Technical Support

Troubleshooting

Current Location:Home > Technical Support  > Troubleshooting

When the War of privacy become intelligent security of the how to do?
Release date:2016-01-26
Early in the 1990s, starring Will Smith movie "Public Enemies" to show off our state apparatus had pervasive use of electronic monitoring devices infringement of citizens' privacy scene. Today, 20 years later, with the increasing development of the monitoring equipment, those things mentioned when the film seems to have increasingly become a reality.
    Recently another hacker about household smart surveillance camera, leading residents of privacy incidents. Taiwan, a woman just because hacking has led the process of life, and even bathing process was broadcast live by the network, to bring its soul indelible damage.
    September this year, Zhejiang Normal University exposed through the north gate is mounted surveillance cameras unknown origin news. In the lens, the student life picture sweeping, but also online real-time broadcast. The survey found that this is a live online video company installed on the company's website and APP software, but also see a lot of similar real-time live video.
    Even small series also personally experienced a loss of privacy and related things. One day Xiao Bian see a live video software through a friend and his family with child watch TV live screen in the living room, and later learned that his friend to buy a certain brand of home security surveillance cameras, surveillance cameras because of that paragraph real-time to take something that is uploaded directly to the cloud storage system, he is quite careless during the installation, be careful not to open the "share" feature. Thus, they live directly monitor posted online, so was I to see. Xiao Bian a friend called and said I saw him on the Internet, my friend realized that their privacy has been leaked.
    We see a lot of the time we purchased and installed surveillance cameras in order to protect their own safety, but when such information was leaked online time, but let us become even more unsafe. Especially when monitoring technology officially entered the "cloud era", it all becomes easier. Coupled with information security researchers will present should be closely integrated networking device security and personal privacy separated to treat household intelligent private data stored in the device is often at risk.
When the War of privacy become intelligent security of the how to do?
    So these emerging privacy breaches, in the end is what causes it? We come from the size of the occurrence probability analysis, the first course in the use of surveillance equipment users do not know how to ensure the privacy of their own safety. Secondly, a lot of exposed privacy issues, many also that the installation of cameras on the monitor screen unit lax management. Further monitoring or monitoring security technology vendors are also insufficient. Many surveillance camera comes with cloud capabilities, you can directly connect to a wireless network, via mobile phones, tablet PCs remotely view the monitored area. Internet sharing features and open, can be said to be the breeding ground of privacy. Analysis and Application of many companies saw big plus is based on the data analysis and organize large amounts of data in the analysis and the use of large data, user privacy is also difficult to be guaranteed.
    In my opinion, monitor manufacturers in the reason the last of the parties to the contrary. More important reasons of privacy should be attributed to user. The reason for the user side of the main attributed 2:00: First, lack of self-protection awareness of privacy rights and interests. In our law, the loss of privacy rights belong to the category of civil law, people do not move officials do not study, that he must bring an action when violations of citizens feel that their privacy has been to court, and to give evidence before the court conducted the evidence trial and sentencing. The basic premise is that citizens must have to protect their privacy rights initiative, but the Chinese people's sense of privacy is quite weak, many people do not think privacy is violated is very important. According to a survey conducted by Microsoft has 99.6% of the respondents are willing to use their own behavior data in exchange for cash. Even aware of their privacy is compromised, many Chinese people are generally suffer in silence. There police said, the premise does not involve a crime, there are few treatment of privacy is compromised events relevant precedents. Public safety awareness is a cornerstone of information security, lack of civic awareness of privacy protection, leading to a lack of privacy an important part of the regulatory breaches.
    Second, the lack of technical understanding. There are security equipment and technical personnel, has said a lot of privacy because users install their own home security camera does not accidentally opening the "share" feature to their surveillance video was broadcast live on the Internet. Others may live video upload directly using the initial password can easily be cracked to be stolen. This is because the user monitoring technology for understanding and monitoring products is not enough, due to their own privacy leak.
 
  Of course, frequent breaches of privacy, it is important also because the lack of government regulation. When it comes to government regulation that we must first clear what is privacy? In judicial interpretation, refers to private life, privacy of natural persons enjoy peaceful and private information secret protected by law, it is not illegal intrusion of others, knows the collection, use and disclosure of a personality right and the right to subject others to what can intervene extent his private life, privacy of your own privacy and people open whether the scope and extent of disclosure to others have the right to decide. Privacy is a fundamental personality rights.
    Privacy is only in recent years as we are familiar with the concept, even in the West, the emergence of the concept of privacy is only a hundred years of history. First, the legal regime for the protection of privacy is established in the United States. The United States developed a "Privacy Act", "Family Education and Privacy Act", "Financial Privacy Law" in 1974. Subsequently, other countries have begun to protect the privacy of succession in the legislation.
    In China, due to the lack of privacy protection of traditional civil law does not establish the right to privacy as an independent personality right, but until the late 80s of last century, China began the aid by way of judicial interpretation and protection of the right of reputation or to maintain public order and morals encompasses the privacy of citizens, to take indirect protection methods. Practice has proved that this indirect method of protection of privacy is not complete, not careful.
    Specific to the field of view of video surveillance, video surveillance of the more popular measure for more than ten years, but the current surveillance video of the installation, use of video content, etc., associated with regulatory responsibilities is still not clear, the lack of a unified national norms management approach, which constraints related behavior to avoid invasion of privacy of citizens more difficult. Moreover, even if the violations are prosecuted, legal penalties for violation of privacy will not be too high. For example in 2013, Henan Province adopted the "Henan Province Public Security and Protection Management Regulations", provides that any unit or individual may not be sold, transmitted or public security organ without notice view, copy room system gathers information held. Above the county level public security organs in violation of the provisions of the unit can be fined from 5000 to 30,000 yuan, the individual shall be fined 1000-5000 yuan. Up to 3 million units, the highest individual $ 5,000, so the punishment can not form a larger deterrent.
    According to Xiao Bian know, most cases of invasion of privacy and sentenced to Tsinghua University professor Cai Jiming case, 2007 Cai Jiming submitted a "holiday reform" proposal, the abolition of the "51" golden weeks. Never imagined is that the "May Day" golden Zhou Ganggang canceled, there have set up Internet users in the Baidu Post Bar "Cai Jiming it", their personal data were human flesh search, and published home Cai Jiming Post Bar phone, cell phone number and e-mail, launch of the holiday adjustment disgruntled users Cai Jiming harassment. Cai Jiming bear harassment of lax oversight led to believe that Baidu Baidu Post Bar of personal information is leaked, the Baidu to court. Cai Jiming favor, the Beijing First Intermediate People's Court ruled that Baidu's compensation Cai Jiming 100,000 yuan in emotional. Yet even 100,000 yuan in compensation, a fraction of Baidu is also unable to inflict enough warning.
    HC Security Network summary
    According to Gartner's forecast, next year is applied among intelligent home networking equipment will account for 21% of the total, the number of over 1.6 billion. By that time, the average every user will have more than three personal smart devices, but they also have the ability to continue to monitor and broadcast personal user data, which also increases the risk of potential privacy is compromised.
    Missing people self-protection awareness, insufficient legal supervision, and inadequate current technology, leading to the original as citizens security video surveillance had become a privacy leak, threatening the public safety sword of Damocles. People need to protect privacy, and establish respect for the privacy of consciousness, both in need of legal protection for the privacy of citizens and effectively increase the intensity, but also need to progress awareness training, technology.