Wireless Security In Smart Homes Is Vulnerable

Thieves are finding new ways to commit crimes and exploit technology for their burglary activities and now any product that promises to protect your home requires heightened scrutiny.

Evidence from domestic burglaries in the US suggests that while wireless smart sensors and cameras may be loudly responding about broken glass, open doors, and burglars moving inside the house those radio signals may never reach the homeowner’s phone.

There have been a series of robberies in Edina, Minneapolis which have led police to believe that burglars are using WiFi jammers to block off security system signals from reaching the home’s residents, as well as disable door, window, and motion sensors. 

Edina police suspect that nine burglaries in the last six months have been perpetrated using with Wi-Fi jammers deployed to ensure incriminating video evidence wasn’t available to investigators.  Victims have complained to the local authorities about burglars using WiFi jammers to neutralise security systems, especially surveillance cameras.

Many home security devices connect directly to the WiFi network or a smart home hub using radio frequencies such as 2.4 GHz. Their signal strength is limited and is susceptible to interference. A WiFi jammer can  overpower signals from security devices by sending a “loud” noise in the same range of frequencies, making receivers unable to distinguish between the genuine signals and the disruptive noise generated by the jammer.

The US Federal Communications Commission has banned the use of jammers in the US because they can prevent people from calling 911 or other emergency services, as well as pose serious risks to public safety communications and interfere with other forms of communications. According to an alert by FCC: “The use of a phone jammer, GPS blocker, or other signal jamming device designed to intentionally block, jam, or interfere with authorised radio communications is a violation of federal law.” Nevertheless, malicious actors can still purchase jammers online from suppliers outside the US. 

Wired security devices, relying on physical connections, are generally less sensitive to outside interference. However, cables may also be sabotaged. Users may also check if their smart home solution allows alerts when signals or connections are interrupted.

YCombinator     |    Worldstar   |    I-HLS    |    Cybernews    |    Toms Hardware    |    CNet    |    CEPro

Image:  Mika Baumeister

You Might Also Read: 

Singapore Introduces Home Cyber Security Labelling:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Gender Diversity In The Technology Sector
Malawi's Passport System Breached »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Intrasoft International

Intrasoft International

Intrasoft International is a leading European IT Solutions and Services Group offering a full range of IT services including Information Security.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

SpyCloud

SpyCloud

SpyCloud is a leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations.

Gorodissky IP Security

Gorodissky IP Security

Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

Imageware

Imageware

Imageware is a leader in biometric cybersecurity. Protect against costly, damaging ransomware hacks by employing biometric cybersecurity solutions.

Slamm Technologies

Slamm Technologies

Slamm Technologies is a trusted IT firm that offers Cyber Security Support, Corporate IT Solutions and Professional IT Training courses with international certification.

Aikido Technology Services

Aikido Technology Services

Aikido Technology Services is a leading-edge technology solutions provider, servicing the Pacific North West USA. We offer affordable IT solutions designed to streamline and secure your business.

Redington

Redington

Redington offer products and services in solution areas including digital transformation, hybrid infrastructure and cybersecurity.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.

Couno

Couno

Couno is a trusted provider of IT support services throughout the UK and Europe.