Dog-like robot jams home networks and disables devices during police raids — DHS develops NEO robot for walking denial of service attacks - eviltoast

The Department of Homeland Security (DHS) has announced that it has developed a four-legged robot designed to jam the wireless transmissions of smart home devices. The robot was revealed at the 2024 Border Security Expo and is called NEO. It is built using the Quadruped Unmanned Ground Vehicle (Q-UGV) and looks a lot like the Boston Dynamics Spot robot.

According to the transcript of the speech by DHS Federal Law Enforcement Training Centers (FLETC) director Benjamine Huffman, acquired by 404 Media, NEO is equipped with an antenna array that is designed to overload home networks, thus disrupting devices that rely on Wi-Fi and other wireless communication protocols. It will thus likely be effective against a wide range of popular smart home devices that use wireless technologies for communications.

  • Trainguyrom@reddthat.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    4 months ago

    WPA2 is pretty trivial too. Not as easy as WEP since you do have to locally brute-force the PSK (password), but that’s pretty quick on modern systems. We had multiple assignments when I was in college that had cracking a WPA2 password as a step (in the interest of time, the instructor used passwords from the RockYou list but still)

    • KairuByte@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      4
      ·
      4 months ago

      Yeah, if you’re using common words or variants thereof, you’re gonna have a bad time. But a 128 character string of random characters is going to be functionally safe from such an attack, for now.

      • JasonDJ@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        4 months ago

        And you’ll go crazy every time you try to add a device that doesn’t support QR code scanning.

        Just use multiple dictionary words with a symbol or two thrown in. Or go all out and set up 802.1x with client certificates and save the PSKs for a firewalled segment of less important crap.

        Although it’s worth mentioning that wireless security means nothing to jamming. Jamming is RF, it’s destroying layer 1 before WPA matters.