By entering your email and pushing continue, you are agreeing to Fox News’ Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. To access the content, check your email and follow the instructions provided.\n <\/div>\n
Having trouble? Click here.<\/footer>\n<\/div>\n<\/div>\n
Imagine this: You\u2019re sitting in your living room, feeling totally secure behind the watchful stare of your home security camera.\u00a0<\/p>\n
But what if I told you that this very camera, designed to protect you, could be betraying your privacy? A disturbing discovery at Northeastern University<\/u> might have us all looking over our shoulders.<\/p>\n
Researchers discovered that a stealthy technology called EM Eye allows eavesdropping on our cameras, turning your trusted guardian into an unwitting accomplice.<\/p>\n
CLICK TO GET KURT\u2019S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO\u2019S TO MAKE YOU SMARTER<\/u><\/strong><\/p>\n\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n\n
\n
Home security camera<\/span> (Kurt “CyberGuy” Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\nHow this technology eavesdrops on your camera’s inner workings<\/strong><\/h2>\nEM Eye is akin to a tech-savvy burglar, but instead of picking locks, it picks up the electromagnetic whispers of your camera’s inner workings. Like a radio tuned to a secret frequency, EM Eye listens to the radiation emitted by the camera\u2019s wires, which, unbeknownst to many, double as unwilling radio transmitters. The bits and bytes that constitute your video feed are leaking into the ether, and EM Eye catches them all, rendering the walls around your camera as inconsequential as the air it records.<\/p>\n
KEEP PORCH PIRATES FROM STEALING YOUR PACKAGES WITH THESE HOME SECURITY SYSTEMS<\/strong><\/p>\n\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n\n
\n
Home doorbell camera<\/span> (Kurt “CyberGuy” Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\nMORE: A PRIVACY WIN: AMAZON LIMITS POLICE ACCESS TO YOUR RING CAMERA<\/u><\/strong><\/p>\nEM Eye also targets dash cams and smartphones<\/strong><\/h2>\nThis technique isn’t just about peeping through the looking glass of home security cameras. It extends its reach to the dash cams in your car and even the smartphone you carry.<\/p>\n
\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n\n
\n
Experiment setups<\/span> (Northeastern University)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\nThe researchers threw a net over 12 different camera types and discovered the distance from which they could hijack your video varied \u2014 a mere footstep away for some, a modest 16 feet for others. The 12 devices included four smartphones, six smart home cameras and two dashcams. All of these devices were intact with their original packaging prior to testing. Here is the manufacturer, model and year of each device tested:<\/p>\n
\nGoogle Pixel 1\u00a0(2013)<\/li>\n Google Pixel 3 (2018)<\/li>\n Samsung S6 (2015)<\/li>\n ZTE Z557 (2019)<\/li>\n Wyze Cam Pan 2 (2019)<\/li>\n Xiaomi Dafang (2019)<\/li>\n Baidu Xiaodu X9 (2023)<\/li>\n TeGongMao (2023)<\/li>\n Goov V9 (2022)<\/li>\n QiaoDu (2021)<\/li>\n 360 M320 Dashcam (2020)<\/li>\n Blackview Dashcam (2022)<\/li>\n<\/ul>\nWe reached out to the companies that make these products for a response but had not heard back as of our deadline.<\/p>\n
MORE: IS YOUR DOORBELL CAMERA VULNERABLE TO JAMMING OR INTERFERENCE?<\/u><\/strong><\/p>\nEM Eye\u2019s machine learning twist<\/strong><\/h2>\nNow, before you think it’s all a blurry mess, hold on. Yes, the video comes through a bit distorted, like a TV struggling for signal, but then comes the twist: machine learning. The researchers wield this tool like a master artist, refining and enhancing until the picture is almost as good as the original.<\/p>\n
MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS<\/u><\/strong><\/p>\nThe wake-up call for our reliance on supposedly secure tech<\/strong><\/h2>\nPresented at the prestigious IEEE Symposium on Security and Privacy<\/u>, EM Eye doesn\u2019t only raise eyebrows; it raises alarms about privacy and security. It’s a wake-up call that the very devices we rely on for security could be turned against us. With a bit of engineering know-how and equipment that won\u2019t break the bank, someone could turn into a video voyeur without leaving a digital footprint.<\/p>\n
The brains behind EM Eye aren\u2019t just doomsayers; they’re also problem solvers. They’re calling on camera manufacturers to do the following three things:<\/p>\n
1) Wrap the camera wires in a special shield<\/strong>, like armor, for the signal. This blocks the EM leakage from escaping.<\/p>\n2) Keep the wires short<\/strong>. The shorter they are, the less leakage there is to capture.<\/p>\n3) Develop better ways to send the camera signal<\/strong>. Think of it like speaking in a secret code that’s harder to crack.<\/p>\nGET FOX BUSINESS ON THE GO BY CLICKING HERE<\/strong><\/p>\nHow EM Eye turns cameras into silent spies<\/strong><\/h2>\nThe principle at play is electromagnetic induction \u2014 a concept that may take you back to high school physics. Those wires inside your camera are not just cables; they’re an open book to anyone with the right antenna.\u00a0<\/p>\n
The researchers’ toolkit included a software-defined radio and a directional antenna, pinpointing the camera like a detective following a trail and turning that electromagnetic signal back into a video.<\/p>\n
Unlike other spying tactics<\/u> that require hacking into a network or intercepting cloud storage, EM Eye is a ghost operation. It doesn’t need to touch your camera’s network or storage, and it’s just as effective on offline devices like dashcams. The potential of EM Eye spans across any device with wires carrying video data like your laptop screen, your tablet or even your desktop monitor.\u00a0<\/p>\n\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n\n
\n
Home security camera<\/span> (Kurt “CyberGuy” Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\nMORE: HOW TO DETECT A HACKER SPYING ON YOUR DOORBELL CAMERA<\/u><\/strong><\/p>\nWhat can you do to help protect your privacy?<\/strong><\/h2>\nWhile EM Eye technology raises significant privacy concerns, there are steps you can take to mitigate the risks:<\/p>\n
For home security cameras<\/strong><\/h3>\nChoose shielded cameras:<\/strong> Look for cameras explicitly advertised as having shielded cables or built-in shielding against electromagnetic interference. This can significantly reduce the leakage of video data.<\/p>\nMinimize cable length:<\/strong> As the researchers noted, shorter cables emit less radiation. Opt for cameras with shorter built-in cables or minimize the length of extension cables used.<\/p>\nPosition cameras carefully: <\/strong>Avoid placing cameras near windows or outside walls, where the signal might be more easily intercepted. Consider positioning them indoors, facing outside.<\/p>\nAvoid keeping cameras running inside your home:<\/strong> You may think that having cameras running inside your home can enhance your security and peace of mind, but it can also expose you to new threats. If your cameras are not properly shielded and secured, they can leak video data through electromagnetic signals that can be picked up by malicious actors using EM Eye technology. This can allow them to spy on your private activities, possibly steal your personal information or even blackmail you.\u00a0<\/p>\nDisable unnecessary features:<\/strong> Turn off features like night vision or audio recording when not in use. These features can generate additional electromagnetic signals that could be exploited.<\/p>\nKeep firmware updated:<\/strong> Manufacturers may release firmware updates that address security vulnerabilities, including exploits similar to EM Eye. Regularly update your camera’s firmware by opening the app that controls the camera settings.<\/p>\nFor other devices<\/strong><\/h3>\nBe mindful of your surroundings: <\/strong>Be aware of your environment and potential eavesdroppers when using devices with video output, such as smartphones, laptops and tablets. Avoid using them in sensitive areas or situations where privacy is crucial.<\/p>\nUse a webcam cover:<\/strong> By using a webcam cover<\/u>, you can ensure that no one can see you through your camera without your permission. You can use a webcam cover on any device that has a camera, such as laptops, tablets, smartphones, smart TVs and gaming consoles. While a webcam cover is best, you can also physically cover your camera with a piece of tape when you\u2019re not using it to prevent unauthorized access.<\/p>\n Use privacy screens: <\/strong>Privacy screens<\/u> for laptops and tablets can help limit the viewing angle of your screen, making it harder for someone to observe your activity from the side.<\/p>\n Invest in Faraday bag:<\/strong> For high-security needs, consider using a Faraday bag or Faraday shield<\/u>, which is an enclosure used to block electromagnetic signals, to shield specific devices when necessary.<\/p>\n While these steps can help reduce the risk, they may not provide complete protection against eavesdropping with advanced technology. It’s crucial to stay informed about new developments in EM Eye technology and potential countermeasures. By taking proactive measures and staying informed, you can help protect your privacy in the face of evolving security challenges like EM Eye.<\/p>\n
Kurt’s key takeaways<\/strong><\/h2>\nWhat we have here is not just a piece of research; it’s a statement. A statement that in a world woven with wires and watched by cameras, privacy is a veil that can be lifted by those who know how to pull the strings. As we peer into our screens, perhaps it’s time to ponder who might be peering back.<\/p>\n
CLICK HERE TO GET THE FOX NEWS APP<\/strong><\/p>\nIs it about time to call on home security and dash camera manufacturers to build them with encryption so that we are protected from this type of spying? Let us know by writing us at <\/strong>Cyberguy.com\/Contact<\/u><\/strong>.<\/u><\/strong><\/p>\n For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com\/Newsletter<\/u><\/strong>.<\/u><\/strong><\/p>\n Ask Kurt a question or let us know what stories you’d like us to cover<\/u>.<\/u><\/p>\n
Answers to the most asked CyberGuy questions:<\/p>\n
Copyright 2024 CyberGuy.com.\u00a0All rights reserved.<\/i><\/p>\n<\/div>\n[ad_2]\n","protected":false},"excerpt":{"rendered":"
[ad_1] Join Fox News for access to this content Plus special access to select articles and other premium content with your account – free of charge. Please enter a valid email address. By entering your email and pushing continue, you are agreeing to Fox News’ Terms of Use and Privacy Policy, which includes our Notice …<\/p>\n","protected":false},"author":1,"featured_media":32961,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/posts\/32959"}],"collection":[{"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/comments?post=32959"}],"version-history":[{"count":0,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/posts\/32959\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/media\/32961"}],"wp:attachment":[{"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/media?parent=32959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/categories?post=32959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/tags?post=32959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}