Robot Dog Internet Jammer

Supposedly the DHS has these:

The robot, called “NEO,” is a modified version of the “Quadruped Unmanned Ground Vehicle” (Q-UGV) sold to law enforcement by a company called Ghost Robotics. Benjamine Huffman, the director of DHS’s Federal Law Enforcement Training Centers (FLETC), told police at the 2024 Border Security Expo in Texas that DHS is increasingly worried about criminals setting “booby traps” with internet of things and smart home devices, and that NEO allows DHS to remotely disable the home networks of a home or building law enforcement is raiding. The Border Security Expo is open only to law enforcement and defense contractors. A transcript of Huffman’s speech was obtained by the Electronic Frontier Foundation’s Dave Maass using a Freedom of Information Act request and was shared with 404 Media.

“NEO can enter a potentially dangerous environment to provide video and audio feedback to the officers before entry and allow them to communicate with those in that environment,” Huffman said, according to the transcript. “NEO carries an onboard computer and antenna array that will allow officers the ability to create a ‘denial-of-service’ (DoS) event to disable ‘Internet of Things’ devices that could potentially cause harm while entry is made.”

Slashdot thread.

Posted on July 24, 2024 at 11:25 AM12 Comments

Comments

JR July 24, 2024 12:38 PM

Yet one more reason to not use WiFI in the home for things that are mounted on walls and not meant to move around. Just run a wire, it is cheap

TimH July 24, 2024 12:42 PM

The excuses are along the “protect the children” line for surveillance laws. By far the main reason is to disable wifi connected cameras that could record “alternative facts” to what LEO might present.

Wired connectivity and redundant local servers are your friend. And an alert system that gets all cameras recording to the local server should the internet go down.

Clive Robinson July 24, 2024 1:53 PM

@ Bruce, ALL,

The idea is far from new.

Back in the 1980’s and 1990’s as I’ve mentioned before I did various jobs involving “VIP Protection” and “Remote Bomb Disposal”.

I’ve mentioned before the use of very broadband jammers and the problems with distance [1].

I’ve also mentioned the problem with the “Bomb Disposal Wheelbarrows” that are still the current devices used.

A major problem is that they have “issues” like they are only of use on near flat ground, and they are not autonomous so require “Intelligent Control”(IC).

But also they need to not put out an electronic signature as this can be used to detonate the device intentionally or otherwise taking out the wheelbarrow. Or slightly smarter hostiles can just jam the frequencies used by the wheelbarrow if “Radio Controled”(RC).

Which as they are very far from inexpensive are not a resources where any particular unit is going to have two or more available in some ways they are considered more valuable than “man power”…

So in the main they are controlled by a heavy duty umbilical cable which because it can not realistically be “dragged” has to be “payed-out” from the wheelbarrow. Which has quite a number of issues. The primary one being the operator has to “reverse it back” and “reel it in” so in effect to be of use the wheelbarrow operator has to know where the device is, it can not go searching or roving around.

Which is why there is a lot of interest in AI-Drones to work “off leash”.

Even though this has been talked about since the 1980’s for some uncountable reason there are those that think this is “oh so super secret”.

Well the spot of bother at the East of Europe should have given even the dimmest of dimwits a heads up by now.

Which is why I find this so laughable in a very sad way,

“NEO can enter a potentially dangerous environment to provide video and audio feedback to the officers before entry and allow them to communicate with those in that environment,” Huffman said, according to the transcript. “NEO carries an onboard computer and antenna array that will allow officers the ability to create a ‘denial-of-service’ (DoS) event to disable ‘Internet of Things’ devices that could potentially cause harm while entry is made.”

Back in “The Troubles” in N.I. back in the 1970’s the British Government tried to ban “radio control”(RC) equipment used by enthusiasts in the UK and other European countries and the US. As a policy it failed. So soldiers were given backpack jammers that jammed the half dozen RC frequencies. As a prevention that not just failed but actually gave a “heads-up” to terrorists that troops were in the locality (so surprise element given away).

Eventually the powers that be realised they had lost this electronic watefare battle when the terrorist ECCM beat all the ECM that a “world power” could muster. When one terrorist group used small telescopes light detectors and a photographic flash gun (remember this was before lasers were available).

Some may know about “Smart Weapons” of the early “Joint Direct Attack Munition”(JDAM) “bang-bang” strap on guidance kit that converts “big iron” drop, or “dumb bombs”, into semi-glide style precision-guided munitions. Where some “laser jock” “paints the target” with an IR light source which in later versions was pulse modulated with a “secret code” to limit ECM. The detector head in the strap on nose flipped side to side and up and down to locate the “painted target” when it was found it fliped the strapped on tail fin left right and up and down to “glide down the beam” and hit the target.

The fact the actuators had only binary positioning so “banged back and forth” gave it the “bang bang” name not the fact it was anything to do with munitions/armaments. Later JDAM systems use a more positioned system and can thus not just glide further, can also not fly a simple glide path that made gunning the bombs down easier for defenders as even a “mechanical computer” made with gears could compute the position of the bomb as it glided in.

