{"id":80627,"date":"2016-07-09T20:55:08","date_gmt":"2016-07-10T00:55:08","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-08-10T12:16:44","modified_gmt":"2022-08-10T16:16:44","slug":"security-cam-concerns-in-ann-arbor","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/security-cam-concerns-in-ann-arbor\/","title":{"rendered":"Security Cam Concerns in Ann Arbor"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-104788\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/super-botnet.jpg?resize=110%2C79&#038;ssl=1\" alt=\"Security Cam Concerns in Ann Arbor\" width=\"110\" height=\"79\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/super-botnet.jpg?resize=150%2C108&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/super-botnet.jpg?resize=75%2C54&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/super-botnet.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/>Next time you are in <strong>Ann Arbor<\/strong> to get a bite to eat at <a href=\"https:\/\/www.zingermanscommunity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zingerman&#8217;s<\/a>\u00a0or attend a <a href=\"http:\/\/umich.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/umich.edu\/\">U of M<\/a> <a href=\"https:\/\/web.archive.org\/web\/20170628040955\/http:\/\/www.mgoblue.com\/sports\/m-footbl\/mich-m-footbl-body.html\" target=\"_blank\" rel=\"noopener noreferrer\">football<\/a> game at <a href=\"http:\/\/www.mgoblue.com\/stadiumguide\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.mgoblue.com\/stadiumguide\/\">Michigan stadium<\/a> someone may be watching you. <em><a href=\"http:\/\/www.networkworld.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.networkworld.com\/\">NetworkWorld<\/a>,<\/em> <a href=\"https:\/\/web.archive.org\/web\/20161001214644\/http:\/\/www.networkworld.com:80\/article\/3086316\/security\/top-us-states-and-cities-with-unsecured-security-cameras.html?\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> <a href=\"https:\/\/www.visitannarbor.org\/artfair\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"https:\/\/www.visitannarbor.org\/artfair\">Ann Arbor<\/a> is one of the top U.S. cities with the <strong>most unsecured security cameras.<\/strong> In fact, Ann Arbor ranks seventh nationally.<\/p>\n<p>The <a href=\"https:\/\/web.archive.org\/web\/20230923074324\/https:\/\/www.protection1.com\/open-security-cameras\/\" target=\"_blank\" rel=\"noopener noreferrer\">report&#8217;s<\/a> author, security firm <strong><a href=\"https:\/\/web.archive.org\/web\/20240507235139\/https:\/\/www.protection1.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protection 1<\/a><\/strong>, analyzed the data from <a href=\"http:\/\/www.insecam.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.insecam.org\/\">Insecam<\/a>. Inseacam identifies open security cameras and Protection 1 estimates there are over 11,000 open security cameras on the Internet in the U.S. Protection 1 identified the cities with the most cameras that can be <strong>viewed by anyone online<\/strong>. The top 10 cities with unsecured security cameras are:<\/p>\n<ol>\n<li><a href=\"https:\/\/web.archive.org\/web\/20211120105059\/https:\/\/www.networkwebcams.co.uk\/cctv-accessories\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104790\" title=\"open security cameras\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/secure_cam.png?resize=61%2C110&#038;ssl=1\" alt=\"open security cameras\" width=\"61\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/secure_cam.png?resize=83%2C150&amp;ssl=1 83w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/secure_cam.png?resize=42%2C75&amp;ssl=1 42w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/secure_cam.png?w=139&amp;ssl=1 139w\" sizes=\"auto, (max-width: 61px) 100vw, 61px\" \/><\/a><a href=\"https:\/\/www.walnut-creek.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Walnut Creek, CA<\/a> \u2013 89.69 \/ 100,000 residents<\/li>\n<li><a href=\"https:\/\/www.cor.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Richardson, TX <\/a>\u2013 72.74 \/ 100,000 residents<\/li>\n<li><a href=\"https:\/\/www.torranceca.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Torrance, CA<\/a> \u2013 72.55 \/ 100,000 residents<\/li>\n<li><a title=\"Newark, New Jersey\" href=\"http:\/\/maps.google.com\/maps?ll=40.72422,-74.172574&amp;spn=0.1,0.1&amp;q=40.72422,-74.172574 (Newark%2C%20New%20Jersey)&amp;t=h\" target=\"_blank\" rel=\"geolocation nofollow noopener noreferrer\">Newark, NJ<\/a> \u2013 38.07 \/ 100,000 residents<\/li>\n<li><a title=\"Rancho Cucamonga, California\" href=\"http:\/\/www.cityofrc.us\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Rancho Cucamonga, CA<\/a> \u2013 36.76 \/ 100,000 residents<\/li>\n<li><a href=\"http:\/\/www.corvallisoregon.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Corvallis, OR<\/a> \u2013 37.98 \/ 100,000 residents<\/li>\n<li><a title=\"Ann Arbor, Michigan\" href=\"http:\/\/www.a2gov.org\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Ann Arbor, MI<\/a> \u2013 34.18 \/ 100,000 residents<\/li>\n<li><a href=\"http:\/\/www.cityoforlando.