Computers or electronics plugged into a home or business wall plug are sharing the power provided by that local circuit. They are also sharing the power pollution generated by all electronic devices sharing the common power wiring. The power supplies in computers are a source of harmonics, while refrigerator compressors, spa pumps and garage door openers generate spikes and transients. Every electronic cable or cord acts like an antenna, capturing any nearby broadcast or wireless signal and carrying that unwanted interference to your device. Over 75% of power pollution originates inside the home or business wiring.
Bantam’s patented technology filters all three wires, Line, Neutral, and Ground, in both directions. This unique bi-directional filtering keeps power pollution from entering your device, but also filters pollution generated from a device from getting into the common power circuit.
What is PLE and how can Bantam Technology Prevent it?
Power Line Exploit (PLE) is capturing and interpreting electrical magnetic impulses from IT equipment that emanates to power lines and is a new but growing hacker threat. An IEEE paper in December of 2019 confirmed PLE exists and is a threat to IT security. The transistor switching pulses and the power supply switching pulses generated by IT equipment create signals that emanate from power traces to the ground trace and wire via inductive coupling or inducement, the principle behind radio transmission.
Power Line Exploit is sensing and interrupting these electrical magnetic impulses, that are very low in power and very high in frequency, on the ground wire exiting IT equipment. PLE is focused on current, not voltage. Exploiting voltage data requires touching or connecting to wires. But to exploit data traveling with the current, the Hacker collection device does not need to touch the wire, it only needs to be close enough to detect the electrical magnetic field emanating from the wire.
Extracting signals and data on power lines is not difficult, this is what Smart Meters do. Since the ground is a safety path, it needs to be an uninterrupted return to the power grid. Once the signal is on ground via inductive coupling, it is detectable almost anywhere inside and outside any data center, business or medical facility. Near field antennas, current sensors with a data logger, cell phones and even radios can be used to gather signals and data traveling along the current wave form.
Once extracted, interrupting the signals and data requires high tech, fast and expensive electrical analysis devices like oscilloscopes or spectrum analyzers, but anyone can rent this equipment.
IT devices have power supplies that by themselves leave an unique electrical imprint that allow a Hacker to identify the type and even the manufacturer of the device. The movement, absence or addition of IT devices can be also monitored
Malware installed on targeted devices can be programed to generate a signal to alert the Hacker of an exploit opportunity. A Hacker with extract and interrupt capabilities can exploit the data from compromised computer via the power line without network security devices like firewalls being aware.
Consider ATM machines plugged into the local power circuit in a mall or airport. A Hacker with a computer plugged into an adjacent wall outlet can extract signals and data coming from the ATM machine power plug via the common wall wiring. This creates an opportunity to extract and record sensitive data and PIN key strokes signals for later interrupting.
Because the patented Bantam technology is a bi-directional filter of Line, Neutral, and Ground, the PLE threat is eliminated. Any data centric electrical device connected via the power cord to the Bantam technology will have the exploitable signals and data filtered and suppressed, rendering them unreadable by Hackers.