Overcome the surveillance camera hacking loophole

April 2015 Surveillance

There has been much media attention and news reports recently on surveillance cameras being easily invaded by hackers (see http://goo.gl/mVz0hS for example). With the obtained video data and images, some have been uploaded to the Internet and are available to Web browsers. This is a serious issue, which can cause harm to public safety and privacy.

In theory any device linked to the Internet is susceptible to the risks of hackers’ attacks. This is particularly true for IP cameras, as they are designed to support open standards. Hackers are able to attack H.264 IP cameras through the Open Systems Services such as HTTP, RTSP, FTP which are commonly embedded in the cameras. By sending suitable open systems protocol commands to a H.264 IP camera or by capturing and analysing its open systems data streams, hackers can bypass the security of the camera and have access to live video footages remotely.

As you can imagine this would be a huge problem for industries that have to deal with classified information and highly confidential data on a daily basis, such as government and public sectors and banks. It is common to install CCTV cameras within offices, not only to monitor for suspicious activities but to also protect staff and the individuals of the data that they may be dealing with.

Dr. Wallace Ma, chief marketing officer of TeleEye Group.
Dr. Wallace Ma, chief marketing officer of TeleEye Group.

TeleEye has developed its own anti-hacking technology to close off any hacking loopholes. “TeleEye Hacker Resistant Technology comprises five layers of protection which is incorporated to the wide spectrum of TeleEye products,” states Dr. Wallace Ma, chief marketing officer of TeleEye.

The five layers

• Secured protocol – A set of special video streaming protocols is enabling to provide extra security during internal transmission.

• AES256 encryption – A higher-level encryption is adopted by the US government to protect top secret information.

• Pair matching architecture – TeleEye gives special identity to restrict any unauthorised access.

• IP filtering – Allow only designated IP address to access the cameras.

• Proprietary video coder – Hacker cannot recognise the video stream at all.

For more information contact TeleEye (South Africa), +27 (0)11 557 9200, www.teleeye.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Safer spaces through smart surveillance
NEC XON Surveillance
Advances in facial recognition technology are transforming surveillance from a mere recording tool into an intelligent, integrated system that enhances real-time safety, moving beyond the traditional expansion of CCTV efforts.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
Axis secures the Waterfront
Surveillance Entertainment and Hospitality (Industry) Retail (Industry)
Axis Communications shares insight into its longstanding partnership with the V&A Waterfront, one of Africa’s premier retail and mixed-use precincts, through its latest, updated customer success story.

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
Open and collaborative logistics systems
Hikvision South Africa Surveillance Logistics (Industry) AI & Data Analytics
E-commerce and other high-volume logistics operations need open and collaborative technology ecosystems that drive efficiencies, throughput and digital transformation. Hikvision discusses the benefits of harnessing open and collaborative systems in the logistics market.

Read more...
4K HDR camera for mobility
Surveillance Transport (Industry)
e-con Systems has introduced a 4K HDR front-view camera, engineered to deliver reliable, long-range imaging for mobility applications such as delivery robots, autonomous vehicles, and off-road vehicles.

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...