<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: NSA spy gadgets: LOUDAUTO</title>
	<atom:link href="http://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 16 Apr 2026 22:29:11 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/comment-page-1/#comment-1458953</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 08 Dec 2015 15:32:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24298#comment-1458953</guid>
		<description><![CDATA[Theremin’s Bug: How the Soviet Union Spied on the US Embassy for 7 Years
http://hackaday.com/2015/12/08/theremins-bug/

The man leaned over his creation, carefully assembling the tiny pieces. This was the hardest part, placing a thin silver plated diaphragm over the internal chamber. The diaphragm had to be strong enough to support itself, yet flexible enough to be affected by the slightest sound. One false move, and the device would be ruined. 

The man in this semi-fictional vignette was Lev Sergeyevich Termen, better known in the western world as Léon Theremin. You know Theremin for the musical instrument which bears his name. In the spy business though, he is known as the creator of one of the most successful clandestine listening devices ever used against the American government.

In 1920, while working on his dielectric measurement device, Theremin noticed that an audio oscillator changed frequency when he moved his hand near the circuit. The Theremin was born. In November of 1920 Léon gave his first public concert with the instrument. He began touring with it in the late 1920’s and in 1928, he brought the Theremin to the United States. He set up a lab in New York and worked with RCA to produce the instrument.

 In 1938, with the Nazi threat growing stronger, Theremin returned to Russia.


Upon arrival in Leningrad, Theremin was imprisoned, suspected of crimes against the state. He found himself working in a laboratory for the state department. This was not an unusual situation. Aircraft designer Andrei Tupolev and missile designer Sergei Korolyov were two of many others who faced a similar fate.
It was during this time as a prisoner that Theremin designed his listening device.

 A group of 10 to 15 year old boys from the Young Pioneer Organization of the Soviet Union arrived at the US embassy carrying a hand carved great seal of the United States of America. 

The seal was given as a gesture of friendship between the US and Soviet Union. Harriman hung the plaque in the study of his residence, Spaso House. 

The device, later known as “The Thing”, would not be discovered until 1952 — roughly seven years later.

The discovery of the great seal listening device is an interesting one. British broadcasters reported hearing American voices on the their radios in the vicinity of the American embassy. No Americans were transmitting though, which meant there had to be a bug. Numerous sweeps were performed, all of which turned up nothing. 

Powering up his equipment, Bezjian began a sweep of the building. With his receiver tuned to 1.8GHz, he heard the bug’s audio, and quickly isolated the source in the great seal. 

Close inspection of the carving found it had been hollowed out, and a strange device placed behind the eagle’s beak. No batteries or wires were evident, and the device was not powered through the nail which had been hanging the seal. 

The great seal bug quickly became known as “The Thing”. It was a passive resonant cavity device, containing no batteries or other power source. It consisted of an antenna and a small cylinder. 

Passive resonant cavities had been explored before, both in the US and abroad, but this is the first time we know of that was used for clandestine purposes. In his book Spycatcher, British operative Peter Wright claims that the US came to him for help determining how the device worked.

Regardless of who figured out the device, the method of operation is devilishly simple. The Soviets would sit outside the embassy, either in another building or in a van. From this remote location they would aim a radio transmitter at the great seal. The bug inside would receive this signal and transmit voices in the room on a second, higher frequency. It did all of this with no standard internal components. No resistors, no tubes, no traditional capacitors, or the like. There were capacitive properties to the mechanism. For instance, a capacitor is formed between the diaphragm and the tuning peg of the device.

While bugs of this type have fallen out of favor, the idea of “illuminating” a device with an external transmitter lives on. Check out [Elliot’s] description of the RageMaster bug from the ANT catalog here. Resonant cavities have found common use as well. Every microwave oven or radar system with a magnetron uses one.

http://hackaday.com/2015/10/19/tempest-a-tin-foil-hat-for-your-electronics-and-their-secrets/]]></description>
		<content:encoded><![CDATA[<p>Theremin’s Bug: How the Soviet Union Spied on the US Embassy for 7 Years<br />
<a href="http://hackaday.com/2015/12/08/theremins-bug/" rel="nofollow">http://hackaday.com/2015/12/08/theremins-bug/</a></p>
<p>The man leaned over his creation, carefully assembling the tiny pieces. This was the hardest part, placing a thin silver plated diaphragm over the internal chamber. The diaphragm had to be strong enough to support itself, yet flexible enough to be affected by the slightest sound. One false move, and the device would be ruined. </p>
<p>The man in this semi-fictional vignette was Lev Sergeyevich Termen, better known in the western world as Léon Theremin. You know Theremin for the musical instrument which bears his name. In the spy business though, he is known as the creator of one of the most successful clandestine listening devices ever used against the American government.</p>
<p>In 1920, while working on his dielectric measurement device, Theremin noticed that an audio oscillator changed frequency when he moved his hand near the circuit. The Theremin was born. In November of 1920 Léon gave his first public concert with the instrument. He began touring with it in the late 1920’s and in 1928, he brought the Theremin to the United States. He set up a lab in New York and worked with RCA to produce the instrument.</p>
<p> In 1938, with the Nazi threat growing stronger, Theremin returned to Russia.</p>
<p>Upon arrival in Leningrad, Theremin was imprisoned, suspected of crimes against the state. He found himself working in a laboratory for the state department. This was not an unusual situation. Aircraft designer Andrei Tupolev and missile designer Sergei Korolyov were two of many others who faced a similar fate.<br />
It was during this time as a prisoner that Theremin designed his listening device.</p>
<p> A group of 10 to 15 year old boys from the Young Pioneer Organization of the Soviet Union arrived at the US embassy carrying a hand carved great seal of the United States of America. </p>
<p>The seal was given as a gesture of friendship between the US and Soviet Union. Harriman hung the plaque in the study of his residence, Spaso House. </p>
<p>The device, later known as “The Thing”, would not be discovered until 1952 — roughly seven years later.</p>
<p>The discovery of the great seal listening device is an interesting one. British broadcasters reported hearing American voices on the their radios in the vicinity of the American embassy. No Americans were transmitting though, which meant there had to be a bug. Numerous sweeps were performed, all of which turned up nothing. </p>
<p>Powering up his equipment, Bezjian began a sweep of the building. With his receiver tuned to 1.8GHz, he heard the bug’s audio, and quickly isolated the source in the great seal. </p>
<p>Close inspection of the carving found it had been hollowed out, and a strange device placed behind the eagle’s beak. No batteries or wires were evident, and the device was not powered through the nail which had been hanging the seal. </p>
<p>The great seal bug quickly became known as “The Thing”. It was a passive resonant cavity device, containing no batteries or other power source. It consisted of an antenna and a small cylinder. </p>
<p>Passive resonant cavities had been explored before, both in the US and abroad, but this is the first time we know of that was used for clandestine purposes. In his book Spycatcher, British operative Peter Wright claims that the US came to him for help determining how the device worked.</p>
<p>Regardless of who figured out the device, the method of operation is devilishly simple. The Soviets would sit outside the embassy, either in another building or in a van. From this remote location they would aim a radio transmitter at the great seal. The bug inside would receive this signal and transmit voices in the room on a second, higher frequency. It did all of this with no standard internal components. No resistors, no tubes, no traditional capacitors, or the like. There were capacitive properties to the mechanism. For instance, a capacitor is formed between the diaphragm and the tuning peg of the device.</p>
<p>While bugs of this type have fallen out of favor, the idea of “illuminating” a device with an external transmitter lives on. Check out [Elliot’s] description of the RageMaster bug from the ANT catalog here. Resonant cavities have found common use as well. Every microwave oven or radar system with a magnetron uses one.</p>
<p><a href="http://hackaday.com/2015/10/19/tempest-a-tin-foil-hat-for-your-electronics-and-their-secrets/" rel="nofollow">http://hackaday.com/2015/10/19/tempest-a-tin-foil-hat-for-your-electronics-and-their-secrets/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: radio earpiece</title>
		<link>https://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/comment-page-1/#comment-1457671</link>
		<dc:creator><![CDATA[radio earpiece]]></dc:creator>
		<pubDate>Fri, 04 Dec 2015 11:55:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24298#comment-1457671</guid>
		<description><![CDATA[bookmarked, cool website!]]></description>
		<content:encoded><![CDATA[<p>bookmarked, cool website!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/comment-page-1/#comment-1394950</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 22 May 2015 14:16:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24298#comment-1394950</guid>
		<description><![CDATA[The NSA Playset: A Year of Toys and Tools
https://www.blackhat.com/us-15/briefings.html#the-nsa-playset-a-year-of-toys-and-tools

Inspired by the contents of the leaked NSA ANT catalog, the NSA Playset project has produced an array of gadgets with capabilities similar to those employed by the spooks.

