English En
  • Deutsche De
  • English En
  • Français Fr
  • Русский Ru

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our marketing and analytics partners who may combine it with other information you've provided to them or which they've separately collected from you. You also may to see our Privacy Policy. By clicking the OK button below, you accept our cookies.

Authors:

Most of the results of using technical bugging devices were of little importance for my service. It may have been different in counter-intelligence, where bugs in flats, etc., were used to obtain a lot of information about what counter-intelligence was interested in.

Markus Wolf