229:, cocaine dealers after having obtained a court order was permissible. Not only microphones but also seemingly innocuous motion sensors, which can be accessed by third-party apps on Android and iOS devices without any notification to the user, are a potential eavesdropping channel in smartphones. With the Covid-19 pandemic came an increase in remote work spurring on a new advent of Employee Monitoring Software which remotely collects many forms of data from laptops and smartphones issued by employers, including webcam and microphone data, raising concerns that a new era of corporate spying has shifted the power balance between workers and businesses.
36:
616:
1772:"In 1990, it was learned, that the ASIS, along with the help of 30 NSA technicians, had bugged the Chinese embassy. The story had originally been picked up by an Australian paper, but the ASIS asked them to sit on the story. Shortly thereafter, the Associated Press also picked up the story, but the ASIS also got them to sit on the story. However, the story somehow made its way to
94:
178:. It consisted of a microphone in one location and a remote listening post with a speaker that could also be recorded using a phonograph. While also marketed as a device that allowed broadcasting of sounds, or dictating text from one room to a typist in another, it was used in several criminal investigations.
760:
to clarify and modernize the ECPA. The ECPA has three title. Title I prohibits attempted or successful interception of or "procure any other person to intercept or endeavor to intercept any wire, oral, or electronic communication." It also prohibits the storage of any information obtained via phone
676:
The use of listening devices is permitted under UK law providing that they are used in compliance with Data
Protection and Human Rights laws. If a government body or organisation intends to use listening or recording devices they must follow the laws put in place by the Regulation of Investigatory
365:
was bugged during its construction in the 1970s by Soviet agents posing as laborers. When discovered in the early 1980s, it was found that even the concrete columns were so riddled with bugs that the building eventually had to be torn down and replaced with a new one, built with US materials and
194:
The act of "wearing a wire" refers to a person knowingly recording the conversation or transmitting the contents of a conversation to a police listening post. Usually, some sort of device is attached to the body in an inconspicuous way, such as taping a microphone wire to their chest. Undercover
221:(cell phone) microphones can be activated remotely, without any need for physical access. This "roving bug" feature has been used by law enforcement agencies and intelligence services to listen in on nearby conversations. A United States court ruled in 1988 that a similar technique used by the
799:
within the US. Typically the variation comes on whether or not the state is a one or two party consent state. Within one party consent states, only one party must approve the recording, whereas in all party consent states all parties must consent to the recording. In many states, the consent
707:
It is illegal to use listening devices on certain
Military band and Air Band UHF and FM frequencies - people in the past who have not followed this law have been fined over ÂŁ10,000. This is because the use of a radio transmission bug that transmits on restricted frequencies contravenes the
381:
in
Leningrad. The highly sophisticated devices were planted by the Soviets between 1976 and 1984 and were hidden inside a metal support bar. Information was intercepted by detecting the movements of metal bars inside the typewriter (the so-called latch interposers) by means of
770:
to authorize any wiretapping activates. Such laws were passed in response to congressional investigations that found extensive cases of government and private wiretapping without consent or legal authorization. In the US, electronic surveillance is seen as protected under the
751:
of the US Code § 2251 ). Furthermore, congress passed the
Electronic Communications Privacy Act of 1986 (ECPA). This act updated the Federal Wiretap Act of 1968. The Federal Wiretap act addressed the interception of conversations over telephone lines, but not interception of
800:
requirements listed below only apply to situations where the parties have a reasonable expectation of privacy, such as private property, and do not apply in public areas. (Protection can apply to conversations in public areas in some circumstances.)
553:. The alleged bug discovery was at a hotel during Blair's official visit to New Delhi in 2001. Security services supposedly informed him that the bugs could not be removed without drilling the wall and therefore he changed to another room.
1381:
708:
Telecommunications Act and is illegal. It is also against the law to place a listening or recording device in someone else's home. Due to privacy and human rights laws, using a listening or recording device to intrude on the reasonable
199:
and police-related movies and television shows. A stereotypical scene might include an individual being suspected by criminals of "wearing a wire", resulting in their tearing the suspect's shirt open to reveal the deception.
698:
It is legal to use listening or recording devices in public areas, in an office or business area, or in one's own home. Many people use listening devices to record evidence or to take notes for their own reference.
765:
which prohibits unauthorized interception of "wire, oral, or electronic communications" by the government or by private citizens. Furthermore, this act establishes the procedure for government officials to obtain
460:
politician, was secretly recorded making statements which would later be used to convict him of his wife's murder. The recording device was concealed on a person
Thatcher had previously approached for help in the
186:
A "wire" is a device that is hidden or concealed under a person's clothes for the purpose of covertly listening to conversations in proximity to the person wearing the "wire". Wires are typically used in police
166:. For instance, with the right equipment, it is possible to remotely activate the microphone of cellular phones, even when a call is not being made, to listen to conversations in the vicinity of the phone.
689:
for legitimate security and safety reasons. Many people use listening devices on their own property to capture evidence of excessive noise in a neighbour complaint, which is legal in normal circumstances.
1987:
155:
was designing and building "Surveillance
Transmitters" that employed transistors, which greatly reduced the size and power consumption. With no moving parts and greater power efficiency, these
354:. The cavity had a metallic diaphragm that moved in unison with sound waves from a conversation in the room. When illuminated by a radio beam from a remote location, the cavity would return a
1900:
350:
in 1946 and only discovered in 1952. The bug was unusual in that it had no power source or active components, making it much harder to detect—it was a new type of device, called a
260:
Researchers have also prototyped a method for reconstructing audio from video of thin objects that can pick up sound vibrations, such as a houseplant or bag of potato chips.
