Wireless Video Surveillance Hijacking Threat

Author: John Honovich, Published on Mar 25, 2011

An Australian investigative report is highlighting the risk that video surveillance systems face from wireless hijacking. In this note, we examine the technical approach and consider the practical risks to production video surveillance systems.

The Australian report demonstrates how they can easily hack into video surveillance systems with a simple, low cost, readily available device. Here is a 3 minute video demonstration:

**** **** *** ***** ** **** *************** *** **** ** understand. **** ***** ************ ******* *** ********** ***** ******** ***********. These *** ********* **** *********** *** **** ** ********** *** small ********** *** **** **** *** ******. ****** ******** ************* ** ******** ***** ************ *********** **** $** ** $*** ***. ***** **** ********* ** not ***** ********** *** *********** *********** ** ********* *** *****. If *** **** **** * **** ******, ****** ** ***** you *** ****** ** **** *** (*** ***** ******* **** this ******* *** **** *** ***** *** **** *** ** aggressive ******* ** *** ********'* ****).

** *** ***** ****, ***** **** *** ************* ******** ** video ************ ******* *** ** ************ ******** ***********. *********, *** overwhelmingly ******** ** ************ ** ******** *** ********* ****** ** this ****. **** ***** ******** *******, ************ ******** ********* **** encryption ** *** ** ************, ********** ***** ***** ******** ********** from ************ *** ***** ****.

***** ********* ************ ** '************' ** ******** * ****** ***** of ******* **********, *** ***** ************ ************* *** ********* *** and ****** ** ********** ************ *******. ******* ** *** ******** of ********* ************ ************ ***********'* **** *** ********** ********** ** **** ************.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Wireless

'Clowns' Allege Ubiquiti 'Completely Fraudulent' on Sep 20, 2017
A short seller has alleged Ubiquiti is 'completely fraudulent'. Ubiquiti's CEO has responded calling them 'clowns'. Here is the short...
September IP Networking Course on Sep 14, 2017
LAST Chance - Registration is ending. Register now. This is the only networking course designed specifically for video surveillance professionals...
FLIR Lorex Wire Free System Tested on Aug 29, 2017
Wire free video surveillance is a major trend amongst consumers. But wire free systems tend to be designed for few cameras, lower resolution and...
Ubiquiti FrontRow Camera Tested on Aug 24, 2017
Ubiquiti is famous for low-cost wireless network equipment, a common choice for wireless video surveillance applications. The company has expanded...
Honeywell Total Connect 2.0 Tested on Aug 22, 2017
Honeywell is one of the biggest brands in security, with Total Connect 2.0 being the company's remote security and smarthome platform. We bought...
Startup Strops Completely Wireless Surveillance Camera Examined on Jul 28, 2017
European startup Strops has developed a surveillance camera that offers up to 6 days of runtime and cellular communications to create a fully...
Bosch G-Series Intrusion Tested on Jul 26, 2017
Bosch is one of the biggest names in intrusion, and the company's G-Series panels are their most advanced commercial and high-security panels. But...
Wireless Burglar Alarm Sensors Guide on Jul 21, 2017
Wireless sensors for burglar alarm sensors are an increasingly common option for the historical labor intensive wired alarm systems. However,...
Smoke Detectors Guide on Jul 06, 2017
Smoke detectors and carbon monoxide detectors add a life-safety component to burglar alarm systems. As intrusion detection sensors are used to...
"The Armed Robbery Epidemic" - NRF on Jul 06, 2017
The National Retail Federation (NRF) Protect 2017 featured a session titled: "The Armed Robbery Epidemic: How to Stay Safe". IPVM attended this...

Most Recent Industry Reports

Genetec Launches Cloud Access Control (Synergis SaaS) on Sep 21, 2017
Genetec's cloud everything expansion continues, with their announcement of Synergis SaaS edition, joining their cloud video offering Stratocast,...
Genetec CEO Warns Against Insider Threats on Sep 21, 2017
With Dahua and Hikvision cybersecurity issues becoming indisputable, a new counter has emerged. Just put them behind a firewall, buy cheap...
Automatic Door Operators For Access Tutorial on Sep 20, 2017
Opening and closing doors might sound simple, but it takes a high-tech piece of door hardware to pull it off. Integrating automatic door operators...
'Clowns' Allege Ubiquiti 'Completely Fraudulent' on Sep 20, 2017
A short seller has alleged Ubiquiti is 'completely fraudulent'. Ubiquiti's CEO has responded calling them 'clowns'. Here is the short...
Avigilon 'Blue' Cloud Entry Examined on Sep 19, 2017
Avigilon is moving to the cloud. The company announced their Avigilon Blue platform, designed to be a web-managed surveillance system, utilizing...
HID Buys Mercury Security on Sep 19, 2017
One of the biggest access control deals in years. Mercury Security, the most widely used access hardware OEM, and partner to 20+ manufacturers,...
Hikvision Backdoor Exploit on Sep 18, 2017
Full disclosure to the Hikvision backdoor has been released, allowing easy exploit of vulnerable Hikvision IP cameras. As the researcher, Monte...
Avigilon Touting 'Made In America' on Sep 18, 2017
Canadian manufacturer Avigilon, who completed a US manufacturing facility in 2015, is now running a marketing campaign touting 'Made In America',...
Cloud Guy Prints Book, Misses Irony on Sep 15, 2017
On-premise security systems are dead. But $75 print books are alive and well. Such are the lessons from Brivo's CEO new book "The Five...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact