When you decide to install home security cameras, where you place your cameras and how you use your footage is important to consider. For maximum protection, it is recommended to monitor common areas as well as possible points of entrance. While home surveillance is not banned, there are a few things to keep in mind to avoid breaking the law.
Home Surveillance Concerns
Within your home, you do have the right to record without informing others, but there are very large exceptions to this rule. First, any area where a “reasonable expectation of privacy” is assumed is off limits. For example, if your home security cameras are monitoring your front yard and possibly the sidewalk and street, your expectation of privacy in these areas is low. On the other hand, bathrooms and bedrooms, where you may be in a state of undress, have a high expectation of privacy, and, thus, are prohibited.
Second, if your cameras enable audio recording, you may want to brush up on wiretapping laws. While these vary slightly from state to state, federal statutes allow audio recording so long as one of the two parties consents. This basically means that you, as the recorder, may know and give consent without informing the other party. However, some states, including California, require dual consent, meaning both parties must be aware and agree to be recorded.
In regards to recording burglars, any trespassers forfeit any expectation of privacy in your home. You may record the person, submit the footage to police, and use your video in court.
For cameras that run non-stop and record audio, you will want to warn any person that is allowed access to your home that these cameras are there and running, otherwise you may run the risk of breaking wiretapping laws. These people include family members, guests/visitors, delivery persons or installers.
The Consent Conundrum
You may now be wondering how you can lawfully gain dual consent. Will verbal consent or a surveillance sticker in the window suffice, or should you have every guest fill out a consent form upon entering? Unfortunately, consent for audio recordings must be given in written form. It is a common misconception that window decals or yard signs are sufficient means to gain consent, as it is expected for visitors to see and recognize them.
However, in a home setting, there may be an exception to the rule. With home cameras, it boils down to what you do, or intend to do, with your recordings. If you don’t do anything with the recording, it is likely that no one will know or care – no harm, no foul.
If you do something with the recording, things change. For example, say a celebrity is a guest in your home and now you have footage of this celebrity hanging out in your home. While selling this footage to a gossip magazine for profit may seem enticing, you will be breaking the law. First, consent was never given from this celebrity. Second, you cannot use a recording for commercial gain without the subject’s consent.
In regards to wiretapping, a possible solution is to simply turn off audio recording if your devices permit. However, why turn off a service that you have paid for? While thieves are usually fairly quiet while they work, using audio recording for eavesdropping may be beneficial (but puts forth yet another ethical dilemma).
Uses For Recordings
Let’s say you record someone in your home plotting a crime, or admitting to committing a crime. Most states allow you to use the recording to prevent a crime or prove that one was committed.
However, if the recording does not involve a crime and you decide to post it on YouTube or a social media site, you could be engaging in illegal activity. Using a recording for exploitive or commercial purposes (as in the previous celebrity example) may be misappropriation if not all parties consent. As a reminder, laws vary from state to state so please look into your own state’s laws.
Also, even within your own home, recording with the intention of blackmail is illegal.
Law enforcement has the right to ask for your home surveillance if they suspect illegal activity, and a warrant will likely be necessary. However, since most recordings are stored in the cloud, they may be able to go straight to the provider and obtain the footage, bypassing your permission to access.
What Should You Do?
To err on the side of caution, be sure that everyone entering your home is aware that the cameras are there, and avoid placing them in areas where privacy is expected. If you wish to withhold the information, so long as you do not do anything with the footage, you should be fine.
However, there are other reasons to be careful with the privacy of your security cameras. While you may not have the intention to do bad things, hackers may be able to access your cameras and broadcast your feed. To protect yourself and your guests, it is advised to take reasonable security precautions (ex. strong passwords, maintain security Wi-Fi network), and take the ethical high road when using new technology.
Have any other tips or experiences to share? Connect with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.
Choose from our quality security cameras and surveillance equipment to protect your home or business. Shop our stock online or call 1-888-203-6294 today!
Businesses often turn to video surveillance to enhance security. In recent years, it has become a more feasible option for small businesses to employ cloud-based video surveillance due to lower costs and easy maintenance.
While some swear by the cloud, others are hesitant and worry about its security. If you are considering moving your video surveillance management to the cloud, you should get a better understanding of how it will work and how you can ensure that your data stays safe. Take these measures to ensure that your cloud-based video surveillance is as secure as it can get.
Is Your Hardware Secure?
Before you even think about cloud security, you must make sure that the equipment you have is free from security vulnerabilities. Do your homework and research different vendors’ reputation and history. Once you find a vendor you trust, make sure that your equipment is up-to-date with the proper software installed and in use. Maintain security by keeping your firmware current and using strong passwords. If your vendor has any other recommended best practices, be sure to follow them.
Vendor-Defined Cloud
Because the definition of “cloud” can vary from vendor to vendor, make sure you know exactly what your vendor is offering. When it comes to cloud service for video surveillance, you should be provided with camera management and data storage in the cloud. Your media infrastructure and value-added services should be managed in the cloud as well. Beware of vendors who advertise a cloud service, but really only offer remote access to a local device. This can be beneficial, but is limited in comparison to real cloud services.
Learn More About The Cloud & Data Center
If your cloud provider’s solutions are rooted on well-known cloud servers such as Amazon, Microsoft, or Google, you can rest assured that their general security is adequate. However, if they are using their own proprietary data center, you may want to proceed with caution. While there are secure clouds out there, you don’t know for sure how secure theirs is.
It is much easier to track a well-known cloud provider’s track record. For example, the Amazon AWS data center is supporting some of the largest internet services in the world. Their data storage environment is designed to limit the loss of data objects and is set for “encrypted at rest” which means it is stored encrypted in the cloud.
Camera To Cloud Connection
You should always understand how your system works. When it comes to your cloud-based video surveillance, you should know how your camera connects to the cloud. There are three different types of connections:
When it comes to your cloud solution, we will deal with the first two options only. If you prefer no network configuration required, your available options will be limited, but viable. Some vendors offer a solution to configure your cloud cameras with no network configuration, while others have built-in direct connections for your camera to the cloud.
Beyond that, any other cloud solution is likely a P2P solution, which tends to be less reliable than other options, so be sure to research your camera and cloud vendors.
The other option is to configure your own network to permit access to your own device from the internet. This is technically called “port forwarding” and, if done correctly, can be completely legitimate and safe way to configure your cameras. If you choose this route, here are some tips to boost security.
Implement these measures and work with your network or IT person and you have an adequate way to configure your cloud video surveillance system. You will avoid any black box P2P connections while opening up a huge list of cameras you can use for cloud surveillance.
Cloud To User Connection
Now that everything is in order, find out how the cloud makes your data available to you through its web or mobile apps. All your data and video is under their control, therefore the traffic from the cloud to your web browser or mobile app should be strongly authenticated with username and password and encrypted in transit using TLS, including standard web traffic and video streams.
While other limitations may occur (ex. bandwidth capacity), security concerns should not hold you back from cloud-based video surveillance. As evidenced, there are smart ways to keep your cloud video surveillance safe and secure. If done correctly, cloud-based video surveillance can offer a better solution than local storage solutions.
Does your business employ cloud-based surveillance? Share any tips or advice with us and your peers on Facebook, Google+, Twitter, LinkedIn, and Pinterest.
For a wide range of network IP security cameras, CCTV surveillance packages, and more, please visit SecurityCamExpert.com. If you have any questions and would like to speak to a representative, please call 1-888-203-6294.
People often take vacations over the summer, which makes it no surprise that July and August are the months with most break-ins. If you’re going away for a little vacation, use these tips to help keep your home and property safe.
Think Like A Burglar
Take a look at your home and think about the ways you would try to break in. These spots should be reinforced with extra security. You may also want to consider concealing your valuables. If burglars can see something they want through a window, they may be more likely to target that home.
Take Inventory
Take pictures of your home and your belongings before you leave. In case a burglar does target your house, the photos can help to document any damage and help you create an inventory log with estimated values of your items. Both of these can be especially helpful for insurance purposes.
Secure Indoors
These will need to be adjusted if you have a house sitter or pet sitter coming and going, but, in general, you should:
To avoid returning to damaged property, turn off and unplug electronics, such as TVs, computers, or other devices, that could be damaged in the event of power surges. Depending on the length of your vacation, you may want to consider turning off the water and gas as well.
Secure Outdoors
Neighborly Love
If possible, get your neighbors involved. Choose a trusted neighbor or two and politely ask them if they can keep an eye on things while you’re away, and offer to do that same if they leave. You can have the post office hold your mail, or have your neighbors pick it up, as well as any ads or flyers left on your door. You may also ask them to mow your lawn, trim plants, and set out trash cans, even if they are empty. This will help to keep up the charade that someone is occupying the home. Lastly, consider giving your most trusted a neighbor a spare key in case of emergencies.
Do you have any other tips to share? Find us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.
If you’re looking to upgrade or add a surveillance system to your home or business, please visit SecurityCamExpert.com. We carry a vast selection of quality security cameras, CCTV surveillance packages, and more at affordable prices. To schedule a free site survey or learn more about our installation services, please call 1-888-203-6294.
It seems like everyone is playing Pokémon Go. And if you’re not, you have at least witnessed others playing or have heard stories about it. For those who are not too familiar with it, Pokémon Go is a mobile game (available for both Android and iPhone) which uses your device’s ability to track time and location, allowing you to catch Pokémon like the original game. It creates an augmented reality where users must walk around to find Pokémon, and then throw virtual Poké balls to catch them.
Because the game requires you to walk around outside using your phone’s camera to see the Pokémon, you can likely imagine the dangers this can cause. In fact, there have been various stories in the news about how it can go wrong. Here are some tips on how to stay safe while playing Pokémon Go.
If you don’t feel safe, don’t go.
While catching a rare Pokémon can be quite alluring, it might be best to pass if it requires you to visit a questionable area. Different landmarks and real-life places are used for Poké Stops and Poké Gyms, however, the Pokémon are mostly randomly generated in various places (ex. backyards, inside buildings). These places are not always ideal, so use your best judgment when it comes to unsafe places or private property.
Be aware of yourself and others.
A large part of this game requires you to walk around staring at your phone. Remember, not everyone is playing the game so they may not understand what you are doing. Try your best to avoid loitering near homes or businesses. If someone approaches you, politely explain the game and what you are doing. Keep in mind that if someone feels uneasy about our presence, or if you are somewhere you shouldn’t be, they have the right to call the cops.
If you’re going for a long walk, be prepared.
Again, this game requires a lot of walking, especially if you catch an egg. Sometimes these walks can go on for longer than you expected. If you plan on heading out for a walk, be sure to bring water and plan your route out ahead of time with periodic rest stops just in case. That will minimize your risk of getting lost or overexerting yourself.
Be vigilant of your surroundings and your stuff.
Because Pokémon gyms and Poké stops are usually in highly populated areas, and are probably getting an increase in foot traffic, it is important to be mindful of your belongings. With so many people around, you never know if someone has bad intentions. It’s easy to get wrapped up in the game, so keep hold of your belongings to avoid someone walking off with it.
Watch out for scams.
Just days after its release, there were already scams out there, claiming you would have to pay a monthly for the free game. To clarify, you have the ability to make in-app purchases for in-app currency, however, outside of those, you do not have to pay to download or play the game.
Aside from that, be wary of lure modules on Poké stops, as these have already been used by armed robbers to attract players to a secluded area. That’s not to say that they’re all bad, but understand that some circumstances are questionable and, in that case, you may want to skip the chance and wait for the next opportunity.
Be courteous to others.
Another great aspect of this game, aside from getting people out of the house and on their feet, is the possibility of meeting and connecting with new people. With that being said, courtesy can go a long way. Don’t assume that every person engulfed in their phone is playing because it just simply isn’t the case. And if you approach someone and it seems like they don’t want to be bothered, leave them alone. If you’re the type who enjoys trash talk, please proceed with caution. This is meant to be a fun, light-hearted game.
As far as Poké stop locations go, if you are going to walk through a graveyard, be respectful of those who are there to grieve. The deceased have the right to rest in peace.
Are you playing Pokémon Go? Share your Pokémon Go tips, tricks, and experiences with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest!
For the best security cameras and surveillance system installation, visit SecurityCamExpert.com! Call 1-888-203-6294 to schedule a free site survey.
Installing a surveillance system in your home or business can provide you with a sense of security. However, if you do not properly secure your system, cyber criminals can gain access to your video feeds.
Aside from an unnerving invasion of privacy, unauthorized access to your surveillance video can help criminals study the area, identify where important property is located, figure out traffic patterns, sabotage systems, deny access to feeds, and much more.
Because IP security camera systems connect to LAN networks, extra precautions are necessary to safeguard your system from attacks. Breaches are usually due to human error, negligence, and misconfigurations, and can often be prevented. The following are common vulnerabilities and ways to protect your surveillance system.
Weak Passwords
Default usernames and passwords are common with most IP based security cameras. They are used to set up your system and accounts for remote access. Too often, people fail to change these passwords, or choose simple passwords, making it easy for strangers to access feeds.
Be sure to set strong passwords, use good password management or user certificates in lieu of passwords. You may want to consider changing your password periodically as well.
Poor Deployment
Avoid enabling unused services as it can leave your system vulnerable to attacks. For example, cyber criminals could install malicious applications and scripts using file transfer protocol (FTP) or an app platform from an untrusted developer.
Minimize your risk by disabling any unused services and installing only trusted apps.
Unclear Roles
Sometimes organizations fail to define who has access to different aspects of the surveillance system, possibly leading to confusion and employees with unnecessary access. For example, it may be unclear as to who is responsible for reviewing security measures to ensure proper protocol is being followed.
For IT departments, it is recommended to only allow users access to the resources they need to perform their job.
Software Bugs
Bugs and flaws in software codes can put your devices at risk. Luckily, you can do your part to prevent this.
Always keep your cameras, equipment, and software up-to-date with the latest firmware to ensure that bugs will not pose a threat. Vendors often post public common vulnerabilities and exposure reports which provide solutions for users.
Physical Installation Problems
Whether it is your cameras, wiring, or other infrastructure, poor installation can leave your system at risk.
Cameras should be installed out of reach to avoid any possible tampering or vandalism, but at a proper angle to view people and objects clearly.
Poor Physical Protection Of Equipment (Cabling, Servers, Gear)
If your cabling, server, or other surveillance equipment is not properly protected, your system is at risk for poor, intermittent performance. A small kink or damage to a cable can interfere with signal, causing disruption in your feed or even power failure.
Appropriate housing to protect your equipment from severe weather or extreme heat is available and is recommended for use if you are in an area susceptible to these conditions.
Poor Maintenance
Routine maintenance is ever important to ensure that your system is and will continue to function properly.
A preventative maintenance program should include a checklist of issues to look for in order to avoid small issues that can turn into big problems (ex. damaged/loose cameras and equipment, exposed, loose, or damaged cabling, dirt/moisture on camera lenses). This will allow the owner to become accustomed to the system and more aware when something seems different or wrong (ex. possible signs of tampering).
Flaws In Standard Network Protocols
Most network surveillance systems use standard network protocols (ex. FTP, TCP/IP), however, weaknesses or flaws in these protocols can expose surveillance data to attacks.
For video streams sent over the network, the latest advanced encryption methods should be used.
Failure To Align Hardware/Software On The Network With IT Policy
If your hardware or software does not meet your IT organization’s network security policy, there will be security issues. For example, third-party software or apps are often poorly supported or lack security patches which make them vulnerable to security breaches. Thus, your IT department will not be happy.
Enforcing a strong IT policy is imperative for any business.
How do you protect your surveillance system from cyber and physical attacks? Share your best tips with your peers on Facebook, Google+, Twitter, LinkedIn, and Pinterest!
Find a great selection of security cameras including IP surveillance cameras, CCTV security camera packages, and more at SecurityCamExpert.com. For more information, please call 1-888-203-6294.
Summer is upon us, and so too are the dangers of warmer weather. Practicing proper summer safety can help to keep you safe. Aside from itchy bug bites and unpleasant sunburns, here are ways to prevent and treat some common health issues.
Stings
Generally, these insects use their stingers when they need to defend themselves.
Prevention:
Treatment:
A sting can be painful and itchy, but for those that are allergic, it can be life-threatening.
Rashes
These three poison plants contain urushiol, which is an oily resin in the leaves. Contact with this causes a blistered, itchy rash in most people. Pets and clothes can also pick up the sap, and smoke from burning the leaves can carry it into the lungs.
Prevention:
Become familiar with that these plants look like. That way, you can actively avoid coming in contact if you come across them. Both poison ivy and oak have three leaves in clusters and grow as shrubs or vines (ivy). Poison sumac is a tall, tree-like shrub with rows of leaves.
Treatment:
Heat Stroke
If you live in the Los Angeles area, you know we have been experiencing some heat waves as of late. Those with an increased risk for heat-related illnesses include older adults (especially those with chronic illnesses), children 4 and under, males, and African Americans.
Prevention:
Treatment:
If you are experiencing these symptoms, get out of the heat and get to an emergency room as soon as possible. If heat stroke is left untreated, it can lead to serious health problems and even death.
Athlete’s Foot/Jock Itch
Dermatophytes are highly contagious fungi that thrive in warm, moist, dark areas. These can include athletic shoes post-workout or a wet bathing suit. When they come in contact with the skin, a person will develop a brownish-red rash between the toes, in the groin, or under breasts. Generally, this will not go away on its own.
Prevention:
Treatment:
Swimmer’s Ear
This occurs when water gets trapped in your ear, which leads to a bacterial infection causing pain, itching, and inflammation. Too much moisture can change the microflora of the ear canal, allowing bacteria to multiply.
Prevention:
Treatment:
Have you experienced any of these? Do you have any other tips? Share with us on Facebook, Google+, Twitter, Pinterest, and LinkedIn!
Your safety and security is important to us. We offer a wide selection of security cameras, CCTV surveillance packages, and more. Browse our stock online or call 1-888-203-6294 for more information.
Security cameras are a great way to keep an eye on your property or business. You can use them to look after your loved ones, protect your inventory, or deter intruders all together. As appealing as security camera systems are, it is wise to know and understand your local surveillance laws.
Before you invest in your own security cameras, please review these general guidelines. Remember, these are not meant to apply to your specific situation. Instead, they are meant to give you a general idea of what is and is not allowed. If you have any further questions regarding filming restrictions and such, please contact a local attorney or research laws within your city and state.
Filming
Camera placement is important because you want to capture high traffic areas, such as entrances and back doors. If you direct your camera at an insignificant area, you will waste time and money while defeating the purpose of your security system.
Placement is also important because there are areas that are off limits, including restrooms, other people’s homes, dressing rooms and locker rooms. Basically anywhere that there is an expectation of privacy, or you are likely to be in a state of undress, is off limits.
If you are unsure whether or not you are violating someone’s right to privacy, err on the side of caution and always consult a lawyer.
Loopholes
If you own a retail business, you may worry that customers might be committing crimes in blind spots such as dressing rooms, locker rooms, or restrooms. While legally you cannot monitor these areas, you can monitor the entrances/exits. Be sure that when the door opens, your camera does not get any glimpse of what’s behind that door, otherwise you could get into trouble. If a person goes into a restroom or dressing room with some inventory, and then exits without it that is a suggestion of a crime.