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Orlando, FL<\/a> \u2013 34.05 \/ 100,000 residents<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20190217200955\/http:\/\/www.ci.eau-claire.wi.us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Eau Claire, WI<\/a> \u2013 22.21 \/ 100,000 residents<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20201206104120\/https:\/\/www.albanyny.gov\/Home.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Albany, NY<\/a> \u2013 20.32 \/ 100,000 residents<\/li>\n<\/ol>\n<p><a href=\"https:\/\/web.archive.org\/web\/20160524130400\/http:\/\/www.gfi.com:80\/blog\/the-17-facepalm-moments-that-rocked-twitter\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104806\" title=\"using the\u00a0manufacturer's default password\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_facepalm-e1568843818903-107x150.jpg?resize=71%2C100&#038;ssl=1\" alt=\"using the manufacturer's default password\" width=\"71\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_facepalm-e1568843818903.jpg?resize=107%2C150&amp;ssl=1 107w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_facepalm-e1568843818903.jpg?resize=53%2C75&amp;ssl=1 53w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_facepalm-e1568843818903.jpg?w=517&amp;ssl=1 517w\" sizes=\"auto, (max-width: 71px) 100vw, 71px\" \/><\/a>Open security cameras connect to the Internet via <strong>Wi-Fi<\/strong> or a cable. They have no <strong>password protection<\/strong> or are using the\u00a0manufacturer&#8217;s <strong>default password<\/strong>. Malicious people and governments can <strong>record or broadcast<\/strong> our lives from\u00a0unprotected open security cameras. Open cameras are also vulnerable attacks that can turn them into bots.<\/p>\n<p>From a privacy perspective, the most worrisome finding is that 15% of the open cameras are in Americans\u2019 homes. Anyone can watch these cameras if the default password is not changed to a unique password to lock down the camera.<\/p>\n<p>Besides being spied on from the web, open cameras can be <strong>exploited by criminals.<\/strong> Cyber-criminals can force online cameras to attack other things on the Internet as part of a <strong>DDoS attack<\/strong>.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20170713104329\/https:\/\/www.sophos.com\/en-us\/press-office\/press-releases\/2005\/10\/va_dutchbotarrests.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104797\" title=\"distributed denial-of-service (DDoS)\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_thief.gif?resize=71%2C100&#038;ssl=1\" alt=\"distributed denial-of-service (DDoS)\" width=\"71\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_thief.gif?resize=106%2C150&amp;ssl=1 106w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyber_thief.gif?resize=53%2C75&amp;ssl=1 53w\" sizes=\"auto, (max-width: 71px) 100vw, 71px\" \/><\/a>A <a title=\"Denial-of-service attack\" href=\"http:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">DDoS attack<\/a> against a jewelry shop website led to the discovery of a CCTV-based\u00a0<a href=\"https:\/\/security.radware.com\/ddos-knowledge-center\/ddospedia\/botnet\/\" target=\"_blank\" rel=\"noopener noreferrer\">botnet<\/a>. A <strong>distributed denial-of-service<\/strong> (<a href=\"http:\/\/www.digitalattackmap.com\/#anim=1&amp;color=0&amp;country=ALL&amp;list=0&amp;time=16990&amp;view=map\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS<\/a>) attack is one in which a multitude of compromised systems attack a single target, thereby causing a <a href=\"http:\/\/searchsoftwarequality.techtarget.com\/definition\/denial-of-service\" target=\"_blank\" rel=\"noopener noreferrer\">denial of service<\/a> for users of the targeted system. <em><a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/distributed-denial-of-service-attack\" target=\"_blank\" rel=\"noopener noreferrer\">TargetTech<\/a><\/em> says the flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.<\/p>\n<p><em><a href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Help Net Security<\/a><\/em> <a href=\"https:\/\/www.helpnetsecurity.com\/2016\/06\/28\/25000-strong-cctv-botnet\/\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that <strong><a href=\"https:\/\/www.sucuri.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sucuri<\/a><\/strong> researchers discovered the jewelry site was being attacked by a <strong>CCTV botnet<\/strong> made up of 25,000+ cameras from around the globe. The website was first attacked by a <span class=\"entry-content post-content\">layer 7 attack (<a href=\"https:\/\/security.radware.com\/ddos-knowledge-center\/ddospedia\/http-flood\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>HTTP Flood<\/strong><\/a>) <\/span>at 35,000 <a title=\"Hypertext Transfer Protocol\" href=\"http:\/\/en.wikipedia.org\/wiki\/Hypertext_Transfer_Protocol\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">HTTP requests<\/a> per second and then, when those efforts were thwarted, with 50,000 HTTP requests per second.<\/p>\n<p>Sucuri researchers discovered that all the attacking IP addresses had a similar default page with the \u2018DVR Components\u2019 title. After digging some more, they found that all these devices are <a href=\"http:\/\/www.busybox.net\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.busybox.net\/\">BusyBox<\/a> based. <a href=\"https:\/\/busybox.net\/about.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"https:\/\/busybox.net\/about.html\">Busybox<\/a> is a GNU-based software that aims to be the smallest and simplest correct implementation of the standard Linux command-line tools.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104800\" title=\"CCTV botnet made up of 25,000+ cameras from around the globe\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robots_marching-e1568843727301-130x150.jpg?resize=100%2C115&#038;ssl=1\" alt=\"CCTV botnet made up of 25,000+ cameras from around the globe\" width=\"100\" height=\"115\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robots_marching-e1568843727301.jpg?resize=130%2C150&amp;ssl=1 130w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robots_marching-e1568843727301.jpg?resize=65%2C75&amp;ssl=1 65w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robots_marching-e1568843727301.jpg?w=167&amp;ssl=1 167w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/>The compromised CCTV cameras were located around the globe:<\/p>\n<ul>\n<li><span class=\"entry-content post-content\">24% originated from Taiwan, <\/span><\/li>\n<li><span class=\"entry-content post-content\">12% United States,<\/span><\/li>\n<li><span class=\"entry-content post-content\"> 9% Indonesia,<\/span><\/li>\n<li><span class=\"entry-content post-content\"> 8% Mexico,<br \/>\n<\/span><\/li>\n<li><span class=\"entry-content post-content\"> and elsewhere.<\/span><\/li>\n<\/ul>\n<div class=\"answer\">\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><em>Unless something is done, <a href=\"https:\/\/www.helpnetsecurity.com\/2014\/07\/30\/iot-devices-are-filled-with-security-flaws-researchers-warn\/\">security flaws<\/a>, misconfiguration, and ignorance about the dangers of connecting unsecured devices to the IoT will keep these botnets functioning well into the future.<\/em><\/p>\n<p><em><a href=\"https:\/\/web.archive.org\/web\/20160809170916\/http:\/\/www.reactionface.info\/face\/50s-facepalm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104803\" title=\"block or absorb malicious traffic\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Man_dont_know.jpg?resize=100%2C118&#038;ssl=1\" alt=\"block or absorb malicious traffic\" width=\"100\" height=\"118\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Man_dont_know.jpg?resize=127%2C150&amp;ssl=1 127w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Man_dont_know.jpg?resize=64%2C75&amp;ssl=1 64w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Man_dont_know.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>To protect your website from botnets and DDoS, you need to be able to block or absorb malicious traffic. Firms should talk to their hosting provider about DDoS attack protection. Can they route incoming malicious traffic through distributed caching to help filter out malicious traffic &#8212; reducing the strain on existing web servers. If not find a reputable third-party service that can help filter out malicious traffic.<\/em><\/p>\n<p><em>DDoS defense services require a paid subscription, but often cost less than scaling up your own server capacity to deal with a DDoS attack.<\/em><\/p>\n<p><em><a href=\"https:\/\/www.arbornetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Arbor Networks<\/a> is one firm that provides <a href=\"https:\/\/www.arbornetworks.com\/ddos-protection-products\/arbor-cloud\" target=\"_blank\" rel=\"noopener noreferrer\">services<\/a> and <a href=\"https:\/\/www.bizety.com\/2015\/07\/01\/netscout-is-acquiring-arbor-networks\/\" target=\"_blank\" rel=\"noopener noreferrer\">devices<\/a> to defend against DDoS.<\/em><\/p>\n<p><em>Google has launched <a href=\"http:\/\/projectshield.withgoogle.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Project Shield<\/a>, to use Google&#8217;s infrastructure to support free expression online by helping independent sites mitigate DDoS attack traffic.<\/em><\/p>\n<\/div>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/blog.getresponse.com\/getresponse-ceo-statement-regarding-ddos-attack.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">GetResponse CEO Statement Regarding the DDoS Attack<\/a> (getresponse.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ann Arbor has 7th most unsecured security cams can cause trouble like spying &#038; DDoS<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,276,230,2715,2712,2716,1748,768,2714,536,92,286,2719,832,2343,2717,780,19,2718,4,2711],"class_list":["post-80627","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-ann-arbor","tag-arbor-networks","tag-busybox","tag-cctv","tag-daniel-cid","tag-ddos","tag-denial-of-service-attack","tag-dvr","tag-goog","tag-google","tag-https","tag-inseacam","tag-internet-of-things","tag-ip-address","tag-jim-harbaugh","tag-linux","tag-michigan","tag-protection-1","tag-security","tag-sucuri"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=80627"}],"version-history":[{"count":25,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80627\/revisions"}],"predecessor-version":[{"id":131783,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80627\/revisions\/131783"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=80627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=80627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=80627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}