"OPEC bug". Crypto Museum. 28 August 2016. Archived from the original on 31 March 2017.
doi.org
Kröger, Jacob Leon; Raschke, Philip (2019). "Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping". Data and Applications Security and Privacy XXXIII. Lecture Notes in Computer Science. Vol. 11559. pp. 102–120. doi:10.1007/978-3-030-22479-0_6. ISBN978-3-030-22478-3. ISSN0302-9743.
Kemp, Kathryn W. (2007). ""The Dictograph Hears All": An Example of Surveillance Technology in the Progressive Era". The Journal of the Gilded Age and Progressive Era. 6 (4): 409–430. doi:10.1017/S153778140000222X. S2CID163849152.
Kemp, Kathryn W. (2007). ""The Dictograph Hears All": An Example of Surveillance Technology in the Progressive Era". The Journal of the Gilded Age and Progressive Era. 6 (4): 409–430. doi:10.1017/S153778140000222X. S2CID163849152.
"Australian Security & Intelligence Organization (ASIO)". Archived from the original on 3 May 2009. Retrieved 5 April 2011. "In 1990, it was learned, that the ASIS, along with the help of 30 NSA technicians, had bugged the Chinese embassy. The story had originally been picked up by an Australian paper, but the ASIS asked them to sit on the story. Shortly thereafter, the Associated Press also picked up the story, but the ASIS also got them to sit on the story. However, the story somehow made its way to Time magazine, where it was published, compromising the operation."
Kröger, Jacob Leon; Raschke, Philip (2019). "Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping". Data and Applications Security and Privacy XXXIII. Lecture Notes in Computer Science. Vol. 11559. pp. 102–120. doi:10.1007/978-3-030-22479-0_6. ISBN978-3-030-22478-3. ISSN0302-9743.