A BBC report from 2004 reported that intelligence organizations routinely use the remote-activiation strategy. "A mobile sitting down within the desk of a politician or businessman can act as a powerful, undetectable bug," the article explained, "enabling them to generally be activated in a later on date to pick up sounds even if the receiver is do