What Are the Different Types of Eavesdropping Devices?
The earliest eavesdropper in the world was invented by China 2000 years ago. The book "Mozi" in the Warring States Period recorded a kind of "listening to the ear". This "listening ear" is made of pottery. It has a big belly and a small mouth. It is buried in the ground, and a thin layer of leather is covered on the mouth. When people fall on it, they can hear dozens of miles outside the city. Movement. In the Tang Dynasty, another type of "earth listener" appeared. It is fired from fine porcelain and shaped like a hollow gourd pillow. When a person sleeps and rests, he or she can clearly hear the sound of horseshoes within 30 miles.
- Northern Song University scientist Shen Kuo in his famous "
- GSM is made up of
- Since the "monitor" was exposed in 2003, both the so-called mobile phone monitor companies, mobile communication experts, and telecommunications operators have avoided the principle of mobile phone monitors when talking about mobile phone monitors. Not to mention, it must be that the operator deliberately didn't say it, so that people feel that the mobile phone monitor is getting more and more mysterious, and it also provides some people with some opportunities. The actual ordinary mobile phone listener knows GSM
- The first step is to prevent when you buy a mobile phone. The purchase channel is an important link. Secondly, do not repair the mobile phone at a non-designated repair point casually, and do not easily lend the mobile phone to others. If you have doubts about your mobile phone, you should go to the manufacturer's designated repair point for testing as soon as possible. For the large-scale mobile phone monitoring system introduced earlier, because it is already a very "standard" spy equipment, if this type of eavesdropper appears around us, due to its high power, the anti-espionage department and the police will detect and find out These eavesdroppers are severely punished. [2]
- Digging underground tunnels, cutting submarine cables, and establishing surveillance bases ... all these are the means used by the United States to spy on the intelligence of other countries.
- "Big bug cocoons" installed on the sea floor
- In August 1981, a seemingly unforeseen incident occurred in the command system of the former Soviet Pacific Fleet in Kamchatka's operating area in the Far East: a communication cable line was interrupted. But something unexpected happened, and an inexplicable thing like a "big cocoon" was found on a cable.
- The "big cocoon" enclosing the cable is an eavesdropping device in the United States. It can record conversations over weeks or months transmitted over a cable and retrieve them again.
- Secret Tunnel Leads to Embassy
- In the spring of 2001, big news broke in Washington: The FBI dug out the big "mole" --- Robert F. Hansen, a veteran of anti-espionage work, is actually a Russian spy. Federal court found guilty. One of Hansen's convictions was that he revealed to the Russians that the United States had dug a tunnel under the Russian embassy in the United States to monitor various activities of the embassy.
- Reconnaissance base detection intelligence
- The electronic reconnaissance base called "Songxia Joint Space Defense Research Facility" was built in a remote area of central Australia and is a base established by the United States in cooperation with Australia to monitor China and other countries. Its main purpose is to collect large amounts of radar, radio and telephone data for nearly half of the Earth, including Asia and the Middle East.
- 3G monitor
- In 2008, China Unicom officially released the 3G network. The W-CDMA system adopted by it can make the network traffic reach 3.1. How high the network traffic is, letting it show its skills in monitoring functions. Use this network system and already 3G system monitor. [2]