The Department of Homeland Security (DHS) has announced that it has developed a four-legged robot designed to jam the wireless transmissions of smart home devices. The robot was revealed at the 2024 Border Security Expo and is called NEO. It is built using the Quadruped Unmanned Ground Vehicle (Q-UGV) and looks a lot like the Boston Dynamics Spot robot.

According to the transcript of the speech by DHS Federal Law Enforcement Training Centers (FLETC) director Benjamine Huffman, acquired by 404 Media, NEO is equipped with an antenna array that is designed to overload home networks, thus disrupting devices that rely on Wi-Fi and other wireless communication protocols. It will thus likely be effective against a wide range of popular smart home devices that use wireless technologies for communications.

  • Trainguyrom@reddthat.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    5 months ago

    WPA2 (and I believe 3 as well) are notoriously easy to crack the passwords to. Wired is truly best for security, and for wireless WPA Enterprise can help with securing the network

    • KairuByte@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      4
      ·
      5 months ago

      I don’t believe this is the case. 3 is fairly robust, and 2 is still just brute forcing, though rapidly on a local CPU. The one that’s trivial is trivial to crack is WEP.

      • Trainguyrom@reddthat.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        5 months ago

        WPA2 is pretty trivial too. Not as easy as WEP since you do have to locally brute-force the PSK (password), but that’s pretty quick on modern systems. We had multiple assignments when I was in college that had cracking a WPA2 password as a step (in the interest of time, the instructor used passwords from the RockYou list but still)

        • KairuByte@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          4
          ·
          5 months ago

          Yeah, if you’re using common words or variants thereof, you’re gonna have a bad time. But a 128 character string of random characters is going to be functionally safe from such an attack, for now.

          • JasonDJ@lemmy.zip
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            5 months ago

            And you’ll go crazy every time you try to add a device that doesn’t support QR code scanning.

            Just use multiple dictionary words with a symbol or two thrown in. Or go all out and set up 802.1x with client certificates and save the PSKs for a firewalled segment of less important crap.

            Although it’s worth mentioning that wireless security means nothing to jamming. Jamming is RF, it’s destroying layer 1 before WPA matters.