Skip to main content

Police body cams are scarily easy to hack into and manipulate, researcher finds

Although the jury’s still out on their effectiveness, body-worn cameras for police are generally viewed as a positive development. As part of an effort to make law enforcement more transparent, the hope is that they may be used to both protect civilians against excessive use of force, as well as safeguard police against unfounded complaints. But body cams are not infallible — as a security researcher recently revealed.

Speaking recently in Las Vegas at the annual hacker conference DefCon, Nuix cybersecurity expert Josh Mitchell demonstrated how it is possible to manipulate footage from police body cams. Mitchell’s demo used five different cameras — including Vievu, Patrol Eyes, Fire Cam, Digital Ally and CeeSc — and showcased how these could be hacked into and potentially altered. This could include deleting or altering footage or amending crucial metadata, including where and when footage was shot. It could also open the door to bad actors being able to track the location of police officers.

“I have uncovered that hacking [and] editing body camera footage is not just possible, but entirely too easy,” Mitchell told Digital Trends. “These systems have multiple unsecured attack points, and fail to have even the most basic security practices. One device allowed root telnet access without a password. I could replace videos on another device by simply using FTP to overwrite existing evidence files. The third device encrypted and password protected evidence files by using the file name as the encryption key. None of the devices I have tested digitally sign the evidence files. Furthermore, every device I have tested allows for unsecured firmware updates.”

For obvious reasons, this is bad news. Making it worse is the fact that the security vulnerabilities are not difficult to exploit. Mitchell was able to carry out his hacks without needing to develop any custom software. “The risks would be entirely dependent on the motivation of the individual to carry out the attack,” he said. “I would say that the impact and ease of exploitation are very high.”

Mitchell suggests several possible solutions to the problem, although implementing all of these would likely mean purchasing new devices. They include digitally signing all evidentiary information, digitally signing all device firmware, randomizing all SSID and MAC information, utilizing modern exploitation prevention mechanisms, and keeping bundled software up-to-date.

“Proactively, departments need to disable wireless connectivity,” he said, noting that this is not possible in all cases.

Editors' Recommendations

Luke Dormehl
I'm a UK-based tech writer covering Cool Tech at Digital Trends. I've also written for Fast Company, Wired, the Guardian…
Researchers find way to send passwords through your body to a device
password through you body apple fingerprint scanner ios iphone

Researchers have discovered a way to send secure passwords through the human body using fingerprint sensors and touchpads on smartphones and laptops.

The computer scientists and electrical engineers from the University of Washington call this an “on-body” transmission, which is authenticated when the device touches the user’s body. Transferring information like a password over Wi-Fi or Bluetooth is the most common and convenient method but it is at risk of interception.

Read more
A quarter of the Oakland P.D.'s body-cam footage was deleted
oakland police loses quarter body cam footage blue light flasher atop of a car  city lights on the background

It was revealed that potential evidence for ongoing and future trials in Oakland, California, has disappeared, after a police sergeant gave testimony that a quarter of video clips from body-worn cameras was accidentally deleted two years ago during a software upgrade.

Sgt. Dave Burke was testifying last week in a murder trial of two men charged in July 2013 when he informed the court of the deletions, SF Gate reported.

Read more
DEF CON attendee finds 75 percent of Bluetooth smart locks are open to hacks
bluetooth smart locks easily hackable 39577996 ml

At this year's annual DEF CON hacking conference in Las Vegas, a duo of researchers made the startling discovery that roughly 75 percent of Bluetooth-powered Low Energy smart locks are susceptible to hacks. What's arguably a touch more unsettling than the researchers' findings, however, is the fact the manufacturers of these at-risk locks — companies like Ceomate, Vians, Quicklock, and others — didn't seem overly concerned their products contained such holes. Considering a large part of smart home innovation is geared toward making homes safer, these findings certainly won't be attracting new customers anytime soon.

While attending the DEF CON conference last week, electrical engineer and smart home researcher Anthony Rose took to the task of testing 16 different Bluetooth smart locks. Along with research partner Ben Ramsey, the duo found that 12 of the reviewed locks featured at least some amount of wireless access when attacked. Furthermore, Rose and Ramsey say that the difficulty of successfully hacking each product was various, as some proved to be rather easy to access while others boasted a slightly harder barrier for entry.

Read more