Covert listening device
Encyclopedia
A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone
. The use of bugs, called bugging, is a common technique in surveillance
, espionage
and in police
investigations.
A bug does not have to be a device specifically designed for the purpose of eavesdropping. For instance, with the right equipment, it is possible to remotely activate the microphone of cellular phones, even when a call is not being made, to listen to conversations in the vicinity of the phone.
(cell phone) microphones can be activated remotely, without any need for physical access. This "roving bug" feature has been used by law enforcement agencies and intelligence services to listen in on nearby conversations. A United States court ruled in 1988 that a similar technique used by the FBI
against reputed former Gulfport, Mississippi
cocaine dealers Bennett Branch and Don Tomlinson dealing cocaine under the direct authority of kingpin David "The Eagle" Easterling after having obtained a court order was permissible.
Microphone
A microphone is an acoustic-to-electric transducer or sensor that converts sound into an electrical signal. In 1877, Emile Berliner invented the first microphone used as a telephone voice transmitter...
. The use of bugs, called bugging, is a common technique in surveillance
Surveillance
Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner...
, espionage
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...
and in police
Police
The police is a personification of the state designated to put in practice the enforced law, protect property and reduce civil disorder in civilian matters. Their powers include the legitimized use of force...
investigations.
A bug does not have to be a device specifically designed for the purpose of eavesdropping. For instance, with the right equipment, it is possible to remotely activate the microphone of cellular phones, even when a call is not being made, to listen to conversations in the vicinity of the phone.
Remotely activated mobile phone microphones
Mobile phoneMobile phone
A mobile phone is a device which can make and receive telephone calls over a radio link whilst moving around a wide geographic area. It does so by connecting to a cellular network provided by a mobile network operator...
(cell phone) microphones can be activated remotely, without any need for physical access. This "roving bug" feature has been used by law enforcement agencies and intelligence services to listen in on nearby conversations. A United States court ruled in 1988 that a similar technique used by the FBI
Federal Bureau of Investigation
The Federal Bureau of Investigation is an agency of the United States Department of Justice that serves as both a federal criminal investigative body and an internal intelligence agency . The FBI has investigative jurisdiction over violations of more than 200 categories of federal crime...
against reputed former Gulfport, Mississippi
Gulfport, Mississippi
Gulfport is the second largest city in Mississippi after the state capital Jackson. It is the larger of the two principal cities of the Gulfport-Biloxi, Mississippi Metropolitan Statistical Area, which is included in the Gulfport-Biloxi-Pascagoula, Mississippi Combined Statistical Area. As of the...
cocaine dealers Bennett Branch and Don Tomlinson dealing cocaine under the direct authority of kingpin David "The Eagle" Easterling after having obtained a court order was permissible.
Automobile computer systems
In 2003 the FBI obtained a court order to surreptitiously listen in on conversations in a car, through the car's built-in emergency and tracking security system. A panel of the 9th Circuit Court of Appeals prohibited the use of this technique because it involved deactivating the device's security features.Examples of use
- Embassies and other diplomatic posts are often the targets of bugging operations.
- The Soviet embassy in OttawaEmbassy of Russia in OttawaThe Embassy of Russia in Canada is the Russian embassy in Ottawa, Ontario, Canada, It is located at 285 Charlotte, at the eastern terminus of Laurier Avenue. To the south it looks out on Strathcona Park while to the east it looks out on the Rideau River...
was bugged by the CanadianCanadaCanada is a North American country consisting of ten provinces and three territories. Located in the northern part of the continent, it extends from the Atlantic Ocean in the east to the Pacific Ocean in the west, and northward into the Arctic Ocean...
government and MI5MI5The Security Service, commonly known as MI5 , is the United Kingdom's internal counter-intelligence and security agency and is part of its core intelligence machinery alongside the Secret Intelligence Service focused on foreign threats, Government Communications Headquarters and the Defence...
during its construction. - Extensive bugging of the West German embassy in MoscowMoscowMoscow is the capital, the most populous city, and the most populous federal subject of Russia. The city is a major political, economic, cultural, scientific, religious, financial, educational, and transportation centre of Russia and the continent...
by the KGBKGBThe KGB was the commonly used acronym for the . It was the national security agency of the Soviet Union from 1954 until 1991, and was the premier internal security, intelligence, and secret police organization during that time.The State Security Agency of the Republic of Belarus currently uses the...
was discovered by German engineer Horst SchwirkmannHorst SchwirkmannAn engineer, Horst Schwirkmann was responsible for discovering Soviet KGB bugs and recording devices planted in the West German embassy in Moscow during the Cold War....
, leading to an attack on Schwirkmann in 1964. - The Great Seal bug was hidden in a copy of the Great Seal of the United StatesGreat Seal of the United StatesThe Great Seal of the United States is used to authenticate certain documents issued by the United States federal government. The phrase is used both for the physical seal itself , and more generally for the design impressed upon it...
, presented by the Soviet UnionSoviet UnionThe Soviet Union , officially the Union of Soviet Socialist Republics , was a constitutionally socialist state that existed in Eurasia between 1922 and 1991....
to the United StatesUnited StatesThe United States of America is a federal constitutional republic comprising fifty states and a federal district...
ambassador in MoscowMoscowMoscow is the capital, the most populous city, and the most populous federal subject of Russia. The city is a major political, economic, cultural, scientific, religious, financial, educational, and transportation centre of Russia and the continent...
in 1946 (not discovered until 1952). The bug was unusual in that it had no power source or transmitter, making it much harder to detect – it was a new type of device, called a passive resonant cavity bugThing (listening device)The Thing, also known as the Great Seal bug, was one of the first covert listening devices to use passive techniques to transmit an audio signal...
. The cavity had a metallic diaphragm that moved in unison with sound waves from a conversation in the room. When illuminated by a radio beam from a remote location, the cavity would return a frequency modulatedFrequency modulationIn telecommunications and signal processing, frequency modulation conveys information over a carrier wave by varying its instantaneous frequency. This contrasts with amplitude modulation, in which the amplitude of the carrier is varied while its frequency remains constant...
signal. - The United States Embassy in MoscowEmbassy of the United States in MoscowThe Embassy of the United States in Moscow is the diplomatic mission of the United States to the Russian Federation. It is located in the Presnensky District in the city center of Moscow. Its address is: Bolshoy Deviatinsky Pereulok No...
was bugged during its construction in the 1970s by Soviet agents posing as laborers. When discovered in the early 1980s, it was found that even the concrete columns were so riddled with bugs that the building eventually had to be torn down and replaced with a new one, built with U.S. materials and labor. For a time, until the new building was completed, embassy workers had to communicate in conference rooms in writing, using children's "Mystic Writing Tablets". - In 1990, it was reported that the embassy of the People's Republic of ChinaPeople's Republic of ChinaChina , officially the People's Republic of China , is the most populous country in the world, with over 1.3 billion citizens. Located in East Asia, the country covers approximately 9.6 million square kilometres...
in CanberraCanberraCanberra is the capital city of Australia. With a population of over 345,000, it is Australia's largest inland city and the eighth-largest city overall. The city is located at the northern end of the Australian Capital Territory , south-west of Sydney, and north-east of Melbourne...
, AustraliaAustraliaAustralia , officially the Commonwealth of Australia, is a country in the Southern Hemisphere comprising the mainland of the Australian continent, the island of Tasmania, and numerous smaller islands in the Indian and Pacific Oceans. It is the world's sixth-largest country by total area...
, had been bugged by the Australian Secret Intelligence ServiceAustralian Secret Intelligence ServiceThe Australian Secret Intelligence Service is the Australian government intelligence agency responsible for collecting foreign intelligence, undertaking counter-intelligence activities and cooperation with other intelligence agencies overseas...
as part of the UKUSA Project Echelon.
- The Soviet embassy in Ottawa
- Colin ThatcherColin ThatcherWilbert Colin Thatcher is a Canadian former politician convicted for the murder of his ex-wife, JoAnn Wilson.-Political life:Colin Thatcher is the son of Wilbert Ross Thatcher, premier of Saskatchewan from 1964 to 1971...
, a CanadianCanadaCanada is a North American country consisting of ten provinces and three territories. Located in the northern part of the continent, it extends from the Atlantic Ocean in the east to the Pacific Ocean in the west, and northward into the Arctic Ocean...
politician, was secretly recorded making statements which would later be used to convict him of his wife's murder. The recording device was concealed on a person who Thatcher had previously approached for help in the crime. - Electronic bugging devices were found in March 2003 at offices used by FrenchFranceThe French Republic , The French Republic , The French Republic , (commonly known as France , is a unitary semi-presidential republic in Western Europe with several overseas territories and islands located on other continents and in the Indian, Pacific, and Atlantic oceans. Metropolitan France...
and GermanGermanyGermany , officially the Federal Republic of Germany , is a federal parliamentary republic in Europe. The country consists of 16 states while the capital and largest city is Berlin. Germany covers an area of 357,021 km2 and has a largely temperate seasonal climate...
delegations at the European Union headquarters in BrusselsBrusselsBrussels , officially the Brussels Region or Brussels-Capital Region , is the capital of Belgium and the de facto capital of the European Union...
. Devices were also discovered at offices used by other delegations. The discovery of the telephone tappingTelephone tappingTelephone tapping is the monitoring of telephone and Internet conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line...
systems was first reported by Le FigaroLe FigaroLe Figaro is a French daily newspaper founded in 1826 and published in Paris. It is one of three French newspapers of record, with Le Monde and Libération, and is the oldest newspaper in France. It is also the second-largest national newspaper in France after Le Parisien and before Le Monde, but...
newspaper, which blamed the USUnited StatesThe United States of America is a federal constitutional republic comprising fifty states and a federal district...
. - The car of Thomas Hentschell, who was involved in the Melbourne gangland killingsMelbourne gangland killingsThe Melbourne gangland killings were the murders in Melbourne, Victoria, Australia of 36 criminal figures or partners between 16 January 1998 and 13 August 2010. The murders were in a series of retributional murders involving various underworld groups. The deaths caused a sustained power vacuum...
, was bugged by police. - In 1999, the US expelled a Russian diplomat, accusing him of using a listening device in a top floor conference room used by diplomats in the United States Department of StateUnited States Department of StateThe United States Department of State , is the United States federal executive department responsible for international relations of the United States, equivalent to the foreign ministries of other countries...
headquartersHarry S Truman BuildingThe Harry S. Truman Building is the headquarters of the United States Department of State. It is located in the national capital of Washington, D.C.....
. - In 2001, the government of the People's Republic of ChinaPeople's Republic of ChinaChina , officially the People's Republic of China , is the most populous country in the world, with over 1.3 billion citizens. Located in East Asia, the country covers approximately 9.6 million square kilometres...
announced that it had discovered twenty-seven bugs in a Boeing 767Boeing 767The Boeing 767 is a mid-size, wide-body twin-engine jet airliner built by Boeing Commercial Airplanes. It was the manufacturer's first wide-body twinjet and its first airliner with a two-crew glass cockpit. The aircraft features two turbofan engines, a supercritical wing, and a conventional tail...
purchased as an official aircraft for President Jiang ZeminJiang ZeminJiang Zemin is a former Chinese politician, who served as General Secretary of the Communist Party of China from 1989 to 2002, as President of the People's Republic of China from 1993 to 2003, and as Chairman of the Central Military Commission from 1989 to 2005...
. - In 2003, the Pakistani embassy building in London was found bugged; contractors hired by MI5 had planted bugs in the building in 2001.
- In 2003, Alastair Campbell (who was Director of Communications and StrategyPublic relationsPublic relations is the actions of a corporation, store, government, individual, etc., in promoting goodwill between itself and the public, the community, employees, customers, etc....
from 1997-2003 for the UK PM) in his memoirs The Blair Years: The Alastair Campbell Diaries alleged that two bugs were discovered in the hotel room meant for visiting British PM Tony BlairTony BlairAnthony Charles Lynton Blair is a former British Labour Party politician who served as the Prime Minister of the United Kingdom from 2 May 1997 to 27 June 2007. He was the Member of Parliament for Sedgefield from 1983 to 2007 and Leader of the Labour Party from 1994 to 2007...
planted by Indian intelligence agenciesIntelligence Bureau (India)The Intelligence Bureau also known as IB is India's internal intelligence agency and reputedly the world's oldest intelligence agency. It was recast as the Central Intelligence Bureau in 1947 under the Ministry of Home Affairs...
