Washington DC MPD's Surveillance Equipment

Author: Brian Karas, Published on Feb 21, 2017

The Washington DC Metropolitan Police Department's surveillance system was hacked in January 2017.

Two immediate questions were:

  • Whose equipment was it?
  • How did it happen?

We have been able to answer the first of those two questions through obtaining government records, which we examine inside.

*** ********** ** ************ ****** **********'* ************ ****** ********* ** ******* ****.

*** ********* ********* ****:

  • ***** ********* *** **?
  • *** *** ** ******?

** **** **** **** ** ****** *** ***** ** ***** two ********* ******* ********* ********** *******, ***** ** ******* ******.

[***************]

Executive *******

*** ********* **** **** ***** ******** ********** ** ****, *********** and *******.

Source *********

*** ********* (*,*) ******* *** ******** ********* ** *** *** ** ******* a ******** **** ****** ** ****: (*)**** ******** *********** (*)**** *** ************. *** ***** ********, ***** ******** *** ******** ***** ********* the ******** ** ** "******* **** ****** ******** ******* ******* Surveillance ******" (*****) *** *** ******, ****** *** ********* *********.

Avrio **********

*** ******* *** * ******* ** ***** *** *****. ***** was ** ** ***** *** ******* ** ******, **. ***** the ********** ** ***** *******, ***** *** ***** ******** ** Hitachi.

Avrio *******

*****'* ******* *** ******** ** ************** **** ****** ** ****** remote ******* *** ********* **** ***** *****. *******'* ***** ** configured **** ********* ******** ** **** ******** ************, ** *** time ***** ****** ****, ********, *******, *****, *** **** ** some ** ***** ********.

MPD ******* *************

******* *********** *** ***************** *** ******** ********* ***** **** ** *** ******** ******** by *** ***. *** ******* ********** ********:

*** *********** ****** ********* **** ***** ******* **** ***** ******** communications *** ***** ******. *******, *** ** *** ********** *** how * ****** *** **** ** ****** *** ********* ** unknown.

Ransomware ******

** *********** **** ******* ** *** ****, *** ***'* *** **** **** ********** *** ***** ** the ********* (********** ******* **-** *****). ********** ******** **** ****** on * ******* ***** *** **** **** *** **** ** receive * ********** *** ** ******* *** **** ** ** unencrypted ******. ** ** *** *** ***** *** ****** ** the **-**'* *** *********** ** ***** ******* ** ******* *** ransomware.

Ongoing *************

** *** ********** ** *********** *** ******* ** *** ****, including ************* **** *** ************* ********, *** **** ******* * separate ****** **** **** *********** ******* *********, ****** **** **** or **** ***** *******. ****** **** ****** *********, ****** ******* us ** ****@****.*** ************* ***** **.

Comments (14)

*** ******* **** **** ***** ** **** ** ***** ** part ** ****?

***** *** *** *** ***** *** ** **** ******* ** the ***** ******.

** **** ** *********** ** *** *** *** ** *** deep *** ********* ******* **** ** ********** *******, **** ** CRADLE *****. ******* **** **** ******** '****' *** **** **** it ** *** **** ******* ******* ******* ****** *************.

** ** *** * ******* ******* ***** ***!

**** ***** ***** ******* ****'* *** ******** **** ********** ************** targets.

*** ******** ***** ** **** * **** ** *** ******** first **** ** ***-******* ********. **** * ****** ** *** infected, ***** ** *** *** ********** *** *** ********** ** infect ***** *** ** *** *** ***** ** *********** ***** out *** ******** **.

**** **** **** **** ** ************ ** ****'* *********.

************, *'* *****, ** *** ***** ****. ***** * ****** surprised, *** * ********** ***** ** **** **** ********* ** I ***** *** **** ****. ** ************ *** ******** ***** a ******* ******* **** ***.

**** ***** ******** ***** **** **** *** ******* *** ****** strong **** ** ***** ** ***** ***** *** ******* ****** cyber ********, ** *** **** *********** **** ** ********** *** enforce *** ******* **** **** *** **** ******** *** ********** without ******* ****, *** **** ********** / *********** ***** **** as **** ************** ** **** ** ****** **** *** ******* side ** *** ***** ** ** ****** * ******** ************. Physical *** ***** ******** ******* **** ***** ** ****** **** they *** ******* **********.

* ***** ****, ******** **** ** * ******* ******. ******** they **** ******** ** ******* ;)

** *** **** ******** ******* ***'* ********? *** **** *** it **** **********? ********* ** ***, ****** ******** *** *****.

****** **** **** **** ** ******* *** **** ** ***** to ****** *** ****...* ** ******** **** **** **** *** an **** ********* ** *** ** ****** ** ******* **** to **** ******* ******, *** * ***** ****** ********* ** the ******* ** * ***** *******.

** **** * ******* ***** ***** ** **** * ***** of ********* ********* **** ******* **** ** **** ****** **** the ********, **** *** **** *******. ******* ** ** **** a ***** ******** ********* ** **** ******** ** ******* *** SV16s, ** **** ***** *** **** ********* **** ****** *** own *******. ******* ****, ** ***** **** ** * ******* machine ******* ** **********.

*** ***** **** *** *********** ******** ***** *** **** ***** came ** *****, ** *** *** ********* ******* (*** ** a **** ** *** ******** ******, ******* * ******, ******* the ***'*, ** **** **** * ******** ****** ** *** hardware ******)?

**** *** ***** ** ******* *********** ** * ****** ** this ** *** ** ********* ** **** *** **** ***** appliances?

* **** ****** **** ******* **** **** ***** *******, *** I'm ******** **** ** **** ***** ****...

* **** ****** **** ******* **** **** ***** *******

**** ******* *** ***** ** ****. **'* **** *****.

**** ** *** **** ***** ***** ******** ** ********* ** devices **** *** ****** *** ***** *** ********* ** *** easy ** ****** *** **** *** *********.

*** ***** **** * ******* ** *** *** ****** **? I **** ** ***** ** ********** (* ** ******** *** city *** *** ***, ** ** ***** **** ******** *** they ***** ***; ******* ******* *** ** **** **** *** re-install *** ** ***** ******** ***** **-**** ** **** ***** I *******) *** ** ***** ** *********** ** **** **** able ** ******** **** ***** ** ********** *** ****** **

*** ***** **** * ******* ** *** *** ****** **?

** *** ***, ***** ***** ************ **** * **** ******** ** ******. * **** *** **** *** *** **** ******* ***** on ***** *******.

* *****...*** **** *** ** * **** *****, **** ** a ******* *************. ********** **** *** ********** ******* *** *** fact **** *** ******* ********* ** ******* (*** **** **** probably * *** [* ** **** **** ******]) *****...*** ******* the ******* *******, **** ******** ******** ******* ** ** *** vulnerable.

** ****, ******* ***, **** ** *** **** ** *** equipment ******** ***'* ***********. **** *** ***.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Police

Amazon Enters Home Security Services on Apr 26, 2018
Move over ADT? It is certainly what investors have feared for ADT, especially since Amazon acquired Ring. [Update: We spoke with Amazon and have...
ISC West 2018 Access Control Rundown on Apr 06, 2018
For ISC West 2018, what is new and interesting in access control?  This rundown will bring you up to speed on the exhibitors, what they are...
30+ Emerging Tech Companies Examined on Mar 28, 2018
ISC West has a new segment for 2018: the 'Emerging Technology Zone', which they boast: Featuring 50 of the latest and greatest startup...
Audio Usage In Video Surveillance Statistics on Mar 28, 2018
Audio is more widely available and easier to use than ever, with many IP cameras building audio in and often making integration as simple as...
Chinese Police Wearing Facial Recognition Are Here on Feb 06, 2018
This is a very interesting and highly atypical usage of facial recognition that the Chinese government touted this week: It is a PRC police...
Washington DC Surveillance Hackers Arrested on Dec 29, 2017
The US Department of Justice has announced that "Two Romanian Suspects Charged With Hacking of Metropolitan Police Department Surveillance Cameras...
WSJ Investigates China's Total Surveillance State on Dec 26, 2017
The WSJ is continuing its investigation into Chinese video surveillance. Following up on last month's WSJ Investigation of Hikvision, the WSJ is...
BBC Features Dahua on Dec 13, 2017
Hikvision is not the only mega-Chinese video surveillance manufacturer getting global attention. Last month, the WSJ investigated Hikvision and now...
Panasonic Unified Surveillance Strategy Analyzed on Nov 17, 2017
Panasonic is now a "Unified Surveillance" offering, as their ASIS 2017 booth proclaimed: Looking to make a comeback in the security industry,...
WSJ Investigates Hikvision on Nov 13, 2017
The Wall Street Journal (WSJ) has released a detailed investigation into Hikvision's government ownership and cybersecurity problems, hitting the...

Most Recent Industry Reports

Software Only VMS vs NVR Appliances on May 23, 2018
Should you buy your own PC/server and load VMS software on it or get a turnkey appliance (both hardware and software, e.g., NVR, Hybrid DVR) from a...
Buy Arecont: Top Bid $10 Million Cash on May 22, 2018
Last year, Arecont had a deal for a purchase price of $170 million (see Failed Arecont China Acquisition). This year, Arecont has a deal for a...
Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
The Hikvision Smart Classroom Behavior Management System on May 22, 2018
Hikvision's rapidly growing offering of analytics, which we most recently examined with Hikvision's ethnic minority analytics, is now going into...
Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact