Bodycams worn by police can be hacked
Josh Mitchell, a consultant at the security firm Nuix, analyzed five body camera models from five different companies: Vievu, Patrol Eyes, 
Fire Cam, Digital Ally, and CeeSc. The companies all market their 
devices to law enforcement groups around the US...
In all but the Digital Ally device, the vulnerabilities would allow an 
attacker to download footage off a camera, edit things out or 
potentially make more intricate modifications, and then re-upload it, 
leaving no indication of the change. Or an attacker could simply delete 
footage they don't want law enforcement to have...
Additionally, Mitchell says that some of the more sophisticated models, 
which contain radios for Bluetooth or cellular data connectivity, also 
have vulnerabilities that can be exploited to remotely stream live 
footage off the cameras, or to modify, add, and delete the footage 
stored on the devices...
Then, when the camera connects to a PC for syncing, it could deliver all
 sorts of malicious code: a Windows exploit that could ultimately allow 
an attacker to gain remote access to the police network, ransomware to 
spread across the network and lock everything down, a worm that 
infiltrates the department's evidence servers and deletes everything, or
 even cryptojacking software to mine cryptocurrency using police 
computing resources...
"These are full-feature computers walking around on your chest, and they have all of the issues that go along with that."
Via 
BoingBoing. 
 
 
 
 
 
 
  
 
 
 
 
 
 
 
 
 
 
 
No comments:
Post a Comment