Wireless Security In Smart Homes Is Vulnerable

Thieves are finding new ways to commit crimes and exploit technology for their burglary activities and now any product that promises to protect your home requires heightened scrutiny.

Evidence from domestic burglaries in the US suggests that while wireless smart sensors and cameras may be loudly responding about broken glass, open doors, and burglars moving inside the house those radio signals may never reach the homeowner’s phone.

There have been a series of robberies in Edina, Minneapolis which have led police to believe that burglars are using WiFi jammers to block off security system signals from reaching the home’s residents, as well as disable door, window, and motion sensors. 

Edina police suspect that nine burglaries in the last six months have been perpetrated using with Wi-Fi jammers deployed to ensure incriminating video evidence wasn’t available to investigators.  Victims have complained to the local authorities about burglars using WiFi jammers to neutralise security systems, especially surveillance cameras.

Many home security devices connect directly to the WiFi network or a smart home hub using radio frequencies such as 2.4 GHz. Their signal strength is limited and is susceptible to interference. A WiFi jammer can  overpower signals from security devices by sending a “loud” noise in the same range of frequencies, making receivers unable to distinguish between the genuine signals and the disruptive noise generated by the jammer.

The US Federal Communications Commission has banned the use of jammers in the US because they can prevent people from calling 911 or other emergency services, as well as pose serious risks to public safety communications and interfere with other forms of communications. According to an alert by FCC: “The use of a phone jammer, GPS blocker, or other signal jamming device designed to intentionally block, jam, or interfere with authorised radio communications is a violation of federal law.” Nevertheless, malicious actors can still purchase jammers online from suppliers outside the US. 

Wired security devices, relying on physical connections, are generally less sensitive to outside interference. However, cables may also be sabotaged. Users may also check if their smart home solution allows alerts when signals or connections are interrupted.

YCombinator     |    Worldstar   |    I-HLS    |    Cybernews    |    Toms Hardware    |    CNet    |    CEPro

Image:  Mika Baumeister

You Might Also Read: 

Singapore Introduces Home Cyber Security Labelling:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Gender Diversity In The Technology Sector
Malawi's Passport System Breached »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XenArmor

XenArmor

XenArmor products include NetCertScanner, an enterprise software to scan & manage expired SSL Certificates on your local network or internet.

Northwave

Northwave

Northwave offers an Intelligent combination of cyber security services to protect your information.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

FoxGuard Solutions

FoxGuard Solutions

FoxGuard Solutions develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

Fortiphyd Logic

Fortiphyd Logic

Fortiphyd Logic equips operators of the power grid, oil & gas, and other critical infrastructure with the tools and training they need to defend their industrial networks from advanced cyberattacks.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

Dectar

Dectar

Dectar (formerly 4Securitas) is a cybersecurity company that provides solutions that predict, detect, defend and react against cybersecurity threats.

Synoptek

Synoptek

Synoptek is a global systems integrator and managed IT services provider (MSP). We offer comprehensive IT management and consultancy services to organizations worldwide.

Secure Halo

Secure Halo

Secure Halo has been protecting the intellectual assets and sensitive information of the federal government and private sector for 20+ years, through our proactive approach to risk and cybersecurity.

XONA Systems

XONA Systems

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.