Stopping Surveillance 'Videojacking'

Author: John Honovich, Published on Feb 16, 2011

A rising fear among security professionals is that surveillance video can be 'hijacked' and put on the Internet, resulting in embarassment or worse for the organization involved. A number of people are calling for more sophisticated and secure techniques to protect surveillance video. Unfortunately, such techniques do little to address the real risk and key threats to surveillance video.

A good example of the common but faulty recommendations offered can be found in a Feb 2011 Retail Solutions Online article where end to end encryption from the camera through the monitoring client is advocated. While this is technically possible (in at least some systems) and may be important for proving the validity of evidence in court, it does little to address the threat of videojacking.

**** ** *** ****** **** *** *********** ** ******* ************* are ****** *** ****** ****** - ****** ******** ********* ** incident (*.*., ********** ****** *****) ** ** ******* *** ****** ** * ******** ******* surveillance ***** (*.*., *************** ******** ****). ****** ******* ** **** *** ***** *** ** ******* and ***** ************ *****.

****** *** * **** **** ********* ****** ******* ******* ************ video **** *******. **** ******, *****'* ** **** ** ** a ********** ****** ** ******* ****** ** ****** *** *****. Just ** ****** *** ******** ** *** ******** ********** ****** and ***** ****** ** **** *****. ** ********, ******* ************ systems ** * *** ** **** *** ********** ****** **** compared ** **** **** *** *** ****** ** * ********* network (*** *** ******/********** **** ******* ** ******* * ***** ****?).

** **** ****** ** ******, ** *** * *********** *******:

  • ********** ******** ****** **** ****** ****** ** ***** ***** ***** is ************
  • ********** ****** ******* ** ***** ************ *******

*** ***** ****** ** ********* *** ******** ****** *** *** in * ******* ******** ****. ** ****, *** ****** ******, controlling ****** ** ************ ******* ** ***. **** ***** ***** their ************ ********** ******** ** *** ***. ***** **** ********* convenience *** ** ***** ********* ** *** ****** ******* **** in ** ****'* ********* ** * ********, ************ ****** ***** that ******* **** * ***** *** ******* ************ ***** ** a ******. 

******* ** ******** ****** ******* ******** *** ****** ** ********* to ****** ******** ***** *** ************* ****** *** ***** ***** inactivity. ******* ********* *** **** *****, ** ************, *** ***** users ***** ****** ********/********* ('*****' *** '*****' ** '*****' ** 'admin'). **** ***** ******** ********* ********* ***** ********** *** ****** that ******** ****** ****** *** ******.

******* ** ****** ******, ******** ************ **** *** ** ****. The **** ********* *** ** ****** **** ** ******* ******** access ******* ** *****, *** **********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Search More Important Than Live Monitoring on Oct 18, 2017
Search is overall more important than live monitoring to integrators, according to new IPVM statistics.   The key themes found in integrator...
Exacq M Series Low Cost NVR Tested on Oct 12, 2017
With recent cyber security issues hitting NVRs and cameras from low cost leaders Dahua and Hikvision, users are increasingly seeking alternatives...
Surveillance Systems Remote Access Usage Statistics on Oct 11, 2017
Remote access is a major benefit and risk for video surveillance. It is a benefit because it allows users to manage security or review...
Honeywell Discontinuing DragonFly on Oct 05, 2017
DIY is a big trend in the intrusion market and threat to incumbents. However, Honeywell is discontinuing their DragonFly DIY video-verified...
Dahua Trying, Struggling To Respond To Hacking Attacks on Oct 04, 2017
Now, 2 weeks since large-scale hacking attacks commenced against Dahua vulnerable devices, we analyze Dahua's response. On the positive side,...
Hikvision USA Misleads Dealers On Backdoor on Oct 03, 2017
Hikvision USA emailed their dealers overnight with their 5th cyber security 'special bulletin' of the year. Misleading Unfortunately, they...
FLIR Thermal Camera Multiple Vulnerabilities, Patch Released on Oct 03, 2017
Multiple cyber security vulnerabilities exist in FLIR thermal cameras, which have not been fixed, despite being reported months ago. In this note,...
Hackers Globally Attacking Dahua Recorders on Sep 25, 2017
Dahua recorders are being hacked and vandalized around the world, as confirmed by dozens of reports to IPVM since the attacks surged 5 days...
September IP Networking Course on Sep 14, 2017
LAST Chance - Registration is ending. Register now. This is the only networking course designed specifically for video surveillance professionals...
Hikvision Backdoor Exploit on Sep 03, 2017
Full disclosure to the Hikvision backdoor has been released, allowing easy exploit of vulnerable Hikvision IP cameras. As the researcher, Monte...

Most Recent Industry Reports

Dahua Removes Auto Rebooting on Oct 17, 2017
For years, Dahua has automatically programmed its IP cameras to reboot weekly, a highly atypical and questionable practice. Following IPVM...
Deep Learning Tutorial For Video Surveillance on Oct 17, 2017
Deep learning is a growing buzzword within physical security and video surveillance. But what is 'deep learning'? In this tutorial, we explain...
Multipoint Lock Access Control Tutorial on Oct 17, 2017
Doors are notoriously weak at stopping entry, and money can be misspent on wrong locks that leave doors quite vulnerable. While closed and locked...
Buy From B&H, Ship Direct From ADI on Oct 16, 2017
B&H, one of the largest online sellers of video surveillance equipment to end users, regularly purchases their video surveillance equipment...
Competing Against Siemens on Oct 16, 2017
Siemens entered the integration business with 15,000+ customers, through their acquisition of Security Technologies Group in 2001. Since that time,...
Geovision GV-EDR2100 Tested Vs Hikvision on Oct 16, 2017
A number of ADI's top selling IP cameras are, at least surprisingly to us, from Geovision. We recently bought and tested the Geovision EDR2100...
Top Problems Searching Surveillance Video (Statistics) on Oct 13, 2017
When crimes, accidents or incidents happen, the video surveillance system is a key component in finding out and proving what actually...
Exacq M Series Low Cost NVR Tested on Oct 12, 2017
With recent cyber security issues hitting NVRs and cameras from low cost leaders Dahua and Hikvision, users are increasingly seeking alternatives...
Long Time Industry Exec Leads New Security Franchise Offering on Oct 12, 2017
John Nemerofsky previously built and sold a $150 million dollar integration business, and then was VP of Niscayah from its spinout of Securitas,...
PoE Powered Access Control Tutorial on Oct 12, 2017
Powering access control with Power over Ethernet, like for IP cameras, has become increasingly common.  However, the demands for access power are...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact