Guest Editorial by Brett T. Walkenhorst, Ph.D., CTO, Bastille
From cell phones and Wi-Fi to wearables, peripherals, and IoT, the modern world is swimming in wireless devices, and their wireless data is constantly racing through the air all around us.
As an increasingly interconnected global society, we are incredibly reliant on wireless technologies for conducting many of our daily activities in our personal and professional lives.
Unfortunately, the wireless protocols we so often rely on are not completely secure. Over the last 20 years, we have seen exponential growth in wireless vulnerability disclosures. With over 2,000 wireless-based CVEs (common vulnerabilities and exposures), the wireless attack surface is becoming increasingly vulnerable to exploitation.
The impacts of such attacks can range from initial access to data exfiltration to code injection and owning a device/network. This poses risks to any environment but is especially dangerous for data centers, critical infrastructure providers, and government facilities hosting classified information.
(The head of the Pentagon’s program looking into Unexplained Aerial Phenomena warned that his office now has 650 reports. The Pentagon said there is no sign of alien involvement, and could be spy drones that are able to surveil and attack American targets. Courtesy of NBC News and YouTube. Posted on Apr 19, 2023.)
Some examples of common wireless attack mechanisms include the following:
Smartphone spyware
-
-
Pegasus is a smartphone exploitation toolkit that can infect smartphones with zero user interaction
-
While the tool is meant to target terrorist and criminal organizations, it has been used against activists, journalists, politicians, and business executives around the world
-
-
Pegasus gives an attacker complete access to the phone’s resources including cameras, microphones, processing, and hardware/wireless interfaces
-
Impact ranges from data exfiltration to command and control, resulting in total lack of privacy for targeted users
-
-
Dozens of other spyware tools exist with varying levels of complexity and cost
-
Hacker cables
-
-
Hacker cables, such as the USB Ninja and O.MG cable are inexpensive, highly capable devices that allow an attacker to log keystrokes, exfiltrate data, and perform code injection through Wi-Fi or Bluetooth
-
In appearance, they are indistinguishable from standard charging cables, so the only way to reliably detect them is by monitoring their wireless emissions
-
-
All that is required to execute an attack is for an unsuspecting victim to plug the cable into their laptop or other device
-
The attacker can then remotely execute code on the device by sending commands using the wireless protocol
-
-
Rogue access points
-
-
-
Attackers can set up hotspots, Wi-Fi pineapples, and other similar devices (generally called rogue access points) to capture client devices through various means such as spoofing legitimate networks
-
-
-
-
-
The attacker can then map device behavior and network resources, implant malware, and steal data including credentials that an attacker could leverage to gain additional access
-
These devices don’t need to be inside of a target facility; they just need to be able to connect to something inside the facility
-
-
Bluetooth tethering
-
-
-
Bluetooth devices can be set up to transfer data in a way that’s similar to Wi-Fi connections (called Bluetooth tethering), enabling rapid data exfiltration
-
These connections are not reliably detectable using standard Wi-Fi security tools
-
Even among tools that can detect Bluetooth devices, the vast majority can’t detect devices when they’re paired
-
-
IoT worm
-
-
-
A worm has been developed and demonstrated to infect large numbers of IoT devices using a ZigBee wireless interface
-
Impacts can include unauthorized remote control, permanently disabled devices, and unwitting participation in wireless DDoS attacks
-
Use cases include smart homes, smart cities, and industrial control systems (e.g. critical infrastructure)
-
-
The examples above offer a small sample of attacks that can be executed wirelessly.
Some of these attacks can be conducted without cooperation from personnel or devices inside a secure facility, such as a data center.
Others require a small device to be implanted somewhere within the facility, likely connected to some network element or trusted end-user device.
Some delivery mechanisms are extremely creative, such as using Wi-Fi drones to conduct surveillance on a US-based financial firm in the summer of 2022.
(Learn about the Colonial Pipeline cyberattack which caused a major blow to the gasoline industry in the southern and eastern parts of the United States, but it also showed how vulnerable the US energy grid is to more attacks in the future. Courtesy of CNET and YouTube. Posted on May 14, 2021.)
These attacks can be conducted with little to no visibility, whatever the delivery mechanism.
Wireless signals travel at the speed of light, penetrate physical barriers, and are invisible to the eye. Attackers can leverage these invisible signals to conduct attacks in an increasingly large number of ways.
The first step in defending against these attacks is to bring visibility to the wireless domain. The next step is to use that visibility to detect anomalous and dangerous behavior.
Bastille provides continuous monitoring of wireless signals, including detection and localization of cellular, Wi-Fi, Bluetooth (including paired devices), and IoT.
