WiFi Jammers

A recent TV news report on criminals in Morris County using Wi-Fi jammers to disable security cameras and communications grabbed our attention. It should grab yours, too.

The news report focused on a crime ring that’s using Wi-Fi jammers to break into homes. In some cases, they’ll install their own surveillance cameras in a property’s landscaping to know when residents leave their homes. In this case, the homeowner was in his basement when he heard a loud noise coming from the ground floor of his residence. He used his home surveillance cameras to see someone attempting to enter his home. He soon lost his camera and phone service, indicating to police that a Wi-Fi jamming device was in use. The resident was still unable to utilize his cellular phone to call for assistance due to the jamming device.

Let’s look at that last sentence first. The reason the resident couldn’t use his cellphone is because it was likely set to make calls on the Wi-Fi network if the network is available. Our guess is that he could have made the call if he had turned off Wi-Fi on his phone. Heed that point when you face an emergency.

That can be especially true when it comes to security devices. Hard-wired devices perform better and more reliably. Yes, it sounds old-fashioned, but it works. If you have a security system installed by an alarm company, it’s likely hard-wired and connected to a monitoring station via a cellular network – and it has a battery backup in case the power goes out.

Wi-Fi networks are low-hanging fruit for criminals, and we make that fruit more accessible through our own ignorance or laziness. You can’t make your Wi-Fi totally jam-proof, but you can make your network more secure.

The following steps are nothing new to long-time clients and readers of this newsletter, but let’s run through them anyway:

  • Whenever you install a new device – especially a security device – that’s tied to your Wi-Fi network, IMMEDIATELY change the default username (it’s usually “admin”) and the password (it’s usually 1234).
  • Make sure your firewall software is up to date and running to keep out unwanted intruders. It’s one thing to be jammed. It’s another thing to be invaded.
  • Make sure you keep all software for operating systems, hardware and apps up to date and running. Updates contain security patches and bug fixes as well as performance enhancements. A single weak link anywhere in your technology chain can expose your entire system.

In our opinion, a security camera system that’s hardwired to a central location in your home but is accessible through the internet – independently of Wi-Fi – is best. We can help you with the internet connection and show you how to access your security system from anywhere in the world.

We can also help you prevent intrusions by outsiders by providing a thorough security audit of your technology system and making recommendations to improve security. That can include the installation of new systems and user training.

We all have a lot at stake in our homes and businesses. With the rise in hacking and the use of technology to break down our defenses, it makes sense to take every step you can to harden those defenses. Call us – 973433-6676 – or email us to talk about your needs. And make sure you turn off Wi-Fi on your cell phone in an emergency.

Behind Last Month’s Internet Breakdown

We’ve harped for years about the inherent conflict of convenience vs. online security. That conflict reared its ugly head during the distributed denial-of-service attacks, using – maybe – millions of computers to hit some of the world’s largest and most popular e-commerce and news websites.

Investigators have been able to pin part of the cause on hackers using IP addresses commandeered from millions of home devices, commonly called IoT (Internet of Things) – such as interior and exterior security cameras, doorbell and baby monitors, thermostats, etc. – that are increasingly popular with consumers. Too many people install them on their Wi-Fi networks and never bother to change default user names or passwords. That just leaves the door wide open to have their devices hijacked and used for malicious purposes.

From our point of view, it’s what happens when we get lazy and sloppy because we are so tuned into convenience. And, a DDoS attack can be the least consequential problem for you, personally. The hacker can gain control of your device and peak into your house at will – and even change your thermostat settings.

Users are not the only sloppy parties in this turn of events. The device manufacturers share the blame because they don’t require you to reset your user name or password as part of the installation process. After all, they don’t want the blame for your inconvenience, and we think that’s wrong. They can require you to reset user names and passwords as part of the installation process.

You can help prevent these DDoS attacks by making sure you change user names and passwords for the devices during the installation process. You can further protect your privacy by making sure your Wi-Fi network has a good, strong password. Too many people leave the default user name and password on their routers, too.

We should note that businesses, including professional services providers, can be just as lax as home users. We’ve had client systems hacked because their system administrators did not set up stronger log-in credentials.

We strongly urge everyone to have somebody look at their networks and IT systems and procedures once or twice a year. This may not be a comfortable analogy for some people, but even though you brush your teeth and floss every day, you still maintain better health when you visit the dentist once or twice a year for a cleaning and exam.

If you avoid the visit because of expense, it’s costlier – and more painful – to fix the problem instead of preventing it. What would be your cost for system downtime and repairing security breaches? Contact us by phone – 973-433-6676 – or email to find out what our security audit would cover for you and to set it up. In today’s world, you can’t afford to overlook any possible weakness.