The Most Dangerous (and Easiest) Way To Export Surveillance Video

Author: Brian Karas, Published on Mar 11, 2016

Rogue cellphones.

Most DVRs/NVRs and VMSes have options to limit video export to external devices, but none of them can fix the analog hole.

Circumventing Security via Cellphone

Facilities may implement security policies for user logins that prevent exporting or sharing of video, but that does not stop an operator from making a video with their cellphone.

Video of high-profile people can net a security guard a payment that could be more than a year's salary, as in the Ray Rice video.

The Jay Z elevator video is rumored to have gone for $250,000.

Other times the video might be exported just for fun:

It can be difficult to track down the source of cell-phone video leaks, making it tempting for employees to export video this way. The leaker of the Jay-Z video was found out and fired, but the leak behind the Ray Rice video was never identified.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

Another example: The Ft Lauderdale shooting video has been released, via a cellphone recording, again from TMZ:

Easier than Clumsy Systems

Sometimes cellphone recording and sharing of clips is to make up for clumsy or inefficient export functions. If you are trying to send a short clip to someone in a hurry, this method can be much faster than going through the process of selecting video for export, letting the export process complete, converting video to non-proprietary format and then emailing the clip.

For short videos, where the story is more important than the details in the video, screen recording via camera is effective. Videos of the brawl captured by the FLIR/Costco DIY system fit this example.

Often Used By Police

Police often complain about difficulties with exporting video. If video stored on citizen NVRs/DVRs cannot be intuitively exported in a simple format police officers have had to resort to using cellphones or body cams to record directly from monitors. This method reduces the quality of the video from the native format, but may be the only practical option in those cases.

No Cell Phone Policies

Privacy-conscious organizations have implemented "no cell phone" policies for operators that routinely work with video surveillance systems. Many video monitoring central stations prohibit operators from having cell phones in their possession while on shift.

With cameras built into phones, tablets and laptops it can be very hard to completely close off the analog loophole and prevent employees from recording on-screen video.

1 report cite this report:

Exporting Video Surveillance Tutorial on Oct 05, 2017
Exporting video surveillance is important when incidents or crimes occur. However, there are multiple ways to export video which have their pros...

Comments (12)

Only IPVM PRO Members may comment. Login or Join.

...but none of them can fix the analog hole.

Couple, three far out 'fixes' for the analog hole.

LCD refresh

You know how sometimes when you make a video of a PC it comes out really bad; dim and with rolling lines thru it? Usually this is a function of the display technology used + PC's refresh rate + the cameras shutter speed.

If you look at the individual frames, you would see many blank screen or partially blank screen frames. The brighter the screen of the PC, the faster the shutter of the cell phone, and the greater the chance of catching the PC during a blanking interval.

And unlike CRT's or even plasmas, LCD screens have little persistence in the luminance of their pixels. They switch on and off quickly and with little effect due to hysteresis. They also have a far wider range of refresh rates available, from 30hz to 240hz. I wonder if a rate could be found that would substantially degrade the picture?

Macrovision ripoff

You may have tried to copy a blockbuster VHS tape and been disappointed with the result. That is likely due to Macrovision protection, a scheme by which the auto gain of the recorder is fooled by a extremely quick and false signal that causes the recorder to constantly adjust the gain, leading to a crappy recording.

Likewise, perhaps a subliminal signal, to quick to be perceived by our eyes, could be introduced that would cause the cellphone camera to adjust by lowering the gain and degrading the video.

Key Lemon

Taking a different approach, there is a face recognition/authentication single sign-on program called Key Lemon, which can automatically lock the session if it no longer detects your face directly in front of the screen. It also records people who try to enter your session. Although, I'm sure someone could stay in front of the screen and record at the same time, I wonder if it could be modified to lock a session if it sees a cell phone in the frame.

I'm sure even that could be beat, but remember the people who take these videos have not figured out how to beat these systems ahead of time, it's not like they are expecting J-Z to walk into an elevator and beat someone up on camera. So just a decent deterrent that makes it harder than just point and shoot may be all you need to make someone think twice.

"It also records people who try to enter your session."

More generally, add a camera on the operators / control room. They may not like that but it would help in checking who filmed the video with their phones.

Exactly, second issue though is having people with access to this who are not trustworthy, if you have dodgy staff then you should be paying for the mistake of not having the right people. (my view on the companies that have these dodgy security guards recording the footage on cellphones)

How much do you have to pay a guard a year so that $250,000 in a day won't tempt him?

I don't consider there to be a correlation between ethics and pay level

Though they say "Every man has his price"...

It's true that cell phones are a problem and the cell videos of celebrities in jail and such are a liability. Look at the award against Marriott for the peep hole video.

Many VMS platforms log who reviews video and for what cameras, but once the genie is out of the bottle it's hard to get back in. Who can you trust and do you use two person authentication to review video?

It won't be the desk clerk paying 22 million in damages.

I have had customers give keys to the building to one employee and alarm codes to another. Two man rule.

Same concept the military uses in silo's. It doesn't make it impossible but it does reduce the odds.

High security places don't allow phones with cameras so for a long time Blackberry made a smart phone with no camera for government workers.

Just having fun here, but most crap DVRs are recording in a lower resolution than the monitor being viewed from yet an iPhone camera resolution is greater so there would actually be more pixels being used to record a video taken directly from a computer monitor attached to a crap DVR (with an iPhone).

This is kind of like the scanners being sold today, what is the point when you can take a picture with your iPhone at 12MP and hit send.

Technology is fun.

TMZ / cell phone strikes again: FT Lauderdale airport shooting footage recorded by cell phone, feared sold to TMZ.

Another vulnerability to be aware of is a MITM attack on the HDMI output of a VMS client that is undergoing the security reviews. I would think that one would even be able to capture 4K with this method with the right gear. I also have seen posts of encrypted HDCP streams failing on such attacks when the intent is to protect the stream. Security is from end to end and not point to point.

I would ensure strict guidelines and processes are set for those who leak video. Make the operators sign a non-disclosure agreement that if they end up leaking the video they could face with serious legal action. Enforce the same.

I usually put a small microdome camera in the Operator Room recording whenever there is someone in the room. This is to let the operators know that they are being watched. If someone does pull out a cell phone to record video - it will be captured.

Setup an Audit Log to capture all actions performed by an operator. Usually they would playback a video at a later date then record it. (not during the actual incident).

Ensure exported video is watermarked & digitally signed - both on storage & export ensuring a chain of trust.

Unfortunately whatever you do may still be a step short for someone who has intent. One can only hope that they have covered all bases.

Related Reports on Police

Chinese Police Wearing Facial Recognition Are Here on Feb 06, 2018
This is a very interesting and highly atypical usage of facial recognition that the Chinese government touted this week: It is a PRC police...
Washington DC Surveillance Hackers Arrested on Dec 29, 2017
The US Department of Justice has announced that "Two Romanian Suspects Charged With Hacking of Metropolitan Police Department Surveillance Cameras...
WSJ Investigates China's Total Surveillance State on Dec 26, 2017
The WSJ is continuing its investigation into Chinese video surveillance. Following up on last month's WSJ Investigation of Hikvision, the WSJ is...
BBC Features Dahua on Dec 13, 2017
Hikvision is not the only mega-Chinese video surveillance manufacturer getting global attention. Last month, the WSJ investigated Hikvision and now...
Panasonic Unified Surveillance Strategy Analyzed on Nov 17, 2017
Panasonic is now a "Unified Surveillance" offering, as their ASIS 2017 booth proclaimed: Looking to make a comeback in the security industry,...
WSJ Investigates Hikvision on Nov 13, 2017
The Wall Street Journal (WSJ) has released a detailed investigation into Hikvision's government ownership and cybersecurity problems, hitting the...
Genetec Citigraf Big Data Platform Analyzed on Oct 26, 2017
A big industry debate is whether VMS software is now a commodity. However, Genetec believes it can charge a substantial premium for higher-end...
Search More Important Than Live Monitoring - Statistics on Oct 18, 2017
Search is overall more important than live monitoring to integrators, according to new IPVM statistics.  The key themes found in integrator...
Exporting Video Surveillance Tutorial on Oct 05, 2017
Exporting video surveillance is important when incidents or crimes occur. However, there are multiple ways to export video which have their pros...
ASIS Show 2017 Final Report on Sep 27, 2017
ASIS is in Dallas for 2017 and this is our final show report (compare to our 2016 ASIS show report). When walking in, one is greeted with Dahua's...

Most Recent Industry Reports

Why 3VR Failed on Feb 16, 2018
3VR destroyed transformed ~$65 million in VC funding into a $6.9 million exit. The reason they failed is simple. They bet on analytics. They...
"Fear Mongering": Hikvision USA Cybersecurity Director Dismisses Chinese Government Ownership Concerns on Feb 16, 2018
The facts are: The Chinese government created Hikvision and is Hikvision's controlling shareholder. Hikvision's Chairman, a Communist Party...
16:9 vs 4:3 Video Aspect Ratio Statistics on Feb 16, 2018
What aspect ratio do security integrators prefer? The 'standard' 4:3 or the 'wide' 16:9 one? 100+ integrators told us what they preferred, with...
Mercury Releases New Series 3 Redboard Access Panels on Feb 15, 2018
Mercury Security has their first major product release post-HID buyout, and things literally look different. The Series 3 SIO boards now are red...
Last Chance February 2018 Camera Course on Feb 15, 2018
This is the last chance to get into the Winter camera course, starts next Tuesday. Register now. IPVM provides the best education, live online...
Hikvision DeepInMind Tested Terribly on Feb 15, 2018
While Hikvision is heavily marketing deep learning and 'AI' as their next big thing, new IPVM test results of their DeepInMind NVR shows their deep...
Genetec CEO: You Cannot Buy Trust on Feb 14, 2018
Genetec's CEO, Pierre Racz, delivered a direct message at their channel partner conference: Racz has become a focal point in the industry debate...
Assa's Lowest Power Draw Maglock: Securitron M680E Examined on Feb 14, 2018
Securitron produces some of the most extreme maglocks on the market, including massively strong maglocks and even ones with integrated CCTV cams...
Hanwha Wisenet X 5MP Camera Tested (XNV-8080R) on Feb 13, 2018
Wisenet X is Hanwha's high-end camera line. We tested their Wisenet X 1080p camera last year. Now Hanwha is offering 5MP cameras listing super low...
Top Problems For Integrator Project Management on Feb 13, 2018
Security projects routinely encounter issues that jeopardize deadlines, create confusion, and shrink profits. Unfortunately, there are common...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact