- The Security Primer Newsletter
- Posts
- May 27 - Can you counter facial recognition?
May 27 - Can you counter facial recognition?

Weekly Rundown
Happy Monday! Let’s recap some great highlights from last week and prime ourselves for the week ahead.
Table of Contents
WHAT’S NEW
Are the best home cameras really the best?

Why It Is Important
Home security cameras have become an essential tool for ensuring the safety of our homes and families. With the rise of smart home technology, these cameras offer features like live streaming, motion detection, and cloud storage, making it easier than ever to monitor your property remotely. However, with the increase of these devices, concerns about privacy and data security have also increased. So be careful when you see “best home cameras advertised”. These cameras can be put on a blog with very little concern for what security flaws these may have.
The Details
The above article, argues the Arlo Pro 5S and the Google Nest Cam, offer advanced features like high-definition video, wide field of view, and smart home integration. The Arlo Pro 5S, for example, boasts 2K resolution, dual-band Wi-Fi, and extended battery life, making it a robust option for both indoor and outdoor use. Similarly, the Google Nest Cam provides 1080p HD video, person detection, and seamless integration with Google Home, allowing users to control their security systems with voice commands.
However, these sophisticated features come with trade-offs. While the Arlo cameras are praised for their video quality and ease of installation, they require a significant upfront investment and offer limited home automation options. On the other hand, Nest cameras, although feature-rich, depend heavily on cloud storage, raising concerns about data security and potential unauthorized access (Security.org).
What Can You Do
To mitigate privacy risks, users should take several precautions. First, choose a camera system that offers local storage options to reduce reliance on cloud services. Additionally, ensure that the camera supports encryption for data transmission and storage. Regularly update the firmware to protect against vulnerabilities and use strong, unique passwords for your devices (especially getting rid of default passwords) and accounts. Finally, be mindful of where you place your cameras to avoid capturing private areas unnecessarily.
SECURITY ENVIRONTMENT
Under door attacks - how a simple lock can be overridden.

Why It Is Important
Under-door attacks are a stealthy and effective method used by intruders to gain access to locked rooms. By sliding a tool under the door, attackers can manipulate the interior handle to open the door. This technique is particularly concerning for hotel rooms and offices, where the gaps under doors are often large enough to exploit. Understanding this threat is crucial for enhancing physical security and protecting personal and corporate property.
The Details
An under-door attack involves using a specially designed tool that hooks onto the interior door handle. Once hooked, the tool can pull the handle down, effectively unlocking the door from the inside. This type of attack is surprisingly easy to execute and does not require advanced skills or equipment, making it a favored method among thieves. The simplicity and efficiency of this technique highlight the need for improved door security measures, especially in vulnerable locations like hotels.
What Can You Do
To prevent under-door attacks, consider installing door guards that block access to the handle. Simple and inexpensive solutions, such as 3D-printed door guards, can be effective. These guards can be attached using double-sided tape and are designed to obstruct the tool's path, rendering the attack unsuccessful. Additionally, reducing the gap under the door and using reinforced locks can further enhance security. Regularly updating security protocols and educating staff about these vulnerabilities are also essential steps in safeguarding against under-door attacks.
THE AI SPACE
Can you stop facial recognition tracking?

Why It Is Important
Surveillance technologies are evolving, and so are the methods to counteract them. Anti-surveillance clothing and adversarial patches are becoming key tools in privacy protection, challenging facial recognition systems and other surveillance methods. So what are they?
The Details
Anti-surveillance clothing employs patterns that confuse facial recognition algorithms. These designs can cause misidentification or prevent detection. Adversarial patches are small wearable items designed to confuse AI-based surveillance systems. These patches contain patterns that disrupt the algorithms used in facial recognition and object detection. By strategically placing these patches on clothing or accessories, individuals can prevent AI from correctly identifying them.
What Can You Do
As a security professional, it is crucial to stay updated on advancements in anti-surveillance technologies and be aware of how systems can be circumvented.
We explain the latest business, finance, and tech news with visuals and data.📊
All in one free newsletter that takes < 5 minutes to read. 🗞
Save time and become more informed today.👇
THINGS TO WATCH
Two companies shut down due to national security reasons

Why It Is Important
The shutdown of two B.C. companies, Bluevec Technologies and Pegauni Technology, due to national security concerns highlights the increasing scrutiny of foreign investments and interference, especially those linked to China. This action is crucial to prevent potential exploitation of sensitive data and infrastructure, which could compromise national security.
The Details
Both of these firms were engaged in anti-drone and wireless security products. Authorities ordered the companies to cease operations after finding their activities posed significant risks. Concerns often involve data that could be accessed by Chinese entities, potentially used for espionage or economic advantage. This case is part of a broader effort to protect national interests from foreign interference.
What you can do
To protect our businesses and national security, researching any company you plan to do business with thoroughly may help to mitigate some of these risks.
Links
Current news from around the industry
Want to create your own Newsletter?
Try Beehiiv: Get 20% off and 30 days Free*
If you’re starting a newsletter or looking for a better email service provider, you need to try beehiiv. The growth features, ease of use, and low price are unmatched.
It’s the platform I use and recommend to everyone. *Sign up using my link below to receive a discount and 30 days free trail.