Covert listening device

related topics
{system, computer, user}
{law, state, case}
{service, military, aircraft}
{black, white, people}
{math, energy, light}
{car, race, vehicle}
{@card@, make, design}
{film, series, show}
{build, building, house}

A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, is a common technique in surveillance, espionage and in police investigations.

A bug does not have to be a device specifically designed for the purpose of eavesdropping. For instance, with the right equipment, it is possible to remotely activate the microphone of cellular phones, even when a call is not being made, to listen to conversations in the vicinity of the phone.[1][2][3][4][5]

Contents

Remotely activated mobile phone microphones

Mobile phone (cell phone) microphones can be activated remotely, without any need for physical access.[1][2][3][4][5][6] This "roving bug" feature has been used by law enforcement agencies and intelligence services to listen in on nearby conversations.[7] A United States court ruled in 1988 that a similar technique used by the FBI against reputed former Gulfport Mississippi cocaine dealers Bennett Branch and Don Tomlinson dealing cocaine under the direct authority of kingpin David "The Eagle" Easterling after having obtained a court order was permissible.[8]

Automobile computer systems

In 2003 the FBI obtained a court order to surreptitiously listen in on conversations in a car, through the car's built-in emergency and tracking security system. A panel of the 9th Circuit Court of Appeals prohibited the use of this technique because it involved deactivating the device's security features.[9][10]

Full article ▸

related documents
Terminal emulator
Motorola 68040
Signalling (telecommunications)
Video card
IEEE 802.3
Audio Interchange File Format
Kermit (protocol)
H.263
Desktop computer
IBM 7090
Zeta Instrument Processor Interface
Motorola 68060
10BASE2
Microsoft Office
Gigabyte
PA-RISC family
Datamax UV-1
Very high frequency
Wine (software)
Streaming media
Interrupt latency
Frequency modulation synthesis
Jupiter Ace
Futurebus
Sequential logic
Beowulf (computing)
Memory management
IEEE 802.2
Kerberos (protocol)
Node-to-node data transfer