1612:
776:
762:
1946:
1543:
1249:
1914:
712:
of an individual is highly illegal, i.e. placing gadgets in someone's home or car to which one does not have permitted access, or in a private area such as a bathroom.
523:
378:
1587:
685:
It is illegal to use listening or recording devices that are not permitted for public use. Individuals may only use listening or recording devices within reasonable
519:
1745:
46:
2117:
241:
obtained a court order to surreptitiously listen in on conversations in a car through the car's built-in emergency and tracking security system. A panel of the
1861:
1995:
2591:
191:
in order to gather information about suspects. The wire device transmits to a remote location where law enforcement agents monitor what is being said.
1892:
637:
1665:
1215:
1481:
1122:
2232:
2574:
2530:
1082:
402:
362:
1346:
496:
In 1999, the US expelled a
Russian diplomat, accusing him of using a listening device in a top floor conference room used by diplomats in the
1187:
1072:
747:, or any kind of electric communication. This single party consent only applies if one of the parties is an "officer of the United States"
2525:
374:
1569:
1731:
739:
of the US Code § 2251 2(iii)(c) at least one of the parties involved in the communication must have given consent to interception of the
2280:
2686:
1701:
1313:
1168:
Kröger, Jacob Leon; Raschke, Philip (2019). "Is My Phone
Listening in? On the Feasibility and Detectability of Mobile Eavesdropping".
780:
748:
736:
415:
In 2003, the
Pakistani embassy building in London was found bugged; contractors hired by MI5 had planted bugs in the building in 2001.
1512:
2701:
2426:
1824:
1651:
772:
663:
497:
80:
1452:
Informants and
Undercover Investigations: A Practical Guide to Law, Policy, Dennis G. Fitzgerald, CRC Press, Jan 24, 2007, page 204
1604:
2461:
2386:
1936:
1786:
335:
222:
1540:
1257:
151:
in the 1950s, when technology allowed for a suitable transmitter to be built into a relatively small package. By 1956, the US
2328:
1922:
641:
1584:
2696:
2225:
1767:
721:
390:
210:
Wearing a wire is viewed as risky since discovery could lead to violence against the mole or other retaliatory responses.
2236:
242:
58:
427:
Also during the war, the British used covert listening devices to monitor captured German fighter pilots being held at
1097:
1092:
583:
550:
490:
299:
276:
152:
1869:
1395:
Kemp, Kathryn W. (2007). ""The Dictograph Hears All": An Example of Surveillance Technology in the Progressive Era".
174:
Among the earliest covert listening devices used in the United States of America was the dictograph, an invention of
2691:
2142:
2092:
2067:
1102:
2093:"Title III of The Omnibus Crime Control and Safe Streets Act of 1968 (Wiretap Act) | Bureau of Justice Assistance"
257:
can be used to reconstruct audio from a laser beam shot onto an object in a room, or the glass pane of a window.
1515:
626:
370:
351:
62:
2381:
2273:
645:
630:
500:
156:
677:
Powers Act (RIPA). It is usually permitted to record audio covertly in a public setting or one's own home.
2221:
2043:"18 U.S. Code § 2511 - Interception and disclosure of wire, oral, or electronic communications prohibited"
1057:
1052:
732:
709:
534:
2681:
2660:
1112:
1087:
443:
226:
2247:
1489:
1223:
779:, which protects against unreasonable search and seizure by the government, which also is seen by the
245:
prohibited the use of this technique because it involved deactivating the device's security features.
2586:
2569:
2542:
2305:
1283:
355:
303:
280:
2209:
2032:
The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000.
17:
2648:
2552:
1354:
507:
148:
1675:
1379:, Germer, William F. H., "Telephone dictating machine or apparatus", issued 1907-02-05
2537:
2504:
2478:
2456:
2451:
2421:
2406:
2266:
1941:
1564:
1412:
1132:
744:
331:
2217:
2196:
1559:
2653:
2322:
1761:
1723:
1193:
1183:
1142:
1127:
598:
477:
325:
121:
2618:
2350:
1404:
1173:
761:
calls without consent or illegally obtained though wiretaps. Furthermore, the US passed the
538:
254:
204:
159:
could be operated by small batteries, which revolutionized the process of covert listening.
1709:
1321:
306:
2638:
2613:
2547:
2509:
2446:
1960:
1670:
1591:
1573:
1547:
1519:
1288:
576:
545:
alleged that two bugs were discovered in the hotel room meant for visiting Prime Minister
476:. Devices were also discovered at offices used by other delegations. The discovery of the
409:
188:
1816:
1647:
2316:
1431:
557:
453:
2675:
2596:
2564:
2466:
2441:
2360:
2068:"Electronic Communications Privacy Act of 1986 (ECPA) | Bureau of Justice Assistance"
1416:
1067:
792:
740:
579:
as a security precaution amid fears that its wiring could contain a listening device.
343:
163:
1794:
2643:
2431:
2416:
2355:
2340:
2333:
1117:
572:
383:
339:
218:
133:
98:
2042:
1376:
175:
2633:
2499:
2345:
2202:
2168:
1838:
1178:
767:
757:
686:
615:
591:
590:
to intercept Vietnamese communist messages concerning negotiating an end to the
527:
421:
313:
129:
2628:
2608:
2601:
2581:
2488:
1408:
796:
546:
515:
450:
audio masking. It was not discovered who was responsible for planting the bug.
447:
428:
125:
2253:
1197:
147:
Self-contained electronic covert listening devices came into common use with
2623:
2436:
2365:
2300:
2289:
1077:
482:
457:
446:
via a pickup coil and transmitted it on a frequency near 600 MHz using
398:
291:
162:
A bug does not have to be a device specifically designed for the purpose of
137:
2242:
2471:
753:
473:
394:
196:
1648:"Operation Easy Chair: Bugging the Russian Embassy in The Hague in 1958"
1470:
Organized Crime, Micheal Benson, Infobase Publishing, Jan. 1, 2009, page
1172:. Lecture Notes in Computer Science. Vol. 11559. pp. 102–120.
272:
and other diplomatic posts are often the targets of bugging operations.
2557:
1137:
1107:
586:
placed a wire tap on a multiplex trunk line 24 kilometers southwest of
568:
469:
464:
Electronic bugging devices were found in March 2003 at offices used by
269:
93:
1635:
Spycatcher: The Candid Autobiography of a Senior Intelligence Officer
1062:
791:
Listening devices are regulated by several legislative bodies in the
561:
465:
439:
347:
317:
141:
511:
406:
101:
92:
541:
from 1997 to 2003 for the British Prime Minister) in his memoirs
434:
In the late 1970s, a bug was discovered in a meeting room at the
587:
435:
295:
2262:
1605:"How To Translate Sight Into Sound? It's All In The Vibrations"
1776:
magazine, where it was published, compromising the operation."
609:
321:
284:
238:
45:
deal primarily with the United Kingdom and do not represent a
29:
2118:"What Does the Fourth Amendment Mean? | United States Courts"
2258:
1746:"Australian Security & Intelligence Organization (ASIO)"
1461:
Guide to Writing Movie Scripts, Wils Randel, 2009, page 123
756:
or other digital data. This act was further updated by the
420:
During World War II, the Nazis took over a Berlin brothel,
2218:
Listening In: Electronic Eavesdropping in the Cold War Era
2143:"Recording Phone Calls and Conversations: 50-State Survey"
1862:"U.S. Expelling Russian Diplomat in Bugging of State Dept"
1724:"Operation Gunman: how the Soviets bugged IBM typewriters"
575:
in about 1968 by a Soviet aerobatic team was removed from
386:. The data was then compressed and transmitted in bursts.
1988:"Russia's teapot gift to Queen 'could have been bugged'"
681:
Legal requirements of listening and recording device use
514:
announced that it had discovered twenty-seven bugs in a
1560:"Court Leaves the Door Open for Safety System Wiretaps"
176:
Kelley M. Turner patented in 1906 (US Patent US843186A)
54:
1209:
1207:
489:
The car of Thomas Hentschell, who was involved in the
2243:
Covert listening devices on the Crypto Museum website
1915:"Vajpayee govt tried to bug Blair's bedroom in Delhi"
1318:
Western Regional Security Office (NOAA official site)
195:
agents "wearing a wire" is a typical plot element in
2518:
2487:
2397:
2374:
2296:
1891:McElroy, Damien; Wastell, David (20 January 2002).
1248:McCullagh, Declan; Anne Broache (1 December 2006).
1163:
1161:
1159:
424:, and used concealed microphones to spy on patrons.
207:may be given a "wire" to wear under their clothes.
1284:"Use of mobile helped police keep tabs on suspect"
1216:"Remotely Eavesdropping on Cell Phone Microphones"
556:In 2004, a bug was found in a meeting room at the
472:delegations at the European Union headquarters in
1860:Johnston, David; James Risen (10 December 1999).
1633:Operation Dew Worm. Described by Peter Wright in
1397:The Journal of the Gilded Age and Progressive Era
1341:
1339:
1170:Data and Applications Security and Privacy XXXIII
389:In 1990, it was reported that the embassy of the
524:General Secretary of the Chinese Communist Party
1277:
1275:
1250:"FBI taps cell phone mic as eavesdropping tool"
1541:FBI taps cell phone mic as eavesdropping tool.
703:Illegal use of listening and recording devices
543:The Blair Years: The Alastair Campbell Diaries
328:, leading to an attack on Schwirkmann in 1964.
2274:
1482:"Cell hack geek stalks pretty blonde shocker"
1243:
1241:
369:In 1984, bugs were discovered in at least 16
43:The examples and perspective in this article
8:
1893:"China finds spy bugs in Jiang's Boeing jet"
1585:Court to FBI: No spying on in-car computers.
1308:
1306:
694:Legal use of listening and recording devices
203:When infiltrating a criminal organization a
795:. Laws on listening devices varies between
644:. Unsourced material may be challenged and
214:Remotely activated mobile phone microphones
2281:
2267:
2259:
1748:. Archived from the original on 3 May 2009
804:Parties required to give consent by state
802:
567:In 2008, it was reported that an electric
120:, is usually a combination of a miniature
2254:Some CIA surveillance and bugging devices
2248:Eavesdropping Devices Found in Restaurant
1177:
664:Learn how and when to remove this message
442:. The bug intercepted the audio from the
81:Learn how and when to remove this message
2018:Shadow War: The CIA's Secret War in Laos
1700:Hyde, Hon. Henry J. (26 October 1990),
1637:, Stoddart (paperback), 1987. pp. 79-83
1155:
1138:Vault 7 § Part 6 – "Weeping Angel"
1123:Technical surveillance counter-measures
539:Director of Communications and Strategy
2531:Chinese espionage in the United States
1759:
1083:Greek telephone tapping case 2004-2005
716:United States Law on Listening Devices
403:Australian Secret Intelligence Service
128:. The use of bugs, called bugging, or
2028:
2026:
2016:Conboy, Kenneth, and James Morrison,
1073:Electronic Privacy Information Center
7:
2526:Chinese intelligence activity abroad
1961:"Bugging device found at UN offices"
1937:"Delhi clumsily bugged Blair's room"
731:Several federal laws were passed by
642:adding citations to reliable sources
18:Wire (undergarment listening device)
2592:Interpersonal (HUMINT) intelligence
2020:, Paladin Press, pp. 381–385.
