Wireless Security In Smart Homes Is Vulnerable

Thieves are finding new ways to commit crimes and exploit technology for their burglary activities and now any product that promises to protect your home requires heightened scrutiny.

Evidence from domestic burglaries in the US suggests that while wireless smart sensors and cameras may be loudly responding about broken glass, open doors, and burglars moving inside the house those radio signals may never reach the homeowner’s phone.

There have been a series of robberies in Edina, Minneapolis which have led police to believe that burglars are using WiFi jammers to block off security system signals from reaching the home’s residents, as well as disable door, window, and motion sensors. 

Edina police suspect that nine burglaries in the last six months have been perpetrated using with Wi-Fi jammers deployed to ensure incriminating video evidence wasn’t available to investigators.  Victims have complained to the local authorities about burglars using WiFi jammers to neutralise security systems, especially surveillance cameras.

Many home security devices connect directly to the WiFi network or a smart home hub using radio frequencies such as 2.4 GHz. Their signal strength is limited and is susceptible to interference. A WiFi jammer can  overpower signals from security devices by sending a “loud” noise in the same range of frequencies, making receivers unable to distinguish between the genuine signals and the disruptive noise generated by the jammer.

The US Federal Communications Commission has banned the use of jammers in the US because they can prevent people from calling 911 or other emergency services, as well as pose serious risks to public safety communications and interfere with other forms of communications. According to an alert by FCC: “The use of a phone jammer, GPS blocker, or other signal jamming device designed to intentionally block, jam, or interfere with authorised radio communications is a violation of federal law.” Nevertheless, malicious actors can still purchase jammers online from suppliers outside the US. 

Wired security devices, relying on physical connections, are generally less sensitive to outside interference. However, cables may also be sabotaged. Users may also check if their smart home solution allows alerts when signals or connections are interrupted.

YCombinator     |    Worldstar   |    I-HLS    |    Cybernews    |    Toms Hardware    |    CNet    |    CEPro

Image:  Mika Baumeister

You Might Also Read: 

Singapore Introduces Home Cyber Security Labelling:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Gender Diversity In The Technology Sector
Malawi's Passport System Breached »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

National Defense Industry Association (NDIA)

National Defense Industry Association (NDIA)

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

Sintef Digital

Sintef Digital

Sintef Digital carries out research in Information and Communication Technology for industry and the public sector.

Watchdata Technologies

Watchdata Technologies

Watchdata Technologies is a pioneer in digital authentication and transaction security.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.

Sirti

Sirti

Sirti is Italy's leading technology company in the design and production of network infrastructures and telecoms system integration.