Knowledge (XXG)

Covert listening device

Source đź“ť

229:, cocaine dealers after having obtained a court order was permissible. Not only microphones but also seemingly innocuous motion sensors, which can be accessed by third-party apps on Android and iOS devices without any notification to the user, are a potential eavesdropping channel in smartphones. With the Covid-19 pandemic came an increase in remote work spurring on a new advent of Employee Monitoring Software which remotely collects many forms of data from laptops and smartphones issued by employers, including webcam and microphone data, raising concerns that a new era of corporate spying has shifted the power balance between workers and businesses. 36: 616: 1772:"In 1990, it was learned, that the ASIS, along with the help of 30 NSA technicians, had bugged the Chinese embassy. The story had originally been picked up by an Australian paper, but the ASIS asked them to sit on the story. Shortly thereafter, the Associated Press also picked up the story, but the ASIS also got them to sit on the story. However, the story somehow made its way to 94: 178:. It consisted of a microphone in one location and a remote listening post with a speaker that could also be recorded using a phonograph. While also marketed as a device that allowed broadcasting of sounds, or dictating text from one room to a typist in another, it was used in several criminal investigations. 760:
to clarify and modernize the ECPA. The ECPA has three title. Title I prohibits attempted or successful interception of or "procure any other person to intercept or endeavor to intercept any wire, oral, or electronic communication." It also prohibits the storage of any information obtained via phone
676:
The use of listening devices is permitted under UK law providing that they are used in compliance with Data Protection and Human Rights laws. If a government body or organisation intends to use listening or recording devices they must follow the laws put in place by the Regulation of Investigatory
365:
was bugged during its construction in the 1970s by Soviet agents posing as laborers. When discovered in the early 1980s, it was found that even the concrete columns were so riddled with bugs that the building eventually had to be torn down and replaced with a new one, built with US materials and
194:
The act of "wearing a wire" refers to a person knowingly recording the conversation or transmitting the contents of a conversation to a police listening post. Usually, some sort of device is attached to the body in an inconspicuous way, such as taping a microphone wire to their chest. Undercover
221:(cell phone) microphones can be activated remotely, without any need for physical access. This "roving bug" feature has been used by law enforcement agencies and intelligence services to listen in on nearby conversations. A United States court ruled in 1988 that a similar technique used by the 799:
within the US. Typically the variation comes on whether or not the state is a one or two party consent state. Within one party consent states, only one party must approve the recording, whereas in all party consent states all parties must consent to the recording. In many states, the consent
707:
It is illegal to use listening devices on certain Military band and Air Band UHF and FM frequencies - people in the past who have not followed this law have been fined over ÂŁ10,000. This is because the use of a radio transmission bug that transmits on restricted frequencies contravenes the
381:
in Leningrad. The highly sophisticated devices were planted by the Soviets between 1976 and 1984 and were hidden inside a metal support bar. Information was intercepted by detecting the movements of metal bars inside the typewriter (the so-called latch interposers) by means of
770:
to authorize any wiretapping activates. Such laws were passed in response to congressional investigations that found extensive cases of government and private wiretapping without consent or legal authorization. In the US, electronic surveillance is seen as protected under the
751:
of the US Code § 2251 ). Furthermore, congress passed the Electronic Communications Privacy Act of 1986 (ECPA). This act updated the Federal Wiretap Act of 1968. The Federal Wiretap act addressed the interception of conversations over telephone lines, but not interception of
800:
requirements listed below only apply to situations where the parties have a reasonable expectation of privacy, such as private property, and do not apply in public areas. (Protection can apply to conversations in public areas in some circumstances.)
553:. The alleged bug discovery was at a hotel during Blair's official visit to New Delhi in 2001. Security services supposedly informed him that the bugs could not be removed without drilling the wall and therefore he changed to another room. 1381: 708:
Telecommunications Act and is illegal. It is also against the law to place a listening or recording device in someone else's home. Due to privacy and human rights laws, using a listening or recording device to intrude on the reasonable
199:
and police-related movies and television shows. A stereotypical scene might include an individual being suspected by criminals of "wearing a wire", resulting in their tearing the suspect's shirt open to reveal the deception.
698:
It is legal to use listening or recording devices in public areas, in an office or business area, or in one's own home. Many people use listening devices to record evidence or to take notes for their own reference.
765:
which prohibits unauthorized interception of "wire, oral, or electronic communications" by the government or by private citizens. Furthermore, this act establishes the procedure for government officials to obtain
460:
politician, was secretly recorded making statements which would later be used to convict him of his wife's murder. The recording device was concealed on a person Thatcher had previously approached for help in the
186:
A "wire" is a device that is hidden or concealed under a person's clothes for the purpose of covertly listening to conversations in proximity to the person wearing the "wire". Wires are typically used in police
166:. For instance, with the right equipment, it is possible to remotely activate the microphone of cellular phones, even when a call is not being made, to listen to conversations in the vicinity of the phone. 689:
for legitimate security and safety reasons. Many people use listening devices on their own property to capture evidence of excessive noise in a neighbour complaint, which is legal in normal circumstances.
1987: 155:
was designing and building "Surveillance Transmitters" that employed transistors, which greatly reduced the size and power consumption. With no moving parts and greater power efficiency, these
354:. The cavity had a metallic diaphragm that moved in unison with sound waves from a conversation in the room. When illuminated by a radio beam from a remote location, the cavity would return a 1900: 350:
in 1946 and only discovered in 1952. The bug was unusual in that it had no power source or active components, making it much harder to detect—it was a new type of device, called a
260:
Researchers have also prototyped a method for reconstructing audio from video of thin objects that can pick up sound vibrations, such as a houseplant or bag of potato chips.
1612: 776: 762: 1946: 1543: 1249: 1914: 712:
of an individual is highly illegal, i.e. placing gadgets in someone's home or car to which one does not have permitted access, or in a private area such as a bathroom.
46: 523: 378: 1587: 685:
It is illegal to use listening or recording devices that are not permitted for public use. Individuals may only use listening or recording devices within reasonable
519: 1745: 2117: 241:
obtained a court order to surreptitiously listen in on conversations in a car through the car's built-in emergency and tracking security system. A panel of the
1861: 1995: 2591: 191:
in order to gather information about suspects. The wire device transmits to a remote location where law enforcement agents monitor what is being said.
1892: 637: 1665: 1215: 1481: 1122: 2232: 2574: 2530: 1082: 402: 362: 1346: 496:
In 1999, the US expelled a Russian diplomat, accusing him of using a listening device in a top floor conference room used by diplomats in the
1187: 1072: 747:, or any kind of electric communication. This single party consent only applies if one of the parties is an "officer of the United States" 2525: 374: 1569: 1731: 739:
of the US Code § 2251 2(iii)(c) at least one of the parties involved in the communication must have given consent to interception of the
2280: 2686: 1701: 1313: 1168:
Kröger, Jacob Leon; Raschke, Philip (2019). "Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping".
780: 748: 736: 415:
In 2003, the Pakistani embassy building in London was found bugged; contractors hired by MI5 had planted bugs in the building in 2001.
1512: 2701: 2426: 1824: 1651: 772: 663: 497: 80: 1452:
Informants and Undercover Investigations: A Practical Guide to Law, Policy, Dennis G. Fitzgerald, CRC Press, Jan 24, 2007, page 204
1604: 2461: 2386: 1936: 1786: 335: 222: 1540: 1257: 151:
in the 1950s, when technology allowed for a suitable transmitter to be built into a relatively small package. By 1956, the US
2328: 1922: 641: 1584: 2696: 2225: 1767: 721: 390: 210:
Wearing a wire is viewed as risky since discovery could lead to violence against the mole or other retaliatory responses.
2236: 242: 58: 427:
Also during the war, the British used covert listening devices to monitor captured German fighter pilots being held at
1097: 1092: 583: 550: 490: 299: 276: 152: 1869: 1395:
Kemp, Kathryn W. (2007). ""The Dictograph Hears All": An Example of Surveillance Technology in the Progressive Era".
626: 174:
Among the earliest covert listening devices used in the United States of America was the dictograph, an invention of
62: 2691: 2142: 2092: 2067: 1102: 2093:"Title III of The Omnibus Crime Control and Safe Streets Act of 1968 (Wiretap Act) | Bureau of Justice Assistance" 645: 630: 257:
can be used to reconstruct audio from a laser beam shot onto an object in a room, or the glass pane of a window.
1515: 370: 351: 2381: 2273: 500: 156: 677:
Powers Act (RIPA). It is usually permitted to record audio covertly in a public setting or one's own home.
2221: 2043:"18 U.S. Code § 2511 - Interception and disclosure of wire, oral, or electronic communications prohibited" 1057: 1052: 732: 709: 534: 2681: 2660: 1112: 1087: 443: 226: 2247: 1489: 1223: 779:, which protects against unreasonable search and seizure by the government, which also is seen by the 245:
prohibited the use of this technique because it involved deactivating the device's security features.
2586: 2569: 2542: 2305: 1283: 355: 303: 280: 2209: 2032:
The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000.
2648: 2552: 1354: 507: 148: 1675: 1379:, Germer, William F. H., "Telephone dictating machine or apparatus", issued 1907-02-05 2537: 2504: 2478: 2456: 2451: 2421: 2406: 2266: 1941: 1564: 1412: 1132: 744: 331: 2217: 2196: 1559: 2653: 2322: 1761: 1723: 1193: 1183: 1142: 1127: 598: 477: 325: 121: 2618: 2350: 1404: 1173: 761:
calls without consent or illegally obtained though wiretaps. Furthermore, the US passed the
538: 254: 204: 159:
could be operated by small batteries, which revolutionized the process of covert listening.
1709: 1321: 306: 2638: 2613: 2547: 2509: 2446: 1960: 1670: 1591: 1573: 1547: 1519: 1288: 576: 545:
alleged that two bugs were discovered in the hotel room meant for visiting Prime Minister
476:. Devices were also discovered at offices used by other delegations. The discovery of the 409: 188: 1816: 1647: 2316: 1431: 557: 453: 2675: 2596: 2564: 2466: 2441: 2360: 2068:"Electronic Communications Privacy Act of 1986 (ECPA) | Bureau of Justice Assistance" 1416: 1067: 792: 740: 579:
as a security precaution amid fears that its wiring could contain a listening device.
343: 163: 1794: 2643: 2431: 2416: 2355: 2340: 2333: 1117: 572: 383: 339: 218: 133: 98: 2042: 1376: 175: 2633: 2499: 2345: 2202: 2168: 1838: 1178: 767: 757: 686: 615: 591: 590:
to intercept Vietnamese communist messages concerning negotiating an end to the
527: 421: 313: 129: 2628: 2608: 2601: 2581: 2488: 1408: 796: 546: 515: 450:
audio masking. It was not discovered who was responsible for planting the bug.
447: 428: 125: 2253: 1197: 147:
Self-contained electronic covert listening devices came into common use with
2623: 2436: 2365: 2300: 2289: 1077: 482: 457: 446:
via a pickup coil and transmitted it on a frequency near 600 MHz using
398: 291: 162:
A bug does not have to be a device specifically designed for the purpose of
137: 2242: 2471: 753: 473: 394: 196: 1648:"Operation Easy Chair: Bugging the Russian Embassy in The Hague in 1958" 1470:
Organized Crime, Micheal Benson, Infobase Publishing, Jan. 1, 2009, page
1172:. Lecture Notes in Computer Science. Vol. 11559. pp. 102–120. 272:
and other diplomatic posts are often the targets of bugging operations.
2557: 1137: 1107: 586:
placed a wire tap on a multiplex trunk line 24 kilometers southwest of
568: 469: 464:
Electronic bugging devices were found in March 2003 at offices used by
269: 93: 17: 1635:
Spycatcher: The Candid Autobiography of a Senior Intelligence Officer
1062: 791:
Listening devices are regulated by several legislative bodies in the
561: 465: 439: 347: 317: 141: 511: 406: 101: 92: 541:
from 1997 to 2003 for the British Prime Minister) in his memoirs
434:
In the late 1970s, a bug was discovered in a meeting room at the
587: 435: 295: 2262: 1605:"How To Translate Sight Into Sound? It's All In The Vibrations" 1776:
magazine, where it was published, compromising the operation."
609: 321: 284: 238: 45:
deal primarily with the United Kingdom and do not represent a
29: 2118:"What Does the Fourth Amendment Mean? | United States Courts" 2258: 1746:"Australian Security & Intelligence Organization (ASIO)" 1461:
Guide to Writing Movie Scripts, Wils Randel, 2009, page 123
756:
or other digital data. This act was further updated by the
420:
During World War II, the Nazis took over a Berlin brothel,
2218:
Listening In: Electronic Eavesdropping in the Cold War Era
2143:"Recording Phone Calls and Conversations: 50-State Survey" 1862:"U.S. Expelling Russian Diplomat in Bugging of State Dept" 1724:"Operation Gunman: how the Soviets bugged IBM typewriters" 575:
in about 1968 by a Soviet aerobatic team was removed from
386:. The data was then compressed and transmitted in bursts. 1988:"Russia's teapot gift to Queen 'could have been bugged'" 681:
Legal requirements of listening and recording device use
514:
announced that it had discovered twenty-seven bugs in a
1560:"Court Leaves the Door Open for Safety System Wiretaps" 176:
Kelley M. Turner patented in 1906 (US Patent US843186A)
54: 1209: 1207: 489:
The car of Thomas Hentschell, who was involved in the
2243:
Covert listening devices on the Crypto Museum website
1915:"Vajpayee govt tried to bug Blair's bedroom in Delhi" 1318:
Western Regional Security Office (NOAA official site)
195:
agents "wearing a wire" is a typical plot element in
2518: 2487: 2397: 2374: 2296: 1891:McElroy, Damien; Wastell, David (20 January 2002). 1248:McCullagh, Declan; Anne Broache (1 December 2006). 1163: 1161: 1159: 424:, and used concealed microphones to spy on patrons. 207:may be given a "wire" to wear under their clothes. 1284:"Use of mobile helped police keep tabs on suspect" 1216:"Remotely Eavesdropping on Cell Phone Microphones" 556:In 2004, a bug was found in a meeting room at the 472:delegations at the European Union headquarters in 1860:Johnston, David; James Risen (10 December 1999). 1633:Operation Dew Worm. Described by Peter Wright in 1397:The Journal of the Gilded Age and Progressive Era 1341: 1339: 1170:Data and Applications Security and Privacy XXXIII 389:In 1990, it was reported that the embassy of the 524:General Secretary of the Chinese Communist Party 1277: 1275: 1250:"FBI taps cell phone mic as eavesdropping tool" 1541:FBI taps cell phone mic as eavesdropping tool. 703:Illegal use of listening and recording devices 543:The Blair Years: The Alastair Campbell Diaries 328:, leading to an attack on Schwirkmann in 1964. 2274: 1482:"Cell hack geek stalks pretty blonde shocker" 1243: 1241: 369:In 1984, bugs were discovered in at least 16 43:The examples and perspective in this article 8: 1893:"China finds spy bugs in Jiang's Boeing jet" 1585:Court to FBI: No spying on in-car computers. 1308: 1306: 694:Legal use of listening and recording devices 203:When infiltrating a criminal organization a 795:. Laws on listening devices varies between 644:. Unsourced material may be challenged and 214:Remotely activated mobile phone microphones 2281: 2267: 2259: 1748:. Archived from the original on 3 May 2009 804:Parties required to give consent by state 802: 567:In 2008, it was reported that an electric 120:, is usually a combination of a miniature 2254:Some CIA surveillance and bugging devices 2248:Eavesdropping Devices Found in Restaurant 1177: 664:Learn how and when to remove this message 442:. The bug intercepted the audio from the 81:Learn how and when to remove this message 2018:Shadow War: The CIA's Secret War in Laos 1700:Hyde, Hon. Henry J. (26 