Black Hat: Researchers explain how to disable home security systems

Share this article:
The gear that two researchers used to bypass home security systems.
The gear that two researchers used to bypass home security systems.

Two physical security experts demonstrated on Wednesday how they can disable a home or office's security system within minutes by using easy-to-acquire, cost-effective and often basic equipment.

Speaking at Black Hat 2013 in Las Vegas, Drew Porter and Stephen Smith, two senior security researchers at Phoenix-based security consultancy Bishop Fox, explained how it doesn't take much work.

The pair said there are some 36 million home- or office-installed security systems in America. Many of them consist of three basic components: door and window sensors, motion sensors and keypads.

Disabling the first two are fairly easy. Window sensors, depending on how they are constructed, can be undone by magnets or sheet metal. Motion sensors can be turned off, they discovered and demonstrated in a video, by a piece of cardboard or the light from a cigarette lighter. (The researchers attempted to showcase the exploits on stage, but encountered technical difficulties).

The harder piece to immobilize is the keypad. And it's also the most important.

"That's where everything connects to, and it reports out," Porter told the audience of several hundred. 

Key pads, which call out to police if there is a security breach, rely on different data connections to place the alert: usually landline and cellular.

To bypass the pads, the researchers relied on software-defined radio systems – USRP or the cheaper bladeRF (it runs a few hundred dollars) – which essentially jams the signal by sending commands that asks the key pad to latch on to a rogue cell phone network.

"You overpower the system," Porter said. "We pretend to be AT&T, and these devices jump right on it."

That prevents the key pad from calling out to the cops over a cell network. To prevent it from using the landline connection, attackers would need physical access.

The researchers said they are amicably working with affected vendors, whom they would not name. But many other manufacturers that they didn't test are likely susceptible, they said.

"They probably want to look into them, maybe update them," Smith said.

Share this article:

Sign up to our newsletters

More in News

BlackBerry acquires voice and data encryption firm Secusmart

On Tuesday it was announced that the phonemaker would purchase the voice and data encryption firm.

OTI report exposes economic costs of NSA spying

OTI report exposes economic costs of NSA spying

A report from New America OTI found that the NSA surveillance program has had a chilling effect on U.S. commerce and foreign policy.

Breach index: Encryption used in 23 percent of Q2 incidents

Breach index: Encryption used in 23 percent of ...

Out of the 237 disclosed data breaches last quarter, encryption was used in only 10 instances.