ITU‐T's Technical Reports and Specifications 437 Recommendations It is critical that telesurveillance systems maintain their integrity and availability and that emergency services can rely on wireless or M2M communication to obtain directions and instructions from operational control centers. When information is transferred and managed over unsecured lines between different operators (both internal and external) and with heterogeneous systems, data encryption is required. By leveraging strong two‐factor authentication and one‐time password entry, only trusted personnel can gain access to critical data and control systems. Digital certificates can also be used for authentication, signing and encryption. Wireless communications and hotspots Both large and small municipalities offer free wireless hotspots in addition to those provided by airports, hotels, and shops. As this trend continues to grow, more and more citizens will be exposed to potential vulnerabilities, in particular the younger population who are at risk of being lured into unsafe websites and chat rooms. Designing and building encryption solutions into devices ensures that they can only communicate with the required control center, and that communications can be authenticated. Public WiFi connections (both free and paid) are increasingly common, but security for such connections may be lacking or is insufficient. WiFi connections can be provided in coffee shops, hotels, airports, parks and even in some streets. The host buys a wireless access point, connects that device to the Internet, and broadcasts its signal within a public place. Anyone with a wireless card within range of the host's access point can access its network and use the Internet. In order to make it quick and easy to use their hotspots, some hosts disable much of the security built into their wireless devices. This is a notable trade‐off. Without encryption, your plain text data passes unprotected through the air, where it can be intercepted by cybercrooks.