October 1990), 1637:, Stoddart (paperback), 1987. pp. 79-83 1155: 1138:Vault 7 § Part 6 – "Weeping Angel" 1123:Technical surveillance counter-measures 539:Director of Communications and Strategy 2531:Chinese espionage in the United States 1759: 1083:Greek telephone tapping case 2004-2005 716:United States Law on Listening Devices 403:Australian Secret Intelligence Service 128:. The use of bugs, called bugging, or 2028: 2026: 2016:Conboy, Kenneth, and James Morrison, 1073:Electronic Privacy Information Center 7: 2526:Chinese intelligence activity abroad 1961:"Bugging device found at UN offices" 1937:"Delhi clumsily bugged Blair's room" 731:Several federal laws were passed by 642:adding citations to reliable sources 2592:Interpersonal (HUMINT) intelligence 2020:, Paladin Press, pp. 381–385. 1986:Moore, Matthew (25 November 2008). 1949:from the original on 8 August 2016. 1827:from the original on 31 March 2017. 1674:. 25 September 1964. Archived from 1214:Schneier, Bruce (5 December 2006). 1903:from the original on 6 March 2014. 1839:"EU investigates mystery buggings" 1793:. 10 November 2003. Archived from 1787:"UK embassy 'bug' angers Pakistan" 1654:from the original on 1 April 2017. 781:Supreme Court of the United States 324:was discovered by German engineer 25: 2427:Computer and network surveillance 2173:LII / Legal Information Institute 2047:LII / Legal Information Institute 1734:from the original on 15 May 2017. 1702:"Embassy Moscow: Paying the Bill" 1615:from the original on 14 July 2017 727:Federal laws on Listening Devices 498:United States Department of State 2462:Short-range agent communications 2203:EU investigates mystery buggings 2197:French, German EU Offices Bugged 1550:, CNET News.com, 1 December 2006 614: 606:Listening devices and the UK law 287:during its construction in 1956. 34: 1708:, p. E3555, archived from 1594:CNET News.com, 19 November 2003 486:newspaper, which blamed the US. 363:United States Embassy in Moscow 336:Great Seal of the United States 1921:. 20 July 2007. Archived from 1511:Brian Wheeler (2 March 2004). 743:. This title applies to wire, 735:that apply nation-wide. Under 480:systems was first reported by 1: 2226:Bureau of Diplomatic Security 1282:Odell, Mark (1 August 2005). 722:Telephone call recording laws 2237:US Department of Agriculture 857:District of Columbia (D.C.) 783:as electronic surveillance. 551:Indian intelligence agencies 334:was hidden in a copy of the 243:9th Circuit Court of Appeals 1480:Lewis Page (26 June 2007). 1179:10.1007/978-3-030-22479-0_6 1098:Nonlinear junction detector 1093:National Cryptologic Museum 1063:Communications interception 584:Central Intelligence Agency 491:Melbourne gangland killings 352:passive resonant cavity bug 233:Automobile computer systems 153:Central Intelligence Agency 112:, more commonly known as a 57:, discuss the issue on the 2718: 1666:"Fumigating the Fumigator" 939: 719: 512:People's Republic of China 391:People's Republic of China 302:in 1958 and 1959 using an 249:Audio from optical sources 2687:Law enforcement equipment 1766:: CS1 maint: unfit URL ( 1513:"This goes no further..." 1430:Strother, French (1912). 1409:10.1017/S153778140000222X 812:All-Party Consent States 809:One-party Consent States 401:, had been bugged by the 371:IBM Selectric typewriters 312:Extensive bugging of the 132:is a common technique in 97:Listening devices of the 2702:Covert listening devices 2213:, How to protect privacy 1994:. London. Archived from 1516:BBC News Online Magazine 1432:"What the dictograph is" 787:State to State variation 582:On 6 December 1972, the 277:Soviet embassy in Ottawa 2412:Covert listening device 2382:Intelligence assessment 2250:- QCC Global News Story 1689:(subscription required) 493:, was bugged by police. 290:The Russian Embassy in 225:against reputed former 110:covert listening device 2222:US Department of State 2210:A simple guide to TSCM 1347:"Can You Hear Me Now?" 1320:. 2001. Archived from 1058:Cellphone surveillance 1053:Acoustic cryptanalysis 710:expectation of privacy 105: 2661:Targeted surveillance 1925:on 29 September 2012. 1351:ABC News: The Blotter 1113:Privacy International 1088:Mobile phone tracking 227:Gulfport, Mississippi 149:intelligence agencies 96: 2697:Espionage techniques 2587:Industrial espionage 2387:competing hypotheses 1706:Congressional Record 1590:14 July 2014 at the 1572:1 March 2012 at the 1546:14 July 2014 at the 1220:Schneier On Security 638:improve this section 375:US Embassy in Moscow 281:Government of Canada 63:create a new article 55:improve this article 2233:Bugging Hotel Rooms 1992:The Daily Telegraph 1797:on 14 November 2012 1730:. 14 October 2015. 1712:on 26 November 2012 1568:, 21 December 2003 1260:on 10 November 2013 805: 356:frequency modulated 338:, presented by the 157:solid-state devices 27:Surveillance device 2538:Cold War espionage 2505:Front organization 2479:Surveillance tools 2457:Phone surveillance 2452:One-way voice link 2407:Concealment device 1998:on 7 February 2009 1967:. 18 December 2004 1942:The Times of India 1872:on 6 February 2009 1866:The New York Times 1823:. 28 August 2016. 1565:The New York Times 1492:on 3 November 2013 1324:on 6 November 2013 1226:on 12 January 2014 803: 332:The Great Seal bug 294:was bugged by the 279:was bugged by the 106: 2692:Espionage devices 2669: 2668: 2323:Agent provocateur 1678:on 23 August 2013 1650:. 30 March 2017. 1357:on 25 August 2011 1189:978-3-030-22478-3 1143:Watergate scandal 1128:Telephone tapping 1043: 1042: 674: 673: 666: 599:Watergate scandal 535:Alastair Campbell 520:official aircraft 478:telephone tapping 326:Horst Schwirkmann 309:listening device. 122:radio transmitter 102:security services 91: 90: 83: 65:, as appropriate. 16:(Redirected from 2709: 2283: 2276: 2269: 2260: 2205:- BBC News story 2199:- CBS news story 2184: 2183: 2181: 2179: 2165: 2159: 2158: 2156: 2154: 2139: 2133: 2132: 2130: 2128: 2122:www.uscourts.gov 2114: 2108: 2107: 2105: 2103: 2089: 2083: 2082: 2080: 2078: 2064: 2058: 2057: 2055: 2053: 2039: 2033: 2030: 2021: 2014: 2008: 2007: 2005: 2003: 1983: 1977: 1976: 1974: 1972: 1957: 1951: 1950: 1945:. 30 July 2007. 1933: 1927: 1926: 1911: 1905: 1904: 1888: 1882: 1881: 1879: 1877: 1868:. Archived from 1857: 1851: 1850: 1848: 1846: 1835: 1829: 1828: 1813: 1807: 1806: 1804: 1802: 1783: 1777: 1771: 1765: 1757: 1755: 1753: 1742: 1736: 1735: 1720: 1714: 1713: 1697: 1691: 1690: 1687: 1685: 1683: 1662: 1656: 1655: 1644: 1638: 1631: 1625: 1624: 1622: 1620: 1601: 1595: 1582: 1576: 1557: 1551: 1538: 1532: 1531: 1529: 1527: 1522:on 27 March 2014 1518:. Archived from 1508: 1502: 1501: 1499: 1497: 1488:. Archived from 1477: 1471: 1468: 1462: 1459: 1453: 1450: 1444: 1443: 1436:The World's Work 1427: 1421: 1420: 1392: 1386: 1385: 1384: 1380: 1373: 1367: 1366: 1364: 1362: 1353:. Archived from 1343: 1334: 1333: 1331: 1329: 1310: 1301: 1300: 1298: 1296: 1279: 1270: 1269: 1267: 1265: 1256:. Archived from 1245: 1236: 1235: 1233: 1231: 1222:. Archived from 1211: 1202: 1201: 1181: 1165: 806: 777:Fourth Amendment 669: 662: 658: 655: 649: 618: 610: 518:purchased as an 438:headquarters in 255:laser microphone 189:sting operations 144:investigations. 86: 79: 75: 72: 66: 38: 37: 30: 21: 2717: 2716: 2712: 2711: 2710: 2708: 2707: 2706: 2672: 2671: 2670: 2665: 2639:Sting operation 2548:Black operation 2514: 2510:Limited hangout 2492: 2483: 2447:Numbers station 2399: 2393: 2370: 2310: 2292: 2287: 2193: 2188: 2187: 2177: 2175: 2169:"eavesdropping" 2167: 2166: 2162: 2152: 2150: 2149:. 25 April 2018 2141: 2140: 2136: 2126: 2124: 2116: 2115: 2111: 2101: 2099: 2091: 2090: 2086: 2076: 2074: 2066: 2065: 2061: 2051: 2049: 2041: 2040: 2036: 2031: 2024: 2015: 2011: 2001: 1999: 1985: 1984: 1980: 1970: 1968: 1959: 1958: 1954: 1935: 1934: 1930: 1913: 1912: 1908: 1890: 1889: 1885: 1875: 1873: 1859: 1858: 1854: 1844: 1842: 1841:. 19 March 2003 1837: 1836: 1832: 1815: 1814: 1810: 1800: 1798: 1785: 1784: 1780: 1758: 1751: 1749: 1744: 1743: 1739: 1722: 1721: 1717: 1699: 1698: 1694: 1688: 1681: 1679: 1664: 1663: 1659: 1646: 1645: 1641: 1632: 1628: 1618: 1616: 1603: 1602: 1598: 1592:Wayback Machine 1583: 1579: 1574:Wayback Machine 1558: 1554: 1548:Wayback Machine 1539: 1535: 1525: 1523: 1510: 1509: 1505: 1495: 1493: 1479: 1478: 1474: 1469: 1465: 1460: 1456: 1451: 1447: 1429: 1428: 1424: 1394: 1393: 1389: 1382: 1375: 1374: 1370: 1360: 1358: 1345: 1344: 1337: 1327: 1325: 1312: 1311: 1304: 1294: 1292: 1289:Financial Times 1281: 1280: 1273: 1263: 1261: 1247: 1246: 1239: 1229: 1227: 1213: 