The following text is copyright 2005 by Network World, permission is hearby given for reproduction, as long as attribution is given and this notice is included.

 

Public nannycams

 

By Scott Bradner 

 

One of the problems with IP-based cameras is that unknown people can access them to see what they are pointing at.  It would seem to be a no-brainer to take measures to ensure that not happening but it turns out that many people who install IP cameras do not take any such measures and that some vendors make it easy for unprotected cameras to be found.

 

After some major news coverage showing surreptitiously taken videos of nannies beating up children in their care lots of parents began installing concealed cameras in their houses so that they could keep an eye on their nannies.  Many of these cameras were IP-based and would up being connected to home networks that were, in turn, connected to the Internet through DSL or cable modems.  This was ideal for the people who installed them because they could peek in from the office.  There was a bit of a potential privacy problem because the nannies tended to work in places that the homeowners also frequented and unless the homeowners took care to remember the camera was there potentially embarrassing images could be on the net for the taking.

 

Shortly thereafter the folk who were putting up security cameras figured out that they could save a lot of installation cost of they also used IP-based camera systems.

 

Many of these home or business IP-based cameras ran mini web servers so that the user could use a standard browser to look but most had no or minimal security.  Many people did not even take advantage of whatever security the cameras did have.  I guess that people did not think about the issue or assumed that because they would not be telling the world the IP address of the camera no one would find it. 

 

In another example of security through obscurity not actually being security, it turns out that some of the manufactures of these cameras have made it easy for the IP addresses of the cameras to be found.  The manufactures used consistent character strings in the manufactured URLs the users use to access the cameras.  And it turns out that Google (the universal research tool these days) has a feature in its search command that tells Google to search for URLs that include a particular string.  For example, the command inurl:"view/index.shtml" will look for the string "view/index.shtml" in all URLs.  This happens to be a string that one of the camera manufactures uses in their systems.  Google finds almost a thousand URLs with this string - almost all of them are AXIS IP-based cameras.  Other strings to look for include "ViewerFrame?Mode=" and "MultiCameraFrame?Mode=".  Together they produce more than two thousand additional hits.

 

I did a random look at the URLs the searches came up with and looked at a snowstorm in Lapland, an empty auditorium in Mexico, the center of East-Ayrshire (a town in England), the interiors of a number of restaurants and stores, a construction site in Hungry, ice and snow on Lake Lucille, a bunch of car garages, furniture showrooms, a number of computer centers, a Japanese radio talk show, lots of parking lots, and scads of traffic and weather cams.  Some of the cameras could even be controlled over the web.  By the way, there seems to be a lot of snow in Japan right now. 

 

Some URLs did not respond and some sites did ask for a logname and password but thousands of cameras are there for the viewing.  I did not find anything risque but I only looked at a few sites.   

 

I hope that any of you who put in IP-based cameras, and want them to be private, do not assume that no one will find them on the Net.  I also hope that the manufactures will fix their code to make the cameras not so easy to find.

 

disclaimer: Google finds Harvard easy to find (33.7 million hits), not all of them the university.  But the opinion on open cameras is mine, not Harvard's.