HOME

TheInfoList



OR:

A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature
radio transmitter In electronics and telecommunications, a radio transmitter or just transmitter (often abbreviated as XMTR or TX in technical documents) is an electronic device which produces radio waves with an antenna with the purpose of signal transmissio ...
with a
microphone A microphone, colloquially called a mic (), or mike, is a transducer that converts sound into an electrical signal. Microphones are used in many applications such as telephones, hearing aids, public address systems for concert halls and publi ...
. The use of bugs, called bugging, or
wiretapping Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connecti ...
is a common technique in
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
,
espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
and
police The police are Law enforcement organization, a constituted body of Law enforcement officer, people empowered by a State (polity), state with the aim of Law enforcement, enforcing the law and protecting the Public order policing, public order ...
investigations. Self-contained electronic covert listening devices came into common use with intelligence agencies in the 1950s, when technology allowed for a suitable transmitter to be built into a relatively small package. By 1956, the US
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
was designing and building "Surveillance Transmitters" that employed transistors, which greatly reduced the size and power consumption. With no moving parts and greater power efficiency, these solid-state devices could be operated by small batteries, which revolutionized the process of covert listening. A bug does not have to be a device specifically designed for the purpose of
eavesdropping Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. Etymology The verb ''eavesdrop'' is a back-formation from the noun ''eave ...
. For instance, with the right equipment, it is possible to remotely activate the microphone of cellular phones, even when a call is not being made, to listen to conversations in the vicinity of the phone.


Dictograph

Among the earliest covert listening devices used in the United States of America was the dictograph, an invention o
Kelley M. Turner patented in 1906 (US Patent US843186A)
It consisted of a microphone in one location and a remote listening post with a speaker that could also be recorded using a phonograph. While also marketed as a device that allowed broadcasting of sounds, or dictating text from one room to a typist in another, it was used in several criminal investigations.


"Wearing a wire"

A "wire" is a device that is hidden or concealed under a person's clothes for the purpose of covertly listening to conversations in proximity to the wearer. Wires are typically used in police
sting operation In law enforcement, a sting operation is a deceptive operation designed to catch a person attempting to commit a crime. A typical sting will have an undercover law enforcement officer, detective, or co-operative member of the public play a rol ...
s in order to gather information about suspects. The wire device transmits to a remote location where law enforcement agents monitor what is being said. The act of "wearing a wire" refers to a person knowingly recording the conversation or transmitting the contents of a conversation to a police listening post. Usually, some sort of device is attached to the body in an inconspicuous way, such as taping a microphone wire to their chest. Undercover agents "wearing a wire" is a typical plot element in
gangster A gangster (informally gangsta) is a criminal who is a member of a gang. Most gangs are considered to be part of organized crime. Gangsters are also called mobsters, a term derived from ''Organized crime, mob'' and the suffix ''wikt:-ster, -st ...
and police-related movies and television shows. A stereotypical scene might include an individual being suspected by criminals of wearing a hidden microphone, and having their shirt torn open to reveal the deception. When infiltrating a criminal organization a mole may be given a wire to wear under their clothes. Wearing a wire is viewed as risky since discovery could lead to violence against the mole or other retaliatory responses.


Remotely activated mobile phone microphones

Mobile phone A mobile phone or cell phone is a portable telephone that allows users to make and receive calls over a radio frequency link while moving within a designated telephone service area, unlike fixed-location phones ( landline phones). This rad ...
(cell phone) microphones can be activated remotely, without any need for physical access. This "roving bug" feature has been used by law enforcement agencies and intelligence services to listen in on nearby conversations. A United States court ruled in 1988 that a similar technique used by the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
against reputed former
Gulfport, Mississippi Gulfport ( ) is a city in Harrison County, Mississippi, United States, and its co-county seat. It had a population of 72,926 at the 2020 United States census, 2020 census, making it the List of municipalities in Mississippi, second-most populous ...
, cocaine dealers after having obtained a court order was permissible. Not only microphones but also seemingly innocuous motion sensors, which can be accessed by third-party apps on Android and iOS devices without any notification to the user, are a potential eavesdropping channel in smartphones. With the Covid-19 pandemic came an increase in remote work spurring on a new advent of Employee Monitoring Software which remotely collects many forms of data from laptops and smartphones issued by employers, including webcam and microphone data, raising concerns that a new era of corporate spying has shifted the power balance between workers and businesses.


Automobile computer systems

In 2003, the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
obtained a court order to surreptitiously listen in on conversations in a car through the car's built-in emergency and tracking security system. A panel of the 9th Circuit Court of Appeals prohibited the use of this technique because it involved deactivating the device's security features.


Audio from optical sources

A
laser microphone A laser microphone is a surveillance device that uses a laser beam to detect sound vibrations in a distant object. It can be used to eavesdrop with minimal chance of exposure. The object is typically inside a room where a conversation is taking pl ...
can be used to reconstruct audio from a laser beam shot onto an object in a room, or the glass pane of a window. Researchers have also prototyped a method for reconstructing audio from video of thin objects that can pick up sound vibrations, such as a houseplant or bag of potato chips.


Examples of use

* Embassies and other diplomatic posts are often the targets of bugging operations. ** The Soviet embassy in Ottawa was bugged by the
Government of Canada The Government of Canada (), formally His Majesty's Government (), is the body responsible for the federation, federal administration of Canada. The term ''Government of Canada'' refers specifically to the executive, which includes Minister of t ...
and
MI5 MI5 ( Military Intelligence, Section 5), officially the Security Service, is the United Kingdom's domestic counter-intelligence and security agency and is part of its intelligence machinery alongside the Secret Intelligence Service (MI6), Gov ...
during its construction in 1956. ** The Russian Embassy in
The Hague The Hague ( ) is the capital city of the South Holland province of the Netherlands. With a population of over half a million, it is the third-largest city in the Netherlands. Situated on the west coast facing the North Sea, The Hague is the c ...
was bugged by the BVD and the CIA in 1958 and 1959 using an Easy Chairbr>Mark III
listening device. ** Extensive bugging of the
West German West Germany was the common English name for the Federal Republic of Germany (FRG) from its formation on 23 May 1949 until its reunification with East Germany on 3 October 1990. It is sometimes known as the Bonn Republic after its capital c ...
embassy in
Moscow Moscow is the Capital city, capital and List of cities and towns in Russia by population, largest city of Russia, standing on the Moskva (river), Moskva River in Central Russia. It has a population estimated at over 13 million residents with ...
by the
KGB The Committee for State Security (, ), abbreviated as KGB (, ; ) was the main security agency of the Soviet Union from 1954 to 1991. It was the direct successor of preceding Soviet secret police agencies including the Cheka, Joint State Polit ...
was discovered by German engineer Horst Schwirkmann, leading to an attack on Schwirkmann in 1964. ** The Great Seal bug was hidden in a copy of the
Great Seal of the United States The Great Seal is the seal of the United States. The phrase is used both for the Seal (emblem), impression device itself, which is kept by the United States secretary of state, and more generally for the impression it produces. The Obverse and r ...
, presented by the
Soviet Union The Union of Soviet Socialist Republics. (USSR), commonly known as the Soviet Union, was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 until Dissolution of the Soviet ...
to the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
ambassador in
Moscow Moscow is the Capital city, capital and List of cities and towns in Russia by population, largest city of Russia, standing on the Moskva (river), Moskva River in Central Russia. It has a population estimated at over 13 million residents with ...
in 1946 and only discovered in 1952. The bug was unusual in that it had no power source or active components, making it much harder to detect—it was a new type of device, called a passive resonant cavity bug. The cavity had a metallic diaphragm that moved in unison with sound waves from a conversation in the room. When illuminated by a radio beam from a remote location, the cavity would return a frequency modulated signal. ** The United States Embassy in Moscow was bugged during its construction in the 1970s by Soviet agents posing as laborers. When discovered in the early 1980s, it was found that even the concrete columns were so riddled with bugs that the building eventually had to be torn down and replaced with a new one, built with US materials and labor. ** In 1984, bugs were discovered in at least 16
IBM Selectric typewriter The IBM Selectric (a portmanteau of "selective" and "electric") was a highly successful line of electric typewriters introduced by IBM on 31 July 1961. Instead of the "basket" of individual typebars that swung up to strike the ribbon and page ...
s in the US Embassy in Moscow and the US Consulate in Leningrad. The highly sophisticated devices were planted by the Soviets between 1976 and 1984 and were hidden inside a metal support bar. Information was intercepted by detecting the movements of metal bars inside the typewriter (the so-called latch interposers) by means of
magnetometer A magnetometer is a device that measures magnetic field or magnetic dipole moment. Different types of magnetometers measure the direction, strength, or relative change of a magnetic field at a particular location. A compass is one such device, ...
s. The data was then compressed and transmitted in bursts. ** In 1990, it was reported that the embassy of the
People's Republic of China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
in
Canberra Canberra ( ; ) is the capital city of Australia. Founded following the Federation of Australia, federation of the colonies of Australia as the seat of government for the new nation, it is Australia's list of cities in Australia, largest in ...
,
Australia Australia, officially the Commonwealth of Australia, is a country comprising mainland Australia, the mainland of the Australia (continent), Australian continent, the island of Tasmania and list of islands of Australia, numerous smaller isl ...
, had been bugged by the Australian Secret Intelligence Service as part of the UKUSA Project Echelon. ** In 2003, the Pakistani embassy building in London was found bugged; contractors hired by MI5 had planted bugs in the building in 2001. * During World War II, the Nazis took over a Berlin brothel, Salon Kitty, and used concealed microphones to spy on patrons. * Also during the war, the British used covert listening devices to monitor captured German fighter pilots being held at Trent Park. * In the late 1970s, a bug was discovered in a meeting room at the
OPEC The Organization of the Petroleum Exporting Countries (OPEC ) is an organization enabling the co-operation of leading oil-producing and oil-dependent countries in order to collectively influence the global oil market and maximize Profit (eco ...
headquarters in
Vienna Vienna ( ; ; ) is the capital city, capital, List of largest cities in Austria, most populous city, and one of Federal states of Austria, nine federal states of Austria. It is Austria's primate city, with just over two million inhabitants. ...
. The bug intercepted the audio from the
PA system A public address system (or PA system) is an electronic system comprising microphones, amplifiers, loudspeakers, and related equipment. It increases the apparent volume (loudness) of a human voice, musical instrument, or other acoustic sound sou ...
via a pickup coil and transmitted it on a frequency near 600 MHz using
subcarrier A subcarrier is a sideband of a radio frequency carrier wave, which is modulated to send additional information. Examples include the provision of colour in a black and white television system or the provision of stereo in a monophonic radio bro ...
audio masking. It was not discovered who was responsible for planting the bug. * Colin Thatcher, a
Canadian Canadians () are people identified with the country of Canada. This connection may be residential, legal, historical or cultural. For most Canadians, many (or all) of these connections exist and are collectively the source of their being ''C ...
politician, was secretly recorded making statements which would later be used to convict him of his wife's murder. The recording device was concealed on a person Thatcher had previously approached for help in the crime. * Electronic bugging devices were found in March 2003 at offices used by French and German delegations at the European Union headquarters in
Brussels Brussels, officially the Brussels-Capital Region, (All text and all but one graphic show the English name as Brussels-Capital Region.) is a Communities, regions and language areas of Belgium#Regions, region of Belgium comprising #Municipalit ...
. Devices were also discovered at offices used by other delegations. The discovery of the telephone tapping systems was first reported by ''
Le Figaro () is a French daily morning newspaper founded in 1826. It was named after Figaro, a character in several plays by polymath Pierre Beaumarchais, Beaumarchais (1732–1799): ''Le Barbier de Séville'', ''The Guilty Mother, La Mère coupable'', ...
'' newspaper, which blamed the US. * The car of Thomas Hentschell, who was involved in the Melbourne gangland killings, was bugged by police. * In 1999, the US expelled a Russian diplomat, accusing him of using a listening device in a top floor conference room used by diplomats in the
United States Department of State The United States Department of State (DOS), or simply the State Department, is an United States federal executive departments, executive department of the U.S. federal government responsible for the country's foreign policy of the United State ...
headquarters Headquarters (often referred to as HQ) notes the location where most or all of the important functions of an organization are coordinated. The term is used in a wide variety of situations, including private sector corporations, non-profits, mil ...
. * In 2001, the
government A government is the system or group of people governing an organized community, generally a State (polity), state. In the case of its broad associative definition, government normally consists of legislature, executive (government), execu ...
of the
People's Republic of China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
announced that it had discovered twenty-seven bugs in a
Boeing 767 The Boeing 767 is an American wide-body airliner developed and manufactured by Boeing Commercial Airplanes. The aircraft was launched as the 7X7 program on July 14, 1978, the prototype first flew on September 26, 1981, and it was certified ...
purchased as an official aircraft of the
General Secretary of the Chinese Communist Party The general secretary of the Central Committee of the Chinese Communist Party ( zh, s=中国共产党中央委员会总书记, p=Zhōngguó Gòngchǎndǎng Zhōngyāng Wěiyuánhuì Zǒngshūjì) is the leader of the Chinese Communist Part ...
,
Jiang Zemin Jiang Zemin (17 August 1926 – 30 November 2022) was a Chinese politician who served as General Secretary of the Chinese Communist Party, general secretary of the Chinese Communist Party (CCP) from 1989 to 2002, as Chairman of the Central Mil ...
. * In 2003,
Alastair Campbell Alastair John Campbell (born 25 May 1957) is a British journalist, author, strategist, broadcaster, and activist, who is known for his political roles during Tony Blair's leadership of the Labour Party. Campbell worked as Blair's spokesman an ...
(who was Director of Communications and Strategy from 1997 to 2003 for the British Prime Minister) in his memoirs ''The Blair Years: The Alastair Campbell Diaries'' alleged that two bugs were discovered in the hotel room meant for visiting Prime Minister
Tony Blair Sir Anthony Charles Lynton Blair (born 6 May 1953) is a British politician who served as Prime Minister of the United Kingdom from 1997 to 2007 and Leader of the Labour Party (UK), Leader of the Labour Party from 1994 to 2007. He was Leader ...
planted by Indian intelligence agencies. The alleged bug discovery was at a hotel during Blair's official visit to New Delhi in 2001. Security services supposedly informed him that the bugs could not be removed without drilling the wall and therefore he changed to another room. * In 2004, a bug was found in a meeting room at the
United Nations The United Nations (UN) is the Earth, global intergovernmental organization established by the signing of the Charter of the United Nations, UN Charter on 26 June 1945 with the stated purpose of maintaining international peace and internationa ...
offices in
Geneva Geneva ( , ; ) ; ; . is the List of cities in Switzerland, second-most populous city in Switzerland and the most populous in French-speaking Romandy. Situated in the southwest of the country, where the Rhône exits Lake Geneva, it is the ca ...
. * In 2008, it was reported that an electric samovar presented to
Elizabeth II Elizabeth II (Elizabeth Alexandra Mary; 21 April 19268 September 2022) was Queen of the United Kingdom and other Commonwealth realms from 6 February 1952 until Death and state funeral of Elizabeth II, her death in 2022. ...
in about 1968 by a Soviet aerobatic team was removed from Balmoral Castle as a security precaution amid fears that its wiring could contain a listening device. * On 6 December 1972, the
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
placed a wire tap on a multiplex trunk line 24 kilometers southwest of
Vinh Vinh () is the capital of Nghệ An province and an economic and cultural center of North-Central Vietnam. A key point in the East–West economic corridor linking Myanmar, Thailand, Laos and Vietnam, the city is situated in the Southeast of ...
to intercept Vietnamese communist messages concerning negotiating an end to the
Vietnam War The Vietnam War (1 November 1955 – 30 April 1975) was an armed conflict in Vietnam, Laos, and Cambodia fought between North Vietnam (Democratic Republic of Vietnam) and South Vietnam (Republic of Vietnam) and their allies. North Vietnam w ...
. * The
Watergate scandal The Watergate scandal was a major political scandal in the United States involving the Presidency of Richard Nixon, administration of President Richard Nixon. The scandal began in 1972 and ultimately led to Resignation of Richard Nixon, Nix ...
in the 1970s.


Listening devices and the UK law

The use of listening devices is permitted under UK law providing that they are used in compliance with Data Protection and Human Rights laws. If a government body or organisation intends to use listening or recording devices they must follow the laws put in place by the Regulation of Investigatory Powers Act (RIPA). It is usually permitted to record audio covertly in a public setting or one's own home.


Legal requirements of listening and recording device use

It is illegal to use listening or recording devices that are not permitted for public use. Individuals may only use listening or recording devices within reasonable
privacy law Privacy law is a set of regulations that govern the collection, storage, and utilization of personal information from healthcare, governments, companies, public or private entities, or individuals. Privacy laws are examined in relation to an ind ...
s for legitimate security and safety reasons. Many people use listening devices on their own property to capture evidence of excessive noise in a neighbour complaint, which is legal in normal circumstances.The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000.


Legal use of listening and recording devices

It is legal to use listening or recording devices in public areas, in an office or business area, or in one's own home. Many people use listening devices to record evidence or to take notes for their own reference.


Illegal use of listening and recording devices

It is illegal to use listening devices on certain Military band and Air Band UHF and FM frequencies - people in the past who have not followed this law have been fined over £10,000. This is because the use of a radio transmission bug that transmits on restricted frequencies contravenes the Telecommunications Act and is illegal. It is also against the law to place a listening or recording device in someone else's home. Due to privacy and human rights laws, using a listening or recording device to intrude on the reasonable
expectation of privacy In United States constitutional law, reasonable expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the U.S. Constitution. It is related to, ...
of an individual is highly illegal, i.e. placing gadgets in someone's home or car to which one does not have permitted access, or in a private area such as a bathroom.


United States Law on Listening Devices


Federal laws on Listening Devices

Several federal laws were passed by
congress A congress is a formal meeting of the representatives of different countries, constituent states, organizations, trade unions, political parties, or other groups. The term originated in Late Middle English to denote an encounter (meeting of ...
that apply nation-wide. Under Title 18 of the US Code § 2251 2(iii)(c) at least one of the parties involved in the communication must have given consent to interception of the
communication Communication is commonly defined as the transmission of information. Its precise definition is disputed and there are disagreements about whether Intention, unintentional or failed transmissions are included and whether communication not onl ...
. This title applies to wire,
oral The word oral may refer to: Relating to the mouth * Relating to the mouth, the first portion of the alimentary canal that primarily receives food and liquid **Oral administration of medicines ** Oral examination (also known as an oral exam or ora ...
, or any kind of electric communication. This single party consent only applies if one of the parties is an "officer of the United States" (Title 18 of the US Code § 2251 d. Furthermore, congress passed the Electronic Communications Privacy Act of 1986 (ECPA). This act updated the Federal Wiretap Act of 1968. The Federal Wiretap act addressed the interception of conversations over telephone lines, but not interception of
computer A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic set ...
or other digital data. This act was further updated by the USA Patriot Act to clarify and modernize the ECPA. The ECPA has three title. Title I prohibits attempted or successful interception of or "procure ent fany other person to intercept or endeavor to intercept any wire, oral, or electronic communication." It also prohibits the storage of any information obtained via phone calls without consent or illegally obtained though wiretaps. Furthermore, the US passed the Wiretap Act which prohibits unauthorized interception of "wire, oral, or electronic communications" by the government or by private citizens. Furthermore, this act establishes the procedure for government officials to obtain warrants to authorize any wiretapping activates. Such laws were passed in response to congressional investigations that found extensive cases of government and private wiretapping without consent or legal authorization. In the US, electronic surveillance is seen as protected under the
Constitution A constitution is the aggregate of fundamental principles or established precedents that constitute the legal basis of a polity, organization or other type of entity, and commonly determines how that entity is to be governed. When these pri ...
that the Fourth Amendment, which protects against unreasonable search and seizure by the government, which also is seen by the
Supreme Court of the United States The Supreme Court of the United States (SCOTUS) is the highest court in the federal judiciary of the United States. It has ultimate appellate jurisdiction over all Federal tribunals in the United States, U.S. federal court cases, and over Stat ...
as electronic surveillance.


State to State variation

Listening devices are regulated by several legislative bodies in the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
. Laws on listening devices varies between
states State most commonly refers to: * State (polity), a centralized political organization that regulates law and society within a territory **Sovereign state, a sovereign polity in international law, commonly referred to as a country **Nation state, a ...
within the US. Typically the variation comes on whether or not the state is a one or two party consent state. Within one party consent states, only one party must approve the recording, whereas in all party consent states all parties must consent to the recording. In many states, the consent requirements listed below only apply to situations where the parties have a reasonable expectation of privacy, such as private property, and do not apply in public areas. (Protection can apply to conversations in public areas in some circumstances.)


See also

*
Acoustic cryptanalysis Acoustic cryptanalysis is a type of side-channel attack that exploits sounds emitted by computers or other devices. Most of the modern acoustic cryptanalysis focuses on the sounds produced by computer keyboards and internal computer components, b ...
* Cellphone surveillance * Communications interception *
Eavesdropping Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. Etymology The verb ''eavesdrop'' is a back-formation from the noun ''eave ...
*
Electronic Privacy Information Center The Electronic Privacy Information Center (EPIC) is an independent nonprofit research center established in 1994 to protect privacy, freedom of expression, and democratic values in the information age. Based in Washington, D.C., their mission i ...
*
Espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
* Greek telephone tapping case 2004-2005 * Mobile phone tracking *
National Cryptologic Museum The National Cryptologic Museum (NCM) is an American museum of cryptologic history that is affiliated with the National Security Agency (NSA). The first public museum in the U.S. Intelligence Community, NCM is located in the former Colony Sev ...
* Nonlinear junction detector * Peter Wright *
Privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
* Privacy International *
Surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
*
Technical surveillance counter-measures Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is t ...
* Telephone tapping * TEMPEST * *
Watergate scandal The Watergate scandal was a major political scandal in the United States involving the Presidency of Richard Nixon, administration of President Richard Nixon. The scandal began in 1972 and ultimately led to Resignation of Richard Nixon, Nix ...


References


External links


Secret Radio Aerials: Spy antennas everywhere

French, German EU Offices Bugged
- CBS news story
EU investigates mystery buggings
- BBC News story *

', How to protect privacy *
Listening In: Electronic Eavesdropping in the Cold War Era
.
US Department of State The United States Department of State (DOS), or simply the State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs o ...
,
Bureau of Diplomatic Security The Bureau of Diplomatic Security, commonly known as Diplomatic Security (DS), is the security branch of the United States Department of State. It conducts international investigations, threat analysis, cyber security, counterterrorism, and pr ...
, 2008 *
Bugging Hotel Rooms
. US Department of Agriculture.
Covert listening devices on the Crypto Museum website

Eavesdropping Devices Found in Restaurant
- QCC Global News Story

{{DEFAULTSORT:Covert Listening Device Surveillance Law enforcement equipment Espionage devices Espionage techniques