1212: 1205: 1190: 1167: 1166: 1157: 1152: 1147: 1048: 999:South Carolina 974:North Carolina 789: 758:USA Patriot Act 729: 724: 718: 705: 696: 683: 670: 659: 653: 650: 635: 619: 608: 577:Balmoral Castle 410:Project Echelon 405:as part of the 266: 264:Examples of use 251: 235: 216: 184: 172: 87: 76: 70: 67: 52: 39: 35: 28: 23: 22: 15: 12: 11: 5: 2715: 2713: 2705: 2704: 2699: 2694: 2689: 2684: 2674: 2673: 2667: 2666: 2664: 2663: 2658: 2657: 2656: 2651: 2641: 2636: 2631: 2626: 2621: 2616: 2611: 2606: 2605: 2604: 2599: 2589: 2584: 2579: 2578: 2577: 2572: 2562: 2561: 2560: 2555: 2545: 2540: 2535: 2534: 2533: 2522: 2520: 2516: 2515: 2513: 2512: 2507: 2502: 2496: 2494: 2485: 2484: 2482: 2481: 2476: 2475: 2474: 2464: 2459: 2454: 2449: 2444: 2439: 2434: 2429: 2424: 2419: 2414: 2409: 2403: 2401: 2400:communications 2395: 2394: 2392: 2391: 2390: 2389: 2378: 2376: 2372: 2371: 2369: 2368: 2363: 2358: 2353: 2348: 2343: 2338: 2337: 2336: 2326: 2319: 2317:Agent handling 2313: 2311: 2309: 2308: 2303: 2297: 2294: 2293: 2288: 2286: 2285: 2278: 2271: 2263: 2257: 2256: 2251: 2245: 2240: 2229: 2214: 2206: 2200: 2192: 2191:External links 2189: 2186: 2185: 2160: 2134: 2109: 2084: 2059: 2034: 2022: 2009: 1978: 1952: 1928: 1906: 1883: 1852: 1830: 1808: 1778: 1737: 1715: 1692: 1657: 1639: 1626: 1596: 1577: 1552: 1533: 1503: 1472: 1463: 1454: 1445: 1422: 1403:(4): 409–430. 1387: 1368: 1335: 1302: 1271: 1237: 1203: 1188: 1154: 1153: 1151: 1148: 1146: 1145: 1140: 1135: 1130: 1125: 1120: 1115: 1110: 1105: 1100: 1095: 1090: 1085: 1080: 1075: 1070: 1065: 1060: 1055: 1049: 1047: 1044: 1041: 1040: 1036: 1035: 1031: 1030: 1029:West Virginia 1026: 1025: 1021: 1020: 1016: 1015: 1011: 1010: 1006: 1005: 1001: 1000: 996: 995: 991: 990: 986: 985: 981: 980: 976: 975: 971: 970: 966: 965: 961: 960: 956: 955: 951: 950: 946: 945: 941: 940: 938: 934: 933: 930: 926: 925: 922: 918: 917: 914: 910: 909: 906: 902: 901: 900:New Hampshire 898: 894: 893: 890: 886: 885: 882: 878: 877: 874: 870: 869: 868:Massachusetts 866: 862: 861: 858: 854: 853: 850: 846: 845: 842: 838: 837: 834: 830: 829: 826: 822: 821: 818: 814: 813: 810: 788: 785: 728: 725: 717: 714: 704: 701: 695: 692: 682: 679: 672: 671: 622: 620: 613: 607: 604: 603: 602: 595: 580: 565: 558:United Nations 554: 531: 504: 494: 487: 462: 454:Colin Thatcher 451: 432: 425: 418: 417: 416: 413: 387: 367: 359: 346:ambassador in 329: 310: 288: 265: 262: 250: 247: 234: 231: 215: 212: 183: 180: 171: 168: 89: 88: 49:of the subject 47:worldwide view 42: 40: 33: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2714: 2703: 2700: 2698: 2695: 2693: 2690: 2688: 2685: 2683: 2680: 2679: 2677: 2662: 2659: 2655: 2652: 2650: 2647: 2646: 2645: 2642: 2640: 2637: 2635: 2632: 2630: 2627: 2625: 2622: 2620: 2617: 2615: 2612: 2610: 2607: 2603: 2600: 2598: 2597:interrogation 2595: 2594: 2593: 2590: 2588: 2585: 2583: 2580: 2576: 2573: 2571: 2568: 2567: 2566: 2565:Eavesdropping 2563: 2559: 2556: 2554: 2551: 2550: 2549: 2546: 2544: 2541: 2539: 2536: 2532: 2529: 2528: 2527: 2524: 2523: 2521: 2517: 2511: 2508: 2506: 2503: 2501: 2498: 2497: 2495: 2490: 2486: 2480: 2477: 2473: 2470: 2469: 2468: 2467:Steganography 2465: 2463: 2460: 2458: 2455: 2453: 2450: 2448: 2445: 2443: 2442:Invisible ink 2440: 2438: 2435: 2433: 2430: 2428: 2425: 2423: 2420: 2418: 2415: 2413: 2410: 2408: 2405: 2404: 2402: 2396: 2388: 2385: 2384: 2383: 2380: 2379: 2377: 2373: 2367: 2364: 2362: 2361:Sleeper agent 2359: 2357: 2354: 2352: 2349: 2347: 2344: 2342: 2339: 2335: 2332: 2331: 2330: 2327: 2325: 2324: 2320: 2318: 2315: 2314: 2312: 2307: 2304: 2302: 2299: 2298: 2295: 2291: 2284: 2279: 2277: 2272: 2270: 2265: 2264: 2261: 2255: 2252: 2249: 2246: 2244: 2241: 2238: 2234: 2230: 2227: 2223: 2219: 2215: 2212: 2211: 2207: 2204: 2201: 2198: 2195: 2194: 2190: 2174: 2170: 2164: 2161: 2148: 2144: 2138: 2135: 2123: 2119: 2113: 2110: 2098: 2094: 2088: 2085: 2073: 2069: 2063: 2060: 2048: 2044: 2038: 2035: 2029: 2027: 2023: 2019: 2013: 2010: 1997: 1993: 1989: 1982: 1979: 1966: 1962: 1956: 1953: 1948: 1944: 1943: 1938: 1932: 1929: 1924: 1920: 1916: 1910: 1907: 1902: 1898: 1897:The Telegraph 1894: 1887: 1884: 1871: 1867: 1863: 1856: 1853: 1840: 1834: 1831: 1826: 1822: 1821:Crypto Museum 1818: 1812: 1809: 1796: 1792: 1788: 1782: 1779: 1775: 1769: 1763: 