请输入您要查询的百科知识:

 

词条 The Thing (listening device)
释义

  1. Creation

  2. Installation and use

  3. Operating principles

     Technical details 

  4. Discovery

  5. Aftermath

  6. See also

  7. Notes

  8. References

  9. External links

The Thing, also known as the Great Seal bug, was one of the first covert listening devices (or "bugs") to use passive techniques to transmit an audio signal. It was concealed inside a gift given by the Soviet Union to W. Averell Harriman, the United States Ambassador to the Soviet Union, on August 4, 1945. Because it was passive, needing electromagnetic energy from an outside source to become energized and activate, it is considered a predecessor of Radio-Frequency Identification (RFID) technology.[1]

Creation

The Thing was designed by Soviet Russian inventor Léon Theremin,[2] best-known for his invention of the theremin, an electronic musical instrument.

Installation and use

The device, embedded in a carved wooden plaque of the Great Seal of the United States, was used by the Soviets to spy on the US. On August 4, 1945, several weeks before the end of World War II, a delegation from the Young Pioneer organization of the Soviet Union presented the bugged carving to Ambassador Harriman, as a "gesture of friendship" to the USSR's war ally. It hung in the ambassador's Moscow residential study for seven years, until it was exposed in 1952 during the tenure of Ambassador George F. Kennan.[3]

Operating principles

The Thing consisted of a tiny capacitive membrane connected to a small quarter-wavelength antenna; it had no power supply or active electronic components. The device, a passive cavity resonator, became active only when a radio signal of the correct frequency was sent to the device from an external transmitter. This is currently referred in NSA parlance as "illuminating" a passive device. Sound waves (from voices inside the ambassador's office) passed through the thin wood case, striking the membrane and causing it to vibrate. The movement of the membrane varied the capacitance "seen" by the antenna, which in turn modulated the radio waves that struck and were re-transmitted by the Thing. A receiver demodulated the signal so that sound picked up by the microphone could be heard, just as an ordinary radio receiver demodulates radio signals and outputs sound.

Theremin's design made the listening device very difficult to detect, because it was very small, had no power supply or active electronic components, and did not radiate any signal unless it was actively being irradiated remotely. These same design features, along with the overall simplicity of the device, made it very reliable and gave it a potentially unlimited operational life.

Technical details

The device consisted of a 9-inch (23 cm) long monopole antenna (quarter-wave for 330 megahertz (MHz) frequencies, but able to also act as half-wave [at 660 MHz] or full-wave [at 1320 MHz], the accounts differ - given the radio technology of the time, the frequency of 330 MHz is most likely) — a straight rod, led through an insulating bushing into a cavity, where it was terminated with a round disc that formed one plate of a capacitor. The cavity was a high-Q round silver-plated copper "can", with the internal diameter of 0.775 in (19.7 mm) and about 11/16 in (17.5 mm) long, with inductance of about 10 nanohenry.[4] Its front side was closed with a very thin (3 mil, or 75 micrometers) and fragile conductive membrane. In the middle of the cavity was a mushroom-shaped flat-faced tuning post, with its top adjustable to make it possible to set the membrane-post distance; the membrane and the post formed a variable capacitor acting as a condenser microphone and providing amplitude modulation (AM), with parasitic frequency modulation (FM) for the re-radiated signal. The post had machined grooves and radial lines into its face, probably to provide channels for air flow to reduce pneumatic damping of the membrane. The antenna was capacitively coupled to the post via its disc-shaped end. The total weight of the unit, including the antenna, was 1.1 ounces (31 grams).

The length of the antenna and the dimensions of the cavity were engineered in order to make the re-broadcast signal a higher harmonic of the illuminating frequency.[5]

The original device was located with the can under the beak of the eagle on the Great Seal presented to W. Averell Harriman (see below); accounts differ on whether holes were drilled into the beak to allow sound waves to reach the membrane. Other sources say the wood behind the beak was undrilled but thin enough to pass the sound, or that the hollowed space acted like a soundboard to concentrate the sound from the room onto the microphone.

The illuminating frequency used by the Soviets is said to be 330 MHz.[6]

Discovery

The existence of the bug was discovered accidentally by a British radio operator at the British embassy who overheard American conversations on an open radio channel as the Soviets were beaming radio waves at the ambassador's office. An American State Department employee was then able to reproduce the results using an untuned wideband receiver with a simple diode detector/demodulator,[7] similar to some field strength meters.

Two additional State Department employees, John W. Ford and Joseph Bezjian, were sent to Moscow in March 1951 to investigate this and other suspected bugs in the British and Canadian embassy buildings. They conducted a technical surveillance counter-measures "sweep" of the Ambassador's office, using a signal generator and a receiver in a setup that generates audio feedback ("howl") if the sound from the room is transmitted on a given frequency. During this sweep, Bezjian found the device in the Great Seal carving.[7]{{rp|2}}

The Federal Bureau of Investigation set about to analyze the device, and hired people from the British Marconi Company to help with the analysis. Marconi technician Peter Wright, a British scientist and later MI5 counterintelligence officer, ran the investigation.[7] He was able to get The Thing working reliably with an illuminating frequency of 800 MHz. The generator which had discovered the device was tuned to 1800 MHz.

The membrane of the Thing was extremely thin, and was damaged during handling by the Americans; Wright had to replace it.

The simplicity of the device caused some initial confusion during its analysis; the antenna and resonator had several resonant frequencies in addition to its main one, and the modulation was partially both amplitude modulated and frequency modulated. The team also lost some time on an assumption that the distance between the membrane and the tuning post needed to be increased to increase resonance.

Aftermath

Wright's examination led to development of a similar British system codenamed SATYR, used throughout the 1950s by the British, Americans, Canadians and Australians.

There were later models of the device, some with more complex internal structure (the center post under the membrane attached to a helix, probably to increase Q). Maximizing the Q-factor was one of the engineering priorities, as this allowed higher selectivity to the illuminating signal frequency, and therefore higher operating distance and also higher acoustic sensitivity.[7]

The CIA ran a secret research program at the Dutch Radar Laboratory (NRP) in Noordwijk (Netherlands) from 1954 to approximately 1967 to create its own covert listening devices based on a dipole antenna with a detector diode and a small microphone amplifier. The devices were developed under the Easy Chair research contract[8] and were known as Easy Chair Mark I (1955), Mark II (1956), Mark III (1958), Mark IV (1961) and Mark V (1962).[9] Although initially they could not get the resonant cavity microphone to work reliably, several products involving Passive Elements (PEs) were developed for the CIA as a result of the research. In 1965, the NRP finally got a reliably working pulsed cavity resonator, but by that time the CIA was no longer interested in passive devices, largely because of the high levels of RF energy involved.[10]

In May 1960, The Thing was mentioned on the fourth day of meetings in the United Nations Security Council, convened by the Soviet Union over the 1960 U-2 incident where a U.S. spy plane had entered their territory and been shot down. The U.S. ambassador Henry Cabot Lodge Jr. showed off the bugging device in the Great Seal to illustrate that spying incidents between the two nations were mutual and to allege that Nikita Khrushchev had magnified this particular incident as a pretext to abort the 1960 Paris Summit.[11][12]

See also

  • Nonlinear junction detector
  • TEMPEST
  • Surveillance
  • Laser microphone
  • Trojan Horse

Notes

1. ^{{cite book |author= |title=Hacking Exposed Linux: Linux Security Secrets & Solutions |publisher=McGraw-Hill Osborne Media |edition=third |year=2008 |page=298 |isbn=978-0-07-226257-5}}
2. ^Glinsky, Albert, Theremin: Ether Music and Espionage, University of Illinois Press, Urbana, 2000
3. ^George F. Kennan, Memoirs, 1950–1963, Volume II (Little, Brown & Co., 1972), pp. 155, 156
4. ^{{cite journal| last=Brown(?)| first=Robert. M.| title=Electronic Eavesdroping| journal=Electronics World| year=1967| volume= 77| issue=3-6|page=23| url=https://books.google.com/books?id=NkVJAQAAIAAJ&q=great+seal+bug+frequency+MHz&dq=great+seal+bug+frequency+MHz&hl=en&sa=X&ei=m2ALUefZBKjd4QTfiIGQBA&sqi=2&redir_esc=y| accessdate=24 September 2013| publisher=Ziff-Davis Publishing Company}}
5. ^{{cite web| url=http://eetimes.com/design/audio-design/4015284/Eavesdropping-using-microwaves--addendum | title=Design How-To: Eavesdropping using microwaves – addendum| date=12 November 2005 | journal=EE Times (eetimes.com) |publisher=United Business Media| accessdate=24 September 2013}}
6. ^{{cite journal| last=Pursglove| first=S. David| title=Great Seal Bug| journal=Electronic Design| year=1966 |volume= 14 |issue= 14–17|page=35| url=https://books.google.com/books?id=E9gEAQAAIAAJ&q=great+seal+bug+frequency&dq=great+seal+bug+frequency&hl=en&sa=X&ei=QEsLUeiaDsnm4QSqiYHgCg&redir_esc=y| accessdate=24 September 2013| publisher=Hayden Publishing Company}}
7. ^{{Cite web|url = http://www.counterespionage.com/the-great-seal-bug-part-1.html|title = THE GREAT SEAL BUG STORY|date = |accessdate = January 10, 2016|website = CounterEspionage|publisher = counterespionage.com|last = Murray|first = Kevin}}
8. ^{{Cite web|url=http://www.cryptomuseum.com/covert/bugs/ec/index.htm|title=Easy Chair|last=|first=|date=2 July 2017|website=Crypto Museum|archive-url=|archive-date=|dead-url=|access-date=}}
9. ^{{Cite web|url=http://www.cryptomuseum.com/covert/bugs/ec/index.htm|title=Easy Chair covert listening devices|last=|first=|date=30 March 2017|website=Crypto Museum|archive-url=|archive-date=|dead-url=|access-date=}}
10. ^{{Cite web|url=http://www.cryptomuseum.com/covert/bugs/ec/cavity/index.htm|title=Pulsed Cavity Resonator|last=|first=|date=30 March 2017|website=Crypto Museum|archive-url=|archive-date=|dead-url=|access-date=}}
11. ^{{UN document |docid=S/PV.860 |type=Verbatim Report |body=Security Council |meeting=860 |highlight=rect_155,148_530,482/rect_453,130_530,148 |page=15 |accessdate=2008-08-29|date=26 May 1960}}
12. ^{{cite web|url=https://decorrespondent.nl/3380/Operatie-Leunstoel-hoe-een-klein-Nederlands-bedrijf-de-CIA-hielp-om-de-Russen-af-te-luisteren/103955280-e8db49d3|language=nl|author=Maurits Martijn|title=Operatie Leunstoel: hoe een klein Nederlands bedrijf de CIA hielp om de Russen af te luisteren|publisher=De Correspondent|date=24 September 2015}}

References

  • {{cite book

| last = Wright
| first = Peter
| authorlink = Peter Wright (MI5 officer)
| title = Spycatcher: The Candid Autobiography of a Senior Intelligence Officer
| year = 1987
| publisher = Viking
| location = New York
| isbn = 0-670-82055-5
  • {{cite book

| last = Kennan
| first = George
| authorlink = George F. Kennan
| title = Memoirs, 1925–1950
| year = 1967
| publisher = Little, Brown
  • {{cite book

| last = Kennan
| first = George
| authorlink = George F. Kennan
| title = Memoirs: 1950–1963
| year = 1983
| publisher = Pantheon
| isbn = 978-0-394-71626-8

External links

{{Commonscat|Great Seal bug}}
  • Passive Resonant Cavity & "Spycatcher" Technical Surveillance Devices
  • The Great Seal Bug Story, Spybusters, Kevin D. Murray
  • [https://sm.asisonline.org/Pages/a-trojan-seal-006971.aspx A Trojan Seal] – Security Management, Ken Stanley, April 2010
  • [https://www.state.gov/documents/organization/176589.pdf History of the Bureau of Diplomatic Security of the United States Department of State], October 2011, pp. 136–137
  • How the Soviet Union spied on the US embassy for 7 years, Hackaday, Adam Fabio, December 2015
  • The Great Seal Bug on the Crypto Museum Website, 18 September 2015
{{espionage}}{{DEFAULTSORT:Thing (Listening Device)}}Lev Sergeevič Termen#Leon Theremin e lo spionaggio

10 : Covert listening devices|Espionage|Espionage devices|Espionage techniques|KGB|Inventions by Léon Theremin|Soviet Union–United States relations|Soviet Union intelligence operations|Surveillance|Diplomatic gifts

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/13 22:35:09