Hacker-resistant CCTV stops criminals

July 2014 CCTV, Surveillance & Remote Monitoring

Companies and individuals are increasingly turning to web-enabled cameras to help secure their premises. However, these high-tech solutions typically use Internet protocol (IP), an open standard, to connect back to control rooms. Like all open standards, IP can easily be hacked if not properly secured.

Let’s take a recent example from last year: a Texas couple’s babycam was hacked by a repeat offender who used the device to curse and say sexually explicit things to their sleeping two-year-old daughter.

In March this year, hacker Jared James Abrahams, received an 18-month jail sentence for hacking into the webcam of Miss Teen USA, Cassidy Wolf. Abrahams did this regularly, using nude photos to blackmail girls on Skype.

And if don’t have the skills to do the hacking, the Web abounds with help. YouTube has a four-step instruction video on how to hack into any live webcam, while WikiHow shows how to watch security camera streams. These are just two examples.

At Hack in the Box, a 2013 security conference, researchers from a security firm Qualys said that Web-based administration interfaces for Internet-protocol webcams are “a textbook example of an insecure Web application” that makes personal information vulnerable. Respected publications like InformationWeek have reported on vulnerabilities inside well-known network video recorders which are used to record video from webcams.

“In other words, the very devices people are relying on to provide a new layer of security are actually back doors that crooks can easily exploit,” says Philip Smerkovitz, MD of TeleEye South Africa, a CCTV remote monitoring and management consultancy. “This vulnerability is expected to grow as the smart office and home concept takes off, and webcams are used both to beef up security and monitor activity.”

In response to this vulnerability, TeleEye has developed hacker-resistant IP cameras that use proprietary protocols to protect video streams. It is typically while the video is being transmitted that it is vulnerable to hackers. TeleEye’s video-streaming protocols offer one level of protection, as does TeleEye’s SMAC-M Multi-Stream video technology, which delivers efficient and effective bandwidth utilisation. More important, TeleEye’s also uses AES 256-bit encryption. Thus, even though the information is delivered via an open-standards platform, it remains impervious to outside eyes.

“Additional security is provided by TeleEye’s pair-matching architecture. TeleEye software and hardware have individual identities, and only if software is registered with the hardware can it be used for video-surveillance function. Thus, even non-registered TeleEye software cannot access TeleEye hardware,” Smerkowitz explains. “Moreover, only users with designated IP addresses can access client’s security camera network.”



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Efficient storage for security
Issue 7 2020, Dell EMC , CCTV, Surveillance & Remote Monitoring
There is a dramatic increase in the amount of storage and computing power required to support today’s safety and security systems.

Read more...
Safe restaurant reopening technology
Issue 7 2020, Dahua Technology South Africa , CCTV, Surveillance & Remote Monitoring
Denmark’s Arkaden Food Hall makes use of Dahua People Counting and Flow Control solution for safe reopening.

Read more...
Forbatt SA invests in South Africa’s security industry
Issue 7 2020, Forbatt SA , CCTV, Surveillance & Remote Monitoring
Forbatt SA is set to offer an improved service to the industry by making sure it has the products and solutions the industry needs, as well as a new showroom.

Read more...
Analytics with your existing cameras
Issue 7 2020, Secutel Technologies , CCTV, Surveillance & Remote Monitoring
With SecuVue from Secutel Technologies, it is possible for any business to monitor their offices, warehouses or stores remotely, from any part of the world.

Read more...
Consolidating control rooms and service delivery within a COVID-19 environment
Issue 6 2020, Leaderware , CCTV, Surveillance & Remote Monitoring
It is essential to have informed, coordinated and professional responses within control rooms at this time of increasing turmoil.

Read more...
Technology driving the healthcare industry
Issue 6 2020, Duxbury Networking , CCTV, Surveillance & Remote Monitoring
Seeing cameras as sensors opens up new possibilities, and each one of them responds to typical demands inside a hospital, clinic or nursing home.

Read more...
Turn cameras into traffic sensors
Issue 6 2020, Duxbury Networking , CCTV, Surveillance & Remote Monitoring
Safer communities and cities are achieved through a mixture of technology and human resources, working together in a holistic manner.

Read more...
Mobotix thermal technology increases security
Issue 6 2020, Duxbury Networking , CCTV, Surveillance & Remote Monitoring
Installations, machinery, equipment and material available on company premises require effective and cost-efficient protection. In addition, operational safety, optimisation of workflows and protection ...

Read more...
Getting a visual on Covid-19 screening
Issue 6 2020, Graphic Image Technologies , CCTV, Surveillance & Remote Monitoring
Should organisations be investing in thermal camera technology to simply contain and limit the spread of the virus?

Read more...
Flexible temperature screening options for challenging times
Issue 6 2020, Hikvision South Africa , CCTV, Surveillance & Remote Monitoring
A thermal imaging camera is an effective screening device for detecting individuals with elevated skin temperature. This type of monitoring can provide a rapid screening approach in high-traffic areas.

Read more...