Skip to main content

Wireless Cyber Security & Eavesdropping Detection System

   9. FAQ (Frequently Asked Questions)

There have been little incidents reported as the affected organization was not aware of the attack or they opt to not disclose the information during or after the incident. On-line hacking usually leaves footprints behind, but wireless data hacking worked out directly from the internal network leaves nothing unless the hacker intended to do so.

  1. US NSA loaded a wireless-frequency-operating malware on 100,000 PCs in the world. [Dong-A Newspaper Link]
  2. Japan Mitsubishi was affected by wireless hacking and their information on Defence Infra was leaked [Wikileaks Link]

Wireless Intrusion Prevention System (WIPS) is monitoring the activities through the WiFi AP inside the office and blocking unauthorized access to the AP, which is nothing to do with detecting of wireless frequency. Hence it can not detect hacking attack using radio frequency or LoRa communication.

Wireless Cyber Security System (WCSS) scans every second and detects the RF in the range of 25kHz~6GHz as if analyzing packets in wired security. When the system detects an unusual signal in contrast to the reference frequency, it sets alarm and display on the management terminal including the bug’s location.

Hacking devices and methods are becoming more and more advanced.  They can now be set on/off and controlled from a distance outside. If the hacker sets the spy bug off while a portable detector is trying to find it, it can never be detected. With this constant detection system,  24/7 operation and detection is possible. Coupled with the existing 24/7 on-line security, the organization can counteract the persistent  hacking threat.

Due to the characteristics of radio waves, it is not possible to know the location of 100% accuracy. After the approximate zone information is known using the 24/7 detection system, the detailed location can be identified using the portable detector in the zone.

USB device security is very important and most information centers including datacenters are blocking the use of USB inside their premises. However that cannot prevent wireless hacking fundamentally.

There can be various types of wireless hacking chips that can break the USB device security aforementioned. For ex., if a spy chip is implanted in a keyboard and controlled wirelessly ad remotely from outside, no one would know when and how it connects to the server for hacking.

Spy chip’s size is as small as a rice bead, so it can be hidden in a mouse, keyboard, processing board, or LAN cable connector for hacking inside the internal network.

Jamming is not allowed by the law as it can jam all the radio frequencies in the area, whether authorized or not. Recently some countries allow the use of jamming against drone attack for security protection of major facility such as nuclear stations.

A wireless data security system will be installed after the expert engineers of Mitygo review the internal structure and environment of the server room through site survey. For the location and number of detector, as shown in the figure below, if there are columns or walls based on the basic layout, the installation location and environment may be partially changed during the site survey.

Load More