http://www.nsaplayset.org/]]></description>
		<content:encoded><![CDATA[<p>The NSA Playset: A Year of Toys and Tools<br />
<a href="https://www.blackhat.com/us-15/briefings.html#the-nsa-playset-a-year-of-toys-and-tools" rel="nofollow">https://www.blackhat.com/us-15/briefings.html#the-nsa-playset-a-year-of-toys-and-tools</a></p>
<p>Inspired by the contents of the leaked NSA ANT catalog, the NSA Playset project has produced an array of gadgets with capabilities similar to those employed by the spooks.</p>
<p><a href="http://www.nsaplayset.org/" rel="nofollow">http://www.nsaplayset.org/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: microwave device technology westford ma</title>
		<link>https://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/comment-page-1/#comment-1343014</link>
		<dc:creator><![CDATA[microwave device technology westford ma]]></dc:creator>
		<pubDate>Sun, 15 Feb 2015 01:05:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24298#comment-1343014</guid>
		<description><![CDATA[(+30dBm Survival) ±10 degrees, ±0.6 typ.]]></description>
		<content:encoded><![CDATA[<p>(+30dBm Survival) ±10 degrees, ±0.6 typ.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/comment-page-1/#comment-804564</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 Aug 2014 01:14:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24298#comment-804564</guid>
		<description><![CDATA[Building the NSA’s Tools
http://hackaday.com/2014/08/01/building-the-nsas-tools/

Back in 2013, the NSA ANT Catalog was leaked. This document contained a list of devices that are available to the NSA to carry out surveillance.

[Michael Ossmann] took a look at this, and realized that a lot of their tools were similar to devices the open source hardware community had built. Based on that, he gave a talk on The NSA Playset at Toorcamp 2014. This covered how one might implement these devices using open hardware.]]></description>
		<content:encoded><![CDATA[<p>Building the NSA’s Tools<br />
<a href="http://hackaday.com/2014/08/01/building-the-nsas-tools/" rel="nofollow">http://hackaday.com/2014/08/01/building-the-nsas-tools/</a></p>
<p>Back in 2013, the NSA ANT Catalog was leaked. This document contained a list of devices that are available to the NSA to carry out surveillance.</p>
<p>[Michael Ossmann] took a look at this, and realized that a lot of their tools were similar to devices the open source hardware community had built. Based on that, he gave a talk on The NSA Playset at Toorcamp 2014. This covered how one might implement these devices using open hardware.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/comment-page-1/#comment-687145</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 14 Jul 2014 17:07:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24298#comment-687145</guid>
		<description><![CDATA[Hackers use Snowden leaks to reverse-engineer NSA surveillance devices
http://www.engadget.com/2014/06/20/nsa-bugs-reverse-engineered/]]></description>
		<content:encoded><![CDATA[<p>Hackers use Snowden leaks to reverse-engineer NSA surveillance devices<br />
<a href="http://www.engadget.com/2014/06/20/nsa-bugs-reverse-engineered/" rel="nofollow">http://www.engadget.com/2014/06/20/nsa-bugs-reverse-engineered/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/comment-page-1/#comment-677195</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 11 Jul 2014 15:01:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24298#comment-677195</guid>
		<description><![CDATA[GBPPR Vision
http://www.qsl.net/n/n9zia//vision/

This is a small video series hosted on YouTube aimed at experimenters and hackers covering topics related to amateur radio, homebrew electronics, test equipment, and other similar interests.]]></description>
		<content:encoded><![CDATA[<p>GBPPR Vision<br />
<a href="http://www.qsl.net/n/n9zia//vision/" rel="nofollow">http://www.qsl.net/n/n9zia//vision/</a></p>
<p>This is a small video series hosted on YouTube aimed at experimenters and hackers covering topics related to amateur radio, homebrew electronics, test equipment, and other similar interests.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/comment-page-1/#comment-677189</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 11 Jul 2014 15:00:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24298#comment-677189</guid>
		<description><![CDATA[GBPPR LOUDAUTO Experiments
http://blockyourid.com/~gbpprorg/mil/photoanglo/loudauto/

LOUDAUTO is an audio-based RF retro-reflector.  It provides room audio from a targeted space using radar and basic demodulation and audio post-processing.

LOUDAUTO&#039;s current design maximizes the gain of the Knowles EK/EY-series microphone.  This makes it extremely useful for picking up room audio.  It can pick up speech at a standard, office volume from over 20 feet away.  Note that concealments may reduce this distance.

It uses very little power, approximately 15 µA at 3.0 VDC.  So little, in fact, that battery self-discharge (internal resistance) is more of an issue for serviceable lifetime than the power draw from this unit.  The simplicity of the design allows the form factor to be tailored for specific operational requirements.  All components are Commercial Off-the-Shelf (COTS) and so are non-attributable to NSA.

