The Thing (listening device)

Replica of the Great Seal which contained a Soviet bugging device, on display at the NSA's National Cryptologic Museum.

The Thing, also known as the Great Seal bug, was one of the first covert listening devices (or "bugs") to use passive techniques to transmit an audio signal. It was concealed inside a gift given by the Soviets to the US Ambassador to Moscow on August 4, 1945. Because it was passive, being energized and activated by electromagnetic energy from an outside source, it is considered a predecessor of RFID technology.[1]

Creation

The Thing was designed by Soviet Russian inventor Léon Theremin,[2] whose best-known invention is the electronic musical instrument the theremin.

The principle used by The Thing, of a resonant cavity microphone, had been patented by Winfield R. Koch of the Radio Corporation of America (RCA) in 1941. In US patent 2,238,117 he describes the principle of a sound-modulated resonant cavity. High-frequency energy is inductively coupled to the cavity. The resonant frequency is varied by the change in capacitance resulting from the displacement of the acoustic diaphragm.[3]

Installation and use

The device was used by the Soviet Union to spy on the United States. It was embedded in a carved wooden plaque of the Great Seal of the United States. On August 4, 1945, a delegation from the Young Pioneer organization of the Soviet Union presented the bugged carving to U.S. Ambassador W. Averell Harriman, as a "gesture of friendship" to the USSR's World War II ally. It hung in the ambassador's Moscow residential study for seven years, until it was exposed in 1952 during the tenure of Ambassador George F. Kennan.[4]

Operating principles

The Thing consisted of a tiny capacitive membrane connected to a small quarter-wavelength antenna; it had no power supply or active electronic components. The device, a passive cavity resonator, became active only when a radio signal of the correct frequency was sent to the device from an external transmitter. This is currently referred in NSA parlance as 'illuminating' a passive device. Sound waves caused the membrane to vibrate, which varied the capacitance "seen" by the antenna, which in turn modulated the radio waves that struck and were re-transmitted by the Thing. A receiver demodulated the signal so that sound picked up by the microphone could be heard, just as an ordinary radio receiver demodulates radio signals and outputs sound.

Theremin's design made the listening device very difficult to detect, because it was very small, had no power supply or active electronic components, and did not radiate any signal unless it was actively being irradiated remotely. These same design features, along with the overall simplicity of the device, made it very reliable and gave it a potentially unlimited operational life.

Technical details

The device consisted of a 9-inch (23 cm) long monopole antenna (quarter-wave for 330 Megahertz(MHz) frequencies, but able to also act as half-wave or full-wave, the accounts differ)—a straight rod, led through an insulating bushing into a cavity, where it was terminated with a round disc that formed one plate of a capacitor. The cavity was a high-Q round silver-plated copper "can", with the internal diameter of 0.775 in (19.7 mm) and about 11/16 in (17.5 mm) long, with inductance of about 10 nanohenry.[5] Its front side was closed with a very thin (3 mil, or 75 micrometers) and fragile conductive membrane. In the middle of the cavity was a mushroom-shaped flat-faced tuning post, with its top adjustable to make it possible to set the membrane-post distance; the membrane and the post formed a variable capacitor acting as a condenser microphone and providing amplitude modulation (AM), with parasitic frequency modulation (FM) for the re-radiated signal. The post had machined grooves and radial lines into its face, probably to provide channels for air flow to reduce pneumatic damping of the membrane. The antenna was capacitively coupled to the post via its disc-shaped end. The total weight of the unit, including the antenna, was 1.1 ounce (31 grams).

The length of the antenna and the dimensions of the cavity were engineered in order to make the re-broadcast signal a higher harmonic of the illuminating frequency. (Note that the transmitting frequency is higher than the illuminating one.)[6]

The original device was located with the can under the beak of the eagle on the Great Seal presented to W. Averell Harriman (see below); accounts differ on whether holes were drilled into the beak to allow sound waves to reach the membrane. Other sources say the wood behind the beak was undrilled but thin enough to pass the sound, or that the hollowed space acted like a soundboard to concentrate the sound from the room onto the microphone.

