Lamphone attack explained: How hackers eavesdrop by watching a light bulb's vibrations - YouTube

Channel: Governing Goliath

[0]
You are not going to believe this,
[3]
but the latest cyber security vulnerability involves just a
[8]
light bulb.
[9]
The lamp phone attack explained today on Governing
[13]
Goliath.
[21]
Thomas Edison was credited with inventing the light bulb in the 19th century,
[26]
but even he would never have imagined that this invention could be
[31]
used for nefarious purposes.
[33]
Earlier this year is really scientists discovered that hackers in spies can
[38]
decipher private conversations by recording the middle of degree
[43]
vibrations from hanging light bulbs from extraordinary
[47]
distances away. In fact,
[50]
any sound in a room can be recorded with no requirement to
[55]
hack anything. And without planting a secret device of any kind,
[60]
all you need is line of sight to a hanging light bulb.
[65]
This is what's known as a lamp phone attack,
[69]
and it's possible with gear that costs less than $1,000 to
[73]
execute by observing light bulb vibrations with an electro
[78]
optical sensor.
[80]
The fluctuations in light that result from millidegree movements can be
[84]
converted into an electronic signal.
[88]
Check out this video from Cybersecurity Labs at Ben Gurion University, where
[93]
they give an incredibly detailed explanation of this type of
[98]
attack.
[101]
Inside the office.
[102]
We played two songs and a statement made by Donald Trump via speakers.
[106]
A telescope was directed at a hanging 827 bulb in the office.
[110]
As can be seen from the video,
[111]
the experiment is completely passive and relies purely on a standard bulb.
[117]
The sound that was was played inside the office cannot be heard from the bridge.
[122]
To test their theory. These is really scientists,
[125]
simply attached a Thor Labs,
[127]
electro optical sensor to a home telescope and were able to decipher
[132]
songs being played inside a building while they were in a parking lot,
[137]
over 80 feet away.
[140]
The songs they chose for this type of experiment were the Beatles,
[144]
Let It Be and Coldplay's Clocks, which, hey,
[148]
great songs, but as meticulous as their research was,
[152]
it would have been nice had they included more appropriate song
[157]
choices. I mean, let's think about it.
[160]
How about Secret Agent Man by Johnny Rivers or perhaps Pink
[165]
Floyd's Shine On You Crazy Diamond? Details,
[169]
people details. Whatever. I digress.
[174]
After recording the light bulb vibrations from these songs,
[177]
they use Google's Cloud API and Shazamm to make positive
[182]
identifications. So in essence,
[185]
the lamphone attack can be executed for less than $1,000 by
[190]
anyone with a laptop and free software. Now,
[194]
there are some caveats to this type of attack.
[196]
It's not clear if a light bulb mounted in a fixed lamp or a ceiling
[201]
fixture would vibrate enough to get the same sort of signal and
[206]
curtains would seem to be a good mitigation factor against this type of
[210]
attack. Regardless,
[213]
researchers stressed that leveraging electro optical sensors in privacy
[218]
hacks will continue to undergo innovation,
[221]
making it even easier to ease,
[223]
drop on conversations behind closed doors.
[228]
So how long do you think it'll take before the FBI and CIA make quick
[233]
work of this lamphone attack? I mean,
[236]
what are the odds that they're using it already?
[241]
Let me know what you think in the comments and hit that subscribe button.
[244]
If you want to see more of this type of content I post every Tuesday
[249]
and Friday, and I always leave links to my research in the descriptions below.
[255]
Thanks for tuning in and I'll see you next time.