{"id":185,"date":"2019-02-28T00:01:19","date_gmt":"2019-02-28T00:01:19","guid":{"rendered":"http:\/\/wp.lancs.ac.uk\/enclair\/?p=185"},"modified":"2019-10-03T09:55:53","modified_gmt":"2019-10-03T09:55:53","slug":"case-notes-s01e05-messages-in-music","status":"publish","type":"post","link":"https:\/\/wp.lancs.ac.uk\/enclair\/2019\/02\/28\/case-notes-s01e05-messages-in-music\/","title":{"rendered":"Case notes: S01E05 &#8211; Messages in Music"},"content":{"rendered":"<p><strong>CONTENT RATING:<\/strong> <span style=\"color: #339966\"><strong>universal<\/strong><\/span><\/p>\n<p>Authors and painters have found many ways to encrypt messages into their creations, but how do you do this if you are a musician working with instruments? Below you will find the data, audio credits, further reading, and a transcript of the podcast.<!--more--><\/p>\n<h1>Audio credits<\/h1>\n<p>Kai Engel &#8211; <a href=\"http:\/\/freemusicarchive.org\/music\/Kai_Engel\/Caeli\/Kai_Engel_-_caeli_-_08_daemones_1095\">Daemones<\/a><br \/>\nLee Rosevere &#8211; <a href=\"http:\/\/freemusicarchive.org\/music\/Lee_Rosevere\/10_Minute_Meditations\/Lee_Rosevere_-_10_Minute_Meditations_-_02_Taking_the_Time\">Taking the Time<\/a><br \/>\nLee Rosevere &#8211; <a href=\"http:\/\/freemusicarchive.org\/music\/Lee_Rosevere\/10_Minute_Meditations\/Lee_Rosevere_-_10_Minute_Meditations_-_06_Flow\">Flow<\/a><br \/>\nBarrington Pheloung &#8211; <a href=\"https:\/\/www.youtube.com\/watch?v=-MvntwhQ1E4\">Inspector Morse<\/a><\/p>\n<h1>Credits, sources, and more<\/h1>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Backmasking\">Backmasking<\/a><br \/>\n<a href=\"https:\/\/en.wikipedia.org\/wiki\/BACH_motif\">Bach motif<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/DSCH_motif\">DSCH motif<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Sacher_hexachord\">Sacher hexachord<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Schoenberg_hexachord\">Schoenberg hexachord<\/a><br \/>\n<a href=\"http:\/\/jeffmilner.com\/backmasking\/empty-spaces-backwards.html\">Pink Floyd<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_backmasked_messages\">everyone else<\/a><br \/>\n<a href=\"https:\/\/en.wikipedia.org\/wiki\/Inspector_Morse_(TV_series)\">Inspector Morse<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Barrington_Pheloung\">Barrington Pheloung<\/a><br \/>\n<a href=\"https:\/\/en.wikipedia.org\/wiki\/Cicada_3301\">Crickets<\/a> and <a href=\"https:\/\/onlinesequencer.net\/\">cryptography<\/a><\/p>\n<h1>Transcript<\/h1>\n<p>Case S01E05 \u2013 Messages in music.<\/p>\n<p>There is a general agreement that history\u2019s greatest creator of art and music and literature is Anonymous. However I would like to add that its most alluring, for me at least, is Enigma. A message is already strangely more powerful when it transcends its creator\u2019s name, but sometimes, those messages can be dangerous or controversial. And sometimes, people want the creation, but without the creator attached to it. Conscious of being erased \u2013 in several different ways \u2013 artists have come up with a surprising range of, well, creative ways of hiding their names and their messages inside their creations for the discerning to find.<\/p>\n<p>Are you a big reader of fiction? If so, you\u2019ve almost certainly come across a novel in which the author has, for instance, written themselves into the plot as a character, or hidden messages in the very fabric of their stories, whether in the form of metaphors, or allegories, or actual codes, and so on. (In fact, in a future episode, I explore a rather chilling version of authors whose books\u2026 hmmm\u2026 no spoilers\u2026!) Moving on, artists have painted themselves into their pictures. They&#8217;ve used combinations of icons or poses or colours or objects that carry extra meanings and therefore convey deeper messages. For that matter, you might want to google the knights versus snails mystery and you can join the ranks of people who are equally baffled by this bizarre historic phenomenon.<\/p>\n<p>More evidence, in case you needed it, of why this podcast is so good. Back to the point though.<\/p>\n<p>Secret messaging is all very well when dealing with images and words, but what do you do if you&#8217;re a musician dealing with instruments? How can you hide your name, or your messages, in sounds? I&#8217;m not talking here about diss tracks where famous artists make unpleasant passive-aggressive allusions to other famous artists whilst never quite using their names. I&#8217;m talking here actually hiding messages away \u2013 that is, encoding them \u2013 into the music itself in some way.<\/p>\n<p>Messages hidden in music sounds like a terribly modern method of being mysterious, but in fact, it&#8217;s been around for quite some time, and in this episode, we&#8217;ll look at three quite different cases of musical secret messages, from past to near-present.<\/p>\n<h2>Welcome<\/h2>\n<p>Welcome to en clair, an archive of forensic linguistics, literary detection, and language mysteries. You can find case notes about this episode, including credits, acknowledgements, and links to further reading at the blog. The web address is given at the end of this podcast.<\/p>\n<h2>Musical motifs<\/h2>\n<p>Let&#8217;s start in the 1600s with one of the most famous composers pretty much ever \u2013 Johann Sebastian Bach. Born in 1685 in Germany, Bach turned out music that was incredible in both its quantity and its quality. Having butchered enough of his beautiful pieces when learning the violin in childhood, I&#8217;m not even going to attempt a musical critique, but I&#8217;ll instead focus on his rather charming habit of getting his name into his music. He did this via what is now commonly called the Bach motif, one of the oldest and most famous musical cryptograms. Bach used the letters of the notes. For the uninitiated, in very simple terms, there are seven notes in an octave: A, B, C, D, E, F, G. The next octave up starts at A and ends at G again. So, to spell out his name, Bach used the musical notes B flat, A, C, B natural. Okay, yes, that&#8217;s not exactly Bach, it&#8217;s more like Bacb. But he was German, and in German musical nomenclature, B natural is named H. Thus you get B A C H. What&#8217;s more, this is also happens to create a cruciform melody \u2013 that is, in a slightly convoluted way, it musically also represents a cross, so you can imagine how well this was picked up and used not only by Bach himself but by countless others in celebration of his. So how does this sound?<\/p>\n<p style=\"padding-left: 30px\">[BACH motif plays here.]<\/p>\n<p>Naturally, when someone finds a clever way of literally writing their name into the very tapestry of the music itself, as you can imagine, others are quick to follow, and it has proven enduringly popular. In the 20<sup>th<\/sup> century, Dmitri Shostakovich created the DSCH motif for himself. This uses the D from Dmitri and the first three letters \u2013 the Sch \u2013 from the Russian spelling of his surname. It&#8217;s written D, E flat, C, B natural, or again in German musical notation D, Es, C, H. It sounds like this:<\/p>\n<p style=\"padding-left: 30px\">[DSCH motif plays here.]<\/p>\n<p>And of course, others had a bash at this too. Here is the Sacher hexachord, of the eponymous composer Paul Sacher:<\/p>\n<p style=\"padding-left: 30px\">[Sacher hexachord plays here.]<\/p>\n<p>And here is Arnold Schoenberg&#8217;s signature hexachord:<\/p>\n<p style=\"padding-left: 30px\">[Schoenberg hexachord plays here.]<\/p>\n<p>Hmmm. Not all motifs were created equal, I guess.<\/p>\n<p>As you can imagine, though, if your name isn&#8217;t spelled by the first seven letters of the alphabet, or you&#8217;re not willing to make a series of substitutions or omissions, it can get a bit awkward to encode words into music in this way. Fear not though, the French had a solution. In the 19<sup>th<\/sup> century, a method was created that allowed the inclusion of many more letters.<\/p>\n<p>Imagine a table with seven columns. Each one is headed by a letter, A, then B, then C, and so on, through to G. In the next line down, we carry on with the alphabet, so in column A, we start again with H, and then in column B, we add I, and in column C, we add J, and so on, going round through the alphabet in chunks of seven until we\u2019re finished. If you&#8217;re doing this right, Z should be in the E column. In this way, the musical note A represents the letter A and also the letters H, O, or V. Musical note B represents B, or I, or P, or W, and so on. And if you were to play the word BAND as music, you would use the musical notes BAGD.<\/p>\n<p>This is an intriguing idea, but it entails something known as a many-to-one correspondence. That is, up to four letters can be represented by one note. This makes the decryption of messages encoded in this way extremely challenging. Take BAND again which would be played BAGD. Those same notes can also be decoded to produce the words BOND, POND, WAND, POUR, WONK, and\u2026 some other words but we&#8217;ll just leave that right there. So it&#8217;s fun, but it&#8217;s not very practical. Not to mention, music made out of secret messages will probably tend not to be all that tuneful. Disguising your top secret message in a jarring, irregular, inexplicable sound-mash would more likely draw attention than deflect it \u2013 historically the exact opposite of what you want a disguise to actually do.<\/p>\n<p>Anyway, let\u2019s set aside the mystery of classical motifs in religious fugues and 19<sup>th<\/sup> century French musical cryptograms. We turn now to the 20<sup>th<\/sup> and 21<sup>st<\/sup> century and its sudden taste for grunge, rock, and death metal.<\/p>\n<h2>Musical masking<\/h2>\n<p>With the modern era of mass-music production \u2013 there are a lot of Ms going on in this episode today, I can only apologise \u2013 probably the most common method for secret musical messages is a technique known as backmasking. This is where the message is revealed by playing the track backwards, and probably one of the most famous examples of backmasking is the &#8220;congratulations&#8221; message in Pink Floyd&#8217;s 1979 song, <em>Empty Spaces<\/em>. Not sure what I mean? Here&#8217;s the relevant bit of the song played forwards\u2026<\/p>\n<p style=\"padding-left: 30px\">[Floyd clip forwards plays here.]<\/p>\n<p>And here it is, played backwards. You&#8217;ll have to listen carefully as it&#8217;s not all that easy to hear.<\/p>\n<p style=\"padding-left: 30px\">[Floyd clip backwards plays here.]<\/p>\n<p>In case you didn&#8217;t get it, the best guesses are that it says,<\/p>\n<blockquote><p><strong>Hello, Looker. Congratulations. You&#8217;ve just discovered the secret message. Please send your answer to Old Pink, care of the funny farm, Chalfont.<\/strong><\/p><\/blockquote>\n<p>Then there&#8217;s a voice in the background that says:<\/p>\n<blockquote><p><strong>Roger! Caroline is on the phone!<\/strong><\/p><\/blockquote>\n<p>And in response, someone else says:<\/p>\n<blockquote><p><strong>Okay.<\/strong><\/p><\/blockquote>\n<p>Cryptic.<\/p>\n<p>Some have suggested that this is a reference to Pink Floyd lead singer Syd Barrett&#8217;s breakdown. Others think it&#8217;s about the character, Pink from the Pink Floyd album, <em>The Wall<\/em>, and that this message indicates his increasing insanity. Quite what the truth of the matter is, I will leave to you to determine.<\/p>\n<p>As it happens, loads of well-known artists have dabbled in the black arts of backmasking. Some of the more predictable ones are Korn, Eminem, Marilyn Manson, Def Leppard, Cradle of Filth, and Linkin Park. Indeed, those of a rocky, grungy, Satanic, angry oeuvre seem to be especially drawn to this secretive method of sneaking in extra bonuses for dedicated listeners. But some of the more surprising backmasking artists include Eurythmics, Nelly Furtado, and a personal favourite of mine \u2013 Imagine Dragons.<\/p>\n<p>Perhaps <em>the <\/em>example, though, came in the form of The Beatles. They were one of the first, if not <em>the <\/em>first to do this, when they hid a message in the fade-out of 1966 song, <em>Rain<\/em>. And then they did it again in 1977, with <em>Free as a<\/em> <em>Bird<\/em>. Perhaps driven by their frankly insane worldwide popularity, The Beatles found themselves at the epicentre of a raging conspiracy theory that dogged them from the 1970s onwards. I mean, I should be clear, it was probably one of several thousand conspiracy theories about them, ranging from Masonic mysteries to Illuminati mind-control to the secret of bay 5b and more besides. Their mind-blowing worldwide popularity generated at least as much smoke as it did fire, but since conspiracy theoriana is a little outside of en clair&#8217;s remit, we&#8217;ll just stick to the backmasking story.<\/p>\n<p>Some listeners became convinced that playing some of the Beatles&#8217; tracks backwards revealed various versions of the message, &#8220;Paul is dead&#8221;. (Paul McCartney, of course. For younger listeners, he was one of the four Beatles. It would be a bit like One Direction\u2019s music revealing a \u201cHarry is dead\u201d message if played backwards or through a fax machine or whatever.)<\/p>\n<p>For a start, to the best of my knowledge, Paul was, and at the time of recording, still is very much alive. But even if he were suddenly dead at the height of the Beatles&#8217; fame, quite why the band would choose <em>this <\/em>method of broadcasting such a fact is an even bigger mystery. However, conspiracy theories are what they are, and they are not usually over-burdened by scrupulous external logical consistency.<\/p>\n<p>Now, this isn&#8217;t to say that people weren&#8217;t hearing\u2026 <em>something<\/em>. But in reality, they were probably falling foul of the last enemy of human cognition known as pareidolia (parry-DOH-lee-ah). Pareidolia is our incorrigible capacity to find meaning in the meaningless, or signal in what is actually just noise. We see faces in wood grain. We hear our baby crying whilst we&#8217;re having a shower, and then go check, and they&#8217;re absolutely fine and fast asleep. We see ghosts in the machine, or in other words, in this case, we hear words in what is actually just the random garbled sounds of a Beatles&#8217; track playing backwards.<\/p>\n<p>Naturally, Hollywood, got hold of the idea, and since it is an epicentre of rational, restrained thinking, backmasking promptly appeared as a plot device in the cult Satanic horror film, <em>The Exorcist<\/em>. In this case, hideous sounds from the victim played backwards reveal an evil message. For the curious, there are plenty of YouTube clips of this but if you&#8217;re in the office, maybe\u2026 er\u2026 turn your sound down or use headphones. Anyway, when something like backmasking features in a worldwide blockbuster about the infernal serpent and demonic possession, you can already predict how it&#8217;s all going to turn out.<\/p>\n<p>Sure enough, the public discourse on hidden messages \u2013 no doubt fuelled by the fact that those messages were often secreted away in angry, loud, young people&#8217;s music \u2013 led to a veritable moral panic. Certain sections of society developed an absolute conviction that these messages could function like subliminal persuasion. In this twilight of the gods, innocent, impressionable young hearers would be turned to Satan, murder, and worse.<\/p>\n<p>Indeed, in 1988, during his trial, serial killer Richard Ramirez claimed that AC\/DC&#8217;s song <em>Night Prowler<\/em> from the <em>Highway to Hell<\/em> album inspired him to carry out most of his thirteen murders, five attempted murders, and a host of other brutal crimes. In a somewhat dry rebuttal, AC\/DC&#8217;s guitarist, Angus Young, replied that,<\/p>\n<blockquote><p><strong>It was the moral majority&#8217;s idea to play the record backwards but you didn&#8217;t need to play it backwards, because we never hid it. We&#8217;d call an album <\/strong><strong>Highway To Hell<\/strong><strong>. There it was right in front of them.<\/strong><\/p><\/blockquote>\n<p>As late as 1990, Judas Priest, a British heavy metal band, found themselves facing a lawsuit from the families of two Nevada men who had killed themselves in a suicide pact. The families argued that the album, <em>Stained Class<\/em>, contained hidden messages like &#8220;Do it!&#8221; that were revealed when certain tracks were played backwards. The presiding judge dismissed the case for lack of evidence. Judas Priest themselves added that inserting messages that made fans kill themselves was, at best, counter-productive, and that if they <em>were<\/em> going to add subliminal persuasion, it would involve commands like, &#8220;Buy more of our records&#8221;.<\/p>\n<p>Thankfully, the panic over these messages eventually settled down, particularly as psychologists conducted experiment after experiment that repeatedly demonstrated how terrible we are at recognising even the existence of a backmasked message to begin with, never mind the content of that message.<\/p>\n<p>Not all messages in music are hidden in quite the same way, though. For the dramatic finale, we stay in the 1980s and 1990s, but we now turn our attention to television, and in particular, that staple of British prime-time viewing \u2013 the police detective drama.<\/p>\n<h2>Musical Morse<\/h2>\n<p>Inspector Morse was a crime drama, created by novelist Colin Dexter, and starring the eponymous Inspector Morse. The show ran from 1987 to 1993, producing 33 episodes in total, generally set in and around Oxford, England. Episodes were two hours long, so they were pretty indepth film-length affairs, each one covering its own story arc from start to finish, and amusingly, Dexter, the author, made little cameo appearances in nearly every single one.<\/p>\n<p>In fact, Inspector Morse is one of the enduring memories of my childhood. I remember sitting on the floor after dinner, hugging my knees, gripped from opening credits to the last scene. I loved how smart it was. I loved Morse&#8217;s character, especially the flaws. He\u2019s an odd muse for a ten year old bookworm, but if you have never watched it, even though I know I am unreasonably biased in its favour and am doubtless overlooking all kinds of flaws, I cannot commend it to you enough. Go watch it. All of it. In one giant Morse bingewatch. There, no backmasking needed. Just direct commands.<\/p>\n<p>Anyway, what made Morse really special, though, both in my childhood and still today, was the music. The theme was composed by Barrington Pheloung, and it&#8217;s not just that hearing it gives me that feeling like it&#8217;s time to fall headfirst into dramatic escapism. It&#8217;s more than that. I&#8217;m going to play the first few seconds of the opening. You will, I hope, very quickly spot the relevant bit:<\/p>\n<p style=\"padding-left: 30px\">[Opening sample of Inspector Morse plays here.]<\/p>\n<p>I&#8217;ll be amazed if you didn&#8217;t get it, but just in case \u2013 the music opens out with\u2026 shocker\u2026 Morse code playing and gradually fading into the theme music. In many cases, as in this one, the motif here is spelling out M O R S E, and this motif is picked up and played throughout. Here&#8217;s another example where the violins take up the code in the background:<\/p>\n<p style=\"padding-left: 30px\">[Midway sample of Inspector Morse plays here.]<\/p>\n<p>However, sometimes Pheloung wrote the music differently, and the Morse code spells out different things. Sometimes, it\u2019s telling you the name of the killer. Other times, it spells the name of another character, deliberately, as a red herring.<\/p>\n<p>Come on. Tell me that&#8217;s not the best nerdiest thing you&#8217;ve ever heard.<\/p>\n<p>So, pay attention in future, because the next piece of music you hear might just have a secret message encoded into it\u2026<\/p>\n<audio class=\"wp-audio-shortcode\" id=\"audio-185-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"http:\/\/wp.lancs.ac.uk\/enclair\/files\/2019\/02\/morse_cryptogram.mp3?_=1\" \/><a href=\"http:\/\/wp.lancs.ac.uk\/enclair\/files\/2019\/02\/morse_cryptogram.mp3\">http:\/\/wp.lancs.ac.uk\/enclair\/files\/2019\/02\/morse_cryptogram.mp3<\/a><\/audio>\n<h2>Outro<\/h2>\n<p>This episode of en clair was entirely researched, narrated, and produced by me, Dr Claire Hardaker. However this work wouldn&#8217;t exist in its current form without the prior effort of many others. You can find acknowledgements and references for those people at the blog. Also there you can find data, links, articles, pictures, older cases, and more besides.<\/p>\n<p>The address for the blog is wp.lancs.ac.uk\/enclair. And you can follow the podcast on Twitter at _enclair. Or if you like, you can follow me on Twitter DrClaireH.<\/p>\n<p><sub>For the record, there is absolutely no backmasking in this episode.<\/sub><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CONTENT RATING: universal Authors and painters have found many ways to encrypt messages into their creations, but how do you do this if you are a musician working with instruments? Below you will find the data, audio credits, further reading, and a transcript of the podcast.<\/p>\n","protected":false},"author":77,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"episode_type":"","audio_file":"http:\/\/wp.lancs.ac.uk\/enclair\/files\/2019\/02\/morse_cryptogram.mp3\n1980529\naudio\/mpeg\n","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-185","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paoUKh-2Z","jetpack-related-posts":[{"id":59,"url":"https:\/\/wp.lancs.ac.uk\/enclair\/2018\/11\/01\/case-notes-s01e00-welcome-waffle\/","url_meta":{"origin":185,"position":0},"title":"Case notes: S01E00 &#8211; Welcome waffle","author":"DrClaireH","date":"01 November 2018","format":false,"excerpt":"CONTENT RATING:\u00a0UNIVERSAL Welcome to en clair. Rather than including extended waffly intros on every episode saying the same sorts of things over and over, I've put it all in this one podcast, one time. This prelude to the series answers questions like: How do I subscribe to the en clair\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":306,"url":"https:\/\/wp.lancs.ac.uk\/enclair\/2019\/03\/31\/case-notes-s01e06-the-pendle-witch-trials\/","url_meta":{"origin":185,"position":1},"title":"Case notes: S01E06 &#8211; The Pendle Witch Trials","author":"DrClaireH","date":"31 March 2019","format":false,"excerpt":"CONTENT RATING: PG-16 See the Self-care page if you need support. Between 1400-1750, at least 40,000 Europeans were executed for cursing, casting spells, and other forms of witchcraft. This episode looks in particular at the Pendle Witch Trials, and asks just how reliable the evidence and records used to convict\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":778,"url":"https:\/\/wp.lancs.ac.uk\/enclair\/2021\/02\/01\/case-s02e02-codetalkers\/","url_meta":{"origin":185,"position":2},"title":"Case S02E02 &#8211; Codetalkers","author":"DrClaireH","date":"01 February 2021","format":false,"excerpt":"CONTENT RATING: Universal See the Self-care page if you need support. When you have codebreakers like Alan Turing to contend with, how do you come up with a code that even the smartest people alive can't break? This episode tells the story of the Native American codetalkers, starting with the\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":569,"url":"https:\/\/wp.lancs.ac.uk\/enclair\/2019\/11\/30\/case-s01e99-season-two-trailer\/","url_meta":{"origin":185,"position":3},"title":"Case S01E99 &#8211; Season Two Trailer","author":"DrClaireH","date":"30 November 2019","format":false,"excerpt":"CONTENT RATING:\u00a0Universal See the Self-care page if you need support. We\u2019re going on holiday for a bit. It\u2019s a vacation before we start Season Two. On this note, what sort of cases, you might ask, will Season Two bring? And what can you listen to, read, or watch, till en\u2026","rel":"","context":"With 1 comment","block_context":{"text":"With 1 comment","link":"https:\/\/wp.lancs.ac.uk\/enclair\/2019\/11\/30\/case-s01e99-season-two-trailer\/#comments"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":96,"url":"https:\/\/wp.lancs.ac.uk\/enclair\/2018\/12\/31\/case-notes-s01e03-belle-de-jour\/","url_meta":{"origin":185,"position":4},"title":"Case notes: S01E03 \u2013 Belle de Jour","author":"DrClaireH","date":"31 December 2018","format":false,"excerpt":"CONTENT WARNING:\u00a0PARENTAL GUIDANCE (themes: sex) See the Self-care page if you need support. In 2003, one of the most popular online blogs was Belle de Jour: Diary of a London Call Girl, but who was its mysterious author? Below you will find the data, audio credits, further reading, and a\u2026","rel":"","context":"With 2 comments","block_context":{"text":"With 2 comments","link":"https:\/\/wp.lancs.ac.uk\/enclair\/2018\/12\/31\/case-notes-s01e03-belle-de-jour\/#comments"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/wp.lancs.ac.uk\/enclair\/files\/2018\/11\/slamdunk.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/wp.lancs.ac.uk\/enclair\/files\/2018\/11\/slamdunk.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/wp.lancs.ac.uk\/enclair\/files\/2018\/11\/slamdunk.png?resize=525%2C300 1.5x"},"classes":[]},{"id":437,"url":"https:\/\/wp.lancs.ac.uk\/enclair\/2019\/09\/30\/case-notes-s01e12-cursing-and-swearing\/","url_meta":{"origin":185,"position":5},"title":"Case Notes: S01E12 &#8211; Cursing and swearing","author":"DrClaireH","date":"30 September 2019","format":false,"excerpt":"CONTENT RATING: PG-16 See the Self-care page if you need support. Should you be prosecuted for barking? Or asking about a horse's sexuality? What about using a racist slur? This episode looks at the turbulent history of \u00a75 of the Public Order Act 1986, and its chaotic journey from the\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/wp.lancs.ac.uk\/enclair\/files\/2019\/09\/ofcom_swearword_table.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/wp.lancs.ac.uk\/enclair\/files\/2019\/09\/ofcom_swearword_table.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/wp.lancs.ac.uk\/enclair\/files\/2019\/09\/ofcom_swearword_table.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/wp.lancs.ac.uk\/enclair\/files\/2019\/09\/ofcom_swearword_table.png?resize=700%2C400 2x, https:\/\/i0.wp.com\/wp.lancs.ac.uk\/enclair\/files\/2019\/09\/ofcom_swearword_table.png?resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/wp.lancs.ac.uk\/enclair\/wp-json\/wp\/v2\/posts\/185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.lancs.ac.uk\/enclair\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.lancs.ac.uk\/enclair\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.lancs.ac.uk\/enclair\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.lancs.ac.uk\/enclair\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":9,"href":"https:\/\/wp.lancs.ac.uk\/enclair\/wp-json\/wp\/v2\/posts\/185\/revisions"}],"predecessor-version":[{"id":455,"href":"https:\/\/wp.lancs.ac.uk\/enclair\/wp-json\/wp\/v2\/posts\/185\/revisions\/455"}],"wp:attachment":[{"href":"https:\/\/wp.lancs.ac.uk\/enclair\/wp-json\/wp\/v2\/media?parent=185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.lancs.ac.uk\/enclair\/wp-json\/wp\/v2\/categories?post=185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.lancs.ac.uk\/enclair\/wp-json\/wp\/v2\/tags?post=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}