Wireless Security In Smart Homes Is Vulnerable

Thieves are finding new ways to commit crimes and exploit technology for their burglary activities and now any product that promises to protect your home requires heightened scrutiny.

Evidence from domestic burglaries in the US suggests that while wireless smart sensors and cameras may be loudly responding about broken glass, open doors, and burglars moving inside the house those radio signals may never reach the homeowner’s phone.

There have been a series of robberies in Edina, Minneapolis which have led police to believe that burglars are using WiFi jammers to block off security system signals from reaching the home’s residents, as well as disable door, window, and motion sensors. 

Edina police suspect that nine burglaries in the last six months have been perpetrated using with Wi-Fi jammers deployed to ensure incriminating video evidence wasn’t available to investigators.  Victims have complained to the local authorities about burglars using WiFi jammers to neutralise security systems, especially surveillance cameras.

Many home security devices connect directly to the WiFi network or a smart home hub using radio frequencies such as 2.4 GHz. Their signal strength is limited and is susceptible to interference. A WiFi jammer can  overpower signals from security devices by sending a “loud” noise in the same range of frequencies, making receivers unable to distinguish between the genuine signals and the disruptive noise generated by the jammer.

The US Federal Communications Commission has banned the use of jammers in the US because they can prevent people from calling 911 or other emergency services, as well as pose serious risks to public safety communications and interfere with other forms of communications. According to an alert by FCC: “The use of a phone jammer, GPS blocker, or other signal jamming device designed to intentionally block, jam, or interfere with authorised radio communications is a violation of federal law.” Nevertheless, malicious actors can still purchase jammers online from suppliers outside the US. 

Wired security devices, relying on physical connections, are generally less sensitive to outside interference. However, cables may also be sabotaged. Users may also check if their smart home solution allows alerts when signals or connections are interrupted.

YCombinator     |    Worldstar   |    I-HLS    |    Cybernews    |    Toms Hardware    |    CNet    |    CEPro

Image:  Mika Baumeister

You Might Also Read: 

Singapore Introduces Home Cyber Security Labelling:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Gender Diversity In The Technology Sector
Malawi's Passport System Breached »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence (CGI)

CGI is a global IT Security firm that helps companies protect their data and minimize their vulnerability to cyber threats through a range of services such as Security Audits and Managed Services.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Salt Cybersecurity

Salt Cybersecurity

Salt Cybersecurity offer a four-pronged approach to information security that includes Custom Security Policy, Vulnerability Assessment, Threat Detection, and Security Awareness Training.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

CyberHub

CyberHub

CyberHub is an educational platform that offers professional courses and knowledge sharing through articles and videos to help students discover their potential in cybersecurity.

Prophaze Technologies

Prophaze Technologies

Prophaze enable organizations and SaaS providers to improve their web application cybersecurity and reduce costs through AI automation.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.