The Return of the Numbers Stations: Why a Mysterious Persian Radio Broadcast Matters
A Persian shortwave spy station (V32) appeared hours after US-Israeli strikes on Iran in 2026, prompting Iranian jamming — proving Cold War radio tools remain relevant.
Abstract
A Persian shortwave spy station (V32) appeared hours after US-Israeli strikes on Iran in 2026, prompting Iranian jamming — proving Cold War radio tools remain relevant.
For decades, so-called "numbers stations" have been some of the most enigmatic phenomena in radio history. These shortwave broadcasts send streams of numbers, letters, or coded voice messages on a fixed schedule. Intelligence agencies use this method to send secret instructions across borders. They might sound like nonsense to casual listeners, but they remain vital for clandestine operations.
The key advantage of these broadcasts is that the receiver never has to respond. This one-way communication leaves no digital trace of the recipient. This lack of a digital footprint makes it hard for adversaries to spot spies in the field. Researchers believe most of these stations use a method called a one-time pad. This form of encryption remains unbreakable when users apply it correctly. Only the sender and the intended recipient know the key. So, even if someone records the broadcast, they can't decode it without that key.
With that background in mind, a new station has recently appeared.
A New Numbers Station Starts Broadcasting
On February 28, 2026, about 12 hours after the US and Israel started military action against Iran, a new shortwave signal began broadcasting in Persian, Iran's main language. Radio monitoring groups quickly named the station V32. They noted that its format followed the usual procedures for these broadcasts. It had strict schedules and repeated five-digit groups. Deciphering the message required the correct key.
Each broadcast begins with the word tavajjoh —Persian for "attention"— followed by blocks of spoken numbers. The station runs six message blocks, each lasting exactly 20 minutes, for a total of two hours per broadcast. The strict timing is intentional. By making each session the same length, the station can hide if it’s sharing urgent orders or just routine filler.
The Germany Connection
The most striking detail is the source of the signal. Radio experts and monitoring groups traced the transmissions to Böblingen/Stuttgart, Germany, an area known for its US military bases. A Persian-language coded broadcast started hours after a military escalation. It seems to come from a US facility in Germany, making it hard to ignore.
Radio Free Europe reports that Priyom.org was the first to find and analyze the Persian-language numbers station V32. A PRI report notes that some analysts believe Israel or Turkey may operate the station. Others suggest the transmissions might be a psychological operation rather than normal spy communications.
The Jamming Response
Subsequent events removed any doubt that the Iranian government considered this station a serious threat. The government began jamming the signal around March 4. Iran used a "bubble jammer" to interfere with Persian-language broadcasts. Shortly after, V32 shifted to new frequencies to work around the jamming.
This back-and-forth matters. Jamming is not something a government does out of curiosity. It is a response to something perceived as an operational threat. The jamming itself turns V32 from an interesting mystery into evidence of a real, active contest playing out in the radio spectrum.
The Author
At this point, we know two facts: the signal likely originates from a known US military base, and Iran has tried to jam it.
Its Target
The intended recipient might be a US-supported Iranian opposition group. It could also be US personnel or assets working inside Iran. Either way, the most likely purpose of V32 is to keep a covert network functioning during wartime. A numbers station has a key advantage: it’s simple. A recipient needs a shortwave radio and a shared decryption key. They never have to send anything back. That matters because transmitting is the action that leads to people getting caught. Authorities can track or trace two-way radios, cell phones, and internet traffic. A person who only listens leaves almost no electronic footprint.
In times of internet blackouts, cyberattacks, and heavy surveillance, a one-way channel offers a big advantage. Another possible use is what intelligence professionals call contingency tasking. This means sending brief, pre-planned instructions. Examples include "lie low," "switch to backup procedures," or "execute your assigned plan." Such instructions do not need long or complex messages. A short burst of numbers can carry an instruction that an agent is already prepared to execute.
Why Does Any of This Matter?
Numbers stations are often described as Cold War relics — tools from an era before satellites and the internet. This episode challenges that assumption head-on. A modern numbers station has appeared during a current military conflict. It likely broadcasts from NATO territory, even though broadcasting methods haven’t changed much in 60 years.
The reason these methods matter is that they work. In the midst of surveillance and cyberattacks, sometimes the most secure option is also the oldest one. A one-way shortwave broadcast to an agent in the field requires only a simple radio receiver. The agent can receive instructions without connecting to a network or transmitting a reply. There is nothing to trace back to them.
The lesson here is that old-fashioned shortwave radio still matters when modern digital systems break down. During the recent conflict, Iran's internet connectivity dropped by over 90 percent. Physical damage to infrastructure further crippled communications. In times of major disruption, a one-way shortwave broadcast becomes very attractive. It doesn’t depend on the internet, cell towers, or other networks that someone can damage or shut down. Jamming then becomes one of the few practical ways to fight back against it. The V32 station and Iran’s jamming response reveal an important truth: even in modern, tech-driven wars, both sides still use World War II-era tools.
Whatever V32 turns out to be, it is a testament to the fact that the oldest tools of espionage have not disappeared. They have gotten harder to notice.
I got the idea for this blog from a Wired article cited below, which presented a new avenue of exploration.
References:
https://en.wikipedia.org/wiki/Numbersstation
https://en.wikipedia.org/wiki/2026Iranwar#InitialIsraeliandAmericanstrikes
https://www.sigidwiki.com/wiki/Iranian%27Bubble%27Jammer
Buy me a coffee at:
https://buymeacoffee.com/clubtj
Visit my blog at:
https://www.quarkstochlorophyll.blog
© 2025 Tim Jackson. All Rights Reserved.