Overcome the surveillance camera hacking loophole

April 2015 Surveillance

There has been much media attention and news reports recently on surveillance cameras being easily invaded by hackers (see http://goo.gl/mVz0hS for example). With the obtained video data and images, some have been uploaded to the Internet and are available to Web browsers. This is a serious issue, which can cause harm to public safety and privacy.

In theory any device linked to the Internet is susceptible to the risks of hackers’ attacks. This is particularly true for IP cameras, as they are designed to support open standards. Hackers are able to attack H.264 IP cameras through the Open Systems Services such as HTTP, RTSP, FTP which are commonly embedded in the cameras. By sending suitable open systems protocol commands to a H.264 IP camera or by capturing and analysing its open systems data streams, hackers can bypass the security of the camera and have access to live video footages remotely.

As you can imagine this would be a huge problem for industries that have to deal with classified information and highly confidential data on a daily basis, such as government and public sectors and banks. It is common to install CCTV cameras within offices, not only to monitor for suspicious activities but to also protect staff and the individuals of the data that they may be dealing with.

Dr. Wallace Ma, chief marketing officer of TeleEye Group.
Dr. Wallace Ma, chief marketing officer of TeleEye Group.

TeleEye has developed its own anti-hacking technology to close off any hacking loopholes. “TeleEye Hacker Resistant Technology comprises five layers of protection which is incorporated to the wide spectrum of TeleEye products,” states Dr. Wallace Ma, chief marketing officer of TeleEye.

The five layers

• Secured protocol – A set of special video streaming protocols is enabling to provide extra security during internal transmission.

• AES256 encryption – A higher-level encryption is adopted by the US government to protect top secret information.

• Pair matching architecture – TeleEye gives special identity to restrict any unauthorised access.

• IP filtering – Allow only designated IP address to access the cameras.

• Proprietary video coder – Hacker cannot recognise the video stream at all.

For more information contact TeleEye (South Africa), +27 (0)11 557 9200, www.teleeye.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
Hikvision launches latest range of cameras
Hikvision South Africa Surveillance AI & Data Analytics
Hikvision has launched its latest network cameras with ColorVu 3.0 technology and EasyIP 4.0 Plus, which elevate video security by delivering improved image quality, enhanced intelligent functions, superior audio capabilities, and a refined product design and materials.

Read more...
Platform to access data and train AI models
Milestone Systems AI & Data Analytics Surveillance
Milestone Systems has announced Project Hafnia to build services and democratise AI-model training with high-quality, compliant video data leveraging NVIDIA Cosmos Curator and AI model, fine-tuning microservices.

Read more...
The capabilities of visual verification
Secutel Technologies Surveillance AI & Data Analytics
Secutel Technologies has provided locally developed visual verification solutions for some time. SMART Security Solutions requested more insight into these solutions from the company.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...
Integration is the key to smarter surveillance
Duxbury Networking Surveillance
According to recent market projections, the local security industry is expected to grow by more than 10% annually through 2029, reflecting the increasing demand for smarter, more proactive security solutions.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
The state of the VMS market
Arteco Global Africa Milestone Systems Cathexis Technologies Technews Publishing Surveillance
SMART Security Solutions asked three platform vendors in South Africa, one that is developed and maintained in the country with an international market, for their views on the state of the VMS market and where it is headed.

Read more...