[1] In essence the issue that is relevant here is that of “range”. If your jammer is the equivalent of a CW system and puts out a continuous Power of P over a Bandwidth of B the effective power per unit of frequency is P/B and as Range R decreases by the square of the distance, the Range is,

R = P/(B.R^2)

The thing is that as you do not know

1.1 If there is an RF detonated device or not.
1.2 The frequency of operation if there is a device.
1.3 The power the effective power the hostiles have.

You have major issues so you want the jammer to be as close to any potential device as possible as Power is always limited on mobile devices.

There is also the issue you don’t want to be jamming everything “From DC to Daylight” as that causes many many others way way more problems than an explosive device will in most cases.

Kurt July 24, 2024 7:41 PM

Huh.

Deadman switch on a timer. Wait 5 minutes after IoT devices goes offline, spring trap.

Someone isn’t thinking very hard.

Kurt

nobody July 25, 2024 2:47 AM

Given that US law enforcement faces no realistic risk of encountering Internet-controlled IEDs, the most probable use for this device is to prevent video evidence of police misconduct from being uploaded to places where the police cannot easily destroy it.

Winter July 25, 2024 3:27 AM

@Kurt

Wait 5 minutes after IoT devices goes offline, spring trap.

A bomb going off whenever an IoT has no WiFi access.

What could possibly go wrong?

Aaron July 25, 2024 11:35 AM

It’s a high tech solution that could potentially solve 10% of the problems but the trade off is ensuring the other 90% of threats remain in the low tech domain where this solution is useless; and less viable, higher risk solutions are the only option.

Tatütata July 25, 2024 12:57 PM

Would these even be legal in the US? The FCC states at fcc.gov/general/jammer-enforcement : “Federal law prohibits the operation, marketing, or sale of any type of jamming equipment that interferes with authorized radio communications, including cellular and Personal Communication Services (PCS), police radar, and Global Positioning Systems (GPS).”

If there are exceptions to this, I would suppose that the transmitters would have to go through some sort of licensing/certification procedure.

And there are plenty of frequency bands to choose from. Someone skilled enough to adapt an IOT device could just as well use a cellular modem, or a garage door opener, or roll their own.

Sounds like a scam to me.

Clive Robinson July 26, 2024 2:47 AM

@ Tatütata, ALL,

Re : Lawful exception.

What you note with,

“Would these even be legal in the US?”

Applies to rather more than “jammers” for instance “Conducted Electrical Weapons”(CEWs) that covers Tasers, Stun Guns, Cattle Prods, and even some “dog training collars” and medical equipment all used in public are required to meet FCC “emissions masks” but many do not, as they are effectively “spark gap transmitters” with attached antennas.

However you need to consider also that the US consists of a number of technically “Sovereign States” in a “Federation” thus it has quite a few laws that do not align from State to State.

A similar situation applies with other Federations such as the EU but via their own differing mechanisms.

However where ever I’ve looked I’ve usually found there are a exceptions to laws by the Government and it’s agencies and guard labour.

In the UK it was once all under “Crown Immunity” or specific exceptions. In the EU it was for “National Security” and so on.

The US therefore has exemptions for the various forms of “Guard Labour” which even reach down to private security firms or individuals “under contract”.

Because when it comes down to electronics that emit EM radiation as part of their operation, licencing comes about in one of three basic ways,

1, The organisation / site / system.
2, The operators / personnel / job.
3, The equipment.

Guard labour get an exemption through the second route.

For things that I do as a design engineer and systems builder and as a licenced radio operator I get the exemptions via all three routes. Which applies depends on several things and it can get quite Kafkaesque at times[1].

Because as with all equipment that requires to be licenced it’s design is a “chicken or egg” question. The prototypes that are developed to the point that they can be type tested so “the equipment” can be certified therefore licenced for public use are obviously not licenced untill the licencing process is completed. With part of that process requiring operating the equipment. Sometimes this operation can only be done in an “Open Air Test Site”(OATS) which is in effect how it will be operated in standard use.

But sometimes other things get crazy. High Power RF has a “heating effect” in both conductors and dielectrics such as plastic insulators and some things in between like flesh which is why microwave ovens work. I used to use an OATS site that was a “porta-cabin” in the middle of a field of cows. The OATS was just 50ft by 25ft fenced off in the middle of the field and there were various bright yellow warning notices to keep “the public out”. Now some may know of the NRPB and it’s tables about limiting human exposure to EM energy fields. Well the owner of the land got a warning letter one day about the OATS… Apparently somebody had complained it was cruelty to animals –ie the cows– to have them exposed to high power RF… When quaint people “get a bee in their bonnet” about such things they will not let go of it… So eventually the site go removed as it was the simplest option.

[1] I’m not the only person to find the whole process Kafkaesque, one person who had issues with antenna masts needed to do high power OATS testing at various frequencies which ment getting a licence… They made a YouTube video about doing it some years back but unfortunately YouTube deleted it for reasons not stated.

However to see what a modest OATS is and why you have to do full power tests a he’s done a more recent video,

https://m.youtube.com/watch?v=M__zBiaafKM

Brad Raybury July 27, 2024 8:56 AM

Just like the robot hound in my novel Fahrenheit 1886 [1].

Just keep it awaybfrom my e-books.

  1. 1886 degrees F, the temperature at which copper burns

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.