Intrusion Detection System Locates Phones and RF Devices Indoors Using Cellular Signals

Intrusion Detection System Locates Phones and RF Devices Indoors Using Cellular Signals

Bastille Networks, an enterprise threat detection solution provider using software-defined radio (SDR), has launched its new Bastille Enterprise Cellular Intrusion Detection for enterprises. Previously only available to its military and law enforcement customers, Bastille Enterprise Cellular Intrusion Detection is the only solution that can accurately locate cell phones indoors, using only cellular signals.

Bastille has been doing radio frequency (RF) and Cellular Intrusion Detection and research for the Government for years. They have also been awarded FCC approval for the Civilian cellular sensor array. This allows Bastille for the first time to offer accurate Cellular Intrusion Detection to the Enterprise. Now corporations can have the RF security that the DoD and Intelligence Community rely on to protect the nation’s secrets.

Bastille provides corporations the ability to discover, locate, and mitigate radio borne threats to their assets, facilities, and networks. These threats arise from managed, unmanaged and rogue wireless, IoT and Cellular devices. Bastille does this protection by using SDRs to passively observe the entire radio space in a facility from 60 MHz to 6 GHz. More than 70 percent of devices connected to the network today are connected via RF & Cellular and that percentage is growing. Equally important are the radio-enabled and cellular devices, which are NOT connected to the designated network. It also includes those devices, which enter into the building with employees, visitors, and installed by contractors. These devices are the ones that can be used to exfiltrate voice, video, and computer data right past the firewalls and into the unsecure world outside.

Covert, rogue and vulnerable wireless and cellular devices are inside the enterprise today. Suspicious equipment includes SmartTVs, security cameras, printers and peripherals, medical devices, building controls and of course, cell phones.

The Bastille solution delivers:
  • Complete Visibility: Detect all the wireless/cellular devices and connections in corporate facilities whether or not they have connected to the corporate network,
  • Threat Detection: Detect that a device such as one with a Bluetooth or cellular connection is transmitting data (and is not just an employee listening to music),
  • Accurate Threat Location: Locate both of the offending devices on the floor plan. 
  • The whole Bastille threat detection process takes just seconds from when the wireless/cellular device first transmits until the security team receives an Alert into the existing alerting system.
A lot more than Cellular Intrusion Detection

Though commonly thought of as Cellular Intrusion Detection, Bastille does a lot more than merely detecting the presence of cell phones. Customers can set up alerts based on wireless device behavior. Examples include:

Compromised Devices: Bastille baselines facilities, all wireless devices (including Cellular, Wifi, Bluetooth and BLE) and their typical behavior and can alert when a device is compromised and exhibits abnormal behavior. This includes:

  • Secure Area Data Breaches: Alert when an allowed Bluetooth hearing aid performs an unallowed BLE pairing with a device outside the secure area. Or detect when a Company phone at a desk is joined by a personal phone at the same desk.
  • MDM Enhancement: Alert when a phone which is not under Mobile Device Management is turned on, or add geo-fencing capabilities to an organization's existing MDM solution.
  • Insider Threats: Alert when a device is seen in an area where it is not allowed or forensically investigates to understand the devices and their behavior from weeks or months ago.

According to Bob Baxley, CTO at Bastille, ‘I have no doubt that more huge security holes will be discovered in more than 100 new radio protocols used by IoT devices. Bastille can tell you which devices in your facility--both on and off your network--are susceptible to RF attack. It is critical that CISOs understand their RF attack surface in order to maintain a secure perimeter.

Click here to learn more about the Bastille Enterprise Cellular Intrusion Detection.

Publisher: everything RF