Submitted via IRC for soylent_red
Using Light Beams to Control Google, Apple, Amazon Assistants
Academic researchers found that certain microphones convert light to sound, allowing voice commands to be sent to voice-controlled (VC) devices like Google Home, Amazon Echo, Facebook Portal, smartphones, or tablets.
Dubbed Light Commands, the attack works from afar by shining a laser beam at microphones that use micro-electro-mechanical systems (MEMS), which convert the light into an electrical signal.
By modulating the intensity of the light beam, MEMS can be tricked to produce the same electrical signals produced by audio commands. With careful aiming and laser focusing, attacks can be successful from as far as 110 meters.
In their experiments, researchers from the University of Electro-Communications in Japan and the University of Michigan tested the attack on popular VC devices.
The voice recognition system in Google Home, Nest Cam, Amazon Echo, Fire Cube TV, iPhone, Samsung Galaxy S9, Google Pixel, and iPad, was tested from various distances.
A Light Commands attack sends inaudible instructions to a voice-controlled device, making it react in a meaningful way. The researchers demonstrated that it can be used to open a garage door or to unlock the front door of a house.
No large investment is needed to pull this off, either. A low-cost setup used by the researchers consisted of a normal laser pointer, a Wavelength Electronics laser driver ($339), and a Neoteck NTK059 sound amplifier ($27.99). A computer that plays the recorded audio commands is also required. Laser beams provide precise aiming, but the researchers showed that Light Commands attacks also work with a laser flashlight (Acebeam W30). From 10 meters, they were able to inject commands into Google Home.
(Score: 3, Informative) by DannyB on Friday November 08 2019, @04:50PM
A couple years ago (sorry no link) there was a different attack on voice controlled personal assistants.
The voice can be higher pitched. Even higher pitched. Even such a high pitched voice it is ultrasonic -- but Alexa / Siri / etc don't mind!
There was another attack where it was possible to take a recorded voice command and manipulate it to be recognized as a different command.
What you think you heard: "Alexa, what's the weather?"
What Alexa heard: "Alexa, surf to evil.com"
This manipulation was done based on how the neural network worked. There was a paper on it. I don't have it anymore. I think I saw it on news.ycombinator.com.
Imagine a combination of the attacks.
1. It's a laser beam pointed at the mic
2. Sending an ultrasonic voice command
3. The command sounds to a human like a different command than what Alexa interprets it to be
To transfer files: right-click on file, pick Copy. Unplug mouse, plug mouse into other computer. Right-click, paste.