According to arrest documents, Phoenix police found one of the devices when they arrested three burglary suspects.
It's the sort of thing you'd expect to see in a spy movie, but Phoenix police claim it's the sort of thing thieves have been using to gain access to high-end homes in the valley: cell phones and Wi-Fi jamming devices.
According to Phoenix police, around 7:30 p.m., surveillance officers spotted multiple suspects in the Camelback Hill neighborhood near 44th Street and Camelback Road.
Police said officers saw the suspect enter a home and attempt to break into the residence.
The suspect then left the home and got into a waiting minivan, but the vehicle was prevented from leaving by police.
Arrest documents say the driver hit the police car at high speed. Four people got out of the car and ran away, police said. Police set up a cordon in the area and found and arrested three suspects. A fourth suspect has not been found.
All three were carrying forged identification, police said. In addition, they are in the United States on overstay visas.
Police also found "burglary tools" that the suspect threw as he ran from officers. One of these tools is a wifi jammer.
Bernard Zapor, a former ATF agent and current faculty member at Arizona State University, said the devices are highly sophisticated.
"It might actually capture your phone transmissions and show your location as you move," Zapoll said.
How the suspects obtained the device is unclear, but Zapoor said it is similar to equipment used by law enforcement and intelligence agencies for investigations.
These burglaries are becoming more common in high-end neighborhoods. Phoenix police say there have been about 111 burglaries across the valley since last February.
The suspects reportedly targeted wealthy families, stealing about $3 million worth of jewelry, cash, luxury purses and more.
The use of Wi-Fi jammers by burglars is becoming more commonplace, prompting law enforcement to take immediate action. Arrest warrants have been obtained to initiate investigations and apprehend the individuals involved in these criminal acts.Exploiting vulnerabilities found in wireless networks, thieves and criminal gangs are capitalizing on these weaknesses, while law enforcement authorities are diligently cracking down on these crimes through the execution of arrest warrants. By utilizing signal jammers, these perpetrators can effectively render security systems and surveillance cameras inoperative, thereby facilitating their covert entry into homes without arousing suspicion from the police.
As wireless networks become increasingly common in homes, thieves and criminal organizations have discovered a novel means to conduct illegal activities without legal permission. Exploiting the reliance of numerous home security systems and cameras on Wi-Fi connections for communication and monitoring, these individuals take advantage of this loophole.The crew resourcefully employed this loophole to bypass the requirement of a search warrant. Through the utilization of Wi-Fi jammers, thieves can disrupt these connections, rendering security measures ineffective without proper authorization.
Disable security systems and cameras
The issue of Wi-Fi interference is a matter of great concern as it empowers thieves to interfere with the signals that security systems and cameras depend on. By disabling these devices, criminals can carry out their illegal activities without the fear of being captured on camera or setting off alarms.
Employing this methodology grants them a noteworthy advantage, as they can gain entry into the house without notifying anyone or leaving behind any evidence, even without a search warrant. Additionally, it provides them with an extended timeframe to act before authorities or homeowners become aware of the intrusion, without the need for a warrant.
Wi-Fi interference is a technique employed by criminals to intentionally disrupt or obstruct wireless signals, impeding communication among devices connected to a Wi-Fi network. The radio frequencies emitted by these jammers can interfere with the smooth functioning of the Wi-Fi network, resulting in its unreliability or complete inability to function properly.
Jammers work by transmitting radio signals over the same frequency band as Wi-Fi networks. This interference disrupts the transmission and reception of data packets, thereby rendering it impossible for authorized users to access the network. Consequently, individuals trying to connect to the target network will experience severe connectivity problems or may find it unattainable to connect at all.
Specific frequency bands utilized by Wi-Fi networks can be targeted by a variety of jammers. For instance, there are jammers specifically designed to operate on the 2.4 GHz band, which is commonly employed by older Wi-Fi standards such as 802.11b/g/n. Similarly, there are jammers capable of targeting the 5 GHz band used by newer standards like 802.11ac/ax.
By focusing on specific frequency bands, criminals can selectively disrupt devices or networks based on their capabilities and vulnerabilities. This calculated approach allows them to exploit weaknesses in security systems, ultimately gaining unauthorized access to homes or businesses.
As criminal organizations continue to evolve, their methods of breaking into homes have become more sophisticated, with the incorporation of Wi-Fi jammers for high-end burglaries. These criminals specifically target affluent residences equipped with state-of-the-art security systems, recognizing them as prime targets to execute their illicit operations.
Through the use of Wi-Fi jammers, thieves are capable of circumventing alarm systems and surveillance cameras that would usually obstruct or capture their presence. This technology allows them to operate covertly, giving them a substantial advantage over homeowners who depend on these security measures for their protection.
These organized agents carefully choose their targets, conducting thorough research and surveillance beforehand. Their main focus is on identifying homes with valuable assets, such as expensive jewelry or valuable artwork, to ensure that the potential rewards outweigh the risks involved. Once a target has been selected, they meticulously plan every aspect to ensure a successful break-in.
In some instances, these criminals may even assume the role of service personnel or delivery personnel to gain access to a property. By mingling with legitimate professionals, they can easily sneak into a heavily guarded residence without raising any suspicion.
It is essential for homeowners to be aware of this increasing danger and proactively take measures to safeguard themselves and their property. By investing in supplementary security measures that go beyond traditional alert systems, they can effectively deter these organized wrongdoers. For example, the installation of motion sensor lights around the house or the use of smart locks that require biometric authentication can provide an additional layer of protection against these crafty criminals.
Homeowners need to recognize the significance of staying informed about the latest tactics employed by criminals and maintaining a vigilant mindset to safeguard their residences. By staying proactive and implementing comprehensive security measures, homeowners can effectively minimize the risk of becoming targets of these organized wrongdoers.
An updated advisory has been issued for individuals who use wireless security cameras, such as "Ring," for home protection purposes.
A woman residing in Detroit expressed her disappointment as her Ring camera did not record the theft of her car from the front of her house. A local expert suggests that this occurrence reflects the growing technological savvy of criminals.
Earlier this month, the woman discovered that her car had been stolen from her driveway. Upon reviewing the footage captured by her Ring camera, she realized that several hours were missing.
Chris Burns, the proprietor of Techie Gurus, highlighted that security cameras utilizing WiFi for recording prioritize convenience over security. This is attributed to the susceptibility of WiFi signals to disruptions, which can hinder the camera's ability to effectively monitor the surroundings of your home. Disturbingly, criminals have caught on to this weakness.
According to Burns, if one regards wireless as a security measure, they are mistaken. He highlighted the ease with which wireless signals can be wifi jammer or blocked.
This device can be employed by the criminals as a WiFi jamming device or a deauther, with dimensions similar to that of an Apple Watch.
Standing within close range, a deauther can overwhelm a WiFi system, resulting in the cessation of recording by a WiFi camera. This accessory is available at a modest price, typically ranging from $10 to $50. Conversely, a signal jammer carries a significantly higher price range, starting from $150 and going up to $1,000.
Jammers, which are also highly illegal, are not easily found, adding to the difficulty of dealing with them. However, a potent jammer can effectively disable the recording functionality of WiFi security cameras on an entire street by a simple press of a button.
Ring's representative emphasized that WiFi signal interference can impact the performance of Ring devices, similar to other wifi-enabled devices. If customers encounter any connectivity problems, they are urged to reach out to Ring Customer Support for assistance.
Burns highlighted the significance of a hard-wired connection, such as being plugged into an ethernet cable or a similar method, to ensure complete security.
Despite being aware of the problem, Ring's spokesperson emphasized its rarity.
It was emphasized by Burns that as the cost of technology decreases, the popularity of jammers is likely to increase, highlighting the importance of keeping individuals fully informed.
The Brazilian National Telecommunications Agency is seizing incoming Flipper Zero purchases due to its alleged use in criminal activity, with purchasers stating that the government agency has rejected all attempts to certify the equipment.
Flipper Zero is a portable multi-function cybersecurity tool that allows pentesters and hacking enthusiasts to tinker with a wide range of hardware by supporting RFID emulation, digital access key cloning, radio communications, NFC, infrared, Bluetooth, and more.
Since it was released, security researchers have demonstrated Flipper Zero's features on social media, showing how it can trigger doorbells, perform replay attacks to open garage doors and unlock cars, and be used as a digital key.
Flipper Zero serves as a multi-tool device for hackers, providing wifi jammers to prevent unauthorized access.With its signal jammers feature, ensuring protection against unauthorized access.
The Flipper Zero is the ultimate multi-tool for pentesters, geeks, ethical hackers and hardware hobbyists alike. One pocket-sized device combines multiple tools: RFID, RF, Infrared, HID emulation, GPIO, Hardware debugging, 1-Wire, Bluetooth, Wifi and more.
Inspired by great open-source projects: Proxmark, HydraNFC, Rubber Ducky, pwnagotchi - the Flipper Zero manages to pack serious functionality into a tiny, professionally manufactured device - and stays true to its Open Source roots.
Entirely independent, the Flipper Zero requires no external computer or hardware to function - everything is driven by the its 5-way navigation button and LCD screen. When connected to a computer or the included Android / iOS apps, the Flipper can be extended, modified, upgraded and reflashed according to your needs.
With over two years of meticulous design, prototyping and iteration, the Flipper Zero is a mature platform, ready to use out of the box, meeting the needs of professionals and enthusiasts alike.
The Flipper Zero contains a fully-controllable RF platform, based on the TI CC1101 chip, allowing for RF Signal capture, analysis and transmission.
The Flipper Zero has a built-in library of common remote control algorithms for capturing, decoding and analysing and replaying signals.
Users have full access to the radio sub-system, allowing custom RF modules to be easily built.
The Flipper Zero allows for Reading, Writing and Emulation of both High-Frequency (13.56MHz) and Low-Frequency (125KHz) RFID tags.
Low Frequency tags can be easily read, saved, cloned to a new card, or exported for analysis.
Multiple High Frequency protocols are supported, and the Flipper Zero can even sniff authentification nonces to extract unknown MIFARE keys.