computer services venturacomputer services venturacomputer services venturacomputer services ventura
  • HOME
  • TESTIMONIALS
  • ABOUT
  • PORTFOLIO
    • Logos
    • Web and Social Media
    • Print Media
    • Business Media
    • Ads
    • Photography
    • Video
    • Tech Work
  • SERVICES
    • Creative Services
    • Smart Home
    • Technology Services
  • BLOG
  • CONTACT
  • Privacy Policy
  • Terms and Conditions
project prism
Project PRISM
March 18, 2019
Social Networking; Be Careful What You Share Online
March 18, 2019

Covert Listening Devices: Who’s Listening In On You?

Covert Listening Devices are more commonly known as “bugs,” they are made to look exactly like any number of innocuous household items, and are set up for the sole purpose of eavesdropping on conversations without anyone knowing it. These devices are made up of a microphone which records everything going on and a miniature radio transmitter to send the audio somewhere else.

Covert Listening Devices were used in two ways – to bug someone’s telephone or as a “wire” on an individual who goes in to collect incriminating data. These systems are more common than most people think, from military and government, police, private investigators, businesses, and even your friends, family and neighbors. The most common targets of bugging operations are embassies and other important diplomatic areas, known hangouts for criminals, meeting rooms, hotel rooms, airplanes, vehicles and more. Generally, location bugs set up legally are only placed prior to the visit of important persons or where there is suspected criminal activity.

Bugs come in a variety of forms now-a-days, they can be remotely activated and even the most innocent electronic devices can enable someone to spy on you without your knowledge. Cell phone microphones can be easily activated remotely, even when a call is not being made, without any special access to the phone and you would never know that it had been done; anything in range of the cell phone’s mic can be heard and recorded. Your car is another location for these kinds of devices – using your car’s built-in emergency and tracking system someone can activate it and listen to the conversations going on in the car. Again, you would never know they were listening.

There are some counter-measure devices available for certain types of bugs although even these are not fool-proof. Since most Covert Listening Devices emit radio waves you can “sweep” for them using a receiver that picks up those emissions. Advanced bugs can be turned on and off remotely, they can change frequencies automatically and some bugs transmit in bursts so that they can only be detected if the proper scanning device is running non-stop to find it. However, if the bug doesn’t use radio waves to transmit then it is almost impossible to detect.

~TeCHS

graphic design ventura

www.ezDigitalLife.com

Your Digital Life Simplified!

Share
0

Related posts

2F Authentication
August 11, 2020

What is Multifactor Authentication and why do you need to use it?


Read more
July 7, 2020

How to Create a Secure Password


Read more
May 12, 2020

New apps to help you learn something or get fit while in quarantine


Read more

(800) 669-2022

Need a hand with your tech?

Give us a call!

GET OUR NEWSLETTER!

Want awesome tech tips & tricks sent directly to your inbox? Get our newsletter!

* indicates required





RECENT ARTICLES

  • 10 Quick Cybersecurity Tips to Start the New Year
  • The Top 12 Holiday Scams to Avoid This Season
  • Shop our Handmade Items
  • What is Multifactor Authentication and why do you need to use it?
  • How to Create a Secure Password
© 2021 TeCHS. All Rights Reserved.