Bodycams worn by police can be hacked
Josh Mitchell, a consultant at the security firm Nuix, analyzed five body camera models from five different companies: Vievu, Patrol Eyes,
Fire Cam, Digital Ally, and CeeSc. The companies all market their
devices to law enforcement groups around the US...
In all but the Digital Ally device, the vulnerabilities would allow an
attacker to download footage off a camera, edit things out or
potentially make more intricate modifications, and then re-upload it,
leaving no indication of the change. Or an attacker could simply delete
footage they don't want law enforcement to have...
Additionally, Mitchell says that some of the more sophisticated models,
which contain radios for Bluetooth or cellular data connectivity, also
have vulnerabilities that can be exploited to remotely stream live
footage off the cameras, or to modify, add, and delete the footage
stored on the devices...
Then, when the camera connects to a PC for syncing, it could deliver all
sorts of malicious code: a Windows exploit that could ultimately allow
an attacker to gain remote access to the police network, ransomware to
spread across the network and lock everything down, a worm that
infiltrates the department's evidence servers and deletes everything, or
even cryptojacking software to mine cryptocurrency using police
computing resources...
"These are full-feature computers walking around on your chest, and they have all of the issues that go along with that."
Via
BoingBoing.
No comments:
Post a Comment