The Most Dangerous (and Easiest) Way To Export Surveillance Video

Author: Brian Karas, Published on Mar 11, 2016

Rogue cellphones.

Most DVRs/NVRs and VMSes have options to limit video export to external devices, but none of them can fix the analog hole.

Circumventing Security via Cellphone

Facilities may implement security policies for user logins that prevent exporting or sharing of video, but that does not stop an operator from making a video with their cellphone.

Video of high-profile people can net a security guard a payment that could be more than a year's salary, as in the Ray Rice video.

The Jay Z elevator video is rumored to have gone for $250,000.

Other times the video might be exported just for fun:

It can be difficult to track down the source of cell-phone video leaks, making it tempting for employees to export video this way. The leaker of the Jay-Z video was found out and fired, but the leak behind the Ray Rice video was never identified.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

Another example: The Ft Lauderdale shooting video has been released, via a cellphone recording, again from TMZ:

Easier than Clumsy Systems

Sometimes cellphone recording and sharing of clips is to make up for clumsy or inefficient export functions. If you are trying to send a short clip to someone in a hurry, this method can be much faster than going through the process of selecting video for export, letting the export process complete, converting video to non-proprietary format and then emailing the clip.

For short videos, where the story is more important than the details in the video, screen recording via camera is effective. Videos of the brawl captured by the FLIR/Costco DIY system fit this example.

Often Used By Police

Police often complain about difficulties with exporting video. If video stored on citizen NVRs/DVRs cannot be intuitively exported in a simple format police officers have had to resort to using cellphones or body cams to record directly from monitors. This method reduces the quality of the video from the native format, but may be the only practical option in those cases.

No Cell Phone Policies

Privacy-conscious organizations have implemented "no cell phone" policies for operators that routinely work with video surveillance systems. Many video monitoring central stations prohibit operators from having cell phones in their possession while on shift.

With cameras built into phones, tablets and laptops it can be very hard to completely close off the analog loophole and prevent employees from recording on-screen video.

1 report cite this report:

Exporting Video Surveillance Tutorial on Oct 05, 2017
Exporting video surveillance is important when incidents or crimes occur. However, there are multiple ways to export video which have their pros...

Comments (12)

Only IPVM PRO Members may comment. Login or Join.

...but none of them can fix the analog hole.

Couple, three far out 'fixes' for the analog hole.

LCD refresh

You know how sometimes when you make a video of a PC it comes out really bad; dim and with rolling lines thru it? Usually this is a function of the display technology used + PC's refresh rate + the cameras shutter speed.

If you look at the individual frames, you would see many blank screen or partially blank screen frames. The brighter the screen of the PC, the faster the shutter of the cell phone, and the greater the chance of catching the PC during a blanking interval.

And unlike CRT's or even plasmas, LCD screens have little persistence in the luminance of their pixels. They switch on and off quickly and with little effect due to hysteresis. They also have a far wider range of refresh rates available, from 30hz to 240hz. I wonder if a rate could be found that would substantially degrade the picture?

Macrovision ripoff

You may have tried to copy a blockbuster VHS tape and been disappointed with the result. That is likely due to Macrovision protection, a scheme by which the auto gain of the recorder is fooled by a extremely quick and false signal that causes the recorder to constantly adjust the gain, leading to a crappy recording.

Likewise, perhaps a subliminal signal, to quick to be perceived by our eyes, could be introduced that would cause the cellphone camera to adjust by lowering the gain and degrading the video.

Key Lemon

Taking a different approach, there is a face recognition/authentication single sign-on program called Key Lemon, which can automatically lock the session if it no longer detects your face directly in front of the screen. It also records people who try to enter your session. Although, I'm sure someone could stay in front of the screen and record at the same time, I wonder if it could be modified to lock a session if it sees a cell phone in the frame.

I'm sure even that could be beat, but remember the people who take these videos have not figured out how to beat these systems ahead of time, it's not like they are expecting J-Z to walk into an elevator and beat someone up on camera. So just a decent deterrent that makes it harder than just point and shoot may be all you need to make someone think twice.

"It also records people who try to enter your session."

More generally, add a camera on the operators / control room. They may not like that but it would help in checking who filmed the video with their phones.

Exactly, second issue though is having people with access to this who are not trustworthy, if you have dodgy staff then you should be paying for the mistake of not having the right people. (my view on the companies that have these dodgy security guards recording the footage on cellphones)

How much do you have to pay a guard a year so that $250,000 in a day won't tempt him?

I don't consider there to be a correlation between ethics and pay level

Though they say "Every man has his price"...

It's true that cell phones are a problem and the cell videos of celebrities in jail and such are a liability. Look at the award against Marriott for the peep hole video.

Many VMS platforms log who reviews video and for what cameras, but once the genie is out of the bottle it's hard to get back in. Who can you trust and do you use two person authentication to review video?

It won't be the desk clerk paying 22 million in damages.

I have had customers give keys to the building to one employee and alarm codes to another. Two man rule.

Same concept the military uses in silo's. It doesn't make it impossible but it does reduce the odds.

High security places don't allow phones with cameras so for a long time Blackberry made a smart phone with no camera for government workers.

Just having fun here, but most crap DVRs are recording in a lower resolution than the monitor being viewed from yet an iPhone camera resolution is greater so there would actually be more pixels being used to record a video taken directly from a computer monitor attached to a crap DVR (with an iPhone).

This is kind of like the scanners being sold today, what is the point when you can take a picture with your iPhone at 12MP and hit send.

Technology is fun.

TMZ / cell phone strikes again: FT Lauderdale airport shooting footage recorded by cell phone, feared sold to TMZ.

Another vulnerability to be aware of is a MITM attack on the HDMI output of a VMS client that is undergoing the security reviews. I would think that one would even be able to capture 4K with this method with the right gear. I also have seen posts of encrypted HDCP streams failing on such attacks when the intent is to protect the stream. Security is from end to end and not point to point.

I would ensure strict guidelines and processes are set for those who leak video. Make the operators sign a non-disclosure agreement that if they end up leaking the video they could face with serious legal action. Enforce the same.

I usually put a small microdome camera in the Operator Room recording whenever there is someone in the room. This is to let the operators know that they are being watched. If someone does pull out a cell phone to record video - it will be captured.

Setup an Audit Log to capture all actions performed by an operator. Usually they would playback a video at a later date then record it. (not during the actual incident).

Ensure exported video is watermarked & digitally signed - both on storage & export ensuring a chain of trust.

Unfortunately whatever you do may still be a step short for someone who has intent. One can only hope that they have covered all bases.

Related Reports on Police

Chinese Police Wearing Facial Recognition Are Here on Feb 06, 2018
This is a very interesting and highly atypical usage of facial recognition that the Chinese government touted this week: It is a PRC police...
Washington DC Surveillance Hackers Arrested on Dec 29, 2017
The US Department of Justice has announced that "Two Romanian Suspects Charged With Hacking of Metropolitan Police Department Surveillance Cameras...
WSJ Investigates China's Total Surveillance State on Dec 26, 2017
The WSJ is continuing its investigation into Chinese video surveillance. Following up on last month's WSJ Investigation of Hikvision, the WSJ is...
BBC Features Dahua on Dec 13, 2017
Hikvision is not the only mega-Chinese video surveillance manufacturer getting global attention. Last month, the WSJ investigated Hikvision and now...
Panasonic Unified Surveillance Strategy Analyzed on Nov 17, 2017
Panasonic is now a "Unified Surveillance" offering, as their ASIS 2017 booth proclaimed: Looking to make a comeback in the security industry,...
WSJ Investigates Hikvision on Nov 13, 2017
The Wall Street Journal (WSJ) has released a detailed investigation into Hikvision's government ownership and cybersecurity problems, hitting the...
Genetec Citigraf Big Data Platform Analyzed on Oct 26, 2017
A big industry debate is whether VMS software is now a commodity. However, Genetec believes it can charge a substantial premium for higher-end...
Search More Important Than Live Monitoring - Statistics on Oct 18, 2017
Search is overall more important than live monitoring to integrators, according to new IPVM statistics.  The key themes found in integrator...
Exporting Video Surveillance Tutorial on Oct 05, 2017
Exporting video surveillance is important when incidents or crimes occur. However, there are multiple ways to export video which have their pros...
ASIS Show 2017 Final Report on Sep 27, 2017
ASIS is in Dallas for 2017 and this is our final show report (compare to our 2016 ASIS show report). When walking in, one is greeted with Dahua's...

Most Recent Industry Reports

Save $50 Ends Tomorrow - April 2018 IP Networking Course on Mar 21, 2018
Save $50 ends this tomorrow, March 22nd. Register now and save. Lots of generic network training exists but none of it really explains how it...
Security Robot Sales Struggle on Mar 21, 2018
2 year ago, PSA Security CEO Bill Bozeman called security robots one of “the biggest game changers” in decades for security integrators. Just over...
Dahua Global Launch LeChange on Mar 20, 2018
Dahua is getting into the consumer video surveillance market globally, with "LeChange", an offering long available inside of China is now being...
Axis Z-Wave IP Camera Tested Poorly on Mar 20, 2018
Z-Wave is drawing notable interest for video surveillance use. In IPVM's initial coverage, 84% expressed interest in it, with nearly half being...
'As-Built' Drawings Tutorial on Mar 20, 2018
Closeout documentation can be invaluable for future expansions or maintenance work, and 'as-built' drawings are a key aspect for finishing projects...
Hikvision RSM Professional Misconduct on Mar 19, 2018
A Hikvision RSM engaged in professional misconduct of a US State's licensing law, involving continuing education held at an ADI branch. In this...
Thank You - Today, IPVM Turns 10 Years Old on Mar 19, 2018
IPVM turns 10 years old today. 10 years ago, IPVM was an experiment. Today, it is the largest and most read publication in our industry. I wanted...
Integrator Help Desk Software Usage (Statistics) on Mar 19, 2018
Maintaining accounts and customer satisfaction often depends on the effectiveness of responding to issues. Keeping an integrator's support...
May 2018 Camera Course on Mar 16, 2018
Our next course starts on May 8th. Register now for the Spring 2018 Camera Course This is the only independent surveillance camera course, based...
ADT Hammered Again, Loses Another Billion In Market Cap on Mar 16, 2018
ADT's CEO told investors that, 'in baseball terms', ADT was batting 5 for 5. But investors told ADT's CEO, 'in baseball terms', that he was...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact