Stopping Surveillance 'Videojacking'

Author: John Honovich, Published on Feb 16, 2011

A rising fear among security professionals is that surveillance video can be 'hijacked' and put on the Internet, resulting in embarassment or worse for the organization involved. A number of people are calling for more sophisticated and secure techniques to protect surveillance video. Unfortunately, such techniques do little to address the real risk and key threats to surveillance video.

A good example of the common but faulty recommendations offered can be found in a Feb 2011 Retail Solutions Online article where end to end encryption from the camera through the monitoring client is advocated. While this is technically possible (in at least some systems) and may be important for proving the validity of evidence in court, it does little to address the threat of videojacking.

**** ** *** ****** **** *** *********** ** ******* ************* are ****** *** ****** ****** - ****** ******** ********* ** incident (*.*., ********** ****** *****) ** ** ******* *** ****** ** * ******** ******* surveillance ***** (*.*., *************** ******** ****). ****** ******* ** **** *** ***** *** ** ******* and ***** ************ *****.

****** *** * **** **** ********* ****** ******* ******* ************ video **** *******. **** ******, *****'* ** **** ** ** a ********** ****** ** ******* ****** ** ****** *** *****. Just ** ****** *** ******** ** *** ******** ********** ****** and ***** ****** ** **** *****. ** ********, ******* ************ systems ** * *** ** **** *** ********** ****** **** compared ** **** **** *** *** ****** ** * ********* network (*** *** ******/********** **** ******* ** ******* * ***** ****?).

** **** ****** ** ******, ** *** * *********** *******:

  • ********** ******** ****** **** ****** ****** ** ***** ***** ***** is ************
  • ********** ****** ******* ** ***** ************ *******

*** ***** ****** ** ********* *** ******** ****** *** *** in * ******* ******** ****. ** ****, *** ****** ******, controlling ****** ** ************ ******* ** ***. **** ***** ***** their ************ ********** ******** ** *** ***. ***** **** ********* convenience *** ** ***** ********* ** *** ****** ******* **** in ** ****'* ********* ** * ********, ************ ****** ***** that ******* **** * ***** *** ******* ************ ***** ** a ******. 

******* ** ******** ****** ******* ******** *** ****** ** ********* to ****** ******** ***** *** ************* ****** *** ***** ***** inactivity. ******* ********* *** **** *****, ** ************, *** ***** users ***** ****** ********/********* ('*****' *** '*****' ** '*****' ** 'admin'). **** ***** ******** ********* ********* ***** ********** *** ****** that ******** ****** ****** *** ******.

******* ** ****** ******, ******** ************ **** *** ** ****. The **** ********* *** ** ****** **** ** ******* ******** access ******* ** *****, *** **********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

No Hack, Still Liable, Court Finds ADT on Jun 20, 2017
Recently, ADT has been in the news for a $16 million settlement for a cyber security vulnerability class action suit. One of the most important...
ESX 2017 Final Show Report on Jun 16, 2017
The ESX (Electronic Security Expo) day 3 / Thursday is done and the exhibits are over. IPVM was in Nashville covering it in-depth. Below covers...
RMR Integrator Importance Statistics on Jun 08, 2017
How do integrators feel about offering RMR / recurring revenue services? For many, their business revolves around RMR, while others see no...
Security Yard Signs and Stickers Guide on Jun 05, 2017
Many security integrators use signs or stickers with their company name and logo. Posting these in front the homes of residential customers...
Ex-ADT President And PE Firm Pay $200M+ For Alarm Dealer Guardian on May 31, 2017
Private equity firms are on the hunt for security companies with strong RMR numbers. One such security company, Guardian Alarm, was recently...
How To Hack Your Company's Hikvision Recorder on May 29, 2017
Here's how easy it is to hack your company's Hikvision recorder: It does not matter how hard or secret the admin password is. Hikvision will...
Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
Remote Video Monitoring Providers Directory on May 21, 2017
Remote video monitoring can help integrators generate RMR plus end users lower their security costs and/or improve response to critical...
Axis Criticizes OEMs: "When You Buy An Axis Camera, An Axis Camera Is What You Get!" on May 19, 2017
When you buy a Honeywell camera, you likely get a Hikvision, Dahua or some other company's product. The same goes for easily 100 different...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...

Most Recent Industry Reports

Avigilon VP Communications Exits on Jun 27, 2017
In 2016, Avigilon hired an executive, Darren Seed to: build and maintain strategic relationships with the investment community and to...
Hikvision H.265+ Tested on Jun 27, 2017
Hikvision, which in the past few years released H.264+ (see test results) has now released H.265+, that claims even greater bandwidth savings. We...
Milestone / Canon Launch Cloud Startup Arcus Global on Jun 27, 2017
Milestone has spun off a business, Arcus Global, funded by their parent company Canon. The new company aims to transform the VSaaS market with an...
Biometrics Pros and Cons For Electronic Access Control on Jun 26, 2017
Biometrics has been long sought as an alternative to the security risks of cards, pins and passwords. While biometrics has improved somewhat over...
Manufacturer Sales People Are Very Important - Statistics on Jun 26, 2017
IPVM's new integrator statistics show what sales people say regularly: Sales people are very important. From 150 integrator...
No Personal Opinions About Work on Jun 26, 2017
One rising trend is the tendency for people to disclaim their statements on work related topics as their own 'opinions' or 'personal...
Importance of Sales To Integrators - Statistics on Jun 23, 2017
One of the top trends in the industry over the past few years has been the rise of across-the-board sales (e.g.: Hikvision Sales, Dahua Sale,...
Deep Learning Surveillance Startups Deep Problem on Jun 23, 2017
The undeniably good news for the video surveillance market is that we are seeing the rise of more startups than in many years. The cause of this...
Avigilon Announces RADAR-Based Presence Detector on Jun 22, 2017
RADAR is gaining momentum within physical security. Two months after Axis announced a network radar detector, Avigilon has announced a RADAR-Based...
Covert Cloud Camera Service Launching (KJB) on Jun 22, 2017
Cloud IP cameras, for consumers, has become increasingly commonplace. However, covert cameras, lag there, with few options. Now, North America's...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact