Microphone Blocker
   HOME

TheInfoList



OR:

A microphone blocker is a
phone A telephone is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most efficiently the human voice, into ele ...
microphone connector Many different electrical connectors have been used to connect microphones to audio equipment—including PA systems, radios, tape recorders, and numerous other devices. Phone connectors Photo: 2.5 mm mono (TS), 3.5 mm mono and stereo ( ...
used to trick
feature phone A feature phone (also spelled featurephone) is a type or class of mobile phone that retains the form factor of earlier generations of mobile telephones, typically with press-button based inputs and a small non-touch display. They tend to use an ...
s that have a physical
microphone A microphone, colloquially called a mic or mike (), is a transducer that converts sound into an electrical signal. Microphones are used in many applications such as telephones, hearing aids, public address systems for concert halls and public ...
switch to disconnect the microphone. Microphone blockers won't operate on smartphones or laptops because the microphone is controlled with software rather than a physical switch.


Safety test

Hardware devices should always be tested if it is controlled by software which renders a microphone blocker useless. This can simply be done by plugging a headset or a microphone to the jack try to activate the internal microphone (eg with ''speaker mode'' on smartphones or feature phones and speak near the phone while keeping the microphone at distance or plugged), or any program that always will use the internal microphone for other hardware devices like laptops.


Working alternatives for modern hardware devices

*
Hardware kill switch A security switch is a hardware device designed to protect computers, laptops, smartphones and similar devices from unauthorized access or operation, distinct from a virtual security switch which offers software protection. Security switches shoul ...
(HKS): Some hardware devices can physically disconnect and/or cut power to integrated components with
security switch A security switch is a hardware device designed to protect computers, laptops, smartphones and similar devices from unauthorized access or operation, distinct from a virtual security switch which offers software protection. Security switches shoul ...
es. *
Hacking of consumer electronics The hacking of consumer electronics is an increasingly common practice which users perform in order to customize and modify their devices beyond what is typically possible. This activity has a long history, dating from the days of early computer ...
:
Whistleblower A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
showed ''Wired'' correspondent Shane Smith how to remove the cameras and microphones from a smartphone. The only practical ways are to physically removing all the internal microphones (there can be more than one, like a noise cancellation mic) and only plug headsets and using the headset microphone to record when needed. * Modular hardware: Cameras and microphones can be physically removed from modular hardware.


Smartphone incompatibility

Microphone blockers, including commercial microphone blockers with an integrated circuit marketed to provide "extra security", are not useful for smartphones because it is controlled entirely by software. It can be demonstrated by connecting a microphone blocker to a smartphone, and make a phone call with speaker mode which will also active the internal microphone. However, although they would work, there are further problems: * Since
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple fruit tree, trees are agriculture, cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, wh ...
started to exclude the headphone jack in 2016 from
iPhone 7 The iPhone 7 and iPhone 7 Plus are smartphones that were designed, developed, and marketed by Apple Inc. They are the tenth generation of the iPhone. They were announced on September 7, 2016, at the Bill Graham Civic Auditorium in San Fran ...
,
iPhone 7 Plus The iPhone 7 and iPhone 7 Plus are smartphones that were designed, developed, and marketed by Apple Inc. They are the tenth generation of the iPhone. They were announced on September 7, 2016, at the Bill Graham Civic Auditorium in San Fran ...
and later versions, more and more phone companies are eliminating it. 3.5 mm TRRS male microphone blocker adapters with connectors to
Lightning Lightning is a naturally occurring electrostatic discharge during which two electric charge, electrically charged regions, both in the atmosphere or with one on the land, ground, temporarily neutralize themselves, causing the instantaneous ...
cables exist, and cables with
USB-C USB-C (properly known as USB Type-C) is a 24-pin USB connector system with a rotationally symmetrical connector. The designation C refers only to the connector's physical configuration or form factor and should not be confused with the conne ...
connectors can be produced. Apple has filed dozens of wireless patents, and there are rumors that they are planning to produce products without lightning ports in the future to make them completely wireless. Bluetooth vendors advise customers with vulnerable Bluetooth devices to either turn them off in areas regarded as unsafe or set them to undiscoverable. Portable
Bluetooth Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is limi ...
adapters for wired headsets, can be used as workaround to connect the microphone blocker to wireless hardware devices with Bluetooth connectivity, however while making them susceptible to
bluesnarfing Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant). This allows access to calendars, contact lists, emails ...
. * Some hardware devices (eg some
Google Nexus Google Nexus is a discontinued line of consumer electronic devices that run the Android operating system. Google managed the design, development, marketing, and support of these devices, but some development and all manufacturing were carried ...
smartphones) have in addition to the internal recording microphone an internal noise cancellation microphone that may be on all the time, or that may be on in a way that is independent from what is plugged into the audio jack connector.