1747: 1741: 1738: 1733: 1729: 1728:Crypto Museum 1725: 1719: 1716: 1711: 1707: 1703: 1696: 1693: 1677: 1673: 1672: 1667: 1661: 1658: 1653: 1649: 1643: 1640: 1636: 1630: 1627: 1614: 1610: 1606: 1600: 1597: 1593: 1589: 1586: 1581: 1578: 1575: 1571: 1567: 1566: 1561: 1556: 1553: 1549: 1545: 1542: 1537: 1534: 1521: 1517: 1514: 1507: 1504: 1491: 1487: 1483: 1476: 1473: 1467: 1464: 1458: 1455: 1449: 1446: 1441: 1437: 1433: 1426: 1423: 1418: 1414: 1410: 1406: 1402: 1398: 1391: 1388: 1378: 1372: 1369: 1356: 1352: 1348: 1342: 1340: 1336: 1323: 1319: 1315: 1309: 1307: 1303: 1291: 1290: 1285: 1278: 1276: 1272: 1259: 1255: 1251: 1244: 1242: 1238: 1225: 1221: 1217: 1210: 1208: 1204: 1199: 1195: 1191: 1185: 1180: 1175: 1171: 1164: 1162: 1160: 1156: 1149: 1144: 1141: 1139: 1136: 1134: 1131: 1129: 1126: 1124: 1121: 1119: 1116: 1114: 1111: 1109: 1106: 1104: 1101: 1099: 1096: 1094: 1091: 1089: 1086: 1084: 1081: 1079: 1076: 1074: 1071: 1069: 1068:Eavesdropping 1066: 1064: 1061: 1059: 1056: 1054: 1051: 1050: 1045: 1038: 1037: 1033: 1032: 1028: 1027: 1023: 1022: 1018: 1017: 1013: 1012: 1008: 1007: 1004:South Dakota 1003: 1002: 998: 997: 994:Rhode Island 993: 992: 988: 987: 983: 982: 979:North Dakota 978: 977: 973: 972: 968: 967: 963: 962: 958: 957: 953: 952: 948: 947: 943: 942: 936: 935: 931: 928: 927: 923: 920: 919: 916:Pennsylvania 915: 912: 911: 907: 904: 903: 899: 896: 895: 891: 888: 887: 883: 880: 879: 875: 872: 871: 867: 864: 863: 859: 856: 855: 851: 848: 847: 843: 840: 839: 835: 832: 831: 827: 824: 823: 819: 816: 815: 811: 808: 807: 801: 798: 794: 793:United States 786: 784: 782: 778: 774: 769: 764: 759: 755: 750: 746: 742: 741:communication 738: 734: 726: 723: 715: 713: 711: 702: 700: 693: 691: 688: 680: 678: 668: 665: 657: 647: 643: 639: 633: 632: 628: 623:This section 621: 617: 612: 611: 605: 601:in the 1970s. 600: 596: 593: 589: 585: 581: 578: 574: 571:presented to 570: 566: 563: 559: 555: 552: 548: 544: 540: 536: 532: 529: 525: 521: 517: 513: 509: 506:In 2001, the 505: 502: 499: 495: 492: 488: 485: 484: 479: 475: 471: 467: 463: 459: 455: 452: 449: 445: 441: 437: 433: 430: 426: 423: 419: 414: 411: 408: 404: 400: 396: 392: 388: 385: 384:magnetometers 380: 376: 372: 368: 364: 360: 357: 353: 349: 345: 344:United States 341: 337: 333: 330: 327: 323: 319: 315: 311: 308: 305: 301: 297: 293: 289: 286: 282: 278: 274: 273: 271: 268: 267: 263: 261: 258: 256: 248: 246: 244: 240: 237:In 2003, the 232: 230: 228: 224: 220: 213: 211: 208: 206: 201: 198: 192: 190: 181: 179: 177: 169: 167: 165: 164:eavesdropping 160: 158: 154: 150: 145: 143: 139: 135: 131: 127: 123: 119: 115: 111: 103: 100: 95: 85: 82: 74: 64: 60: 56: 50: 48: 41: 32: 31: 19: 2682:Surveillance 2644:Surveillance 2432:Cyber spying 2417:Cryptography 2411: 2356:Resident spy 2341:Double agent 2321: 2208: 2176:. Retrieved 2172: 2163: 2151:. Retrieved 2146: 2137: 2125:. Retrieved 2121: 2112: 2100:. Retrieved 2096: 2087: 2075:. Retrieved 2071: 2062: 2050:. Retrieved 2046: 2037: 2017: 2012: 2000:. Retrieved 1996:the original 1991: 1981: 1969:. Retrieved 1965:the Guardian 1964: 1955: 1940: 1931: 1923:the original 1918: 1909: 1896: 1886: 1874:. Retrieved 1870:the original 1865: 1855: 1843:. Retrieved 1833: 1820: 1811: 1799:. Retrieved 1795:the original 1790: 1781: 1773: 1750:. Retrieved 1740: 1727: 1718: 1710:the original 1705: 1695: 1680:. Retrieved 1676:the original 1669: 1660: 1642: 1634: 1629: 1617:. Retrieved 1608: 1599: 1580: 1563: 1555: 1536: 1524:. Retrieved 1520:the original 1506: 1494:. Retrieved 1490:the original 1486:The Register 1485: 1475: 1466: 1457: 1448: 1439: 1435: 1425: 1400: 1396: 1390: 1371: 1359:. Retrieved 1355:the original 1350: 1326:. Retrieved 1322:the original 1317: 1314:"Telephones" 1293:. Retrieved 1287: 1262:. Retrieved 1258:the original 1253: 1228:. Retrieved 1224:the original 1219: 1169: 1118:Surveillance 1103:Peter Wright 944:Mississippi 828:Connecticut 790: 773:Constitution 730: 706: 697: 687:privacy laws 684: 675: 660: 651: 636:Please help 624: 573:Elizabeth II 542: 501:headquarters 481: 379:US Consulate 340:Soviet Union 259: 252: 236: 219:Mobile phone 217: 209: 202: 193: 185: 173: 161: 146: 134:surveillance 117: 113: 109: 107: 77: 68: 44: 2634:Stay-behind 2543:Recruitment 2500:Canary trap 2398:Devices and 2346:Field agent 2097:bja.ojp.gov 2072:bja.ojp.gov 1971:4 September 1442:(1): 37–41. 