{"id":22463,"date":"2024-03-05T17:53:43","date_gmt":"2024-03-05T13:53:43","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=22463"},"modified":"2024-03-05T17:53:43","modified_gmt":"2024-03-05T13:53:43","slug":"protecting-from-wifi-camera-jamming-and-other-burglar-tricks","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/22463\/","title":{"rendered":"Securing home security"},"content":{"rendered":"<p>Recently, the Edina Police Department (Minneapolis, U.S.A.) <a href=\"https:\/\/www.kare11.com\/article\/news\/local\/edina-burglars-could-be-using-wifi-jammers\/89-838f08f6-8e13-4577-8a88-628d757207a2\" target=\"_blank\" rel=\"nofollow noopener\">issued a remarkable warning<\/a> to residents. Following the investigation of nine apartment burglaries, the police concluded that thieves were disrupting the Wi-Fi connection in the apartments. They did this to prevent the home\u2019s smart surveillance cameras from alerting the owners of the danger and transmitting video to them. Is such a technologically advanced burglary really possible? It is. Are there other ways to attack smart-home security systems? Definitely. What can be done about it? Great question. Let\u2019s find out!\u2026<\/p>\n<h2>Defenseless defenders<\/h2>\n<p>Protection devices \u2014 whether they be locks, cameras, alarms, or anything else \u2014 should, in theory, be completely secure against any kind of hostile action. After all, they could be deliberately targeted by attackers hoping to break in! Unfortunately, in practice, manufacturers are not always prudent. They make various mistakes: in smart locks, the <a href=\"https:\/\/www.kaspersky.com\/blog\/3-reasons-not-to-use-smart-locks\/47866\/\" target=\"_blank\" rel=\"noopener nofollow\">mechanical part is often not made reliable enough<\/a>; in cameras, <a href=\"https:\/\/www.kaspersky.com\/blog\/ip-cameras-unsecurity-eufy\/46574\/\" target=\"_blank\" rel=\"noopener nofollow\">video streams are transmitted openly<\/a>, allowing unauthorized persons to view or even interfere with them; and in alarms, <a href=\"https:\/\/www.consumerreports.org\/home-garden\/home-security-systems\/diy-home-security-systems-vulnerable-to-hacking-a7530099647\/\" target=\"_blank\" rel=\"nofollow noopener\">control channels are poorly protected<\/a>. This is in addition to other <a href=\"https:\/\/www.kaspersky.com\/blog\/mwc2018-insecure-iot\/21343\/\" target=\"_blank\" rel=\"noopener nofollow\">smart-home vulnerabilities<\/a> that we\u2019ve <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/smart-home\/\" target=\"_blank\" rel=\"noopener nofollow\">written about before<\/a>.<\/p>\n<p>What\u2019s even more worrying is that many of these devices are vulnerable to two really simple attacks: power disruption and communication disruption.<\/p>\n<p>Home Wi-Fi can be disrupted in various ways \u2014 from crudely jamming the entire radio-wave frequency range to more specialized attacks on a specific network or Wi-Fi client. There are other ways besides messing with radio waves, too. The internet in a home is usually connected through one of four easily recognizable cables: fiber optic, telephone, twisted pair (Ethernet), or coaxial television. One can reliably disrupt the connection simply by cutting these cables.<\/p>\n<p>In case the entire security system relies on the power grid without backup sources, simply cutting off the power to the apartment can easily knock out the smart protection.<\/p>\n<h2>Improving protection performance<\/h2>\n<p>Most of the problems described above can be dealt with. As with any security measures, none of the solutions below guarantees 100% protection, but they will significantly reduce the likelihood of a burglary.<\/p>\n<p><strong>Choose the right equipment. <\/strong>All of the issues mentioned above <a href=\"https:\/\/www.kaspersky.com\/blog\/smart-home-zigbee-thread-matter-advice\/47343\/\" target=\"_blank\" rel=\"noopener nofollow\">should be considered before purchasing any security systems<\/a>. This way, you can formulate additional requirements for the equipment:<\/p>\n<ul>\n<li>an autonomous power supply<\/li>\n<li>the ability to transmit information without Wi-Fi<\/li>\n<li>an adequate level of mechanical protection<\/li>\n<li>the manufacturer\u2019s compliance with high cybersecurity standards<\/li>\n<\/ul>\n<p>The first two requirements are perfectly combined in cameras that operate using Power over Ethernet (PoE) technology. Both data and power are transmitted through a single cable. You just need to buy either a PoE-enabled Ethernet router\/hub or a separate PoE converter and connect it to the power grid using an uninterruptible power supply (UPS). This will make the internet in the home, the functionality of the cameras and sensors, and their connection to the router resistant to power outages and Wi-Fi interference.<\/p>\n<p>If it\u2019s not suitable for you to have Ethernet cables running through your home, you could consider cameras with an autonomous power supply (batteries) or, at worst, cameras connected through a capacious power bank. This would protect against power outages, but the problem of attackers interfering with Wi-Fi would remain. To protect against this, you could choose devices that operate on 3G\/4G\/5G. It\u2019s worth noting that they\u2019re usually designed for houses rather than apartments, so they often have \u201coutdoor\u201d features: waterproof casing, long-range IR illumination, and so on.