A BBC article from 2004 reported that intelligence organizations routinely utilize the remote-activiation process. "A mobile sitting on the desk of the politician or businessman can act as a powerful, undetectable bug," the short article reported, "enabling them to be activated at a afterwards day to pick up sounds even if the receiver is down."Des