Showing posts with label HIKVISION. Show all posts
Showing posts with label HIKVISION. Show all posts

Thursday, June 1, 2023

Ports on Security Camera NVR & DVR

Ports on Security Camera, NVR & DVR? 

When you receive your DVR you might be wondering what some of the ports are for. This article will explain some of them, the reason they are their as well as a little bit of history.

USB = Universal Serial Bus

Universal Serial Bus is an industry standard developed in the mid-1990s to replace the slower serial and ps2 communication ports on a computer.  The purpose was to be able to attach devices like a mouse, a keyboard, disk drives, network adapters, portable media players, and other devices that help qualify the word Universal in the name of the port.  It has become such a standard that it has evolved over the years as USB 1.x, USB 2.0, USB 3.0, USB 3.1, and USB Type-C.  The DVRs and NVRs continue with this trend by offering USB ports for connecting a mouse and flash drives or hard drives to the unit by using one of the available ports.  Unfortunately, USB keyboards are not supported by the operating system and only the online keyboard is available for entering data.  DVRs and NVRs are very similar to computers, so the device needs to be supported in the operating system.  This matters especially when connecting drives in the sense that you could try to use a USB drive that is too new for the unit.  A DVR or NVR manufactured during a certain era will only support flash drives and hard drives with sizes appropriate to that era.  For example, you will not find a 64GB flash drive or a 6 Terabyte hard drive in 2007.  There is no harm plugging in a USB drive to see if it is recognized since the port is plug and play.

Ethernet Port

An 8P8C (8 position 8 contact) modular connector, often called RJ45 (Registered Jack 45), has become an extremely important plug since the world wide web is connected with this standard Ethernet port on all kinds of devices.  Our DVRs have one Ethernet port so that they can connect to a router for access to the unit from the world wide web.  Our NVRs have the same port, and may also have power over Ethernet ports (POE) for cameras to connect to it for power and video data transmission.  You can buy an 8 channel NVR, for example, that has a built-in 8 port POE switch that allows you to plug 8 IP network cameras into the back of the unit.  You can also buy an 8 channel NVR that does not have any built in POE ports, so the video data would need to be networked back to the NVR.  This can congest a network if you have other computers and devices using the same routers and switches, but there are ways to design your network topology to reduce or separate traffic.

BNC Connector

The BNC connector derived its name from Bayonet Neill–Concelman, which is a combination of its bayonet mount locking mechanism and its inventors, Paul Neill and Carl Concelman.  The BNC connector is a quick connect radio frequency connector commonly made in 50 and 75 ohm versions used for coaxial cable. 

This connector has become the heart and soul of the analog and HD-CVI DVR because of a quick plug and play connection option.  Many people like to use existing coax cable and continue to use it with new technologies like HD-CVI rather than mess with a complete overhaul to an IP technology system.  While IP may be the future, this connector has found new legs with new technologies and should remain viable for years to come.  As long as coax cable still exists, the BNC connector will remain the default option.

RCA Connector

An RCA connector is designed to carry audio and video signals, and received its name from the Radio Corporation of America in the early 40s when it was designed to be an internal connector in home radio-phonograph consoles.  This port has evolved over the years to encompass video in the famous red, white, and yellow composite video.  Our DVRs and NVRs use the connector for audio-in and audio-out primarily since video on our DVRs is covered by the BNC port and NVRs use networking to transmit video.

HDMI Port

HDMI stands for High-Definition Multimedia Interface, and it is a proprietary interface designed for sending video and audio to and from HDMI compliant devices.  The video is uncompressed and the audio can be compressed or uncompressed.  Our DVRs and NVRs have this port as a connection option to a TV or monitor for viewing the live video or playback, as well as adjusting the settings of the unit through the menu options.  The main improvement of this port over VGA, for example, is the ability to do high definition without video loss, which allows us to see higher quality video.  This means that we can see more cameras on the screen at one time clearly and see more detail.

In Summary

There were many ports used in the past that are now likely on the way out.  Most notably is the RS485 connector that is used to control the PTZ cameras.  With Ethernet IP camera and HD-CVI camera technologies taking off, connecting a PTZ is now done over the one cable with no additional cables needed for PTZ control.  They should still be present on hybrids and tribrids, but anyone buying a new system should opt for one of the new technologies since video surveillance is about protecting assets.  VGA should hang around a little longer, but HDMIs ability to handle high definition video without video loss and audio on the same cable, make it very convenient.  RS232 / Serial, PS2, LPT, are all in the port graveyard, but there are likely still some machines out there that have them.

No doubt that new standard ports will come, as they are always being invented or improved.  The research and development teams at all technology companies are working towards the next big thing, so that they can create a new standard port for years to come.  DVR and NVR companies will incorporate any new port into their system that is useful as it grows in popularity.  For example, if a port replaces USB 3.0 for connecting external hard drives, that would become a standard very quickly.

Some software based port are required to come online of IP camera, DVR or NVR. One for the HTTP port (port 80) and one for the TCP port (port 37777). You will find that the majority of network devices which are accessible using an Internet browser will be set as standard to port 80, including IP cameras and routers etc. This is due to the standard port for HTTP, or information being displayed through an browser, being port 80.

HTTPS (Hypertext Transfer Protocol Secure) is a secured HTTP version where all traffic is bind with strong encryption that passes through Port 443. This port is also connected with TCP protocol and creates a secure connection between the webpages and browser.

Port 554 RTSP for communication between the Content Server and the Wowza Media Server. Needs to be open between the Content Server and the Wowza Media Server.

TCP port 9530 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 9530 in the same order in which they were sent. Guaranteed communication over TCP port 9530 is the main difference between TCP and UDP. UDP port 9530 would not have guaranteed communication as TCP.

A web server would typically have this open and listening if there are any types of these activities. If the machine is windows you can run "netstat -a -b -v -n", to display the processes associated with a particular open port.

A backdoor was found in Chinese-produced DVRs and NVRs that secretly allowed access to the recorders. While it was first attributed to Huawei (HiSilicon), Huawei subsequently refuted their involvement.

How the Backdoor Works

The backdoor uses port knocking via the management port of vulnerable equipment. A series of commands are sent to the device via the management port, TCP 9530, which in turn opens telnet. When telnet is enabled the attacker can use one of six hardcoded root credentials to gain full control of the vulnerable device.

The skill level needed to exploit this is low and similar to the skill level needed to exploit the Dahua Wiretapping Vulnerability from last year, requiring a limited working knowledge of python. A proof of concept is available, which is used to:

  • Send a command to open Telnet on the target device (OpenTelnet: OpenOnce)
  • Use a pre-shared key for access (2wj9fsa2)
  • Receive an 8 character number / respond with that number + PSK
  • Open a Telnet session with the device
  • Login with 1 of 6 hardcoded root accounts

Major Chinese Manufacturer Impact Unlikely

Major China manufacturers like Dahua, Hikvision, Uniview are not impacted, from everything we have seen. We executed the proof of concept code from the disclosure on multiple devices and were unable to gain access using the backdoor.

The backdoor primarily impacts devices using HiSilicon SOC with Xiongmai software, which is dozens of small OEM manufacturers, using minimally modified OEM firmware, Open Source OS and drivers, and enabling telnet on port 9530.

Wednesday, March 15, 2023

Camera Ban Due to Zero Cyber Security

 Camera Ban Due to Zero Cyber Security

Since what some experts considered a password-free engineering hack was found between firmware layers in HikVision cameras around 5 years ago, CCTV cameras manufactured in China have been squeezed from Australian federal government contracts, despite the fact no Chinese-made video surveillance camera in Australia (or anywhere else in the world) has been found transmitting video streams to the Chinese Government. 


The US communications regulator singled out tech giants Huawei and ZTE and surveillance camera makers Hikvision and Dahua. Spy chiefs have warned that the US could be vulnerable to economic espionage or digital sabotage.

The UK Government departments have been told to stop installing surveillance cameras made by Chinese companies on "sensitive sites" because of security concerns.

Both the UK and Scottish governments have banned Hikvision plus other PRC providers from certain government usage for national security reasons, in a sea change for UK video surveillance.

The Governor of New Hampshire has banned products from certain PRC companies including Dahua, Hikvision, and TikTok for use on state networks or devices in an executive order.

Security threat accusation is made against the Smart City project. The Mangaluru City Corporation (MCC) has installed Hikvision brand CCTV cameras in the city. This company is of China origin.

The Indian government has restricted PRC manufacturers such as Dahua and Hikvision from bidding on Indian government projects.


At this point, it’s worth noting that almost all professional CCTV cameras are installed on secure subnets supported by dedicated switches, servers, and video management systems, or they are installed standalone on DVR and NVRs. These systems log network actions from authorised users, including camera views, saves, searches and applications of analytics functionality, where this applies.

It goes without saying that no pro-grade network intrusion detection system could fail to alert network engineers to the transmission of big band video signals from secure network ports to an external network location. It would generate an immediate alert, remedial action and public condemnation.

While IP cameras can upgrade firmware automatically over public networks and will undertake handshakes with a manufacturer’s servers, these actions are ubiquitous across network devices of all types and, in the case of CCTV cameras, can be deactivated, with devices either left using original firmware, or upgraded manually.

Typically, network-based electronic security systems are updated manually by security teams managing system maintenance. These Australian security techs are highly integrated with an end user’s security operations team and will respond at a moment’s notice to issues of camera performance, network failure, or network breach.

Further, in compact applications, such as in the suburban high street offices of MPs, 3-4 CCTV cameras are installed in a basic star configuration that revolves around a PoE NVR/DVR supported by a dedicated keyboard, mouse and monitor. They are not connected to local data networks, let alone hooked to out of country servers – unlike a significant number of other manufacturers, neither Hikvision nor Dahua offers VSaaS in Australia.

Typically, the basic turret cameras used in such applications are mid-wide angle, have modest resolutions, fixed lenses, and are installed with an outward-facing angle of view covering front and rear entrances, car spaces and foyers to allow recording of events for police investigation after an incident.

Recordings are undertaken on local hard drives and written over after 30 days. Viewing of footage and event searches can only be undertaken by a person with access control rights to the location, and who is authenticated with a password issued by a nominated system administrator – typically an admin assistant or office manager who works on-site.

These cameras are installed for safety and security, not to ‘spy’ on MPs. Nor are these cameras being ‘found’ by shocked staffers in third-tier government applications, as if the cameras crept in at night and hung themselves onto walls, as some news websites have implied.

These CCTV systems were installed in plain sight by professional Australian security technicians using products supplied and supported by professional Australian security distributors with technical support from suppliers’ local operations, after an official government tender process.

These cameras and related systems were chosen by government decision makers because they offered the best performance for the least cost. This is not an imperative that will change when government agencies next take locations with modest security requirements to tender.

Similar strictures around installation and governance apply to the 11 Hikvision cameras at the Australian War Memorial, which are likely external bullet cameras installed to view choke points and entries, and are entirely governed by local subnet rules and managed and viewed using an over-arching video management system provided by a third party.

This server-based VMS brings together all the cameras across the site onto a video wall for monitoring by a dedicated security team. It’s normal for a major site like the Australian War Memorial to have multiple camera brands and camera types installed for different reasons at different times with different priorities of budget. Expensive upgrades are undertaken in stages.

Milestone has discontinued technology partnerships with "mainland China" companies, including mega-manufacturers Dahua and Hikvision, the company confirmed to IPVM.

Ambarella, a major supplier of AI chips for IP cameras, has stopped selling to Dahua, Ambarella confirmed to IPVM.

Western Digital and Seagate are no longer selling to Dahua due to US semiconductor export controls imposed on Nov 2022, IPVM has confirmed with WD directly and from sources for Seagate.

ADI has stopped relabeling Dahua, a year after the company secretly started selling relabeled Dahua gear as an ADI house product, despite the NDAA ban, human rights sanctions, and the FCC designation of Dahua as a threat to national security.

The most cyber secure IP surveillance camera is Mobotix, however, the Australian government rarely uses this brand, despite its enormous operational flexibility and impeccable cybersecurity credentials. Bosch, Axis and iPro are also highly regarded, and tier 1 offerings from everyone else – including HikVision and Dahua, which put considerable effort into cybersecurity and transparency to correct early issues that impacted all CCTV camera makers – are close behind.

Unsurprisingly in the current geopolitical climate, Chinese CCTV cameras are by far the most examined network devices when it comes to cyber security, and their camera firmware and supporting management solutions are constantly trawled through by experts looking for issues in devices that, despite their ‘surveillance’ function, are static edge sensors, governed by the settings of the network switches and servers that manage them.

It’s impossible to believe the Australian government’s highly qualified cybersecurity experts are not perfectly aware that edge devices, like CCTV cameras, when properly commissioned and installed on well-designed and secure data networks, are impossible to access remotely, and can’t be infected by ‘spyware’ in the way a mis-managed workstation or laptop might be.

Instead, they must be acutely aware the greatest security threats to security systems are posed by errors in network application, a failure to activate camera cybersecurity settings during installation and pre-commissioning, and weaknesses in the physical security around network components. And cybersecurity experts must know such risks apply to every networked device across a department’s topology – phones, switches, wired and wireless routers, laptops, servers, apps – not just to devices offering click-worthy headlines.

In our opinion, given the highly evolved state of cybersecurity in professional CCTV cameras (and intercoms), the possibility edge devices in secure subnets from any camera manufacturer, could suddenly breach network security settings and start operating unilaterally is so vanishingly small that cybersecurity can’t be the problem.

Instead the government’s core issue seems to be one of uncertainty and misunderstanding around a technology that, when properly installed and managed, leaves virtually no room for uncertainty at all.

Ref:
IPVM Portal
Sen network
US, UK web pages

Sunday, January 15, 2023

Network Video Recorder cum Network Switch

Network Video Recorder "Built-in" Network Switch 

The introduction of a Network Video Recorder (NVR) with a built in network switch confused a good portion of the professional market.  It very much seemed to be something that was geared towards catering to a side of the market that was completely unfamiliar with how an IP camera system is setup and installed.   Not a lot has changed since their original release dates.  Most installers still scratch their heads at the thought of using them, but the fact remains that there is an audience.  For those who aren't looking to educate/teach themselves the way of "proper IP installation," these simple to adapt to NVRs are very appealing.  Having said that, it's equally important to understand what you're getting yourself into with a built in switch.

Cost Comparison

There are two ways to look at cost, but we're going to start with your initial purchase for getting this system up and running.  There's no way to conceal the fact that purchasing an NVR with a built in switch is going to be cheaper.  A standard NVR purchased together with a dedicated PoE switch will probably cost you about 25% more than the alternative.  Because of the somewhat basic nature of network switches, you probably won't notice any difference in performance between the two options.  It really comes down to quality in this case, and you're just going to pay more money for the more proven brands; your built in switches are generally built by an unnamed Chinese manufacturer.

The other way to look at cost is to look towards the future.  Network switches are just as imperfect as everything else.  The most common occurrence is that a network port burns out and is no longer able to be used.  If your warranty has expired, you're now in a position where you're going to need to start spending money to get to a solution.  Depending on how much that damaged switch effects your system, you're left with a couple options.  In the case of a dedicated switch, you can replace the switch entirely or you can purchase another smaller switch as an add-on to make up for malfunctioning port(s).  These can be purchased for as little as $50.  An NVR with a built in switch is not going to have such an easy time.  You can try using a dedicated switch as an add-on, but you're now just setting up your system via the alternate method.  If you still have a demand for the same type of "camera hardwired to NVR" setup and your NVR is out of warranty, you'll now find yourself needing to replace the entire NVR instead of the much cheaper network switch.P

Cable Runs

A built in switch is going to require that you run your cable the same way you would with an analog system.  In this scenario, you're going to be running a cable for each camera all the way back to the NVR to create your hardwired connection. Your cable length is limited, in this case, to the standard 328 feet.

A dedicated switch can potentially have some major advantages here. Thinking that a dedicated switch needs to be placed anywhere near your NVR or router would be a mistake.  It makes the most sense to place your switch as close to the biggest cluster of cameras as possible.  This can make for a lot of short cable runs from IP cameras to switch.  From there, it's just a matter of running a single cable from that switch back to your router.  The end result is that you simultaneously put all of your IP cameras on your network by running that one cable.

This is a rough example of what an installation might look like with a dedicated switch.  Of course your own personal hardware situation might be different, but you should get the concept we're going for.  Installing your IP camera system like this will also double the potential distance you can run your cable.  In addition to your cable length being able to be run as far as 328 feet from cameras to switch, you can also run up to another 328 feet from switch to router.  You can revert back to cost as much as you want, but a dedicated switch is going to give you more capabilities and versatility for your money than a built in PoE switch will.

Reliability

This is mostly a matter of opinion and how much you trust individual manufacturers to begin with.  Dedicated switches are usually going to be found with a name brand printed on them.  You've heard of certain brands like Linksys, Netgear, and D-Link because they have an established reputation.  It's not hard to go online and find out how well these companies are performing.  The internet will contain a plethora of reviews and discussions related to these company's products.  This is all to say that transparency is much easier to find with big brands; the general public doesn't let them keep any secrets.  This makes selecting and purchasing a product a very straight forward and simple task; it just takes a bit of research.

There are those among us who are completely against the idea of owning anything that's "unbranded" under the pretense that they believe it's all junk and lacks in longevity.  The fact remains that a good number of the unbranded devices that people have come to feel uncomfortable with are actually performing, and in some cases outperforming, a lot of the big brand names.  If something like this bothers you, you're going to have a hard time feeling comfortable with an NVR that has a built in switch.  The lower costs of these switches makes them attractive but getting passed the uncertainty of knowing whether or not they're going to perform as needed is not as simple.  Researching an NVR with a built in switch can gain you a general public opinion, but those opinions don't usually cover things like speed tests or information regarding longevity of the product.  This is one of those things you'll likely just have to try for yourself in order to know for sure.

All in all, you have good options for both dedicated switches and built in switches. Doing a little bit of homework/research into the product you’re considering should shed enough light on the subject where you can feel confident with your decision either way.

Compatibility

A dedicated switch, no matter who it may be manufacturer by, is compatible with any IP camera from any manufacturer across the board; no questions about it.  A built in switch relies on information it receives from the NVR to determine compatibility.  This can quickly turn into a problem absent any solution.  If you hard wire your IP camera to your built in switch on your NVR and you find that the camera isn't being detected, you're almost guaranteed to be the owner of an NVR and IP cameras that are probably never going to play nicely with each other, and likely not at all.  There is seldom anything you can do to fix a problem like this. On rare occasions, there's a setting that needs to be toggled somewhere, but don't plan on being this lucky.

You can still have compatibility issues with a dedicated switch, but those problems are usually limited to specific features and not the complete inability to bring up the camera whatsoever.  For example, a HikVision IP camera cannot be accessed by a Dahua NVR if you attach that camera to a built in switch on the NVR.  However, if you connect that same camera to a dedicated switch, you'll very easily be able to add that camera to the NVRs device list, but you'll be missing the motion detection feature without a lot of tampering.  We should mention again that any compatibility issues you encounter with a dedicated switch aren't cause by the switch, but by the manufacturers of the cameras and recorders. We are not promote HikVision / Dahua as both “High" level vulnerabilities. No participation in ONVIF committees for both brands. No access to new ONVIF software. Below media statement.


Saturday, October 1, 2022

Electronic Surveillance Threats

Electronic Surveillance Threats 

In 2017 the Supreme Court ruled in a landmark judgment that privacy is a fundamental right. From sophisticated spyware attacks to mass phishing via smartphones and the rise of facial recognition technology, the range and reach of surveillance threats to human rights defenders is growing.

For security teams trying to keep activists safe, it is a cat-and-mouse game as attackers rapidly adapt to developments aimed at protection.