<\/p>\n<p>Many cameras have the ability to record to an SD card, but this doesn\u2019t help much in quickly responding to an incident.<\/p>\n<p>A sufficient level of mechanical security is mainly important for locks, but it\u2019s also relevant for cameras, doorbells and sensors, which are directly accessible to intruders. The level of security is difficult to assess before purchasing, but you can search the internet for tests for burglary and vandalism resistance, as well as customer reviews.<\/p>\n<p>Assessing the cybersecurity level of a specific camera or doorbell is also not easy: you\u2019d have to carefully study the manufacturer\u2019s website and its reputation in terms of technical support and release of updates. We\u2019ve given <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-secure-smart-home\/47472\/\" target=\"_blank\" rel=\"noopener nofollow\">some useful tips<\/a> on this topic before.<\/p>\n<p><strong>Implement \u201credundancy\u201d.<\/strong> Even if you\u2019ve already bought some equipment, some additional measures would help improve home security. It\u2019s highly advisable to provide <a href=\"https:\/\/en.wikipedia.org\/wiki\/Redundancy_(engineering)\" target=\"_blank\" rel=\"nofollow noopener\">redundancy<\/a> for the internet channel. Depending on the situation, the backup channel could be launched either through a 4G modem or using a second wired connection and a second router. The main difficulty is configuring the router and the rest of the equipment so that the connection automatically switches to the backup channel when the main one goes down. In some routers this isn\u2019t difficult \u2014 the function is called <a href=\"https:\/\/www.tp-link.com\/nl\/support\/faq\/2719\/\" target=\"_blank\" rel=\"nofollow noopener\">backup channel<\/a> \u2014 while in others it\u2019s impossible. Of course, both routers (if there are two of them) would need power through a UPS. If you don\u2019t already have uninterrupted power, it\u2019s time to get some.<\/p>\n<p>If it\u2019s difficult to provide redundancy for the internet channel and automatic switching at the router level, as a relatively simple alternative, you could install a redundant camera: one would operate through the main internet channel, while the other \u2014 through the backup one.<\/p>\n<p><strong>Protect against cyberattacks.<\/strong> To hinder targeted attacks on security devices, it\u2019s important to follow the main rules of cybersecurity, which we\u2019ve <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-secure-smart-home\/47472\/\" target=\"_blank\" rel=\"noopener nofollow\">written about many times<\/a>: protect your router, choose strong Wi-Fi passwords, regularly update the firmware of smart devices and the router, and use a <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">comprehensive security solution<\/a>\u00a0for all computers, smartphones, and smart devices in your home network.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Security companies offer smart technologies \u2014 primarily cameras \u2014 to protect your home from burglary, fire and other incidents. But what about protecting these security systems themselves from intruders? We fill this gap.<\/p>\n","protected":false},"author":2722,"featured_media":22464,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[2743,1006,282,765,43,629,630,1144,131,174],"class_list":{"0":"post-22463","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-burglary","9":"tag-cameras","10":"tag-cybersecurity","11":"tag-iot","12":"tag-privacy","13":"tag-smart-devices","14":"tag-smart-home","15":"tag-technologies","16":"tag-tips","17":"tag-wi-fi"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/22463\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/27156\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/11492\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/29832\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/27331\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/27097\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/29776\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/28603\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/37087\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/12133\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/50739\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/21609\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/22322\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/31009\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/36070\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/27521\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/33336\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/protecting-from-wifi-camera-jamming-and-other-burglar-tricks\/32962\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/smart-home\/","name":"smart home"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22463"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22463\/revisions"}],"predecessor-version":[{"id":22465,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22463\/revisions\/22465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22464"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}