Businesses

Drones, Surveillance, and Facial Recognition: Startup Named 'Sauron' Pitches Military-Style Home Security (msn.com) 124

The Washington Post details a vision of home security "pitched by Sauron, a Silicon Valley start-up boasting a waiting list of tech CEOs and venture capitalists." In the future, your home will feel as safe from intruders as a state-of-the-art military base. Cameras and sensors surveil the perimeter, scanning bystanders' faces for potential threats. Drones from a "deterrence pod" scare off trespassers by projecting a searchlight over any suspicious movements. A virtual view of the home is rendered in 3D and updated in real time, just like a Tesla's digital display. And private security agents monitor alerts from a central hub.... By incorporating technology developed for autonomous vehicles, robotics and border security, Sauron has built a supercharged burglar alarm [argued Sauron co-founder Kevin Hartz, a tech entrepreneur and former partner at Peter Thiel's venture firm Founders Fund]...

For many tech elites, security is both a national priority and a growing concern in their personal lives... After the presidential election last month, the start-up incubator Y Combinator put out a request for "public safety technology" companies, such as those that produce tools that facilitate a neighborhood watch or technology that uses computer vision to identify "suspicious activities or people in distress from video feeds...." Sauron has raised $18 million in funding from executives behind Flock Safety and Palantir, the data analytics firm, [and] defense tech investors such as 8VC, a venture firm started by Palantir co-founder Joe Lonsdale... Sauron is targeting homeowners at the high end of the real estate market, beginning with a private event at Abraham's home on Thursday, during Art Basel Miami Beach, the annual art exhibition that attracts collectors from around the world. The company plans to launch in San Francisco early next year, before expanding to Los Angeles and Miami...

Big Tech companies haven't deployed tools such as facial recognition as aggressively as Hartz would like. "If somebody comes onto my property, I feel like I should know who that is," Hartz said... In recent years massive investments have driven down the cost of drones, high-resolution cameras and lidar sensors, which use light detection to create 3D maps. Sauron uses lower-cost hardware and tools like facial recognition, combined with custom-built software adapted for residential use. For facial recognition, it will use a third-party service called Paravision... Sauron is still figuring out how to incorporate drones, but it is already imagining more aggressive countermeasures, Hartz said. "Is it a machine that could take out a bad actor with a bullet or something?"

Crime

Burglars are Jamming Wi-FI Security Cameras (pcworld.com) 92

An anonymous reader shared this report from PC World: According to a tweet sent out by the Los Angeles Police Department's Wilshire division (spotted by Tom's Hardware), a small band of burglars is using Wi-Fi jamming devices to nullify wireless security cameras before breaking and entering.

The thieves seem to be well above the level of your typical smash-and-grab job. They have lookout teams, they enter through the second story, and they go for small, high-value items like jewelry and designer purses. Wireless signal jammers are illegal in the United States. Wireless bands are tightly regulated and the FCC doesn't allow any consumer device to intentionally disrupt radio waves from other devices. Similar laws are in place in most other countries. But signal jammers are electronically simple and relatively easy to build or buy from less-than-scrupulous sources.

The police division went on to recommend tagging value items like a vehicle or purse with Apple Air Tags — and "talk to your Wi-Fi provider about hard-wiring your burglar alarm system."

And among their other suggestions: Don't post on social media that you're going on vacation...
Crime

Wi-Fi Jamming To Knock Out Cameras Suspected In Nine Minnesota Burglaries (tomshardware.com) 174

Mark Tyson reports via Tom's Hardware: A serial burglar in Edina, Minnesota is suspected of using a Wi-Fi jammer to knock out connected security cameras before stealing and making off with the victim's prized possessions. [...] Edina police suspect that nine burglaries in the last six months have been undertaken with Wi-Fi jammer(s) deployed to ensure incriminating video evidence wasnâ(TM)t available to investigators. The modus operandi of the thief or thieves is thought to be something like this:

- Homes in affluent areas are found - Burglars carefully watch the homes - The burglars avoid confrontation, so appear to wait until homes are empty - Seizing the opportunity of an empty home, the burglars will deploy Wi-Fi jammer(s) - "Safes, jewelry, and other high-end designer items," are usually taken

A security expert interviewed by the source publication, KARE11, explained that the jammers simply confused wireless devices rather than blocking signals. They usually work by overloading wireless traffic âoeso that real traffic cannot get through,â the news site was told. [...] Worryingly, Wi-Fi jamming is almost a trivial activity for potential thieves in 2024. KARE11 notes that it could buy jammers online very easily and cheaply, with prices ranging from $40 to $1,000. Jammers are not legal to use in the U.S. but they are very easy to buy online.

It's funny.  Laugh.

LAPD Officers Fired for Catching a Snorlax Instead of a Burglar Denied Appeal (theverge.com) 103

Two LAPD officers who were fired from their jobs in 2017 for playing Pokemon Go while on duty have had their appeal for reinstatement denied by a California judge. From a report: The officers' squad car video camera showed the two officers, Louis Lozano and Eric Mitchell, ignored a request for backup to play the game, according to court documents. The pair were stationed near a robbery in progress, and after the responding officers put out a call for backup, Lozano and Mitchell seemingly ignored the call and left the area. When asked later why they hadn't responded to the call, the two officers said they were in a loud area and couldn't hear their radio. Lozano and Mitchell's supervisor was skeptical of their explanation and checked the in-car recording system (commonly known as a dashcam), which revealed the two had heard the call and chose to go elsewhere as they didn't want to help. The supervisor reported the incident, which opened a formal investigation. According to court filings, an extensive review of the in-car video system revealed that shortly after leaving the scene of the robbery, the two officers could be heard discussing Pokemon Go, including a Snorlax that had appeared and the best route to intercept and catch it.
Privacy

4+ Years in Prison for Home Security Worker Who Accessed Security Cameras to Spy on Women (msn.com) 107

A security camera installation worker for ADT was sentenced Wednesday to a little more than four years in federal prison for illegally accessing the security cameras of more than 200 North Texas customers, reports the Dallas Morning News: Telesforo Aviles, age 35, faced a maximum of five years in prison for computer fraud under the terms of his plea agreement, in which he admitted to accessing customer accounts over 9,600 times since 2015.

He was cuffed and taken into custody to begin serving his sentence after the hearing.

The quiet and introverted technician, a senior supervisor with 17 years at ADT, was caught last year after the company was alerted by a customer to suspicious activity, said his lawyer, Tom Pappas. Aviles, who is married with five children, turned himself in when he was asked to, Pappas said. "He's mortified by what he did," Pappas said. "He sees what he did as a betrayal of himself, too." Of the nearly 10,000 images Aviles accessed, about 40 were "sexual in nature" and none involved children, Pappas said.

An ADT spokesman said the company had no comment.

Assistant U.S. Attorney Sid Mody had asked Starr to give Aviles the maximum sentence, saying that while 217 accounts were accessed, the total number of victims is much higher given that each household had multiple family members. That violation, he said, destroyed "in the worst way" their sense of feeling safe and secure at home... Starr said he considered Aviles' cooperation with authorities and lack of a criminal history as well as the fact that the conduct involved a "lengthy period of time." Aviles noted the homes that had "attractive women" and repeatedly logged into their accounts to view the footage, prosecutors said...

ADT has since been hit with class-action lawsuits from customers over the breach.

The article also notes the story of one woman who filed a federal lawsuit last month against ADT. She'd told the court Aviles persuaded her to install cameras in her bedrooms after she'd specifically questioned whether it was truly necessary. "Aviles told her that it was necessary because a burglar could enter the house through the bedroom windows, and the cameras would monitor that," her lawsuit says. "Of course, Aviles' placement of the cameras had nothing to do with potential burglars."

In a statement filed with the court, one female homeowner reportedly wrote that "This deliberate and calculated invasion of privacy is arguably more harmful than if I had installed no security system and my house had been burglarized."
Power

The Pandemic Brings a New Surge in Popularity For Electric Bikes (sun-sentinel.com) 137

Battery-powered bikes "have become a compelling alternative for commuters who are being discouraged from taking public transportation and Ubers," according to the New York Times' lead consumer tech writer. In March, sales of e-bikes jumped 85% from a year earlier, according to the NPD Group, a research firm. Amazon, Walmart and Specialized are sold out of most models. Even smaller brands like Ride1Up and VanMoof have waiting lists. That's a remarkable shift. For many years, e-bikes carried the stigma of being vehicles for lazy pedalers and seniors... "I was convinced that e-bikes would completely change cities all over the world in the next 10 years, but it seems like because of this crisis, suddenly it's all happening in the next three or four months," said Taco Carlier, the chief executive of VanMoof, which is based in Amsterdam.
The Times' writer notes that e-bikes are at least twice as heavy as a road bike, make an attractive target for burglar, and may need manufacturer assistance for major repairs. But he ultimately concludes that "Despite some misgivings, my experience with e-bikes made me realize the benefits are far greater than the downsides." Most important, e-bikes kept me out of my car. Whenever I had a reason to go outside — like making a trip to the grocery store or dropping off baked goods at a friend's — I preferred riding an e-bike. This will become increasingly important in the coming months. As businesses reopen, the Centers for Disease Control and Prevention has advised commuters to drive in cars alone. An e-bike may become crucial for squeezing through nightmare traffic.
And the Times' reporter also claims another benefit for e-bikes: joy. "On an e-bike, I saw more of the outdoors than I normally would, while keeping a safe distance from people."
It's funny.  Laugh.

New Alexa Skill Plays Fake Stupid Arguments To Scare Off Burglars (techcrunch.com) 69

TechCrunch reports on a new Alexa skill called "Away Mode". Instead of lights and noises, you can keep your home safe from unwanted visitors by playing lengthy audio tracks that sound like real -- and completely ridiculous -- conversations. When you launch Away Mode, Alexa will play one of seven audio tracks penned by comedy writers from SNL, It's Always Sunny in Philadelphia, and UCB... These include gems like "Couple Has Breakup While Also Trying to Watch TV," "Two Average Guys Brainstorm What's Unique About Themselves So They Can Start a Podcast About It," "Emergency PTA Meeting To Discuss Memes, Fidget Spinners, and Other Teen Fads," and more. There are conversations from a book club where no one discusses the book, a mom walking her daughter through IKEA assembly over the phone, a stay-at-home mom losing her s***, and argument over a board game....

After enabling the skill on your Alexa device, you can cycle through the various conversations by saying "Next"... The tracks themselves are around an hour or so long... There are other "burglar deterrent" skills for Alexa if you're interested in the general concept, like that play fake house alarms or sound like guard dogs. But Away Mode is just a little more fun.

It's the brainchild of San Francisco-based Hippo Insurance, whose brand manager hopes to get people thinking about home security (though she says it isn't meant to be a serious security tool). Yet, "Theoretically it's a good idea," adds former California police chief Jim Bueermann (now the head of the nonprofit Police Foundation). "If this thing mimics real conversation, it's much more likely to trick the burglar into believing somebody is home."

In one fake argument, a board game player shouts "Hand me the rulebook! The other rulebook! That's the rules reference.... No, it's in the learn-to-play guide. That's the quick reference!"
Power

Smart Electricity Meters Can Be Dangerously Insecure, Warns Expert (theguardian.com) 163

An anonymous reader quotes a report from The Guardian: Smart electricity meters, of which there are more than 100 million installed around the world, are frequently "dangerously insecure," a security expert has said. The lack of security in the smart utilities raises the prospect of a single line of malicious code cutting power to a home or even causing a catastrophic overload leading to exploding meters or house fires, according to Netanel Rubin, co-founder of the security firm Vaultra. If a hacker took control of a smart meter they would be able to know "exactly when and how much electricity you're using," Rubin told the 33rd Chaos Communications Congress in Hamburg. An attacker could also see whether a home had any expensive electronics. "He can do billing fraud, setting your bill to whatever he likes [...] The scary thing is if you think about the power they have over your electricity. He will have power over all of your smart devices connected to the electricity. This will have more severe consequences: imagine you woke up to find you'd been robbed by a burglar who didn't have to break in. "But even if you don't have smart devices, you are still at risk. An attacker who controls the meter also controls the meter's software, allowing him to cause it to literally explode." The problems at the heart of the insecurity stem from outdated protocols, half-hearted implementations and weak design principles. To communicate with the utility company, most smart meters use GSM, the 2G mobile standard. That has a fairly well-known weakness whereby an attacker with a fake mobile tower can cause devices to "hand over" to the fake version from the real tower, simply by providing a strong signal. In GSM, devices have to authenticate with towers, but not the other way round, allowing the fake mast to send its own commands to the meter. Worse still, said Rubin, all the meters from one utility used the same hardcoded credentials. "If an attacker gains access to one meter, it gains access to them all. It is the one key to rule them all."
Security

My United Airlines Website Hack Gets Snubbed 187

Bennett Haselton writes: United Airlines announced that they will offer up to 1 million air miles to users who can find security holes in their website. I demonstrated a way to brute-force a user's 4-digit PIN number and submitted it to them for review, emailing their Bugs Bounty contact address on three occasions, but I never heard back from them. Read on for the rest. If you've had a different experience with the program, please chime in below.
Crime

Scientists Study Crime In Progress In a VR Simulated Environment 80

HughPickens.com writes: Claire Nee writes in the NYT that for psychologists, it's best to observe actual behavior, in real time, and afterward interview research participants. Yet for obvious ethical and safety reasons, it's almost never possible to observe a crime as it happens. Now psychologists have devised a simulated environment that can be navigated using a mouse or a game controller. and had willing, experienced ex-burglars to commit a mock burglary in it. Ex-burglars approached the task in a dramatically different way from a comparison group of postgraduate students, of a similar age as our experienced ex-burglars. Burglars entered and exited the house at the rear, while students, unaware of the cover that the side and rear of the house afforded, entered at the exposed front. Burglars spent significantly more time in areas of the house with high-value items and navigated it much more systematically than the students did. They also showed greater discernment, by stealing fewer but more valuable items. Most important, all participants burgled the real and the simulated houses almost identically (PDF). We concluded that using simulations can be a robust way to study crime, and in studying it this way, we will not be limited to just burglary. "A better understanding of criminal behavior will help us reduce opportunities for crime in our neighborhoods," concludes Nee. "By knowing what the burglar is looking for — what signals wealth, occupancy, ease of access and security in properties — we can make adjustments in awareness and protection."
Crime

Ask Slashdot: Anti-Theft Products For the Over-Equipped Household? 408

First time accepted submitter Dufflepod (3656815) writes "After yet another hardware purchase last week, I realized with some alarm just how drastically an enterprising burglar could increase the crapulence quotient of my life if they ever made off with my hardware. The house is alarmed, but much to my annoyance it isn't always set when people go out for any length of time. Ideally I want to 'alarm' the expensive items among my various PCs, UPS, NAS box, test equipment, and some of the sundry other gadgets & gizmos I require to stroke my inner geek. Over the past few days I have spent hours Googling for every combination of "anti-theft perimeter alarm radius motion detector vibration wireless" etc etc.. I have found various possible solutions, though the cost of some of them does make my eyes water (eg SonicShock @ €150/box). Has anyone out there decided to bite-the-bullet and protect their kit with decent alarms, and do you have any suggested 'do's & don'ts'?" So how would you secure valuable items, as opposed to securing the entire place?
News

5.1 Earthquake Hits California 114

An anonymous reader writes "A 5.1 earthquake hit Southern California at 9:09PM local time on Friday. It was preceded by a 3.6 earthquake, then followed by 3.4 and 3.6 quakes, as well as 100+ smaller aftershocks. The United States Geological Survey has a map showing the epicenter. There have been no reported deaths, though roughly 50 people have been displaced from their homes. 'The shake caused a rock slide in Carbon Canyon, causing a car to overturn, according to the Brea Police Department. Fullerton police received reports of water main breaks and windows shattering, but primarily had residents calling about burglar alarms being set off by the quake.'"
The Internet

How the Internet Makes the Improbable Into the New Normal 191

Hugh Pickens writes "A burglar gets stuck in a chimney, a truck driver in a head on collision is thrown out the front window and lands on his feet, walks away; a wild antelope knocks a man off his bike; a candle at a wedding sets the bride's hair on fire; someone fishing off a backyard dock catches a huge man-size shark. Now Kevin Kelly writes that in former times these unlikely events would be private, known only as rumors, stories a friend of a friend told, easily doubted and not really believed but today they are on YouTube, seen by millions. 'Every minute a new impossible thing is uploaded to the internet and that improbable event becomes just one of hundreds of extraordinary events that we'll see or hear about today,' writes Kelly. 'As long as we are online — which is almost all day many days — we are illuminated by this compressed extraordinariness. It is the new normal.' But when the improbable dominates the archive to the point that it seems as if the library contains only the impossible, then the 'black swans' don't feel as improbable. 'To the uninformed, the increased prevalence of improbable events will make it easier to believe in impossible things,' concludes Kelly. 'A steady diet of coincidences makes it easy to believe they are more than just coincidences.'"
Privacy

Hotel Keycard Lock Hack Gets Real In Texas 132

Sparrowvsrevolution writes "You may remember a vulnerability in four million keycard locks presented at the Black Hat conference in July. Hacker Cody Brocious showed he could insert a device he built for less than $50 into the port at the bottom of the common hotel lock, read a key out of its memory, and open it in seconds. Two months later, it turns out at least one burglar was already making use of that technique to rob a series of hotel rooms in Texas. The Hyatt House Galleria in Houston has revealed that in at least three September cases of theft from its rooms, the thief used that Onity vulnerability to effortlessly open rooms and steal valuables like laptops. Petra Risk Solutions, an insurance firm focus the hospitality industry also reports that at least two other hotels in Texas were hit with the attack. Onity has been criticized for its less-than-stellar response to a glaring vulnerability in its devices. The Hyatt says Onity didn't provide a fix until after its break-ins, forcing the hotel to plug its locks' ports with epoxy. And even now, Onity is asking its hotel customers to pay for the full fix, which involves replacing the locks' circuit boards."
Encryption

UK Police Fined For Using Unencrypted Memory Sticks 100

An anonymous reader writes "The Information Commissioner's Office has filed a suit for £120,000 against the Greater Manchester Police because officers regularly used memory sticks without passwords to copy data from police computers and work on it away from the department. In July 2011, thousands of peoples' information was stolen from a officer's home on an unencrypted memory stick. A similar event happened at the same department in September 2010. 'This was truly sensitive personal data, left in the hands of a burglar by poor data security. The consequences of this type of breach really do send a shiver down the spine,' said ICO deputy commissioner David Smith."
Image

Home Alarm Blasts Burglars With Pepper Spray Screenshot-sm 1

Zothecula writes "This is one home security alarm you won't want to trigger by mistake! Burglar Blaster mounts on a wall inside the home, and once armed, uses an infrared beam to detect when an intruder has entered the house. It then emits a cloud of pepper spray, that will severely inconvenience anyone within 2,000 square feet (186 square meters)."
Image

Thief Posts His Photo To Facebook Victim's Account Screenshot-sm 222

An anonymous reader writes "Washington Post reporter Marc Fisher discovered his house had been burgled; money, a winter coat, an iPod and his son's laptop were stolen. Imagine his surprise when Facebook friends of his 15-year-old son reported that a photo of the apparent thief, wearing Fisher's coat and holding a wad of notes, had been uploaded to his son's Facebook account. How addicted do you have to be to a social network to post a status update and upload your photo *while* you're burgling someone's house?"
Biotech

UK-Developed 'DNA Spray' Marks Dutch Thieves With Trackable Water 191

eldavojohn writes "In Rotterdam, there's a new technology in place that dispenses a barely visible mist over those around it and alerts the police. The purpose? To tag robbers and link them back to the scene of the crime. From the article, 'The mist — visible only under ultraviolet light — carries DNA markers particular to the location, enabling the police to match the burglar with the place burgled. Now, a sign on the front door of the McDonald's prominently warns potential thieves of the spray's presence: "You Steal, You're Marked."' Developed in Britain, it's yet to nab a criminal but it will be interesting to see whether or not synthesized DNA will hold up as sufficient evidence in an actual court of law." So it's not just for copper thieves.
Idle

Woman Scares Burglar By Pretending To Be a Dog 1

A woman in Georgia was able to scare a would-be burglar off by pretending to be a dog. According to police, the woman dropped to the floor, scratched at the door, and acted like a large dog when a man tried to open her door. The noise scared off the mystery man and police were unable to find anyone matching his description. The woman and her property are reportedly fine and she hopes to be house trained in a few weeks.
Privacy

Identity Theft Is Usually an Unsophisticated Crime 86

apatrick writes "A recent research report by Heith Copes (University of Alabama at Birmingham) and Lynne Vieraitis (University of Texas at Austin) has examined identity thieves and their methods. Copes and Vieraitis searched federal court records in the US for people convicted of identity theft and then tried to find out where they were serving their sentences. They were able to find 297 inmates, from which they sampled 59 inmates in 14 prisons across the country. The convicts agreed to do detailed interviews, in private, to talk about themselves and their crimes, and the results are reported in a recent issue of Criminal Justice Review. According to Copes and Vieraitis, 'it is best categorized as an economic crime committed by a wide range of people from diverse backgrounds through a variety of legitimate (e.g., mortgage broker) and illegitimate (e.g., burglar) occupations.' As to the issue of whether these are white-collar criminals, the authors say: 'Despite public perceptions of identity theft being a high-tech, computer driven crime, it is rather mundane and requires few technical skills. Identity thieves do not need to know how to hack into large, secure databases. They can simply dig through garbage or pay insiders for information. No particular group has a monopoly on the skills needed to be a capable identity thief.'"

Slashdot Top Deals