Thursday, November 14, 2024
HomeTechnologyCreepy tool lets criminal hackers access your home video cameras- Mrit Tech

Creepy tool lets criminal hackers access your home video cameras- Mrit Tech


Join Fox News for access to this content

Plus special access to select articles and other premium content with your account – free of charge.

Please enter a valid email address.

By entering your email and pushing continue, you are agreeing to Fox News’ Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. To access the content, check your email and follow the instructions provided.

Having trouble? Click here.

Imagine this: You’re sitting in your living room, feeling totally secure behind the watchful stare of your home security camera. 

But what if I told you that this very camera, designed to protect you, could be betraying your privacy? A disturbing discovery at Northeastern University might have us all looking over our shoulders.

Researchers discovered that a stealthy technology called EM Eye allows eavesdropping on our cameras, turning your trusted guardian into an unwitting accomplice.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Home security camera (Kurt “CyberGuy” Knutsson)

How this technology eavesdrops on your camera’s inner workings

EM Eye is akin to a tech-savvy burglar, but instead of picking locks, it picks up the electromagnetic whispers of your camera’s inner workings. Like a radio tuned to a secret frequency, EM Eye listens to the radiation emitted by the camera’s wires, which, unbeknownst to many, double as unwilling radio transmitters. The bits and bytes that constitute your video feed are leaking into the ether, and EM Eye catches them all, rendering the walls around your camera as inconsequential as the air it records.

KEEP PORCH PIRATES FROM STEALING YOUR PACKAGES WITH THESE HOME SECURITY SYSTEMS

creepy tool 2

Home doorbell camera (Kurt “CyberGuy” Knutsson)

MORE: A PRIVACY WIN: AMAZON LIMITS POLICE ACCESS TO YOUR RING CAMERA

EM Eye also targets dash cams and smartphones

This technique isn’t just about peeping through the looking glass of home security cameras. It extends its reach to the dash cams in your car and even the smartphone you carry.

CREEPy tool 3

Experiment setups (Northeastern University)

The researchers threw a net over 12 different camera types and discovered the distance from which they could hijack your video varied — a mere footstep away for some, a modest 16 feet for others. The 12 devices included four smartphones, six smart home cameras and two dashcams. All of these devices were intact with their original packaging prior to testing. Here is the manufacturer, model and year of each device tested:

  • Google Pixel 1 (2013)
  • Google Pixel 3 (2018)
  • Samsung S6 (2015)
  • ZTE Z557 (2019)
  • Wyze Cam Pan 2 (2019)
  • Xiaomi Dafang (2019)
  • Baidu Xiaodu X9 (2023)
  • TeGongMao (2023)
  • Goov V9 (2022)
  • QiaoDu (2021)
  • 360 M320 Dashcam (2020)
  • Blackview Dashcam (2022)

We reached out to the companies that make these products for a response but had not heard back as of our deadline.

MORE: IS YOUR DOORBELL CAMERA VULNERABLE TO JAMMING OR INTERFERENCE?

EM Eye’s machine learning twist

Now, before you think it’s all a blurry mess, hold on. Yes, the video comes through a bit distorted, like a TV struggling for signal, but then comes the twist: machine learning. The researchers wield this tool like a master artist, refining and enhancing until the picture is almost as good as the original.

MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS

The wake-up call for our reliance on supposedly secure tech

Presented at the prestigious IEEE Symposium on Security and Privacy, EM Eye doesn’t only raise eyebrows; it raises alarms about privacy and security. It’s a wake-up call that the very devices we rely on for security could be turned against us. With a bit of engineering know-how and equipment that won’t break the bank, someone could turn into a video voyeur without leaving a digital footprint.

The brains behind EM Eye aren’t just doomsayers; they’re also problem solvers. They’re calling on camera manufacturers to do the following three things:

1) Wrap the camera wires in a special shield, like armor, for the signal. This blocks the EM leakage from escaping.