Room audio is picked up by the microphone and converted into an analog electrical signal.  This signal is used to Pulse-Position Modulate (PPM) a low-frequency square wave carrier signal running at around 100 kHz.  This square wave is used to bias a microwave FET (Field Effect Transistor) on and off.  When the unit is illuminated with an unmodulated Continuous Wave (CW) signal from a remote radar unit (CTX4000/PHOTOANGLO), the illuminating signal is Amplitude Modulated (AM) with the PPM square wave.]]></description>
		<content:encoded><![CDATA[<p>GBPPR LOUDAUTO Experiments<br />
<a href="http://blockyourid.com/~gbpprorg/mil/photoanglo/loudauto/" rel="nofollow">http://blockyourid.com/~gbpprorg/mil/photoanglo/loudauto/</a></p>
<p>LOUDAUTO is an audio-based RF retro-reflector.  It provides room audio from a targeted space using radar and basic demodulation and audio post-processing.</p>
<p>LOUDAUTO&#8217;s current design maximizes the gain of the Knowles EK/EY-series microphone.  This makes it extremely useful for picking up room audio.  It can pick up speech at a standard, office volume from over 20 feet away.  Note that concealments may reduce this distance.</p>
<p>It uses very little power, approximately 15 µA at 3.0 VDC.  So little, in fact, that battery self-discharge (internal resistance) is more of an issue for serviceable lifetime than the power draw from this unit.  The simplicity of the design allows the form factor to be tailored for specific operational requirements.  All components are Commercial Off-the-Shelf (COTS) and so are non-attributable to NSA.</p>
<p>Room audio is picked up by the microphone and converted into an analog electrical signal.  This signal is used to Pulse-Position Modulate (PPM) a low-frequency square wave carrier signal running at around 100 kHz.  This square wave is used to bias a microwave FET (Field Effect Transistor) on and off.  When the unit is illuminated with an unmodulated Continuous Wave (CW) signal from a remote radar unit (CTX4000/PHOTOANGLO), the illuminating signal is Amplitude Modulated (AM) with the PPM square wave.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/comment-page-1/#comment-677186</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 11 Jul 2014 14:59:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24298#comment-677186</guid>
		<description><![CDATA[GBPPR Vision #27: Overview of the NSA&#039;s LOUDAUTO Radar Retro-Reflector 
https://www.youtube.com/watch?v=EOD1yHnerXg

General overview of the NSA&#039;s LOUDAUTO audio-based RF retro-reflector.]]></description>
		<content:encoded><![CDATA[<p>GBPPR Vision #27: Overview of the NSA&#8217;s LOUDAUTO Radar Retro-Reflector<br />
<a href="https://www.youtube.com/watch?v=EOD1yHnerXg" rel="nofollow">https://www.youtube.com/watch?v=EOD1yHnerXg</a></p>
<p>General overview of the NSA&#8217;s LOUDAUTO audio-based RF retro-reflector.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/01/08/nsa-spy-gadgets-laudauto/comment-page-1/#comment-677185</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 11 Jul 2014 14:58:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=24298#comment-677185</guid>
		<description><![CDATA[Homebrew NSA Bugs
http://hackaday.com/2014/07/10/homebrew-nsa-bugs/

Thanks to [Edward Snowden] we have a huge, publicly available catalog of the very, very interesting electronic eavesdropping tools the NSA uses. Everything from incredibly complex ARM/FPGA/Flash modules smaller than a penny to machines that can install backdoors in Windows systems from a distance of eight miles are available to the nation’s spooks, and now, the sufficiently equipped electronic hobbyist can build their own.

[GBPPR2] has been going through the NSA’s ANT catalog in recent months, building some of the simpler radio-based bugs. The bug linked to above goes by the codename LOUDAUTO, and it’s a relatively simple (and cheap) radar retro-reflector that allows anyone with the hardware to illuminate a simple circuit to get audio back.

Also on [GBPPR2]‘s build list is RAGEMASTER, a device that fits inside a VGA cable and allows a single VGA color channel to be viewed remotely.]]></description>
		<content:encoded><![CDATA[<p>Homebrew NSA Bugs<br />
<a href="http://hackaday.com/2014/07/10/homebrew-nsa-bugs/" rel="nofollow">http://hackaday.com/2014/07/10/homebrew-nsa-bugs/</a></p>
<p>Thanks to [Edward Snowden] we have a huge, publicly available catalog of the very, very interesting electronic eavesdropping tools the NSA uses. Everything from incredibly complex ARM/FPGA/Flash modules smaller than a penny to machines that can install backdoors in Windows systems from a distance of eight miles are available to the nation’s spooks, and now, the sufficiently equipped electronic hobbyist can build their own.</p>
<p>[GBPPR2] has been going through the NSA’s ANT catalog in recent months, building some of the simpler radio-based bugs. The bug linked to above goes by the codename LOUDAUTO, and it’s a relatively simple (and cheap) radar retro-reflector that allows anyone with the hardware to illuminate a simple circuit to get audio back.</p>
<p>Also on [GBPPR2]‘s build list is RAGEMASTER, a device that fits inside a VGA cable and allows a single VGA color channel to be viewed remotely.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
