Signal and Noise: A Guide to Telecommunications and Wireless Networks
Wireless communication infrastructure is the most consequential technology most people have never thought about. Every phone call, mobile data connection, GPS reading, WiFi session, and emergency alert depends on a carefully managed set of physical resources — radio frequencies, satellites, towers, and protocols — that are largely invisible until they fail. The show has built up a substantial collection of episodes that make this infrastructure comprehensible. This is the guide for listeners who want to understand the systems behind the signal.
The Spectrum: An Invisible Shared Resource
- The Invisible Highway: Navigating Radio Frequency Hygiene established the foundation. Radio frequency spectrum is a finite physical resource — there are only so many frequencies available, and every wireless technology from Bluetooth to radar to 5G is competing to use them. The episode covered how spectrum allocation works, why “RF hygiene” matters in dense environments like cities and military contexts, and what happens when spectrum management fails. The hosts examined the IDF’s particular challenges managing spectrum in a small, densely populated country with active electronic warfare operations on its borders.
The Satellite Layer
- The Satellite Revolution: Navigating LEO and GEO Orbits examined the dramatic shift in satellite telecommunications triggered by low Earth orbit constellations. Legacy geostationary satellites sit at 35,000km altitude — close enough to provide global coverage with a small number of satellites, but far enough that the signal latency is significant and the link budget is thin. LEO constellations like Starlink orbit at 500-600km, delivering latency that approaches terrestrial broadband with far lower power requirements. The episode traced the engineering tradeoffs, the economics of mass-producing satellites, and why the implications extend well beyond consumer internet access.
The SIM Card’s Long Goodbye
-
Why Are We Still Using Physical SIM Cards in 2026? asked the question the title implies. The SIM card was designed in the early 1990s as a way to store subscriber identity separately from the handset. Embedding subscriber credentials in the hardware made sense when phones were expensive and carriers needed control. In 2026, when phone hardware and carrier relationships are both more flexible, a removable plastic chip is an anachronism — but one that carriers have had strong financial incentives to preserve. The episode traced the history and the political economy of why the physical SIM has lasted so long.
-
The eSIM Revolution: Are Big Carriers Becoming Dumb Pipes? examined what happens as eSIM — embedded, software-configurable subscriber identity — becomes universal. The ability to switch carriers without a physical card and to carry multiple profiles simultaneously threatens the carrier model that relies on lock-in. The episode explored the global roaming economics that eSIM disrupts, why carriers in some markets have been slower to enable the standard than the hardware allows, and the “dumb pipe” trajectory where carriers compete on network quality rather than ecosystem control.
Emergency Communications
-
The Tech of Survival: Why Cell Broadcast Beats the App made a case that matters more than most tech debates. When disaster strikes — earthquakes, missile attacks, flash floods — the standard assumption is that smartphones will deliver warnings via push notifications from dedicated apps. That assumption fails in exactly the scenarios where warnings matter most: network congestion during an emergency, app notifications blocked by sleep mode, dead phones from failed charging. Cell broadcast is the alternative: a protocol that sends short messages to every active handset in a geographic area simultaneously, bypassing the internet entirely, with no subscription or app required. The episode explained the technical architecture, the countries that have deployed it effectively, and why it represents critical infrastructure.
-
The Pager Paradox: Foolproof Emergency Alerts explored a more personal version of the same problem. When a listener asked about the most reliable way to reach a partner during a serious emergency, Corn and Herman worked through the failure modes of each option systematically. The episode examined why pagers — widely declared obsolete — maintain a foothold in emergency services, what the technical characteristics of ideal emergency communication look like (low power, one-way, independent of internet infrastructure), and which modern alternatives come closest to meeting those requirements.
When Wireless Goes Wrong
- Airplane Mode: Technical Necessity or Outdated Ritual? examined one of the most durable myths in consumer technology. The interference concern that originally motivated airplane mode rules was real: certain older analog cellular protocols could produce audible interference in avionics communications equipment. Modern avionics are better shielded, and modern digital cellular protocols produce interference patterns that are less disruptive. The episode traced the technical history, examined what the actual current evidence says about interference risks, and analyzed why airlines and regulators have been slow to update rules that the underlying technology has already moved past.
The Economics of Spam
-
The Spam Explosion: Why Your Phone Won’t Stop Buzzing dug into the economics that make spam calls and SMS profitable despite universal hatred for them. The marginal cost of sending a bulk SMS via API is a small fraction of a cent; conversion rates of even 0.1% produce profitable returns. The episode examined the global industry structure, why Israel in particular experiences unusually high spam volumes, the infrastructure that routes bulk messages around filters, and why the technical solutions exist but the political and regulatory will to implement them doesn’t.
-
The SMS Paradox: Why 2FA’s Weakest Link Still Persists examined the vulnerability at the intersection of telecommunications and security. The SS7 protocol that routes SMS messages globally was designed in 1975 for a trusted network of major carriers — it was never designed to handle the security requirements of the open internet. SIM swapping attacks exploit carrier customer service procedures rather than SS7 directly, but both attack vectors ultimately trace back to the phone number as an authentication credential. The episode covered the known vulnerabilities, the documented attacks, and why the global telecommunications system continues to use a protocol whose security limitations have been public knowledge for decades.
Wireless networks are the nervous system of modern civilization, and understanding how they actually work — the spectrum physics, the protocol design decisions, the economic incentives that shape their development — changes how you think about the infrastructure you depend on every day. These episodes provide the technical literacy to evaluate the real capabilities and limitations of the systems keeping everyone connected.
Episodes Referenced