Avatar photo

President, R. Grossman and Associates, Inc

Author Bio ▼

Robert D. Grossman is president of R. Grossman and Associates, an electronic security consulting group specializing in casinos, government facilities, and commercial and retail applications. He has worked for Sensormatic Electronics Enterprise Accounts group, Vicon Industries, and American Dynamics/Tyco Safety Products. Throughout his career, Bob has been associated with some of the largest, most complex electronic security projects in the world including for the MGM Grand, US Postal Service, and IBM. He has authored numerous articles for electronic security industry publications and has also conducted training classes and spoken at many industry events on topics ranging from designing electronic security systems to the future of technology in the industry.
April 19, 2013

Download

Whitepaper: Enhancing security, resilience and efficiency across a range of industries

Protecting Your Video Surveillance From Leaks

While there are a number of opinions and methods as to the best ways to capture and manage video images for investigation and evidence, we tend to focus on the technical aspects.

What’s the best resolution, frame rate, compression method, or retention time for a given application? How will we get images off of the system as evidence? How do we restrict access to our system while making sure that the images we collect are usable in a variety of venues?

These are all valid topics, and there’s no shortage of opinions and experiences that can help us. But one area where we see little emphasis is on the social engineering and human aspect of your system.

With the proliferation of websites showing video clips and intense pressure from media outlets for “newsworthy” footage, there’s a real danger to the owner of a system, in terms of both liability and damage to reputation, and it may all be hinging on a security officer with too much time on their hands, too little money in the bank, a warped sense of humor, or an axe to grind.

Any one of these can be a recipe for disaster.

Leaked video surveillance images
Case in point: In May of 2007, the New Jersey (USA) Turnpike Authority sued to force YouTube and two other companies to remove the video of a horrific Garden State Parkway car crash from their websites.

The video showed a fiery one-car crash at the Great Egg Toll Plaza, which claimed the life of a 52-year-old Cape May County man. The video was captured on a Turnpike Authority surveillance camera, leaked to the public, and eventually posted on YouTube, LiveLeak.com, and Break.com, according the authority’s complaint.

While this case was particularly well publicized, less spectacular incidents are commonplace. From drunken dancers in water fountain to inappropriate images of attractive patrons, the proliferation of high-quality video images often makes distribution of footage child’s play for those so inclined.

Preventing unauthorized video exports

In response to this, our firm strongly recommends that systems be locked down to prevent unauthorized distribution of video images.

The simplest way to do this is to install a Master Evidence Server, a shared network drive accessible only from the digital video workstations.

When an incident is noted, any operator can take it offline (removing it from the location where it will be overwritten over time), and place it on this central drive. The ability for the operator to burn clips to removable media is also removed, allowing this capability only for authorized personnel.

This also allows local storage and retrieval of recorded incidents without risk of unauthorized distribution of these images to internet or media sites.

Side benefits are the orderly storage of these incidents in an easily reviewable folder, and a higher level of data redundancy for these images. While 98 percent of the video recorded in a system is typically discarded, the video on the Master Evidence Server is more critical, and can be configured for automatic backups, drive redundancy, and other safeguards.

Finally, in the grand scheme of things, this option is fairly affordable as a huge storage array isn’t required — a video evidence clip is typically less than seven minutes in length.

We offer this as an option in our system designs, but I can’t recall that anyone has ever declined to take it.

Free Download: The Video Surveillance Report 2023

Discover the latest developments in the rapidly-evolving video surveillance sector by downloading the 2023 Video Surveillance Report. Over 500 responses to our survey, which come from integrators to consultants and heads of security, inform our analysis of the latest trends including AI, the state of the video surveillance market, uptake of the cloud, and the wider economic and geopolitical events impacting the sector!

Download for FREE to discover top industry insight around the latest innovations in video surveillance systems.

VideoSurveillanceReport-FrontCover-23
Subscribe
Notify of
guest
6 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Rob Ratcliff
Rob Ratcliff
April 19, 2013 11:05 am

Our friends at IPVM made a great point on Twitter in response to this that the one thing you struggle to secure against is people with smartphones recording footage played on the monitor (which we’ve all seen). But with controlled, trusted access, this would be harder to do.

Lami S
Lami S
April 22, 2013 3:15 am

I do agree with you Robert 100%
Almost every one in CCTV search for best image quality at the receiving end, calculating the bandwidth and storage size for that quality, from other hand how to protect the CCTV network from intrusion, but forget that their uni-cast transmission might ends up as multi-cast transmission and some images that they want to protect are shown in public domain !!

safeNsane
safeNsane
April 29, 2013 9:17 am
Reply to  Lami S

Agreed, when you’re doing things like sharing the stream with local news agencies for traffic reports and the various 411 sites out there it’s hard to lock down who is recording the stream and what they do with it.  When you’re dealing with private camera systems though it can be quite a bit easier since it’s not likely that you’ll be sharing those images with anyone and a decent media server will let you lock down access to recording or exporting video.

ITs_Hazel
ITs_Hazel
May 8, 2013 12:14 am
Reply to  Rob Ratcliff

Sometimes it’s the system, other times it’s the people. For the latter, you’ve got to enforce stricter measures and make sure that people are aware of the no-recording policy. I’m sure other people in the room will be able to notice when others whip out their smartphones and begin recording.

ITs_Hazel
ITs_Hazel
May 8, 2013 12:30 am
Reply to  safeNsane

Scrimp and save on other stuff, just not on security and on your media servers. Many companies learn the hard way and realize just how much more expensive it is when an actual leak happens.

safeNsane
safeNsane
May 8, 2013 7:06 am
Reply to  ITs_Hazel

With our recoding servers we can set who has the ability to play back and export clips.  It wouldn’t take long to narrow down who leaked a piece of footage from one of our cameras and I don’t think we have anyone who wants to give up their job for some laughs on Youtube.