A BBC posting from 2004 reported that intelligence businesses routinely use the remote-activiation approach. "A mobile sitting down around the desk of the politician or businessman can act as a powerful, undetectable bug," the write-up explained, "enabling them being activated at a afterwards date to select up sounds even though the receiver is dow