{"guid":"bf924a39-2860-4e27-8741-b8fa0c010363","title":"Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection","subtitle":null,"slug":"34c3-8735-spy_vs_spy_a_modern_study_of_microphone_bugs_operation_and_detection","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8735.html","description":"In 2015, artist Ai Weiwei was bugged in his home, presumably by government actors. This situation raised our awareness on the lack of research in our community about operating and detecting spying microphones. Our biggest concern was that most of the knowledge came from fictional movies. Therefore, we performed a deep study on the state-of-the-art of microphone bugs, their characteristics, features and pitfalls. It included real life experiments trying to bug ourselves and trying to detect the hidden mics. Given the lack of open detection tools, we developed a free software SDR-based program, called Salamandra, to detect and locate hidden microphones in a room. After more than 120 experiments we concluded that placing mics correctly and listening is not an easy task, but it has a huge payoff when it works. Also, most mics can be detected easily with the correct tools (with some exceptions on GSM mics). In our experiments the average time to locate the mics in a room was 15 minutes. Locating mics is the novel feature of Salamandra, which is released to the public with this work. We hope that our study raises awareness on the possibility of being bugged by a powerful actor and the countermeasure tools available for our protection.","original_language":"eng","persons":["Veronica Valeros","Sebastian Garcia"],"tags":["34c3","8735","Ethics, Society \u0026 Politics"],"view_count":6115,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-05T22:30:05.132+02:00","length":3750,"duration":3750,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8735-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8735-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/bf924a39-2860-4e27-8741-b8fa0c010363-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/bf924a39-2860-4e27-8741-b8fa0c010363-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8735-spy_vs_spy_a_modern_study_of_microphone_bugs_operation_and_detection","url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":181},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":119},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":197},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":154},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":135},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":226},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":134},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":171},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":202},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":128},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":222},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":148},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":182},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":150},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":127},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":145},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":163},{"event_id":4825,"event_guid":"a39634b4-d220-4c84-bf5a-e52c375827c5","weight":19},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":383},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":75},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":128},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":278},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":161},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":178},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":125},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":221},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":141},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":144},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":140},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":134},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":162}],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"DRAFT_34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.en_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2022-01-26T19:06:30.021+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/DRAFT_34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.en_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/57412","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":590,"length":3750,"mime_type":"video/mp4","language":"eng","filename":"34c3-8735-eng-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-28T18:01:24.814+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-hd/34c3-8735-eng-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.mp4","url":"https://api.media.ccc.de/public/recordings/21101","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":592,"length":3750,"mime_type":"video/mp4","language":"spa","filename":"34c3-8735-spa-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-28T18:01:48.056+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-hd/34c3-8735-spa-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.mp4","url":"https://api.media.ccc.de/public/recordings/21102","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":592,"length":3750,"mime_type":"video/mp4","language":"deu","filename":"34c3-8735-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-28T18:02:14.852+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-hd/34c3-8735-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.mp4","url":"https://api.media.ccc.de/public/recordings/21103","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":933,"length":3750,"mime_type":"video/mp4","language":"eng-spa-deu","filename":"34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-28T18:02:48.715+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-hd/34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_hd.mp4","url":"https://api.media.ccc.de/public/recordings/21104","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":402,"length":3750,"mime_type":"video/mp4","language":"eng-spa-deu","filename":"34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_hd-slides.mp4","state":"new","folder":"slides-h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-28T20:10:29.774+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/slides-h264-hd/34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_hd-slides.mp4","url":"https://api.media.ccc.de/public/recordings/21124","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":321,"length":3750,"mime_type":"video/mp4","language":"eng-spa-deu","filename":"34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-12-28T20:52:57.564+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-sd/34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_sd.mp4","url":"https://api.media.ccc.de/public/recordings/21198","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":38,"length":3735,"mime_type":"audio/opus","language":"eng","filename":"34c3-8735-eng-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-12-28T20:54:06.602+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/opus/34c3-8735-eng-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.opus","url":"https://api.media.ccc.de/public/recordings/21200","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":57,"length":3735,"mime_type":"audio/mpeg","language":"eng","filename":"34c3-8735-eng-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-12-28T20:56:09.151+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/mp3/34c3-8735-eng-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection.mp3","url":"https://api.media.ccc.de/public/recordings/21204","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":820,"length":3750,"mime_type":"video/webm","language":"eng-spa-deu","filename":"34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-12-28T21:04:36.310+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/webm-sd/34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/21218","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":1099,"length":3750,"mime_type":"video/webm","language":"eng-spa-deu","filename":"34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-29T02:57:00.081+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/webm-hd/34c3-8735-eng-spa-deu-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/21402","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":81,"length":3750,"mime_type":"video/mp4","language":"eng","filename":"34c3-8735-eng-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_sd-slides.mp4","state":"new","folder":"slides-h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-01-02T15:43:26.119+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/slides-h264-sd/34c3-8735-eng-Spy_vs_Spy_A_Modern_Study_Of_Microphone_Bugs_Operation_And_Detection_sd-slides.mp4","url":"https://api.media.ccc.de/public/recordings/22303","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":7,"length":null,"mime_type":"application/pdf","language":"eng","filename":"34c3-8735-spy_vs_spy_a_modern_study_of_microphone_bugs_operation_and_detection.pdf","state":"new","folder":"slides-pdf","high_quality":true,"width":null,"height":null,"updated_at":"2018-01-08T18:56:21.559+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/slides-pdf/34c3-8735-spy_vs_spy_a_modern_study_of_microphone_bugs_operation_and_detection.pdf","url":"https://api.media.ccc.de/public/recordings/22458","event_url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_url":"https://api.media.ccc.de/public/conferences/34c3"}]}