A BBC report from 2004 reported that intelligence organizations routinely utilize the remote-activiation technique. "A mobile sitting about the desk of a politician or businessman can act as a powerful, undetectable bug," the article explained, "enabling them for being activated at a later on date to choose up sounds even though the receiver is dow