You may be aware of the risks associated with utilizing Wi-Fi, like a potential hack attack. However, you may not know about a new risk where the Wi-Fi signals may be remotely checked for distortion in order to track human motion as they move through the signal.
It may sound like science fiction, but this is not the case. Numerous groups around the world have devoted research and development hours into refining systems that may be used to identify people in proximity of a Wi-Fi router based on how their body alters the signal. These researchers have used this method to successfully identify individuals based on gait, correctly identify letters written out in the air, and have even managed to read the lips of someone as they spoke.
Other researchers created a system that--once it had “learned” the dimensions of particular individuals--could correctly identify someone passing by out of two options with a 95 percent success rate, and 89 percent if given six choices.
This technology has also been proven capable of identifying individuals through walls, monitoring vital functions with near-perfect accuracy, and almost perfectly recognizing a sentence as it was typed out on a keyboard - all with a regular, store-bought router and clever coding on the part of the researchers.
While this method is still too sensitive and advanced to be performed outside of lab conditions by anyone who has not been trained, it is best to prepare defenses before surveillance-based attacks are possible. It’s also not a bad idea to be sure that your router is secure, anyway, as traditional hacking attacks can still pull valuable information from your device, or co-opt it to carry out other illegal activities.
To ensure that your wireless network is secure:
Following these steps will help you to keep your wireless connection intruder-less, allowing you to maintain your privacy and network security. For other security tips, keep checking back to the SCW blog.
About the author
Sam is a network engineer with a broad range of experience spanning more than 35 years. He wrote is first piece of code in 1979 and has been involved with the industry ever since. For the last 20 years, he has worked for SCW Consulting where he has embraced his passion for network technology and security.
Mobile? Grab this Article!
Tag Cloud
Comments