Overcome the surveillance camera hacking loophole

April 2015 Surveillance

There has been much media attention and news reports recently on surveillance cameras being easily invaded by hackers (see http://goo.gl/mVz0hS for example). With the obtained video data and images, some have been uploaded to the Internet and are available to Web browsers. This is a serious issue, which can cause harm to public safety and privacy.

In theory any device linked to the Internet is susceptible to the risks of hackers’ attacks. This is particularly true for IP cameras, as they are designed to support open standards. Hackers are able to attack H.264 IP cameras through the Open Systems Services such as HTTP, RTSP, FTP which are commonly embedded in the cameras. By sending suitable open systems protocol commands to a H.264 IP camera or by capturing and analysing its open systems data streams, hackers can bypass the security of the camera and have access to live video footages remotely.

As you can imagine this would be a huge problem for industries that have to deal with classified information and highly confidential data on a daily basis, such as government and public sectors and banks. It is common to install CCTV cameras within offices, not only to monitor for suspicious activities but to also protect staff and the individuals of the data that they may be dealing with.

Dr. Wallace Ma, chief marketing officer of TeleEye Group.
Dr. Wallace Ma, chief marketing officer of TeleEye Group.

TeleEye has developed its own anti-hacking technology to close off any hacking loopholes. “TeleEye Hacker Resistant Technology comprises five layers of protection which is incorporated to the wide spectrum of TeleEye products,” states Dr. Wallace Ma, chief marketing officer of TeleEye.

The five layers

• Secured protocol – A set of special video streaming protocols is enabling to provide extra security during internal transmission.

• AES256 encryption – A higher-level encryption is adopted by the US government to protect top secret information.

• Pair matching architecture – TeleEye gives special identity to restrict any unauthorised access.

• IP filtering – Allow only designated IP address to access the cameras.

• Proprietary video coder – Hacker cannot recognise the video stream at all.

For more information contact TeleEye (South Africa), +27 (0)11 557 9200, www.teleeye.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Hikvision’s top seven trends for the security industry in 2024
Hikvision South Africa News & Events Surveillance AI & Data Analytics
As we embrace technological innovation, and adapt to evolving societal needs, we are witnessing the convergence of advanced technologies like artificial intelligence (AI), the Internet of Things (IoT), and big data.

Read more...
inq. SA unveils AI, IoT solutions for the digital age
AI & Data Analytics Surveillance
inq. has announced the launch of an extensive Edge Artificial Intelligence (AI), Internet of Things (IoT), and the Edgedock data insights value proposition to transform business operations across various sectors.

Read more...
ONVIF releases first add-on for secure communications
Surveillance Training & Education
ONVIF has released the final version of the TLS Configuration add-on to increase the security of communications between devices and software clients within a physical security system.

Read more...
2024 Trends in Video Surveillance report
Surveillance AI & Data Analytics
AI in video surveillance tops Eagle Eye Networks 2024 trends report; this year’s list also includes affordable professional video monitoring, workplace security upgrades, licence-plate recognition for HOAs, and sustainable security.

Read more...