A BBC posting from 2004 reported that intelligence organizations routinely make use of the remote-activiation strategy. "A mobile sitting down about the desk of the politician or businessman can work as a powerful, undetectable bug," the article stated, "enabling them to become activated at a afterwards date to pick up sounds regardless if the rece