Amazon Echo

Lasers Can Take Over Voice Assistant Systems From Long Distances, Research Finds

By pointing a laser or even a flashlight into the microphone of a Google Home, Siri or Alexa system, the researchers were able to control the devices and the systems connected to them.

Security researchers in Japan and the University of Michigan discovered a startling flaw in voice-controlled assistant systems that revealed how easily devices like Siri, Alexa and Google Home could be manipulated.

In a paper published on Monday, cybersecurity experts shared details of how they were able to use easily available laser pointers, and in some cases flashlights, to take over Amazon, Google and Apple digital assistants from hundreds of feet away.

Some examples include opening a garage door by pointing a laser at a voice assistant connected to the system, and even climbing to the top of a bell tower at the University of Michigan to manipulate a Google Home in an office building 230 feet away, The New York Times reported.

The longest distance that the researchers were able to control a voice assistant was more than 350 feet away, showcasing a glaring vulnerability in the systems.

“This opens up an entirely new class of vulnerabilities,” Kevin Fu, a computer science professor at the University of Michigan, told the Times. “It’s difficult to know how many products are affected, because this is so basic.”

All companies affected by the issue, including Tesla, Ford, Amazon, Apple and Google, were alerted to the light vulnerability prior to the release of the paper. Each corporation said they were studying the issues detailed in the research.

Perhaps the most concerning aspect of the report is that by taking over the digital assistant systems, hackers would have the ability to access and control any systems connected to a Google Home or similar product. The researchers pointed out that they could have unlocked cars or started vehicles remotely if they were connected to the devices.

To fix the issue, most microphones on the systems would need to be redesigned because covering the mic with a piece of tape does not address the problem. Dirt shields on several microphones were not able to block the lasers and the commands, according to Fu.

There is no indication that lasers or flashlights have been used to carry out cyberattacks or takeovers of the devices, according to the researchers. As tech companies assess the problem, experts advise users of voice-controlled assistants to move their devices away from areas where it can be seen from the outside and limit the number of systems connected to them.

“This is the tip of the iceberg,” Fu said. “There is this wide gap between what computers are supposed to do and what they actually do. With the internet of things, they can do unadvertised behaviors, and this is just one example.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3