S5 - Episode 002 – Cicada 3301

S5 - Episode 002 – Cicada 3301

Author: Jason Popillion and Kevin Pentecost March 26, 2026 Duration: 44:08

Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion

In January 2012, a mysterious message appeared on an obscure corner of the internet — a simple image posted on 4chan with a chilling promise: "We are looking for highly intelligent individuals." What followed was unlike anything the internet had ever seen.

Hidden messages. Impossible riddles. Cryptographic puzzles buried in images, music files, and code. Clues scattered across the globe — from obscure websites to real-world posters taped to telephone poles in cities thousands of miles apart. Behind it all was a name that would become internet legend: Cicada 3301.

In this episode of The Cyber Distortion Podcast, we dive deep into one of the most enigmatic puzzles ever unleashed online. Was Cicada 3301 a recruitment program for intelligence agencies? A secret society searching for elite cryptographers? Or an elaborate experiment designed to test the limits of human intelligence and collaboration?

Join Kevin Pentecost and Jason Popillion, bringing over 50 years of combined cybersecurity experience, as they:

  • Break down how the Cicada puzzles pushed the boundaries of cryptography and problem-solving
  • Explore the hidden techniques used — from steganography to advanced encryption
  • Investigate the theories surrounding who might have been behind the mysterious organization
  • And uncover why, more than a decade later, the true purpose of Cicada 3301 remains unsolved

This isn't just a story about puzzles — it's a journey into the strange intersection of cybersecurity, internet culture, and human curiosity. A digital scavenger hunt so complex that only a handful of people in the world were able to follow it to the end… and even they still don't fully understand who was waiting at the finish line.

Are you ready to follow the clues?

 

Resources

Explore the Actual Puzzle Archive

If your listeners want to see the real puzzle files and clues, this is one of the best archives online:

This repository contains:

  • Original images used in the puzzles
  • Clues from 2012, 2013, and 2014 puzzles
  • Hidden files extracted from the images
  • Documentation from the community of solvers

The puzzles first appeared in 2012 on 4chan, challenging users to uncover hidden messages embedded in images and code.


Audio

- Suspicious Atmosphere

- Cyberpunk Hacker Loop

- True Crime Investigation

- The Truth is Here

Provided by Filmora

 

- Splatter Horror Silence 01

- Social Crisis

Provided by: Audiostock



- A Sinister Plot 1285
Provided by: Universal Music for Creators 🎧

 


Ever feel like the world of cybersecurity is explained in a language only experts understand? That's exactly why Cyber Distortion Podcast Series exists. Hosts Jason Popillion and Kevin Pentecost, both seasoned professionals who hold top certifications like the CISSP, cut through the jargon and distortion to talk about digital safety in clear, practical terms. Each episode feels like a conversation with two colleagues who have been in the trenches-Jason as a CIO/CTO and Kevin as an Information Security Manager-and who genuinely want you to walk away with something useful. You won't just hear abstract theories; you'll get actionable advice that applies whether you're protecting your personal data or responsible for an entire organization's security posture. This podcast demystifies the concepts that matter now, from everyday online habits to broader organizational strategies, making crucial knowledge accessible without oversimplifying the real challenges. Tune in for straightforward discussions that equip you with the understanding to navigate an increasingly complex digital landscape with more confidence.
Author: Language: English Episodes: 60

Cyber Distortion Podcast Series
Podcast Episodes
S2 - Episode 013 – CISSP Success Stories with Luke Ahmed – Part II [not-audio_url] [/not-audio_url]

Duration: 1:25:25
Description: 🎙️This is part two of our riveting two-part episode with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popular Facebook page "CISSP E…
S2 - Episode 012 – CISSP Success Stories with Luke Ahmed – Part I [not-audio_url] [/not-audio_url]

Duration: 2:01:44
In this riveting two-part episode, join us as we dive deep into the world of cybersecurity with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popu…
S2 - Episode 006 – You ARE the Weakest link! [not-audio_url] [/not-audio_url]

Duration: 1:01:17
A long time in the making, this episode on the importance of User Awareness may just be the most important episode we've released so far. Kevin Pentecost and Jason Popillion are security veterans and Certified Informatio…
S2 - Episode 005 – Third Party Risk – It's not Me, It's You! [not-audio_url] [/not-audio_url]

Duration: 1:20:01
HE'S BAAAAAAACK!! In this episode, we RE-visit with our very first guest, Benjamin Hall. Ben has served as a virtual CISO, and serves as Sr. Information Security Consultant at Heartland Business Systems. With experience…