A BBC report from 2004 reported that intelligence organizations routinely use the remote-activiation technique. "A mobile sitting on the desk of the politician or businessman can work as a powerful, undetectable bug," the short article explained, "enabling them to generally be activated at a afterwards date to pick up sounds even though the receive