1986:Moore, Matthew (25 November 2008).
1949:from the original on 8 August 2016.
1827:from the original on 31 March 2017.
1674:. 25 September 1964. Archived from
1214:Schneier, Bruce (5 December 2006).
1903:from the original on 6 March 2014.
1839:"EU investigates mystery buggings"
1793:. 10 November 2003. Archived from
1787:"UK embassy 'bug' angers Pakistan"
1654:from the original on 1 April 2017.
781:Supreme Court of the United States
324:was discovered by German engineer
25:
2427:Computer and network surveillance
2173:LII / Legal Information Institute
2047:LII / Legal Information Institute
1734:from the original on 15 May 2017.
1702:"Embassy Moscow: Paying the Bill"
1615:from the original on 14 July 2017
727:Federal laws on Listening Devices
498:United States Department of State
2462:Short-range agent communications
2203:EU investigates mystery buggings
2197:French, German EU Offices Bugged
1550:, CNET News.com, 1 December 2006
614:
606:Listening devices and the UK law
287:during its construction in 1956.
34:
1708:, p. E3555, archived from
1594:CNET News.com, 19 November 2003
486:newspaper, which blamed the US.
363:United States Embassy in Moscow
336:Great Seal of the United States
1921:. 20 July 2007. Archived from
1511:Brian Wheeler (2 March 2004).
743:. This title applies to wire,
735:that apply nation-wide. Under
480:systems was first reported by
1:
2226:Bureau of Diplomatic Security
1282:Odell, Mark (1 August 2005).
722:Telephone call recording laws
2237:US Department of Agriculture
857:District of Columbia (D.C.)
783:as electronic surveillance.
551:Indian intelligence agencies
334:was hidden in a copy of the
243:9th Circuit Court of Appeals
1480:Lewis Page (26 June 2007).
1179:10.1007/978-3-030-22479-0_6
1098:Nonlinear junction detector
1093:National Cryptologic Museum
1063:Communications interception
584:Central Intelligence Agency
491:Melbourne gangland killings
352:passive resonant cavity bug
233:Automobile computer systems
153:Central Intelligence Agency
112:, more commonly known as a
57:, discuss the issue on the
2718:
1666:"Fumigating the Fumigator"
939:
719:
512:People's Republic of China
391:People's Republic of China
302:in 1958 and 1959 using an
249:Audio from optical sources
2687:Law enforcement equipment
1766:: CS1 maint: unfit URL (
1513:"This goes no further..."
1430:Strother, French (1912).
1409:10.1017/S153778140000222X
812:All-Party Consent States
809:One-party Consent States
401:, had been bugged by the
371:IBM Selectric typewriters
312:Extensive bugging of the
132:is a common technique in
97:Listening devices of the
2702:Covert listening devices
2213:, How to protect privacy
1994:. London. Archived from
1516:BBC News Online Magazine
1432:"What the dictograph is"
787:State to State variation
582:On 6 December 1972, the
277:Soviet embassy in Ottawa
2412:Covert listening device
2382:Intelligence assessment
2250:- QCC Global News Story
1689:(subscription required)
493:, was bugged by police.
290:The Russian Embassy in
225:against reputed former
110:covert listening device
2222:US Department of State
2210:A simple guide to TSCM
1347:"Can You Hear Me Now?"
1320:. 2001. Archived from
1058:Cellphone surveillance
1053:Acoustic cryptanalysis
710:expectation of privacy
105:
2661:Targeted surveillance
1925:on 29 September 2012.
1351:ABC News: The Blotter
1113:Privacy International
1088:Mobile phone tracking
227:Gulfport, Mississippi
149:intelligence agencies
96:
2697:Espionage techniques
2587:Industrial espionage
2387:competing hypotheses
1706:Congressional Record
1590:14 July 2014 at the
1572:1 March 2012 at the
1546:14 July 2014 at the
1220:Schneier On Security
638:improve this section
375:US Embassy in Moscow
281:Government of Canada
63:create a new article
55:improve this article
2233:Bugging Hotel Rooms
1992:The Daily Telegraph
1797:on 14 November 2012
1730:. 14 October 2015.
1712:on 26 November 2012
1568:, 21 December 2003
1260:on 10 November 2013
805:
356:frequency modulated
338:, presented by the
157:solid-state devices
27:Surveillance device
2538:Cold War espionage
2505:Front organization
2479:Surveillance tools
2457:Phone surveillance
2452:One-way voice link
2407:Concealment device
1998:on 7 February 2009
1967:. 18 December 2004
1942:The Times of India
1872:on 6 February 2009
1866:The New York Times
1823:. 28 August 2016.
1565:The New York Times
1492:on 3 November 2013
1324:on 6 November 2013
1226:on 12 January 2014
803:
332:The Great Seal bug
294:was bugged by the
279:was bugged by the
106:
2692:Espionage devices
2669:
2668:
2323:Agent provocateur
1678:on 23 August 2013
1650:. 30 March 2017.
1357:on 25 August 2011
1189:978-3-030-22478-3
1143:Watergate scandal
1128:Telephone tapping
1043:
1042:
674:
673:
666:
599:Watergate scandal
535:Alastair Campbell
520:official aircraft
478:telephone tapping
326:Horst Schwirkmann
309:listening device.
122:radio transmitter
102:security services
91:
90:
83:
65:, as appropriate.
