A friend of mine “video called” their daughter, who was at college, via the computer recently. She was surprised when her daughter’s web cam came on without the daughter taking any action! In fact, her daughter didn’t even appear to be home!
Scary!
Now, consider the 2010 scandal in the Lower Merion School District, near Philadelphia, in which built-in webcams on school-issued laptops could be, and were, remotely activated. This allowed District personnel to observe students even when they were at home, in the privacy of their own rooms! (Read about that here.)
Scarier!
Finally, there have been stories like this this that tell us that the FBI and NSA (among others) have long had the capability to remotely access phones, webcams, and computers. It’s a sure bet that more nefarious folk have those capabilities, too
All of this new technology is creating serious privacy concerns!
DISCLAIMER: I am not one of those who see a conspiracy or BIG BROTHER behind every tree. But, these situations exists and we need to know what can be done with OUR technologies, on OUR devices, in OUR homes so we can protect ourselves and our families.
The fact is that the use of webcams for laptops/PCs is now eclipsed by all the cameras on cell phones, tablet, handheld game systems (such as the Nintendo SWITCH & 2DS/3DS systems, and the Sony VITA), console game systems (X-Box, PS4, etc). We can take it for granted anything in development will have a camera, too. This creates an increasing number of vulnerabilities that adults and students alike are not considering when setting up and using their computers and other devices. Couple these technologies with the nefarious intent of predators, voyeurs, and pornographers, and blackmailers, and we can clearly state:
“Houston, we have a problem!”
These cases, above, clearly show that the technology to remotely control webcams not only exists, but that it is widely available (A simple Google search will lead you to the tools). Given how many devices we use that include a camera it becomes critical that we understand the threat to our privacy that is posed by these technologies.
It is not that great a leap of imagination to conceive that “evil doers” might create viruses or other malware/spyware that give them remote control of devices in our homes, or in our hand. So, without our knowledge, we could have a “spy” in our own home and, in some cases, even in our own bedrooms!
So, what do we do about this?
First off, we must not trust the technology in the computer. We have to deal with this threat in a more certain manner. Here are some suggestions:
- As stated in my TECH-SAFE HOME Seminar, children (even teens) should never have a web-connected device in their bedroom! That includes computers and cell phones.
- When not in use, laptops should be closed.
When you are using your web-cam equipped laptop, but not using the web cam, you should physically cover the camera lens. A simple way to so this is to cut a piece of paper the width your laptop’s LCD “frame” and tape it over the lens of the camera. (WARNING: Don’t put tape directly ON the lens as that messes it up!) Also, “PostIt Flags” work well, too, when trimmed to fit your laptop/monitor frame. Again, do NOT place tape directly over the lens! Always place paper between tape and the lens or have the part of the sticker/tag/etc. that does not have adhesive cover the lens. Lastly, there are many camera slides as shown here >>>>>
- On computers/monitors with built-in webcams (Such as iMacs) you can create a similar cover.
- If your webcam is connected via USB, keep it unplugged and put away when not in use? Why put it away? Because that will guarantee that you disconnect it!
- Tablets should not be left standing up, etc., so that the front or back cameras give a view of the home/room. You may want to cover the camera on the front of the tablet in the same way as for laptops.
- Cameras attached to game console/systems should be covered or (ideally) disconnected when not in use (see below). I mean, do you really want an uncovered camera in your living room? NOTE: The Microsoft X-BOX KINECT can be used as a webcam.
- Do not sign-up for any service that enables anyone to remotely control your webcam (or computer, for that matter).
Mom and Dad, it is extremely important that we also talk to our children about the dangers of being secretly filmed. If a child (or adult for that matter) is secretly filmed and the material “gets into the wild” then the embarrassment and social damage can be life-changing and, even life-threatening. Such materials, once on the Internet, can damage reputations, keep a child out of school, cost a child a scholarship, and even torpedo a job opportunity, regardless of how the images got online.
Part of the challenge is to get our kids to always keep in mind that it is easy for their actions at parties and other events to be recorded via phones, tablets, etc. Once an image/video is on the Internet, it is there forever and for–everyone! (NOTE: In many states it is a FELONY to violate privacy by recording folks in private situations without their knowledge/permission. That is slight comfort when the damage has been done.)
Some kids might think it’s a great joke to be a secret movie producer or photographer. Well, if a child/teen secretly takes pictures or videos of someone else, especially if they are of a sexual/private nature, then the child/teen could easily face child pornography charges as well as face civil suits for violation of privacy. We must teach respect for the privacy of others!
If you are really serious about protecting against unauthorized webcam access you can install software to monitor, block, and alert you when a program is trying to activate your camera. While there are a number of programs out there for these tasks Knights’ Quest does not yet recommend one due to the fact we haven’t completed our testing.
CELL PHONES & TABLETS
Since my first article on this topic was posted back in 2010 the use of smart phones and tablets has EXPLODED. This explosion brings with it new risks, especially in light of government surveillance.
It’s been reported for years that government agencies had the ability to use cell phones to track people. Now, reports,such as this June 2013 article on SLATE indicates that it is possible for another person/organization to remotely activate the following on your phone:
- GPS – To track location (Ever use FIND MY iPHONE?)
- Microphone – To listen in on conversations
- Camera(s) – To observe what you are doing
Oh, and this can be done with the phone turned off!!!! Only removing the battery completely disables / shuts a phone down, but that is not an option on many new phones.
This has implications not only for family safety and privacy, but also for business/church privacy. Industrial security has an entirely new threat to deal with when every phone in the boardroom is at potential listening device. The same holds true for pastors, counselors, and medical professionals.
Remember, it isn’t just the FBI and NSA that have these capabilities. As I mentioned, above, the tools to remotely access cameras and other parts of our devices freely available on the web. Just read this article from WIRED Magazine. Today, virtually anyone can exploit these vulnerabilities. While most of us aren’t the targets of “evil-doers”, we do have to keep in mind that situations could arise that place us, or our children, at an increased risk.
We all take extra precautions when we drive in wet/icy condition. Here are some situations in which to consider increased cyber-safety and security:
- If you or your child just went through, or are going through, a break-up or divorce (especially if things get NASTY!)
- If you or your child have an “ardent admirer” (now termed: stalker)
- If you are in a major financial dispute at home or in your career, especially if legal action is imminent or underway.
- If you are in a new relationship and are intimate with the individual early on. (Another reason to wait until marriage! )
- If you are in a very competitive business relationship, internal or external, and think industrial espionage is a possibility or risk.
- If you discuss/show confidential information with peers or customers/clients/patients.
If you believe that your privacy or a family member’s privacy is being, or has been, compromised, then you should immediately contact a lawyer in your state who is trained & experienced in electronic privacy law. Not only can they deal with “cease and desist” efforts, but they can also work to gain control over any compromising files.
All of this may sound scary, but it is not so different from other aspects of life. We lock our homes. We drop the blinds. We lock our cars. We close the doors. We look both ways before crossing the street. These new technologies are just another arena of 21st Century life where we need to understand the risks and learn to take proper and sensible actions.
So, are there additional steps you could take that are unique to smart phones and tablets, especially if you feel you may be a target?
YES!
-
- At least once a year, and more frequently if you can, wipe and reload your phone. Users of Apple iPhones can do this less frequently as the apps in the Apple APP STORE undergo a more rigorous check before being “put on the shelf”. The GOOGLE PLAY store is far less picky.
- Be very, VERY careful when installing apps, etc., that just “pop up” on your screen, even if it seems to be from a legit source.
- Clean up your apps on a regular basis.
- Install, and regularly run, anti-malware software on your phone or mobile device. I use MALWAREBYTES and SPYBOT S&D for my Windows systems. For my MacOS systems I use MALWAREBYTESand AVAST.
- Users of iOS devices do not have to worry as much as iOS is locked down very well. Last winter TOM’S GUIDE published an excellent discussion: Why Apple iPhones Don’t Need Antivirus Software
- Android users have more of a problem, and I recommend reading the Android section of the TOM’S GUIDE article that just came out (July 2018) to learn more: Best Antivirus Software and Apps 2018
- When you put your phone down for the night, put it “mic-side down” and pointed at the ceiling.
In closing….
I know, some of you may be asking: “How bad is this, REALLY?” We would all do well to consider that both Former FBI Director James Comey and billionaire Mark Zuckerberg BOTH mask their web cams!
Hmmmmm…….
Technology helps us do many things, and webcams, tablets, and smartphones cells help us keep in contact, share events, and much more. Still, we need to understand the risks, just like we do in driving our cars. As in driving, the odds that you’ll be a victim of cyber-spying are not that high. But, the odds of having an auto accident are not that high, either (outside of some cities) but we still are cautious and we always remember to buckle-up! Why? Because the consequences of not buckling up can be severe. So, we buckle up; we take simple, easy precautions. We get a crash helmet if we are driving on a NASCAR track, or we slow down if we are worried about ice.
What’s true in driving is often true with technology. The fallout from being the victim of a cyber-spy/cyber-creeper can have severe impact, as many have experienced.
Yes, all of this may sound scary, but we don’t have to let it be so. It really is not so different from other aspects of life.
- We lock our homes.
- We drop the blinds.
- We lock our cars.
- We close the doors.
Technology just provides another arena where we need to understand the risks, and learn to take action to lower or eliminate them.
How do you protect yourself, and your family, from these privacy threats?
Share your ideas and comments below!
Check out these other popular posts:
- Filtering Your Home Network via OpenDNS: What Parents Need To Know Part I – What is OpenDNS?
- VIRTUAL REALITY (VR): What Parents Need To Know
- When Children Play With (Electronic) Fire….
- Child Grooming & Kidnapping: A Father’s True Story!
- MOMMY!!! DADDY!!! What Are Ya’ll DOING????
- Secret File Vaults: What Parents Need To Know
Help us continue to help you! |
![]() |
![]() |
![]() |
Just $1/day ($30/month) WILL make a huge impact for tens of thousands of families…worldwide!!!! | Book a TECH-SAFE HOME™ seminar for parents by contacting us at: info@knightsquest.org or 817.715.4074 |
The TECH-SAFE YOUTH™ program is our program for youth! It merges Internet safety and sexual purity in a single presentation!
Contact us to schedule a
back-to-school event!!
|
Got a question?
Send it in via e-mail! |
Subscribe to Blogging The Knights’ Quest via:
.
Need articles for your Church Newsletter? Contact us for permission to reprint our articles!
It’s FREE for Churches and non-profits!
NOTICE: All communications with Knights’ Quest are held in strictest confidence, within the limits of the Law.
Leave a Reply