Microphone blocker

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Microphone blocker

A microphone blocker is a device that prohibits audio hacking, in the form of a hardware accessory for a smartphone, laptop, PDA, or similar device, The blocker is intended to disable the internal microphone; there is also Android software with the same name that disables microphone. A microphone blocker is also known as a "mic blocker" or "mic lock". Physically, a microphone blocker is a dummy plug that is inserted into the external microphone socket of a mobile device.[1] The blocker disables the signal from the internal microphone by tricking the device into thinking that a external microphone is already plugged in.[1] Successful operation of a microphone blocker depends on the internal scheme of the mobile device, which may fully block the microphone without possibility of recovering data, or just disregard the signal from internal microphone with the possibility of recording if needed.


A microphone blocker is a cheap, simple accessory that provides protection against eavesdropping, cellphone surveillance, and other types of audio hacking. There are a variety of spyware programs that can turn on a mobile device's microphone remotely, and the vast majority of devices do not have internal hardware protection to prevent eavesdropping. Most anti-spying software does not guarantee that the microphone will be fully blocked or disabled, while spyware and malware are constantly changing and improving.

Leaked documents published by WikiLeaks, codenamed Vault 7 and dated from 2013 to 2016, described the capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare, including the ability to compromise the operating systems of most smartphones, turning them into permanent listening devices.[2][3][4] Millions of smartphones could also be vulnerable to hacking via accelerometers.[5][6]

A new data access technique discovered by a research team at Israel's Ben-Gurion University Cybersecurity Research Center allows data to be extracted using a computer's speakers and headphones.[7] Forbes published a report stating that researches found way to see information being displayed, by using microphone, with 96.5% accuracy.[8]

See also[edit]


  1. ^ a b Greenberg, Andy (9 December 2017). "How to Disable the Mics on Your MacBook and iPhone" – via www.wired.com.
  2. ^ "the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks), WIRED".
  3. ^ "Vault 7: Wikileaks reveals details of CIA's hacks of Android, iPhone Windows, Linux, MacOS, and even Samsung TVs - Computing". computing.co.uk. 7 March 2017.
  4. ^ "WikiLeaks just revealed the horrifying secret inside your phone and TV". The Independent. 7 March 2017.
  5. ^ Dockrill, Peter (2017-03-18). "Millions of Smartphones Could Be Vulnerable to Hacking Via Sound Waves". ScienceAlert. Retrieved 2019-03-13.
  6. ^ Nordrum, Amy (2017-03-17). "Smartphone Accelerometers Can Be Fooled by Sound Waves". IEEE Spectrum: Technology, Engineering, and Science News. Retrieved 2019-03-13.
  7. ^ Sputnik (2018-03-14). "New Hacking Technique Can Steal Info Through PC Speakers and Headphones". sputniknews.com. Retrieved 2019-03-13.
  8. ^ Mathews, Lee (2018-08-31). "Now Hackers Can Spy On You By Listening To Your Screen". Forbes. Retrieved 2019-03-13.

External links[edit]