13.07.2015 Views

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bugs <strong>and</strong> Bug Detectorstelephones, paved the way for the development of bugsthat operate using ultrahigh frequency wavelength ormicrowaves. This has made the detection of bugs moredifficult than simply detecting the output of radio waves.Some modern bugging devices can also disguise theoutput signal or vary the frequency of the signal, whichcan thwart detection.Some bugs contain voice-activated recorders that arecapable of storing up to 12 hours of conversation. Theinformation can then be rapidly sent to a receiver in a“burst” transmission. Because detection of the bug isgeared toward the frequencies emitted during transmission,the detection of these bugs is difficult. Countersystems are designed to try <strong>and</strong> activate the bug <strong>and</strong> thendetect it. The transmission range of bugs has improvedfrom mere yards to miles. Some bugs can even transmit tosatellites, making monitoring from thous<strong>and</strong>s of milesaway feasible.Another surveillance option is the use of a microphone.Conventional microphones operate electronically;the electrical signals representing the converted soundwaves are passed through a wire to a receiving devicelocated elsewhere. Microphones that operate using magneticfields also exist.Shotgun microphones equipped with a parabolic reflectorcan record conversation outside at a distance.Electronic filters screen out extraneous background noisein order to enhance the sensitivity of the microphone.Sinn Fein President Gerry Adams dsiplays an electronic tracking <strong>and</strong>listening device, found in a car used by Sinn Fein leaders, during a pressconference in Belfast, Northern Irel<strong>and</strong> in 1999. AP/WIDE WORLD PHOTOS.transmitted by the bug to the receiver can be recorded orlistened to directly. Other types of bugs exist. For example,radio frequencies passing through the electrical wiringof a building can be intercepted. Bugs can also interceptthe electrical transmissions from portable phones,wireless computers linked to a network, <strong>and</strong> even from acomputer monitor.The designation of secret listening devices as bugs isentirely suitable, given their small size. Modern bugs canbe concealed in pens, calculators, <strong>and</strong> even buttons (althoughthe latter need to be replaced frequently, as theirpower supply is so small).The miniaturization of electronics has made it possibleto pack more devices into the small package. Forexample, video equipment can be contained in a bug,enabling sight as well as sound surveillance.Up to the 1980s, bugs operated using very high frequency,or VHF, radio waves. However, the developmentof mobile communications technology, particularly digitalLaser microphones bounce a laser beam off of anobject that is near the conversation. The object must besomething that resonates, or is able to move as pressurewaves created by noise in the room encounter it. As theobject vibrates back <strong>and</strong> forth due to the sound wavesfrom the conversation in the room, the distance traveledby the laser beam will become slightly shorter <strong>and</strong> longer.These length differences can be measured over time, <strong>and</strong>the pattern of the vibrations translated into the text of theconversation.Microphones are extremely hard to detect, especiallywhen used in a room where other electrical appliances(i.e., computers, telephones) are operating.Bugs are detected by virtue of the frequencies theyemit. Essentially a bug detector is a receiver. When broughtnear an operating bug, the detector will collect <strong>and</strong> amplifythe bug’s transmission. Bug detectors are now portableenough to be carried in a “sweep” of a room.Bugs <strong>and</strong> microphones have moved from the arena ofpolitical espionage to the boardrooms of corporate offices<strong>and</strong> police surveillance operations. Recognizing the prevalenceof electronic eavesdropping devices <strong>and</strong> their threatto privacy, the United States Congress passed the ElectronicCommunication Privacy Act in 1986, which madebugging illegal. Nonetheless, the use of eavesdroppingdevices <strong>and</strong> detectors is widespread in the intelligence146 Encyclopedia of <strong>Espionage</strong>, <strong>Intelligence</strong>, <strong>and</strong> <strong>Security</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!