Overcome the surveillance camera hacking loophole

April 2015 Surveillance

There has been much media attention and news reports recently on surveillance cameras being easily invaded by hackers (see http://goo.gl/mVz0hS for example). With the obtained video data and images, some have been uploaded to the Internet and are available to Web browsers. This is a serious issue, which can cause harm to public safety and privacy.

In theory any device linked to the Internet is susceptible to the risks of hackers’ attacks. This is particularly true for IP cameras, as they are designed to support open standards. Hackers are able to attack H.264 IP cameras through the Open Systems Services such as HTTP, RTSP, FTP which are commonly embedded in the cameras. By sending suitable open systems protocol commands to a H.264 IP camera or by capturing and analysing its open systems data streams, hackers can bypass the security of the camera and have access to live video footages remotely.

As you can imagine this would be a huge problem for industries that have to deal with classified information and highly confidential data on a daily basis, such as government and public sectors and banks. It is common to install CCTV cameras within offices, not only to monitor for suspicious activities but to also protect staff and the individuals of the data that they may be dealing with.

Dr. Wallace Ma, chief marketing officer of TeleEye Group.
Dr. Wallace Ma, chief marketing officer of TeleEye Group.

TeleEye has developed its own anti-hacking technology to close off any hacking loopholes. “TeleEye Hacker Resistant Technology comprises five layers of protection which is incorporated to the wide spectrum of TeleEye products,” states Dr. Wallace Ma, chief marketing officer of TeleEye.

The five layers

• Secured protocol – A set of special video streaming protocols is enabling to provide extra security during internal transmission.

• AES256 encryption – A higher-level encryption is adopted by the US government to protect top secret information.

• Pair matching architecture – TeleEye gives special identity to restrict any unauthorised access.

• IP filtering – Allow only designated IP address to access the cameras.

• Proprietary video coder – Hacker cannot recognise the video stream at all.

For more information contact TeleEye (South Africa), +27 (0)11 557 9200, www.teleeye.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Dallmeier and Hexagon form a technology partnership
Surveillance
Dallmeier and Hexagon have agreed to form a technology partnership, which will see the two companies combine their expertise to develop integrated security solutions for various application areas, particularly critical infrastructures.

Read more...
Analyse, automate, and optimise logistics processes
neaMetrics Surveillance Transport (Industry) Products & Solutions Logistics (Industry)
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity.

Read more...
Safer spaces through smart surveillance
NEC XON Surveillance
Advances in facial recognition technology are transforming surveillance from a mere recording tool into an intelligent, integrated system that enhances real-time safety, moving beyond the traditional expansion of CCTV efforts.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
Axis secures the Waterfront
Surveillance Entertainment and Hospitality (Industry) Retail (Industry)
Axis Communications shares insight into its longstanding partnership with the V&A Waterfront, one of Africa’s premier retail and mixed-use precincts, through its latest, updated customer success story.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.