Overcome the surveillance camera hacking loophole

April 2015 Surveillance

There has been much media attention and news reports recently on surveillance cameras being easily invaded by hackers (see http://goo.gl/mVz0hS for example). With the obtained video data and images, some have been uploaded to the Internet and are available to Web browsers. This is a serious issue, which can cause harm to public safety and privacy.

In theory any device linked to the Internet is susceptible to the risks of hackers’ attacks. This is particularly true for IP cameras, as they are designed to support open standards. Hackers are able to attack H.264 IP cameras through the Open Systems Services such as HTTP, RTSP, FTP which are commonly embedded in the cameras. By sending suitable open systems protocol commands to a H.264 IP camera or by capturing and analysing its open systems data streams, hackers can bypass the security of the camera and have access to live video footages remotely.

As you can imagine this would be a huge problem for industries that have to deal with classified information and highly confidential data on a daily basis, such as government and public sectors and banks. It is common to install CCTV cameras within offices, not only to monitor for suspicious activities but to also protect staff and the individuals of the data that they may be dealing with.

Dr. Wallace Ma, chief marketing officer of TeleEye Group.
Dr. Wallace Ma, chief marketing officer of TeleEye Group.

TeleEye has developed its own anti-hacking technology to close off any hacking loopholes. “TeleEye Hacker Resistant Technology comprises five layers of protection which is incorporated to the wide spectrum of TeleEye products,” states Dr. Wallace Ma, chief marketing officer of TeleEye.

The five layers

• Secured protocol – A set of special video streaming protocols is enabling to provide extra security during internal transmission.

• AES256 encryption – A higher-level encryption is adopted by the US government to protect top secret information.

• Pair matching architecture – TeleEye gives special identity to restrict any unauthorised access.

• IP filtering – Allow only designated IP address to access the cameras.

• Proprietary video coder – Hacker cannot recognise the video stream at all.

For more information contact TeleEye (South Africa), +27 (0)11 557 9200, www.teleeye.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.