By extracting metadata from the wireless packet headers, Bastille analyzes spatial, temporal, and behavioral patterns to identify anomalous behavior of wireless devices.
The combination of device detection, localization, and advanced analytics constitutes the world’s first Wireless Threat Intelligence Platform, giving customers real-time insights to help them defend their wireless infrastructure.
(Learn more about how Bastille can detect, identify and locate cell phones using only their cellular signal. Courtesy of Bastille and YouTube.)
Wireless security is increasingly recognized as a critical gap in most organizations’ security posture for data centers, board rooms, secure computing facilities, classified areas, and more.
Continuous wireless monitoring and advanced analytics are key in mitigating the threats of the increasingly vulnerable wireless attack surface.
About the author
Dr. Brett Walkenhorst is the CTO of Bastille, where he leads R&D efforts to enhance product performance and add new capabilities.
Dr. Walkenhorst has over 20 years of experience as a technology leader in RF systems and signal processing. Prior to Bastille, he led and executed R&D efforts at Lucent Bell Labs, GTRI, NSI-MI Technologies, Silvus Technologies, and Raytheon Technologies.
Dr. Walkenhorst’s experience includes RF system design, communications systems, antenna design/testing, radar, software-defined radios, geolocation, and related topics.
He has authored over 70 publications, including papers, articles, and reports, has taught numerous graduate, undergraduate, and professional short courses, and has served as an expert witness on multiple occasions. Dr. Walkenhorst is a senior Institute of Electrical and Electronics Engineers (IEEE) member and has served as the Chair of the Atlanta Chapter of the IEEE Communications Society.
Cellbusters Takes Best Cell Phone Detection in 2022 ‘ASTORS’ Homeland Security Awards
American Security Today’s Annual ‘ASTORS’ Awards is the preeminent U.S. Homeland Security Awards Program, and now entering it’s Eighth Year, continues to recognize industry leaders of Physical and Border Security, Cybersecurity, Emergency Preparedness – Management and Response, Law Enforcement, First Responders, as well as federal, state and municipal government agencies in the acknowledgment of their outstanding efforts to Keep our Nation Secure.
Cellbusters
Best Cell Phone Detection Solution
-
Zone Protector
-
The Zone Protector™ from Cellbusters provides maximum environmental protection by continuously scanning for cell phone and user-selectable RF transmissions and is far more sophisticated than a cell phone detector.
-
Comparable to a spectrum analyzer, the Zone Protector™ can scan user-definable frequency ranges and alert, notify, control a third-party device, or simply log as soon as it detects relevant transmission activity.
-
Precise frequency filtering technology, managed and controlled by a 32-bit microprocessor, enables the Zone Protector™ to deliver accurate detection with virtually zero false positives.
-
Once cellular or appropriate RF activity is detected, the Zone Protector™ can be set to activate a choice of alerting options or to log all detected activity silently.
-
Additionally, Cellbusters Zone Protector has now been updated to detect 5G phones, proving a leading edge in the market, and protecting investment in this technology for years to come.
(See a quick overview of the Zone Protector and the Zone Manger, both cell phone detection technology from Cellbusters. Courtesy of Cellbusters and YouTube.)
-
*Cellbusters has officially been recognized as an ‘ASTORS’ Awards Champion in all Seven ‘ASTORS’ Awards Programs. Thank you for your continued confidence in American Security Today!
The continually evolving ‘ASTORS’ Awards Program will highlight the trail of Accomplished Women in Leadership in 2023 and the Significance and Positive Impact of Advancing Diversity and Inclusion in our Next Generation of Government and Industry Leaders. Because #MentorshipMatters.
So be on the lookout for exciting upcoming announcements of Speakers, Presenters, Book Signing Opportunities, and Attendees at the 2023 ‘ASTORS’ Awards Presentation Luncheon in November of 2023 in New York City!
Nominations are currently being accepted for the 2023 ‘ASTORS’ Homeland Security Awards at https://americansecuritytoday.com/ast-awards/.
Comprehensive List of Categories Include:
Access Control/ Identification | Personal/Protective Equipment | Law Enforcement Counter Terrorism |
Perimeter Barrier/ Deterrent System | Interagency Interdiction Operation | Cloud Computing/Storage Solution |
Facial/IRIS Recognition | Body Worn Video Product | Cyber Security |
Video Surveillance/VMS | Mobile Technology | Anti-Malware |
Audio Analytics | Disaster Preparedness | ID Management |
Thermal/Infrared Camera | Mass Notification System | Fire & Safety |
Metal/Weapon Detection | Rescue Operations | Critical Infrastructure |
License Plate Recognition | Detection Products | COVID Innovations |
Workforce Management | Government Security Programs | And Many Others to Choose From! |
Don’t see a Direct Hit for your Product, Agency or Organization?
Submit your category recommendation for consideration to Michael Madsen, AST Publisher, at: mmadsen@americansecuritytoday.com.
Homeland Security remains at the forefront of our national conversation as we experience an immigration crisis along our southern border and crime rates that are dramatically higher than before the Pandemic across the United States.
These challenges have become a national priority with an influx of investments in innovative new technologies and systems.
Enter American Security Today, the #1 publication and media platform in the Government Security and Homeland Security fields, with a circulation of over 75,000 readers and many tens of thousands more who visit our AST website at www.americansecuritytoday.com each month.
The pinnacle of the Annual ‘ASTORS’ Awards Program is the Annual ‘ASTORS’ Awards Ceremony Luncheon Banquet, an exclusive, full-course plated meal event, in the heart of New York City.
The 2022 exclusive sold-out ‘ASTORS’ luncheon featured representatives of law enforcement, public safety, and industry leaders who came together to honor the selfless service of those who stand on the front lines and those who stand beside them – providing the capabilities and technologies to create a safer world for generations to come.
Last year marked the 20th anniversary of the Department of Homeland Security (DHS), which came out in force to discuss comprehensive collaborations between private and public sectors that have led to the development of intelligence and technologies which serve to protect our nation.
The keynote address was provided by U.S. Customs and Border Protection (CBP) Office of Field Operations (OFO) Deputy Executive Assistant Commissioner (DEAC) Diane Sabatino, who described the changes to CBP through the tragedy of 9/11 and the relentless commitment to its mission and ongoing investment in the latest technologies and innovations to protect our borders and Homeland.
The resounding theme of the DEAC’s remarks was her pride in the women and men of the CBP and their families who support them.
AST was also joined by Legendary Police Commissioner William Bratton, who spoke about his love for the City of New York, the Profession of law enforcement to which he has dedicated his life, and for which he continues to drive thought leadership and innovation.
New York City Police Department (NYPD) Chief of Department Kenneth Corey, came out to address Luncheon attendees and shared some of his experiences and the changes in policing he’s witnessed over his more than three decades of service.
FDNY Chief Joseph Jardin honored the men and women of the FDNY, not only those who currently serve but all of those who have selflessly served, with special recognition of those lost on 9/11.
Chief Jardin spoke about the continuing health battle of many following 9/11 with cancer and respiratory disease, yet now knowing the full consequences, would not have made a different decision to respond.
As Chief Jardin noted, mission-driven service is the lifeblood of every firefighter, volunteer, and sworn member, and has been so throughout the history of the Fire Service.
Former head of the FBI’s active shooter program, Katherine Schweit joined AST to sign complimentary copies of her book, ‘STOP THE KILLING: How to End the Mass Shooting Crisis, thanks to the generosity of our 2022 ‘ASTORS’ Awards Sponsors.
The 2022 ‘ASTORS’ Awards Program was Proudly Sponsored by NEC National Security Systems (NSS), ATI Systems, Automatic Systems of America, guardDog AI, Fortior Solutions, IPVideo Corporation, Rajant Corporation, RX Global, and SIMS Software!
We were pleased to welcome the esteemed New York City Fire Department (FDNY); the New York City Police Department (NYPD); and the NYC Hospital Police, as well as Executive Management from the U.S. Cybersecurity and Infrastructure Security Agency (CISA), and many other DHS agencies, Federal law enforcement agencies, and private/public partnerships such as the National Association of Women Law Enforcement Executives (NAWLEE), the 30×30 Initiative, a coalition of professionals advancing the representation of women in policing; and Operation Lifesaver, Inc. (OLI) (rail safety advocates).
The prestigious Annual ‘ASTORS’ Homeland Security Awards Program highlights the most cutting-edge and forward-thinking security solutions coming onto the market today, to ensure our readers have the information they need to stay ahead of the competition and keep our Nation safe – one facility, street, and city at a time.
In 2022 over 240 distinguished guests representing Federal, State, and Local Governments, and Industry Leading Corporate Firms gathered from across North America, Europe, and the Middle East to be honored among their peers in their respective fields.
Each year, to keep our communities safe and secure, security dealers, installers, integrators, and consultants, along with corporate, government, and law enforcement/first responder practitioners, convene in New York City to network, learn and evaluate the latest technologies and solutions from premier exhibiting brands at ISC East, the Natural Disaster & Emergency Management Expo (NDEM EXPO), and the ASIS NYC Expo.
ISC East is the Northeast’s leading security & public safety event, hosted in collaboration with sponsor Security Industry Association (SIA) and in partnership with ASIS NYC.
Corporate firms, the majority of which return year to year to build upon their Legacy of Wins, include:
Advanced Detection Technologies, AMAROK, ATI Systems, Axis Communications, Automatic Systems, BriefCam, Canon U.S.A., Cellbusters, CornellCookson, CyberArk Fortior Solutions, guardDog.ai, Hanwha Techwin of America, High Rise Escape Systems, IPVideo Corporation, Konica Minolta Business Solutions, NEC National Security Systems, NICE Public Safety, OnSolve, PureTech Systems, Quantum Corporation, Rave Mobile Safety, Regroup Mass Notification, Robotic Assistance Devices, Rajant Corporation, SafeLogic, Select Engineering Services LLC, Singlewire Software, SolarWinds Worldwide, Teledyne FLIR, Valor Systems, and West Virginia American Access Control Systems, just to name a few!
Why American Security Today?
The traditional security marketplace has long been covered by a host of publications putting forward the old-school basics to what is Today – a fast-changing security landscape.
American Security Today is uniquely focused on the broader Homeland Security & Public Safety marketplace with over 75,000 readers at the Federal, State, and local levels of government as well as firms allied to the government.
American Security Today brings forward a fresh compelling look and read with our customized digital publications that hold readers’ eyes throughout the story with cutting-edge editorial that provides solutions to their challenges.
Harness the Power of the Web – with our 100% Mobile Friendly Publications
AST Digital Publications are distributed to over 75,000 qualified government and homeland security professionals, in federal, state, local, and private security sectors.
‘PROTECTING OUR NATION, ONE CITY AT A TIME’
AST Reaches both Private & Public Experts, essential to meeting these new challenges.
Today’s new generation of public safety and security experts need real-time knowledge to deal with domestic and international terrorism, lone wolf attacks, unprecedented urban violence, shifts in society, culture, and media bias – making it increasingly difficult for Homeland Security, Law Enforcement, First Responders, Military and Private Security Professionals to implement coordinated security measures to ensure national security and improve public safety.
These experts are from Government at the federal, state, and local levels as well as from private firms allied to the government.
AST provides a full plate of topics in our AST Monthly Magazine Editions, AST Website, and AST Daily News Alerts, covering 23 Vital Sectors such as Access Control, Perimeter Protection, Video Surveillance/Analytics, Airport Security, Border Security, CBRNE Detection, Border Security, Ports, Cybersecurity, Networking Security, Encryption, Law Enforcement, First Responders, Campus Security, Security Services, Corporate Facilities, and Emergency Response among others.
AST has Expanded readership into integral Critical Infrastructure audiences such as Protection of Nuclear Facilities, Water Plants & Dams, Bridges & Tunnels, and other potential targets of terrorism.
Other areas of concern include Transportation Hubs, Public Assemblies, Government Facilities, Sporting & Concert Stadiums, our Nation’s Schools & Universities, and Commercial Business Destinations – all enticing targets due to the large number of persons and resources clustered together.
To learn more, please see the 2022 ‘ASTORS’ CHAMPIONS Edition Fully Interactive Magazine – the Best Products of 2022 ‘A Year in Review.’
The Annual CHAMPIONS edition reviews ‘ASTORS’ Award Winning products and programs, highlighting key details on many of the winning firm’s products and services, including video interviews and more.
The 2022 CHAMPIONS serves as your Go-To Source through the year for ‘The Best of 2022 Products and Services‘ endorsed by American Security Today – and can satisfy your agency’s and/or organization’s most pressing Homeland Security and Public Safety needs.
From Physical Security (Access Control, Critical Infrastructure, Perimeter Protection, and Video Surveillance Cameras and Video Management Systems), to IT Security (Cybersecurity, Encryption, Data Storage, Anti-Malware, and Networking Security – to name a few), the 2022 ‘ASTORS’ CHAMPIONS EDITION has what you need to Detect, Delay, Respond to, and Mitigate today’s real-time threats in our constantly evolving security landscape.
It also features guest editorial pieces from some of the security industry’s most respected leaders and recognized firms in the 2022 ‘ASTORS’ Awards Program.
For more information on All Things American Security Today, as well as the 2023 ‘ASTORS’ Awards Program, please contact Michael Madsen, AST Publisher at mmadsen@americansecuritytoday.com.
AST strives to meet a 3 STAR trustworthiness rating, based on the following criteria:
- Provides named sources
- Reported by more than one notable outlet
- Includes supporting video, direct statements, or photos