16:(Redirected from
2709:
2283:
2276:
2269:
2260:
2205:- BBC News story
2199:- CBS news story
2184:
2183:
2181:
2179:
2165:
2159:
2158:
2156:
2154:
2139:
2133:
2132:
2130:
2128:
2122:www.uscourts.gov
2114:
2108:
2107:
2105:
2103:
2089:
2083:
2082:
2080:
2078:
2064:
2058:
2057:
2055:
2053:
2039:
2033:
2030:
2021:
2014:
2008:
2007:
2005:
2003:
1983:
1977:
1976:
1974:
1972:
1957:
1951:
1950:
1945:. 30 July 2007.
1933:
1927:
1926:
1911:
1905:
1904:
1888:
1882:
1881:
1879:
1877:
1868:. Archived from
1857:
1851:
1850:
1848:
1846:
1835:
1829:
1828:
1813:
1807:
1806:
1804:
1802:
1783:
1777:
1771:
1765:
1757:
1755:
1753:
1742:
1736:
1735:
1720:
1714:
1713:
1697:
1691:
1690:
1687:
1685:
1683:
1662:
1656:
1655:
1644:
1638:
1631:
1625:
1624:
1622:
1620:
1601:
1595:
1582:
1576:
1557:
1551:
1538:
1532:
1531:
1529:
1527:
1522:on 27 March 2014
1518:. Archived from
1508:
1502:
1501:
1499:
1497:
1488:. Archived from
1477:
1471:
1468:
1462:
1459:
1453:
1450:
1444:
1443:
1436:The World's Work
1427:
1421:
1420:
1392:
1386:
1385:
1384:
1380:
1373:
1367:
1366:
1364:
1362:
1353:. Archived from
1343:
1334:
1333:
1331:
1329:
1310:
1301:
1300:
1298:
1296:
1279:
1270:
1269:
1267:
1265:
1256:. Archived from
1245:
1236:
1235:
1233:
1231:
1222:. Archived from
1211:
1202:
1201:
1181:
1165:
806:
777:Fourth Amendment
669:
662:
658:
655:
649:
618:
610:
518:purchased as an
438:headquarters in
255:laser microphone
189:sting operations
144:investigations.
86:
79:
75:
72:
66:
38:
37:
30:
21:
2717:
2716:
2712:
2711:
2710:
2708:
2707:
2706:
2672:
2671:
2670:
2665:
2639:Sting operation
2548:Black operation
2514:
2510:Limited hangout
2492:
2483:
2447:Numbers station
2399:
2393:
2370:
2310:
2292:
2287:
2193:
2188:
2187:
2177:
2175:
2169:"eavesdropping"
2167:
2166:
2162:
2152:
2150:
2149:. 25 April 2018
2141:
2140:
2136:
2126:
2124:
2116:
2115:
2111:
2101:
2099:
2091:
2090:
2086:
2076:
2074:
2066:
2065:
2061:
2051:
2049:
2041:
2040:
2036:
2031:
2024:
2015:
2011:
2001:
1999:
1985:
1984:
1980:
1970:
1968:
1959:
1958:
1954:
1935:
1934:
1930:
1913:
1912:
1908:
1890:
1889:
1885:
1875:
1873:
1859:
1858:
1854:
1844:
1842:
1841:. 19 March 2003
1837:
1836:
1832:
1815:
1814:
1810:
1800:
1798:
1785:
1784:
1780:
1758:
1751:
1749:
1744:
1743:
1739:
1722:
1721:
1717:
1699:
1698:
1694:
1688:
1681:
1679:
1664:
1663:
1659:
1646:
1645:
1641:
1632:
1628:
1618:
1616:
1603:
1602:
1598:
1592:Wayback Machine
1583:
1579:
1574:Wayback Machine
1558:
1554:
1548:Wayback Machine
1539:
1535:
1525:
1523:
1510:
1509:
1505:
1495:
1493:
1479:
1478:
1474:
1469:
1465:
1460:
1456:
1451:
1447:
1429:
1428:
1424:
1394:
1393:
1389:
1382:
1375:
1374:
1370:
1360:
1358:
1345:
1344:
1337:
1327:
1325:
1312:
1311:
1304:
1294:
1292:
1289:Financial Times
1281:
1280:
1273:
1263:
1261:
1247:
1246:
1239:
1229:
1227:
1213:
1212:
1205:
1190:
1167:
1166:
1157:
1152:
1147:
1048:
999:South Carolina
974:North Carolina
789:
758:USA Patriot Act
729:
724:
718:
705:
696:
683:
670:
659:
653:
650:
635:
619:
608:
577:Balmoral Castle
410:Project Echelon
405:as part of the
266:
264:Examples of use
251:
235:
216:
184:
172:
87:
76:
70:
67:
52:
39:
35:
28:
23:
22:
15:
12:
11:
5:
2715:
2713:
2705:
2704:
2699:
2694:
2689:
2684:
2674:
2673:
2667:
2666:
2664:
2663:
2658:
2657:
2656:
2651:
2641:
2636:
2631:
2626:
2621:
2616:
2611:
2606:
2605:
2604:
2599:
2589:
2584:
2579:
2578:
2577:
2572:
2562:
2561:
2560:
2555:
2545:
2540:
2535:
2534:
2533:
2522:
2520:
2516:
2515:
2513:
2512:
2507:
2502:
2496:
2494:
2485:
2484:
2482:
2481:
2476:
2475:
2474:
2464:
2459:
2454:
2449:
2444:
2439:
2434:
2429:
2424:
2419:
2414:
2409:
2403:
2401:
2400:communications
2395:
2394:
2392:
2391:
2390:
2389:
2378:
2376:
2372:
2371:
2369:
2368:
2363:
2358:
2353:
2348:
2343:
2338:
2337:
2336:
2326:
2319:
2317:Agent handling
2313:
2311:
2309:
2308:
2303:
2297:
2294:
2293:
2288:
2286:
2285:
2278:
2271:
2263:
2257:
2256:
2251:
2245:
2240:
2229:
2214:
2206:
2200:
2192:
2191:External links
2189:
2186:
2185:
2160:
2134:
2109:
2084:
2059:
2034:
2022:
2009:
1978:
1952:
1928:
1906:
1883:
1852:
1830:
1808:
1778:
1737:
1715:
1692:
1657:
1639:
1626:
1596:
1577:
1552:
1533:
1503:
1472:
1463:
1454:
1445:
1422:
1403:(4): 409–430.
1387:
1368:
1335:
1302:
1271:
1237:
1203:
1188:
1154:
1153:
1151:
1148:
1146:
1145:
1140:
1135:
1130:
1125:
1120:
1115:
1110:
1105:
1100:
1095:
1090:
1085:
1080:
1075:
1070:
1065:
1060:
1055:
1049:
1047:
1044:
1041:
1040:
1036:
1035:
1031:
1030:
1029:West Virginia
1026:
1025:
1021:
1020:
1016:
1015:
1011:
1010:
1006:
1005:
1001:
1000:
996:
995:
991:
990:
986:
985:
981:
980:
976:
975:
971:
970:
966:
965:
961:
960:
956:
955:
951:
950:
946:
945:
941:
940:
938:
934:
933:
930:
926:
925:
922:
918:
917:
914:
910:
909:
906:
902:
901:
900:New Hampshire
898:
894:
893:
890:
886:
885:
882:
878:
877:
874:
870:
869:
868:Massachusetts
866:
862:
861:
858:
854:
853:
850:
846:
845:
842:
838:
837:
834:
830:
829:
826:
822:
821:
818:
814:
813:
810:
788:
785:
728:
725:
717:
714:
704:
701:
695:
692:
682:
679:
672:
671:
622:
620:
613:
607:
604:
603:
602:
595:
580:
565:
558:United Nations
554:
531:
504:
494:
487:
462:
454:Colin Thatcher
451:
432:
425:
418:
417:
416:
413:
387:
367:
359:
346:ambassador in
329:
310:
288:
265:
262:
250:
247:
234:
231:
215:
212:
183:
180:
171:
168:
89:
88:
49:of the subject
47:worldwide view
42:
40:
33:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2714:
2703:
2700:
2698:
2695:
2693:
2690:
2688:
2685:
2683:
2680:
2679:
2677:
2662:
2659:
2655:
2652:
2650:
2647:
2646:
2645:
2642:
2640:
2637:
2635:
2632:
2630:
2627:
2625:
2622:
2620:
2617:
2615:
2612:
2610:
2607:
2603:
2600:
2598:
2597:interrogation
2595:
2594:
2593:
2590:
2588:
2585:
2583:
2580:
2576:
2573:
2571:
2568:
2567:
2566:
2565:Eavesdropping
2563:
2559:
2556:
2554:
2551:
2550:
2549:
2546:
2544:
2541:
2539:
2536:
2532:
2529:
2528:
2527:
2524:
2523:
2521:
2517:
2511:
2508:
2506:
2503:
2501:
2498:
2497:
2495:
2490:
2486:
2480:
2477:
2473:
2470:
2469:
2468:
2467:Steganography
2465:
2463:
2460:
2458:
2455:
2453:
2450:
2448:
2445:
2443:
2442:Invisible ink
2440:
2438:
2435:
2433:
2430:
2428:
2425:
2423:
2420:
2418:
2415:
2413:
2410:
2408:
2405:
2404:
2402:
2396:
2388:
2385:
2384:
2383:
2380:
2379:
2377:
2373:
2367:
2364:
2362:
2361:Sleeper agent
2359:
2357:
2354:
2352:
2349:
2347:
2344:
2342:
2339:
2335:
2332:
2331:
2330:
2327:
2325:
2324:
2320:
2318:
2315:
2314:
2312:
2307:
2304:
2302:
2299:
2298:
2295:
2291:
2284:
2279:
2277:
2272:
2270:
2265:
2264:
2261:
2255:
2252:
2249:
2246:
2244:
2241:
2238:
2234:
2230:
2227:
2223:
2219:
2215:
2212:
2211:
2207:
2204:
2201:
2198:
2195:
2194:
2190:
2174:
2170:
2164:
2161:
2148:
2144:
2138:
2135:
2123:
2119:
2113:
2110:
2098:
2094:
2088:
2085:
2073:
2069:
2063:
2060:
2048:
2044:
2038:
2035:
2029:
2027:
2023:
2019:
2013:
2010:
1997:
1993:
1989:
1982:
1979:
1966:
1962:
1956:
1953:
1948:
1944:
1943:
1938:
1932:
1929:
1924:
1920:
1916:
1910:
1907:
1902:
1898:
1897:The Telegraph
1894:
1887:
1884:
1871:
1867:
1863:
1856:
1853:
1840:
1834:
1831:
1826:
1822:
1821:Crypto Museum
1818:
1812:
1809:
1796:
1792:
1788:
1782:
1779:
1775:
1769:
1763:
1747:
1741:
1738:
1733:
1729:
1728:Crypto Museum
1725:
1719:
1716:
1711:
1707:
1703:
1696:
1693:
1677:
1673:
1672:
1667:
1661:
1658:
1653:
1649:
1643:
1640:
1636:
1630:
1627:
1614:
1610:
1606:
1600:
1597:
1593:
1589:
1586:
1581:
1578:
1575:
1571:
1567:
1566:
1561:
1556:
1553:
1549:
1545:
1542:
1537:
1534:
1521:
1517:
1514:
1507:
1504:
1491:
1487:
1483:
1476:
1473:
1467:
1464:
1458:
1455:
1449:
1446:
1441:
1437:
1433:
1426:
1423:
1418:
1414:
1410:
1406:
1402:
1398:
1391:
1388:
1378:
1372:
1369:
1356:
1352:
1348:
1342:
1340:
1336:
1323:
1319:
1315:
1309:
1307:
1303:
1291:
1290:
1285:
1278:
1276:
1272:
1259:
1255:
1251:
1244:
1242:
1238:
1225:
1221:
1217:
1210:
1208:
1204:
1199:
1195:
1191:
1185:
1180:
1175:
1171:
1164:
1162:
1160:
1156:
1149:
1144:
1141:
1139:
1136:
1134:
1131:
1129:
1126:
1124:
1121:
1119:
1116:
1114:
1111:
1109:
1106:
1104:
1101:
1099:
1096:
1094:
1091:
1089:
1086:
1084:
1081:
1079:
1076:
1074:
1071:
1069:
1068:Eavesdropping
1066:
1064:
1061:
1059:
1056:
1054:
1051:
1050:
1045:
1038:
1037:
1033:
1032:
1028:
1027:
1023:
1022:
1018:
1017:
1013:
1012:
1008:
1007:
1004:South Dakota
1003:
1002:
998:
997:
994:Rhode Island
993:
992:
988:
987:
983:
982:
979:North Dakota
978:
977:
973:
972:
968:
967:
963:
962:
958:
957:
953:
952:
948:
947:
943:
942:
936:
935:
931:
928:
927:
923:
920:
919:
916:Pennsylvania
915:
912:
911:
907:
904:
903:
899:
896:
895:
891:
888:
887:
883:
880:
879:
875:
872:
871:
867:
864:
863:
859:
856:
855:
851:
848:
847:
843:
840:
839:
835:
832:
831:
827:
824:
823:
819:
816:
815:
811:
808:
807:
801:
798:
794:
793:United States
786:
784:
782:
778:
774:
769:
764:
759:
755:
750:
746:
742:
741:communication
738:
734:
726:
723:
715:
713:
711:
702:
700:
693:
691:
688:
680:
678:
668:
665:
657:
647:
643:
639:
633:
632:
628:
623:This section
621:
617:
612:
611:
605:
601:in the 1970s.
600:
596:
593:
589:
585:
581:
578:
574:
571:presented to
570:
566:
563:
559:
555:
552:
548:
544:
540:
536:
532:
529:
525:
521:
517:
513:
509:
506:In 2001, the
505:
502:
499:
495:
492:
488:
485:
484:
479:
475:
471:
467:
463:
459:
455:
452:
449:
445:
441:
437:
433:
430:
426:
423:
419:
414:
411:
408:
404:
400:
396:
392:
388:
385:
384:magnetometers
380:
376:
372:
368:
364:
360:
357:
353:
349:
345:
344:United States
341:
337:
333:
330:
327:
323:
319:
315:
311:
308:
305:
301:
297:
293:
289:
286:
282:
278:
274:
273:
271:
268:
267:
263:
261:
258:
256:
248:
246:
244:
240:
237:In 2003, the
232:
230:
228:
224:
220:
213:
211:
208:
206:
201:
198:
192:
190:
181:
179:
177:
169:
167:
165:
164:eavesdropping
160:
158:
154:
150:
145:
143:
139:
135:
131:
127:
123:
119:
115:
111:
103:
100:
95:
85:
82:
74:
64:
60:
56:
50:
48:
41:
32:
31:
19:
2682:Surveillance
2644:Surveillance
2432:Cyber spying
2417:Cryptography
2411:
2356:Resident spy
2341:Double agent
2321:
2208:
2176:. Retrieved
2172:
2163:
2151:. Retrieved
2146:
2137:
2125:. Retrieved
2121:
2112:
2100:. Retrieved
2096:
2087:
2075:. Retrieved
2071:
2062:
2050:. Retrieved
2046:
2037:
2017:
2012:
2000:. Retrieved
1996:the original
1991:
1981:
1969:. Retrieved
1965:the Guardian
1964:
1955:
1940:
1931:
1923:the original
1918:
1909:
1896:
1886:
1874:. Retrieved
1870:the original
1865:
1855:
1843:. Retrieved
1833:
1820:
1811:
1799:. Retrieved
1795:the original
1790:
1781:
1773:
1750:. Retrieved
1740:
1727:
1718:
1710:the original
1705:
1695:
1680:. Retrieved
1676:the original
1669:
1660:
1642:
1634:
1629:
1617:. Retrieved
1608:
1599:
1580:
1563:
1555:
1536:
1524:. Retrieved
1520:the original
1506:
1494:. Retrieved
1490:the original
1486:The Register
1485:
1475:
1466:
1457:
1448:
1439:
1435:
1425:
1400:
1396:
1390:
1371:
1359:. Retrieved
1355:the original
1350:
1326:. Retrieved
1322:the original
1317:
1314:"Telephones"
1293:. Retrieved
1287:
1262:. Retrieved
1258:the original
1253:
1228:. Retrieved
1224:the original
1219:
1169:
1118:Surveillance
1103:Peter Wright
944:Mississippi
828:Connecticut
790:
773:Constitution
730:
706:
697:
687:privacy laws
684:
675:
660:
651:
636:Please help
624:
573:Elizabeth II
542:
501:headquarters
481:
379:US Consulate
340:Soviet Union
259:
252:
236:
219:Mobile phone
217:
209:
202:
193:
185:
173:
161:
146:
134:surveillance
117:
113:
109:
107:
77:
68:
44:
2634:Stay-behind
2543:Recruitment
2500:Canary trap
2398:Devices and
2346:Field agent
2097:bja.ojp.gov
2072:bja.ojp.gov
1971:4 September
1442:(1): 37–41.
1361:13 December
1230:13 December
964:New Mexico
959:New Jersey
932:Washington
820:California
763:Wiretap Act
592:Vietnam War
560:offices in
549:planted by
528:Jiang Zemin
422:Salon Kitty
316:embassy in
314:West German
130:wiretapping
99:East German
2676:Categories
2629:Sexpionage
2609:COINTELPRO
2602:safe house
2582:False flag
2519:Operations
2493:techniques
2489:Tradecraft
2178:29 January
2153:29 January
2127:29 January
2102:29 January
2077:29 January
2052:29 January
1817:"OPEC bug"
1150:References
1034:Wisconsin
1009:Tennessee
937:Minnesota
921:Louisiana
720:See also:
654:March 2019
547:Tony Blair
516:Boeing 767
508:government
448:subcarrier
429:Trent Park
304:Easy Chair
170:Dictograph
126:microphone
2553:black bag
2437:Dead drop
2366:Spymaster
2290:Espionage
1417:163849152
1377:US843186A
1254:CNet News
1198:0302-9743
1078:Espionage
1024:Virginia
989:Oklahoma
969:New York
954:Nebraska
949:Missouri
913:Kentucky
876:Michigan
860:Maryland
852:Illinois
849:Colorado
841:Arkansas
836:Delaware
775:that the
749:(Title 18
625:does not
537:(who was
533:In 2003,
483:Le Figaro
444:PA system
399:Australia
292:The Hague
270:Embassies
138:espionage
71:June 2020
59:talk page
2619:SHAMROCK
2472:microdot
2375:Analysis
2002:30 April
1947:Archived
1901:Archived
1876:27 March
1825:Archived
1801:30 April
1791:BBC News
1762:cite web
1732:Archived
1652:Archived
1613:Archived
1588:Archived
1570:Archived
1544:Archived
1328:22 March
1295:14 March
1264:14 March
1046:See also
1039:Wyoming
924:Vermont
889:Indiana
884:Montana
865:Georgia
844:Florida
833:Arizona
817:Alabama
768:warrants
754:computer
737:Title 18
733:congress
474:Brussels
458:Canadian
395:Canberra
377:and the
307:Mark III
298:and the
197:gangster
53:You may
2614:MINARET
2558:wetwork
1919:IBNLive
1752:5 April
1609:npr.org
1526:23 June
1133:TEMPEST
1108:Privacy
908:Oregon
905:Kansas
892:Nevada
873:Hawaii
825:Alaska
646:removed
631:sources
569:samovar
522:of the
510:of the
373:in the
358:signal.
342:to the
320:by the
124:with a
2649:Global
2575:MASINT
2570:SIGINT
2422:Cutout
2306:Assets
2301:Agents
2228:, 2008
2147:Justia
1845:13 May
1682:6 June
1415:
1383:
1196:
1186:
1014:Texas
929:Maine
881:Idaho
797:states
562:Geneva
470:German
466:French
461:crime.
440:Vienna
366:labor.
348:Moscow
318:Moscow
182:A wire
142:police
2334:Agent
2329:Cover
1619:9 May
1496:1 May
1413:S2CID
1019:Utah
984:Ohio
897:Iowa
407:UKUSA
116:or a
61:, or
2654:Mass
2624:FVEY
2351:Mole
2180:2024
2155:2024
2129:2024
2104:2024
2079:2024
2054:2024
2004:2010
1973:2021
1878:2008
1847:2020
1803:2010
1774:Time
1768:link
1754:2011
1684:2009
1671:Time
1621:2018
1528:2008
1498:2010
1363:2009
1330:2009
1297:2009
1266:2009
1232:2009
1194:ISSN
1184:ISBN
745:oral
629:any
627:cite
597:The
588:Vinh
468:and
456:, a
436:OPEC
361:The
283:and
275:The
205:mole
140:and
118:wire
2491:and
2235:".
2220:".
1405:doi
1174:doi
640:by
393:in
322:KGB
300:CIA
296:BVD
285:MI5
239:FBI
223:FBI
114:bug
2678::
2224:,
2171:.
2145:.
2120:.
2095:.
2070:.
2045:.
2025:^
1990:.
1963:.
1939:.
1917:.
1899:.
1895:.
1864:.
1819:.
1789:.
1764:}}
1760:{{
1726:.
1704:,
1668:.
1611:.
1607:.
1562:,
1484:.
1440:24
1438:.
1434:.
1411:.
1399:.
1349:.
1338:^
1316:.
1305:^
1286:.
1274:^
1252:.
1240:^
1218:.
1206:^
1192:.
1182:.
1158:^
526:,
397:,
253:A
136:,
108:A
2282:e
2275:t
2268:v
2239:.
2231:"
2216:"
2182:.
2157:.
2131:.
2106:.
2081:.
2056:.
2006:.
1975:.
1880:.
1849:.
1805:.
1770:)
1756:.
1686:.
1623:.
1530:.
1500:.
1419:.
1407::
1401:6
1365:.
1332:.
1299:.
1268:.
1234:.
1200:.
1176::
667:)
661:(
656:)
652:(
648:.
634:.
594:.
564:.
530:.
503:.
431:.
412:.
104:.
84:)
78:(
73:)
69:(
51:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.