[Wireless Hacking Detection System] Is it possible to attempt hacking using Bluetooth devices or regular IoT devices?
Most Bluetooth and IoT devices use radio communication using the 2.4GHz band.
The 2.4GHz band has the characteristic of having a short-range and uses a lot of energy, so it is not appropriate to use for hacking.
You may already have experienced your Bluetooth speaker sometimes not working or producing noise even if there is a wall between the devices. It is not appropriate to use it for stable hacking from outside the building.
Wireless Hacking Detection System] What are the impacts from obstacles (walls, iron doors, windows, etc.) on the communication distance of wireless frequencies?
Radio frequencies have 4 characteristics of reflection, diffraction, scattering, and refraction.
Through these 4 characteristics, radio frequencies experience a reduction in distance or intensity if they meet obstacles.
Therefore to send radio frequencies farther away from areas with lots of buildings, requires stronger output.
For your information, concrete walls provide a 10% reduction, iron doors 13%, and office and windows provide a 3% reduction.
[Wireless Hacking Detection System] What is the maximum distance of wireless hacking devices that hackers use on average?
Before we provide you with the answer, you must first understand the characteristics of radio frequencies.
Radio frequencies can pass through obstacles easier and send to further distances if it has a lower base frequency.
However, the amount of data that can be transferred will be smaller.
On the other hand, higher frequencies cannot send data far away from the city center, but they can send a larger amount of data.
Therefore, if a hacker is to steal large amounts of information from a company, they will likely use a higher frequency and attempt hacking from nearby, as opposed to, if the plan is to shut down the servers through a single command, they are likely to carry out hacking from far away using a lower base frequency.
[Wireless Hacking Detection System] If you detect wireless hacking attempts, are you able to know the type of data or IP?
GITSN's Wireless Hacking Detection System can identify whether the data that is being stolen through the specific frequency is whether video or audio or other forms of data.
If it is a form of data that is encrypted, it cannot detect what file is in the data.
Also, through the characteristic of radio frequencies to spread out without a designated direction, the hacker’s location or IP address cannot be identified.
[Wireless Hacking Detection System] Is there a need to implement a security system using larger amounts of money for a hacking probability of less than 1%?
Cases of spy chips and their technology have already been proven.
Security must always prepare for 1% of the risk and if it is a situation where the company is handling important information within the company or is a threat of big impact in case of a server shutdown, you should prepare for wireless hacking.
If hacking has already occurred, there are cases where servers can be shut down with a single command.
[24/7 Intelligent Eavesdropping Detection System] If eavesdropping is detected, how do you respond?
If illegal eavesdropping is detected, an alert that notifies of this suspicious signal is displayed on the PC of the customer representative.
If the alert occurs, the representative will temporarily stop work in the area of detection and will track down the eavesdropping device.
Most eavesdropping devices are designed to send information more than once a day for the “freshness of information”
Therefore, tracking eavesdropping devices is possible through visual inspection based on suspicious locations such as new items, mail, etc.
Even if you are not in your seat during detection, the situation is sent in real-time through e-mail.
Although eavesdropping must be prevented, it is not a common phenomenon, so it will not interfere with your businesses.
Daily management by a customer representative in the morning and night for any instances of eavesdropping is enough.
GITSN’s 24/7 Intelligent Eavesdropping Detection System is completely automated where non-professionals can also manage, so the representative’s workload is extremely low at about 10 minutes each day.
Most of the 170 institutes that have implemented GITSN’s equipment are managed by non-professionals.
[Wireless Hacking Detection System] Can you respond by blocking the specific wavelength when you identify a wireless hacking frequency?
Frequency jamming is currently illegal.
Moreover, unexpected problems may occur since frequency jamming will block all radio waves passing through the whole area.
There have been some cases in recent years where frequency jamming has been used for national facilities (jamming drone frequencies near nuclear power plants), but they can not be used in the private sector.
[Wireless Hacking Detection System] Is it possible to pinpoint the hacking location using GITSN’s Wireless Hacking Detection System?
Due to the characteristics of radio frequencies, 100% accuracy is not attainable.
24/7 scanners will provide you with zonal information which needs to be followed up with a portable scanner to find the hacking device.
[Wireless Hacking Detection System] Wouldn't portable detectors be good enough as a 24/7 detection system? Why 24/7 detection system?
Hacking is becoming smarter where the hacking equipment can be turned on and off from the outside.
If the hacker turns the hacking equipment off during detection using a portable detector, it will go undetected.
If you install a 24/7 detection system, it can be detected 24/7 without a break.
Along with companies’ 24/7 wired security and carry out integrated control, you will be able to respond to all forms of wireless hacking.
[Wireless Hacking Detection System] What is the difference between WIPS and GITSN’s Wireless Hacking Detection System?
WIPS(Wireless Intrusion Prevention System) is a security system that prevents illegal AP(Access Point)s to connect to the Wi-Fi in the office by monitoring the router’s AP, not by detecting radio signals.
Therefore, it cannot detect hacking using radio frequencies such as radio and LoRa communication, etc.
GITSN’s wireless data security system detects a wireless range of 25kHz-6GHz every second by analyzing wireless signals in the same way that wired security systems analyze packets, then provides an alarm and location if abnormal frequencies are detected.