1361:13 December 1230:13 December 964:New Mexico 959:New Jersey 932:Washington 820:California 763:Wiretap Act 592:Vietnam War 560:offices in 549:planted by 528:Jiang Zemin 422:Salon Kitty 316:embassy in 314:West German 130:wiretapping 99:East German 2676:Categories 2629:Sexpionage 2609:COINTELPRO 2602:safe house 2582:False flag 2519:Operations 2493:techniques 2489:Tradecraft 2178:29 January 2153:29 January 2127:29 January 2102:29 January 2077:29 January 2052:29 January 1817:"OPEC bug" 1150:References 1034:Wisconsin 1009:Tennessee 937:Minnesota 921:Louisiana 720:See also: 654:March 2019 547:Tony Blair 516:Boeing 767 508:government 448:subcarrier 429:Trent Park 304:Easy Chair 170:Dictograph 126:microphone 2553:black bag 2437:Dead drop 2366:Spymaster 2290:Espionage 1417:163849152 1377:US843186A 1254:CNet News 1198:0302-9743 1078:Espionage 1024:Virginia 989:Oklahoma 969:New York 954:Nebraska 949:Missouri 913:Kentucky 876:Michigan 860:Maryland 852:Illinois 849:Colorado 841:Arkansas 836:Delaware 775:that the 749:(Title 18 625:does not 537:(who was 533:In 2003, 483:Le Figaro 444:PA system 399:Australia 292:The Hague 270:Embassies 138:espionage 71:June 2020 59:talk page 2619:SHAMROCK 2472:microdot 2375:Analysis 2002:30 April 1947:Archived 1901:Archived 1876:27 March 1825:Archived 1801:30 April 1791:BBC News 1762:cite web 1732:Archived 1652:Archived 1613:Archived 1588:Archived 1570:Archived 1544:Archived 1328:22 March 1295:14 March 1264:14 March 1046:See also 1039:Wyoming 924:Vermont 889:Indiana 884:Montana 865:Georgia 844:Florida 833:Arizona 817:Alabama 768:warrants 754:computer 737:Title 18 733:congress 474:Brussels 458:Canadian 395:Canberra 377:and the 307:Mark III 298:and the 197:gangster 53:You may 2614:MINARET 2558:wetwork 1919:IBNLive 1752:5 April 1609:npr.org 1526:23 June 1133:TEMPEST 1108:Privacy 908:Oregon 905:Kansas 892:Nevada 873:Hawaii 825:Alaska 646:removed 631:sources 569:samovar 522:of the 510:of the 373:in the 358:signal. 342:to the 320:by the 124:with a 18:Bugging 2649:Global 2575:MASINT 2570:SIGINT 2422:Cutout 2306:Assets 2301:Agents 2228:, 2008 2147:Justia 1845:13 May 1682:6 June 1415:  1383:  1196:  1186:  1014:Texas 929:Maine 881:Idaho 797:states 562:Geneva 470:German 466:French 461:crime. 440:Vienna 366:labor. 348:Moscow 318:Moscow 182:A wire 142:police 2334:Agent 2329:Cover 1619:9 May 1496:1 May 1413:S2CID 1019:Utah 984:Ohio 897:Iowa 407:UKUSA 116:or a 61:, or 2654:Mass 2624:FVEY 2351:Mole 2180:2024 2155:2024 2129:2024 2104:2024 2079:2024 2054:2024 2004:2010 1973:2021 1878:2008 1847:2020 1803:2010 1774:Time 1768:link 1754:2011 1684:2009 1671:Time 1621:2018 1528:2008 1498:2010 1363:2009 1330:2009 1297:2009 1266:2009 1232:2009 1194:ISSN 1184:ISBN 745:oral 629:any 627:cite 597:The 588:Vinh 468:and 456:, a 436:OPEC 361:The 283:and 275:The 205:mole 140:and 118:wire 2491:and 2235:". 2220:". 1405:doi 1174:doi 640:by 393:in 322:KGB 300:CIA 296:BVD 285:MI5 239:FBI 223:FBI 114:bug 2678:: 2224:, 2171:. 2145:. 2120:. 2095:. 2070:. 2045:. 2025:^ 1990:. 1963:. 1939:. 1917:. 1899:. 1895:. 1864:. 1819:. 1789:. 1764:}} 1760:{{ 1726:. 1704:, 1668:. 1611:. 1607:. 1562:, 1484:. 1440:24 1438:. 1434:. 1411:. 1399:. 1349:. 1338:^ 1316:. 1305:^ 1286:. 1274:^ 1252:. 1240:^ 1218:. 1206:^ 1192:. 1182:. 1158:^ 526:, 397:, 253:A 136:, 108:A 2282:e 2275:t 2268:v 2239:. 2231:" 2216:" 2182:. 2157:. 2131:. 2106:. 2081:. 2056:. 2006:. 1975:. 1880:. 1849:. 1805:. 1770:) 1756:. 1686:. 1623:. 1530:. 1500:. 1419:. 1407:: 1401:6 1365:. 1332:. 1299:. 1268:. 1234:. 1200:. 1176:: 667:) 661:( 656:) 652:( 648:. 634:. 594:. 564:. 530:. 503:. 431:. 412:. 104:. 84:) 78:( 73:) 69:( 51:. 20:)

Index

Bugging
worldwide view
improve this article
talk page
create a new article
Learn how and when to remove this message

East German
security services
radio transmitter
microphone
wiretapping
surveillance
espionage
police
intelligence agencies
Central Intelligence Agency
solid-state devices
eavesdropping
Kelley M. Turner patented in 1906 (US Patent US843186A)
sting operations
gangster
mole
Mobile phone
FBI
Gulfport, Mississippi
FBI
9th Circuit Court of Appeals
laser microphone
Embassies

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