Hacker-resistant CCTV stops criminals

July 2014 Surveillance

Companies and individuals are increasingly turning to web-enabled cameras to help secure their premises. However, these high-tech solutions typically use Internet protocol (IP), an open standard, to connect back to control rooms. Like all open standards, IP can easily be hacked if not properly secured.

Let’s take a recent example from last year: a Texas couple’s babycam was hacked by a repeat offender who used the device to curse and say sexually explicit things to their sleeping two-year-old daughter.

In March this year, hacker Jared James Abrahams, received an 18-month jail sentence for hacking into the webcam of Miss Teen USA, Cassidy Wolf. Abrahams did this regularly, using nude photos to blackmail girls on Skype.

And if don’t have the skills to do the hacking, the Web abounds with help. YouTube has a four-step instruction video on how to hack into any live webcam, while WikiHow shows how to watch security camera streams. These are just two examples.

At Hack in the Box, a 2013 security conference, researchers from a security firm Qualys said that Web-based administration interfaces for Internet-protocol webcams are “a textbook example of an insecure Web application” that makes personal information vulnerable. Respected publications like InformationWeek have reported on vulnerabilities inside well-known network video recorders which are used to record video from webcams.

“In other words, the very devices people are relying on to provide a new layer of security are actually back doors that crooks can easily exploit,” says Philip Smerkovitz, MD of TeleEye South Africa, a CCTV remote monitoring and management consultancy. “This vulnerability is expected to grow as the smart office and home concept takes off, and webcams are used both to beef up security and monitor activity.”

In response to this vulnerability, TeleEye has developed hacker-resistant IP cameras that use proprietary protocols to protect video streams. It is typically while the video is being transmitted that it is vulnerable to hackers. TeleEye’s video-streaming protocols offer one level of protection, as does TeleEye’s SMAC-M Multi-Stream video technology, which delivers efficient and effective bandwidth utilisation. More important, TeleEye’s also uses AES 256-bit encryption. Thus, even though the information is delivered via an open-standards platform, it remains impervious to outside eyes.

“Additional security is provided by TeleEye’s pair-matching architecture. TeleEye software and hardware have individual identities, and only if software is registered with the hardware can it be used for video-surveillance function. Thus, even non-registered TeleEye software cannot access TeleEye hardware,” Smerkowitz explains. “Moreover, only users with designated IP addresses can access client’s security camera network.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.