The illuminating frequency used by the Soviets is said to be 330 MHz.[7]

Discovery

The existence of the bug was discovered accidentally by a British radio operator at the British embassy who overheard American conversations on an open radio channel as the Soviets were beaming radio waves at the ambassador's office. An American State Department employee was then able to reproduce the results using an untuned wideband receiver with a simple diode detector/demodulator,[8] similar to some field strength meters.

Two additional State Department employees, John W. Ford and Joseph Bezjian, were sent to Moscow in March 1951 to investigate this and other suspected bugs in the British and Canadian embassy buildings. They conducted a technical surveillance counter-measures "sweep" of the Ambassador's office, using a signal generator and a receiver in a setup that generates audio feedback ("howl") if the sound from the room is transmitted on a given frequency. During this sweep, Bezjian found the device in the Great Seal carving.[8]:2

The Central Intelligence Agency set about to analyze the device, and hired people from the British Marconi Company to help with the analysis. Marconi technician Peter Wright, a British scientist and later MI5 counterintelligence officer, ran the investigation.[8] He was able to get The Thing working reliably with an illuminating frequency of 800 MHz. (The generator which had discovered the device was tuned to 1800 MHz.)

The membrane of the Thing was extremely thin, and was damaged during handling by the Americans; Wright had to replace it.

The simplicity of the device caused some initial confusion during its analysis; the antenna and resonator had several resonant frequencies in addition to its main one, and the modulation was partially both amplitude modulated and frequency modulated. The team also lost some time on an assumption that the distance between the membrane and the tuning post needed to be increased to increase resonance.

Aftermath

Wright's examination led to development of a similar British system codenamed SATYR, used throughout the 1950s by the British, Americans, Canadians and Australians.

There were later models of the device, some with more complex internal structure (the center post under the membrane attached to a helix, probably to increase Q), and some American models with dipole antennas. Maximizing the Q-factor was one of the engineering priorities, as this allowed higher selectivity to the illuminating signal frequency, and therefore higher operating distance and also higher acoustic sensitivity.[8]

In 1960, The Thing was mentioned on the fourth day of meetings in the United Nations Security Council, convened by the Soviet Union over the 1960 U-2 incident where a U.S. spy plane had entered their territory and been shot down. The U.S. ambassador showed off the bugging device in the Great Seal to illustrate that spying incidents between the two nations were mutual and to allege that Nikita Khrushchev had magnified this particular incident out of all proportion as a pretext to abort the 1960 Paris Summit.[9]

See also

Notes

  1. Hacking Exposed Linux: Linux Security Secrets & Solutions (third ed.). McGraw-Hill Osborne Media. 2008. p. 298. ISBN 978-0-07-226257-5.
  2. Glinsky, Albert, Theremin: Ether Music and Espionage, University of Illinois Press, Urbana, 2000
  3. US Patent 2238117, Koch, Winfield R, "Ultra high frequency modulator", published 1941-04-15, assigned to Radio Corporation of America(RCA). Retrieved 24 September 2013. "US 2238117 A" Google Patent Search
  4. George F. Kennan, Memoirs, 1950–1963, Volume II (Little, Brown & Co., 1972), pp. 155, 156
  5. Brown(?), Robert. M. (1967). "Electronic Eavesdroping". Electronics World (Ziff-Davis Publishing Company) 77 (3-6): 23. Retrieved 24 September 2013.
  6. "Design How-To: Eavesdropping using microwaves – addendum". EE Times (eetimes.com). United Business Media. 12 November 2005. Retrieved 24 September 2013.
  7. Pursglove, S. David (1966). "Great Seal Bug". Electronic Design (Hayden Publishing Company) 14 (14–17): 35. Retrieved 24 September 2013.
  8. 1 2 3 4 Murray, Kevin. "THE GREAT SEAL BUG STORY". CounterEspionage. counterespionage.com. Retrieved January 10, 2016.
  9. United Nations Security Council Verbatim Report 860. S/PV/860 page 15. 26 May 1960. Retrieved 2008-08-29.

References

External links

Wikimedia Commons has media related to Great Seal bug.
This article is issued from Wikipedia - version of the Wednesday, April 06, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.