“When cyber-attackers see people are switching to using (messaging app) Signal, for example, then they will try to target Signal. If people start changing to VPN technology, they will start blocking VPN technology. If people are using Tor browser, they will target Tor traffic,” says Ramy Raoof, tactical technologist with Amnesty Tech.

Automated surveillance equipment has become increasingly common and connected, making the technique more covert and pervasive.  Mobile hacking, social engineering, network monitoring, face recognition technologies, GPS tracking, and various other methods commonly employed to catch and prevent crime and terrorism can also be used against civilians.

Electronic surveillance threats – defending a facility against electronic surveillance is a serious challenge and one that hasn’t been made any easier by the proliferation of computer networks and wireless. Not only are businesses under threat from phone tapping, and video and audio surveillance, wired and wireless computer networks offer attackers a new dimension of intrusion.

Even the simplest electronic surveillance devices are diverse, with room transmitters being among the most common. Their role is to detect all the environmental noise emanating from the location in which they’re planted.

Primary variations with room transmitters relate to differences in power sources. In this case, either battery or mains power and it’s the battery powered devices that are most diverse. Such devices can be secreted inside almost any object allowing for their minimal space requirements. Examples include the inside of pens, calculators, clocks, photo frames, under carpet, behind curtains and underneath or inside furniture.

The types of battery used to power these devices varies too, depending on the design, size and planned use of the device. Self-contained transmitters designed for surreptitious surveillance favour small button batteries or higher performance hearing aid batteries. When size is less of a concern and length of transmission a higher priority, larger and longer lasting batteries can be used, including the latest lithium types.

Average transmission devices typically have dimensions around 19mm x 12mm x 9mm. Should a small transmitter be built into a pen or a calculator, transmission range will be limited, around 15-20m, though the use of lithium batteries will increase the range.

Mains-powered room transmitters draw current either directly from the mains voltage or trickle charge a battery that’s also used to power the device. The advantages of this technique where electronic intruders are concerned include the fact there will be less impact on main power sources that could be monitored for fluctuations. Should mains power be lost the device will continue to operate.

The key technical issue for mains powered transmitters is to reduce 240V of alternating current to a direct current, low voltage output of 6-18V. Designers are required to combine transmission circuitry along with a voltage dropper, rectification, smoothing and voltage stabilization circuits.

As a rule, the most popular way to get the small current and voltage requirements is to use a high voltage capacitor to act as resistance at the 50/60Hz mains supply frequency. Low power can be partially offset by injecting some radio power into the mains.

Should there be enough room and a sufficiently low risk of detection, it’s sometimes possible for a stepdown transformer to be used – this is inherently more reliable that capacitor leakage or dropper resistance techniques. It’s also possible for a transformer to supply a far greater level of power to a strong transmitter.

AC units can be located inside walls, ceilings, under floors, inside office equipment, in mains-powered clocks and within lamps and lamp holders to name just a few possibilities. One of the favoured methods of installing an AC bug is to simply plug in a dummy double adaptor to a power point in the room you wish monitor. Despite the simplicity of this technique, only the most observant would notice and even then, would be most unlikely to consider the appearance of the unit a threat to security.

Electronic intruders wishing to secure a standalone mains-powered transmitter are usually supplied with a square plastic box about 50mm x 50mm x 18mm, or an encapsulating board. There will be a pair of trailing leads coming from these units for connection to the live and neutral lines of domestic AC.

There are still PSTN telephone transmitters. These are connected to target telephone systems and transmit information to a receiving station located nearby. The 2 basic models are the series-connected transmitter and the parallel-connected transmitter. Both types either draw their operating voltage from the PSTN phone line itself, or carry their own batteries that may be trickle-charged from the phone line.

Series connected transmitters are connected between a telephone socket and a telephone. In this configuration, only that extension will be accessed by the listener. But in the event a series transmitter is used and located on the incoming wires of a 2-pair cable on the other side of a telephone socket, all extensions of the line can be accessed.

Muliplex telephone systems make life extremely hard for electronic intruders trying to record communications. Because these systems multiplex more than one signal onto a 2-pair cable, an intruder would need to employ a de-multiplexer to access phones.

Partially connected transmitters are different. Both incoming feed wires are connected to the parallel connected device, and this means the information will be transmitted if either phone is used. With a series device, the wiring of the telephone must be disconnected to allow insertion of the transmitter. But installation doesn’t mean cutting and stripping of feed wires. Instead, the device can be installed in a junction box that offers sufficient room, or even in a telephone.

Series devices are easiest for security managers to detect using one of the counter surveillance devices on the market that alert security staff to temporary disconnection of phone lines. It’s possible for alarm panels monitoring alarm systems to also monitor phone lines for integrity, with any breaches then reported.

Parallel series devices, however, can be installed without temporary line breaks and without effect on resistance. This makes them harder to detect, though if the unit is drawing power from its host, this will cause a voltage drop. Parallel devices are often equipped with alligator clips requiring no more than a few millimetres of cable to be stripped or a pair of bare terminals.

