In the spring of last year, cybersecurity researcher Takeshi Sugarawa walked into the lab of Kevin Fu, a professor he was visiting at the University of Michigan. He wanted to show off a strange trick he’d discovered. Sugarawa pointed a high-powered laser at the microphone of his iPad—all inside of a black metal box, to avoid burning or blinding anyone—and had Fu put on a pair of ear buds to listen to the sound the iPad’s mic picked up. As Sugarawa varied the laser’s intensity over time in the shape of a sine wave, fluctuating at about 1,000 times a second, Fu picked up a distinct high-pitched tone. The iPad’s microphone had inexplicably converted the laser’s light into an electrical signal, just as it would with sound.
Six months later Sugaraw—visiting from the Tokyo-based University of Electro-Communications—along with Fu and a group of University of Michigan researchers have honed that curious photoacoustic quirk into something far more disturbing. They can now use lasers to silently ‘speak’ to any computer that receives voice commands—including smartphones, Amazon Echo speakers, Google Homes, and Facebook’s Portal video chat devices. That spy trick lets them send “light commands” from hundreds of feet away; they can open garages, make online purchases, and all manner of mischief or malevolence. The attack that can easily pass through a window, when the device’s owner isn’t home to notice a telltale flashing speck of light, or the target device’s responses.
“It’s possible to make microphones respond to light as if it were sound,” says Sugarawa. “This means that anything that acts on sound commands will act on light commands.”
In months of experimentation that followed Sugarawa’s initial findings, the researchers found that when they pointed a laser at a microphone and changed the intensity at a precise frequency, the light would somehow perturb the microphone’s membrane at that same frequency. The positioning didn’t need to be especially precise; in some case they simply flooded the device with light. Otherwise, they used a telephoto lens and a geared tripod to hit their mark.
As a result, the microphone interpreted the incoming light into a digital signal, just as it would sound. The researchers then tried changing the intensity of the laser over time to match the frequency of a human voice, aiming the beam at the microphones of a collection of consumer devices that accept voice commands.
When they used a 60 milliwatt laser to “speak” commands to 16 different smart speakers, smartphones, and other voice activated devices, they found that for almost all of the smart speakers registered the commands from 164 feet away, the maximum distance they tested,. Smartphones proved trickier: An iPhone was only susceptible from a range of around 33 feet, and two Android phones could only be controlled from within around 16 feet.
social experiment by Livio Acerbo #greengroundit #wired https://www.wired.com/story/lasers-hack-amazon-echo-google-home