No matter the data network an now matter the data type, all are exposed to the risks of data breaches. Video and CCTV also risk disruption from rogue of data and transmissions.

Just like text and audio data, video data requires high-assurance encryption security to protect it. Unlike text and audio, video and CCTV feeds are highly sensitive to potential loss of image quality – noise. They may also be sensitive to even small amounts of latency, because of the need for real-time transmission.

Not all encryption solutions are the same – some will degrade image quality and transmission time. Others may not provide true end-to-end encryption security. Many may not be certified as suitable for defence and government use and may not use state-of-the-art encryption key management.

The Telegraph Article

British and US intelligence ‘hacked into Israeli drones’

By Raf Sanchez, Jerusalem 29 January 2016

GCHQ and the NSA ‘watched in real time’ as Israel bombed Gaza and monitored for any sign of any Israeli attack against Iran, according to reports.

British and US intelligence hacked Israeli drones’ video feeds, allowing them to watch in real time as Israel bombed Gaza and spied on Syria, according to documents leaked by American whistleblower Edward Snowden.

GCHQ and its US counterpart, the NSA, also monitored the drone footage in the hope of getting an early warning if Israel was attacking Iran’s nuclear facilities.

The revelations, reported by The Intercept, are the latest in a series of examples of how the US and Israel profess friendship in public but also spy intensively on each other.

They may heighten tensions between the two countries, which are already at odds over the Iranian nuclear deal and Israel’s settlement policy in the occupied West Bank.

The hacking programme, codenamed Anarchist, also appears to confirm a badly kept secret: that Israeli drones carry missiles and are used in lethal strikes.

Israel has never publicly confirmed it has armed drones but the footage appears to show a Heron drone, one of the world’s largest unmanned aircraft, carrying missiles.

Britain, the US and Pakistan are the only other countries thought to have carried out deadly drone strikes.

The data for the hacking programme was collected by a GCHQ monitoring station at RAF Troodos in the mountains Cyprus. The base is only around 200 miles from the coast of Israel.

The hacked feeds were then monitored at RAF Menwith Hill, an NSA base in North Yorkshire, according to the Intercept.

In at least one instance, the hackers were able to access the feed of a manned Israel F-16 fighter jet. The interception was made in January 2008, as Israel exchanged fire in Gaza with Hamas, the Palestinian militant group.

Read the full article at The Telegraph

Senetas High-Assurance Security Comments

Often video and CCTV transmissions are overlooked as a major source of sensitive data transmission across data networks. However much like text and voice data, video and CCTV data may also be highly sensitive.

Video and CCTV feeds are no different, they also transmit huge data volumes that may be highly sensitive.

Video and CCTV network transmitted data are often perceived to be too difficult to protect from data breaches, input of rogue data and disruption. This may be due to the data network type streaming the data, that may be necessarily modest bandwidth compared to regular data networks.

As all encryption solutions are not the same, there is often a trade-off between network performance and encryption security.

The conundrum is: “if I add robust encryption security, what will the impact on my real time feeds and the videos image quality be?” The answer is simple: it all depends upon the encryption device.

That need not be the case –  even with a certified encryption solutions using state-of-the-art encryption and key management.

Whether running video streaming at 10Mbps, or 1Gbps, or even 10Gbps, high-assurance robust encryption need not adversely affect the video quality not the bandwidth speed for the real time surveillance.

Ultimately if the data is a sensitive, it must be encrypted to a high-assurance standard.