Battery-powered types are harder to detect and more effective in their operation. With their greater operating current, they can achieve greater operating ranges than bugs, giving 500-1000m ranges instead of 25-50m. Even harder to detect are small rain-proof telephone transmitters that can be connected to any point of the exterior wiring as it leaves a building or joins a telephone pole. Such a device might never be detected.

Mobile phones are usually tapped using spyware. This is a whole other science – it’s possible for experts to search for spyware and users might notice quirks like rapid battery drain, though it can be difficult to know whether this is caused by an illicit piece of software, too many open apps, or simply an aging battery.

There are 2 primary groups of microphones available to an individual or organization seeking illicit access to communications. These are omnidirectional and unidirectional. Unidirectional microphones are portable and can be aimed at a target. They’re a parabolic dish-mount device that can be hand-held or tripod mounted. Such units offer excellent results for the electronic intruder. Using a 45cm reflector, high quality sound can be obtained at 250m. This performance increases fourfold if the reflector size is doubled but the unit becomes much more visible.

Omnidirectional units pick up audio signals coming from any point of the compass and in surveillance devices they usually have a diameter of about 6mm. As a rule, these devices will be more effective towards the front. Another type of microphone, the spike mike, is mounted on the end of a spike or probe. Microphones can be connected to the audio input of a miniature transmitter, allowing remote monitoring of conversations.

Like any other internet-connected device, surveillance systems can be vulnerable to attacks without the right cyber-security measures in place. Hackers can easily gain access to poorly configured devices with design flaws or faulty firmware and manipulate or steal data. With cyber-attacks accelerating, surveillance systems need to be protected from vulnerabilities, and require the same vigilance provided to IT systems.

Closed-circuit video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point (P2P), point-to-multipoint (P2MP), or mesh wired or wireless links but transmit a signal to a specific place only. Not for open to all.

Cities in at least 56 countries worldwide have deployed surveillance technologies powered by automatic data mining, facial recognition, and other forms of artificial intelligence.

The ban that prohibits the purchase and installation of video surveillance equipment from HikVision, Dahua and Hytera Communications in federal installations – passed on year 2018 National Defense Authorization Act (NDAA). In conjunction with the ban’s implementation, the government has also published a Federal Acquisition Regulation (FAR) that outlines interim rules for how it will be applied moving forward. Like NFPA, now NDAA law accept globally.

Rules outlined in this FAR include:

·        A “solicitation provision” that requires government contractors to declare whether a bid includes covered equipment under the act;

·        Defines covered equipment to include commercial items, including commercially available off-the-shelf (COTS) items, which the rule says, “may have a significant economic impact on a substantial number of small entities;”

·        Requires government procurement officers to modify indefinite delivery contracts to include the FAR clause for future orders;

·        Extends the ban to contracts at or below both the Micro-Purchase Threshold ($10,000) and Simplified Acquisition Threshold ($250,000), which typically gives agencies the ability to make purchases without federal acquisition rules applying.

·        Prohibits the purchase and installation of equipment from Chinese telecom giants Huawei and ZTE Corporation. This would also presumably extend to Huawei subsidiary Hisilicon, whose chips are found in many network cameras;

·        And, gives executive agency heads the ability grant a one-time waiver on a case-by-case basis for up to a two-year period.

Specifically, NDAA Section 889 creates a general prohibition on telecommunications or video surveillance equipment or services produced or provided by the following companies (and associated subsidiaries or affiliates):

·        Huawei Technologies Company; or

·        ZTE Corporation

It also prohibits equipment or services used specifically for national security purposes, such as public safety or security of government facilities, provided by the following companies (and associated subsidiaries or affiliates):

·        Hytera Communications Corporation;

·        Hangzhou HikVision Digital Technology Company; or

·        Dahua Technology Company

While the prohibitions are initially limited to the five named companies, Section 889 authorizes the Secretary of Defense, in consultation with the Director of National Intelligence or the Director of the FBI, to extend these restrictions to additional companies based on their relationships to the Chinese Government. The prohibitions will take effect for executive-branch agencies on August 13, 2019, one year after the date of the enactment of the 2019 NDAA, and will extend to beneficiaries of any grants, loans, or subsidies from such agencies after an additional year.

The provisions of Section 889 are quite broad, and key concepts are left undefined, such as how the Secretary of Defense is to determine what constitutes an entity that is “owned or controlled by, or otherwise connected to” a covered foreign country, or how the head of an agency should determine whether a component is “substantial,” “essential,” or “critical” to the system of which it is part. The statute also fails to address the application of the prohibitions to equipment produced by U.S. manufacturers that incorporate elements supplied by the covered entities as original equipment manufacturers (“OEMs”) or other kinds of supplier relationships.

Section 889 contains two exceptions under which its prohibitions do not apply:

(1) It allows Executive agencies to procure services that connect to the facilities of a third party, “such as backhaul, roaming, or interconnection arrangements.” This likely means telecommunications providers are permitted to maintain common network arrangements with the covered entities.

(2) It permits covered telecommunications equipment that is unable to “route or redirect user data traffic or permit visibility into any user data or packets” it might handle, meaning a contractor may still be able to provide services to the Government so long as any covered equipment provided is unable to interact or access the data it handles.

The Constitution of India guarantees every citizen the right to life and personal liberty under Article 21. The Supreme Court, in Justice K.S. Puttaswamy v. Union of India (2017), ruled that privacy is a fundamental right. But this right is not unbridled or absolute. The Central government, under Section 69 of the Information Technology (IT) Act, 2000, has the power to impose reasonable restrictions on this right and intercept, decrypt or monitor Internet traffic or electronic data whenever there is a threat to national security, national integrity, security of the state, and friendly relations with other countries, or in the interest of public order and decency, or to prevent incitement to commission of an offence.

Only in such exceptional circumstances, however, can an individual’s right to privacy be superseded to protect national interest. The Central government passed the IT (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009, that allow the Secretary in the Home Ministry/Home Departments to authorise agencies to intercept, decrypt or monitor Internet traffic or electronic data. In emergency situations, such approval can be given by a person not below the Joint Secretary in the Indian government. In today’s times, when fake news and illegal activities such as cyber terrorism on the dark web are on the rise, the importance of reserving such powers to conduct surveillance cannot be undermined.

Risk of Electronic Security Threats to EHR/HIS is a critical issue because as per the privacy and security rule of The Health Insurance Portability and Accountability Act (HIPAA) the patient’s medical records are to be secured and private which can be accessible only the hospital authorities and the doctors in charge of the patient and the patient himself.

More advanced techniques now no longer require a target to actively click on a link in order to infect a device, explains Amnesty Tech security researcher Etienne Maynier. An attack using NSO spyware on an activist in Morocco covertly intercepted the activist’s web browsing to infect their phone with spyware. “Instead of waiting for you to click on a link, they instead hijack your web browser’s traffic and redirect you to a malicious website which tries to secretly install spyware,” says Maynier.

Successful targeting of well-protected phones is becoming more common and security teams are under added pressure from a burgeoning industry in so-called ‘zero-day’ exploits, in which unscrupulous hackers seek to find unknown vulnerabilities in software to sell. In May 2019, NSO Group exploited a zero-day vulnerability in WhatsApp that was used to target more than 100 human rights activists across the world with spyware.

How to keep your communications safe:

Using public Wi-Fi and VPNs: When you connect to Wi-Fi in a cafe or airport your internet activities are routed through that network. If attackers are on the network, they could capture your personal data. By using a VPN app on your devices, you protect your online activities when accessing public connections, preventing your internet activities from being seen by others on the same network. If you want to explore options, try NordVPN and TunnelBear.

Password management: Using a password manager means you don’t have to worry about forgetting passwords and can avoid using the same ones. It’s a tool that creates and safely stores strong passwords for you, so you can use many different passwords on different sites and services. There are various password managers such as KeePassXC , 1Password or Lastpass. Remember to back up your password manager database. Do not use password like password, ddmmyyyy, admin@123, administrator, administrator1, Super@1234 etc.

Messaging apps: When we advise human rights defenders about messaging apps, we assess each app on its policies (such as terms of service, privacy agreement), its technology (if it’s open source, available for review, has been audited, security) and finally the situation (if the app provides the features and functionality that fits the need and threat model). Generally speaking, Signal and Wire are two apps with strong privacy features.  Remember: Signal requires a SIM card to register, and for Wire you can sign up with a username/email.

Phone basics for iPhone or Android: Only download apps from the official app store to prevent your personal information from being accessed without your consent and to minimise the risk of attacks. Update your system and apps frequently to ensure they have the latest security patches. Enable ‘account recovery’ in case you lose access to your phone. Finally, choose a mobile screen lock that is not easily guessed, such as an 8-digit pin or an alphanumeric code.


Friday, June 29, 2018

Reset IP Security Cameras

Reset IP Security Cameras
If an IP security camera has failed or if some of its functions are not responding you may need to reset the camera. Every brand has its own resetting sequence. 


As per my last 12yr experience I have prepared this useful guide about how to reset IP cameras, with the help of IPVM.com (one of the most reliable and frontier information source of surveillance systems).

Reset Button Locations
There are a few common reset button locations, shown below. For added security some reset buttons may be located under the dome bubble or an access panel. For ease of access some reset buttons are located at the end of the whip or exposed on the exterior of the camera. Exposed locations are notably less secure than others, as they allow the camera to be reset without disturbing it, which could effectively take it offline.

3xLogic
3xLogic has two different reset methods for different series.
Visix V Series:
Press and hold the reset button for 2 seconds while the device is in use. System will reboot.
Visix:
Press the reset button and hold it for 10 seconds. This procedure will reset everything to the factory settings (password, username etc)
ACTi
1.                Disconnect the power cable.
2.                Press and hold the Reset Button. While continuing to hold the reset button, reconnect the power cable.
3.                After the power cable plugged keep holding the reset button around 6 seconds, release the reset button. The unit will reset to factory settings
ADI / W Box
Follow the same steps of Hikvision resetting procedure.
Advidia
Advidia has different resetting methods because of OEMs multiple manufacturers
A Series (HikVision OEM)
Follow the same steps of Hikvision resetting procedure..
B Series (ACTi OEM)
1.                Disconnect the power cable.
2.                Press and hold the Reset Button. While continuing to hold the reset button, reconnect the power cable.
3.                After the power cable plugged keep holding the reset button . The red Power LED light will flash on for 3 second first, turn off for about 15 seconds, flash on for another second and turn off again. This procedure takes around 20 seconds and camera will power up. Release the reset button.
E Series (Dahua OEM)
Press and hold the reset button until the blue LED (about 5 seconds) underneath the camera lights up.
Arecont Vision
*For MicroDome Duo , MegaVideo 4K and the new generation models
Press the reset button and hold 10 for seconds and then release the button.
ATV
4.                Switch off the network camera by disconnecting the power adapter.
5.                Press and hold the Reset button (SW1) on the board with your finger while reconnecting the power.
6.                Keep the Reset button (SW1) pressed for about 2 seconds.
7.                Release the Reset button (SW1).
8.                The network camera resets to factory defaults and restarts after completing the factory reset.
Aventura
Press and hold the INITIAL SET button for about 10 seconds while the power is on.

ANNKE
1.                Unplug camera from power source and NVR.
2.                press and hold reset button on camera for 20 seconds. KEEP HOLDING UNTILL the step let your hand go.
3.                keep holding reset button. At the same time, plug camera to NVR. ...
4.                hold on reset button for 20 seconds after camera is plugged into NVR and let hand go. NVR.

Avigilon
5.                Disconnect power source from the camera.
6.                Press and hold the firmware revert button.
7.                While holding the button, connect the power source back. Then release the button after 3 seconds
AXIS
1.                Disconnect product form the power source.
2.                Press and hold the control button while reconnecting power.
3.                Hold the control button until the amber lights turn on (up to 30 seconds)
4.                Release the control button. The process is complete when the light turns green.
Basler
1.                Disconnect product form the power source.
2.                Press and hold the reset button. Connect to power source back to device while holding the default button.
3.                Wait for 5 seconds and release the reset button
4.                Wait approximately one minute for the camera to finish the reset process and to reboot
Bosch
Press and hold the reset button for more than 10 seconds while the power is on.
Brickcom
Press and hold the Reset Button for more than 10 seconds
Canary
Hold the power button down for 12 seconds when the power is off.
Continue to hold until Canary Flex reboots (while light will be spinning) then release the button.
Cisco
1.                Press and release reset button. Wait for the Camera to reboot.
2.                Press and hold the reset button until the status LED rapidly blinks.
36300 and 6630 Cameras
Press and hold the reset button for 15 seconds
Dahua
Press and hold the reset button until the camera restarts (about 5 seconds) while the power source connected to camera.
Digital Watchdog
Press and hold the reset button for 5 seconds.
EZVIZ
Press and hold the RESET button for 3 seconds while the camera is on.
FLIR
Ariel
1.                Press and hold the reset button for 30 seconds.
2.                Both LEDs on the RJ45 connector are extinguished.After one second, the green network LED flashes once and remains lighted.
Others
Follow the same procedure for Dahua.
GeoVision
Press and hold the default button (for about 8 seconds) and release when status LED blinks
Hanwha-Techwin
Press and hold reset button for about 5 seconds to reboot the system.
Hikvision
Press and hold the reset button, power on the camera, continue holding for more than 10 seconds.
IQEye
1.                Disconnect the power source.
2.                Press and hold the reset button until the status indicator blinks. Then release the button.
3.                When the power indicator changes to green (may take up to 40 seconds), the process is complete.
Mobotix
Unfortunately Mobotix cameras do not have a reset button. They must be returned to the manufacturer.
Nest
1.                Press and hold the reset button on the bottom of the camera for several seconds while the power is on.
2.                Hold the button for five seconds (light will be yellow during this) when the light turns blue release the button
3.                When the blue light is faded, resetting is done.
Panasonic
1.                Disconnect the power source
2.                Press and hold the initial set button and plug the power back in.
3.                Keep holding for 5 seconds.
4.                Camera will boot itself for about 2 minutes then the resetting will be done.
Pelco
1.                Press and hold the reset button for 10 seconds.
2.                Press button down again and release to reboot camera.
Sony
1.                Turn off the camera.
2.                Press and hold the reset button while turning back on the camera.

Swann (for NHD-820/830/835/850/880/881)
1.      Reboot the camera by disconnecting the power source (Ethernet for PoE and power adapter for non-PoE) then plugging it back.
2.      Within 10 seconds of powering up the camera, press and hold the reset button for 10 seconds.
Uniview
1.                Turn of and turn back on the camera
2.                Press and hold the reset button until the PWR LED turns red. (about 15 seconds)
3.                You have 10 minutes to apply this procedure after the camera turned on.
Vivotek
1.                Press and hold the button for a few seconds.
2.                While you're holding down the button, the LED will go to POST (power on self test).
3.                Wait for the self-diagnostic to run twice.

Please keep it in mind, resetting a camera cannot solve the hardware problems and also it is not always accurate to solve software issues too.