00:00:00
January 4th, 2012.
00:00:02
A single image appeared on the Underground Message Board,
00:00:05
known as 4chan.
00:00:07
A stark black background with white text that red, hello.
00:00:12
We are looking for highly intelligent individuals.
00:00:14
To find them, we have devised a test.
00:00:17
There is a message hidden in this image,
00:00:19
find it, and it will lead you on the road to finding us.
00:00:22
We look forward to meeting the few that will make it
00:00:24
all the way through.
00:00:25
Good luck.
00:00:26
3, 3, 0, 1.
00:00:29
No one knew who posted it.
00:00:30
No one knew what 3, 3, 0, 1 meant.
00:00:34
But within hours, thousands of the internet's sharpest minds,
00:00:37
cryptographers, hackers, linguists, and puzzle enthusiasts
00:00:41
began tearing the image apart.
00:00:43
What they found would launch one of the most complex,
00:00:46
mysterious, and still unsolved recruitment puzzles
00:00:49
in the history of the internet.
00:00:51
This is the story of cicada 3, 3, 0, 1.
00:00:54
Before we dive in, let me set the stage
00:00:56
with a crucial detail.
00:00:58
Every year since 2012, a new cicada puzzle
00:01:01
has appeared on January 4, the anniversary of the first post.
00:01:05
This date is significant beyond mere tradition.
00:01:08
In the world of cryptography, patterns are everything.
00:01:12
The January 4 timing has led some researchers
00:01:14
to explore numerological connections.
00:01:16
Noting that 1, 4, 2012 reduces to specific values
00:01:21
in various number systems that cicada has used.
00:01:24
This is not coincidence.
00:01:26
This is deliberate, calculated, ritualistic.
00:01:30
Like the emergence of actual cicada insects
00:01:32
from the ground after years of dormancy,
00:01:35
cicada 3, 3, 0, 1 surfaces precisely when it chooses to.
00:01:39
And each time it surfaces, the world pays attention.
00:01:43
To understand why cicada captured the world's imagination,
00:01:47
you have to understand the landscape of 2012.
00:01:50
Anonymous was at the peak of its influence.
00:01:53
WikiLeaks had shaken governments.
00:01:55
The Arab Spring had demonstrated the power
00:01:57
of encrypted communications.
00:02:00
And deep within the hacker underground,
00:02:02
there was a growing belief that the most talented minds
00:02:05
were being wasted.
00:02:06
That intelligence agencies, corporations, and governments
00:02:10
were failing to find and cultivate true genius.
00:02:13
Into this world stepped cicada.
00:02:15
The timing was surgical.
00:02:16
The execution was flawless.
00:02:18
And the message was clear.
00:02:20
We are not interested in the masses.
00:02:23
We are interested in the exceptional.
00:02:25
If you have what it takes, prove it.
00:02:27
If you cannot, you were never meant to find us.
00:02:30
The first puzzle began with stegonography.
00:02:33
Hidden inside the pixels of that original 4chan image
00:02:36
was a message encoded using a technique
00:02:38
called least significant bit encoding.
00:02:41
When solvers extracted the hidden data,
00:02:44
they found a URL.
00:02:46
That URL led to an image of a duck with the text, whoops,
00:02:49
just decoys this way.
00:02:51
Looks like you can't guess how to get the message out.
00:02:54
But embedded within that duck image
00:02:56
was yet another hidden message.
00:02:59
This time it was a string that, when decoded using a book
00:03:02
cipher, referencing a specific passage
00:03:04
from a medieval Welsh collection of tales
00:03:06
called the Mabinogean, revealed another URL.
00:03:10
This is where things got extraordinary.
00:03:12
The new URL led to a page on the dark web,
00:03:15
accessible only through the tour network.
00:03:18
The page displayed a countdown timer and a statement.
00:03:21
We have now verified that there are
00:03:23
enough of you worthy enough to continue.
00:03:25
We want the best, not the followers.
00:03:28
The timer was counting down to a specific date.
00:03:31
And when that date arrived, the page updated
00:03:34
with a list of coordinates, not digital coordinates,
00:03:38
physical coordinates, locations around the world,
00:03:41
14 locations across five continents, Sydney, Australia,
00:03:45
Seoul, South Korea, Warsaw, Poland, Miami, Florida, Paris,
00:03:51
France, Okinawa, Japan, and more.
00:03:55
At each location, participants found a physical poster
00:03:58
with a cicada 3301 logo, a stylized cicada, and a QR code.
00:04:04
Scanning those QR codes led to another layer of the puzzle,
00:04:07
deeper into the rabbit hole.
00:04:09
This meant that whoever was behind cicada
00:04:11
had operatives, resources, and infrastructure,
00:04:13
spanning the entire globe.
00:04:16
This was not a prank.
00:04:17
This was not a lone hacker in a basement.
00:04:20
This was something far more organized, far more deliberate,
00:04:23
and far more unsettling.
00:04:25
Think about the logistics for a moment.
00:04:27
Someone had to design these posters
00:04:29
using secure printing methods that couldn't be traced.
00:04:32
Someone had to use anonymous purchasing methods
00:04:34
to buy the materials.
00:04:36
Someone had to physically travel to 14 different cities,
00:04:39
print them, and physically travel to 14 different cities
00:04:43
across the globe to place them in specific locations,
00:04:47
all without being identified,
00:04:49
all without leaving a trace.
00:04:51
All coordinated to appear at exactly the right time.
00:04:55
The operational security alone is remarkable.
00:04:58
Even intelligence agencies with billions of dollars
00:05:01
in budgets have struggled to maintain
00:05:03
this level of anonymity.
00:05:05
The technical depth of the puzzles was staggering.
00:05:08
Solvers needed expertise in RSA encryption,
00:05:11
the standard algorithm that secures virtually all internet
00:05:14
commerce.
00:05:15
They needed to understand PGP, pretty good privacy,
00:05:18
the encryption standard used by journalists and activists
00:05:21
to communicate securely.
00:05:23
They needed knowledge of number theory, prime factorization,
00:05:27
modular arithmetic, and the mathematical foundations
00:05:30
that underpin all of modern cryptography.
00:05:33
They needed to decode myon numerals,
00:05:35
understand Anglo-Saxon runes, read Latin texts,
00:05:39
and reference obscure philosophical works.
00:05:42
One puzzle required solvers to extract data hidden
00:05:45
in an audio file, a modified cicada sound
00:05:48
that, when analyzed through spectrographic software,
00:05:51
revealed a visual pattern.
00:05:54
That pattern was a QR code that led
00:05:56
to yet another encrypted message.
00:05:58
Another puzzle involved a custom built operating system
00:06:01
that solvers had to boot from a USB drive
00:06:03
and navigate using only command line tools.
00:06:07
The operating system contained encrypted partitions, hidden
00:06:10
files, and decoy data designed to mislead anyone
00:06:13
who wasn't paying close attention.
00:06:16
The difficulty curve was exponential.
00:06:18
Early puzzles could be solved by a clever individual
00:06:21
with basic knowledge of cryptography.
00:06:23
But as the puzzle progressed, it became clear
00:06:26
that no single person could solve it alone.
00:06:29
You needed a team, a cryptographer to break the ciphers,
00:06:33
a programmer to write decryption tools,
00:06:35
a linguist to translate ancient texts,
00:06:38
a musician to analyze audio files.
00:06:41
cicada was not testing individual intelligence.
00:06:44
It was testing the ability to build trust
00:06:46
between strangers across the internet
00:06:48
to share discoveries without ego,
00:06:51
to contribute to a collective effort
00:06:52
where no single person would receive credit.
00:06:55
It was testing the ability to collaborate, to share knowledge,
00:06:59
to build something greater than anyone
00:07:01
mind could achieve alone.
00:07:03
But perhaps the most infamous element
00:07:05
of the entire cicada saga is the Libre Primus,
00:07:08
the book of the first.
00:07:10
It appeared during the 2014 puzzle cycle
00:07:13
and remains unsolved to this day.
00:07:16
The Libre Primus is a document of approximately 58 pages
00:07:19
written entirely in Anglo-Saxon runes.
00:07:22
It is not a simple substitution cipher.
00:07:25
The runes appear to be encoded
00:07:26
using multiple layers of encryption,
00:07:28
possibly including custom algorithms
00:07:30
that have never been seen before.
00:07:33
Cryptographers who have studied the Libre Primus estimate
00:07:35
that fewer than 20% of its pages have been successfully decoded.
00:07:40
The decoded portions reveal philosophical and mystical text,
00:07:44
references to enlightenment,
00:07:46
to the nature of consciousness,
00:07:48
and to the idea that privacy is an absolute human right.
00:07:52
One decoded passage reads,
00:07:54
an enlightened society is a society
00:07:56
which values privacy above all else.
00:07:59
The loss of privacy is the ultimate loss of freedom.
00:08:03
These are not the words of a prankster.
00:08:05
These are not the words of a prankster.
00:08:08
These are the words of an organization
00:08:09
with a deeply held ideology.
00:08:12
And that ideology is consistent
00:08:14
across every decoded section.
00:08:16
The language is precise, almost academic in its clarity.
00:08:21
Yet there is also a poetic quality to the writing,
00:08:23
a sense of reverence for the power of the human mind.
00:08:26
Privacy is sacred.
00:08:28
Knowledge should be free.
00:08:30
The individual mind is sovereign.
00:08:33
Government surveillance is a form of oppression.
00:08:35
These beliefs are expressed not as opinions
00:08:38
but as fundamental truths,
00:08:40
almost religious in their conviction.
00:08:43
The decoded sections also reference the works
00:08:45
of specific thinkers and movements.
00:08:47
Alistair Crowley, the British occultist.
00:08:50
The Principia discordia.
00:08:52
The founding text of discordianism.
00:08:54
William Blake, the romantic poet.
00:08:56
Carl Jung and his theories of the collective unconscious.
00:08:59
The philosophy seems to blend libertarian ideals
00:09:02
of individual freedom
00:09:03
with mystical traditions of enlightenment
00:09:05
and self-transformation.
00:09:07
It is a world view that sees cryptography
00:09:09
not merely as a tool,
00:09:11
but as a sacred practice,
00:09:13
a means of protecting the sovereignty
00:09:14
of the individual mind
00:09:16
against the tyranny of surveillance.
00:09:18
Who is behind cicada 3301?
00:09:22
This is the question that has consumed researchers
00:09:24
for over a decade.
00:09:25
Several theories have emerged
00:09:27
each supported by circumstantial evidence
00:09:29
but none definitively proven.
00:09:31
The first and most popular theory
00:09:33
is that cicada is a recruitment tool
00:09:35
for an intelligence agency.
00:09:37
The NSA, CIA, MI6,
00:09:40
or perhaps a lesser known signals intelligence organization.
00:09:45
The argument is compelling.
00:09:46
The puzzles test exactly the skills
00:09:49
that intelligence agencies need,
00:09:50
cryptography,
00:09:51
stegonography, programming,
00:09:53
lateral thinking,
00:09:54
and the ability to work under pressure
00:09:56
with incomplete information.
00:09:59
The global infrastructure required
00:10:00
to place physical posters on five continents
00:10:03
suggests the resources of a state actor.
00:10:05
The second theory is that cicada
00:10:07
is the work of a hacktivist collective.
00:10:09
Perhaps an evolved offshoot of anonymous
00:10:12
or a group inspired by the cipher punk movement
00:10:15
of the 1990s.
00:10:17
The cipher punks were a loose network
00:10:19
of cryptographers and programmers
00:10:21
who believed that strong encryption
00:10:22
was the key to individual liberty.
00:10:25
Their members included Julian Assange,
00:10:27
the founder of WikiLeaks,
00:10:28
and Hal Finney,
00:10:29
one of the first people to work with Bitcoin.
00:10:32
The philosophical alignment
00:10:33
between cipher punk ideals
00:10:35
and cicadas decoded texts is striking.
00:10:39
The third theory,
00:10:40
and perhaps the most intriguing,
00:10:41
is that cicada is something entirely new,
00:10:44
not a government,
00:10:46
not a hacktivist group,
00:10:47
but a secret society for the digital age,
00:10:50
an organization that seeks out the most brilliant minds
00:10:53
and invites them into a network dedicated to privacy,
00:10:56
freedom,
00:10:57
and the advancement of human knowledge.
00:11:00
A modern-day illuminati,
00:11:02
but one that actually exists,
00:11:05
there are tantalizing clues that support this theory.
00:11:08
In 2012, several individuals claimed
00:11:10
to have completed the puzzle
00:11:12
and been contacted by cicada.
00:11:14
They reported being invited
00:11:15
to a private encrypted communication channel.
00:11:19
Once inside, they were reportedly given tasks,
00:11:22
developing privacy tools,
00:11:23
auditing encryption software,
00:11:25
and working on projects related to internet freedom.
00:11:29
None of these individuals
00:11:30
have ever revealed the full details
00:11:31
of what they found.
00:11:33
Some have gone silent entirely.
00:11:35
One confirmed solver,
00:11:37
a Swedish programmer using the pseudonym Nox Populi,
00:11:40
gave a rare interview describing his experience.
00:11:43
He said that after completing the puzzle,
00:11:45
he was contacted via encrypted email
00:11:47
and invited to join a small group.
00:11:49
The group was working on what he described
00:11:51
as a decentralized,
00:11:52
anonymous communication platform.
00:11:54
He emphasized that everything he encountered
00:11:57
suggested an organization that was serious, well-funded,
00:12:00
and genuinely committed to the ideals of privacy
00:12:03
and intellectual freedom.
00:12:05
He also said he was warned never to reveal specific details.
00:12:09
The puzzle cycles continued in 2013 and 2014,
00:12:13
each more complex than the last.
00:12:15
The 2013 cycle introduced musical composition
00:12:18
as a puzzle element,
00:12:20
requiring solvers to analyze a guitar track for hidden data.
00:12:24
The 2014 cycle brought the library primus,
00:12:27
which effectively halted all progress.
00:12:29
No one has been able to fully decode it.
00:12:32
And after 2014, the official cicada puzzles stopped.
00:12:36
Or did they?
00:12:38
In 2016, cicada's verified PGP key was used
00:12:41
to sign a new message.
00:12:43
It simply read, hello.
00:12:45
It was the first verified communication
00:12:47
from cicada in two years.
00:12:49
Then silence again.
00:12:51
In 2017, another signed message appeared,
00:12:54
warning the community about a fake puzzle
00:12:56
that had been circulating.
00:12:57
Beyond that, nothing.
00:12:59
The last verified cicada communication was in 2017.
00:13:03
But the community has never stopped working.
00:13:06
The subreddit dedicated to cicada 3301
00:13:09
has over 100,000 members.
00:13:12
Discord servers buzz with activity.
00:13:14
Researchers continue to attack the library primus
00:13:17
using every tool available, frequency analysis,
00:13:21
machine learning, brute force computation,
00:13:24
and even intuitive approaches inspired
00:13:25
by the mystical elements of the text.
00:13:28
Every few months, someone claims a breakthrough.
00:13:30
So far, none have been verified.
00:13:33
The enduring mystery of cicada 3301
00:13:36
raises profound questions about the nature of intelligence,
00:13:38
privacy, and the internet itself.
00:13:41
In a world where every click is tracked,
00:13:43
every message is logged, and every face is recognized,
00:13:47
cicada represents something rare, a genuine secret.
00:13:52
An organization that has operated in plain sight
00:13:54
recruited some of the world's most talented minds
00:13:57
and yet remained completely anonymous.
00:14:00
Consider what this means.
00:14:02
In an era of total surveillance,
00:14:04
cicada has proven that it is still possible
00:14:06
to keep a secret.
00:14:07
That strong cryptography, operational security,
00:14:10
and careful planning can defeat
00:14:12
even the most powerful surveillance apparatus.
00:14:16
Whether cicada is a government, a collective,
00:14:18
or something else entirely, their very existence
00:14:21
is a testament to the power of encryption
00:14:23
and the human desire for privacy.
00:14:26
Some have called cicada the most important social experiment
00:14:29
of the digital age.
00:14:31
Others have called it the greatest ARG,
00:14:33
or alternate reality game, ever created.
00:14:37
But those labels feel insufficient.
00:14:39
cicada 3301 transcends categorization.
00:14:43
It is part puzzle, part philosophy,
00:14:46
part recruitment tool, and part warning.
00:14:50
A warning that in the age of total information,
00:14:53
the greatest power belongs not to those who collect data,
00:14:56
but to those who can hide it.
00:14:58
As you watch this, the labor primus remains unsolved.
00:15:02
The identity of cicada remains unknown.
00:15:05
The few who were recruited have kept their silence.
00:15:08
And somewhere, perhaps, the cicadas are watching.
00:15:11
Waiting, listening for the next generation
00:15:14
of solvers brave enough, brilliant enough,
00:15:16
and patient enough to find the hidden message.
00:15:19
The question is not whether the puzzle can be solved.
00:15:22
The question is whether you are the one who will solve it.
00:15:26
Because somewhere in those 58 pages of runes lies an answer.
00:15:31
An answer to what cicada truly is, what they want,
00:15:35
and perhaps most importantly, what they have already built.
00:15:39
The tools they have created may already
00:15:41
be protecting dissidents, journalists,
00:15:43
and whistleblowers around the world.
00:15:45
The network they have assembled may already
00:15:46
be shaping the future of digital privacy.
00:15:49
We simply do not know.
00:15:51
And perhaps that is exactly the point.
00:15:54
In a world obsessed with transparency,
00:15:56
cicada 3301 reminds us that some secrets are worth keeping.
00:16:01
Some mysteries are more valuable unsolved.
00:16:04
And some questions are more powerful than their answers.
00:16:07
3301.