Incident: Burglar Alarm System Vulnerability to Jamming Attack via Hacking Device

Published Date: 2017-07-15

Postmortem Analysis
Timeline 1. The software failure incident happened in July 2017.
System 1. ERA miGuard Wi-Fi alarm system [61304]
Responsible Organization 1. Criminals utilizing the YARD Stick One hacking gadget to deactivate wireless burglar alarms [61304]
Impacted Organization 1. Homeowners using the ERA miGuard Wi-Fi alarm system were impacted by the software failure incident as criminals were able to deactivate the alarm system using the YARD Stick One hacking gadget [61304].
Software Causes 1. The software cause of the failure incident was the vulnerability in the wireless burglar alarm systems that allowed criminals to deactivate the alarms using the YARD Stick One hacking gadget [61304].
Non-software Causes 1. The availability of a hacking gadget like the YARD Stick One on Amazon, which can be used to deactivate wireless burglar alarms by jamming the signal from battery-powered sensors [61304]. 2. The vulnerability of many wireless burglar alarms that work in a similar way, making them susceptible to jamming attacks [61304]. 3. The lack of advanced jamming detection capability in some alarm models, making them more vulnerable to attacks [61304].
Impacts 1. The software failure incident allowed criminals to easily deactivate wireless burglar alarms within seconds, enabling them to discreetly gain entry into homes [61304]. 2. The incident raised concerns about the vulnerability of many wireless burglar alarms in people's homes, potentially affecting tens of thousands of systems [61304]. 3. The failure highlighted the need for manufacturers to upgrade the security of their systems to prevent such attacks in the future [61304]. 4. The incident led to the manufacturer, ERA, being alerted about the vulnerability of their wireless alarms and prompted them to enhance newer models with advanced jamming detection capability [61304]. 5. As a response to the incident, Maplin announced that MiGuard G5 alarm kits would be sold with an additional wireless intruder alarm to address hacking concerns [61304].
Preventions 1. Manufacturers should upgrade the security of wireless burglar alarms to prevent jamming attacks like the one described in the article [61304]. 2. Consumers should look for "two-way" alarm systems that can detect jamming attacks [61304].
Fixes 1. Manufacturers should upgrade the security of wireless burglar alarm systems to prevent jamming attacks like the one demonstrated with the YARD Stick One device [61304]. 2. Consumers should look for "two-way" alarm systems that can detect jamming attacks and have advanced jamming detection capabilities [61304].
References 1. Pen Test Partners [61304] 2. Ken Munro, founder of Pen Test Partners [61304] 3. Michael Ossmann, founder of Great Scott Gadgets [61304]

Software Taxonomy of Faults

Category Option Rationale
Recurring multiple_organization (a) The software failure incident related to the vulnerability of wireless burglar alarms being susceptible to jamming attacks has been highlighted in the article. The Mail on Sunday investigation revealed how criminals could easily deactivate wireless burglar alarms using a hacking gadget purchased from Amazon. Ken Munro, founder of Pen Test Partners, mentioned that this issue is not confined to a specific brand and that many wireless burglar alarms work in a similar vulnerable way. He suggested that manufacturers should upgrade their security to prevent such attacks [61304]. (b) The article also mentions that the vulnerability of wireless burglar alarms to jamming attacks is not limited to a specific brand or organization. Ken Munro stated that it is likely that tens of thousands of wireless burglar alarms in people's homes are susceptible to this kind of attack. This indicates that the issue of wireless burglar alarms being vulnerable to jamming attacks is a widespread concern across multiple organizations that manufacture such alarm systems [61304].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the article where criminals were able to switch off burglar alarm systems using a hacking gadget called YARD Stick One. This gadget exploited a vulnerability in the design of wireless burglar alarms, allowing thieves to jam the signal from battery-powered sensors and deactivate the alarms within seconds [61304]. (b) The software failure incident related to the operation phase is evident in the article where the Mail on Sunday conducted tests using the YARD Stick One to jam a miGuard Wi-Fi alarm system. The alarm system, designed for operation by customers using a remote control or smartphone app, failed to sound the alarm or send a notification when jammed, highlighting a failure in the operational effectiveness of the system [61304].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident in this case falls under the within_system category. The failure occurred due to a vulnerability within the wireless burglar alarm system itself, specifically related to how the system's sensors communicate wirelessly and how they can be easily jammed using a hacking gadget like the YARD Stick One. This vulnerability allowed criminals to deactivate the alarm system without triggering the siren or sending notifications, ultimately compromising the security of the system [61304]. (b) outside_system: The contributing factors that originate from outside the system in this incident include the availability of hacking gadgets like the YARD Stick One, which are sold on platforms like Amazon. The ease of access to such devices from external sources enables criminals to exploit vulnerabilities within the system, highlighting the importance of considering external threats when designing and implementing security measures for software systems [61304].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident related to non-human actions in this case is the vulnerability of wireless burglar alarms to being deactivated by a hacking gadget called YARD Stick One. Criminals can exploit this vulnerability by jamming the signal from battery-powered sensors, allowing them to discreetly gain entry into homes [61304]. (b) The software failure incident related to human actions involves the purchase and testing of the YARD Stick One hacking gadget by The Mail on Sunday to demonstrate how easily wireless burglar alarms can be deactivated. The testing involved using the gadget to jam the miGuard alarm system, preventing it from sounding the alarm or sending notifications as intended [61304].
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - The article discusses a software failure incident where criminals were able to switch off burglar alarm systems using a hacking gadget called YARD Stick One [61304]. - The YARD Stick One is a hand-held USB stick with a small antenna that plugs into a laptop, indicating a hardware component involved in the failure [61304]. - The device jammed the signal from battery-powered sensors in the home, which would otherwise sound a siren, allowing criminals to gain entry [61304]. - The failure was enabled by the hardware component of the YARD Stick One, which interfered with the wireless signals of the alarm system [61304]. (b) The software failure incident related to software: - The software failure incident involved the use of a software script easily found and downloaded from the internet to jam the alarm system in moments [61304]. - The criminals were able to jam the alarm system by using a software script in conjunction with the YARD Stick One hardware device [61304]. - The article mentions that the YARD Stick One gives wireless security researchers the ability to investigate weaknesses in digital radio systems, including burglar alarms, indicating a software aspect to the failure [61304].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the article is malicious in nature. Criminals are using a hacking gadget called YARD Stick One to deactivate wireless burglar alarms by jamming the signal from battery-powered sensors, allowing them to discreetly gain entry into homes [61304]. The criminals are intentionally using this device to bypass security systems and commit theft, indicating a malicious intent behind the software failure incident.
Intent (Poor/Accidental Decisions) poor_decisions The software failure incident described in the article is related to poor_decisions. The incident involves a hacking gadget called YARD Stick One being sold on Amazon, which allows criminals to easily deactivate wireless burglar alarms by jamming the signal from battery-powered sensors. This vulnerability in the alarm systems is due to the design and implementation choices made by manufacturers, making them susceptible to attacks [61304].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence is evident in the article as criminals were able to exploit a vulnerability in wireless burglar alarm systems using a hacking gadget purchased from Amazon. The criminals could deactivate the alarms by jamming the signal from battery-powered sensors, allowing them to gain entry without triggering the alarm system [61304]. (b) The software failure incident related to accidental factors is seen in the article where the Mail on Sunday purchased the YARD Stick One hacking gadget from Amazon and tested it on a £149.99 ERA miGuard Wi-Fi alarm system. By using a computer code script easily found and downloaded from the internet, the alarm system was jammed accidentally, leading to its failure to sound the alarm or send notifications as intended [61304].
Duration temporary The software failure incident described in the article is temporary. The failure occurred due to the use of a hacking gadget called YARD Stick One, which allowed criminals to jam wireless burglar alarms, deactivating them within seconds [61304]. This incident was temporary as it was caused by the specific circumstance of using the hacking device to jam the alarm system, rather than being a permanent failure inherent to the software itself.
Behaviour omission, value, other (a) crash: The software failure incident described in the article does not involve a crash where the system loses state and does not perform any of its intended functions [61304]. (b) omission: The software failure incident involves an omission where the system omits to perform its intended functions at an instance(s). Criminals were able to deactivate wireless burglar alarms within seconds by jamming the signal from battery-powered sensors, preventing the alarm from sounding and sending notifications as intended [61304]. (c) timing: The software failure incident is not related to timing issues where the system performs its intended functions correctly but too late or too early [61304]. (d) value: The software failure incident does involve a value failure where the system performs its intended functions incorrectly. The burglars were able to disable the alarm system, allowing them to gain entry without triggering the alarm or sending notifications to the homeowner as expected [61304]. (e) byzantine: The software failure incident does not exhibit a byzantine behavior where the system behaves erroneously with inconsistent responses and interactions [61304]. (f) other: The software failure incident involves a security vulnerability where criminals can exploit the system to disable burglar alarms, highlighting a critical flaw in the system's design and implementation [61304].

IoT System Layer

Layer Option Rationale
Perception sensor, network_communication, embedded_software (a) sensor: The software failure incident described in the article is related to the sensor layer of the cyber physical system. Criminals were able to deactivate wireless burglar alarms by jamming the signal from battery-powered sensors around the home, preventing the alarms from sounding a siren [61304]. (b) actuator: The article does not mention any failure related to the actuator layer of the cyber physical system. (c) processing_unit: The failure described in the article is not directly related to the processing unit of the cyber physical system. (d) network_communication: The software failure incident does involve network communication as criminals used a hacking gadget to jam the signal from sensors, disrupting the communication between the sensors and the alarm system [61304]. (e) embedded_software: The failure incident is also related to embedded software as the criminals used a hacking gadget that required downloading a computer code script to jam the alarm system, indicating a vulnerability in the embedded software of the alarm system [61304].
Communication link_level The software failure incident described in the article [61304] is related to the link_level of the cyber physical system. Criminals were able to switch off burglar alarm systems by jamming the signal from battery-powered sensors around the home, which would otherwise sound a siren, using a hacking gadget called YARD Stick One. This gadget is a hand-held USB stick with a small antenna that plugs into a laptop, allowing the criminals to deactivate wireless burglar alarms within seconds [61304]. The failure was at the physical layer where the signal transmission was disrupted by the jamming device, leading to the alarm system not functioning as intended.
Application TRUE The software failure incident described in the provided article [61304] is related to the application layer of the cyber physical system. The failure occurred due to a vulnerability in the wireless burglar alarm system that allowed criminals to deactivate the alarm by jamming the signal from battery-powered sensors using a hacking gadget called YARD Stick One. This incident involved exploiting a flaw in the application layer of the alarm system, enabling unauthorized access without triggering the alarm or sending notifications to the homeowner's smartphone app. The vulnerability was demonstrated by using a software script easily found and downloaded from the internet to jam the alarm system within seconds, highlighting a weakness in the system's application layer security [61304].

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident described in the article involves criminals being able to switch off burglar alarm systems using a hacking gadget, the YARD Stick One, purchased from Amazon. By jamming the signal from battery-powered sensors of the alarm system, thieves can deactivate wireless burglar alarms within seconds, allowing them to discreetly gain entry into homes [61304]. This software failure incident directly impacts people's property as their security systems can be compromised, potentially leading to theft or property damage.
Domain unknown (a) The failed system in this incident is related to the security industry, specifically wireless burglar alarm systems [61304].

Sources

Back to List