Security footage from a Bangkok airport has caught the moment a Chinese tourist was kidnapped by four men and one woman when she stepped off a flight from Hong Kong. After Jincai Chen, 39, landed at Suvarnabhumi Airport in Bangkok on May 6, a group of four Chinese men dressed in black and one Thai woman began following her. CCTV footage of the incident shows Chen struggling while two members of the gang hold her by the arms and walk her through the airport towards a van waiting outside.
Another member of the group can be seen walking a few steps in front, guiding the group throughout the abduction. Security footage at a Bangkok airport caught the moment a Chinese tourist was kidnapped by a gang of criminals after she stepped off a flight from Hong Kong earlier this month. Screenshot Two more men joined them at the luggage area after the group went through security check.
Soon after the kidnapping, the group demanded £470,000 as ransom from Han Young Lim, Chen's husband, for the safe return of the victim, reported News.com.au. However, after Lim paid the random on May 18, the captors demanded an additional £155,000, which he refused to pay and instead alerted authorities. One day later, after authorities became involved, Chen was left on the side of the road in the Bang Na district of Bangkok, 13 days after she was abducted from the airport.
Police Major General Surachate Hakparn said an investigation revealed that an immigration officer was also involved in the abduction, alongside a Thai woman called Wansikan Termthanapat, four Chinese men and around ten other Thai natives. "Arrest warrants have been issued for four Chinese suspects who have already fled Thailand. They are Wenqui Sun, Ming Song, Dongliang Sun and Meiling Kai," Hakparn said. "We know the identity of all the suspects and will be tracking them down for their involvement in the crime."
He added: "Officers became involved on May 18 and launched an intense operation. This put pressure on the gang who then released the victim... She has testified about the crime and we will also receive her husband's statements.
We will pursue the gang and attempt to reclaim the money they paid." Authorities used the CCTV footage to identify and track down the suspects, who reportedly fled the area after dumping Chan on the side of the road. Watch the footage below:
By Collins Omulo
A county assembly committee report has revealed that the much-touted Sh437 million security CCTV project in Nairobi's city centre is a massive failure despite the colossal sum of public money invested.
The Nairobi County's Public Accounts Committee (PAC) report has revealed that 26 out of the 42 CCTV's - installed in major roads such as Moi Avenue, Uhuru Highway, Kenyatta Avenue and Tom Mboya Street among others to control traffic - are not functional.
The watchdog committee report tabled by its chairman Mabatini MCA Mr Wilfred Odalo early this month, showed that the security cameras installed in Nairobi's Central Business District (CBD) cannot be relied upon to enhance security for Nairobi residents.
"However, as observed by the Auditor General, the project has been a total failure despite a colossal sum of public money having been spent," the 2015/2016 Auditor General's report read in part.
The report further revealed that no information has been provided so far on the action taken to obtain the requisite equipment, previously reported as lacking to enable communication between the control centre and several surveillance points.
"Further, it has not been clarified whether the cameras are now capable of detecting motor vehicle number plates.
In the circumstances, the surveillance system and security installations may still not be relied upon to enhance security for the county residents," the report reads.
The project, dubbed Integrated Urban Surveillance System, was implemented by the Ministry of Nairobi Metropolitan with the contract awarded to M/S Nanjing Les Information Technology Limited on September, 2012.
It entailed the installation of surveillance cameras, new traffic management system, construction of a centre and installation of associated software.
The acting Nairobi County Transport and Public Works chief officer however absolved City Hall from blame in the project saying that maintenance was being handled by the implementing contractor, M/S Nanjing Les Information Technology Limited, wrestling the control over the project from the county.
The officer also told the committee that the project was yet to be handed over to the county government by the national government's Ministry of Transport and Infrastructure.
"On June 28, 2016 we wrote to the ministry highlighting lack of maintenance of the project by the contractor and also requesting for the fast tracking the completion of the project and handover to the county for maintenance.
To date the project is yet to be handed over to the county," said the officer.
The committee has called for the county government to engage the national government and find a way of revamping the project to realize its objectives.
What is being seen as an effective means of personal as well as public safety and security can itself turn out be a security threat. Closed-circuit TV (CCTV) cameras are mushrooming everywhere in India in public, private and commercial spaces. But these very cameras can be exploited as tools for illegal surveillance and even hacking. CCTV systems in neighborhoods, shops or homes might deter local criminals but they can offer international hacking groups or even hostile governments access to sensitive private and public data.
A recent case has highlighted the need for caution in the use of CCTV cameras.
A Chinese firm whose subsidiary has been shortlisted to supply security cameras for Delhi is on a US watch list, with an advisory on threats, including remote hacking and potential backdoor access. Concerns have also been raised on the firm being owned by the Chinese government, adding a twist to the controversy over a Delhi government project to install 1.5 lakh CCTV cameras across the city. India's video surveillance market is projected to grow at a CAGR of nearly 13% during 2017-2023, according to a study by 6Wresearch.
A 2016 report by American data storage company Seagate Technology said that Indian organisations use 249 cameras on average for video surveillance. The number was about the same as in China, but significantly lower than that in developed countries such as the US and UK, where organisations uses about 349 cameras on average. This indicates vast scope for use of more CCTV cameras by organisations in India.
Most of the cameras will be installed in public places and commercial establishments, with the share of households at 13%. All this points at rapidly increasing number of CCTV cameras in India. While the Chinese CCTV cameras are suspected of having bugs that can relay information to the Chinese government, even otherwise it's not difficult for hackers to manipulate CCTV cameras.
According to Kaspersky lab researchers, uncovered flaws could allow attackers to obtain remote access. By exploiting these vulnerabilities, malicious users could execute the following attacks:
Access video and audio feeds from any camera connected to the vulnerable cloud service; remotely gain root access to a camera and use it as an entry-point for further attacks on other devices on both local and external networks; remotely upload and execute arbitrary malicious code on the cameras; steal personal information such as user's social network accounts and information which is used to send users notifications; and remotely disable vulnerable cameras.
All these attacks were possible because experts found that the way the cameras interacted with the cloud service was insecure and open to relatively easy interference. They also found that the architecture of the cloud service itself was vulnerable to external interference.
The US government has found similar vulnerabilities in the products of the Chinese firm involved in the controversy regarding Delhi government's order of 1.5 lakh CCTV cameras.
A US Department of Homeland Security advisory states that the products are "remotely exploitable" and require a low skill level to exploit.
The vulnerabilities, advisory explains, are "improper authentication" and "password in configuration file".