Hacking Police Bodycams
Suprising no one, the security of police bodycams is terrible.
Mitchell even realized that because he can remotely access device storage on models like the Fire Cam OnCall, an attacker could potentially plant malware on some of the cameras. Then, when the camera connects to a PC for syncing, it could deliver all sorts of malicious code: a Windows exploit that could ultimately allow an attacker to gain remote access to the police network, ransomware to spread across the network and lock everything down, a worm that infiltrates the department’s evidence servers and deletes everything, or even cryptojacking software to mine cryptocurrency using police computing resources. Even a body camera with no Wi-Fi connection, like the CeeSc, can be compromised if a hacker gets physical access. “You know not to trust thumb drives, but these things have the same ability,” Mitchell says.
BoingBoing post.
chuck • August 15, 2018 6:23 AM
Speaking of body-cams in general. I believe they create an asymmetric advantage for the cops: they record when it’s convenient, turn of when it’s not beneficial to their cause.
I think the proper procedure should be this: unless the whole encounter is fully recorded and proven unaltered, any doubt has to be for the benefit of the other party (not cops). So broken camera? Tough luck. Out of battery? Case thrown out. And so on.