Wireless Security In Smart Homes Is Vulnerable

Thieves are finding new ways to commit crimes and exploit technology for their burglary activities and now any product that promises to protect your home requires heightened scrutiny.

Evidence from domestic burglaries in the US suggests that while wireless smart sensors and cameras may be loudly responding about broken glass, open doors, and burglars moving inside the house those radio signals may never reach the homeowner’s phone.

There have been a series of robberies in Edina, Minneapolis which have led police to believe that burglars are using WiFi jammers to block off security system signals from reaching the home’s residents, as well as disable door, window, and motion sensors. 

Edina police suspect that nine burglaries in the last six months have been perpetrated using with Wi-Fi jammers deployed to ensure incriminating video evidence wasn’t available to investigators.  Victims have complained to the local authorities about burglars using WiFi jammers to neutralise security systems, especially surveillance cameras.

Many home security devices connect directly to the WiFi network or a smart home hub using radio frequencies such as 2.4 GHz. Their signal strength is limited and is susceptible to interference. A WiFi jammer can  overpower signals from security devices by sending a “loud” noise in the same range of frequencies, making receivers unable to distinguish between the genuine signals and the disruptive noise generated by the jammer.

The US Federal Communications Commission has banned the use of jammers in the US because they can prevent people from calling 911 or other emergency services, as well as pose serious risks to public safety communications and interfere with other forms of communications. According to an alert by FCC: “The use of a phone jammer, GPS blocker, or other signal jamming device designed to intentionally block, jam, or interfere with authorised radio communications is a violation of federal law.” Nevertheless, malicious actors can still purchase jammers online from suppliers outside the US. 

Wired security devices, relying on physical connections, are generally less sensitive to outside interference. However, cables may also be sabotaged. Users may also check if their smart home solution allows alerts when signals or connections are interrupted.

YCombinator     |    Worldstar   |    I-HLS    |    Cybernews    |    Toms Hardware    |    CNet    |    CEPro

Image:  Mika Baumeister

You Might Also Read: 

Singapore Introduces Home Cyber Security Labelling:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Gender Diversity In The Technology Sector
Malawi's Passport System Breached »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

TSUNAMI

TSUNAMI

The TSUNAMi center focuses on software and system security and how trustworthy software can be built from COTS software components.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

Digital Guardian

Digital Guardian

Digital Guardian is a next generation data protection platform designed to stop data theft.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

Inspirria Cloudtech

Inspirria Cloudtech

Inspirria Cloudtech is a specialized Cloud Technologies Services provider and Cloud Aggregator focused on executing cloud models for clients.

NuSummit

NuSummit

NuSummit (formerly NSEIT) specializes in empowering financial services firms to navigate complex challenges with cutting-edge, technology-driven solutions.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

RunReveal

RunReveal

RunReveal's mission is to make sure no breach goes undetected. That means having a product that is accessible and effective for companies of all sizes.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.

Avantra

Avantra

Avantra Enterprise is an end to end platform for AIOps and ITSecOps scenarios - with best practices configuration, security vulnerability patching, system refreshes and anomaly detection automations.