2) Keep the wires short. The shorter they are, the less leakage there is to capture.

3) Develop better ways to send the camera signal. Think of it like speaking in a secret code that’s harder to crack.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

How EM Eye turns cameras into silent spies

The principle at play is electromagnetic induction — a concept that may take you back to high school physics. Those wires inside your camera are not just cables; they’re an open book to anyone with the right antenna. 

The researchers’ toolkit included a software-defined radio and a directional antenna, pinpointing the camera like a detective following a trail and turning that electromagnetic signal back into a video.

Unlike other spying tactics that require hacking into a network or intercepting cloud storage, EM Eye is a ghost operation. It doesn’t need to touch your camera’s network or storage, and it’s just as effective on offline devices like dashcams. The potential of EM Eye spans across any device with wires carrying video data like your laptop screen, your tablet or even your desktop monitor. 

CREEPy tool 4

Home security camera (Kurt “CyberGuy” Knutsson)

MORE: HOW TO DETECT A HACKER SPYING ON YOUR DOORBELL CAMERA

What can you do to help protect your privacy?

While EM Eye technology raises significant privacy concerns, there are steps you can take to mitigate the risks:

For home security cameras

Choose shielded cameras: Look for cameras explicitly advertised as having shielded cables or built-in shielding against electromagnetic interference. This can significantly reduce the leakage of video data.

Minimize cable length: As the researchers noted, shorter cables emit less radiation. Opt for cameras with shorter built-in cables or minimize the length of extension cables used.

Position cameras carefully: Avoid placing cameras near windows or outside walls, where the signal might be more easily intercepted. Consider positioning them indoors, facing outside.

Avoid keeping cameras running inside your home: You may think that having cameras running inside your home can enhance your security and peace of mind, but it can also expose you to new threats. If your cameras are not properly shielded and secured, they can leak video data through electromagnetic signals that can be picked up by malicious actors using EM Eye technology. This can allow them to spy on your private activities, possibly steal your personal information or even blackmail you. 

Disable unnecessary features: Turn off features like night vision or audio recording when not in use. These features can generate additional electromagnetic signals that could be exploited.

Keep firmware updated: Manufacturers may release firmware updates that address security vulnerabilities, including exploits similar to EM Eye. Regularly update your camera’s firmware by opening the app that controls the camera settings.

For other devices

Be mindful of your surroundings: Be aware of your environment and potential eavesdroppers when using devices with video output, such as smartphones, laptops and tablets. Avoid using them in sensitive areas or situations where privacy is crucial.

Use a webcam cover: By using a webcam cover, you can ensure that no one can see you through your camera without your permission. You can use a webcam cover on any device that has a camera, such as laptops, tablets, smartphones, smart TVs and gaming consoles. While a webcam cover is best, you can also physically cover your camera with a piece of tape when you’re not using it to prevent unauthorized access.

Use privacy screens: Privacy screens for laptops and tablets can help limit the viewing angle of your screen, making it harder for someone to observe your activity from the side.

Invest in Faraday bag: For high-security needs, consider using a Faraday bag or Faraday shield, which is an enclosure used to block electromagnetic signals, to shield specific devices when necessary.

While these steps can help reduce the risk, they may not provide complete protection against eavesdropping with advanced technology. It’s crucial to stay informed about new developments in EM Eye technology and potential countermeasures. By taking proactive measures and staying informed, you can help protect your privacy in the face of evolving security challenges like EM Eye.

Kurt’s key takeaways

What we have here is not just a piece of research; it’s a statement. A statement that in a world woven with wires and watched by cameras, privacy is a veil that can be lifted by those who know how to pull the strings. As we peer into our screens, perhaps it’s time to ponder who might be peering back.

CLICK HERE TO GET THE FOX NEWS APP

Is it about time to call on home security and dash camera manufacturers to build them with encryption so that we are protected from this type of spying? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.


RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments