Installing a surveillance system in your home or business can provide you with a sense of security. However, if you do not properly secure your system, cyber criminals can gain access to your video feeds.
Aside from an unnerving invasion of privacy, unauthorized access to your surveillance video can help criminals study the area, identify where important property is located, figure out traffic patterns, sabotage systems, deny access to feeds, and much more.
Because IP security camera systems connect to LAN networks, extra precautions are necessary to safeguard your system from attacks. Breaches are usually due to human error, negligence, and misconfigurations, and can often be prevented. The following are common vulnerabilities and ways to protect your surveillance system.
Weak Passwords
Default usernames and passwords are common with most IP based security cameras. They are used to set up your system and accounts for remote access. Too often, people fail to change these passwords, or choose simple passwords, making it easy for strangers to access feeds.
Be sure to set strong passwords, use good password management or user certificates in lieu of passwords. You may want to consider changing your password periodically as well.
Poor Deployment
Avoid enabling unused services as it can leave your system vulnerable to attacks. For example, cyber criminals could install malicious applications and scripts using file transfer protocol (FTP) or an app platform from an untrusted developer.
Minimize your risk by disabling any unused services and installing only trusted apps.
Unclear Roles
Sometimes organizations fail to define who has access to different aspects of the surveillance system, possibly leading to confusion and employees with unnecessary access. For example, it may be unclear as to who is responsible for reviewing security measures to ensure proper protocol is being followed.
For IT departments, it is recommended to only allow users access to the resources they need to perform their job.
Software Bugs
Bugs and flaws in software codes can put your devices at risk. Luckily, you can do your part to prevent this.
Always keep your cameras, equipment, and software up-to-date with the latest firmware to ensure that bugs will not pose a threat. Vendors often post public common vulnerabilities and exposure reports which provide solutions for users.
Physical Installation Problems
Whether it is your cameras, wiring, or other infrastructure, poor installation can leave your system at risk.
Cameras should be installed out of reach to avoid any possible tampering or vandalism, but at a proper angle to view people and objects clearly.
Poor Physical Protection Of Equipment (Cabling, Servers, Gear)
If your cabling, server, or other surveillance equipment is not properly protected, your system is at risk for poor, intermittent performance. A small kink or damage to a cable can interfere with signal, causing disruption in your feed or even power failure.
Appropriate housing to protect your equipment from severe weather or extreme heat is available and is recommended for use if you are in an area susceptible to these conditions.
Poor Maintenance
Routine maintenance is ever important to ensure that your system is and will continue to function properly.
A preventative maintenance program should include a checklist of issues to look for in order to avoid small issues that can turn into big problems (ex. damaged/loose cameras and equipment, exposed, loose, or damaged cabling, dirt/moisture on camera lenses). This will allow the owner to become accustomed to the system and more aware when something seems different or wrong (ex. possible signs of tampering).
Flaws In Standard Network Protocols
Most network surveillance systems use standard network protocols (ex. FTP, TCP/IP), however, weaknesses or flaws in these protocols can expose surveillance data to attacks.
For video streams sent over the network, the latest advanced encryption methods should be used.
Failure To Align Hardware/Software On The Network With IT Policy
If your hardware or software does not meet your IT organization’s network security policy, there will be security issues. For example, third-party software or apps are often poorly supported or lack security patches which make them vulnerable to security breaches. Thus, your IT department will not be happy.
Enforcing a strong IT policy is imperative for any business.
How do you protect your surveillance system from cyber and physical attacks? Share your best tips with your peers on Facebook, Google+, Twitter, LinkedIn, and Pinterest!
Find a great selection of security cameras including IP surveillance cameras, CCTV security camera packages, and more at SecurityCamExpert.com. For more information, please call 1-888-203-6294.
Smart homes allow you to connect different aspects of your home, including things like appliances, alarms, and sensors. Most find this concept alluring since you can control your appliances and home security remotely, allowing you peace of mind whether you are at home or away.
With the convenience provided by these smart home systems comes considerable risk. Some devices, while acting as a helpful tool, could end up hurting you if access to your system fell into the wrong hands.
In hopes to identify potential security risks and call attention to producers of smart home systems and devices, a team made up of Earlence Fernandes, Jaeyeon Jung, and Atul Prakash joined forces to look at different systems. The systems under study were those that were larger and more popular with consumers. They looked at common features, how devices interacted with each other, which third-party apps were supported, and most importantly, security features, among other aspects.
From this study, two major flaws were found:
Privileges
Akin to your smartphone asking for permission to access certain things on your phone, certain smart home devices and apps can access different functions with your permission. The problem therein lies in how these functions are grouped together.
For example, if an app can automatically lock a door after 9pm, it likely has the privilege to unlock it, although that function is not necessary. The app developer cannot ask for permission to lock a door without the ability to unlock it.
Most apps have access to more functions than they need, putting your security at risk.
Messaging
Because devices and apps can communicate through messaging (think instant messenger), sensitive data sent through this system can be vulnerable. For example, a door lock’s PIN code may be sent in a message. Since these messages are not entirely secure, any software that has the most basic access to your device can receive all the messages that the device generates or receives.
Other apps can also “impersonate” smart home equipment, in that, they can send messages that look like messages sent from real smart home devices. The phony app could possibly read and steal the network’s ID and then create a message.
Testing The Flaws
The team of researchers then created four different attacks to show how attackers could use the aforementioned flaws to their advantage.
For the first attack, they created an app that’s purpose was to simply monitor battery levels of various wireless devices around the home. However, after a user downloads the app, it can be reprogrammed to monitor other messages sent by those devices.
In the second attack, they were able to listen to the supposedly secure messages between an app and its companion mobile device. The team was able to impersonate the mobile device and send commands to the app, such as creating a new PIN which would give an attacker access to your home.
The third and fourth attacks involved disabling and enabling different functions. For example, a custom app could disable “vacation mode,” which allows the system to turn lights on and off to make the home seem as if it is occupied. Another app was able to falsely trigger a fire alarm by acting as a carbon monoxide monitor.
Security Improvements
Just because smart home systems currently have security flaws does not mean these systems and the Internet of Things do not have great potential. As of now, if you are considering adopting a smart home system, much like anything else, proceed with caution. You might want to think twice about giving third party apps access to your devices, and do some research on the security of the system you choose.
As security and technology improves with these systems, the Internet of Things and smart home systems will likely see much wider adoption. This could eventually lead to better quality of living.
Have you considered adopting a smart home system now or in the future? Do you currently employ any smart home devices? Share your thoughts and experiences with us on Facebook, Google+, Twitter, or Pinterest.
For an excellent selection of security cameras, CCTV surveillance packages, security equipment, and more, please visit SecurityCamExpert.com. If you have any questions, please call 1-888-203-6294.
Facial recognition and biometric technology is being applied more often in different environments. For example, Facebook makes it easier for you to tag your friends in photos by using facial recognition technology. Some smartphones even allow you to use a fingerprint password to unlock your phone. Aside from these examples, facial recognition technology is also being used within some law enforcement agencies.
San Diego Law Enforcement has been using facial recognition technology since 2013, when it began as a research and development project funded by the National Institute of Justice. The Tactical Identification System (TACIDS) was comprised of 134 devices distributed among 67 certified law enforcement personnel. Today, it’s up to 433 devices among 991 personnel.
These devices are usually tablets or smartphones that have access to the Automated Regional Justice Information System (ARJIS) App. If an officer feels that an individual is being dishonest about his identity, or if the officer would like to determine whether or not the individual is a threat, he or she would use the device to take a photo. This photo is then sent to ARJIS’ Facial Recognition Platform (FRP) via text. The FRP produces a lineup of possible matches based on a biometric algorithm and sends it to the officer. The officer reviews the lineup, selects a match, and resubmits it to the ARJIS web server to pull the individual’s records. This process normally takes days, but can be accessed within minutes thanks to this advanced system.
Concerns have been raised by citizens, mainly focused on consent for photos and privacy issues. However, if any officer suspects an individual of being involved in a crime, he does not need to ask for consent. Also, the San Diego Association of Governments (SANDAG) assures that the photos that are submitted to the ARJIS FRP are not stored anywhere. Any of the photos taken on the devices must be deleted, whether or not a match was found. Furthermore, the photos are only compared to the sheriff’s department booking database, so if a person has not been booked at a county jail, then a match will not be found. SANDAG confirmed that ARJIS only has access to images of individuals arrested in San Diego County.
While this technology is mainly used by the San Diego Police Department, every law enforcement agency in San Diego has access to it. This includes the San Diego Unified School District, San Diego State University, and UC San Diego.
The main purpose of this tool is to improve policing techniques while better serving and protecting the people. What are your thoughts on the use of this technology by law enforcement? Share with us on Facebook, Google+, and Twitter. You can also connect with us on Vine and Pinterest.
Shop our selection of CCTV surveillance equipment and security cameras online or call 1-888-203-6294 to speak with us directly.
More and more people are turning to security systems to protect their homes. This is a smart decision, as security cameras will help you feel at ease whether you are in your home or on vacation. Unfortunately, when shopping for a security system, you may find that there are companies that seem genuine, but do not have the customer’s best interest at heart.
If you are thinking of investing in a home security system, here are some helpful tips to make sure you get the best deal on what you are looking for.
Consider your budget and what features are absolutely necessary and which you could live without. Credible businesses will work with you to build a home security system to suit your wants, needs and budget. You can ask for input or recommendations from friends, family, or even your home or renters insurance carrier.
Contact at least three companies before making a decision. This way you can compare prices and service, and ask important questions (ex. proper licensing, background checks for employees). This will also give you time to check reviews or do additional research before committing to a company.
If you have a budget, see what companies can offer for that price. Or you can compare prices from different businesses on a similar system. When getting quotes and prices, be sure ask about any other fees that may apply, for example, monthly monitoring fees or installation charges. It is also wise to consult with your insurance agent since home security systems may qualify you for a discount on homeowner’s premiums.
As with any contract, be sure that you fully understand it before signing. Know how long it will last, what it covers, terminations fees, etc. If your system is going to be monitored, those contracts typically last 2-5 years. Before you sign on to a long term contract, be sure to ask the major, important questions. For example, what happens if you are dissatisfied with the services provided? Is it possible to cancel the contract? As the consumer, what are your rights if the company is acquired by another company?
When shopping around, keep an eye out for these red flags:
Often times, trustworthy companies will give you time to think through the deal and make your decision. But if a seller is trying to pressure you into going with their company, don’t give in until you have done the proper research.
While some companies offer competitive prices, others may offer unbelievable deals that seem too good to be true. Most of the time, they are. In this case, “you get what you pay for” rings true. Whether it is defective equipment or a poor installation job, this is something to keep in mind when making your final decision.
If you cannot get a positive identification for your salesperson or the company, you may want to question using their services. Also, beware of sellers with no ties to their community. This could mean they might pull a disappearing act after mediocre services have been rendered and payments have been made.
It is always wise to check with the Better Business Bureau for any complaints or reviews about the company. If there have been complaints, you can see how the company handled the situation, giving you a better idea of the customer service you can expect.
Do you have any other shopping tips? Share them with us on Facebook, Google+, and Twitter. You can also find us on Pinterest and Vine.
Visit SecurityCamExpert.com to browse great deals on our quality stock of security cameras, CCTV surveillance packages, and more. Call 1-888-203-6294 to learn more about our equipment and services.
Cyber security is an ongoing problem, especially as our technology becomes a larger part of our everyday lives. Neither our efforts alone nor artificial intelligence (AI) have achieved a fool proof method. Our human-driven techniques are based on rules set by living experts, which means we miss any threats that don’t follow these rules. Machine-learning approaches, on the other hand, rely on anomaly detection, which often trigger “false positives” (nonthreats mistakenly identified as threats) that need to be checked by humans.
What if humans joined forces with AI? Researchers at MIT have been working on this concept and have produced some promising results.
AI² is a collaboration between researchers from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) and the startup company PatternEx. After three months of testing on 3.6 billion pieces of user-made data, it is said to detect 85% of attacks and reduce the number of false positives by a factor of five.
To find the most important potential problems, AI² uses machine learning first, and then shows the top events to analysts for labeling. After the analysts go through and confirm which events are actual attacks, the system incorporates this feedback into its models for the next set of data. This ongoing cycle of improvement decreases potential events and increases accuracy.
What are your thoughts on AI² and the interaction of humans and AI for cyber security measures? Share with us on Facebook, Google+, Twitter, and Pinterest. You can also find us on Vine.
Visit SecurityCamExpert.com for the best selection and prices on quality security cameras and CCTV surveillance equipment. If you have any questions and would like to speak with us directly, please call 1-888-203-6294.
Drones can be very beneficial when it comes to surveillance. Also known as unmanned aerial vehicles, drones provide benefits such as decreased risks, relatively lower costs, the ability to house advanced technologies, and more.
Because of this, Transport Canada is looking to employ a drone to patrol the Canadian Arctic. They are looking to enhance their efforts in monitoring things such as ice and oil spills. Currently, three manned airplanes are handling the job – one over each the Atlantic and the Pacific, and the third based in Ottawa for the Arctic.
With manned aircraft, the need for a qualified pilot on board can limit flight times, and some areas are simply too difficult and dangerous for the pilot to access.
Drones, however, are compact, can last longer, and can also reach more difficult areas. Without having to wait for skilled personnel, drones are flexible when it comes to flight and coverage times. They can also be modified with the appropriate technologies and devices for more comprehensive and effective surveillance.
The ideal drone would possess sensors, ground control equipment, and satellite communications, along with maintenance support including spare parts. The drone would need the capabilities to identify and track oil slicks, icebergs, whales, and foreign fishing vessels, to name a few. The necessary range would be at least 6,500km, and it would need to be able to track its target for at least six hours.
A likely candidate would be the Northrop Grumman Global Hawk, valued at about $300 million per new aircraft. The U.S. military already actively uses these Global Hawks.
We have yet to see if Transport Canada’s wishes come to fruition. Do you think drones would be a more efficient way to patrol the seas? Share your thoughts with us on Facebook, Google+, Twitter, or Pinterest. You can also find us on Vine.
Visit SecurityCamExpert.com to browse our stock of security cameras, CCTV surveillance equipment, and more. Call 1-888-203-6294 to inquire about our products or installations services.
4K video is the latest in surveillance technology, delivering exceptional image quality and resolution. With four times the resolution as 1080p HD, 4K video blows high-definition video and older standard video formats out of the water. But, without careful planning, its effectiveness can go down the drain.
Switching to 4K video, or even HD cameras, is not as easy as simply buying the new cameras. While HD cameras require four times the storage and bandwidth as a legacy 480TVL camera, 4K cameras require four times the storage and bandwidth as an HD camera. Without the proper equipment to support such requirements, your new 4K system may not live up to your expectations.
Here are a few things to consider when you decide to adopt the new 4K technology.
Data Switches
Simply adding 4K cameras to your current system can quickly overwhelm it. On a normal data network, legacy 100Mbps is standard and is designed for computing data, not video streaming. Normal user data is considered “bursty” because user data is sent in bursts and remains low until the next burst. Memory buffers are built in so that if more data is received than can be processed, the data is stored until it can catch up.
Unfortunately, video streaming does not work like that. Video is sent in a steady stream, and if more data comes in than can be handled, the switch does not have a chance to catch up. This overload of data can result in dropped videos, or the switch may even lock up until it is rebooted.
Imagine a system that has 10 20-megapixel cameras sending at 3.5 fps, and requiring about 112Mbps of bandwidth. Hooking these cameras up to a 110Mbps switch will overload it, causing the system to malfunction. In the same vein, if you have two 110Mbps switches that have five 20-megapixel cameras each, they require about 56Mbps each and should work accordingly. However, if these switches connect back to a main switch that cannot handle the workload, you end up with the same problem as the first scenario.
When choosing a switch for your system, there are many things to consider aside from the port speed. Location is important, whether it be a core switch or a field switch. Also, you will want to pay attention to its switching capacity and buffer size, along with different features and support.
Server/NVR
When it comes to server-based NVRs, again, if it is not designed to support and record at levels up to par with 4K or even HD cameras, you will come across performance issues. Things like bus speed and read-write speed on hard drives will affect how many devices you will need to support your cameras properly.
Storage Space
When planning for storage, you may want to consult with your IT department or an industry professional for guidance and advice. You must consider the number and type of cameras you need to support and how long you need the video to be retained. Proper storage abilities can make or break a quality surveillance system.
Power & Cooling
While often overlooked, power and cooling systems play a crucial role. Large scale video systems require a lot of equipment which need power for functioning, air conditioning to prevent overheating, and a UPS to safeguard from power outages or surges. Without these things, the best security systems would not be able to function properly.
Before you decide to upgrade to 4K security cameras, it is best to get a grasp on your system as a whole. Are you considering, or have you already, upgraded to a 4K surveillance system? Share your thoughts and advice with your peers and us on Facebook, Google+, Twitter, and Pinterest.
If you have any questions regarding security cameras, surveillance equipment, or are interested in our installation services, please call 1-888-203-6294 and we will be happy to assist you. You may also browse our inventory by visiting us online at SecurityCamExpert.com.
Surveillance in retail has a primary role in preventing theft and ensuring safety among staff and customers. However, as retailers make the switch from analog to IP camera systems, a multitude of new features are at their fingertips and can help provide advanced business insight.
While retail analytics are available and being used in some stores already, the potential for improving these technologies promises benefits for both the retail and security industry. Network cameras are being manufactured with intelligent analytics and video management systems can take these analytics further.
Things like hotspot detection and facial recognition give retailers data about the age range and in-store behavior of their customers. This information can help to improve the store layout and target promotions to maximize sales.
The solutions are ready to be applied, but there is hesitation for rollout. Marketing, IT, and security will need to understand how these technologies will benefit them before they decide to invest.
Because the systems are fairly scalable, retail analytics can appeal to various types of businesses. Companies can take a “build your own” approach by investing in the individual components and evaluate its value over time. From there, they can decide to potentially build out their system. For example, simply monitoring foot traffic can produce great benefits. Retailers can tailor events, promotions and new product displays to high traffic periods. This can also help with staffing, allowing more workers on the floor at busier times, and potentially improving customer service.
This can assist small business, as budgets may not allow for large scale retail analytics systems. And larger retailers can build from basic systems, adding any advanced features as they see fit. Things like heat mapping and inventory alerts enable managers to understand which areas attract customers for longer periods of time as well as how often products need to be restocked.
The most important detail is to ensure that all components can work together seamlessly. Manufacturers realize this and are working across industries to ensure compatibility. For example, Canon and NETAVIS have partnered to provide comprehensive and compatible surveillance cameras and video management software.
Since online stores have somewhat of an upper hand when it comes to customer data, retail analytics play an important role in keeping brick and mortar stores alive. In your opinion, how do you think retail analytics will help the customer experience? If you own a business, have you considered employing retail analytics? Share your thoughts with us on Facebook, Google+, Twitter, and Pinterest. You can find us on Vine, too!
Equip your business with the best security and surveillance solutions when you shop at SecurityCamExpert.com. Browse our selection online or call 1-888-203-6294 to learn more about our services.
It’s true – surveillance footage can provide beneficial evidence when trying to prosecute and charge criminals. However, a better way to utilize security camera resources is to actively monitor the live feeds, which, in turn, can lead to improved response times and increased safety.
That is precisely what a new security operations control center (SOCC) in Washington is aiming to do. Opened in November of last year, the Metro Transit Police Department (MTPD) is using this new center to solve and prevent crime within the public transportation system.
Within the SOCC, surveillance footage is displayed from a large projector onto the front wall. Suspects’ photos are displayed on flat-screen televisions around the room and there is a police bubble that overlooks the floor. In the police bubble are dispatchers and call takers who log emergency complaints and text tips and relay the information to officers in the system.
The same operations were previously offered, however, not housed in the same room. Now that all teams are gathered together into one area, communications are faster and more efficient than before. And with a price tag of $3.6 million, this fruitful investment is proving its worth.
With a comprehensive security camera system, authorities are able to effectively monitor all areas public areas. When crimes occur, witness statements can be corroborated with surveillance video, providing a solid case against criminals.
What are your thoughts on this new surveillance hub? Should it be adopted in other states? Share your thoughts with us on Facebook, Google+, Twitter, or Pinterest.
For our great selection of security cameras, CCTV surveillance, security systems, and more, visit us online at SecurityCamExpert.com. Call 1-888-203-6294 for more information or to inquire about our installation services.
When it comes to surveillance and privacy, individual views can vary drastically. While some may see surveillance as a violation of privacy, others may see it as a necessity in terms of safety. Then there are individuals who fall somewhere in between on the spectrum, basing their views on circumstance and perceived benefit.
According a recent Pew Research Center study, which surveyed 461 adult participants, plus nine online focus groups of 80 participants, it seems that most Americans would sacrifice their privacy in certain situations based on whether the outcome would be advantageous to them.
The participants were given proposed scenarios where some sort of surveillance or privacy was pushed for a supposed benefit. For example, one scenario posed was that of workplace surveillance. After a string of workplace thefts, the business was to install security cameras with facial recognition technology to identify the thieves, as well as use footage to measure employee attendance and performance. A majority of the participants found this acceptable (54%), some disagreed (24%), and others said ‘it depends’ (21%).
Another scenario was related to loyalty cards for retail stores. These cards would track purchases for special discounts. Almost half of the participants found it acceptable (47%) while almost a third found it unacceptable (32%). When it came to a “smart thermostat” that would monitor movements within the home, most participants found it unacceptable (55%) than acceptable (27%).
As you can tell, the less personal the surveillance, the more acceptable it seems to be perceived. However, most are still wary about disclosing personal information, and even more concerned about what happens to their information thereafter. The threat of spam, targeted ads, and the potential for data breaches, as we have seen lately, makes most hesitant to let their guard down.
All in all, the consensus when it comes to surveillance and privacy matters is “it depends.” Based on an individual’s trust of the company or business and his/her perception of risk and benefit, the person will decide whether or not it’s worth it. This type of conditional acceptance shows that it can be hard to predict whether certain surveillance measures will be tolerated.
What are your views on surveillance and privacy? Were the proposed scenarios acceptable or unacceptable to you? Share your thoughts with us on Facebook, Google+, Twitter, and Pinterest.
Visit SecurityCamExpert.com for the best selection of security cameras and CCTV surveillance systems and equipment.