For some time, a certain regularity has been observed: major political scandals resulting from the publication of a video made by deception. Recordings come out in different circumstances. Some have waited months or years to see the light of day, while others are released just after registration. It all depends on the purpose of the person recording the conversation. Interestingly, the last two big wiretapping scandals would not have happened if the people responsible for securing the meeting had been better trained, or if they had simply shown more caution. Both in the “Sowa & Friends”, as well as during the meeting between Marek Chrzanowski and Leszek Czarnecki, recording devices were used. In both cases, the interlocutors turned out to be, shall we say, imprudent. Can such situations be prevented? Yes, you can try. However, the thing is not easy. In the further part of the article, I will try to describe what wiretapping really is, what technologies they use for their operation, what limitations they have, and how to defend against wiretapping.
Before we start the subject of wiretapping, it should be mentioned that, in general, recording third parties without their knowledge is a crime in Poland prosecuted at the request of the injured party - therefore, if any of the readers would like to play spy or detective and eavesdrop on someone, make sure whether his actions do not have the hallmarks of a punishable act (I recommend reading Article 267 of the Penal Code).
Art. 267.§ 1. Whoever, without authorization, gains access to information not intended for him by opening a closed letter, connecting to a telecommunications network or breaking or bypassing its electronic, magnetic, IT or other specific security, shall be subject to a fine, the penalty of restriction of liberty or imprisonment for 2 years old § 2. The same punishment shall be imposed on anyone who, without authorization, gains access to all or part of the IT system. visual device or other device or software. § 4. The same penalty applies to anyone who discloses information obtained in the manner specified in § 1-3 to another person. § 5. Prosecution of the offense specified in § 1-4 takes place at the request of the injured party
What are the types of eavesdropping and why a voice recorder will work once and not another time?
The rapid development of technology and the ever-easing access to all kinds of electronic gadgets have meant that now everyone can find information online equipment is needed and start eavesdropping. Whether it's economic espionage, political combat, or clearing up suspicions about your partner's fidelity, in my experience, wiretapping is one of the first ideas to get valuable information.
In general, eavesdropping can be divided into two main categories: recording devices and devices that allow live eavesdropping. Everything else will be combinations of these two uses. Recording wiretaps are various types of dictaphones, from the classic ones, let's say office ones, to miniaturized versions and masked in various objects.
They will work when we want to record a recording, but if such equipment has been planted somewhere, you need to have a plan how to take it away. The "Watergate" scandal shows that neither one nor the other is simple. And what if we want to know immediately what is happening in a given room? When do we want to react right away? All types of devices using wireless communication technologies come to the rescue: analog radio transmission, Wi-Fi, Bluetooth, GSM, 4G. More advanced eavesdropping devices can simultaneously transmit sound and immediately record it.
1972 - 1974 United States, the Watergate scandal - the plumber's failure The most famous political scandal in the United States. In 1972, Nixon, preparing for re-election, established a special Presidential Re-Election Committee. This was a group of loyal associates whose job was not always to legally support President Nixon's efforts. The name of the scandal comes from the American Watergate hotel complex, where five people were detained, the so-called. plumbers working for the Committee. Their task was to set up wiretaps in the headquarters of the Democratic Party. The activities of the Committee were revealed thanks to an investigation conducted by journalists of The Washington Post, cooperating with a secret informant nicknamed Deep Throat. A film was made based on the events. "All the President's Men."
Another way of dividing listening devices will be the criterion of working time and the distance from which the listening can be conducted. Important note: as a rule, recording devices need much less energy than those that they send. For example, a miniature voice recorder recording conversations on a micro SD card, powered by a 130 mAh Li-Ion battery will be able to work for up to 30 hours, and wiretapping using the GSM module equipped with the same battery will not last even an hour of active listening. In addition, devices that use SIM cards and mobile networks for their work will depend on the signal level of the BTS base stations, which affects the energy consumption and the quality of the sound transmitted this way. Not all wiretaps will work equally well in different conditions. We will use a different type of device to eavesdrop on conversations in a moving car, and a different one in the "hut at the end of the world". The already mentioned GSM has a global range (as long as the eavesdropping itself and its operator are within the cellular network) and are great in vehicles, which is a big advantage. For comparison, analog wiretapping transmitters, stabilized with quartz, have a range of up to 1000 m in the open (range given for a 10 mW transmitter). What's more, this range decreases sharply if there are buildings, steel containers, trusses, or medium or high voltage lines in the signal path. The car will also not be a suitable working environment for such a transmitter, so what are the advantages of this type of transmitters? Well, they are characterized by relatively low power consumption and high sound quality.
1998 The Lewinsky Affair, or Zippergate. Lina Tripp records telephone conversations during which Monika Lewinsky, an intern at the White House, talks about an affair with US President Bill Clinton. Tripp gives the tapes to prosecutor Keneth Starr. Lina Tripp records another conversation during a face-to-face meeting with the wiretapping that the FBI equipped her with. The president denied the affair: I did not have sexual relations with that woman, Miss Lewinsky. The president was in danger of being removed from office by impeachment. In the end, he made it to the end of his term.
Old but proven tape voice recorders
Let's go back for a moment to the latest KNF scandal. From the information leaked to the media, we know that the "scumbag" systems used neutralized all devices that Mr. Czarnecki had with him, except for the classic tape recorder. Why did this happen? There may be several reasons, but the KNF spokesman admitted that a "vibroacoustic system" was installed in the office of the head of the KNF and 4 other rooms in the office (including 2 conference rooms), which "prevents surveillance activities from outside the building (...) using technical means such as such as contact microphones, laser microphones, etc.” This means that the "scumbags" used protected primarily against those who would like to eavesdrop on conversations at the KNF through window panes. The neutralization of the two digital dictaphones that Leszek Czarnecki had with him took place on the occasion. The classic tape recorder turned out to be quite resistant, and the recording is still far from perfect. The reason for such a situation is probably the type of microphone used in this recorder and its frequency characteristics. The sensitivity of the microphone dropped sharply for frequencies above 14 kHz, which is the frequency at which ultrasonic scumbags usually start working. The size of the device was also probably not conducive to recording. Classic voice recorders are difficult to hide due to their size. Of course, you can change the microphone to have a different, more robust frequency response.
– I don't think I'm revealing a big secret here. It was a voice recorder that Mr. Czarnecki bought for PLN 170 in the Media Markt store - attorney Roman Giertych in an interview with the Money.pl portal.
Digital voice recorders
Digital voice recorders have several features that increase their use as spy devices. Voice-activated recording, covert recording mode, day-specific recording, multiple settings for recording quality and microphone sensitivity are just some of the basic features. When buying such a voice recorder, it is worth checking how the voice recorder is powered and whether it has a removable storage medium. There are hundreds, if not thousands, of voice recorders on the market. Almost everyone knows brands such as Olympus, Marantz, Philips, but it is also worth looking for something new, because there are many new brands that are not inferior to the leaders in terms of their capabilities. An example is the Korean iDam, whose voice recorders are characterized by a sensational price-quality ratio. The purchase of a good voice recorder that will work well in the work of a detective costs only PLN 400. However, the offer is rich, and the cheapest model we found costs PLN 90.
2006 Hungary, or lying to the people is tiring In September 2006, recordings were released in which Ferenc Gyurcsány, Hungary's prime minister since 2004, says during a party congress that he is constantly lying to the public about the country's economic condition. The video surfaced weeks after he was re-elected prime minister. He didn't say it was bad because he wanted to win the election. I almost died when I pretended everything was fine for a year and a half. In fact, I lied - morning, noon and night. I don't want to do that anymore," he admitted during a closed party congress. The recording was revealed by the Hungarian public radio station Magyar Rádió. Despite pressure from the opposition, Ferenc Gyurcsány did not resign from his position, in October 2006 the parliament gave him a vote of confidence.
Miniature masked voice recorders
Small sound recorders can be hidden in virtually any object, and the price of the simplest models is several hundred zlotys. Their small size is why they are now such a big threat. A miniature voice recorder in the form of a pen, flash drive, wristwatch, power bank, clip, brooch or car key are just a few of the most obvious camouflages. There can also be such sophisticated forms as a voice recorder in an RFID card, credit card or SD memory card. You can also easily buy "bare" voice recorder modules for self-masking. The only limit is your imagination. All recording devices (especially miniaturized and masked ones) are extremely difficult to detect, even with the use of professional non-linear junction detectors (NLJD) and bug detectors. This fact results from the small current supplying wiretaps of this type and from the lack of any transmission. A well-shielded and hidden recording bug is practically undetectable without a thorough search of the room.
Sound recorders with the possibility of data transfer and live sound transmission
This type of device is nothing more than an advanced voice recorder using wireless communication to transfer the collected information. Wiretaps of this type often use digital encoded radio transmission, Wi-Fi, Bluetooth and networks of mobile operators. The undoubted advantage of this type of solution is the lack of the need to "return" for a recording device hidden somewhere. Access to this type of voice recorders is generally limited to state services and institutions, mainly due to the price. These range from a few to several dozen thousand zlotys per recorder.
Analog RF eavesdropping transmitters
An old solution, but still very popular. Eavesdropping transmitters broadcasting on ultra-short waves are most often used to eavesdrop on people in close range. Depending on the type of eavesdropping transmitter, an ordinary radio or scanner covering frequencies from 85 to 107 MHz, from 170 to 190 MHz, from 300 to 350 MHz and from 400 to 500 MHz is enough to receive the signal. The most commonly used modulation in analog listening transmitters is WFM. Wiretaps of this type can remain active for up to a year based on the used R20 battery or a month on a 3.7 V LS33600 battery, and when connected to the mains power supply, the working time is unlimited. The nature of the emitted signal makes these types of transmitters easy to detect, locate or jam. Due to the frequencies used, a working eavesdropping transmitter can block the operation of e.g. radio controls for entrance gates, roller shutters and other solutions based on 315 MHz frequencies. This is a common reason why someone realizes they are being tapped.
Professional digital transmitters
Radio transmitters with digital transmission characteristics using signal masking, such as hopping or dispersed signal, are professional devices that are practically not legally available on the civilian market. Generally used by state services and institutions. Due to the way of data transmission, they are difficult to detect even for such advanced devices as ST131 Piranha II or REI Oscor Green. This activity requires extensive knowledge in the field of radio engineering and electromechanics.
GSM wiretaps as a module and in camouflage
Windtaps of this type are widely used due to their ease of use, unlimited range and relatively low price. The aforementioned limitations resulting from the use of the mobile network for transmission are the Achilles' heel of the solution. The principle of operation is simple: the device behaves like a mobile phone that automatically answers incoming calls. The eavesdropper obtains the eavesdropping via the telephone, from which he connects with the eavesdropper. Solutions available on the market are camouflaged or so-called. DYI (do it yourself). The common element that connects all wiretaps of this type is the need to use a SIM card. GSM wiretaps are easy to detect during listening and easy to jam with the use of radio jammers jamming the GSM band. The price of eavesdropping solutions based on the GSM module ranges from PLN 100 to PLN 4,000.
Telephone line tapping
An archaic solution, although it is still used. Used only in places with a traditional landline network. The transmitting or recording device is plugged in between the telephone and the socket. The principle of operation is the same as in the case of analog radio transmitters or voice recorders, depending on the channel used to obtain information. Due to the decreasing role of fixed telephony, telephone wiretaps are rather rare - in contrast to wiretaps of mobile phones, which will be discussed later.
2006 Britain. Celebrities in the spotlight The British tabloid News on the World obtained information by hacking into private mobile phones and buying information from the police. Not only the phones of celebrities were hacked, but also the parents of teenage murder victims. Among the injured were Boris Johnson, the mayor of London, David Blunkett, a minister in the government of Tony Blair, footballer Paul Gascoigne and father of Princess Diana. Soldiers fighting in Afghanistan and their families were also tapped. Editors-in-chief Andy Coulson and Rebekah Brooks were arrested in connection with the scandal. The title closed in 2011.
Spyphone, i.e. spying on a mobile phone
A spyphone application working discreetly on a mobile phone is used to intercept all user activities such as: voice calls, SMS messages, MMS, chat, photos and videos taken, contact list , used instant messengers and visited websites. The program also acquires the GPS position and can record sounds from the immediate surroundings. What may draw the attention of the phone user that he is being spied on is excessive heating of the smartphone and excessive consumption of mobile data. What can be done? The solution is, for example, restoring the phone to factory settings, unless the application has been installed as a "super user" (Root), which gives it the status of the application as a system application. This prevents it from being deleted despite a factory reset. Phone spyware uses data transfer to send the collected information to a server that the eavesdropper has access to using his login and password. Merely finding the application on the phone does not give the possibility of determining who is responsible for the installation. It is a good practice to secure the phone, e.g. with a fingerprint, activate the automatic lock after a given time and not leave the phone unattended.
Eavesdropping from a PC
As with a phone, a Windows PC can be targeted by an attack. Smart antivirus programs come to the rescue, but they are of no use if the computer is left unprotected while the owner is away. As in the case of Spyphone, the application must be installed, after which it starts collecting all information about the user's computer activity. Checking the exceptions set in the antivirus program may help, but you can only be sure that you do not have the program installed after formatting the disk or reinstalling the operating system. Programs of this type are usually visible in system processes, but their name is usually misleading.
2013. Turkey, or where to hide $30 million. In December, the huge scale of corruption in the country came to light. In February 2014, a recording of a telephone conversation between Turkish Prime Minister Recep Tayyip Erdogan and his son Bilal appears online. In the recording, the Prime Minister instructs his son to hide 30 million. euro (the amount of USD 25 million also appears). The Prime Minister claims that the recording was manipulated. And he remains prime minister.
How do directional microphones work?
Directional microphones help to listen over long distances, but the listener must remain within line of sight. This device is an addition to the voice recorder, it is usually used for live eavesdropping along with recording. The principle of operation is simple and the same for both pipe microphones and those equipped with a bowl. The microphone must be directed towards the person being recorded and is supposed to separate the sound of the recording source from the sound of the surroundings. Directional microphones equipped with a parabolic dish can pick up the conversation even from a distance of 200 meters.
Eavesdropping through the wall, i.e. seismic microphones
Another category of devices are those that enable eavesdropping through the ceiling, floor or wall up to 50 cm thick. The equipment consists of a sensitive head amplifying surface vibrations caused by a sound wave and an amplifier that amplifies the sound 50,000 times, making it audible to humans. It's really the advanced equivalent of a glass to your ear and the wall.
2013 The Snowden Affair. One of the biggest leaks in the history of American secret services The British "The Guardian" together with the "Washington Post" publish information that the US government controls millions of e-mails, chats, Skype conversations and other private electronic content. The US National Security Agency (NSA) was to transfer them, among others, to Google, Microsoft, AOL, Yahoo!, Facebook and YouTube. The name of the informant "The Guardian" reveals at the request of Edward Snowden himself, who thus becomes enemy No. 1 in his native St. United States. Documents provided by Snowden prove that the NSA can eavesdrop on customers of virtually all telecommunications networks in the US. Using the PRISM system, US secret services spy on e-mail, VoIP telephony and social media accounts. The British spy agency Government Communications Headquarters does the same thing by collecting information sent by email, social media messages, etc. (Tempora project). The agency works with the NSA. The NSA spies on other countries and world leaders, obtaining information through a group of hackers, etc. Ultimately, it turned out that the US is listening to everyone, including the leaders of allied countries.
How to protect yourself and why it's not easy
The answer is simple, but not short. First of all, there are plenty of cheap and quite effective eavesdropping devices on the market. Secondly, they have many sophisticated forms (all those pens with voice recorders and glasses with a webcam are not a myth) and are often microscopic. Thirdly, when meeting other people (contractors, politicians or just friends), we do not assume that we are being spied on. Besides, an informal meeting in a restaurant or at a banquet often precludes the possibility of overtly using anti-eavesdropping devices. In addition, there is underestimation of threats, excessive trust and insufficient knowledge about wiretapping. The worst situation is when a meeting where we want to say something in confidence to someone takes place in a new environment. Besides, while eavesdropping equipment is cheap, detection devices are not. Just like "smugglers". For example, a listening set working for 10 hours can be purchased for PLN 200, and the equipment that would detect such a set costs about PLN 100,000. And yet we will not ask the contractor to take out everything he has in his pockets and we will not disassemble his pen.
AdvertisingSP-157 vibroacoustic jammer. Blocks eavesdropping from the outside. Jams laser and seismic microphones. Thus, one method of counteracting it is detecting, locating and removing eavesdropping devices (expensive), the other is disrupting the work of eavesdropping (also not cheap). It should also be made clear that 100% certainty and protection can never be achieved. It is best to combine both methods. Depending on the technology used by the listening device, it will be necessary to use a different type of jammer. Four types of jamming can be distinguished: blocking wireless communication - this is done by the so-called jammers of radio signals, jamming of microphones - systems generating ultrasound and acoustic signals generated dynamically covering human speech at many frequencies are used simultaneously, vibroacoustic jamming of seismic and laser microphones, using heads mounted on floors, walls, windows, etc. Talking with the tap turned on, playing the sound of an out of tune radio or having a conversation with music from the TV usually does not help if someone is very keen on recording information, and besides, I cannot imagine a business conversation conducted at the sink in the bathroom. Unfortunately, professional jamming devices, similarly to those used to detect eavesdropping, cost from 2 to 3 orders of magnitude more than the eavesdropping they are supposed to block. To sum up: It's worth protecting yourself. When conducting a very important conversation, carefully check the room. Use a jammer if finances allow. But you should also be careful what you say and to whom. | CHIP
About the author: Michał Nosowski, an expert in the Alfatronik company dealing with eavesdropping, and above all professional anti-eavesdropping checks. Author of a detective blog. He also conducts training in the field of raising and maintaining a high level of information security in business. Privately, he is passionate about bushcraft, green and urban survival and, as he himself put it, a moderate prepper.