The Max Headroom Signal Hijacking: Television’s Greatest Unsolved Hack
On November 22, 1987, thousands of Chicago television viewers watched something they’d never seen before. A bizarre masked figure invaded their screens twice in one night. The hijacker took over two major TV stations in what remains one of the most audacious and mysterious hacks in television history.
Nearly four decades later, no one knows who did it.
The Night Someone Stole the Airwaves
The First Strike: WGN-TV
At 9:14 PM, viewers watching WGN-TV’s Nine O’Clock News saw sports anchor Dan Roan delivering highlights from the Chicago Bears’ victory over Detroit. The screen went black for 15 seconds.
Then something strange appeared. A figure wearing an oversized rubber Max Headroom mask swayed in front of a spinning sheet of corrugated metal. The image was disturbing. The audio was worse. A loud, staticky buzzing filled living rooms across Chicago.
Engineers in WGN’s control room scrambled. They regained control by changing the frequency connecting their studios to the broadcast antenna atop the John Hancock Center. The intrusion lasted about 25 seconds.
When Roan reappeared, he delivered an iconic line: “Well, if you’re wondering what’s happened, so am I.”
He blamed a computer malfunction and continued his broadcast. He had no idea the intruder wasn’t finished.
The Second Attack: WTTW
Two hours later at 11:15 PM, the hijacker struck again. This time they targeted PBS affiliate WTTW during a Doctor Who episode. This intrusion lasted 90 seconds and featured distorted but audible speech.
The same Max Headroom impersonator appeared. The performance escalated into something far stranger. Through garbled audio, the masked figure delivered rapid-fire obscure references and bizarre commentary:
Called someone a “frickin’ nerd” and appeared to reference WGN sportscaster Chuck Swirsky
Held up a Pepsi while shouting “Catch the wave!” This was a satirical jab at the real Max Headroom’s Coca-Cola commercials
Hummed the Clutch Cargo theme song
Declared, “I made a giant masterpiece for all the greatest world newspaper nerds.” This was a dig at WGN, whose call letters stood for “World’s Greatest Newspaper”
Held up a glove and said cryptically, “My brother is wearing the other one, but it’s dirty”
The transmission concluded with the masked figure exposing his bare buttocks while a woman in what looked like a French maid costume spanked him with a flyswatter. He screamed “They’re coming to get me!” Then the pirate signal cut out. Doctor Who resumed.
Unlike WGN, WTTW had no engineers on duty at the Sears Tower where their broadcast antenna was located. Station technicians watched helplessly.
“As the content got weirder we got increasingly stressed out about our inability to do anything about it,” recalled WTTW air director Paul Rizzo.
Who Was Max Headroom?
Max Headroom was a fictional artificial intelligence character created for a 1985 British television movie. Despite being marketed as “the world’s first computer-generated TV host,” Max was actor Matt Frewer in elaborate latex and foam prosthetic makeup. Computing technology in the mid-1980s wasn’t advanced enough to render a realistic animated human face in real time.
The character existed in a dystopian near-future where corrupt mega-corporations used television to control the masses. Max was born when journalist Edison Carter’s brain was uploaded into a computer network. As an AI, Max became a subversive force. He hacked into broadcasts to mock corporate media and speak truth to power.
By 1987, Max had transcended his countercultural origins. He starred in an American television series on ABC. He hosted a music video show. Most ironically, he became a spokesperson for Coca-Cola’s “New Coke” campaign. The character transformed from an anti-corporate satirist into a corporate pitchman.
This context makes the hijacking feel like an act of reclamation. Someone liberated Max Headroom from his commercial captivity and turned him back into an actual signal pirate.
How the Hack Was Executed
The Technical Method
The Max Headroom intrusion was not a computer hack in the modern sense. Think of this as an analog radio frequency attack. The hijacker demonstrated sophisticated understanding of broadcast infrastructure.
In 1987, Chicago television stations transmitted their programming from studios to broadcast towers using microwave relay links. These signals traveled through the air on specific frequencies to receiving antennas atop downtown skyscrapers. WGN’s antenna sat on the John Hancock Center. WTTW’s was on the Sears Tower.
The hijacker exploited what’s known as the “capture effect” in analog FM transmission. When two signals of similar frequency compete, the stronger signal completely suppresses the weaker one. By positioning a high-powered transmitter in the line of sight between the stations’ studios and their receiving antennas, the hijacker overpowered the legitimate signal and substituted their own.
According to Dr. Michael Marcus, the FCC’s lead investigator on the case, the attack originated somewhere on the North or Northwest sides of Chicago. The hijacker needed clear sightlines to both downtown transmitter towers.
Equipment Requirements
Marcus estimated the equipment wasn’t as expensive as initially feared. “New, the gear might have cost around ten thousand dollars, but would have been available, used, on the amateur radio market,” he said.
The setup required:
A directional dish antenna (potentially as small as a DirecTV-style dish if positioned close to the receiving towers)
A transmitter outputting a stronger signal than the stations’ feeds
Knowledge of the precise frequencies and modulation used by each station’s microwave link
Pre-recorded video content on VHS (visible scan lines at the beginning of the WTTW intrusion confirm the content was pre-taped)
The fact that the hijacker successfully targeted two different stations in one night suggests careful planning. After WGN’s engineers cut them off, they switched targets. This indicates reconnaissance and insider knowledge of the stations’ technical infrastructure.
Why This Attack Won’t Happen Today
The 2009 transition from analog to digital television in the United States made this specific type of attack impossible. Digital signals don’t exhibit the same capture effect as analog FM transmissions. Modern broadcast infrastructure relies on fiber optic connections and encrypted satellite links rather than vulnerable over-the-air microwave relays.
The Investigation That Failed
Federal Response
The FCC and FBI launched investigations almost immediately. FCC spokesman Phil Bradford appeared on television warning that perpetrators faced a maximum fine of $100,000 and up to one year in prison.
Dr. Michael Marcus from the FCC’s Washington D.C. office led the investigation. He had previously helped catch “Captain Midnight” (John MacDougall, who hijacked HBO in 1986) and Thomas Haynie (who inserted religious messages into Playboy TV in 1987).
Dead Ends and Bureaucratic Friction
The investigation stalled due to internal friction between the FCC’s national and regional offices. Marcus identified a promising lead. A tip pointed to a specific person who worked for a company with a warehouse-like space in Chicago where the video might have been filmed.
“The head man in Chicago at the time said ‘what am I supposed to do?'” Marcus recalled. “I said, ‘You have the video. Go to the place where you think it was filmed!'”
The Chicago investigator refused to pursue the lead. “Our man in Chicago didn’t want to start knocking on doors,” Marcus said with disdain. “He was used to more traditional FCC cases, and felt uncomfortable doing things he hadn’t done before.”
Without physical evidence or probable cause for a warrant, the investigation lost momentum. The intrusion hadn’t caused any physical damage or endangered lives. This made continued resource allocation difficult to justify.
The Statute of Limitations Expires
The five-year federal statute of limitations for the offense expired in 1992. This means even if the perpetrators’ identities were revealed today, they would face no criminal consequences.
No one has ever credibly claimed responsibility.
Theories About the Perpetrators
The Disgruntled Employee Theory
The most widely accepted theory holds that the perpetrator was a current or former broadcast industry employee. They had access to professional equipment and insider knowledge.
Supporting evidence includes:
WGN conducted layoffs in the months prior to the incident
The content specifically targeted WGN with references to Chuck Swirsky and the “World’s Greatest Newspaper”
The technical expertise required to execute the attack twice in one night suggests professional broadcast experience
WTTW broadcast engineer Al Skierkiewicz stated after the incident: “This had to be a broadcast engineer, a satellite engineer, or a ham radio operator. Probably a combination of at least two of those in order to pull this off.”
The “J and K” Brothers Theory
In 2010, a Chicago computer programmer named Bowie Poag posted on Reddit claiming he knew the perpetrators’ identities. Poag alleged that two brothers he’d met through Chicago’s BBS (bulletin board system) hacker scene in the late 1980s were responsible. He described the younger brother, “J,” as socially awkward and extremely knowledgeable about broadcast technology.
Poag claimed that on the day of the hijacking, he attended a gathering at the brothers’ apartment where people were whispering about something “big” happening. When he asked what they meant, the older brother “K” told him: “Watch Channel 11 later tonight.”
Poag later updated his post to say he no longer considered J and K suspects based on new evidence he declined to share publicly. Museum of Classic Chicago Television curator Rick Klein, who has worked with Poag on amateur investigations, expressed skepticism about the theory.
