Washington DC MPD's Surveillance Equipment

Author: Brian Karas, Published on Feb 21, 2017

The Washington DC Metropolitan Police Department's surveillance system was hacked in January 2017.

Two immediate questions were:

  • Whose equipment was it?
  • How did it happen?

We have been able to answer the first of those two questions through obtaining government records, which we examine inside.

*** ********** ** ************ ****** **********'* ************ ****** ********* ** ******* ****.

*** ********* ********* ****:

  • ***** ********* *** **?
  • *** *** ** ******?

** **** **** **** ** ****** *** ***** ** ***** two ********* ******* ********* ********** *******, ***** ** ******* ******.

[***************]

Executive *******

*** ********* **** **** ***** ******** ********** ** ****, *********** and *******.

Source *********

*** ********* (*,*) ******* *** ******** ********* ** *** *** ** ******* a ******** **** ****** ** ****: (*)**** ******** *********** (*)**** *** ************. *** ***** ********, ***** ******** *** ******** ***** ********* the ******** ** ** "******* **** ****** ******** ******* ******* Surveillance ******" (*****) *** *** ******, ****** *** ********* *********.

Avrio **********

*** ******* *** * ******* ** ***** *** *****. ***** was ** ** ***** *** ******* ** ******, **. ***** the ********** ** ***** *******, ***** *** ***** ******** ** Hitachi.

Avrio *******

*****'* ******* *** ******** ** ************** **** ****** ** ****** remote ******* *** ********* **** ***** *****. *******'* ***** ** configured **** ********* ******** ** **** ******** ************, ** *** time ***** ****** ****, ********, *******, *****, *** **** ** some ** ***** ********.

MPD ******* *************

******* *********** *** ***************** *** ******** ********* ***** **** ** *** ******** ******** by *** ***. *** ******* ********** ********:

*** *********** ****** ********* **** ***** ******* **** ***** ******** communications *** ***** ******. *******, *** ** *** ********** *** how * ****** *** **** ** ****** *** ********* ** unknown.

Ransomware ******

** *********** **** ******* ** *** ****, *** ***'* *** **** **** ********** *** ***** ** the ********* (********** ******* **-** *****). ********** ******** **** ****** on * ******* ***** *** **** **** *** **** ** receive * ********** *** ** ******* *** **** ** ** unencrypted ******. ** ** *** *** ***** *** ****** ** the **-**'* *** *********** ** ***** ******* ** ******* *** ransomware.

Ongoing *************

** *** ********** ** *********** *** ******* ** *** ****, including ************* **** *** ************* ********, *** **** ******* * separate ****** **** **** *********** ******* *********, ****** **** **** or **** ***** *******. ****** **** ****** *********, ****** ******* us ** ****@****.*** ************* ***** **.

Comments (14)

*** ******* **** **** ***** ** **** ** ***** ** part ** ****?

***** *** *** *** ***** *** ** **** ******* ** the ***** ******.

** **** ** *********** ** *** *** *** ** *** deep *** ********* ******* **** ** ********** *******, **** ** CRADLE *****. ******* **** **** ******** '****' *** **** **** it ** *** **** ******* ******* ******* ****** *************.

** ** *** * ******* ******* ***** ***!

**** ***** ***** ******* ****'* *** ******** **** ********** ************** targets.

*** ******** ***** ** **** * **** ** *** ******** first **** ** ***-******* ********. **** * ****** ** *** infected, ***** ** *** *** ********** *** *** ********** ** infect ***** *** ** *** *** ***** ** *********** ***** out *** ******** **.

**** **** **** **** ** ************ ** ****'* *********.

************, *'* *****, ** *** ***** ****. ***** * ****** surprised, *** * ********** ***** ** **** **** ********* ** I ***** *** **** ****. ** ************ *** ******** ***** a ******* ******* **** ***.

**** ***** ******** ***** **** **** *** ******* *** ****** strong **** ** ***** ** ***** ***** *** ******* ****** cyber ********, ** *** **** *********** **** ** ********** *** enforce *** ******* **** **** *** **** ******** *** ********** without ******* ****, *** **** ********** / *********** ***** **** as **** ************** ** **** ** ****** **** *** ******* side ** *** ***** ** ** ****** * ******** ************. Physical *** ***** ******** ******* **** ***** ** ****** **** they *** ******* **********.

* ***** ****, ******** **** ** * ******* ******. ******** they **** ******** ** ******* ;)

** *** **** ******** ******* ***'* ********? *** **** *** it **** **********? ********* ** ***, ****** ******** *** *****.

****** **** **** **** ** ******* *** **** ** ***** to ****** *** ****...* ** ******** **** **** **** *** an **** ********* ** *** ** ****** ** ******* **** to **** ******* ******, *** * ***** ****** ********* ** the ******* ** * ***** *******.

** **** * ******* ***** ***** ** **** * ***** of ********* ********* **** ******* **** ** **** ****** **** the ********, **** *** **** *******. ******* ** ** **** a ***** ******** ********* ** **** ******** ** ******* *** SV16s, ** **** ***** *** **** ********* **** ****** *** own *******. ******* ****, ** ***** **** ** * ******* machine ******* ** **********.

*** ***** **** *** *********** ******** ***** *** **** ***** came ** *****, ** *** *** ********* ******* (*** ** a **** ** *** ******** ******, ******* * ******, ******* the ***'*, ** **** **** * ******** ****** ** *** hardware ******)?

**** *** ***** ** ******* *********** ** * ****** ** this ** *** ** ********* ** **** *** **** ***** appliances?

* **** ****** **** ******* **** **** ***** *******, *** I'm ******** **** ** **** ***** ****...

* **** ****** **** ******* **** **** ***** *******

**** ******* *** ***** ** ****. **'* **** *****.

**** ** *** **** ***** ***** ******** ** ********* ** devices **** *** ****** *** ***** *** ********* ** *** easy ** ****** *** **** *** *********.

*** ***** **** * ******* ** *** *** ****** **? I **** ** ***** ** ********** (* ** ******** *** city *** *** ***, ** ** ***** **** ******** *** they ***** ***; ******* ******* *** ** **** **** *** re-install *** ** ***** ******** ***** **-**** ** **** ***** I *******) *** ** ***** ** *********** ** **** **** able ** ******** **** ***** ** ********** *** ****** **

*** ***** **** * ******* ** *** *** ****** **?

** *** ***, ***** ***** ************ **** * **** ******** ** ******. * **** *** **** *** *** **** ******* ***** on ***** *******.

* *****...*** **** *** ** * **** *****, **** ** a ******* *************. ********** **** *** ********** ******* *** *** fact **** *** ******* ********* ** ******* (*** **** **** probably * *** [* ** **** **** ******]) *****...*** ******* the ******* *******, **** ******** ******** ******* ** ** *** vulnerable.

** ****, ******* ***, **** ** *** **** ** *** equipment ******** ***'* ***********. **** *** ***.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Police

The False SCMP Story on Hikvision NYC AI on Jan 14, 2019
In the past week, one of Asia's largest publications, the South China Morning Post (SCMP), posted an article about "Chinese [facial recognition]...
Infinova's Xinjiang Business Examined on Dec 07, 2018
As pressure mounts for companies to stop doing business in China’s Xinjiang region amid a severe human rights crisis, IPVM has found Infinova sold...
ADT Wins Fire Death Suit But Faces Appeal on Dec 05, 2018
ADT/Protection 1 has won a wrongful death court case in which it was sued by the estate of a deceased customer. However, the attorney for the...
Evidence of Dahua's Involvement In Xinjiang Surveillance on Nov 28, 2018
IPVM adds new details about Dahua’s activities in Xinjiang, a Chinese region where mass surveillance used to facilitate grave human rights...
Pressure Mounts Against Dahua and Hikvision Xinjiang Business on Nov 19, 2018
Pressure is mounting against Hikvision, Dahua, and other companies operating in Xinjiang as an international outcry brews against the Chinese...
Directory of Access Control and Intrusion Startups on Oct 30, 2018
This directory catalogs access control and intrusion detection startups IPVM has found noteworthy. The directory is provided for your review to...
IACP 2018 Police Show Final Report on Oct 08, 2018
IPVM went to Orlando to cover the 2018 IACP conference, the country's largest police show (about as big as ASIS), examining the 700+...
Evidence Of Hikvision's Involvement With Xinjiang IJOP And Re-Education Camps on Oct 02, 2018
IPVM reveals as-yet unreported details about Hikvision’s activities in Xinjiang - a region of China where massive human rights abuses are being...
BluePoint Aims To Bring Life-Safety Mind-Set To Police Pull Stations on Sep 20, 2018
Fire alarm pull stations are commonplace but police ones are not. A self-funded startup, BluePoint Alert Solutions is aiming to make police pull...
Congressional Letter Urges Sanctions Against Dahua and Hikvision For Human Rights Abuses on Sep 04, 2018
17 US Congresspeople sent a letter to the Secretary of State and Treasury urging sanctions against Chinese officials plus Dahua and Hikvision,...

Most Recent Industry Reports

Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...
2019 IP Networking Book Released on Jan 14, 2019
The new IP Networking Book 2019 is a 285 page in-depth guide that teaches you how IT and telecom technologies impact modern security...
Arecont Costar Layoffs on Jan 14, 2019
Arecont Vision, a Costar Company, has laid off more than 10% of their workforce in a move the company described to IPVM as a result of "important...
The False SCMP Story on Hikvision NYC AI on Jan 14, 2019
In the past week, one of Asia's largest publications, the South China Morning Post (SCMP), posted an article about "Chinese [facial recognition]...
WDR Tutorial on Jan 11, 2019
Understanding wide dynamic range (WDR) is critical to capturing high quality images in demanding conditions. However, with no real standards, any...
Pelco Favorability Results 2019 on Jan 11, 2019
Pelco had a significant favorability problem amongst integrators in our previous study (see 2016 Pelco results). Now, in the first edition of our...
Bad: Dahua Villa Video Doorbell Tested on Jan 11, 2019
Doorbells are one of the hottest segments in the residential market but Dahua's Villa Video Doorbell is the worst we have tested.   We bought and...
Last Chance - Winter 2019 IP Networking Course on Jan 10, 2019
Today is the last day to register for the Winter 2019 IP Networking course. This is the only networking course designed specifically for video...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact