Bugging Ok
Bugging Ok
Bugging Ok
After reading the text quickly then put in one of the following titles for each
section in the boxes provided.
1 Encryption technology
2 Listening devices
3 Undetectable
Mobile phones
According to security experts, the most common listening device remains the
electronic bug. But government agencies such as the CIA and MI5 have far more
advanced systems at their disposal.
Powerful uni-directional microphones can pick up conversations through open
windows .If the window is closed, radio waves or a laser beam can be bounced off
the glass. The vibrations detected can be translated into speech.
But potentially the most powerful tool for the modern spy is the mobile phone.
Mobiles that double as listening devices can be bought over the internet.
undetectable
But today's spies are also able to convert conventional phones into bugs without
the owners' knowledge.
Mobiles communicate with their base station on a frequency separate from the one
used for talking. If you have details of the frequencies and encryption codes
being used you can overhear what is being said in the immediate vicinity of
any phone in the network.
According to some reports, intelligence services do not even need to obtain
permission from the networks to get their hands on the codes.
So, if it is switched on, a mobile sitting on the desk of a politician or
businessman can act as a powerful, undetectable bug.
The technology also exists to convert land line telephones into covert listening
devices.
Encryption technology
According to one security expert, telephone systems are often fitted with "back
doors" enabling them to be activated at a later date to pick up sounds even when
the receiver is down.
Telephone conversations are also routinely intercepted by spy satellites. The
potency of key word recognition technology is often overstated, but it is still
used to scan millions of conversations a day for potentially juicy information.
Encryption devices, which clip on to the base of mobile phones and scramble the
voice data being sent from your phone, are available.
But those listening in may well be able to crack the codes.
Intelligence is constant battle between the bugger and the bugged, says Michael
Marks, of surveillance-equipment supplier Spymaster, and "at the moment the
buggers probably have the upper hand".
Mr Marks' advice to anyone who thinks they may be under surveillance is to
ensure their office is swept regularly for bugs, buy an encrypted phone and make
sure no one in a meeting has a mobile phone on them.
Bugging-Part 2
After reading the text quickly then put in one of the following titles for each
section in the boxes provided.
1 Step by step
2 In the tent
3 The big outdoors
Another way of making sure you are not being bugged is to use a Faraday cage or
shielded tent, which prevents radio waves entering or leaving.
Mobile phone calls are impossible from inside the tent, but no-one will be able
to listen to your conversations using bugs or radio wave listening devices.
It will also prevent anyone intercepting radio emissions from computers,
preventing them from seeing what you have on screen.
"[A Faraday cage] will stop you doing anything other than having a conversation.
It is a very crude, but very secure, way of talking," says Michael Marks.
A more sophisticated - and expensive - method is to build a "clean room", of the
type used by the military, to shield radio waves and electromagnetic signals.
Simple steps
In fact, the only way to truly guarantee privacy, according to most security
experts, is to take a walk in the park.
Charles Shoebridge says: "It remains the case today as it has always been, that
probably the best way to avoid being eavesdropped is to pass information during
a long, unpredictable and unannounced walk in the big outdoors.
"Word of mouth is always preferable to any form of electronic communication -
assuming the information's recipient is entirely trustworthy, of course."
Story adapted from BBC NEWS:
Published: 2004/03/02
Read the first four paragraphs
A mobile phone owner would be aware if his conversations were being listened to.
Questions
If not ,why?
Do diplomats consider the danger of being over heard? Why? Why not?
According to the experts what is the safest way to hold a truly private conversation?
Discussion
Having read the text do you think we have any privacy Why? Why not?
What implications does this have for privacy laws?
Can you think of anyways our privacy can be invaded?