Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

I Know What You Watched Last Summer…

Privacy Implications of Powerline Electromagnetic Interference from Televisions

Privacy Implications of Powerline Electromagnetic Interference from Televisions

One side effect of deploying unencrypted smart meters in home across the country is that someone on the street with a wireless laptop can extract private details about the home owner — such as whether the person is home, whether they have a leak in their water pipes, and whether the person lives alone or not. Now researchers have come forward with a way to discern the personal TV viewing habits of the home owner simply by measuring the fluctuation in the power or what’s known as EMI- (EMI).

Televisions, Video Privacy - EMIIn a new white paper, researchers from the University of Washington asked whether TVs of different makes, models, and technologies produce repeatable EMI, when given repeated screen content? Further, does different screen content produce differentiable EMI patterns from a given TV? Is EMI consistent across multiple instances of TVs from the same model family? And, could the researchers match EMI recorded in a lab setting to EMI extracted in homes, especially when those homes might have a diverse array of other consumer electronics connected to the same power line?

They were able to answer all questions in the affirmative.

The culprit appears to be switched mode power supplies (SMPS), the type of power supplies that provide higher efficiency and smaller form factor for consumer electronics. In fact, Energy Star mandates the some consumer electronics use SMPS power supplies, so consumers have little choice. And it’s that same efficiency and small form factor make SMPS convenient for consumers looking to save money on their latest slim gadget.

Unfortunately, one consequence of SMPS is EMI, which can be monitored remotely. The researchers developed the ability to determine the particular EMI signatures of various motion picture studio splash screens–you know, the logos for Sony, MGM, etc. Further, the researchers found that they could still isolate the video signal from all the other “noise” in the EMI.

This latter observation could be very useful to the FBI: the absences of motion picture studio logos could be used to determine the display of pirated copies of popular videos. It could also lead to privacy violations: someone outside your house could learn what video you watch without ever seeing the screen.

But is that a realistic scenario?

The researchers did conclude, that “from a privacy perspective, we also observe that today’s utility companies are not collecting the granularity of information necessary for repeating our analyses, and the [Ubiquitous computing] technologies from the research community that could collect this type of information are not yet widely deployed.” In other words, this privacy concern is still a few years off, but it is possible for someone who’s determined to know what you you’re watching.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.