Thing (listening device)

The Thing, also known as the Great Seal bug, was one of the first covert listening devices (or "bugs") to use passive techniques to transmit an audio signal. Because it was passive, being energized and activated by electromagnetic energy from an outside source, it is considered a predecessor of current RFID technology.[1]

Contents

Operating principles

The Thing, designed by Léon Theremin,[2] was very simple by today's standards. It consisted of a tiny capacitive membrane connected to a small quarter-wavelength antenna; it had no power supply or active electronic components. The device, a passive cavity resonator, became active only when a radio signal of the correct frequency was sent to the device from an external transmitter. Sound waves caused the membrane to vibrate, which varied the capacitance "seen" by the antenna, which in turn modulated the radio waves that struck and were retransmitted by The Thing. A receiver demodulated the signal so that sound picked up by the microphone could be heard, just as an ordinary radio receiver demodulates radio signals and outputs sound.

Theremin's design made the listening device very difficult to detect, because it was very small, had no power supply or active components, and did not radiate any signal unless it was actively being irradiated remotely. These same design features, along with the overall simplicity of the device, made it very reliable and gave it a potentially unlimited operational life.

Use in espionage

Theremin's device was used by the Soviet Union to spy on the United States. The device was embedded in a carved wooden plaque of the Great Seal of the United States. On August 4, 1945, a delegation from the Young Pioneer organization of the Soviet Union presented the bugged carving to U.S. Ambassador Averell Harriman, as a "gesture of friendship" to the USSR's World War II ally. It hung in the ambassador's Moscow residential study until it was exposed in 1952 during the tenure of Ambassador George F. Kennan.[3] The existence of the bug was accidentally discovered by a British radio operator who overheard American conversations on an open radio channel as the Russians were beaming radio waves at the ambassador's office. The Department of State found the device in the Great Seal carving after an exhaustive search of the American Embassy, and Peter Wright, a British scientist and former MI5 counterintelligence officer, eventually discovered how it worked.[4][5] Had the device never been discovered, it could easily have worked indefinitely.

The membrane of the Thing was extremely thin, and was damaged during handling by the Americans; Wright had to replace it. Wright's examination led to development of a similar British system codenamed SATYR, used throughout the 1950s by the British, Americans, Canadians, and Australians.[4]

United Nations

On the fourth day of meetings in the United Nations Security Council, convened by the Soviet Union over the 1960 U-2 incident where a U.S. spy plane had entered their territory and been shot down, the US ambassador showed off the bugging device in the Great Seal to illustrate that spying incidents between the two nations were mutual and to allege that Nikita Khrushchev had magnified this particular incident under discussion out of all proportion as a pretext to abort the 1960 Paris Summit.[6]

See also

Notes

  1. ^ Hacking Exposed Linux: Linux Security Secrets & Solutions (third ed.). McGraw-Hill Osborne Media. 2008. pp. 298. ISBN 978-0-07-226257-5. 
  2. ^ Glinsky, Albert, Theremin: Ether Music and Espionage, University of Illinois Press, Urbana, 2000
  3. ^ George F. Kennan, Memoirs, 1950-1963, Volume II (Little, Brown & Co., 1972), pp. 155, 156
  4. ^ a b Murray, Kevin. "THE GREAT SEAL BUG STORY". http://www.spybusters.com/Great_Seal_Bug.html. Retrieved 2007-03-24. 
  5. ^ Davis, Henry. "Eavesdropping using microwaves - addendum". http://www.audiodesignline.com/howto/173602214. Retrieved 2007-03-24. 
  6. ^ United Nations Security Council Verbatim Report meeting 860 page 15 on 26 May 1960 (retrieved 2008-08-29)

References

External links