A BBC report from 2004 reported that intelligence organizations routinely utilize the remote-activiation process. "A mobile sitting on the desk of the politician or businessman can work as a powerful, undetectable bug," the short article claimed, "enabling them to generally be activated at a afterwards date to pick up sounds even if the receiver is