote my rantings. In case you want to use my writings as evidence I will gladly refer you. Again, I have no idea what the hell that means. This one is aimed at the organizers of the Hope Contest. Dear Emmanuel, glad to see Creativity is alive and well over 2600 magazine. If you ever need help, again give us a call. Parasite. Total cost to set this up by the way for everything including our webpage was $202. I put that in because those of you who work in a big company go back and ask your marketing department if they can get three months of international exposure and 20,000 phone calls for $202. So running a crypto challenge here is our advice to you learn from our mistakes and most importantly, I think be organized and have all your content ready before you start. When we were doing the first four numbers we would just pick stuff at random at the time we were setting up the station. Part of the reason why we're not decrypting those messages is because the content was not really well thought out and would not fit well with what we're continuing to do. Second, don't underestimate the cryptographic community but don't overcomplicate your challenge. I'll get a little bit more on overcomplication later. And finally, maybe most importantly, have a plan to handle copycats like a manual. This is the best copycat we got. Mindfrow Line, stop calling me. I told you yesterday I don't love you. Give you back my records and my good leather jacket. And if whoever posted that in the audience is here, come on up, we actually have something for you. We did appreciate that greatly. In fact, we picked Orlando as a city to release one of our numbers in just because of this guy. Now we have some observations we'd like to share about the crypto community because we watched pretty closely as the community tried to decipher these messages and figure out what the hell was going on. And the first and biggest one is that the community tends to ignore any answers it doesn't like, even if they're correct. I'd like to read this quote here. But the starter of such a game could hardly count on anyone calling the phone number and asking about it online. So the person who first noted it would almost certainly have to be in on it if not the instigator himself. That's the most logical thing anyone said about decrypting our number stations. As I said earlier, we sent one e-mail to launch this project. We got exactly one e-mail back saying, where did you find this? We sent them the lamest excuse so we could think up something along the lines of oh my buddy found it and he sent it to me because he knows I'm into this stuff. And they bought it. We never heard anything about it again despite the fact that all the messages and supposedly thousands of people were trying to solve all these ciphers, no one ever went back to look for the source. The second thing is people kept asking probably up to today they still are asking, is this real? Is this really a number station? Well, duh. Why go to the trouble of setting up a number station when you can just use public key encryption? It seems like pretty obvious but the crypto community seems to want to have a mystery to solve. They seem to want to have something to go after their own blinders. So if you're running a crypto challenge factor that in. Second thing about the crypto community it seems to only organize to the lowest level necessary. Now what I mean by that is a great example is the homelands stupidity forms and the wiki he put up. If you read through those forms suppose you're someone brand new who's never heard of this before and is interested. Homelands stupidity has become the de facto area where people are trying to decrypt them. With linear posts going way down the page and there's tons of misinformation and duplicated effort. No one has actually put up any even the wiki was not well organized. There was nothing there that could really help someone dig in and make them more efficient. Actually everything that was there would just slow you down if you were trying to start out. The other thing is the community is incredibly powerful as evidenced by how quickly they cracked the code from the hope contest but it's not proportionally insightful. Now that's no different than probably the rest of society. We're all standing on the shoulders of some incredibly brilliant freaks who invented stuff like electricity and medicine etc. But in the crypto community when someone gets one of those insights it doesn't necessarily propagate down again usually because of very poor organization or because they're wearing blinders as I said before. Here's an example. We estimated that there was about 100 different cipher systems tested to decrypt this thing during the time it was up there. Not one single person tried to find a key collision which is the classic way to decrypt a one-time pad. And also because our messages are very long by my my feelings it wouldn't be hard to identify a real message from a fake message because randomly generating keys and just soaring it against the cipher text the majority of what you get will be pure garbage versus actually seeing a few words that make sense. So they could have cracked this very easily had they just generated 10 lines of code to just generate random keys and try and zore it against any of our ciphers. So here's our suggestion to the web crypto analysis community if they want to make themselves more efficient. We'd like to propose that they or someone build a web portal something that's easily deployable so that people who aren't necessarily coders or systems admins can get it out there. Make it open source and extensible. Use common cipher tools because there are cipher tools written in Perl and PHP and other things that are out there for every kind of transpositional cipher anything else that you'd ever want those tools are already out there sitting in open source repositories and they're not collected anywhere. There's not one easy to use tool. This is from a common data set. One of the big problems we saw with people pulling data from a whole bunch of different places was typos. They'd get things from over here, get pasted into a blog, cut and pasted and emailed somewhere else. Next thing you know they're working from something that's completely different from what the original message was. And finally, standardized data reporting and this is probably the most important part. As with homelands stupidity if you look at it like I said you'll have to slog through. If you had something with an interface that would make it very easy to identify which ciphers have been tested, what was done, common data reporting you're going to make yourself a lot more efficient. Tenth message. If you were keeping track you may have noticed I would only give you nine so far. So those of you who are following mine for outline now might be a really good time to get a pencil and a cell phone. This appeared or will appear very shortly. A few minutes ago after I pulled my laptop away. On the Gulfport Biloxi Craigslist mine for outline I regret the burden I placed upon you confer with me once again by the Rivers West Bank and I will take you home. Call me. 228-702-0304 This is going to be the final mine for outline message. Now you're probably thinking well that's cool and all but what am I going to do with another one time pad? This one's not a one time pad. This one can be cracked with pen and paper. This is the one that people really wanted when this whole thing started so we decided to give it to you. And we have one more hint because we like you and this is what you might want to write down if you're interested in taking a stab at cracking this. When DEF CON is online there is no hope. I'll give you a moment to write that down. Quick question though actually is Ilanka in the house? No? Okay good the rest of you have a chance. If you don't know who Ilanka is she's probably the best amateur cryptologist working in probably the world right now. She's almost always here at DEF CON and she's famous for solving all the CON crypto challenges pretty much the day they're released. So we're going to open up the floor to Q&A right now. Don't be shy. Come on questions. Just have a question. None of you? Wow. I'm sorry what was the question again? Are you maintaining the anonymity? How do I maintain the anonymity of the phone number? Well pretty much it's along the lines of there's no name associated with the number because I'm buying it through a VoIP company and pretty much it's on the VoIP company to not release my personal information or else I sue their sorry little ass. That's for the most part. So you can theoretically buy a number station or buy a VoIP account with like a fake PayPal account or one of those prepaid cash credit cards or something like that so you can if you use that and tour and then put the asterisk box on some random server that you compromise or whatever you could theoretically make it almost untraceable but I didn't bother to do that. For the last station? Also one other thing which is sort of related to your question particularly somebody mentioned on one of the many posts that were made in relation to the stations going up it's really dumb doing this over VoIP because well how do you maintain anonymity if you have someone who's actually trying to pick up this message to decode it to get instructions it doesn't work well yes and no what you have to remember is that while there may be caller ID records for the VoIP station number one there are ways of defeating caller ID number two even with those in place we still have plenty of people coming up making MP3s of the station and then distributing them which other people distribute I've actually found these things turning up on peer-to-peer networks which is rather interesting we even had one that ended up on you're the man now dog as an animation that somebody did so pretty much it's a pretty good way of getting the message out there if unreliable it's not necessarily targeted but it does provide some obfuscation The difference between VoIP and using shortwave is that you trade shortwave you can't identify where people are receiving messages but with the VoIP I could just buy a VoIP account wherever they can identify where it's coming from does that make sense? well there's also one other thing to add to that which is they can identify where that message is actually located but they don't have any real way of knowing who placed it so the degree of anonymity is still there but you're trading off one thing for another by the way one thing I noticed looking through the call detail records the number stations of the approximately 6100 calls we received about 33% came from Skype and I don't know if you guys have figured this out yet but Skype kind of blows the call quality is horrible and you can't hear what the numbers that are being said are so don't use Skype for this stuff please please please use a real phone so any more questions? from here well there's the crypto challenge you write down the numbers it reads back to you you decrypt the message and then you get instructions on what to do next in the message where are we going with it? we're having fun we're just having fun at this point our experiment to see what the community is going to do is pretty much over and if anybody wants to try and crack the first 4 numbers if you can find them probably on homelands to put into those recordings my suggestion is just generate random keys and so are against it and if you ever come across one-time pad encryption which is we chose one-time pad because that's traditional with number stations and we thought it was kind of funny in all the comments on all these sites trying to decrypt them they're like well if you shift the bits to the left and then you you zort against the bible and then one guy would go well it's a one-time pad and it would just get lost in all the noise so my advice would be just try and brute force it I think we need to wrap up we're going to start wrapping up okay yeah so we can take a couple more questions take like one or two more questions if anyone has any questions yes very last one also we did go to kinko and we did pay for the copies and and we did make up crypto challenge flyers which will be up and about so all the stuff is on the flyer so you don't screw it down too hard but so those will be distributed also I've got some CDs brought to the audience which contain recordings of all the number stations right off my pbx and the text of the number stations and the program and the assemble your own Mind Friline station kit plus we have the best we made mind friline t-shirts ten dollars today only come get yours after the talk out in the hallway you see me we have all sizes quantities are limited very very limited but if you want more information go to project evil dot org all right cool thank you very much thank you