CCTV: Setup, Attack Vectors, and Laws

Presented at ShmooCon X (2014), Jan. 17, 2014, 5 p.m. (30 minutes)

Ever wonder how to setup a CCTV Digital Video Recording security system? This talk will show how to do that, as well as key factors like attack vectors and recording laws.

First, we will go over basic setup on how we planned out this project and current price points for entry. This will include things to be mindful of such as camera quality, disk space and other features.

In the second part, we will cover attack vectors we considered while setting the system. For example, wireless cameras could be disabled with radio frequency jammers and outdoor cameras could have the power cut if not correctly secured in conduit.

Finally, we will go over things that you should have in mind in the legal realm for this kind of project. Be forewarned; we are not a lawyers or judges, but got advice from a NC judge and we have done research to find laws for VA, DC, MD, TN, and NC that cover recording and wiretapping laws. We will follow it up with court cases that surround these laws in order to back up some of the conclusions and decisions we made to build this system.


Presenters:

  • Spencer Brooks
    Spencer Brooks (brooks8888) is a dabbler in many areas of personal tech hoping to increase his knowledge of the hidden world. He specializes in: Idea generation; Designing various attack vectors (physical and virtual); and, most importantly, moral support.
  • Joshua Schroeder / JoshInGeneral as Joshua Schroeder
    Joshua Schroeder (joshingeneral) works in DC as a System Administrator for the Federal Government. His past experience consists of: Founding the 49th Security Division Security Club at UNC Charlotte; working as a web and network pen tester for the CISO of UNC Charlotte; Building IA/NIST validation programs for the Navy; and, performing pre-approval web testing for the Air Force Headquarters call center.

Similar Presentations: