High-performance mice can be used as a microphone to spy on users thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech

HyperX Haste 2 S mouse
(Image credit: Tom's Hardware)

A group of researchers from the University of California, Irvine, have developed a way to use the sensors in high-quality optical mice to capture subtle vibrations and convert them into audible data. According to the abstract of Mic-E-Mouse, the high polling rate and sensitivity of high-performance optical mice pick up acoustic vibrations from the surface where they sit. By running the raw data through signal processing and machine learning techniques, the team could hear what the user was saying through their desk.

Mouse sensors with a 20,000 DPI or higher are vulnerable to this attack. And with the best gaming mice becoming more affordable annually, even relatively affordable peripherals are at risk. It all begins when a user has a mouse like this attached to a compromised computer.

Mic-E-Mouse Pipeline Demonstration - YouTube Mic-E-Mouse Pipeline Demonstration - YouTube
Watch On

Although this is a novel method for extracting audio from unsuspecting targets, it’s not exactly the first time that someone has attempted to covertly record targets. One famous example from the Cold War was when the KGB gifted the American ambassador in Moscow a replica of the Great Seal with an embedded passive microphone. It only activated when it was hit by a high-frequency radio signal, leaving it undetected for nearly seven years.

The concept of the Mic-E-Mouse is similar — using an unsuspecting device to capture audio data. However, this method is empowered by AI models, allowing the researchers to get a speech recognition accuracy of about 42 to 61%, effectively turning your mouse into an eavesdropping microphone, though.

The proof of concept is certainly unnerving, but it will hopefully prompt future steps taken to prevent this sort of acoustic privacy violation, the kind that would have been unthinkable in a world before AI.

Follow Tom's Hardware on Google News, or add us as a preferred source, to get our up-to-date news, analysis, and reviews in your feeds. Make sure to click the Follow button!

Jowi Morales
Contributing Writer

Jowi Morales is a tech enthusiast with years of experience working in the industry. He’s been writing with several tech publications since 2021, where he’s been interested in tech hardware and consumer electronics.

  • edzieba
    Mouse sensors with a 20,000 DPI or higher are vulnerable to this attack
    DPI has nothing to do with this method. Instead, this requires 8KHz (or higher) mouse polling to avoid being Nyquist-limited.

    Since DPI is not mentioned in either the video or in the paper, I assume this is just some nonsense hallucinated by whatever LLM was asked to write the article.
    Reply