.The alleged bug discovery was at a hotel during PM Tony Blair's official visit to New Delhi in 2001. Security services supposedly informed him that the bugs could not be removed without drilling the wall and therefore he changed to another room. - In 2004, a bug was found in a meeting room at the United NationsUnited NationsThe United Nations is an international organization whose stated aims are facilitating cooperation in international law, international security, economic development, social progress, human rights, and achievement of world peace...
offices in GenevaGenevaGeneva In the national languages of Switzerland the city is known as Genf , Ginevra and Genevra is the second-most-populous city in Switzerland and is the most populous city of Romandie, the French-speaking part of Switzerland...
. - In 2008 it was reported that an electric samovarSamovarA samovar is a heated metal container traditionally used to heat and boil water in and around Russia, as well as in other Central, South-Eastern, Eastern European countries,Kashmir and in the Middle-East...
presented to Elizabeth II in about 1968 by a Soviet aerobatic team was removed from Balmoral CastleBalmoral CastleBalmoral Castle is a large estate house in Royal Deeside, Aberdeenshire, Scotland. It is located near the village of Crathie, west of Ballater and east of Braemar. Balmoral has been one of the residences of the British Royal Family since 1852, when it was purchased by Queen Victoria and her...
as a security precaution amid fears that its wiring could contain a listening device.
See also
- SurveillanceSurveillanceSurveillance is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner...
- Acoustic cryptanalysisAcoustic cryptanalysisAcoustic cryptanalysis is a side channel attack which exploits sounds emitted by computers or machines. Modern acoustic cryptanalysis mostly focuses on sounds emitted by computer keyboards and internal computer components, but historically it has also been applied to impact printers and...
- Communications interceptionSIGINTSignals intelligence is intelligence-gathering by interception of signals, whether between people , whether involving electronic signals not directly used in communication , or combinations of the two...
- EavesdroppingEavesdroppingEavesdropping is the act of secretly listening to the private conversation of others without their consent, as defined by Black's Law Dictionary...
- Electronic Privacy Information CenterElectronic Privacy Information CenterElectronic Privacy Information Center is a public interest research group in Washington, D.C. It was established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values in the information age...
- EspionageEspionageEspionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...
- Greek telephone tapping case 2004-2005Greek telephone tapping case 2004-2005The Greek wiretapping case of 2004-2005, also referred to as Greek Watergate, involved the illegal tapping of more than 100 mobile phones on the Vodafone Greece network belonging mostly to members of the Greek government and top-ranking civil servants...
- National Cryptologic MuseumNational Cryptologic MuseumThe National Cryptologic Museum is an American museum of cryptologic history that is affiliated with the National Security Agency . The first public museum in the U.S. Intelligence Community, NCM is located in the former Colony Seven Motel, just two blocks from the NSA headquarters at Fort...
- Nonlinear junction detectorNonlinear junction detectorThe non-linear junction detector, or an NLJD, is a device that illuminates a small region of space with high-frequency, RF energy. Any "non linear junction" in the vicinity—for example, and particularly, the p-n junction -- will receive this energy, and because of the non-linear nature of the...
- Peter Wright
- PrivacyPrivacyPrivacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively...
- Privacy InternationalPrivacy InternationalPrivacy International is a UK-based non-profit organisation formed in 1990, "as a watchdog on surveillance and privacy invasions by governments and corporations." PI has organised campaigns and initiatives in more than fifty countries and is based in London, UK.-Formation, background and...
- Technical surveillance counter-measuresTechnical Surveillance Counter-MeasuresTSCM is the original United States Federal government abbreviation denoting the process of bug-sweeping or electronic countersurveillance...
- Telephone tappingTelephone tappingTelephone tapping is the monitoring of telephone and Internet conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line...
- TEMPESTTEMPESTTEMPEST is a codename referring to investigations and studies of compromising emission . Compromising emanations are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled, or otherwise processed by any...
- The Thing (listening device)Thing (listening device)The Thing, also known as the Great Seal bug, was one of the first covert listening devices to use passive techniques to transmit an audio signal...
- Aka the "Great Seal bug" - Watergate scandalWatergate scandalThe Watergate scandal was a political scandal during the 1970s in the United States resulting from the break-in of the Democratic National Committee headquarters at the Watergate office complex in Washington, D.C., and the Nixon administration's attempted cover-up of its involvement...
External links
- French, German EU Offices Bugged - CBS news story
- EU investigates mystery buggings - BBC News story
- The Great Seal bug