馃攳
Lamphone attack explained: How hackers eavesdrop by watching a light bulb's vibrations - YouTube
Channel: Governing Goliath
[0]
You are not going to believe this,
[3]
but the latest cyber security
vulnerability involves just a
[8]
light bulb.
[9]
The lamp phone attack
explained today on Governing
[13]
Goliath.
[21]
Thomas Edison was credited with inventing
the light bulb in the 19th century,
[26]
but even he would never have
imagined that this invention could be
[31]
used for nefarious purposes.
[33]
Earlier this year is really scientists
discovered that hackers in spies can
[38]
decipher private conversations
by recording the middle of degree
[43]
vibrations from hanging light
bulbs from extraordinary
[47]
distances away. In fact,
[50]
any sound in a room can be
recorded with no requirement to
[55]
hack anything. And without planting
a secret device of any kind,
[60]
all you need is line of sight
to a hanging light bulb.
[65]
This is what's known
as a lamp phone attack,
[69]
and it's possible with gear
that costs less than $1,000 to
[73]
execute by observing light
bulb vibrations with an electro
[78]
optical sensor.
[80]
The fluctuations in light that result
from millidegree movements can be
[84]
converted into an electronic signal.
[88]
Check out this video from Cybersecurity
Labs at Ben Gurion University, where
[93]
they give an incredibly detailed
explanation of this type of
[98]
attack.
[101]
Inside the office.
[102]
We played two songs and a statement
made by Donald Trump via speakers.
[106]
A telescope was directed at a
hanging 827 bulb in the office.
[110]
As can be seen from the video,
[111]
the experiment is completely passive
and relies purely on a standard bulb.
[117]
The sound that was was played inside the
office cannot be heard from the bridge.
[122]
To test their theory.
These is really scientists,
[125]
simply attached a Thor Labs,
[127]
electro optical sensor to a home
telescope and were able to decipher
[132]
songs being played inside a building
while they were in a parking lot,
[137]
over 80 feet away.
[140]
The songs they chose for this type
of experiment were the Beatles,
[144]
Let It Be and Coldplay's
Clocks, which, hey,
[148]
great songs, but as meticulous
as their research was,
[152]
it would have been nice had they
included more appropriate song
[157]
choices. I mean, let's think about it.
[160]
How about Secret Agent Man by
Johnny Rivers or perhaps Pink
[165]
Floyd's Shine On You
Crazy Diamond? Details,
[169]
people details. Whatever. I digress.
[174]
After recording the light bulb
vibrations from these songs,
[177]
they use Google's Cloud API
and Shazamm to make positive
[182]
identifications. So in essence,
[185]
the lamphone attack can be
executed for less than $1,000 by
[190]
anyone with a laptop
and free software. Now,
[194]
there are some caveats
to this type of attack.
[196]
It's not clear if a light bulb
mounted in a fixed lamp or a ceiling
[201]
fixture would vibrate enough to
get the same sort of signal and
[206]
curtains would seem to be a good
mitigation factor against this type of
[210]
attack. Regardless,
[213]
researchers stressed that leveraging
electro optical sensors in privacy
[218]
hacks will continue to undergo innovation,
[221]
making it even easier to ease,
[223]
drop on conversations behind closed doors.
[228]
So how long do you think it'll take
before the FBI and CIA make quick
[233]
work of this lamphone attack? I mean,
[236]
what are the odds that
they're using it already?
[241]
Let me know what you think in the
comments and hit that subscribe button.
[244]
If you want to see more of this
type of content I post every Tuesday
[249]
and Friday, and I always leave links to
my research in the descriptions below.
[255]
Thanks for tuning in and
I'll see you next time.
Most Recent Videos:
You can go back to the homepage right here: Homepage