Areas that are viewable to the public are generally legal to film. This is how Google is able to provide the 360-degree street view for Google Maps. However, it is ill-advised to point your security cameras at your neighbor’s home. Whatever situation that warranted your desire or need to film your neighbor’s home could become escalated. Whether you are the one filming or the one being filmed, you may want to first speak with your neighbor about camera placement.
Audio
With audio recording, Federal Law only requires one person to know about the recording taking place. State laws will provide different regulations. Remember that federal law creates a baseline for laws. That is, state laws cannot allow for any less than one informed party.
Audio is not allowed to be obtained through eavesdropping or remote recording. Because at least one of the parties must know of the recording, you are not permitted to record conversations you are not a part of since you do not count as one of the parties. Even if the conversation is taking place in a public area, the parties can still expect privacy which protects them from eavesdroppers. In the same vein, you cannot leave your unattended recorder somewhere and use the recordings as evidence.
Loopholes
The easiest way to get around audio recording rules is to make the party aware that they are being recorded. For example, often times when you call a customer service line, you will likely hear, “This call may be recorded…” Continuing the conversation after this notification is usually viewed as consent. Thus, once you have informed someone that a room is being monitored by audio surveillance, they have the choice to continue their conversation in that room or move the discussion to a different room.
You may also record a person so long as you don’t intend on using the recording for illegal acts. Because one party is aware of the recording, the act of recording is not illegal. However, if your recording contains private information that is covered by the common law privacy, you may get into some hot water. The private information could be things like medical history (ex. miscarriage, abortion) so be sure to understand what is and is not covered.
The Constitution & Surveillance
The Fourth Amendment protects citizens from “…unreasonable searches and seizures…” and details the rights of privacy. While you may think that some public security cameras would count as unreasonable, the case of Delaware v. Prouse will tell you otherwise. In this case, the Supreme Court stated that “people are not shorn of all Fourth Amendment protection when they step from their homes onto the public sidewalks”.
As far as the First Amendment goes, there has not been any critique on a camera’s existence suppressing behavior. In fact, in the Laird v. Tatum case, the court found that government surveillance of anti-war protesters did not hinder their freedom of expression. This can help security camera owners when there are accusations of civil liberty violations.
Recording Police
The First Amendment also gives you the right to document civil servants as they are performing their civic duties. The recordings are simply viewed as a way of exercising your rights. Officers may ask you to stop recording and ask for the evidence, however, you do not have to submit to their requests unless they have a warrant for your property.
The only instance in which you may be violating the law is if you are interfering with an investigation. This is often used to remove reporters from a crime scene, but your personal security camera should not interfere with the investigation. In fact, your video surveillance may be of use for the investigation.
Dual Consent
If you ever wondered why most security cameras do not have microphones, it is because, in some cases, you may need dual consent to record audio. Violating dual consent is a felony. Your best bet is to get consent to be taped before recording, and then again as the first order of business when the recording begins. Off tape and on record consent will cover your bases if you are sued for violating wiretap laws. And although it is deemed “dual consent”, you must get the express consent of everyone being recorded.
The following states may have variations on the law and should be further researched: California, Connecticut, Florida, Hawaii, Illinois, Maryland, Massachusetts, Nevada, New Hampshire, Pennsylvania, and Washington.
Recording Employees
The employer must have a legitimate reason for recording. The off limits areas include restrooms, locker rooms, and dressing rooms. There may also be restrictions in the break room. Again, you cannot record any place in which a person should expect privacy. However, anywhere that an employee interacts with a customer can be monitored. For example, the sales floor is fair game, but a personal office may not be. You will need to use your best judgment or consult an attorney. Disclosing the use of surveillance equipment to your workers will cover your bases for any illegal wiretapping issues.
The biggest restriction for recording employees is in regards to unions. An employer may not record union activities such as meetings or even discussions about union business. And surveillance cannot be used to intimidate current or prospective members of the union.
Evidence for Trial
When you submit any type of recording to a court of law, the evidence is put on trial. The validity and handling of this evidence is then scrutinized. You, as the recorder, must prove that the evidence was in no way doctored. You must go through the steps of how the footage was obtained (ex. how the video was recorded, where the camera was located, the quality of the camera at different times of day, how it was stored, etc.), and verify the whereabouts of the evidence as it was transported to court. When the footage is not in court, it must be securely stored. The integrity of your recording may be compromised if there is any data loss due to a power surge or data dump.
With this information, you should be able to make informed decisions when it comes to your security camera system. If you have any tips to share, please connect with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.
For a great selection of quality security cameras, full CCTV surveillance packages, and more, please visit us online at SecurityCamExpert.com. To learn more about our installation and services, or to schedule a site survey, please call 1-888-203-6294.
Smart home technology offers more than just convenience for simple tasks. These smart devices can help safeguard your home and loved ones from the hidden dangers of your home. These are just some of the many ways you can use smart home technology to protect your property.
Water Damage
Do you live in an area prone to floods? Or do you simply want to know when there might be a water leak? Invest in a flood sensor, which can help you detect leaks or floods before it’s too late. Some sensors come with a smart valve shut off, which could automatically save your property from damage.
Protect Your Children
Aside from flood sensors, there are motion sensors that you can install as well. While these can alert you when a door or window is opened, you can also install them on different things around the house. Keep your kids out of the liquor or medicine cabinets, and even knife drawer if you choose. This can keep your mind at ease when your kids are home alone.
Deter Intruders
Most burglars will target empty homes since there is less chance of getting caught. So how do you prevent your home from becoming a target when you’re away? Invest in smart appliances that can make it appear as if you are home. These allow you to program lights to turn on and off in the evening. Some devices can even record your light patterns and play them back when you’re away.
Of course, you can always inform a trusted neighbor of your upcoming vacation and politely ask them to pick up the mail and keep an eye on things while you’re away. But investing in home security devices and systems couldn’t hurt.
Do you use any smart home devices? How have they helped you? Share with us on Facebook, Google+, Twitter, and now, LinkedIn. You can also find us on Vine and Pinterest.
Visit SecurityCamExpert.com for an excellent selection of CCTV surveillance cameras, security camera systems, recorders, and more. Call 1-888-203-6294 for more information about our products, site surveys, and installation services.
Smart homes allow you to connect different aspects of your home, including things like appliances, alarms, and sensors. Most find this concept alluring since you can control your appliances and home security remotely, allowing you peace of mind whether you are at home or away.
With the convenience provided by these smart home systems comes considerable risk. Some devices, while acting as a helpful tool, could end up hurting you if access to your system fell into the wrong hands.
In hopes to identify potential security risks and call attention to producers of smart home systems and devices, a team made up of Earlence Fernandes, Jaeyeon Jung, and Atul Prakash joined forces to look at different systems. The systems under study were those that were larger and more popular with consumers. They looked at common features, how devices interacted with each other, which third-party apps were supported, and most importantly, security features, among other aspects.
From this study, two major flaws were found:
Privileges
Akin to your smartphone asking for permission to access certain things on your phone, certain smart home devices and apps can access different functions with your permission. The problem therein lies in how these functions are grouped together.
For example, if an app can automatically lock a door after 9pm, it likely has the privilege to unlock it, although that function is not necessary. The app developer cannot ask for permission to lock a door without the ability to unlock it.
Most apps have access to more functions than they need, putting your security at risk.
Messaging
Because devices and apps can communicate through messaging (think instant messenger), sensitive data sent through this system can be vulnerable. For example, a door lock’s PIN code may be sent in a message. Since these messages are not entirely secure, any software that has the most basic access to your device can receive all the messages that the device generates or receives.
Other apps can also “impersonate” smart home equipment, in that, they can send messages that look like messages sent from real smart home devices. The phony app could possibly read and steal the network’s ID and then create a message.
Testing The Flaws
The team of researchers then created four different attacks to show how attackers could use the aforementioned flaws to their advantage.
For the first attack, they created an app that’s purpose was to simply monitor battery levels of various wireless devices around the home. However, after a user downloads the app, it can be reprogrammed to monitor other messages sent by those devices.
In the second attack, they were able to listen to the supposedly secure messages between an app and its companion mobile device. The team was able to impersonate the mobile device and send commands to the app, such as creating a new PIN which would give an attacker access to your home.
The third and fourth attacks involved disabling and enabling different functions. For example, a custom app could disable “vacation mode,” which allows the system to turn lights on and off to make the home seem as if it is occupied. Another app was able to falsely trigger a fire alarm by acting as a carbon monoxide monitor.
Security Improvements
Just because smart home systems currently have security flaws does not mean these systems and the Internet of Things do not have great potential. As of now, if you are considering adopting a smart home system, much like anything else, proceed with caution. You might want to think twice about giving third party apps access to your devices, and do some research on the security of the system you choose.
As security and technology improves with these systems, the Internet of Things and smart home systems will likely see much wider adoption. This could eventually lead to better quality of living.
Have you considered adopting a smart home system now or in the future? Do you currently employ any smart home devices? Share your thoughts and experiences with us on Facebook, Google+, Twitter, or Pinterest.
For an excellent selection of security cameras, CCTV surveillance packages, security equipment, and more, please visit SecurityCamExpert.com. If you have any questions, please call 1-888-203-6294.
Imagine coming home and finding that your house had been ransacked. It is a terrible feeling that we would never wish upon anyone, but, unfortunately, it does happen. According to the Federal Bureau of Investigation, there are approximately 2 million burglaries every year in the United States. There are security measures you can take to try and prevent thieves, but if you find yourself a victim of a break-in, be sure you know which steps to take immediately.
Police
Call the police. This should be your first instinct, but a reminder doesn’t hurt. Also, try not to touch anything in case the police want to dust for fingerprints.
If you think the intruders may still be in your home, leave. Get back into your car and go to a trusted neighbor, family, or friend’s house. Remember that your life is more important than any material things.
Insurance Agent
After you have contacted the police and the chaos has died down, you should call your insurance agent. Create an inventory of the items stolen, and anything that was damaged during the burglary. If the police report is not ready yet, take note of important details, such as the police report number, the law enforcement agency and the name of the officer that took the report, etc. You will be able to update your claim throughout the process, so don’t fret if you are unsure of everything that was stolen yet. Depending on the severity of the case, you can handle your claim online, over the phone, or a claims representative may visit.
Improve Your Home Security
Now that you have gotten the ball rolling on your police report and insurance claim, you may want to consider investing in a home security system, or upgrading your existing equipment. Because burglars know you will replace your belongings, you are likely to become a victim again. Typically, they will wait at least six months to a year to return. In that time, you can set up a home security system that will deter them or potentially catch them in the act. And if they don’t return, a security system can help you rest easy at night, and may even lower your insurance rates.
Remain Vigilant
You should let the police do their work and stay out of their way, but you might notice things that they may have missed. You can offer leads to the police, but you should not get your hopes up. For example, one homeowner whose television was stolen purposefully did not change her Netflix password. Eventually the homeowner realized that the thief was accessing her account through the stolen TV. Police were able to track down the IP address, but they could not render help until much later. By the time they had tracked down the stolen TV, the criminals were long gone. Despite the fact that this incident did not end happily, any leads you may come across might have a different outcome.
If you have any post-burglary or home security tips you would like to share, feel free to connect with us on Facebook, Google+, and Twitter. You can also find us on Vine and Pinterest.
Beef up your home or business security with our wide selection of CCTV security cameras, surveillance equipment, and more. Visit us online or call 1-888-203-6294 for more information.