Wireless home automation systems can reveal vast amounts of personal information to anyone with a computer

Most Viewed Articles
Popular on Facebook
BACK INTO THE CLOSET: Why U.S. reporters are not allowed to write about rainbow events in nations where being gay is still condemned
Depopulation test run? 75% of children who received vaccines in Mexican town now dead or hospitalized
INVESTIGATION: Three days before Dr. Bradstreet was found dead in a river, U.S. govt. agents raided his research facility to seize a breakthrough cancer treatment called GcMAF
A family destroyed: Six-month-old dies after clinic injects baby with 13 vaccines at once without mother's informed consent
Biologist explains how marijuana causes tumor cells to commit suicide
BOMBSHELL: China and America already at war: Tianjin explosion carried out by Pentagon space weapon in retaliation for Yuan currency devaluation... Military helicopters now patrolling Beijing
Companies begin planting microchips under employees' skin
BAM! Chipotle goes 100% non-GMO; flatly rejecting the biotech industry and its toxic food ingredients
ECONOMIC SLAVERY FOR ALL: While we were distracted with the Confederate flag flap, Congress quietly forfeited our entire economic future via fast-track trade authority
McDonald's in global profit free fall as people everywhere increasingly reject chemically-altered toxic fast food
March Against Monsanto explodes globally... World citizens stage massive protests across 38 countries, 428 cities... mainstream media pretends it never happened
SCOTUS same-sex marriage decision may have just legalized the concealed carry of loaded firearms across all 50 states, nullifying gun laws everywhere
Vicious attack on Dr. Oz actually waged by biotech mafia; plot to destroy Oz launched after episode on glyphosate toxicity went viral
Nearly every mass shooting in the last 20 years shares one surprising thing? and it's not guns
Holistic cancer treatment pioneer Dr. Nicholas Gonzalez dies suddenly; patients mourn the loss of a compassionate, innovative doctor who helped thousands heal from cancer
Inuit Elders tell NASA Earth Axis Shifted
Wild eyes and bowl cuts: Why do mass shooters always share the same hair styles and crazed zombie stares?
Genetically white woman now claims self-identify as black: If you can choose your gender, can you also choose your race? What about your species? Can a human claim to be a llama?
(NaturalNews) What might sound like a conspiracy theory is quickly evolving into conspiracy reality. Various wireless home automation systems that control domestic lighting, heating and even door locks can be hacked by third parties. Once the data from these home automation systems is breached, hackers can track behavioral patterns, store the information in databases and analyze homeowner habits. Likewise, this sensitive information could be sold for marketing purposes and used for more intrusive investigations.

An IT security team at Saarland University, lead by expert Christoph Sorge, have confirmed that data from these smart appliance home automation systems can be intercepted by tech burglars with something as simple as a handheld tablet and a wireless internet signal. They found that the home automation systems are not safe at all, even when data is transmitted though encrypted systems.

Anyone with a computer and the right hacker know-how could tap into vast amounts of personal information of neighbors, far and wide. They even showed how a data breach could be used to attack the functionality of the home automation system itself.

Hackers can learn about the behavioral patterns of homeowners by intercepting data from home automation systems

These smart home automation systems were designed to save homeowners time and money, from increasing efficiency of heating systems to adjusting lighting levels based on the time of day. Since this kind of data is susceptible to interception, this means that hackers could learn when homeowners are home and when they are away. The information could be used to plan burglaries.

Additional smart appliances include blinds that raise and lower at specific times of the day and plants that can be watered on time every day. Hackers could theoretically learn the best time of day to peep inside one's home, and it wouldn't be too hard to do if the hacker also owned a personal drone mounted with a camera.

"Many of the systems do not provide adequate security against unwanted third-party access and therefore threaten the privacy of the inhabitants," said Sorge, an expert for IT security and data protection.

Even encrypted data can be breached and analyzed

To examine the security risks of these systems, Sorge and his team of researchers took on the mind of a malicious hacker and went to work using a simple mini-PC. The team was able to eavesdrop on two volunteers who had home automation systems in place.

Sorge summed up how easy it was to quietly steal the information: "Non-encrypted systems provide large quantities of data to anyone determined enough to access the data, and the attacker requires no prior knowledge about the system, nor about the user being spied on."

Sorge went on to say: "The data acquired by the attacker can be analysed to extract system commands and status messages, items which reveal a lot about the inhabitants' behaviour and habits. We were able to determine absence times and to identify home ventilation and heating patterns."

After analyzing the information, Sorge and his team began to build profiles on the homeowners they were spying on. He showed how encrypted communication reveals the number of messages exchanged, providing enough information to learn about a homeowner's absence times.

This puts a homeowner's privacy and security at heightened risk. "An attacker with malicious intent could use this sort of information to plan a burglary," said Sorge.

Right now, Sorge is working on ways to make wireless home automation systems more secure by improving data encryption and advancing concealment technologies.

Privacy is important in today's technologically advanced society. Protecting that privacy is not based in paranoia or conspiracy theory, but about awareness, prevention and preservation of one's own liberty. Who wants to be a subject of hackers, whether they are the Peeping Tom neighbor or a federal NSA agent?

Sources for this article include:


Follow real-time breaking news headlines on
Wireless appliances at FETCH.news
Join over four million monthly readers. Your privacy is protected. Unsubscribe at any time.
comments powered by Disqus
Take Action: Support NaturalNews.com by linking back to this article from your website

Permalink to this article:

Embed article link: (copy HTML code below):

Reprinting this article:
Non-commercial use OK, cite NaturalNews.com with clickable link.

Follow Natural News on Facebook, Twitter, Google Plus, and Pinterest

Colloidal Silver

Advertise with NaturalNews...

Support NaturalNews Sponsors:

Advertise with NaturalNews...


Sign up for the FREE Natural News Email Newsletter

Receive breaking news on GMOs, vaccines, fluoride, radiation protection, natural cures, food safety alerts and interviews with the world's top experts on natural health and more.

Join over 7 million monthly readers of NaturalNews.com, the internet's No. 1 natural health news site. (Source: Alexa.com)

Your email address *

Please enter the code you see above*

No Thanks

Already have it and love it!

Natural News supports and helps fund these organizations:

* Required. Once you click submit, we will send you an email asking you to confirm your free registration. Your privacy is assured and your information is kept confidential. You may unsubscribe at anytime.