The Thing (listening device)
The Thing, also known as the Great Seal bug, was one of the first covert listening devices (or "bugs") to use passive techniques to transmit an audio signal. It was concealed inside a gift given by the Soviet Union to W. Averell Harriman, the United States Ambassador to the Soviet Union, on August 4, 1945. Because it was passive, needing electromagnetic energy from an outside source to become energized and activate, it is considered a predecessor of Radio-Frequency Identification (RFID) technology.
The principal operational component of The Thing, a resonant cavity microphone, had been patented by Winfield R. Koch of the Radio Corporation of America (RCA) in 1941. In US patent 2,238,117 he describes the principle of a sound-modulated resonant cavity. High-frequency energy is inductively coupled to the cavity. The resonant frequency is varied by the change in capacitance resulting from the displacement of the acoustic diaphragm.
Installation and use
The device, embedded in a carved wooden plaque of the Great Seal of the United States, was used by the Soviets to spy on the US. On August 4, 1945, several weeks before the end of World War II, a delegation from the Young Pioneer organization of the Soviet Union presented the bugged carving to Ambassador Harriman, as a "gesture of friendship" to the USSR's war ally. It hung in the ambassador's Moscow residential study for seven years, until it was exposed in 1952 during the tenure of Ambassador George F. Kennan.
The Thing consisted of a tiny capacitive membrane connected to a small quarter-wavelength antenna; it had no power supply or active electronic components. The device, a passive cavity resonator, became active only when a radio signal of the correct frequency was sent to the device from an external transmitter. This is currently referred in NSA parlance as "illuminating" a passive device. Sound waves (from voices inside the ambassador's office) passed through the thin wood case, striking the membrane and causing it to vibrate. The movement of the membrane varied the capacitance "seen" by the antenna, which in turn modulated the radio waves that struck and were re-transmitted by the Thing. A receiver demodulated the signal so that sound picked up by the microphone could be heard, just as an ordinary radio receiver demodulates radio signals and outputs sound.
Theremin's design made the listening device very difficult to detect, because it was very small, had no power supply or active electronic components, and did not radiate any signal unless it was actively being irradiated remotely. These same design features, along with the overall simplicity of the device, made it very reliable and gave it a potentially unlimited operational life.
The device consisted of a 9-inch (23 cm) long monopole antenna (quarter-wave for 330 megahertz (MHz) frequencies, but able to also act as half-wave or full-wave, the accounts differ) — a straight rod, led through an insulating bushing into a cavity, where it was terminated with a round disc that formed one plate of a capacitor. The cavity was a high-Q round silver-plated copper "can", with the internal diameter of 0.775 in (19.7 mm) and about 11/16 in (17.5 mm) long, with inductance of about 10 nanohenry. Its front side was closed with a very thin (3 mil, or 75 micrometers) and fragile conductive membrane. In the middle of the cavity was a mushroom-shaped flat-faced tuning post, with its top adjustable to make it possible to set the membrane-post distance; the membrane and the post formed a variable capacitor acting as a condenser microphone and providing amplitude modulation (AM), with parasitic frequency modulation (FM) for the re-radiated signal. The post had machined grooves and radial lines into its face, probably to provide channels for air flow to reduce pneumatic damping of the membrane. The antenna was capacitively coupled to the post via its disc-shaped end. The total weight of the unit, including the antenna, was 1.1 ounces (31 grams).
The original device was located with the can under the beak of the eagle on the Great Seal presented to W. Averell Harriman (see below); accounts differ on whether holes were drilled into the beak to allow sound waves to reach the membrane. Other sources say the wood behind the beak was undrilled but thin enough to pass the sound, or that the hollowed space acted like a soundboard to concentrate the sound from the room onto the microphone.
The illuminating frequency used by the Soviets is said to be 330 MHz.
The existence of the bug was discovered accidentally by a British radio operator at the British embassy who overheard American conversations on an open radio channel as the Soviets were beaming radio waves at the ambassador's office. An American State Department employee was then able to reproduce the results using an untuned wideband receiver with a simple diode detector/demodulator, similar to some field strength meters.
Two additional State Department employees, John W. Ford and Joseph Bezjian, were sent to Moscow in March 1951 to investigate this and other suspected bugs in the British and Canadian embassy buildings. They conducted a technical surveillance counter-measures "sweep" of the Ambassador's office, using a signal generator and a receiver in a setup that generates audio feedback ("howl") if the sound from the room is transmitted on a given frequency. During this sweep, Bezjian found the device in the Great Seal carving.:2
The Federal Bureau of Investigation set about to analyze the device, and hired people from the British Marconi Company to help with the analysis. Marconi technician Peter Wright, a British scientist and later MI5 counterintelligence officer, ran the investigation. He was able to get The Thing working reliably with an illuminating frequency of 800 MHz. The generator which had discovered the device was tuned to 1800 MHz.
The membrane of the Thing was extremely thin, and was damaged during handling by the Americans; Wright had to replace it.
The simplicity of the device caused some initial confusion during its analysis; the antenna and resonator had several resonant frequencies in addition to its main one, and the modulation was partially both amplitude modulated and frequency modulated. The team also lost some time on an assumption that the distance between the membrane and the tuning post needed to be increased to increase resonance.
Wright's examination led to development of a similar British system codenamed SATYR, used throughout the 1950s by the British, Americans, Canadians and Australians.
There were later models of the device, some with more complex internal structure (the center post under the membrane attached to a helix, probably to increase Q). Maximizing the Q-factor was one of the engineering priorities, as this allowed higher selectivity to the illuminating signal frequency, and therefore higher operating distance and also higher acoustic sensitivity.
The CIA ran a secret research program at the Dutch Radar Laboratory (NRP) in Noordwijk (Netherlands) from 1954 to approximately 1967 to create its own covert listening devices based on a dipole antenna with a detector diode (crystal) and a small microphone amplifier. The devices were developed under the Easy Chair research contract and were known as Easy Chair Mark I (1955), Mark II (1956), Mark III (1958), Mark IV (1961) and Mark V (1962). Although initially they could not get the resonant cavity microphone to work reliably, several products involving Passive Elements (PEs) were developed for the CIA as a result of the research. In 1965, the NRP finally got a reliably working pulsed cavity resonator, but by that time the CIA was no longer interested in passive devices, largely because of the high levels of RF energy involved.
In May 1960, The Thing was mentioned on the fourth day of meetings in the United Nations Security Council, convened by the Soviet Union over the 1960 U-2 incident where a U.S. spy plane had entered their territory and been shot down. The U.S. ambassador Henry Cabot Lodge Jr. showed off the bugging device in the Great Seal to illustrate that spying incidents between the two nations were mutual and to allege that Nikita Khrushchev had magnified this particular incident as a pretext to abort the 1960 Paris Summit.
- Hacking Exposed Linux: Linux Security Secrets & Solutions (third ed.). McGraw-Hill Osborne Media. 2008. p. 298. ISBN 978-0-07-226257-5.
- Glinsky, Albert, Theremin: Ether Music and Espionage, University of Illinois Press, Urbana, 2000
- US Patent 2238117, Koch, Winfield R, "Ultra high frequency modulator", published 1941-04-15, assigned to Radio Corporation of America(RCA). Retrieved 24 September 2013. "US 2238117 A" Google Patent Search
- George F. Kennan, Memoirs, 1950–1963, Volume II (Little, Brown & Co., 1972), pp. 155, 156
- Brown(?), Robert. M. (1967). "Electronic Eavesdroping". Electronics World. Ziff-Davis Publishing Company. 77 (3-6): 23. Retrieved 24 September 2013.
- "Design How-To: Eavesdropping using microwaves – addendum". EE Times (eetimes.com). United Business Media. 12 November 2005. Retrieved 24 September 2013.
- Pursglove, S. David (1966). "Great Seal Bug". Electronic Design. Hayden Publishing Company. 14 (14–17): 35. Retrieved 24 September 2013.
- Murray, Kevin. "THE GREAT SEAL BUG STORY". CounterEspionage. counterespionage.com. Retrieved January 10, 2016.
- "Easy Chair". Crypto Museum. 2 July 2017.
- "Easy Chair covert listening devices". Crypto Museum. 30 March 2017.
- "Pulsed Cavity Resonator". Crypto Museum. 30 March 2017.
- United Nations Security Council Verbatim Report 860. S/PV.860 page 15. 26 May 1960. Retrieved 2008-08-29.
- Maurits Martijn (24 September 2015). "Operatie Leunstoel: hoe een klein Nederlands bedrijf de CIA hielp om de Russen af te luisteren" (in Dutch). De Correspondent.
- Wright, Peter (1987). Spycatcher: The Candid Autobiography of a Senior Intelligence Officer. New York: Viking. ISBN 0-670-82055-5.
- Kennan, George (1967). Memoirs, 1925–1950. Little, Brown.
- Kennan, George (1983). Memoirs: 1950–1963. Pantheon. ISBN 978-0-394-71626-8.
|Wikimedia Commons has media related to Great Seal bug.|
- Passive Resonant Cavity & "Spycatcher" Technical Surveillance Devices
- The Great Seal Bug Story, Spybusters, Kevin D. Murray
- A Trojan Seal – Security Management, Ken Stanley, April 2010
- History of the Bureau of Diplomatic Security of the United States Department of State, October 2011, pp. 136–137
- How the Soviet Union spied on the US embassy for 7 years, Hackaday, Adam Fabio, December 2015
- The Great Seal Bug on the Crypto Museum Website, 18 September 2015