Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

// // //
10/2/2017
11:35 AM
Simon Marshall
Simon Marshall
Simon Marshall

Sunflower Security Mixes Lights, Drones for Safer Buildings

A new security company may change the way we think about residential security.

Arnold Schwarzenegger learnt in Predator that he could overcome an invisible enemy. Now it's time for wannabe Schwarzeneggers (or Red Sonjas) everywhere to do the same in their own backyards.

Sunflower Labs has developed a home security system it claims will "give us the ability to enjoy our homes again." The San Francisco startup contends that today's home security systems don't really bring peace of mind: in fact, they do the opposite.

It claims many systems are prone to false alarms, alerting police departments that have grown skeptical due to too many false positives, and will fine the owner if the alarm turns out to be bogus. Or perhaps not turn up. It's all a bit too worrying.

So, many people take security enforcement into their own hands. Homes in the US can use, alongside their regular intruder detection system, lights in the front and backyard and in some cases, cameras with fixed views on the exterior. Sunflower Labs places sensors in the lights, and puts the camera up in the sky.

The concept is that lights are positioned around the property -- they offer illumination of course -- but they also contain sensors that learn the usual pattern of movement within the property boundaries. Detection is pretty sophisticated because it differentiates between human footsteps and animals. If anything falls outside of that pattern, the owner is alerted via an app, and an autonomous quadcopter (a.k.a., a drone) is launched and can fly around the house and take a closer look.

Owners of the Sunflower Home Awareness System can see live streamed footage from the drone, and can then decide if they need to take further action or not. Because that decision is up to the owner and not to a regular automated detection system, the hope is that the average false alarms rate of 95% can be reduced, law enforcement is better positioned to react, and consumers feel more empowered.

Can you, as a sword-wielding ex-governor of California, get your hands on one? Not just yet. Sunflower is still conducting internal trials and is currently asking consumers to sign up to be the first external trialists in a limited run in early 2018. Even consumer groups have not got their hands on it yet.

When it comes out of trial, Sunflower hopes to distribute widely throughout the US and has just signed a partnership with the world's second-biggest home security manufacturer, Stanley Black & Decker.

"The team at Stanley reached out and we spent a fair amount of time together," Alex Pachikov, co-founder and CEO told Security Now. "They visited us to see the demo, and we flew out to visit them to work out the details of our partnership and within a few months we had a terrific deal."

Pachikov said the concept, as with all good concepts, was developed over drinks with his co-founder Chris Eheim, CTO. "Over a few months we started hacking an early prototype together and doing research -- then we went out to raise some seed funding," he says.

That funding has been conducted over two rounds. In November last year, General Catalyst stumped up $2.1 million seed, and then a few days ago, the same VC partnered with Stanley Ventures to inject $6 million.


You're invited to attend Light Reading's Virtualizing the Cable Architecture event – a free breakfast panel at SCTE/ISBE's Cable-Tec Expo on October 18 featuring Comcast's Rob Howald and Charter's John Dickinson.

It's a good concept, but because it's new, there are questions. What are the privacy issues that stem from flying your own drone around the neighborhood? Pachikov is bullish.

"We designed the system to only look in the direction of your house and property. We will explicitly go out of the way to avoid looking at the neighbors. If the neighbor complains -- you can show them the footage," he says. So, the drone is designed to fly autonomously in a pattern where it centers only on the house.

What if the drone fails to spot an intruder and there is then damage to a property or worse?

"We are looking into insurance options."

Related posts:

— Simon Marshall, Technology Journalist, special to Security Now

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file