SAN FRANCISCO — Since they were introduced a few years ago, security experts have fretted that voice-controlled digital assistants like Apple’s Siri and Amazon’s Alexa were a privacy threat and could be easily hacked.

But the risk presented by a cleverly pointed light was probably not on anyone’s radar.

Researchers in Japan and at the University of Michigan said Monday that they have found a way to take over Google Home, Amazon’s Alexa or Apple’s Siri devices by shining laser pointers, and even flashlights, at the devices’ microphones.

In one case, they said they opened a garage door by shining a laser beam at a voice assistant that was connected to it. They also climbed 140 feet to the top of a bell tower at the University of Michigan and successfully controlled a Google Home device on the fourth floor of an office building 230 feet away. And by focusing their lasers using a telephoto lens, they said that they were able to hijack a voice assistant more than 350 feet away.

Opening the garage door was easy, the researchers said. With the light commands, the researchers could have hijacked any digital smart systems attached to the voice-controlled assistants.

They said they could have easily switched light switches on and off, made online purchases or opened a smart-lock-protected front door. They even could have remotely unlocked or started a car that was connected to the device.


“This opens up an entirely new class of vulnerabilities,” said Kevin Fu, an associate professor of electrical engineering and computer science at the University of Michigan. “It’s difficult to know how many products are affected because this is so basic.”

The computer science and electrical engineering researchers — Takeshi Sugawara at the University of Electro-Communications in Japan; and Fu, Daniel Genkin, Sara Rampazzi and Benjamin Cyr at the University of Michigan — planned to release their findings in a paper Monday.

Genkin was also one of the researchers responsible for discovering two major security flaws, dubbed Meltdown and Spectre, in the microprocessors inside nearly all the world’s computers last year. Shares of chipmaker Intel briefly dropped 5% on news of their discovery.

The researchers, who studied the light flaw for seven months, said they discovered that the microphones in the devices will respond to light as if it was sound. Inside each microphone is a small plate called a diaphragm that moves when sound hits it.

That movement can be replicated by focusing a laser or a flashlight at the diaphragm, which converts it into electric signals, they said. The rest of the system then responds the way it would to sound.

The researchers said they notified Tesla, Ford, Amazon, Apple and Google to the light vulnerability. The companies all said they are studying the conclusions.


The researchers said that most microphones would need to be redesigned to remedy the problem. And simply covering the microphone with a piece of tape wouldn’t solve it. Fu said the microphones on several digital assistants have dirt shields that didn’t block their commands.

Security researchers have a long history of revealing stunning vulnerabilities in internet-connected devices. Experts have often cautioned that while those weaknesses can be surprising, they are often worst-case scenarios that can only be exploited in the rarest of circumstances. And there is no clear indication that the light vulnerability detailed Monday has been used by hackers.

This is not the first discovery of a surprising vulnerability in digital assistants. Researchers in China and the United States have demonstrated that they can send hidden commands that are undetectable to the human ear.

With a tsunami of internet-connected devices coming onto the market, however, the researchers said the discovery is a reminder to consumers to remain vigilant about security.

“This is the tip of the iceberg,” Fu said. “There is this wide gap between what computers are supposed to do and what they actually do. With the internet of things, they can do unadvertised behaviors, and this is just one example.”

An Amazon spokeswoman said the company has not heard of anyone other than the researchers using the light-command hack and added that its digital assistant customers can rely on a few easy safety measures. For one, they can set up voice PINs for Alexa shopping or other sensitive smart-home requests. They can also use the mute button to disconnect power to the microphones.

There is also a common-sense solution to the light vulnerability: If you have a voice assistant in your home, keep it out of the line of sight from outside, Genkin said. “And don’t give it access to anything you don’t want someone else to access,” he added.