Feature phone compatibility

A phone connector without a microphone channel cannot be used as a microphone blocker because it will not deactivate the external microphone. Three- or four-conductor ( or ) 2.5 mm and 3.5 mm sockets are common on older
cell phone A mobile phone, cellular phone, cell phone, cellphone, handphone, hand phone or pocket phone, sometimes shortened to simply mobile, cell, or just phone, is a portable telephone that can make and receive calls over a radio frequency link whil ...
s and newer
smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whic ...
s respectively, providing mono (three conductor) or stereo (four conductor) sound and a microphone input, together with signaling (e.g., push a button to answer a call).


Older hardware devices

CTIA/ AHJ is the
de facto ''De facto'' ( ; , "in fact") describes practices that exist in reality, whether or not they are officially recognized by laws or other formal norms. It is commonly used to refer to what happens in practice, in contrast with ''de jure'' ("by la ...
TRRS standard.
OMTP The Open Mobile Terminal Platform (OMTP) was a forum created by mobile network operators to discuss standards with manufacturers of mobile phones and other mobile devices. During its lifetime, the OMTP included manufacturers such as Huawei, LG E ...
was mostly used on older hardware devices. However, the old mobile phones have a 2.5 mm jack connectors socket and cannot be used with modern microphone blockers that are typically 3.5 mm, but old mobile phones are notorious for their low security of the hardware itself. If a CTIA headset is connected to a mobile phone with OMTP interface, the external microphone will stay active. There, internal microphone will only be active when holding the microphone key on the headset. A standard TCIA/AHJ TRRS microphone blocker cannot be used with OMTP socket hardware devices and it is recommended to test all microphone blockers to make sure they really work.


Operation

Microphone blockers disable the internal microphone by tricking the device into believing an external microphone is connected. A 3.5 mm microphone blocker with just channel is enough to disconnect the internal microphone, but most commercial microphone blockers have connections which in theory makes them ''headset blockers'' that in smartphones also disconnect the internal speaker in
media player software Media player software is a type of application software for playing multimedia computer files like audio and video files. Media players commonly display standard media control icons known from physical devices such as tape recorders and CD play ...
because they will try to connect to the headphones, while
ringtone A ringtone, ring tone or ring is the sound made by a telephone to indicate an incoming call. Originally referring to and made by the electromechanical striking of bells, the term now refers to any sound on any device alerting of a new incoming ...
s, and alarms, will functioning as normal because they will use both the internal speaker and the external speaker(s). Successful operation of a microphone blocker depends on the internal scheme of the mobile device, which may fully block the microphone without possibility of recovering data, or just disregard the signal from internal microphone with the possibility of recording if needed.


Issues

Some devices allow internal and external microphone works simultaneously or may not recognize when an external microphone is connected.


Types


Microphone blocking plug

A microphone blocking plug is a phone connector with a microphone channel that cannot be used due to the plugged end. Some products are shipped with a female connectors (with a
keychain A keychain (also key fob or keyring) is a small ring or chain of metal to which several keys can be attached. The length of a keychain allows an item to be used more easily than if connected directly to a keyring. Some keychains allow one or bo ...
hole, or a small strap attached directly to smartphone cases) to prevent loss when the male connector is detached. A
mobile phone charm Phone charms (also phone danglers, phone lanyards, phone chains and phone straps) are charms that are connected to a mobile device either via a phone connector or silicone plug that fits into the jack port sometimes provided with circle cotter ...
(especially with TRS connector instead of a rubber plug) can be used to
conceal Concealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is tha ...
a dummy blocker. A microphone blocking plug can be used to
debug In computer programming and software development, debugging is the process of finding and resolving '' bugs'' (defects or problems that prevent correct operation) within computer programs, software, or systems. Debugging tactics can involve int ...
software-defined radio Software-defined radio (SDR) is a radio communication system where components that have been traditionally implemented in analog hardware (e.g. mixers, filters, amplifiers, modulators/demodulators, detectors, etc.) are instead implemented by me ...
that demands a connector to be plugged but they cannot be used to stream radio due to its low
antenna efficiency Antenna ''apertureillumination efficiency is a measure of the extent to which an antenna or array is uniformly excited or illuminated. It is typical for an antenna pertureor array to be intentionally under-illuminated or under-excited in order t ...
.


Life hack

Common products that can be used as microphone blockers: * A soldering jack plug (TR, TRS, or TRRS), with metal or plastic base - A slim plug with
right angle In geometry and trigonometry, a right angle is an angle of exactly 90 Degree (angle), degrees or radians corresponding to a quarter turn (geometry), turn. If a Line (mathematics)#Ray, ray is placed so that its endpoint is on a line and the ad ...
is recommended to fit the jack plug hole in smartphone cases and to not cause frictions in the socket. * A TRRS male-male jack plug cable - Another cheap solution that provides two microphone blocking plugs, the cost per plug is usually cheaper than commercial microphone blocking plugs. The cable can either be cut to provide two separate plugs or be left intact to allow plugging into two mobile phones. * A headphone cable with microphone, a wired headset, or a wired microphone - More expensive and will provide just one blocking plug. It's possible that microphone connectors without a microphone circuit like the above solutions offer low security, because when you plug a connector that has no microphone or microphone circuit, software has the ability to override the default behavior.


Microphone blocking adapter

Headset with an integrated microphone blocker also exist, allowing users to use the
headphones Headphones are a pair of small loudspeaker drivers worn on or around the head over a user's ears. They are electroacoustic transducers, which convert an electrical signal to a corresponding sound. Headphones let a single user listen to an au ...
(ie. for listening to music) without risking being eavesdropped. Microphone blocking adapters are phone connectors adapters with a microphone channel and a mechanism that produces a
false positive A false positive is an error in binary classification in which a test result incorrectly indicates the presence of a condition (such as a disease when the disease is not present), while a false negative is the opposite error, where the test result ...
signal simulating a connected microphone. This mechanism cannot be built by pairing multiple connectors: a headset connected to a 3.5 mm TRRS headset extension cable adapter further connected to a 3.5 TRS headphone cable adapter won't trick a connected mobile phone to disconnect its external microphone.


Applications

This section describes use for both microphone blocking plugs and adapters.


Use


Eavesdropping protection for feature phones

A microphone blocker is a cheap, simple accessory that provides
countersurveillance Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is ...
against eavesdropping, for example recording eavesdropping from
interception In ball-playing competitive team sports, an interception or pick is a move by a player involving a pass of the ball—whether by foot or hand, depending on the rules of the sport—in which the ball is intended for a player of the same team b ...
(like
cellphone surveillance Cellphone surveillance (also known as cellphone spying) may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. It also encompasses the monitoring of people's movements, which can b ...
), or
phone hacking Phone hacking is the practice of exploring a mobile device often using computer exploits to analyze everything from the lowest memory and central processing unit levels up to the highest file system and process levels. Modern open source tooling ...
, but it doesn't work on smartphones because they are controlled by software. However, there are a variety of computing vulnerabilities like
proprietary software Proprietary software is software that is deemed within the free and open-source software to be non-free because its creator, publisher, or other rightsholder or rightsholder partner exercises a legal monopoly afforded by modern copyright and int ...
and
firmware In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide h ...
, backdoors,
hardware security bug In digital computing, hardware security bugs are hardware bugs or flaws that create vulnerabilities affecting computer central processing units (CPUs), or other devices which incorporate programmable processors or logic and have direct memory acces ...
s,
hardware backdoor Hardware backdoors are backdoors in hardware, such as code inside hardware or firmware of computer chips. The backdoors may be directly implemented as hardware Trojans in the integrated circuit. Hardware backdoors are intended to undermine ...
s,
hardware Trojan A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit. A hardware Trojan is completely characterized by its physical representation and its behavior. The payload of an HT is the entire activity that the T ...
s,
spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
, and
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
programs that can turn on a mobile device's microphone remotely, and the vast majority of devices do not have internal hardware protection to prevent eavesdropping. Most
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the nam ...
, and anti-spying software does not guarantee that the microphone will be fully blocked or disabled and can even be prevented doing so by spyware and malware that are constantly changing and improving. Leaked documents published by
WikiLeaks WikiLeaks () is an international Nonprofit organization, non-profit organisation that published news leaks and classified media provided by anonymous Source (journalism), sources. Julian Assange, an Australian Internet activism, Internet acti ...
, codenamed
Vault 7 Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dating fr ...
and dated from 2013 to 2016, described the capabilities of the United States
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA) to perform electronic surveillance and cyber warfare, including the ability to compromise the operating systems of most smartphones, turning them into permanent listening devices. Millions of smartphones could also be vulnerable to
software cracking Software cracking (known as "breaking" mostly in the 1980s) is the modification of software to remove or disable features which are considered undesirable by the person cracking the software (software cracker), especially copy protection featur ...
via
accelerometers An accelerometer is a tool that measures proper acceleration. Proper acceleration is the acceleration (the rate of change of velocity) of a body in its own instantaneous rest frame; this is different from coordinate acceleration, which is accele ...
. A new
acoustic cryptanalysis Acoustic cryptanalysis is a type of side channel attack that exploits sounds emitted by computers or other devices. Most of the modern acoustic cryptanalysis focuses on the sounds produced by computer keyboards and internal computer components, bu ...
technique discovered by a research team at Israel's
Ben-Gurion University Ben-Gurion University of the Negev (BGU) ( he, אוניברסיטת בן-גוריון בנגב, ''Universitat Ben-Guriyon baNegev'') is a public research university in Beersheba, Israel. Ben-Gurion University of the Negev has five campuses: the ...
Cybersecurity Research Center allows data to be extracted using a computer's speakers and headphones. ''
Forbes ''Forbes'' () is an American business magazine owned by Integrated Whale Media Investments and the Forbes family. Published eight times a year, it features articles on finance, industry, investing, and marketing topics. ''Forbes'' also re ...
'' published a report stating that researchers found a way to see information being displayed, by using microphone, with 96.5% accuracy.


Pocket dialing protection

A microphone blocker is useful to prevent a mobile phone against audio interception from
pocket dialing Pocket dialing (also known as pocket calling or butt dialing) is the accidental placement of a phone call while a person's mobile phone or cordless phone is in the owner's pocket or handbag. The recipient of the call typically hears random backg ...
.


Abuse


Social engineering

A person can wiretap conversations from persons they with
social engineering Social engineering may refer to: * Social engineering (political science), a means of influencing particular attitudes and social behaviors on a large scale * Social engineering (security), obtaining confidential information by manipulating and/or ...
have deceived that microphone blockers are safe to use with smartphones. This can in theory be exploited by companies that manufacture and sell commercial microphone blockers if they require a mobile phone number when people order their products or ask for support.


Marketing ethic issue

Manufacturers of commercial microphone blockers with 3.5 mm phone jacks intended for smartphones, sometimes claim that they their blocker has an inbuilt semiconductor integrated circuit (sometimes patented form marketing purpose) that will offer superior security but doesn't give any security at all, they just deceive people to make money on them. This has raised questions about
marketing ethics Marketing ethics is an area of applied ethics which deals with the moral principles behind the operation and regulation of marketing. Some areas of marketing ethics (ethics of advertising and Promotion (marketing), promotion) overlap with media et ...
.


See also

* Crypto phone *
Faraday cage A Faraday cage or Faraday shield is an enclosure used to block electromagnetic fields. A Faraday shield may be formed by a continuous covering of conductive material, or in the case of a Faraday cage, by a mesh of such materials. Faraday cage ...
*
Mobile phone jammer A mobile phone jammer or blocker is a device which deliberately transmits signals on the same radio frequencies as mobile phones, disrupting the communication between the phone and the cell-phone base station, effectively disabling mobile phones wi ...
* Mobile phone accessory *
Mobile security Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business ...
*
Secure voice Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. History The implementation of voice encryption date ...


References


External links


How to keep snoops from listening to your laptop's microphone

Keep hackers from listening through your computer with plug
* Telephone connectors Hardware device blockers Social engineering (computer security) Confidence tricks