The Eric Fournier Theory
Another theory suggested that Eric Fournier was behind the hack. Fournier was a performance artist and musician from nearby Bloomington, Indiana, who created the bizarre “Shaye Saint John” YouTube series. Theorists drew parallels between the erratic style of the Max Headroom performance and Fournier’s surreal video work.
Fournier’s former bandmates dismissed the theory entirely. “This is ridiculous,” wrote Harry Burgan. “Eric didn’t know anything about video editing when we were in high school.” Fournier passed away in 2010.
Why No One Has Confessed
The perpetrators’ continued silence remains one of the case’s most puzzling aspects. With the statute of limitations long expired, there’s no legal risk to coming forward. Several explanations have been proposed:
Privacy concerns: If the perpetrator is still alive (likely a senior citizen now), they may not want the attention and media scrutiny that would follow
Social awkwardness: If the theory about a socially uncomfortable perpetrator is correct, the prospect of public exposure might be terrifying
A code of silence: The perpetrators may have made a pact never to reveal their identities. They view the mystery itself as part of the art
Destroyed evidence: Some speculate that after the FCC announced the potential penalties, all evidence including the original tapes was destroyed
Cultural Impact and Legacy
Immediate Aftermath
The incident made national news. Coverage mixed alarm with bemusement. The Chicago Tribune ran the headline “Video Prankster c-c-c-could become Max Jailroom.”
Local stations interviewed confused viewers. One man said he “wanted to bust the TV set.” A young boy grinned and called what happened “funny.”
Two days after the intrusion, WMAQ-TV sportscaster Mark Giangreco pranked his own viewers by splicing footage from the real hijacking into his broadcast segment.
Influence on Hacker Culture
The Max Headroom incident has achieved mythic status in hacker and cyberpunk communities. This represents a rare, documented example of successful “culture jamming.” Someone used the mass media’s own infrastructure against itself to deliver an unauthorized message.
The incident has been referenced in numerous works:
Anonymous directly referenced the hijacking in a 2008 video during its campaign against Scientology
The trope of broadcast signal intrusion appears in films like Batman (1989), Pump Up the Volume (1990), Hackers (1995), and V for Vendetta (2005)
The incident inspired the “analog horror” genre that has flourished on YouTube, featuring fictional broadcast intrusions
Rick Klein uploaded the highest-quality footage of the intrusion to YouTube in 2006. The video has been viewed millions of times and continues to introduce new generations to the mystery.
Why This Story Still Resonates
The Max Headroom incident endures because of what the perpetrators didn’t do. They didn’t steal money. They didn’t leak classified information. They didn’t cause physical harm. They seized control of the airwaves for a few moments to deliver something ambiguous. Was this a joke? A protest? A piece of performance art?
The ambiguity is part of the appeal. As journalist Chris Knittel observed: “I don’t know if I want this to be solved. Sometimes things like this are better left unsolved.”
The incident demonstrated that attack surfaces exist everywhere. This includes physical RF links and infrastructure that most people never consider. In an era before internet hacking became commonplace, someone showed that a small group with the right knowledge could outmaneuver major institutions in a public way.
Most importantly, because the perpetrators were never caught, the Max Headroom hacker has become a folk hero. Someone pulled off a technically sophisticated, globally famous hack and then disappeared completely into the noise.
The Mystery Continues
Almost 40 years later, the Max Headroom signal hijacking remains unsolved. The FCC investigation files have been obtained through Freedom of Information requests. Amateur sleuths continue to analyze the footage frame by frame. Tip lines remain open.
Rick Klein maintains a tip line at MaxTips@fuzzymemories.tv in hope that someone will finally come forward. “I honestly believe that this mystery still has a chance at being solved,” he has said. “For no one to spill the beans after all this time, surprising.”
Bowie Poag offered what might be the most poetic interpretation of what the incident meant:
“For a few precious seconds, life imitated art for a change. The public saw a rare and endangered animal, an actual dyed-in-the-wool hacker. Something real, something other than the nonsense everyone gets pumped full of. They got to decide for themselves whether to laugh with this person’s gag, or to be horrified.”
Whether the perpetrators ever reveal themselves or the case stays forever unsolved, the Max Headroom incident has secured its place in hacker history. In the pre-digital age, someone broadcast chaos on the airwaves. They were bold enough and skilled enough to try. And they got away with what will likely stand as television’s greatest unsolved hack.


