Nashville News Post

collapse
Home / Daily News Analysis / ‘Your Wi-Fi cable could be a secret microphone': How researchers turned an earthquake detection method into an accidental spy tool using AI

‘Your Wi-Fi cable could be a secret microphone': How researchers turned an earthquake detection method into an accidental spy tool using AI

May 13, 2026  Twila Rosenbaum  9 views
‘Your Wi-Fi cable could be a secret microphone': How researchers turned an earthquake detection method into an accidental spy tool using AI

In a startling revelation that blurs the line between scientific innovation and privacy invasion, researchers have demonstrated that a standard Wi-Fi cable can be transformed into a powerful listening device. By adapting a technique originally used to detect earthquakes and monitor seismic activity, the team combined distributed acoustic sensing (DAS) with artificial intelligence to recover speech and other sounds from the faint electromagnetic fields surrounding the cable. The work, which has not yet been peer-reviewed but was presented at a recent security conference, raises urgent questions about the security of our most mundane infrastructure.

The science behind the spy trick

The method relies on a principle known as distributed acoustic sensing, which is typically employed by geophysicists to track vibrations in fiber-optic cables buried underground. When an earthquake or even a passing truck creates ground vibrations, those perturbations subtly alter the way light travels through the glass fibers. By analyzing the backscattered light, scientists can pinpoint the location and magnitude of the disturbance with remarkable precision.

In the new study, the researchers applied a similar concept to the copper wires inside a standard Ethernet cable—the kind that connects a Wi‑Fi router to a modem or a wall jack. Instead of light, they monitored tiny changes in the electromagnetic field around the wire caused by sound waves. Sound is essentially a pressure wave that makes the air vibrate. When those vibrations hit the cable, they cause minuscule movements in the conductors, which in turn alter the cable’s capacitance and inductance. These changes can be detected by a sensitive receiver attached to the cable, much like a microphone diaphragm converts sound into electrical signals.

The key breakthrough was using machine learning algorithms to filter out noise and reconstruct intelligible speech from the raw electromagnetic data. The AI model was trained on thousands of hours of audio recorded through conventional microphones paired with the cable’s electromagnetic signature. Once trained, the system could transcribe conversations taking place in the same room as the cable, even if the speakers were several meters away.

From earthquake detection to eavesdropping

The research team, based at a leading technical university, originally set out to improve earthquake early-warning systems using existing telecommunications infrastructure. During experiments with fiber-optic cables in an urban environment, they noticed that the sensors occasionally picked up human voices from nearby buildings. Intrigued, they decided to see if the same effect could be achieved with copper Ethernet cables, which are far more common in homes and offices.

“We essentially stumbled onto a new side channel that nobody had really considered before,” said one of the lead researchers. “If you have a Wi‑Fi cable running through a wall or under a desk, it’s effectively a microphone waiting to be turned on.” The team emphasizes that the attack requires physical access to the cable—or at least a connection to the local network—so it is not something a remote hacker could easily perform. However, once the attacker has a foothold, the cable can be ‘listened to’ without leaving any obvious trace, making it a potent espionage tool.

Technical details and limitations

The current prototype uses a custom‑built analog‑to‑digital converter that samples the cable’s electromagnetic fluctuations at a rate of 100,000 samples per second. The raw data is then fed into a neural network that has been trained to recognize phonemes and reconstruct speech. In controlled tests, the system achieved a word error rate of less than 15% for clear, close‑range speech, and about 30% for ambient conversations with background noise. While far from perfect, these results are good enough to extract the gist of a conversation or identify specific phrases like credit card numbers or passwords.

Several factors affect the quality of the signal. The length and shielding of the cable play a role—longer, unshielded cables are better antennas for sound. The distance between the speaker and the cable also matters; the researchers found that the system works best when the speaker is within two meters of the cable. Thick walls or concrete floors can attenuate the signal, but the AI can often compensate by boosting certain frequencies.

Notably, the cable does not need to be actively transmitting data for the attack to work. Even a disconnected cable that is plugged into a wall outlet or a powered‑off router will still radiate a faint electromagnetic field that can be modulated by sound. This means that simply having an Ethernet cable in a room could turn it into a passive listening device.

Broader implications for privacy and security

The discovery adds to a growing list of side‑channel attacks that exploit the physical properties of hardware. Previous research has shown that computer monitors can be turned into radio transmitters, that keystrokes can be detected by analyzing the sound of typing, and that the vibrations from a laptop’s hard drive can reveal what is being displayed on the screen. The Wi‑Fi cable microphone is perhaps more concerning because the technology uses commodity components that are ubiquitous in every building.

Security experts worry that the technique could be weaponized by intelligence agencies, corporate spies, or even stalkers. “If you can get an agent into a building for just a few minutes to attach a small device to the network cable, they can walk away and later download the recorded audio wirelessly,” said a cybersecurity analyst not involved in the research. “The device can be hidden inside a wall plate or an RJ45 connector, making it virtually invisible.”

On the other hand, the researchers note that the attack has significant practical barriers. The custom hardware required is not yet commercially available, and the AI models need to be retrained for different environments and cable types. Moreover, many modern Ethernet cables are heavily shielded, which would reduce the signal strength considerably. Consumer‑grade routers usually have built‑in signal integrity checks that could also interfere with the sensing.

Potential benign applications

While the obvious concern is surveillance, the technology also has legitimate uses. It could serve as a non‑invasive way to monitor structural health in buildings, detect gas leaks by listening for the hiss of escaping gas, or even track the movement of people by their footsteps. In hospitals, the same principle could be used to monitor patients without attaching sensors to their bodies. The researchers are now exploring these applications as a way to turn the discovery into a positive force.

How to protect yourself

For those worried about becoming a target, the simplest countermeasure is to use shorter, well‑shielded cables and to avoid running network cables through areas where sensitive conversations take place. Fiber‑optic Ethernet cables are immune to this type of attack because they do not carry electrical signals. Alternatively, powerline adapters that use the home’s electrical wiring could also be vulnerable, though the researchers have not yet tested that scenario.

Another defensive strategy is to add electromagnetic noise to the cable deliberately, a technique known as “jamming.” However, this would require additional equipment and might degrade network performance. Ultimately, the best protection is to treat any physical cable as a potential microphone and to encrypt voice conversations end‑to‑end using apps like Signal or WhatsApp.

The research is a reminder that the line between sensing and spying is becoming increasingly blurred as artificial intelligence grows more capable. What began as a tool to save lives by predicting earthquakes has now revealed a hidden vulnerability in the fabric of our connected world. As one of the researchers put it, “The very cables that bring us the internet could also be betraying our secrets.”


Source: TechRadar News


Share:

Your experience on this site will be improved by allowing cookies Cookie Policy